f00000019c0)={0x20}, 0x1) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r1, 0x111, 0x5, 0xc3, 0x4) r2 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x1, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r2, 0xc0045516, &(0x7f0000000040)=0x4) arch_prctl$ARCH_GET_CPUID(0x1011) getpgrp(0x0) flock(r0, 0x0) ioctl$BLKRRPART(0xffffffffffffffff, 0x125f, 0x0) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000200)={@mcast2}) fcntl$F_GET_FILE_RW_HINT(r0, 0x40d, &(0x7f00000000c0)) setsockopt$RDS_CONG_MONITOR(r2, 0x114, 0x6, &(0x7f0000000280), 0x4) ioctl$VHOST_SET_LOG_FD(0xffffffffffffffff, 0x4004af07, 0x0) ioctl$DRM_IOCTL_IRQ_BUSID(r2, 0xc0106403, &(0x7f0000000100)={0x8875, 0x800, 0x8000, 0xc2}) ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000180)) ioctl$VHOST_SET_VRING_CALL(0xffffffffffffffff, 0x4008af21, &(0x7f0000000380)={0x0, r1}) r3 = fcntl$dupfd(r1, 0x0, r2) setsockopt$IP_VS_SO_SET_STOPDAEMON(r3, 0x0, 0x48c, &(0x7f0000000140)={0x3, 'veth0\x00'}, 0x18) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.cpu/syz1\x00', 0x1ff) openat$snapshot(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/snapshot\x00', 0x0, 0x0) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0xf7fffffffffffffd, 0x2012, r2, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000a40)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x20008000}, 0x24044000) unshare(0x40000000) mount$9p_virtio(&(0x7f00000003c0)='em0%$!,cgroup#\x00', &(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='9p\x00', 0x200000, &(0x7f0000000500)={'trans=virtio,', {[{@afid={'afid', 0x3d, 0x6}}, {@version_L='version=9p2000.L'}, {@cache_none='cache=none'}], [{@subj_role={'subj_role', 0x3d, '/dev/dsp#\x00'}}, {@permit_directio='permit_directio'}, {@measure='measure'}, {@context={'context', 0x3d, 'system_u'}}, {@obj_user={'obj_user'}}, {@dont_hash='dont_hash'}, {@subj_type={'subj_type', 0x3d, '\\eth0('}}, {@fsuuid={'fsuuid', 0x3d, {[0x36, 0x79, 0x0, 0x33, 0x61, 0x62, 0x32], 0x2d, [0x77, 0x32, 0x77, 0x34], 0x2d, [0x7f, 0x67, 0x37, 0x77], 0x2d, [0x0, 0x38, 0x32, 0x33], 0x2d, [0x35, 0x37, 0x7f, 0x7b, 0x37, 0x39, 0x77, 0x33]}}}, {@dont_measure='dont_measure'}]}}) ioctl$VIDIOC_ENUMINPUT(r1, 0xc050561a, &(0x7f0000000300)={0x4, "443b36c4364670c73c2ad26e1952769039650793d10fc72d24ce46e327d06e2f", 0x3, 0x100, 0x4, 0x1057ff, 0x0, 0x6}) 06:21:52 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000040)="2e00000a2500817ee45ae087185082cf0f24b0eba06ec400002339e00586f9835b3f0016914879008cd90080e230", 0x2e}], 0x1}, 0x0) 06:21:52 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = creat(&(0x7f0000000000)='./bus\x00', 0x0) getrlimit(0x0, &(0x7f00000000c0)) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x18001}) 06:21:52 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000040)="2e000f002500817ee45ae087185082cf0f24b0eba06ec400002339e00586f9835b3f0016914879008cd90080e230", 0x2e}], 0x1}, 0x0) [ 416.738622][T15969] IPVS: ftp: loaded support on port[0] = 21 [ 416.840462][T15974] IPVS: ftp: loaded support on port[0] = 21 06:21:53 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x2a000, 0x0) lstat(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$TUNSETGROUP(r0, 0x400454ce, r1) mount$9p_tcp(&(0x7f0000000340)='127.0.0.1\x00', 0x0, 0x0, 0x0, 0x0) r2 = syz_open_dev$sndseq(&(0x7f00000000c0)='/dev/snd/seq\x00', 0x0, 0x1000000200000582) r3 = syz_open_dev$media(&(0x7f0000000040)='/dev/media#\x00', 0x0, 0x101002) pipe2(&(0x7f0000000200), 0x800) ioctl$VHOST_GET_FEATURES(r3, 0x8008af00, &(0x7f0000000080)) r4 = dup2(r2, r2) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r4, 0xc08c5332, &(0x7f0000000280)={0x0, 0x0, 0x0, 'queue1\x00'}) dup2(r4, r0) write$P9_RLINK(r4, &(0x7f0000000000)={0x7}, 0x2dd) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r4, 0x4040534e, &(0x7f0000000340)={0x66, @time}) 06:21:53 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000040)="2e0020002500817ee45ae087185082cf0f24b0eba06ec400002339e00586f9835b3f0016914879008cd90080e230", 0x2e}], 0x1}, 0x0) 06:21:53 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) getsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000400), &(0x7f0000000440)=0x8) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, &(0x7f00000019c0)={0x20}, 0x1) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r1, 0x111, 0x5, 0xc3, 0x4) r2 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x1, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r2, 0xc0045516, &(0x7f0000000040)=0x4) arch_prctl$ARCH_GET_CPUID(0x1011) getpgrp(0x0) flock(r0, 0x0) ioctl$BLKRRPART(0xffffffffffffffff, 0x125f, 0x0) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000200)={@mcast2}) fcntl$F_GET_FILE_RW_HINT(r0, 0x40d, &(0x7f00000000c0)) setsockopt$RDS_CONG_MONITOR(r2, 0x114, 0x6, &(0x7f0000000280), 0x4) ioctl$VHOST_SET_LOG_FD(r2, 0x4004af07, 0x0) ioctl$DRM_IOCTL_IRQ_BUSID(0xffffffffffffffff, 0xc0106403, &(0x7f0000000100)={0x8875, 0x800, 0x8000, 0xc2}) ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000180)) ioctl$VHOST_SET_VRING_CALL(0xffffffffffffffff, 0x4008af21, &(0x7f0000000380)={0x0, r1}) r3 = fcntl$dupfd(r1, 0x0, r2) setsockopt$IP_VS_SO_SET_STOPDAEMON(r3, 0x0, 0x48c, &(0x7f0000000140)={0x3, 'veth0\x00'}, 0x18) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.cpu/syz1\x00', 0x1ff) openat$snapshot(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/snapshot\x00', 0x0, 0x0) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0xf7fffffffffffffd, 0x2012, r2, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000a40)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x20008000}, 0x24044000) unshare(0x40000000) mount$9p_virtio(&(0x7f00000003c0)='em0%$!,cgroup#\x00', &(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='9p\x00', 0x200000, &(0x7f0000000500)={'trans=virtio,', {[{@afid={'afid', 0x3d, 0x6}}, {@version_L='version=9p2000.L'}, {@cache_none='cache=none'}], [{@subj_role={'subj_role', 0x3d, '/dev/dsp#\x00'}}, {@permit_directio='permit_directio'}, {@measure='measure'}, {@context={'context', 0x3d, 'system_u'}}, {@obj_user={'obj_user'}}, {@dont_hash='dont_hash'}, {@subj_type={'subj_type', 0x3d, '\\eth0('}}, {@fsuuid={'fsuuid', 0x3d, {[0x36, 0x79, 0x0, 0x33, 0x61, 0x62, 0x32], 0x2d, [0x77, 0x32, 0x77, 0x34], 0x2d, [0x7f, 0x67, 0x37, 0x77], 0x2d, [0x0, 0x38, 0x32, 0x33], 0x2d, [0x35, 0x37, 0x7f, 0x7b, 0x37, 0x39, 0x77, 0x33]}}}, {@dont_measure='dont_measure'}]}}) ioctl$VIDIOC_ENUMINPUT(r1, 0xc050561a, &(0x7f0000000300)={0x4, "443b36c4364670c73c2ad26e1952769039650793d10fc72d24ce46e327d06e2f", 0x3, 0x100, 0x4, 0x1057ff, 0x0, 0x6}) 06:21:53 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) getsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000400), &(0x7f0000000440)=0x8) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, &(0x7f00000019c0)={0x20}, 0x1) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r1, 0x111, 0x5, 0xc3, 0x4) r2 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x1, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r2, 0xc0045516, &(0x7f0000000040)=0x4) arch_prctl$ARCH_GET_CPUID(0x1011) getpgrp(0x0) flock(r0, 0x0) ioctl$BLKRRPART(0xffffffffffffffff, 0x125f, 0x0) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000200)={@mcast2}) fcntl$F_GET_FILE_RW_HINT(r0, 0x40d, 0x0) setsockopt$RDS_CONG_MONITOR(r2, 0x114, 0x6, &(0x7f0000000280), 0x4) ioctl$VHOST_SET_LOG_FD(r2, 0x4004af07, 0x0) ioctl$DRM_IOCTL_IRQ_BUSID(r2, 0xc0106403, &(0x7f0000000100)={0x8875, 0x800, 0x8000, 0xc2}) ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000180)) ioctl$VHOST_SET_VRING_CALL(0xffffffffffffffff, 0x4008af21, &(0x7f0000000380)={0x0, r1}) r3 = fcntl$dupfd(r1, 0x0, r2) setsockopt$IP_VS_SO_SET_STOPDAEMON(r3, 0x0, 0x48c, &(0x7f0000000140)={0x3, 'veth0\x00'}, 0x18) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.cpu/syz1\x00', 0x1ff) openat$snapshot(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/snapshot\x00', 0x0, 0x0) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0xf7fffffffffffffd, 0x2012, r2, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000a40)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x20008000}, 0x24044000) unshare(0x40000000) ioctl$VIDIOC_ENUMINPUT(r1, 0xc050561a, &(0x7f0000000300)={0x4, "443b36c4364670c73c2ad26e1952769039650793d10fc72d24ce46e327d06e2f", 0x3, 0x100, 0x4, 0x1057ff, 0x0, 0x6}) 06:21:53 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000040)="2e00000e2500817ee45ae087185082cf0f24b0eba06ec400002339e00586f9835b3f0016914879008cd90080e230", 0x2e}], 0x1}, 0x0) 06:21:53 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = creat(&(0x7f0000000000)='./bus\x00', 0x0) getrlimit(0x0, &(0x7f00000000c0)) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x26239}) 06:21:53 executing program 3: mount$9p_tcp(&(0x7f0000000340)='127.0.0.1\x00', 0x0, 0x0, 0x0, 0x0) r0 = syz_open_dev$sndseq(&(0x7f00000000c0)='/dev/snd/seq\x00', 0x0, 0x1000000200000582) r1 = dup2(r0, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000000280)={0x0, 0x0, 0x0, 'queue1\x00'}) write$P9_RLINK(r1, &(0x7f0000000000)={0x7}, 0x2dd) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r1, 0x4040534e, &(0x7f0000000340)={0x66, @time}) [ 418.095458][T15996] IPVS: ftp: loaded support on port[0] = 21 [ 418.250934][T16010] IPVS: ftp: loaded support on port[0] = 21 06:21:53 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000040)="2e003f002500817ee45ae087185082cf0f24b0eba06ec400002339e00586f9835b3f0016914879008cd90080e230", 0x2e}], 0x1}, 0x0) 06:21:54 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = creat(&(0x7f0000000000)='./bus\x00', 0x0) getrlimit(0x0, &(0x7f00000000c0)) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x26261}) 06:21:54 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000040)="2e0001392500817ee45ae087185082cf0f24b0eba06ec400002339e00586f9835b3f0016914879008cd90080e230", 0x2e}], 0x1}, 0x0) 06:21:54 executing program 3: mount$9p_tcp(&(0x7f0000000340)='127.0.0.1\x00', 0x0, 0x0, 0x0, 0x0) r0 = syz_open_dev$sndseq(&(0x7f00000000c0)='/dev/snd/seq\x00', 0x0, 0x1000000200000502) r1 = dup2(r0, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000000280)={0x0, 0x0, 0x0, 'queue1\x00'}) mknodat(r1, &(0x7f0000000040)='./file0\x00', 0x24, 0x2) write$P9_RLINK(r1, &(0x7f0000000000)={0xe0}, 0x6a0) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r1, 0x4040534e, &(0x7f0000000340)={0x66, @time}) 06:21:54 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) getsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000400), &(0x7f0000000440)=0x8) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, &(0x7f00000019c0)={0x20}, 0x1) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r1, 0x111, 0x5, 0xc3, 0x4) r2 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x1, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r2, 0xc0045516, &(0x7f0000000040)=0x4) arch_prctl$ARCH_GET_CPUID(0x1011) getpgrp(0x0) flock(r0, 0x0) ioctl$BLKRRPART(0xffffffffffffffff, 0x125f, 0x0) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000200)={@mcast2}) fcntl$F_GET_FILE_RW_HINT(r0, 0x40d, 0x0) setsockopt$RDS_CONG_MONITOR(r2, 0x114, 0x6, &(0x7f0000000280), 0x4) ioctl$VHOST_SET_LOG_FD(r2, 0x4004af07, 0x0) ioctl$DRM_IOCTL_IRQ_BUSID(r2, 0xc0106403, &(0x7f0000000100)={0x8875, 0x800, 0x8000, 0xc2}) ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000180)) ioctl$VHOST_SET_VRING_CALL(0xffffffffffffffff, 0x4008af21, &(0x7f0000000380)={0x0, r1}) r3 = fcntl$dupfd(r1, 0x0, r2) setsockopt$IP_VS_SO_SET_STOPDAEMON(r3, 0x0, 0x48c, &(0x7f0000000140)={0x3, 'veth0\x00'}, 0x18) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.cpu/syz1\x00', 0x1ff) openat$snapshot(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/snapshot\x00', 0x0, 0x0) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0xf7fffffffffffffd, 0x2012, r2, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000a40)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x20008000}, 0x24044000) mount$9p_virtio(&(0x7f00000003c0)='em0%$!,cgroup#\x00', &(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='9p\x00', 0x200000, &(0x7f0000000500)={'trans=virtio,', {[{@afid={'afid', 0x3d, 0x6}}, {@version_L='version=9p2000.L'}, {@cache_none='cache=none'}], [{@subj_role={'subj_role', 0x3d, '/dev/dsp#\x00'}}, {@permit_directio='permit_directio'}, {@measure='measure'}, {@context={'context', 0x3d, 'system_u'}}, {@obj_user={'obj_user'}}, {@dont_hash='dont_hash'}, {@subj_type={'subj_type', 0x3d, '\\eth0('}}, {@fsuuid={'fsuuid', 0x3d, {[0x36, 0x79, 0x0, 0x33, 0x61, 0x62, 0x32], 0x2d, [0x77, 0x32, 0x77, 0x34], 0x2d, [0x7f, 0x67, 0x37, 0x77], 0x2d, [0x0, 0x38, 0x32, 0x33], 0x2d, [0x35, 0x37, 0x7f, 0x7b, 0x37, 0x39, 0x77, 0x33]}}}, {@dont_measure='dont_measure'}]}}) ioctl$VIDIOC_ENUMINPUT(r1, 0xc050561a, &(0x7f0000000300)={0x4, "443b36c4364670c73c2ad26e1952769039650793d10fc72d24ce46e327d06e2f", 0x3, 0x100, 0x4, 0x1057ff, 0x0, 0x6}) 06:21:54 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000040)="2e0048002500817ee45ae087185082cf0f24b0eba06ec400002339e00586f9835b3f0016914879008cd90080e230", 0x2e}], 0x1}, 0x0) 06:21:54 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) getsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000400), &(0x7f0000000440)=0x8) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, &(0x7f00000019c0)={0x20}, 0x1) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r1, 0x111, 0x5, 0xc3, 0x4) r2 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x1, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r2, 0xc0045516, &(0x7f0000000040)=0x4) arch_prctl$ARCH_GET_CPUID(0x1011) getpgrp(0x0) flock(r0, 0x0) ioctl$BLKRRPART(0xffffffffffffffff, 0x125f, 0x0) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000200)={@mcast2}) fcntl$F_GET_FILE_RW_HINT(r0, 0x40d, &(0x7f00000000c0)) setsockopt$RDS_CONG_MONITOR(r2, 0x114, 0x6, &(0x7f0000000280), 0x4) ioctl$VHOST_SET_LOG_FD(r2, 0x4004af07, 0x0) ioctl$DRM_IOCTL_IRQ_BUSID(0xffffffffffffffff, 0xc0106403, &(0x7f0000000100)={0x8875, 0x800, 0x8000, 0xc2}) ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000180)) ioctl$VHOST_SET_VRING_CALL(0xffffffffffffffff, 0x4008af21, &(0x7f0000000380)={0x0, r1}) r3 = fcntl$dupfd(r1, 0x0, r2) setsockopt$IP_VS_SO_SET_STOPDAEMON(r3, 0x0, 0x48c, &(0x7f0000000140)={0x3, 'veth0\x00'}, 0x18) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.cpu/syz1\x00', 0x1ff) openat$snapshot(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/snapshot\x00', 0x0, 0x0) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0xf7fffffffffffffd, 0x2012, r2, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000a40)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x20008000}, 0x24044000) unshare(0x40000000) mount$9p_virtio(&(0x7f00000003c0)='em0%$!,cgroup#\x00', &(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='9p\x00', 0x200000, &(0x7f0000000500)={'trans=virtio,', {[{@afid={'afid', 0x3d, 0x6}}, {@version_L='version=9p2000.L'}, {@cache_none='cache=none'}], [{@subj_role={'subj_role', 0x3d, '/dev/dsp#\x00'}}, {@permit_directio='permit_directio'}, {@measure='measure'}, {@context={'context', 0x3d, 'system_u'}}, {@obj_user={'obj_user'}}, {@dont_hash='dont_hash'}, {@subj_type={'subj_type', 0x3d, '\\eth0('}}, {@fsuuid={'fsuuid', 0x3d, {[0x36, 0x79, 0x0, 0x33, 0x61, 0x62, 0x32], 0x2d, [0x77, 0x32, 0x77, 0x34], 0x2d, [0x7f, 0x67, 0x37, 0x77], 0x2d, [0x0, 0x38, 0x32, 0x33], 0x2d, [0x35, 0x37, 0x7f, 0x7b, 0x37, 0x39, 0x77, 0x33]}}}, {@dont_measure='dont_measure'}]}}) ioctl$VIDIOC_ENUMINPUT(r1, 0xc050561a, &(0x7f0000000300)={0x4, "443b36c4364670c73c2ad26e1952769039650793d10fc72d24ce46e327d06e2f", 0x3, 0x100, 0x4, 0x1057ff, 0x0, 0x6}) 06:21:54 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000040)="2e00003f2500817ee45ae087185082cf0f24b0eba06ec400002339e00586f9835b3f0016914879008cd90080e230", 0x2e}], 0x1}, 0x0) 06:21:54 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = creat(&(0x7f0000000000)='./bus\x00', 0x0) getrlimit(0x0, &(0x7f00000000c0)) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x26405}) 06:21:54 executing program 3: mount$9p_tcp(&(0x7f0000000340)='127.0.0.1\x00', 0x0, 0x0, 0x0, 0x0) r0 = syz_open_dev$sndseq(&(0x7f00000000c0)='/dev/snd/seq\x00', 0x0, 0x1000000200000582) r1 = dup2(r0, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000000280)={0x0, 0x0, 0x0, 'queue1\x00'}) write$P9_RLINK(r1, &(0x7f0000000000)={0x7}, 0x2dd) setsockopt$inet_tcp_int(r1, 0x6, 0x8, &(0x7f0000000040)=0xfe0, 0x4) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r1, 0x4040534e, &(0x7f0000000340)={0x66, @time}) [ 418.835900][T16035] IPVS: ftp: loaded support on port[0] = 21 06:21:54 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000040)="2e0000482500817ee45ae087185082cf0f24b0eba06ec400002339e00586f9835b3f0016914879008cd90080e230", 0x2e}], 0x1}, 0x0) 06:21:54 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000040)="2e004c002500817ee45ae087185082cf0f24b0eba06ec400002339e00586f9835b3f0016914879008cd90080e230", 0x2e}], 0x1}, 0x0) 06:21:54 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000040)="2e00004c2500817ee45ae087185082cf0f24b0eba06ec400002339e00586f9835b3f0016914879008cd90080e230", 0x2e}], 0x1}, 0x0) 06:21:54 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000040)="2e0060002500817ee45ae087185082cf0f24b0eba06ec400002339e00586f9835b3f0016914879008cd90080e230", 0x2e}], 0x1}, 0x0) 06:21:54 executing program 3: mount$9p_tcp(&(0x7f0000000180)='127.0.0.1\x00', 0x0, 0x0, 0x220010, 0x0) r0 = syz_open_dev$sndseq(&(0x7f0000000080)='/dev/snd/seq\x00', 0x0, 0x1ffffc) r1 = dup2(r0, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000000280)={0x0, 0x0, 0x0, 'queue1\x00'}) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r1, 0x111, 0x5, 0xffff, 0x4) write$P9_RLINK(r1, &(0x7f0000000000)={0x7}, 0x2dd) prctl$PR_SVE_GET_VL(0x33, 0x1b7b0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f00000001c0)={0x2390000, 0x2, 0x9, 'queue1\x00', 0x8000}) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000040)={0x0}, &(0x7f00000000c0)=0xc) getpgrp(r2) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r1, 0x4040534e, &(0x7f0000000340)={0x66, @time}) 06:21:54 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) getsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000400), &(0x7f0000000440)=0x8) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, &(0x7f00000019c0)={0x20}, 0x1) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r1, 0x111, 0x5, 0xc3, 0x4) r2 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x1, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r2, 0xc0045516, &(0x7f0000000040)=0x4) arch_prctl$ARCH_GET_CPUID(0x1011) getpgrp(0x0) flock(r0, 0x0) ioctl$BLKRRPART(0xffffffffffffffff, 0x125f, 0x0) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000200)={@mcast2}) fcntl$F_GET_FILE_RW_HINT(r0, 0x40d, 0x0) setsockopt$RDS_CONG_MONITOR(r2, 0x114, 0x6, &(0x7f0000000280), 0x4) ioctl$VHOST_SET_LOG_FD(r2, 0x4004af07, 0x0) ioctl$DRM_IOCTL_IRQ_BUSID(r2, 0xc0106403, &(0x7f0000000100)={0x8875, 0x800, 0x8000, 0xc2}) ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000180)) ioctl$VHOST_SET_VRING_CALL(0xffffffffffffffff, 0x4008af21, &(0x7f0000000380)={0x0, r1}) r3 = fcntl$dupfd(r1, 0x0, r2) setsockopt$IP_VS_SO_SET_STOPDAEMON(r3, 0x0, 0x48c, &(0x7f0000000140)={0x3, 'veth0\x00'}, 0x18) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.cpu/syz1\x00', 0x1ff) openat$snapshot(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/snapshot\x00', 0x0, 0x0) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0xf7fffffffffffffd, 0x2012, r2, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000a40)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x20008000}, 0x24044000) mount$9p_virtio(&(0x7f00000003c0)='em0%$!,cgroup#\x00', &(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='9p\x00', 0x200000, &(0x7f0000000500)={'trans=virtio,', {[{@afid={'afid', 0x3d, 0x6}}, {@version_L='version=9p2000.L'}, {@cache_none='cache=none'}], [{@subj_role={'subj_role', 0x3d, '/dev/dsp#\x00'}}, {@permit_directio='permit_directio'}, {@measure='measure'}, {@context={'context', 0x3d, 'system_u'}}, {@obj_user={'obj_user'}}, {@dont_hash='dont_hash'}, {@subj_type={'subj_type', 0x3d, '\\eth0('}}, {@fsuuid={'fsuuid', 0x3d, {[0x36, 0x79, 0x0, 0x33, 0x61, 0x62, 0x32], 0x2d, [0x77, 0x32, 0x77, 0x34], 0x2d, [0x7f, 0x67, 0x37, 0x77], 0x2d, [0x0, 0x38, 0x32, 0x33], 0x2d, [0x35, 0x37, 0x7f, 0x7b, 0x37, 0x39, 0x77, 0x33]}}}, {@dont_measure='dont_measure'}]}}) ioctl$VIDIOC_ENUMINPUT(r1, 0xc050561a, &(0x7f0000000300)={0x4, "443b36c4364670c73c2ad26e1952769039650793d10fc72d24ce46e327d06e2f", 0x3, 0x100, 0x4, 0x1057ff, 0x0, 0x6}) 06:21:54 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = creat(&(0x7f0000000000)='./bus\x00', 0x0) getrlimit(0x0, &(0x7f00000000c0)) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x26600}) 06:21:55 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) getsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000400), &(0x7f0000000440)=0x8) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, &(0x7f00000019c0)={0x20}, 0x1) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r1, 0x111, 0x5, 0xc3, 0x4) r2 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x1, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r2, 0xc0045516, &(0x7f0000000040)=0x4) arch_prctl$ARCH_GET_CPUID(0x1011) getpgrp(0x0) flock(r0, 0x0) ioctl$BLKRRPART(0xffffffffffffffff, 0x125f, 0x0) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000200)={@mcast2}) fcntl$F_GET_FILE_RW_HINT(r0, 0x40d, &(0x7f00000000c0)) setsockopt$RDS_CONG_MONITOR(r2, 0x114, 0x6, &(0x7f0000000280), 0x4) ioctl$VHOST_SET_LOG_FD(r2, 0x4004af07, 0x0) ioctl$DRM_IOCTL_IRQ_BUSID(0xffffffffffffffff, 0xc0106403, &(0x7f0000000100)={0x8875, 0x800, 0x8000, 0xc2}) ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000180)) ioctl$VHOST_SET_VRING_CALL(0xffffffffffffffff, 0x4008af21, &(0x7f0000000380)={0x0, r1}) r3 = fcntl$dupfd(r1, 0x0, r2) setsockopt$IP_VS_SO_SET_STOPDAEMON(r3, 0x0, 0x48c, &(0x7f0000000140)={0x3, 'veth0\x00'}, 0x18) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.cpu/syz1\x00', 0x1ff) openat$snapshot(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/snapshot\x00', 0x0, 0x0) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0xf7fffffffffffffd, 0x2012, r2, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000a40)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x20008000}, 0x24044000) unshare(0x40000000) mount$9p_virtio(&(0x7f00000003c0)='em0%$!,cgroup#\x00', &(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='9p\x00', 0x200000, &(0x7f0000000500)={'trans=virtio,', {[{@afid={'afid', 0x3d, 0x6}}, {@version_L='version=9p2000.L'}, {@cache_none='cache=none'}], [{@subj_role={'subj_role', 0x3d, '/dev/dsp#\x00'}}, {@permit_directio='permit_directio'}, {@measure='measure'}, {@context={'context', 0x3d, 'system_u'}}, {@obj_user={'obj_user'}}, {@dont_hash='dont_hash'}, {@subj_type={'subj_type', 0x3d, '\\eth0('}}, {@fsuuid={'fsuuid', 0x3d, {[0x36, 0x79, 0x0, 0x33, 0x61, 0x62, 0x32], 0x2d, [0x77, 0x32, 0x77, 0x34], 0x2d, [0x7f, 0x67, 0x37, 0x77], 0x2d, [0x0, 0x38, 0x32, 0x33], 0x2d, [0x35, 0x37, 0x7f, 0x7b, 0x37, 0x39, 0x77, 0x33]}}}, {@dont_measure='dont_measure'}]}}) ioctl$VIDIOC_ENUMINPUT(r1, 0xc050561a, &(0x7f0000000300)={0x4, "443b36c4364670c73c2ad26e1952769039650793d10fc72d24ce46e327d06e2f", 0x3, 0x100, 0x4, 0x1057ff, 0x0, 0x6}) 06:21:55 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) getsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000400), &(0x7f0000000440)=0x8) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, &(0x7f00000019c0)={0x20}, 0x1) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r1, 0x111, 0x5, 0xc3, 0x4) r2 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x1, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r2, 0xc0045516, &(0x7f0000000040)=0x4) arch_prctl$ARCH_GET_CPUID(0x1011) getpgrp(0x0) flock(r0, 0x0) ioctl$BLKRRPART(0xffffffffffffffff, 0x125f, 0x0) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000200)={@mcast2}) fcntl$F_GET_FILE_RW_HINT(r0, 0x40d, 0x0) setsockopt$RDS_CONG_MONITOR(r2, 0x114, 0x6, &(0x7f0000000280), 0x4) ioctl$VHOST_SET_LOG_FD(r2, 0x4004af07, 0x0) ioctl$DRM_IOCTL_IRQ_BUSID(r2, 0xc0106403, &(0x7f0000000100)={0x8875, 0x800, 0x8000, 0xc2}) ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000180)) ioctl$VHOST_SET_VRING_CALL(0xffffffffffffffff, 0x4008af21, &(0x7f0000000380)={0x0, r1}) r3 = fcntl$dupfd(r1, 0x0, r2) setsockopt$IP_VS_SO_SET_STOPDAEMON(r3, 0x0, 0x48c, &(0x7f0000000140)={0x3, 'veth0\x00'}, 0x18) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.cpu/syz1\x00', 0x1ff) openat$snapshot(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/snapshot\x00', 0x0, 0x0) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0xf7fffffffffffffd, 0x2012, r2, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000a40)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x20008000}, 0x24044000) mount$9p_virtio(&(0x7f00000003c0)='em0%$!,cgroup#\x00', &(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='9p\x00', 0x200000, &(0x7f0000000500)={'trans=virtio,', {[{@afid={'afid', 0x3d, 0x6}}, {@version_L='version=9p2000.L'}, {@cache_none='cache=none'}], [{@subj_role={'subj_role', 0x3d, '/dev/dsp#\x00'}}, {@permit_directio='permit_directio'}, {@measure='measure'}, {@context={'context', 0x3d, 'system_u'}}, {@obj_user={'obj_user'}}, {@dont_hash='dont_hash'}, {@subj_type={'subj_type', 0x3d, '\\eth0('}}, {@fsuuid={'fsuuid', 0x3d, {[0x36, 0x79, 0x0, 0x33, 0x61, 0x62, 0x32], 0x2d, [0x77, 0x32, 0x77, 0x34], 0x2d, [0x7f, 0x67, 0x37, 0x77], 0x2d, [0x0, 0x38, 0x32, 0x33], 0x2d, [0x35, 0x37, 0x7f, 0x7b, 0x37, 0x39, 0x77, 0x33]}}}, {@dont_measure='dont_measure'}]}}) ioctl$VIDIOC_ENUMINPUT(r1, 0xc050561a, &(0x7f0000000300)={0x4, "443b36c4364670c73c2ad26e1952769039650793d10fc72d24ce46e327d06e2f", 0x3, 0x100, 0x4, 0x1057ff, 0x0, 0x6}) [ 419.558022][T16075] IPVS: ftp: loaded support on port[0] = 21 06:21:55 executing program 3: mount$9p_tcp(&(0x7f0000000340)='127.0.0.1\x00', 0x0, 0x0, 0x0, 0x0) r0 = syz_open_dev$sndseq(&(0x7f00000000c0)='/dev/snd/seq\x00', 0x0, 0x1000000200000582) r1 = dup2(r0, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000000280)={0x0, 0x0, 0x0, 'queue1\x00'}) write$P9_RLINK(r1, &(0x7f0000000000)={0x7}, 0x2dd) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r1, 0x4040534e, &(0x7f0000000340)={0x66, @time}) fstat(r1, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0}) r3 = getgid() r4 = getgid() getresgid(&(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)=0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000480)={0x0, 0x0, 0x0}, &(0x7f00000004c0)=0xc) getresgid(&(0x7f0000000500)=0x0, &(0x7f0000000540), &(0x7f0000000580)) r8 = getegid() lsetxattr$system_posix_acl(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='system.posix_acl_access\x00', &(0x7f00000005c0)={{}, {0x1, 0x5}, [{0x2, 0x2, r2}], {0x4, 0x4}, [{0x8, 0x3, r3}, {0x8, 0x3, r4}, {0x8, 0x4, r5}, {0x8, 0x1, r6}, {0x8, 0x1, r7}, {0x8, 0x2, r8}], {0x10, 0x2}, {0x20, 0x2}}, 0x5c, 0x1) recvfrom$unix(r1, &(0x7f0000000040)=""/107, 0x6b, 0x10043, &(0x7f0000000100)=@abs={0x1, 0x0, 0x4e22}, 0x6e) 06:21:55 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) getsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000400), &(0x7f0000000440)=0x8) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, &(0x7f00000019c0)={0x20}, 0x1) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r1, 0x111, 0x5, 0xc3, 0x4) r2 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x1, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r2, 0xc0045516, &(0x7f0000000040)=0x4) arch_prctl$ARCH_GET_CPUID(0x1011) getpgrp(0x0) flock(r0, 0x0) ioctl$BLKRRPART(0xffffffffffffffff, 0x125f, 0x0) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000200)={@mcast2}) fcntl$F_GET_FILE_RW_HINT(r0, 0x40d, 0x0) setsockopt$RDS_CONG_MONITOR(r2, 0x114, 0x6, &(0x7f0000000280), 0x4) ioctl$VHOST_SET_LOG_FD(r2, 0x4004af07, 0x0) ioctl$DRM_IOCTL_IRQ_BUSID(r2, 0xc0106403, &(0x7f0000000100)={0x8875, 0x800, 0x8000, 0xc2}) ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000180)) ioctl$VHOST_SET_VRING_CALL(0xffffffffffffffff, 0x4008af21, &(0x7f0000000380)={0x0, r1}) r3 = fcntl$dupfd(r1, 0x0, r2) setsockopt$IP_VS_SO_SET_STOPDAEMON(r3, 0x0, 0x48c, &(0x7f0000000140)={0x3, 'veth0\x00'}, 0x18) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.cpu/syz1\x00', 0x1ff) openat$snapshot(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/snapshot\x00', 0x0, 0x0) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0xf7fffffffffffffd, 0x2012, r2, 0x0) unshare(0x40000000) mount$9p_virtio(&(0x7f00000003c0)='em0%$!,cgroup#\x00', &(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='9p\x00', 0x200000, &(0x7f0000000500)={'trans=virtio,', {[{@afid={'afid', 0x3d, 0x6}}, {@version_L='version=9p2000.L'}, {@cache_none='cache=none'}], [{@subj_role={'subj_role', 0x3d, '/dev/dsp#\x00'}}, {@permit_directio='permit_directio'}, {@measure='measure'}, {@context={'context', 0x3d, 'system_u'}}, {@obj_user={'obj_user'}}, {@dont_hash='dont_hash'}, {@subj_type={'subj_type', 0x3d, '\\eth0('}}, {@fsuuid={'fsuuid', 0x3d, {[0x36, 0x79, 0x0, 0x33, 0x61, 0x62, 0x32], 0x2d, [0x77, 0x32, 0x77, 0x34], 0x2d, [0x7f, 0x67, 0x37, 0x77], 0x2d, [0x0, 0x38, 0x32, 0x33], 0x2d, [0x35, 0x37, 0x7f, 0x7b, 0x37, 0x39, 0x77, 0x33]}}}, {@dont_measure='dont_measure'}]}}) ioctl$VIDIOC_ENUMINPUT(r1, 0xc050561a, &(0x7f0000000300)={0x4, "443b36c4364670c73c2ad26e1952769039650793d10fc72d24ce46e327d06e2f", 0x3, 0x100, 0x4, 0x1057ff, 0x0, 0x6}) 06:21:55 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000040)="2e0068002500817ee45ae087185082cf0f24b0eba06ec400002339e00586f9835b3f0016914879008cd90080e230", 0x2e}], 0x1}, 0x0) 06:21:55 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000040)="2e0000602500817ee45ae087185082cf0f24b0eba06ec400002339e00586f9835b3f0016914879008cd90080e230", 0x2e}], 0x1}, 0x0) 06:21:55 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = creat(&(0x7f0000000000)='./bus\x00', 0x0) getrlimit(0x0, &(0x7f00000000c0)) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x28000}) 06:21:55 executing program 3: mount$9p_tcp(&(0x7f0000000340)='127.0.0.1\x00', 0x0, 0x0, 0x0, 0x0) r0 = syz_open_dev$sndseq(&(0x7f00000000c0)='/dev/snd/seq\x00', 0x0, 0x6242) r1 = dup2(r0, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000000280)={0x0, 0x0, 0x0, 'queue1\x00'}) write$P9_RLINK(r1, &(0x7f0000000000)={0x7}, 0x2dd) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r1, 0x4040534e, &(0x7f0000000340)={0x66, @time}) [ 420.083614][T16093] IPVS: ftp: loaded support on port[0] = 21 06:21:55 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) getsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000400), &(0x7f0000000440)=0x8) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, &(0x7f00000019c0)={0x20}, 0x1) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r1, 0x111, 0x5, 0xc3, 0x4) r2 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x1, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r2, 0xc0045516, &(0x7f0000000040)=0x4) arch_prctl$ARCH_GET_CPUID(0x1011) getpgrp(0x0) flock(r0, 0x0) ioctl$BLKRRPART(0xffffffffffffffff, 0x125f, 0x0) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000200)={@mcast2}) fcntl$F_GET_FILE_RW_HINT(r0, 0x40d, &(0x7f00000000c0)) setsockopt$RDS_CONG_MONITOR(r2, 0x114, 0x6, &(0x7f0000000280), 0x4) ioctl$VHOST_SET_LOG_FD(r2, 0x4004af07, 0x0) ioctl$DRM_IOCTL_IRQ_BUSID(r2, 0xc0106403, 0x0) ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000180)) ioctl$VHOST_SET_VRING_CALL(0xffffffffffffffff, 0x4008af21, &(0x7f0000000380)={0x0, r1}) r3 = fcntl$dupfd(r1, 0x0, r2) setsockopt$IP_VS_SO_SET_STOPDAEMON(r3, 0x0, 0x48c, &(0x7f0000000140)={0x3, 'veth0\x00'}, 0x18) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.cpu/syz1\x00', 0x1ff) openat$snapshot(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/snapshot\x00', 0x0, 0x0) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0xf7fffffffffffffd, 0x2012, r2, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000a40)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x20008000}, 0x24044000) unshare(0x40000000) mount$9p_virtio(&(0x7f00000003c0)='em0%$!,cgroup#\x00', &(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='9p\x00', 0x200000, &(0x7f0000000500)={'trans=virtio,', {[{@afid={'afid', 0x3d, 0x6}}, {@version_L='version=9p2000.L'}, {@cache_none='cache=none'}], [{@subj_role={'subj_role', 0x3d, '/dev/dsp#\x00'}}, {@permit_directio='permit_directio'}, {@measure='measure'}, {@context={'context', 0x3d, 'system_u'}}, {@obj_user={'obj_user'}}, {@dont_hash='dont_hash'}, {@subj_type={'subj_type', 0x3d, '\\eth0('}}, {@fsuuid={'fsuuid', 0x3d, {[0x36, 0x79, 0x0, 0x33, 0x61, 0x62, 0x32], 0x2d, [0x77, 0x32, 0x77, 0x34], 0x2d, [0x7f, 0x67, 0x37, 0x77], 0x2d, [0x0, 0x38, 0x32, 0x33], 0x2d, [0x35, 0x37, 0x7f, 0x7b, 0x37, 0x39, 0x77, 0x33]}}}, {@dont_measure='dont_measure'}]}}) ioctl$VIDIOC_ENUMINPUT(r1, 0xc050561a, &(0x7f0000000300)={0x4, "443b36c4364670c73c2ad26e1952769039650793d10fc72d24ce46e327d06e2f", 0x3, 0x100, 0x4, 0x1057ff, 0x0, 0x6}) 06:21:56 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000040)="2e0000682500817ee45ae087185082cf0f24b0eba06ec400002339e00586f9835b3f0016914879008cd90080e230", 0x2e}], 0x1}, 0x0) 06:21:56 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000040)="2e006c002500817ee45ae087185082cf0f24b0eba06ec400002339e00586f9835b3f0016914879008cd90080e230", 0x2e}], 0x1}, 0x0) 06:21:56 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = creat(&(0x7f0000000000)='./bus\x00', 0x0) getrlimit(0x0, &(0x7f00000000c0)) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x28001}) 06:21:56 executing program 3: mount$9p_tcp(&(0x7f0000000080)='127.0.0.1\x00', 0x0, 0x0, 0x0, 0x0) r0 = syz_open_dev$sndseq(&(0x7f00000000c0)='/dev/snd/seq\x00', 0x0, 0x1000000200000582) r1 = dup2(r0, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000000280)={0x0, 0x0, 0x0, 'queue1\x00'}) write$P9_RLINK(r1, &(0x7f0000000000)={0x7}, 0x2dd) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r1, 0x4040534e, &(0x7f0000000340)={0x66, @time}) [ 420.598917][T16113] IPVS: ftp: loaded support on port[0] = 21 06:21:56 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000040)="2e00006c2500817ee45ae087185082cf0f24b0eba06ec400002339e00586f9835b3f0016914879008cd90080e230", 0x2e}], 0x1}, 0x0) 06:21:56 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) getsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000400), &(0x7f0000000440)=0x8) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, &(0x7f00000019c0)={0x20}, 0x1) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r1, 0x111, 0x5, 0xc3, 0x4) r2 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x1, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r2, 0xc0045516, &(0x7f0000000040)=0x4) arch_prctl$ARCH_GET_CPUID(0x1011) getpgrp(0x0) flock(r0, 0x0) ioctl$BLKRRPART(0xffffffffffffffff, 0x125f, 0x0) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000200)={@mcast2}) fcntl$F_GET_FILE_RW_HINT(r0, 0x40d, 0x0) setsockopt$RDS_CONG_MONITOR(r2, 0x114, 0x6, &(0x7f0000000280), 0x4) ioctl$VHOST_SET_LOG_FD(r2, 0x4004af07, 0x0) ioctl$DRM_IOCTL_IRQ_BUSID(r2, 0xc0106403, &(0x7f0000000100)={0x8875, 0x800, 0x8000, 0xc2}) ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000180)) ioctl$VHOST_SET_VRING_CALL(0xffffffffffffffff, 0x4008af21, &(0x7f0000000380)={0x0, r1}) r3 = fcntl$dupfd(r1, 0x0, r2) setsockopt$IP_VS_SO_SET_STOPDAEMON(r3, 0x0, 0x48c, &(0x7f0000000140)={0x3, 'veth0\x00'}, 0x18) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.cpu/syz1\x00', 0x1ff) openat$snapshot(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/snapshot\x00', 0x0, 0x0) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0xf7fffffffffffffd, 0x2012, r2, 0x0) unshare(0x40000000) mount$9p_virtio(&(0x7f00000003c0)='em0%$!,cgroup#\x00', &(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='9p\x00', 0x200000, &(0x7f0000000500)={'trans=virtio,', {[{@afid={'afid', 0x3d, 0x6}}, {@version_L='version=9p2000.L'}, {@cache_none='cache=none'}], [{@subj_role={'subj_role', 0x3d, '/dev/dsp#\x00'}}, {@permit_directio='permit_directio'}, {@measure='measure'}, {@context={'context', 0x3d, 'system_u'}}, {@obj_user={'obj_user'}}, {@dont_hash='dont_hash'}, {@subj_type={'subj_type', 0x3d, '\\eth0('}}, {@fsuuid={'fsuuid', 0x3d, {[0x36, 0x79, 0x0, 0x33, 0x61, 0x62, 0x32], 0x2d, [0x77, 0x32, 0x77, 0x34], 0x2d, [0x7f, 0x67, 0x37, 0x77], 0x2d, [0x0, 0x38, 0x32, 0x33], 0x2d, [0x35, 0x37, 0x7f, 0x7b, 0x37, 0x39, 0x77, 0x33]}}}, {@dont_measure='dont_measure'}]}}) ioctl$VIDIOC_ENUMINPUT(r1, 0xc050561a, &(0x7f0000000300)={0x4, "443b36c4364670c73c2ad26e1952769039650793d10fc72d24ce46e327d06e2f", 0x3, 0x100, 0x4, 0x1057ff, 0x0, 0x6}) 06:21:56 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000040)="2e0074002500817ee45ae087185082cf0f24b0eba06ec400002339e00586f9835b3f0016914879008cd90080e230", 0x2e}], 0x1}, 0x0) 06:21:56 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = creat(&(0x7f0000000000)='./bus\x00', 0x0) getrlimit(0x0, &(0x7f00000000c0)) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x283e9}) [ 421.039335][T16137] IPVS: ftp: loaded support on port[0] = 21 06:21:56 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000040)="2e0000742500817ee45ae087185082cf0f24b0eba06ec400002339e00586f9835b3f0016914879008cd90080e230", 0x2e}], 0x1}, 0x0) 06:21:56 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000040)="2e00007a2500817ee45ae087185082cf0f24b0eba06ec400002339e00586f9835b3f0016914879008cd90080e230", 0x2e}], 0x1}, 0x0) 06:21:56 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000040)="2e007a002500817ee45ae087185082cf0f24b0eba06ec400002339e00586f9835b3f0016914879008cd90080e230", 0x2e}], 0x1}, 0x0) 06:21:57 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) getsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000400), &(0x7f0000000440)=0x8) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, &(0x7f00000019c0)={0x20}, 0x1) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r1, 0x111, 0x5, 0xc3, 0x4) r2 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x1, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r2, 0xc0045516, &(0x7f0000000040)=0x4) arch_prctl$ARCH_GET_CPUID(0x1011) getpgrp(0x0) flock(r0, 0x0) ioctl$BLKRRPART(0xffffffffffffffff, 0x125f, 0x0) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000200)={@mcast2}) fcntl$F_GET_FILE_RW_HINT(r0, 0x40d, &(0x7f00000000c0)) setsockopt$RDS_CONG_MONITOR(r2, 0x114, 0x6, &(0x7f0000000280), 0x4) ioctl$VHOST_SET_LOG_FD(r2, 0x4004af07, 0x0) ioctl$DRM_IOCTL_IRQ_BUSID(r2, 0xc0106403, 0x0) ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000180)) ioctl$VHOST_SET_VRING_CALL(0xffffffffffffffff, 0x4008af21, &(0x7f0000000380)={0x0, r1}) r3 = fcntl$dupfd(r1, 0x0, r2) setsockopt$IP_VS_SO_SET_STOPDAEMON(r3, 0x0, 0x48c, &(0x7f0000000140)={0x3, 'veth0\x00'}, 0x18) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.cpu/syz1\x00', 0x1ff) openat$snapshot(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/snapshot\x00', 0x0, 0x0) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0xf7fffffffffffffd, 0x2012, r2, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000a40)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x20008000}, 0x24044000) unshare(0x40000000) mount$9p_virtio(&(0x7f00000003c0)='em0%$!,cgroup#\x00', &(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='9p\x00', 0x200000, &(0x7f0000000500)={'trans=virtio,', {[{@afid={'afid', 0x3d, 0x6}}, {@version_L='version=9p2000.L'}, {@cache_none='cache=none'}], [{@subj_role={'subj_role', 0x3d, '/dev/dsp#\x00'}}, {@permit_directio='permit_directio'}, {@measure='measure'}, {@context={'context', 0x3d, 'system_u'}}, {@obj_user={'obj_user'}}, {@dont_hash='dont_hash'}, {@subj_type={'subj_type', 0x3d, '\\eth0('}}, {@fsuuid={'fsuuid', 0x3d, {[0x36, 0x79, 0x0, 0x33, 0x61, 0x62, 0x32], 0x2d, [0x77, 0x32, 0x77, 0x34], 0x2d, [0x7f, 0x67, 0x37, 0x77], 0x2d, [0x0, 0x38, 0x32, 0x33], 0x2d, [0x35, 0x37, 0x7f, 0x7b, 0x37, 0x39, 0x77, 0x33]}}}, {@dont_measure='dont_measure'}]}}) ioctl$VIDIOC_ENUMINPUT(r1, 0xc050561a, &(0x7f0000000300)={0x4, "443b36c4364670c73c2ad26e1952769039650793d10fc72d24ce46e327d06e2f", 0x3, 0x100, 0x4, 0x1057ff, 0x0, 0x6}) 06:21:57 executing program 3: mount$9p_tcp(&(0x7f0000000340)='127.0.0.1\x00', 0x0, 0x0, 0x0, 0x0) r0 = syz_open_dev$sndseq(&(0x7f00000000c0)='/dev/snd/seq\x00', 0x0, 0x1000000200000582) r1 = dup2(r0, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000000280)={0x0, 0x0, 0x0, 'queue1\x00'}) write$P9_RLINK(r1, &(0x7f0000000000)={0x7}, 0x2dd) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r1, 0x4040534e, &(0x7f0000000340)={0x66, @time}) 06:21:57 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000040)="2e0000f02500817ee45ae087185082cf0f24b0eba06ec400002339e00586f9835b3f0016914879008cd90080e230", 0x2e}], 0x1}, 0x0) 06:21:57 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = creat(&(0x7f0000000000)='./bus\x00', 0x0) getrlimit(0x0, &(0x7f00000000c0)) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x2a480}) 06:21:57 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000040)="2e017c002500817ee45ae087185082cf0f24b0eba06ec400002339e00586f9835b3f0016914879008cd90080e230", 0x2e}], 0x1}, 0x0) 06:21:57 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000040)="2e00f0002500817ee45ae087185082cf0f24b0eba06ec400002339e00586f9835b3f0016914879008cd90080e230", 0x2e}], 0x1}, 0x0) 06:21:57 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) getsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000400), &(0x7f0000000440)=0x8) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, &(0x7f00000019c0)={0x20}, 0x1) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r1, 0x111, 0x5, 0xc3, 0x4) r2 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x1, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r2, 0xc0045516, &(0x7f0000000040)=0x4) arch_prctl$ARCH_GET_CPUID(0x1011) getpgrp(0x0) flock(r0, 0x0) ioctl$BLKRRPART(0xffffffffffffffff, 0x125f, 0x0) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000200)={@mcast2}) fcntl$F_GET_FILE_RW_HINT(r0, 0x40d, 0x0) setsockopt$RDS_CONG_MONITOR(r2, 0x114, 0x6, &(0x7f0000000280), 0x4) ioctl$VHOST_SET_LOG_FD(r2, 0x4004af07, 0x0) ioctl$DRM_IOCTL_IRQ_BUSID(r2, 0xc0106403, &(0x7f0000000100)={0x8875, 0x800, 0x8000, 0xc2}) ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000180)) ioctl$VHOST_SET_VRING_CALL(0xffffffffffffffff, 0x4008af21, &(0x7f0000000380)={0x0, r1}) r3 = fcntl$dupfd(r1, 0x0, r2) setsockopt$IP_VS_SO_SET_STOPDAEMON(r3, 0x0, 0x48c, &(0x7f0000000140)={0x3, 'veth0\x00'}, 0x18) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.cpu/syz1\x00', 0x1ff) openat$snapshot(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/snapshot\x00', 0x0, 0x0) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0xf7fffffffffffffd, 0x2012, r2, 0x0) unshare(0x40000000) mount$9p_virtio(&(0x7f00000003c0)='em0%$!,cgroup#\x00', &(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='9p\x00', 0x200000, &(0x7f0000000500)={'trans=virtio,', {[{@afid={'afid', 0x3d, 0x6}}, {@version_L='version=9p2000.L'}, {@cache_none='cache=none'}], [{@subj_role={'subj_role', 0x3d, '/dev/dsp#\x00'}}, {@permit_directio='permit_directio'}, {@measure='measure'}, {@context={'context', 0x3d, 'system_u'}}, {@obj_user={'obj_user'}}, {@dont_hash='dont_hash'}, {@subj_type={'subj_type', 0x3d, '\\eth0('}}, {@fsuuid={'fsuuid', 0x3d, {[0x36, 0x79, 0x0, 0x33, 0x61, 0x62, 0x32], 0x2d, [0x77, 0x32, 0x77, 0x34], 0x2d, [0x7f, 0x67, 0x37, 0x77], 0x2d, [0x0, 0x38, 0x32, 0x33], 0x2d, [0x35, 0x37, 0x7f, 0x7b, 0x37, 0x39, 0x77, 0x33]}}}, {@dont_measure='dont_measure'}]}}) ioctl$VIDIOC_ENUMINPUT(r1, 0xc050561a, &(0x7f0000000300)={0x4, "443b36c4364670c73c2ad26e1952769039650793d10fc72d24ce46e327d06e2f", 0x3, 0x100, 0x4, 0x1057ff, 0x0, 0x6}) [ 421.569266][T16178] IPVS: ftp: loaded support on port[0] = 21 06:21:57 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000040)="2e0000000f00817ee45ae087185082cf0f24b0eba06ec400002339e00586f9835b3f0016914879008cd90080e230", 0x2e}], 0x1}, 0x0) 06:21:57 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000040)="2e0000003f00817ee45ae087185082cf0f24b0eba06ec400002339e00586f9835b3f0016914879008cd90080e230", 0x2e}], 0x1}, 0x0) 06:21:57 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = creat(&(0x7f0000000000)='./bus\x00', 0x0) getrlimit(0x0, &(0x7f00000000c0)) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x2b600}) 06:21:57 executing program 3: r0 = syz_open_dev$mice(&(0x7f0000000240)='/dev/input/mice\x00', 0x0, 0x201) ioctl$FS_IOC_MEASURE_VERITY(r0, 0xc0046686, &(0x7f0000000180)={0x3, 0x58, "273fd033903b150330552c0f71cdf945aae670544b3b2dd81fb65a249fe3e79e8768af910cffcd68b6e7f6e52739267596e1342b500cc97a2ab4b3c5acc15f6117412d82ad44dc30b4f240d527c73ab8f59a83f365249024"}) mount$9p_tcp(&(0x7f0000000340)='127.0.0.1\x00', 0x0, 0x0, 0x0, 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000000140)='/dev/snd/seq\x00', 0x0, 0x80000) r2 = dup2(r1, r1) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r2, 0xc08c5332, &(0x7f0000000280)={0x0, 0x0, 0x0, 'queue1\x00'}) getsockopt$inet6_tcp_buf(r2, 0x6, 0x1e, &(0x7f00000003c0)=""/4096, &(0x7f0000000000)=0x1000) syz_open_dev$admmidi(&(0x7f0000000080)='/dev/admmidi#\x00', 0x2ff4, 0x4300) write$P9_RLINK(r2, &(0x7f0000000040)={0xffffffffffffffc8}, 0xfffffffffffffe2c) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r2, 0x4040534e, &(0x7f0000000340)={0x66, @time}) [ 421.795275][T16185] IPVS: ftp: loaded support on port[0] = 21 06:21:57 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000040)="2e0000006800817ee45ae087185082cf0f24b0eba06ec400002339e00586f9835b3f0016914879008cd90080e230", 0x2e}], 0x1}, 0x0) 06:21:57 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) getsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000400), &(0x7f0000000440)=0x8) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, &(0x7f00000019c0)={0x20}, 0x1) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r1, 0x111, 0x5, 0xc3, 0x4) r2 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x1, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r2, 0xc0045516, &(0x7f0000000040)=0x4) arch_prctl$ARCH_GET_CPUID(0x1011) getpgrp(0x0) flock(r0, 0x0) ioctl$BLKRRPART(0xffffffffffffffff, 0x125f, 0x0) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000200)={@mcast2}) fcntl$F_GET_FILE_RW_HINT(r0, 0x40d, &(0x7f00000000c0)) setsockopt$RDS_CONG_MONITOR(r2, 0x114, 0x6, &(0x7f0000000280), 0x4) ioctl$VHOST_SET_LOG_FD(r2, 0x4004af07, 0x0) ioctl$DRM_IOCTL_IRQ_BUSID(r2, 0xc0106403, 0x0) ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000180)) ioctl$VHOST_SET_VRING_CALL(0xffffffffffffffff, 0x4008af21, &(0x7f0000000380)={0x0, r1}) r3 = fcntl$dupfd(r1, 0x0, r2) setsockopt$IP_VS_SO_SET_STOPDAEMON(r3, 0x0, 0x48c, &(0x7f0000000140)={0x3, 'veth0\x00'}, 0x18) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.cpu/syz1\x00', 0x1ff) openat$snapshot(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/snapshot\x00', 0x0, 0x0) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0xf7fffffffffffffd, 0x2012, r2, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000a40)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x20008000}, 0x24044000) unshare(0x40000000) mount$9p_virtio(&(0x7f00000003c0)='em0%$!,cgroup#\x00', &(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='9p\x00', 0x200000, &(0x7f0000000500)={'trans=virtio,', {[{@afid={'afid', 0x3d, 0x6}}, {@version_L='version=9p2000.L'}, {@cache_none='cache=none'}], [{@subj_role={'subj_role', 0x3d, '/dev/dsp#\x00'}}, {@permit_directio='permit_directio'}, {@measure='measure'}, {@context={'context', 0x3d, 'system_u'}}, {@obj_user={'obj_user'}}, {@dont_hash='dont_hash'}, {@subj_type={'subj_type', 0x3d, '\\eth0('}}, {@fsuuid={'fsuuid', 0x3d, {[0x36, 0x79, 0x0, 0x33, 0x61, 0x62, 0x32], 0x2d, [0x77, 0x32, 0x77, 0x34], 0x2d, [0x7f, 0x67, 0x37, 0x77], 0x2d, [0x0, 0x38, 0x32, 0x33], 0x2d, [0x35, 0x37, 0x7f, 0x7b, 0x37, 0x39, 0x77, 0x33]}}}, {@dont_measure='dont_measure'}]}}) ioctl$VIDIOC_ENUMINPUT(r1, 0xc050561a, &(0x7f0000000300)={0x4, "443b36c4364670c73c2ad26e1952769039650793d10fc72d24ce46e327d06e2f", 0x3, 0x100, 0x4, 0x1057ff, 0x0, 0x6}) 06:21:57 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = creat(&(0x7f0000000000)='./bus\x00', 0x0) getrlimit(0x0, &(0x7f00000000c0)) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x35803}) 06:21:57 executing program 3: mount$9p_tcp(&(0x7f0000000340)='127.0.0.1\x00', 0x0, 0x0, 0x0, 0x0) r0 = syz_open_dev$sndseq(&(0x7f00000000c0)='/dev/snd/seq\x00', 0x0, 0x1000000200000582) r1 = dup2(r0, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000000280)={0x0, 0x0, 0x0, 'queue1\x00'}) prctl$PR_GET_TID_ADDRESS(0x28, &(0x7f0000000040)) write$P9_RLINK(r1, &(0x7f0000000000)={0x7}, 0x2dd) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r1, 0x4040534e, &(0x7f0000000340)={0x66, @time}) 06:21:57 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000040)="2e0000022500817ee45ae087185082cf0f24b0eba06ec400002339e00586f9835b3f0016914879008cd90080e230", 0x2e}], 0x1}, 0x0) 06:21:57 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000040)="2e0002002500817ee45ae087185082cf0f24b0eba06ec400002339e00586f9835b3f0016914879008cd90080e230", 0x2e}], 0x1}, 0x0) 06:21:57 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) getsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000400), &(0x7f0000000440)=0x8) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, &(0x7f00000019c0)={0x20}, 0x1) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r1, 0x111, 0x5, 0xc3, 0x4) r2 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x1, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r2, 0xc0045516, &(0x7f0000000040)=0x4) arch_prctl$ARCH_GET_CPUID(0x1011) getpgrp(0x0) flock(r0, 0x0) ioctl$BLKRRPART(0xffffffffffffffff, 0x125f, 0x0) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000200)={@mcast2}) fcntl$F_GET_FILE_RW_HINT(r0, 0x40d, 0x0) setsockopt$RDS_CONG_MONITOR(r2, 0x114, 0x6, &(0x7f0000000280), 0x4) ioctl$VHOST_SET_LOG_FD(r2, 0x4004af07, 0x0) ioctl$DRM_IOCTL_IRQ_BUSID(r2, 0xc0106403, &(0x7f0000000100)={0x8875, 0x800, 0x8000, 0xc2}) ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000180)) ioctl$VHOST_SET_VRING_CALL(0xffffffffffffffff, 0x4008af21, &(0x7f0000000380)={0x0, r1}) r3 = fcntl$dupfd(r1, 0x0, r2) setsockopt$IP_VS_SO_SET_STOPDAEMON(r3, 0x0, 0x48c, &(0x7f0000000140)={0x3, 'veth0\x00'}, 0x18) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.cpu/syz1\x00', 0x1ff) openat$snapshot(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/snapshot\x00', 0x0, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000a40)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x20008000}, 0x24044000) unshare(0x40000000) mount$9p_virtio(&(0x7f00000003c0)='em0%$!,cgroup#\x00', &(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='9p\x00', 0x200000, &(0x7f0000000500)={'trans=virtio,', {[{@afid={'afid', 0x3d, 0x6}}, {@version_L='version=9p2000.L'}, {@cache_none='cache=none'}], [{@subj_role={'subj_role', 0x3d, '/dev/dsp#\x00'}}, {@permit_directio='permit_directio'}, {@measure='measure'}, {@context={'context', 0x3d, 'system_u'}}, {@obj_user={'obj_user'}}, {@dont_hash='dont_hash'}, {@subj_type={'subj_type', 0x3d, '\\eth0('}}, {@fsuuid={'fsuuid', 0x3d, {[0x36, 0x79, 0x0, 0x33, 0x61, 0x62, 0x32], 0x2d, [0x77, 0x32, 0x77, 0x34], 0x2d, [0x7f, 0x67, 0x37, 0x77], 0x2d, [0x0, 0x38, 0x32, 0x33], 0x2d, [0x35, 0x37, 0x7f, 0x7b, 0x37, 0x39, 0x77, 0x33]}}}, {@dont_measure='dont_measure'}]}}) ioctl$VIDIOC_ENUMINPUT(r1, 0xc050561a, &(0x7f0000000300)={0x4, "443b36c4364670c73c2ad26e1952769039650793d10fc72d24ce46e327d06e2f", 0x3, 0x100, 0x4, 0x1057ff, 0x0, 0x6}) 06:21:58 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = creat(&(0x7f0000000000)='./bus\x00', 0x0) getrlimit(0x0, &(0x7f00000000c0)) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x38000}) [ 422.432817][T16224] IPVS: ftp: loaded support on port[0] = 21 06:21:58 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000040)="2e0000032500817ee45ae087185082cf0f24b0eba06ec400002339e00586f9835b3f0016914879008cd90080e230", 0x2e}], 0x1}, 0x0) 06:21:58 executing program 3: mount$9p_tcp(&(0x7f0000000340)='127.0.0.1\x00', 0x0, 0x0, 0x0, 0x0) syz_open_dev$sndseq(&(0x7f00000000c0)='/dev/snd/seq\x00', 0x0, 0x1000000200000582) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(0xffffffffffffffff, 0xc08c5332, &(0x7f0000000280)={0x0, 0x0, 0x0, 'queue1\x00'}) write$P9_RLINK(0xffffffffffffffff, &(0x7f0000000000)={0x7}, 0x2dd) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0}, &(0x7f0000000080)=0xc) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f00000003c0)={0x0, 0x44, "fd4e94beb63e95110ef1b4060e11a55edfbfe9f786b196cd2890ea8cdb6f840e60e9f2fc01f9bd266a6f399a9d22832f1295795afd2616fb0c5cafec6e7be423803155e1"}, &(0x7f0000000440)=0x4c) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000480)={r1, @in6={{0xa, 0x4e21, 0x9, @dev={0xfe, 0x80, [], 0x17}, 0x6}}, 0x7ff, 0x9}, 0x90) getresgid(&(0x7f0000000100)=0x0, &(0x7f0000000140), &(0x7f0000000180)) write$P9_RGETATTR(0xffffffffffffffff, &(0x7f00000001c0)={0xa0, 0x19, 0x2, {0x400, {0x0, 0x3, 0x7}, 0x8, r0, r2, 0x101, 0x2, 0x9, 0x3, 0xf9, 0x10000, 0x7, 0x3c63, 0x3, 0x4, 0x200, 0xfffffffffffffe00, 0xffffffff, 0x92, 0x6}}, 0xa0) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x4040534e, &(0x7f0000000340)={0x66, @time}) 06:21:58 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = creat(&(0x7f0000000000)='./bus\x00', 0x0) getrlimit(0x0, &(0x7f00000000c0)) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x38001}) 06:21:58 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000040)="2e0000042500817ee45ae087185082cf0f24b0eba06ec400002339e00586f9835b3f0016914879008cd90080e230", 0x2e}], 0x1}, 0x0) 06:21:58 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000040)="2e0003002500817ee45ae087185082cf0f24b0eba06ec400002339e00586f9835b3f0016914879008cd90080e230", 0x2e}], 0x1}, 0x0) 06:21:58 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) getsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000400), &(0x7f0000000440)=0x8) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, &(0x7f00000019c0)={0x20}, 0x1) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r1, 0x111, 0x5, 0xc3, 0x4) r2 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x1, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r2, 0xc0045516, &(0x7f0000000040)=0x4) arch_prctl$ARCH_GET_CPUID(0x1011) getpgrp(0x0) flock(r0, 0x0) ioctl$BLKRRPART(0xffffffffffffffff, 0x125f, 0x0) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000200)={@mcast2}) fcntl$F_GET_FILE_RW_HINT(r0, 0x40d, &(0x7f00000000c0)) setsockopt$RDS_CONG_MONITOR(r2, 0x114, 0x6, &(0x7f0000000280), 0x4) ioctl$VHOST_SET_LOG_FD(r2, 0x4004af07, 0x0) ioctl$DRM_IOCTL_IRQ_BUSID(r2, 0xc0106403, &(0x7f0000000100)={0x0, 0x800, 0x8000, 0xc2}) ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000180)) ioctl$VHOST_SET_VRING_CALL(0xffffffffffffffff, 0x4008af21, &(0x7f0000000380)={0x0, r1}) r3 = fcntl$dupfd(r1, 0x0, r2) setsockopt$IP_VS_SO_SET_STOPDAEMON(r3, 0x0, 0x48c, &(0x7f0000000140)={0x3, 'veth0\x00'}, 0x18) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.cpu/syz1\x00', 0x1ff) openat$snapshot(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/snapshot\x00', 0x0, 0x0) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0xf7fffffffffffffd, 0x2012, r2, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000a40)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x20008000}, 0x24044000) unshare(0x40000000) mount$9p_virtio(&(0x7f00000003c0)='em0%$!,cgroup#\x00', &(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='9p\x00', 0x200000, &(0x7f0000000500)={'trans=virtio,', {[{@afid={'afid', 0x3d, 0x6}}, {@version_L='version=9p2000.L'}, {@cache_none='cache=none'}], [{@subj_role={'subj_role', 0x3d, '/dev/dsp#\x00'}}, {@permit_directio='permit_directio'}, {@measure='measure'}, {@context={'context', 0x3d, 'system_u'}}, {@obj_user={'obj_user'}}, {@dont_hash='dont_hash'}, {@subj_type={'subj_type', 0x3d, '\\eth0('}}, {@fsuuid={'fsuuid', 0x3d, {[0x36, 0x79, 0x0, 0x33, 0x61, 0x62, 0x32], 0x2d, [0x77, 0x32, 0x77, 0x34], 0x2d, [0x7f, 0x67, 0x37, 0x77], 0x2d, [0x0, 0x38, 0x32, 0x33], 0x2d, [0x35, 0x37, 0x7f, 0x7b, 0x37, 0x39, 0x77, 0x33]}}}, {@dont_measure='dont_measure'}]}}) ioctl$VIDIOC_ENUMINPUT(r1, 0xc050561a, &(0x7f0000000300)={0x4, "443b36c4364670c73c2ad26e1952769039650793d10fc72d24ce46e327d06e2f", 0x3, 0x100, 0x4, 0x1057ff, 0x0, 0x6}) 06:21:58 executing program 3: mount$9p_tcp(&(0x7f0000000340)='127.0.0.1\x00', 0x0, 0x0, 0x0, 0x0) r0 = syz_open_dev$sndseq(&(0x7f00000000c0)='/dev/snd/seq\x00', 0x0, 0x1000000200000582) r1 = dup2(r0, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000000280)={0x0, 0x0, 0x0, 'queue1\x00'}) write$P9_RLINK(r1, &(0x7f0000000000)={0x7}, 0x2dd) ioctl$SNDRV_SEQ_IOCTL_PVERSION(r1, 0x80045300, &(0x7f0000000040)) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r1, 0x4040534e, &(0x7f0000000340)={0x66, @time}) [ 422.955456][T16225] IPVS: ftp: loaded support on port[0] = 21 06:21:58 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000040)="2e0000052500817ee45ae087185082cf0f24b0eba06ec400002339e00586f9835b3f0016914879008cd90080e230", 0x2e}], 0x1}, 0x0) 06:21:58 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000040)="2e0004002500817ee45ae087185082cf0f24b0eba06ec400002339e00586f9835b3f0016914879008cd90080e230", 0x2e}], 0x1}, 0x0) 06:21:58 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = creat(&(0x7f0000000000)='./bus\x00', 0x0) getrlimit(0x0, &(0x7f00000000c0)) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x38002}) [ 423.298810][T16267] IPVS: ftp: loaded support on port[0] = 21 06:22:01 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) getsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000400), &(0x7f0000000440)=0x8) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, &(0x7f00000019c0)={0x20}, 0x1) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r1, 0x111, 0x5, 0xc3, 0x4) r2 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x1, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r2, 0xc0045516, &(0x7f0000000040)=0x4) arch_prctl$ARCH_GET_CPUID(0x1011) getpgrp(0x0) flock(r0, 0x0) ioctl$BLKRRPART(0xffffffffffffffff, 0x125f, 0x0) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000200)={@mcast2}) fcntl$F_GET_FILE_RW_HINT(r0, 0x40d, 0x0) setsockopt$RDS_CONG_MONITOR(r2, 0x114, 0x6, &(0x7f0000000280), 0x4) ioctl$VHOST_SET_LOG_FD(r2, 0x4004af07, 0x0) ioctl$DRM_IOCTL_IRQ_BUSID(r2, 0xc0106403, &(0x7f0000000100)={0x8875, 0x800, 0x8000, 0xc2}) ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000180)) ioctl$VHOST_SET_VRING_CALL(0xffffffffffffffff, 0x4008af21, &(0x7f0000000380)={0x0, r1}) r3 = fcntl$dupfd(r1, 0x0, r2) setsockopt$IP_VS_SO_SET_STOPDAEMON(r3, 0x0, 0x48c, &(0x7f0000000140)={0x3, 'veth0\x00'}, 0x18) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.cpu/syz1\x00', 0x1ff) openat$snapshot(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/snapshot\x00', 0x0, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000a40)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x20008000}, 0x24044000) unshare(0x40000000) mount$9p_virtio(&(0x7f00000003c0)='em0%$!,cgroup#\x00', &(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='9p\x00', 0x200000, &(0x7f0000000500)={'trans=virtio,', {[{@afid={'afid', 0x3d, 0x6}}, {@version_L='version=9p2000.L'}, {@cache_none='cache=none'}], [{@subj_role={'subj_role', 0x3d, '/dev/dsp#\x00'}}, {@permit_directio='permit_directio'}, {@measure='measure'}, {@context={'context', 0x3d, 'system_u'}}, {@obj_user={'obj_user'}}, {@dont_hash='dont_hash'}, {@subj_type={'subj_type', 0x3d, '\\eth0('}}, {@fsuuid={'fsuuid', 0x3d, {[0x36, 0x79, 0x0, 0x33, 0x61, 0x62, 0x32], 0x2d, [0x77, 0x32, 0x77, 0x34], 0x2d, [0x7f, 0x67, 0x37, 0x77], 0x2d, [0x0, 0x38, 0x32, 0x33], 0x2d, [0x35, 0x37, 0x7f, 0x7b, 0x37, 0x39, 0x77, 0x33]}}}, {@dont_measure='dont_measure'}]}}) ioctl$VIDIOC_ENUMINPUT(r1, 0xc050561a, &(0x7f0000000300)={0x4, "443b36c4364670c73c2ad26e1952769039650793d10fc72d24ce46e327d06e2f", 0x3, 0x100, 0x4, 0x1057ff, 0x0, 0x6}) 06:22:01 executing program 3: mount$9p_tcp(&(0x7f0000000340)='127.0.0.1\x00', 0x0, 0x0, 0x0, 0x0) r0 = syz_open_dev$sndseq(&(0x7f00000000c0)='/dev/snd/seq\x00', 0x0, 0x1000000200000582) r1 = dup2(r0, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r0, 0xc08c5332, &(0x7f0000000100)={0x1, 0x0, 0x0, 'queue1\x00'}) write$P9_RLINK(r1, &(0x7f0000000000)={0x7}, 0x2dd) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_CLIENT(r0, 0xc04c5349, &(0x7f0000000040)={0x9f, 0x81, 0x8001}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r1, 0x4040534e, &(0x7f0000000340)={0x66, @time}) 06:22:01 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = creat(&(0x7f0000000000)='./bus\x00', 0x0) getrlimit(0x0, &(0x7f00000000c0)) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x48000}) 06:22:01 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000040)="2e0005002500817ee45ae087185082cf0f24b0eba06ec400002339e00586f9835b3f0016914879008cd90080e230", 0x2e}], 0x1}, 0x0) 06:22:01 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000040)="2e0000062500817ee45ae087185082cf0f24b0eba06ec400002339e00586f9835b3f0016914879008cd90080e230", 0x2e}], 0x1}, 0x0) 06:22:01 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) getsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000400), &(0x7f0000000440)=0x8) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, &(0x7f00000019c0)={0x20}, 0x1) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r1, 0x111, 0x5, 0xc3, 0x4) r2 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x1, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r2, 0xc0045516, &(0x7f0000000040)=0x4) arch_prctl$ARCH_GET_CPUID(0x1011) getpgrp(0x0) flock(r0, 0x0) ioctl$BLKRRPART(0xffffffffffffffff, 0x125f, 0x0) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000200)={@mcast2}) fcntl$F_GET_FILE_RW_HINT(r0, 0x40d, &(0x7f00000000c0)) setsockopt$RDS_CONG_MONITOR(r2, 0x114, 0x6, &(0x7f0000000280), 0x4) ioctl$VHOST_SET_LOG_FD(r2, 0x4004af07, 0x0) ioctl$DRM_IOCTL_IRQ_BUSID(r2, 0xc0106403, &(0x7f0000000100)={0x0, 0x800, 0x8000, 0xc2}) ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000180)) ioctl$VHOST_SET_VRING_CALL(0xffffffffffffffff, 0x4008af21, &(0x7f0000000380)={0x0, r1}) r3 = fcntl$dupfd(r1, 0x0, r2) setsockopt$IP_VS_SO_SET_STOPDAEMON(r3, 0x0, 0x48c, &(0x7f0000000140)={0x3, 'veth0\x00'}, 0x18) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.cpu/syz1\x00', 0x1ff) openat$snapshot(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/snapshot\x00', 0x0, 0x0) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0xf7fffffffffffffd, 0x2012, r2, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000a40)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x20008000}, 0x24044000) unshare(0x40000000) mount$9p_virtio(&(0x7f00000003c0)='em0%$!,cgroup#\x00', &(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='9p\x00', 0x200000, &(0x7f0000000500)={'trans=virtio,', {[{@afid={'afid', 0x3d, 0x6}}, {@version_L='version=9p2000.L'}, {@cache_none='cache=none'}], [{@subj_role={'subj_role', 0x3d, '/dev/dsp#\x00'}}, {@permit_directio='permit_directio'}, {@measure='measure'}, {@context={'context', 0x3d, 'system_u'}}, {@obj_user={'obj_user'}}, {@dont_hash='dont_hash'}, {@subj_type={'subj_type', 0x3d, '\\eth0('}}, {@fsuuid={'fsuuid', 0x3d, {[0x36, 0x79, 0x0, 0x33, 0x61, 0x62, 0x32], 0x2d, [0x77, 0x32, 0x77, 0x34], 0x2d, [0x7f, 0x67, 0x37, 0x77], 0x2d, [0x0, 0x38, 0x32, 0x33], 0x2d, [0x35, 0x37, 0x7f, 0x7b, 0x37, 0x39, 0x77, 0x33]}}}, {@dont_measure='dont_measure'}]}}) ioctl$VIDIOC_ENUMINPUT(r1, 0xc050561a, &(0x7f0000000300)={0x4, "443b36c4364670c73c2ad26e1952769039650793d10fc72d24ce46e327d06e2f", 0x3, 0x100, 0x4, 0x1057ff, 0x0, 0x6}) [ 425.686997][T16293] IPVS: ftp: loaded support on port[0] = 21 [ 425.833823][T16287] IPVS: ftp: loaded support on port[0] = 21 06:22:02 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000040)="2e0006002500817ee45ae087185082cf0f24b0eba06ec400002339e00586f9835b3f0016914879008cd90080e230", 0x2e}], 0x1}, 0x0) 06:22:02 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = creat(&(0x7f0000000000)='./bus\x00', 0x0) getrlimit(0x0, &(0x7f00000000c0)) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x48001}) 06:22:02 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000040)="2e0000072500817ee45ae087185082cf0f24b0eba06ec400002339e00586f9835b3f0016914879008cd90080e230", 0x2e}], 0x1}, 0x0) 06:22:02 executing program 3: mount$9p_tcp(&(0x7f0000000340)='127.0.0.1\x00', 0x0, 0x0, 0x0, 0x0) r0 = syz_open_dev$sndseq(&(0x7f00000000c0)='/dev/snd/seq\x00', 0x0, 0x1000000200000582) r1 = dup2(r0, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000000280)={0x0, 0x0, 0x0, 'queue1\x00'}) write$P9_RLINK(r1, &(0x7f0000000000)={0x7}, 0x2dd) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r1, 0x4040534e, &(0x7f0000000340)={0x66, @time}) 06:22:02 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) getsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000400), &(0x7f0000000440)=0x8) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, &(0x7f00000019c0)={0x20}, 0x1) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r1, 0x111, 0x5, 0xc3, 0x4) r2 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x1, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r2, 0xc0045516, &(0x7f0000000040)=0x4) arch_prctl$ARCH_GET_CPUID(0x1011) getpgrp(0x0) flock(r0, 0x0) ioctl$BLKRRPART(0xffffffffffffffff, 0x125f, 0x0) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000200)={@mcast2}) fcntl$F_GET_FILE_RW_HINT(r0, 0x40d, &(0x7f00000000c0)) setsockopt$RDS_CONG_MONITOR(r2, 0x114, 0x6, &(0x7f0000000280), 0x4) ioctl$VHOST_SET_LOG_FD(r2, 0x4004af07, 0x0) ioctl$DRM_IOCTL_IRQ_BUSID(r2, 0xc0106403, &(0x7f0000000100)={0x0, 0x800, 0x8000, 0xc2}) ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000180)) ioctl$VHOST_SET_VRING_CALL(0xffffffffffffffff, 0x4008af21, &(0x7f0000000380)={0x0, r1}) r3 = fcntl$dupfd(r1, 0x0, r2) setsockopt$IP_VS_SO_SET_STOPDAEMON(r3, 0x0, 0x48c, &(0x7f0000000140)={0x3, 'veth0\x00'}, 0x18) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.cpu/syz1\x00', 0x1ff) openat$snapshot(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/snapshot\x00', 0x0, 0x0) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0xf7fffffffffffffd, 0x2012, r2, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000a40)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x20008000}, 0x24044000) unshare(0x40000000) mount$9p_virtio(&(0x7f00000003c0)='em0%$!,cgroup#\x00', &(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='9p\x00', 0x200000, &(0x7f0000000500)={'trans=virtio,', {[{@afid={'afid', 0x3d, 0x6}}, {@version_L='version=9p2000.L'}, {@cache_none='cache=none'}], [{@subj_role={'subj_role', 0x3d, '/dev/dsp#\x00'}}, {@permit_directio='permit_directio'}, {@measure='measure'}, {@context={'context', 0x3d, 'system_u'}}, {@obj_user={'obj_user'}}, {@dont_hash='dont_hash'}, {@subj_type={'subj_type', 0x3d, '\\eth0('}}, {@fsuuid={'fsuuid', 0x3d, {[0x36, 0x79, 0x0, 0x33, 0x61, 0x62, 0x32], 0x2d, [0x77, 0x32, 0x77, 0x34], 0x2d, [0x7f, 0x67, 0x37, 0x77], 0x2d, [0x0, 0x38, 0x32, 0x33], 0x2d, [0x35, 0x37, 0x7f, 0x7b, 0x37, 0x39, 0x77, 0x33]}}}, {@dont_measure='dont_measure'}]}}) ioctl$VIDIOC_ENUMINPUT(r1, 0xc050561a, &(0x7f0000000300)={0x4, "443b36c4364670c73c2ad26e1952769039650793d10fc72d24ce46e327d06e2f", 0x3, 0x100, 0x4, 0x1057ff, 0x0, 0x6}) 06:22:02 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) getsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000400), &(0x7f0000000440)=0x8) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, &(0x7f00000019c0)={0x20}, 0x1) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r1, 0x111, 0x5, 0xc3, 0x4) r2 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x1, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r2, 0xc0045516, &(0x7f0000000040)=0x4) arch_prctl$ARCH_GET_CPUID(0x1011) getpgrp(0x0) flock(r0, 0x0) ioctl$BLKRRPART(0xffffffffffffffff, 0x125f, 0x0) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000200)={@mcast2}) fcntl$F_GET_FILE_RW_HINT(r0, 0x40d, 0x0) setsockopt$RDS_CONG_MONITOR(r2, 0x114, 0x6, &(0x7f0000000280), 0x4) ioctl$VHOST_SET_LOG_FD(r2, 0x4004af07, 0x0) ioctl$DRM_IOCTL_IRQ_BUSID(r2, 0xc0106403, &(0x7f0000000100)={0x8875, 0x800, 0x8000, 0xc2}) ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000180)) ioctl$VHOST_SET_VRING_CALL(0xffffffffffffffff, 0x4008af21, &(0x7f0000000380)={0x0, r1}) r3 = fcntl$dupfd(r1, 0x0, r2) setsockopt$IP_VS_SO_SET_STOPDAEMON(r3, 0x0, 0x48c, &(0x7f0000000140)={0x3, 'veth0\x00'}, 0x18) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.cpu/syz1\x00', 0x1ff) openat$snapshot(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/snapshot\x00', 0x0, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000a40)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x20008000}, 0x24044000) unshare(0x40000000) mount$9p_virtio(&(0x7f00000003c0)='em0%$!,cgroup#\x00', &(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='9p\x00', 0x200000, &(0x7f0000000500)={'trans=virtio,', {[{@afid={'afid', 0x3d, 0x6}}, {@version_L='version=9p2000.L'}, {@cache_none='cache=none'}], [{@subj_role={'subj_role', 0x3d, '/dev/dsp#\x00'}}, {@permit_directio='permit_directio'}, {@measure='measure'}, {@context={'context', 0x3d, 'system_u'}}, {@obj_user={'obj_user'}}, {@dont_hash='dont_hash'}, {@subj_type={'subj_type', 0x3d, '\\eth0('}}, {@fsuuid={'fsuuid', 0x3d, {[0x36, 0x79, 0x0, 0x33, 0x61, 0x62, 0x32], 0x2d, [0x77, 0x32, 0x77, 0x34], 0x2d, [0x7f, 0x67, 0x37, 0x77], 0x2d, [0x0, 0x38, 0x32, 0x33], 0x2d, [0x35, 0x37, 0x7f, 0x7b, 0x37, 0x39, 0x77, 0x33]}}}, {@dont_measure='dont_measure'}]}}) ioctl$VIDIOC_ENUMINPUT(r1, 0xc050561a, &(0x7f0000000300)={0x4, "443b36c4364670c73c2ad26e1952769039650793d10fc72d24ce46e327d06e2f", 0x3, 0x100, 0x4, 0x1057ff, 0x0, 0x6}) 06:22:02 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000040)="2e0007002500817ee45ae087185082cf0f24b0eba06ec400002339e00586f9835b3f0016914879008cd90080e230", 0x2e}], 0x1}, 0x0) 06:22:02 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = creat(&(0x7f0000000000)='./bus\x00', 0x0) getrlimit(0x0, &(0x7f00000000c0)) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x48002}) 06:22:02 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000040)="2e0000082500817ee45ae087185082cf0f24b0eba06ec400002339e00586f9835b3f0016914879008cd90080e230", 0x2e}], 0x1}, 0x0) 06:22:02 executing program 3: utimes(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)={{0x0, 0x2710}}) mount$9p_tcp(&(0x7f0000000340)='127.0.0.1\x00', 0x0, 0x0, 0x0, 0x0) r0 = syz_open_dev$sndseq(&(0x7f00000000c0)='/dev/snd/seq\x00', 0x0, 0x1000000200000582) r1 = dup2(0xffffffffffffff9c, r0) r2 = add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f0000000080)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) keyctl$read(0xb, r2, &(0x7f0000000100)=""/147, 0x93) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000000280)={0x0, 0x0, 0x0, 'queue1\x00'}) write$P9_RLINK(r1, &(0x7f0000000000)={0x7}, 0x2dd) [ 426.930033][T16318] IPVS: ftp: loaded support on port[0] = 21 [ 427.022881][T16320] IPVS: ftp: loaded support on port[0] = 21 06:22:03 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000040)="2e00000a2500817ee45ae087185082cf0f24b0eba06ec400002339e00586f9835b3f0016914879008cd90080e230", 0x2e}], 0x1}, 0x0) 06:22:03 executing program 3: mount$9p_tcp(&(0x7f0000000340)='127.0.0.1\x00', 0x0, 0x0, 0x0, 0x0) r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x1000000200000582) r1 = dup2(r0, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000000280)={0x0, 0x0, 0x0, 'queue1\x00'}) write$P9_RLINK(r1, &(0x7f0000000000)={0x7}, 0x2dd) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r1, 0x4040534e, &(0x7f0000000340)={0x66, @time}) 06:22:03 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = creat(&(0x7f0000000000)='./bus\x00', 0x0) getrlimit(0x0, &(0x7f00000000c0)) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x7f800}) 06:22:03 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) getsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000400), &(0x7f0000000440)=0x8) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, &(0x7f00000019c0)={0x20}, 0x1) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r1, 0x111, 0x5, 0xc3, 0x4) r2 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x1, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r2, 0xc0045516, &(0x7f0000000040)=0x4) arch_prctl$ARCH_GET_CPUID(0x1011) getpgrp(0x0) flock(r0, 0x0) ioctl$BLKRRPART(0xffffffffffffffff, 0x125f, 0x0) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000200)={@mcast2}) fcntl$F_GET_FILE_RW_HINT(r0, 0x40d, &(0x7f00000000c0)) setsockopt$RDS_CONG_MONITOR(r2, 0x114, 0x6, &(0x7f0000000280), 0x4) ioctl$VHOST_SET_LOG_FD(r2, 0x4004af07, 0x0) ioctl$DRM_IOCTL_IRQ_BUSID(r2, 0xc0106403, &(0x7f0000000100)={0x8875, 0x0, 0x8000, 0xc2}) ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000180)) ioctl$VHOST_SET_VRING_CALL(0xffffffffffffffff, 0x4008af21, &(0x7f0000000380)={0x0, r1}) r3 = fcntl$dupfd(r1, 0x0, r2) setsockopt$IP_VS_SO_SET_STOPDAEMON(r3, 0x0, 0x48c, &(0x7f0000000140)={0x3, 'veth0\x00'}, 0x18) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.cpu/syz1\x00', 0x1ff) openat$snapshot(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/snapshot\x00', 0x0, 0x0) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0xf7fffffffffffffd, 0x2012, r2, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000a40)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x20008000}, 0x24044000) unshare(0x40000000) mount$9p_virtio(&(0x7f00000003c0)='em0%$!,cgroup#\x00', &(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='9p\x00', 0x200000, &(0x7f0000000500)={'trans=virtio,', {[{@afid={'afid', 0x3d, 0x6}}, {@version_L='version=9p2000.L'}, {@cache_none='cache=none'}], [{@subj_role={'subj_role', 0x3d, '/dev/dsp#\x00'}}, {@permit_directio='permit_directio'}, {@measure='measure'}, {@context={'context', 0x3d, 'system_u'}}, {@obj_user={'obj_user'}}, {@dont_hash='dont_hash'}, {@subj_type={'subj_type', 0x3d, '\\eth0('}}, {@fsuuid={'fsuuid', 0x3d, {[0x36, 0x79, 0x0, 0x33, 0x61, 0x62, 0x32], 0x2d, [0x77, 0x32, 0x77, 0x34], 0x2d, [0x7f, 0x67, 0x37, 0x77], 0x2d, [0x0, 0x38, 0x32, 0x33], 0x2d, [0x35, 0x37, 0x7f, 0x7b, 0x37, 0x39, 0x77, 0x33]}}}, {@dont_measure='dont_measure'}]}}) ioctl$VIDIOC_ENUMINPUT(r1, 0xc050561a, &(0x7f0000000300)={0x4, "443b36c4364670c73c2ad26e1952769039650793d10fc72d24ce46e327d06e2f", 0x3, 0x100, 0x4, 0x1057ff, 0x0, 0x6}) 06:22:03 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) getsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000400), &(0x7f0000000440)=0x8) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, &(0x7f00000019c0)={0x20}, 0x1) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r1, 0x111, 0x5, 0xc3, 0x4) r2 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x1, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r2, 0xc0045516, &(0x7f0000000040)=0x4) arch_prctl$ARCH_GET_CPUID(0x1011) getpgrp(0x0) flock(r0, 0x0) ioctl$BLKRRPART(0xffffffffffffffff, 0x125f, 0x0) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000200)={@mcast2}) fcntl$F_GET_FILE_RW_HINT(r0, 0x40d, 0x0) setsockopt$RDS_CONG_MONITOR(r2, 0x114, 0x6, &(0x7f0000000280), 0x4) ioctl$VHOST_SET_LOG_FD(r2, 0x4004af07, 0x0) ioctl$DRM_IOCTL_IRQ_BUSID(r2, 0xc0106403, &(0x7f0000000100)={0x8875, 0x800, 0x8000, 0xc2}) ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000180)) ioctl$VHOST_SET_VRING_CALL(0xffffffffffffffff, 0x4008af21, &(0x7f0000000380)={0x0, r1}) r3 = fcntl$dupfd(r1, 0x0, r2) setsockopt$IP_VS_SO_SET_STOPDAEMON(r3, 0x0, 0x48c, &(0x7f0000000140)={0x3, 'veth0\x00'}, 0x18) openat$snapshot(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/snapshot\x00', 0x0, 0x0) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0xf7fffffffffffffd, 0x2012, r2, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000a40)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x20008000}, 0x24044000) unshare(0x40000000) mount$9p_virtio(&(0x7f00000003c0)='em0%$!,cgroup#\x00', &(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='9p\x00', 0x200000, &(0x7f0000000500)={'trans=virtio,', {[{@afid={'afid', 0x3d, 0x6}}, {@version_L='version=9p2000.L'}, {@cache_none='cache=none'}], [{@subj_role={'subj_role', 0x3d, '/dev/dsp#\x00'}}, {@permit_directio='permit_directio'}, {@measure='measure'}, {@context={'context', 0x3d, 'system_u'}}, {@obj_user={'obj_user'}}, {@dont_hash='dont_hash'}, {@subj_type={'subj_type', 0x3d, '\\eth0('}}, {@fsuuid={'fsuuid', 0x3d, {[0x36, 0x79, 0x0, 0x33, 0x61, 0x62, 0x32], 0x2d, [0x77, 0x32, 0x77, 0x34], 0x2d, [0x7f, 0x67, 0x37, 0x77], 0x2d, [0x0, 0x38, 0x32, 0x33], 0x2d, [0x35, 0x37, 0x7f, 0x7b, 0x37, 0x39, 0x77, 0x33]}}}, {@dont_measure='dont_measure'}]}}) ioctl$VIDIOC_ENUMINPUT(r1, 0xc050561a, &(0x7f0000000300)={0x4, "443b36c4364670c73c2ad26e1952769039650793d10fc72d24ce46e327d06e2f", 0x3, 0x100, 0x4, 0x1057ff, 0x0, 0x6}) 06:22:03 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000040)="2e0008002500817ee45ae087185082cf0f24b0eba06ec400002339e00586f9835b3f0016914879008cd90080e230", 0x2e}], 0x1}, 0x0) 06:22:03 executing program 3: mount$9p_tcp(&(0x7f0000000340)='127.0.0.1\x00', 0x0, 0x0, 0x0, 0x0) r0 = syz_open_dev$sndseq(&(0x7f00000000c0)='/dev/snd/seq\x00', 0x0, 0x1000000200000582) r1 = dup2(r0, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000000280)={0x0, 0x0, 0x0, 'queue1\x00'}) write$P9_RLINK(r1, &(0x7f0000000000)={0x7}, 0x2dd) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r1, 0x4040534e, &(0x7f0000000340)={0x66, @time}) bind$inet(r1, &(0x7f0000000040)={0x2, 0x4e21, @multicast1}, 0x10) [ 428.299054][T16348] IPVS: ftp: loaded support on port[0] = 21 06:22:03 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000040)="2e00000e2500817ee45ae087185082cf0f24b0eba06ec400002339e00586f9835b3f0016914879008cd90080e230", 0x2e}], 0x1}, 0x0) [ 428.490252][T16359] IPVS: ftp: loaded support on port[0] = 21 06:22:04 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = creat(&(0x7f0000000000)='./bus\x00', 0x0) getrlimit(0x0, &(0x7f00000000c0)) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x7feff}) 06:22:04 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000040)="2e0000102500817ee45ae087185082cf0f24b0eba06ec400002339e00586f9835b3f0016914879008cd90080e230", 0x2e}], 0x1}, 0x0) 06:22:05 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) getsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000400), &(0x7f0000000440)=0x8) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, &(0x7f00000019c0)={0x20}, 0x1) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r1, 0x111, 0x5, 0xc3, 0x4) r2 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x1, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r2, 0xc0045516, &(0x7f0000000040)=0x4) arch_prctl$ARCH_GET_CPUID(0x1011) getpgrp(0x0) flock(r0, 0x0) ioctl$BLKRRPART(0xffffffffffffffff, 0x125f, 0x0) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000200)={@mcast2}) fcntl$F_GET_FILE_RW_HINT(r0, 0x40d, 0x0) setsockopt$RDS_CONG_MONITOR(r2, 0x114, 0x6, &(0x7f0000000280), 0x4) ioctl$VHOST_SET_LOG_FD(r2, 0x4004af07, 0x0) ioctl$DRM_IOCTL_IRQ_BUSID(r2, 0xc0106403, &(0x7f0000000100)={0x8875, 0x800, 0x8000, 0xc2}) ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000180)) ioctl$VHOST_SET_VRING_CALL(0xffffffffffffffff, 0x4008af21, &(0x7f0000000380)={0x0, r1}) r3 = fcntl$dupfd(r1, 0x0, r2) setsockopt$IP_VS_SO_SET_STOPDAEMON(r3, 0x0, 0x48c, &(0x7f0000000140)={0x3, 'veth0\x00'}, 0x18) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.cpu/syz1\x00', 0x1ff) openat$snapshot(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/snapshot\x00', 0x0, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000a40)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x20008000}, 0x24044000) unshare(0x40000000) mount$9p_virtio(&(0x7f00000003c0)='em0%$!,cgroup#\x00', &(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='9p\x00', 0x200000, &(0x7f0000000500)={'trans=virtio,', {[{@afid={'afid', 0x3d, 0x6}}, {@version_L='version=9p2000.L'}, {@cache_none='cache=none'}], [{@subj_role={'subj_role', 0x3d, '/dev/dsp#\x00'}}, {@permit_directio='permit_directio'}, {@measure='measure'}, {@context={'context', 0x3d, 'system_u'}}, {@obj_user={'obj_user'}}, {@dont_hash='dont_hash'}, {@subj_type={'subj_type', 0x3d, '\\eth0('}}, {@fsuuid={'fsuuid', 0x3d, {[0x36, 0x79, 0x0, 0x33, 0x61, 0x62, 0x32], 0x2d, [0x77, 0x32, 0x77, 0x34], 0x2d, [0x7f, 0x67, 0x37, 0x77], 0x2d, [0x0, 0x38, 0x32, 0x33], 0x2d, [0x35, 0x37, 0x7f, 0x7b, 0x37, 0x39, 0x77, 0x33]}}}, {@dont_measure='dont_measure'}]}}) ioctl$VIDIOC_ENUMINPUT(r1, 0xc050561a, &(0x7f0000000300)={0x4, "443b36c4364670c73c2ad26e1952769039650793d10fc72d24ce46e327d06e2f", 0x3, 0x100, 0x4, 0x1057ff, 0x0, 0x6}) 06:22:05 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) getsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000400), &(0x7f0000000440)=0x8) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, &(0x7f00000019c0)={0x20}, 0x1) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r1, 0x111, 0x5, 0xc3, 0x4) r2 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x1, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r2, 0xc0045516, &(0x7f0000000040)=0x4) arch_prctl$ARCH_GET_CPUID(0x1011) getpgrp(0x0) flock(r0, 0x0) ioctl$BLKRRPART(0xffffffffffffffff, 0x125f, 0x0) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000200)={@mcast2}) fcntl$F_GET_FILE_RW_HINT(r0, 0x40d, &(0x7f00000000c0)) setsockopt$RDS_CONG_MONITOR(r2, 0x114, 0x6, &(0x7f0000000280), 0x4) ioctl$VHOST_SET_LOG_FD(r2, 0x4004af07, 0x0) ioctl$DRM_IOCTL_IRQ_BUSID(r2, 0xc0106403, &(0x7f0000000100)={0x8875, 0x0, 0x8000, 0xc2}) ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000180)) ioctl$VHOST_SET_VRING_CALL(0xffffffffffffffff, 0x4008af21, &(0x7f0000000380)={0x0, r1}) r3 = fcntl$dupfd(r1, 0x0, r2) setsockopt$IP_VS_SO_SET_STOPDAEMON(r3, 0x0, 0x48c, &(0x7f0000000140)={0x3, 'veth0\x00'}, 0x18) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.cpu/syz1\x00', 0x1ff) openat$snapshot(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/snapshot\x00', 0x0, 0x0) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0xf7fffffffffffffd, 0x2012, r2, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000a40)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x20008000}, 0x24044000) unshare(0x40000000) mount$9p_virtio(&(0x7f00000003c0)='em0%$!,cgroup#\x00', &(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='9p\x00', 0x200000, &(0x7f0000000500)={'trans=virtio,', {[{@afid={'afid', 0x3d, 0x6}}, {@version_L='version=9p2000.L'}, {@cache_none='cache=none'}], [{@subj_role={'subj_role', 0x3d, '/dev/dsp#\x00'}}, {@permit_directio='permit_directio'}, {@measure='measure'}, {@context={'context', 0x3d, 'system_u'}}, {@obj_user={'obj_user'}}, {@dont_hash='dont_hash'}, {@subj_type={'subj_type', 0x3d, '\\eth0('}}, {@fsuuid={'fsuuid', 0x3d, {[0x36, 0x79, 0x0, 0x33, 0x61, 0x62, 0x32], 0x2d, [0x77, 0x32, 0x77, 0x34], 0x2d, [0x7f, 0x67, 0x37, 0x77], 0x2d, [0x0, 0x38, 0x32, 0x33], 0x2d, [0x35, 0x37, 0x7f, 0x7b, 0x37, 0x39, 0x77, 0x33]}}}, {@dont_measure='dont_measure'}]}}) ioctl$VIDIOC_ENUMINPUT(r1, 0xc050561a, &(0x7f0000000300)={0x4, "443b36c4364670c73c2ad26e1952769039650793d10fc72d24ce46e327d06e2f", 0x3, 0x100, 0x4, 0x1057ff, 0x0, 0x6}) 06:22:05 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000040)="2e000a002500817ee45ae087185082cf0f24b0eba06ec400002339e00586f9835b3f0016914879008cd90080e230", 0x2e}], 0x1}, 0x0) 06:22:05 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) getsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000400), &(0x7f0000000440)=0x8) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, &(0x7f00000019c0)={0x20}, 0x1) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r1, 0x111, 0x5, 0xc3, 0x4) r2 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x1, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r2, 0xc0045516, &(0x7f0000000040)=0x4) arch_prctl$ARCH_GET_CPUID(0x1011) getpgrp(0x0) flock(r0, 0x0) ioctl$BLKRRPART(0xffffffffffffffff, 0x125f, 0x0) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000200)={@mcast2}) fcntl$F_GET_FILE_RW_HINT(r0, 0x40d, 0x0) setsockopt$RDS_CONG_MONITOR(r2, 0x114, 0x6, &(0x7f0000000280), 0x4) ioctl$VHOST_SET_LOG_FD(r2, 0x4004af07, 0x0) ioctl$DRM_IOCTL_IRQ_BUSID(r2, 0xc0106403, &(0x7f0000000100)={0x8875, 0x800, 0x8000, 0xc2}) ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000180)) ioctl$VHOST_SET_VRING_CALL(0xffffffffffffffff, 0x4008af21, &(0x7f0000000380)={0x0, r1}) r3 = fcntl$dupfd(r1, 0x0, r2) setsockopt$IP_VS_SO_SET_STOPDAEMON(r3, 0x0, 0x48c, &(0x7f0000000140)={0x3, 'veth0\x00'}, 0x18) openat$snapshot(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/snapshot\x00', 0x0, 0x0) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0xf7fffffffffffffd, 0x2012, r2, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000a40)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x20008000}, 0x24044000) unshare(0x40000000) mount$9p_virtio(&(0x7f00000003c0)='em0%$!,cgroup#\x00', &(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='9p\x00', 0x200000, &(0x7f0000000500)={'trans=virtio,', {[{@afid={'afid', 0x3d, 0x6}}, {@version_L='version=9p2000.L'}, {@cache_none='cache=none'}], [{@subj_role={'subj_role', 0x3d, '/dev/dsp#\x00'}}, {@permit_directio='permit_directio'}, {@measure='measure'}, {@context={'context', 0x3d, 'system_u'}}, {@obj_user={'obj_user'}}, {@dont_hash='dont_hash'}, {@subj_type={'subj_type', 0x3d, '\\eth0('}}, {@fsuuid={'fsuuid', 0x3d, {[0x36, 0x79, 0x0, 0x33, 0x61, 0x62, 0x32], 0x2d, [0x77, 0x32, 0x77, 0x34], 0x2d, [0x7f, 0x67, 0x37, 0x77], 0x2d, [0x0, 0x38, 0x32, 0x33], 0x2d, [0x35, 0x37, 0x7f, 0x7b, 0x37, 0x39, 0x77, 0x33]}}}, {@dont_measure='dont_measure'}]}}) ioctl$VIDIOC_ENUMINPUT(r1, 0xc050561a, &(0x7f0000000300)={0x4, "443b36c4364670c73c2ad26e1952769039650793d10fc72d24ce46e327d06e2f", 0x3, 0x100, 0x4, 0x1057ff, 0x0, 0x6}) [ 429.608460][T16378] IPVS: ftp: loaded support on port[0] = 21 [ 429.653440][T16375] IPVS: ftp: loaded support on port[0] = 21 06:22:06 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = creat(&(0x7f0000000000)='./bus\x00', 0x0) getrlimit(0x0, &(0x7f00000000c0)) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x7ff00}) 06:22:06 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) getsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000400), &(0x7f0000000440)=0x8) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, &(0x7f00000019c0)={0x20}, 0x1) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r1, 0x111, 0x5, 0xc3, 0x4) r2 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x1, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r2, 0xc0045516, &(0x7f0000000040)=0x4) arch_prctl$ARCH_GET_CPUID(0x1011) getpgrp(0x0) flock(r0, 0x0) ioctl$BLKRRPART(0xffffffffffffffff, 0x125f, 0x0) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000200)={@mcast2}) fcntl$F_GET_FILE_RW_HINT(r0, 0x40d, &(0x7f00000000c0)) setsockopt$RDS_CONG_MONITOR(r2, 0x114, 0x6, &(0x7f0000000280), 0x4) ioctl$VHOST_SET_LOG_FD(r2, 0x4004af07, 0x0) ioctl$DRM_IOCTL_IRQ_BUSID(r2, 0xc0106403, &(0x7f0000000100)={0x8875, 0x0, 0x8000, 0xc2}) ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000180)) ioctl$VHOST_SET_VRING_CALL(0xffffffffffffffff, 0x4008af21, &(0x7f0000000380)={0x0, r1}) r3 = fcntl$dupfd(r1, 0x0, r2) setsockopt$IP_VS_SO_SET_STOPDAEMON(r3, 0x0, 0x48c, &(0x7f0000000140)={0x3, 'veth0\x00'}, 0x18) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.cpu/syz1\x00', 0x1ff) openat$snapshot(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/snapshot\x00', 0x0, 0x0) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0xf7fffffffffffffd, 0x2012, r2, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000a40)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x20008000}, 0x24044000) unshare(0x40000000) mount$9p_virtio(&(0x7f00000003c0)='em0%$!,cgroup#\x00', &(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='9p\x00', 0x200000, &(0x7f0000000500)={'trans=virtio,', {[{@afid={'afid', 0x3d, 0x6}}, {@version_L='version=9p2000.L'}, {@cache_none='cache=none'}], [{@subj_role={'subj_role', 0x3d, '/dev/dsp#\x00'}}, {@permit_directio='permit_directio'}, {@measure='measure'}, {@context={'context', 0x3d, 'system_u'}}, {@obj_user={'obj_user'}}, {@dont_hash='dont_hash'}, {@subj_type={'subj_type', 0x3d, '\\eth0('}}, {@fsuuid={'fsuuid', 0x3d, {[0x36, 0x79, 0x0, 0x33, 0x61, 0x62, 0x32], 0x2d, [0x77, 0x32, 0x77, 0x34], 0x2d, [0x7f, 0x67, 0x37, 0x77], 0x2d, [0x0, 0x38, 0x32, 0x33], 0x2d, [0x35, 0x37, 0x7f, 0x7b, 0x37, 0x39, 0x77, 0x33]}}}, {@dont_measure='dont_measure'}]}}) ioctl$VIDIOC_ENUMINPUT(r1, 0xc050561a, &(0x7f0000000300)={0x4, "443b36c4364670c73c2ad26e1952769039650793d10fc72d24ce46e327d06e2f", 0x3, 0x100, 0x4, 0x1057ff, 0x0, 0x6}) 06:22:06 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000040)="2e0000482500817ee45ae087185082cf0f24b0eba06ec400002339e00586f9835b3f0016914879008cd90080e230", 0x2e}], 0x1}, 0x0) 06:22:06 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000040)="2e000e002500817ee45ae087185082cf0f24b0eba06ec400002339e00586f9835b3f0016914879008cd90080e230", 0x2e}], 0x1}, 0x0) [ 430.838262][T16390] IPVS: ftp: loaded support on port[0] = 21 06:22:06 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = creat(&(0x7f0000000000)='./bus\x00', 0x0) getrlimit(0x0, &(0x7f00000000c0)) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x660200}) [ 430.947491][T16392] IPVS: ftp: loaded support on port[0] = 21 06:22:06 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) getsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000400), &(0x7f0000000440)=0x8) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, &(0x7f00000019c0)={0x20}, 0x1) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r1, 0x111, 0x5, 0xc3, 0x4) r2 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x1, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r2, 0xc0045516, &(0x7f0000000040)=0x4) arch_prctl$ARCH_GET_CPUID(0x1011) getpgrp(0x0) flock(r0, 0x0) ioctl$BLKRRPART(0xffffffffffffffff, 0x125f, 0x0) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000200)={@mcast2}) fcntl$F_GET_FILE_RW_HINT(r0, 0x40d, &(0x7f00000000c0)) setsockopt$RDS_CONG_MONITOR(r2, 0x114, 0x6, &(0x7f0000000280), 0x4) ioctl$VHOST_SET_LOG_FD(r2, 0x4004af07, 0x0) ioctl$DRM_IOCTL_IRQ_BUSID(r2, 0xc0106403, 0x0) ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000180)) ioctl$VHOST_SET_VRING_CALL(0xffffffffffffffff, 0x4008af21, &(0x7f0000000380)={0x0, r1}) r3 = fcntl$dupfd(r1, 0x0, r2) setsockopt$IP_VS_SO_SET_STOPDAEMON(r3, 0x0, 0x48c, &(0x7f0000000140)={0x3, 'veth0\x00'}, 0x18) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.cpu/syz1\x00', 0x1ff) openat$snapshot(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/snapshot\x00', 0x0, 0x0) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0xf7fffffffffffffd, 0x2012, r2, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000a40)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x20008000}, 0x24044000) unshare(0x40000000) mount$9p_virtio(&(0x7f00000003c0)='em0%$!,cgroup#\x00', &(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='9p\x00', 0x200000, &(0x7f0000000500)={'trans=virtio,', {[{@afid={'afid', 0x3d, 0x6}}, {@version_L='version=9p2000.L'}, {@cache_none='cache=none'}], [{@subj_role={'subj_role', 0x3d, '/dev/dsp#\x00'}}, {@permit_directio='permit_directio'}, {@measure='measure'}, {@context={'context', 0x3d, 'system_u'}}, {@obj_user={'obj_user'}}, {@dont_hash='dont_hash'}, {@subj_type={'subj_type', 0x3d, '\\eth0('}}, {@fsuuid={'fsuuid', 0x3d, {[0x36, 0x79, 0x0, 0x33, 0x61, 0x62, 0x32], 0x2d, [0x77, 0x32, 0x77, 0x34], 0x2d, [0x7f, 0x67, 0x37, 0x77], 0x2d, [0x0, 0x38, 0x32, 0x33], 0x2d, [0x35, 0x37, 0x7f, 0x7b, 0x37, 0x39, 0x77, 0x33]}}}, {@dont_measure='dont_measure'}]}}) ioctl$VIDIOC_ENUMINPUT(r1, 0xc050561a, &(0x7f0000000300)={0x4, "443b36c4364670c73c2ad26e1952769039650793d10fc72d24ce46e327d06e2f", 0x3, 0x100, 0x4, 0x1057ff, 0x0, 0x6}) 06:22:06 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000040)="2e00004c2500817ee45ae087185082cf0f24b0eba06ec400002339e00586f9835b3f0016914879008cd90080e230", 0x2e}], 0x1}, 0x0) 06:22:06 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000040)="2e000f002500817ee45ae087185082cf0f24b0eba06ec400002339e00586f9835b3f0016914879008cd90080e230", 0x2e}], 0x1}, 0x0) 06:22:06 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = creat(&(0x7f0000000000)='./bus\x00', 0x0) getrlimit(0x0, &(0x7f00000000c0)) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x800000}) [ 431.434769][T16408] IPVS: ftp: loaded support on port[0] = 21 06:22:07 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000040)="2e0000602500817ee45ae087185082cf0f24b0eba06ec400002339e00586f9835b3f0016914879008cd90080e230", 0x2e}], 0x1}, 0x0) 06:22:07 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000040)="2e0010002500817ee45ae087185082cf0f24b0eba06ec400002339e00586f9835b3f0016914879008cd90080e230", 0x2e}], 0x1}, 0x0) 06:22:09 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) getsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000400), &(0x7f0000000440)=0x8) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, &(0x7f00000019c0)={0x20}, 0x1) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r1, 0x111, 0x5, 0xc3, 0x4) r2 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x1, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r2, 0xc0045516, &(0x7f0000000040)=0x4) arch_prctl$ARCH_GET_CPUID(0x1011) getpgrp(0x0) flock(r0, 0x0) ioctl$BLKRRPART(0xffffffffffffffff, 0x125f, 0x0) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000200)={@mcast2}) fcntl$F_GET_FILE_RW_HINT(r0, 0x40d, 0x0) setsockopt$RDS_CONG_MONITOR(r2, 0x114, 0x6, &(0x7f0000000280), 0x4) ioctl$VHOST_SET_LOG_FD(r2, 0x4004af07, 0x0) ioctl$DRM_IOCTL_IRQ_BUSID(r2, 0xc0106403, &(0x7f0000000100)={0x8875, 0x800, 0x8000, 0xc2}) ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000180)) ioctl$VHOST_SET_VRING_CALL(0xffffffffffffffff, 0x4008af21, &(0x7f0000000380)={0x0, r1}) r3 = fcntl$dupfd(r1, 0x0, r2) setsockopt$IP_VS_SO_SET_STOPDAEMON(r3, 0x0, 0x48c, &(0x7f0000000140)={0x3, 'veth0\x00'}, 0x18) openat$snapshot(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/snapshot\x00', 0x0, 0x0) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0xf7fffffffffffffd, 0x2012, r2, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000a40)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x20008000}, 0x24044000) unshare(0x40000000) mount$9p_virtio(&(0x7f00000003c0)='em0%$!,cgroup#\x00', &(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='9p\x00', 0x200000, &(0x7f0000000500)={'trans=virtio,', {[{@afid={'afid', 0x3d, 0x6}}, {@version_L='version=9p2000.L'}, {@cache_none='cache=none'}], [{@subj_role={'subj_role', 0x3d, '/dev/dsp#\x00'}}, {@permit_directio='permit_directio'}, {@measure='measure'}, {@context={'context', 0x3d, 'system_u'}}, {@obj_user={'obj_user'}}, {@dont_hash='dont_hash'}, {@subj_type={'subj_type', 0x3d, '\\eth0('}}, {@fsuuid={'fsuuid', 0x3d, {[0x36, 0x79, 0x0, 0x33, 0x61, 0x62, 0x32], 0x2d, [0x77, 0x32, 0x77, 0x34], 0x2d, [0x7f, 0x67, 0x37, 0x77], 0x2d, [0x0, 0x38, 0x32, 0x33], 0x2d, [0x35, 0x37, 0x7f, 0x7b, 0x37, 0x39, 0x77, 0x33]}}}, {@dont_measure='dont_measure'}]}}) ioctl$VIDIOC_ENUMINPUT(r1, 0xc050561a, &(0x7f0000000300)={0x4, "443b36c4364670c73c2ad26e1952769039650793d10fc72d24ce46e327d06e2f", 0x3, 0x100, 0x4, 0x1057ff, 0x0, 0x6}) 06:22:09 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) getsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000400), &(0x7f0000000440)=0x8) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, &(0x7f00000019c0)={0x20}, 0x1) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r1, 0x111, 0x5, 0xc3, 0x4) r2 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x1, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r2, 0xc0045516, &(0x7f0000000040)=0x4) arch_prctl$ARCH_GET_CPUID(0x1011) getpgrp(0x0) flock(r0, 0x0) ioctl$BLKRRPART(0xffffffffffffffff, 0x125f, 0x0) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000200)={@mcast2}) fcntl$F_GET_FILE_RW_HINT(r0, 0x40d, &(0x7f00000000c0)) setsockopt$RDS_CONG_MONITOR(r2, 0x114, 0x6, &(0x7f0000000280), 0x4) ioctl$VHOST_SET_LOG_FD(r2, 0x4004af07, 0x0) ioctl$DRM_IOCTL_IRQ_BUSID(r2, 0xc0106403, &(0x7f0000000100)={0x8875, 0x800, 0x0, 0xc2}) ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000180)) ioctl$VHOST_SET_VRING_CALL(0xffffffffffffffff, 0x4008af21, &(0x7f0000000380)={0x0, r1}) r3 = fcntl$dupfd(r1, 0x0, r2) setsockopt$IP_VS_SO_SET_STOPDAEMON(r3, 0x0, 0x48c, &(0x7f0000000140)={0x3, 'veth0\x00'}, 0x18) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.cpu/syz1\x00', 0x1ff) openat$snapshot(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/snapshot\x00', 0x0, 0x0) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0xf7fffffffffffffd, 0x2012, r2, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000a40)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x20008000}, 0x24044000) unshare(0x40000000) mount$9p_virtio(&(0x7f00000003c0)='em0%$!,cgroup#\x00', &(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='9p\x00', 0x200000, &(0x7f0000000500)={'trans=virtio,', {[{@afid={'afid', 0x3d, 0x6}}, {@version_L='version=9p2000.L'}, {@cache_none='cache=none'}], [{@subj_role={'subj_role', 0x3d, '/dev/dsp#\x00'}}, {@permit_directio='permit_directio'}, {@measure='measure'}, {@context={'context', 0x3d, 'system_u'}}, {@obj_user={'obj_user'}}, {@dont_hash='dont_hash'}, {@subj_type={'subj_type', 0x3d, '\\eth0('}}, {@fsuuid={'fsuuid', 0x3d, {[0x36, 0x79, 0x0, 0x33, 0x61, 0x62, 0x32], 0x2d, [0x77, 0x32, 0x77, 0x34], 0x2d, [0x7f, 0x67, 0x37, 0x77], 0x2d, [0x0, 0x38, 0x32, 0x33], 0x2d, [0x35, 0x37, 0x7f, 0x7b, 0x37, 0x39, 0x77, 0x33]}}}, {@dont_measure='dont_measure'}]}}) ioctl$VIDIOC_ENUMINPUT(r1, 0xc050561a, &(0x7f0000000300)={0x4, "443b36c4364670c73c2ad26e1952769039650793d10fc72d24ce46e327d06e2f", 0x3, 0x100, 0x4, 0x1057ff, 0x0, 0x6}) 06:22:09 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = creat(&(0x7f0000000000)='./bus\x00', 0x0) getrlimit(0x0, &(0x7f00000000c0)) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x800100}) 06:22:09 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000040)="2e0000682500817ee45ae087185082cf0f24b0eba06ec400002339e00586f9835b3f0016914879008cd90080e230", 0x2e}], 0x1}, 0x0) 06:22:09 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000040)="2e0048002500817ee45ae087185082cf0f24b0eba06ec400002339e00586f9835b3f0016914879008cd90080e230", 0x2e}], 0x1}, 0x0) 06:22:09 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) getsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000400), &(0x7f0000000440)=0x8) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, &(0x7f00000019c0)={0x20}, 0x1) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r1, 0x111, 0x5, 0xc3, 0x4) r2 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x1, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r2, 0xc0045516, &(0x7f0000000040)=0x4) arch_prctl$ARCH_GET_CPUID(0x1011) getpgrp(0x0) flock(r0, 0x0) ioctl$BLKRRPART(0xffffffffffffffff, 0x125f, 0x0) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000200)={@mcast2}) fcntl$F_GET_FILE_RW_HINT(r0, 0x40d, &(0x7f00000000c0)) setsockopt$RDS_CONG_MONITOR(r2, 0x114, 0x6, &(0x7f0000000280), 0x4) ioctl$VHOST_SET_LOG_FD(r2, 0x4004af07, 0x0) ioctl$DRM_IOCTL_IRQ_BUSID(r2, 0xc0106403, 0x0) ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000180)) ioctl$VHOST_SET_VRING_CALL(0xffffffffffffffff, 0x4008af21, &(0x7f0000000380)={0x0, r1}) r3 = fcntl$dupfd(r1, 0x0, r2) setsockopt$IP_VS_SO_SET_STOPDAEMON(r3, 0x0, 0x48c, &(0x7f0000000140)={0x3, 'veth0\x00'}, 0x18) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.cpu/syz1\x00', 0x1ff) openat$snapshot(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/snapshot\x00', 0x0, 0x0) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0xf7fffffffffffffd, 0x2012, r2, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000a40)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x20008000}, 0x24044000) unshare(0x40000000) mount$9p_virtio(&(0x7f00000003c0)='em0%$!,cgroup#\x00', &(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='9p\x00', 0x200000, &(0x7f0000000500)={'trans=virtio,', {[{@afid={'afid', 0x3d, 0x6}}, {@version_L='version=9p2000.L'}, {@cache_none='cache=none'}], [{@subj_role={'subj_role', 0x3d, '/dev/dsp#\x00'}}, {@permit_directio='permit_directio'}, {@measure='measure'}, {@context={'context', 0x3d, 'system_u'}}, {@obj_user={'obj_user'}}, {@dont_hash='dont_hash'}, {@subj_type={'subj_type', 0x3d, '\\eth0('}}, {@fsuuid={'fsuuid', 0x3d, {[0x36, 0x79, 0x0, 0x33, 0x61, 0x62, 0x32], 0x2d, [0x77, 0x32, 0x77, 0x34], 0x2d, [0x7f, 0x67, 0x37, 0x77], 0x2d, [0x0, 0x38, 0x32, 0x33], 0x2d, [0x35, 0x37, 0x7f, 0x7b, 0x37, 0x39, 0x77, 0x33]}}}, {@dont_measure='dont_measure'}]}}) ioctl$VIDIOC_ENUMINPUT(r1, 0xc050561a, &(0x7f0000000300)={0x4, "443b36c4364670c73c2ad26e1952769039650793d10fc72d24ce46e327d06e2f", 0x3, 0x100, 0x4, 0x1057ff, 0x0, 0x6}) [ 434.156786][T16448] IPVS: ftp: loaded support on port[0] = 21 [ 434.188462][T16445] IPVS: ftp: loaded support on port[0] = 21 06:22:09 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000040)="2e00006c2500817ee45ae087185082cf0f24b0eba06ec400002339e00586f9835b3f0016914879008cd90080e230", 0x2e}], 0x1}, 0x0) 06:22:10 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000040)="2e004c002500817ee45ae087185082cf0f24b0eba06ec400002339e00586f9835b3f0016914879008cd90080e230", 0x2e}], 0x1}, 0x0) [ 434.352876][T16450] IPVS: ftp: loaded support on port[0] = 21 06:22:10 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000040)="2e0000742500817ee45ae087185082cf0f24b0eba06ec400002339e00586f9835b3f0016914879008cd90080e230", 0x2e}], 0x1}, 0x0) 06:22:10 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000040)="2e0060002500817ee45ae087185082cf0f24b0eba06ec400002339e00586f9835b3f0016914879008cd90080e230", 0x2e}], 0x1}, 0x0) 06:22:10 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000040)="2e00007a2500817ee45ae087185082cf0f24b0eba06ec400002339e00586f9835b3f0016914879008cd90080e230", 0x2e}], 0x1}, 0x0) 06:22:11 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = creat(&(0x7f0000000000)='./bus\x00', 0x0) getrlimit(0x0, &(0x7f00000000c0)) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x800200}) 06:22:11 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) getsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000400), &(0x7f0000000440)=0x8) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, &(0x7f00000019c0)={0x20}, 0x1) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r1, 0x111, 0x5, 0xc3, 0x4) r2 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x1, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r2, 0xc0045516, &(0x7f0000000040)=0x4) arch_prctl$ARCH_GET_CPUID(0x1011) getpgrp(0x0) flock(r0, 0x0) ioctl$BLKRRPART(0xffffffffffffffff, 0x125f, 0x0) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000200)={@mcast2}) fcntl$F_GET_FILE_RW_HINT(r0, 0x40d, 0x0) setsockopt$RDS_CONG_MONITOR(r2, 0x114, 0x6, &(0x7f0000000280), 0x4) ioctl$VHOST_SET_LOG_FD(r2, 0x4004af07, 0x0) ioctl$DRM_IOCTL_IRQ_BUSID(r2, 0xc0106403, &(0x7f0000000100)={0x8875, 0x800, 0x8000, 0xc2}) ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000180)) ioctl$VHOST_SET_VRING_CALL(0xffffffffffffffff, 0x4008af21, &(0x7f0000000380)={0x0, r1}) r3 = fcntl$dupfd(r1, 0x0, r2) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.cpu/syz1\x00', 0x1ff) openat$snapshot(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/snapshot\x00', 0x0, 0x0) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0xf7fffffffffffffd, 0x2012, r2, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000a40)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x20008000}, 0x24044000) unshare(0x40000000) mount$9p_virtio(&(0x7f00000003c0)='em0%$!,cgroup#\x00', &(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='9p\x00', 0x200000, &(0x7f0000000500)={'trans=virtio,', {[{@afid={'afid', 0x3d, 0x6}}, {@version_L='version=9p2000.L'}, {@cache_none='cache=none'}], [{@subj_role={'subj_role', 0x3d, '/dev/dsp#\x00'}}, {@permit_directio='permit_directio'}, {@measure='measure'}, {@context={'context', 0x3d, 'system_u'}}, {@obj_user={'obj_user'}}, {@dont_hash='dont_hash'}, {@subj_type={'subj_type', 0x3d, '\\eth0('}}, {@fsuuid={'fsuuid', 0x3d, {[0x36, 0x79, 0x0, 0x33, 0x61, 0x62, 0x32], 0x2d, [0x77, 0x32, 0x77, 0x34], 0x2d, [0x7f, 0x67, 0x37, 0x77], 0x2d, [0x0, 0x38, 0x32, 0x33], 0x2d, [0x35, 0x37, 0x7f, 0x7b, 0x37, 0x39, 0x77, 0x33]}}}, {@dont_measure='dont_measure'}]}}) ioctl$VIDIOC_ENUMINPUT(r1, 0xc050561a, &(0x7f0000000300)={0x4, "443b36c4364670c73c2ad26e1952769039650793d10fc72d24ce46e327d06e2f", 0x3, 0x100, 0x4, 0x1057ff, 0x0, 0x6}) 06:22:11 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) getsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000400), &(0x7f0000000440)=0x8) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, &(0x7f00000019c0)={0x20}, 0x1) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r1, 0x111, 0x5, 0xc3, 0x4) r2 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x1, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r2, 0xc0045516, &(0x7f0000000040)=0x4) arch_prctl$ARCH_GET_CPUID(0x1011) getpgrp(0x0) flock(r0, 0x0) ioctl$BLKRRPART(0xffffffffffffffff, 0x125f, 0x0) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000200)={@mcast2}) fcntl$F_GET_FILE_RW_HINT(r0, 0x40d, &(0x7f00000000c0)) setsockopt$RDS_CONG_MONITOR(r2, 0x114, 0x6, &(0x7f0000000280), 0x4) ioctl$VHOST_SET_LOG_FD(r2, 0x4004af07, 0x0) ioctl$DRM_IOCTL_IRQ_BUSID(r2, 0xc0106403, &(0x7f0000000100)={0x8875, 0x800, 0x0, 0xc2}) ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000180)) ioctl$VHOST_SET_VRING_CALL(0xffffffffffffffff, 0x4008af21, &(0x7f0000000380)={0x0, r1}) r3 = fcntl$dupfd(r1, 0x0, r2) setsockopt$IP_VS_SO_SET_STOPDAEMON(r3, 0x0, 0x48c, &(0x7f0000000140)={0x3, 'veth0\x00'}, 0x18) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.cpu/syz1\x00', 0x1ff) openat$snapshot(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/snapshot\x00', 0x0, 0x0) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0xf7fffffffffffffd, 0x2012, r2, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000a40)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x20008000}, 0x24044000) unshare(0x40000000) mount$9p_virtio(&(0x7f00000003c0)='em0%$!,cgroup#\x00', &(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='9p\x00', 0x200000, &(0x7f0000000500)={'trans=virtio,', {[{@afid={'afid', 0x3d, 0x6}}, {@version_L='version=9p2000.L'}, {@cache_none='cache=none'}], [{@subj_role={'subj_role', 0x3d, '/dev/dsp#\x00'}}, {@permit_directio='permit_directio'}, {@measure='measure'}, {@context={'context', 0x3d, 'system_u'}}, {@obj_user={'obj_user'}}, {@dont_hash='dont_hash'}, {@subj_type={'subj_type', 0x3d, '\\eth0('}}, {@fsuuid={'fsuuid', 0x3d, {[0x36, 0x79, 0x0, 0x33, 0x61, 0x62, 0x32], 0x2d, [0x77, 0x32, 0x77, 0x34], 0x2d, [0x7f, 0x67, 0x37, 0x77], 0x2d, [0x0, 0x38, 0x32, 0x33], 0x2d, [0x35, 0x37, 0x7f, 0x7b, 0x37, 0x39, 0x77, 0x33]}}}, {@dont_measure='dont_measure'}]}}) ioctl$VIDIOC_ENUMINPUT(r1, 0xc050561a, &(0x7f0000000300)={0x4, "443b36c4364670c73c2ad26e1952769039650793d10fc72d24ce46e327d06e2f", 0x3, 0x100, 0x4, 0x1057ff, 0x0, 0x6}) 06:22:11 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000040)="2e0068002500817ee45ae087185082cf0f24b0eba06ec400002339e00586f9835b3f0016914879008cd90080e230", 0x2e}], 0x1}, 0x0) 06:22:11 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) getsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000400), &(0x7f0000000440)=0x8) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, &(0x7f00000019c0)={0x20}, 0x1) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r1, 0x111, 0x5, 0xc3, 0x4) r2 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x1, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r2, 0xc0045516, &(0x7f0000000040)=0x4) arch_prctl$ARCH_GET_CPUID(0x1011) getpgrp(0x0) flock(r0, 0x0) ioctl$BLKRRPART(0xffffffffffffffff, 0x125f, 0x0) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000200)={@mcast2}) fcntl$F_GET_FILE_RW_HINT(r0, 0x40d, &(0x7f00000000c0)) setsockopt$RDS_CONG_MONITOR(r2, 0x114, 0x6, &(0x7f0000000280), 0x4) ioctl$VHOST_SET_LOG_FD(r2, 0x4004af07, 0x0) ioctl$DRM_IOCTL_IRQ_BUSID(r2, 0xc0106403, 0x0) ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000180)) ioctl$VHOST_SET_VRING_CALL(0xffffffffffffffff, 0x4008af21, &(0x7f0000000380)={0x0, r1}) r3 = fcntl$dupfd(r1, 0x0, r2) setsockopt$IP_VS_SO_SET_STOPDAEMON(r3, 0x0, 0x48c, &(0x7f0000000140)={0x3, 'veth0\x00'}, 0x18) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.cpu/syz1\x00', 0x1ff) openat$snapshot(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/snapshot\x00', 0x0, 0x0) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0xf7fffffffffffffd, 0x2012, r2, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000a40)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x20008000}, 0x24044000) unshare(0x40000000) mount$9p_virtio(&(0x7f00000003c0)='em0%$!,cgroup#\x00', &(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='9p\x00', 0x200000, &(0x7f0000000500)={'trans=virtio,', {[{@afid={'afid', 0x3d, 0x6}}, {@version_L='version=9p2000.L'}, {@cache_none='cache=none'}], [{@subj_role={'subj_role', 0x3d, '/dev/dsp#\x00'}}, {@permit_directio='permit_directio'}, {@measure='measure'}, {@context={'context', 0x3d, 'system_u'}}, {@obj_user={'obj_user'}}, {@dont_hash='dont_hash'}, {@subj_type={'subj_type', 0x3d, '\\eth0('}}, {@fsuuid={'fsuuid', 0x3d, {[0x36, 0x79, 0x0, 0x33, 0x61, 0x62, 0x32], 0x2d, [0x77, 0x32, 0x77, 0x34], 0x2d, [0x7f, 0x67, 0x37, 0x77], 0x2d, [0x0, 0x38, 0x32, 0x33], 0x2d, [0x35, 0x37, 0x7f, 0x7b, 0x37, 0x39, 0x77, 0x33]}}}, {@dont_measure='dont_measure'}]}}) ioctl$VIDIOC_ENUMINPUT(r1, 0xc050561a, &(0x7f0000000300)={0x4, "443b36c4364670c73c2ad26e1952769039650793d10fc72d24ce46e327d06e2f", 0x3, 0x100, 0x4, 0x1057ff, 0x0, 0x6}) 06:22:11 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000040)="2e0000003f00817ee45ae087185082cf0f24b0eba06ec400002339e00586f9835b3f0016914879008cd90080e230", 0x2e}], 0x1}, 0x0) [ 435.755683][T16486] IPVS: ftp: loaded support on port[0] = 21 [ 435.763551][T16484] IPVS: ftp: loaded support on port[0] = 21 06:22:11 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000040)="2e0000000f00817ee45ae087185082cf0f24b0eba06ec400002339e00586f9835b3f0016914879008cd90080e230", 0x2e}], 0x1}, 0x0) 06:22:11 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000040)="2e006c002500817ee45ae087185082cf0f24b0eba06ec400002339e00586f9835b3f0016914879008cd90080e230", 0x2e}], 0x1}, 0x0) 06:22:11 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000040)="2e0074002500817ee45ae087185082cf0f24b0eba06ec400002339e00586f9835b3f0016914879008cd90080e230", 0x2e}], 0x1}, 0x0) 06:22:11 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000040)="2e0000002502817ee45ae087185082cf0f24b0eba06ec400002339e00586f9835b3f0016914879008cd90080e230", 0x2e}], 0x1}, 0x0) [ 436.048072][T16493] IPVS: ftp: loaded support on port[0] = 21 06:22:12 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000040)="2e007a002500817ee45ae087185082cf0f24b0eba06ec400002339e00586f9835b3f0016914879008cd90080e230", 0x2e}], 0x1}, 0x0) 06:22:12 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000040)="2e0000002503817ee45ae087185082cf0f24b0eba06ec400002339e00586f9835b3f0016914879008cd90080e230", 0x2e}], 0x1}, 0x0) 06:22:12 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = creat(&(0x7f0000000000)='./bus\x00', 0x0) getrlimit(0x0, &(0x7f00000000c0)) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x800300}) 06:22:15 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) getsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000400), &(0x7f0000000440)=0x8) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, &(0x7f00000019c0)={0x20}, 0x1) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r1, 0x111, 0x5, 0xc3, 0x4) r2 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x1, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r2, 0xc0045516, &(0x7f0000000040)=0x4) arch_prctl$ARCH_GET_CPUID(0x1011) getpgrp(0x0) flock(r0, 0x0) ioctl$BLKRRPART(0xffffffffffffffff, 0x125f, 0x0) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000200)={@mcast2}) fcntl$F_GET_FILE_RW_HINT(r0, 0x40d, 0x0) setsockopt$RDS_CONG_MONITOR(r2, 0x114, 0x6, &(0x7f0000000280), 0x4) ioctl$VHOST_SET_LOG_FD(r2, 0x4004af07, 0x0) ioctl$DRM_IOCTL_IRQ_BUSID(r2, 0xc0106403, &(0x7f0000000100)={0x8875, 0x800, 0x8000, 0xc2}) ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000180)) ioctl$VHOST_SET_VRING_CALL(0xffffffffffffffff, 0x4008af21, &(0x7f0000000380)={0x0, r1}) r3 = fcntl$dupfd(r1, 0x0, r2) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.cpu/syz1\x00', 0x1ff) openat$snapshot(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/snapshot\x00', 0x0, 0x0) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0xf7fffffffffffffd, 0x2012, r2, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000a40)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x20008000}, 0x24044000) unshare(0x40000000) mount$9p_virtio(&(0x7f00000003c0)='em0%$!,cgroup#\x00', &(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='9p\x00', 0x200000, &(0x7f0000000500)={'trans=virtio,', {[{@afid={'afid', 0x3d, 0x6}}, {@version_L='version=9p2000.L'}, {@cache_none='cache=none'}], [{@subj_role={'subj_role', 0x3d, '/dev/dsp#\x00'}}, {@permit_directio='permit_directio'}, {@measure='measure'}, {@context={'context', 0x3d, 'system_u'}}, {@obj_user={'obj_user'}}, {@dont_hash='dont_hash'}, {@subj_type={'subj_type', 0x3d, '\\eth0('}}, {@fsuuid={'fsuuid', 0x3d, {[0x36, 0x79, 0x0, 0x33, 0x61, 0x62, 0x32], 0x2d, [0x77, 0x32, 0x77, 0x34], 0x2d, [0x7f, 0x67, 0x37, 0x77], 0x2d, [0x0, 0x38, 0x32, 0x33], 0x2d, [0x35, 0x37, 0x7f, 0x7b, 0x37, 0x39, 0x77, 0x33]}}}, {@dont_measure='dont_measure'}]}}) ioctl$VIDIOC_ENUMINPUT(r1, 0xc050561a, &(0x7f0000000300)={0x4, "443b36c4364670c73c2ad26e1952769039650793d10fc72d24ce46e327d06e2f", 0x3, 0x100, 0x4, 0x1057ff, 0x0, 0x6}) 06:22:15 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000040)="2e00f0002500817ee45ae087185082cf0f24b0eba06ec400002339e00586f9835b3f0016914879008cd90080e230", 0x2e}], 0x1}, 0x0) 06:22:15 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000040)="2e0000002504817ee45ae087185082cf0f24b0eba06ec400002339e00586f9835b3f0016914879008cd90080e230", 0x2e}], 0x1}, 0x0) 06:22:15 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) getsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000400), &(0x7f0000000440)=0x8) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, &(0x7f00000019c0)={0x20}, 0x1) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r1, 0x111, 0x5, 0xc3, 0x4) r2 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x1, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r2, 0xc0045516, &(0x7f0000000040)=0x4) arch_prctl$ARCH_GET_CPUID(0x1011) getpgrp(0x0) flock(r0, 0x0) ioctl$BLKRRPART(0xffffffffffffffff, 0x125f, 0x0) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000200)={@mcast2}) fcntl$F_GET_FILE_RW_HINT(r0, 0x40d, &(0x7f00000000c0)) setsockopt$RDS_CONG_MONITOR(r2, 0x114, 0x6, &(0x7f0000000280), 0x4) ioctl$VHOST_SET_LOG_FD(r2, 0x4004af07, 0x0) ioctl$DRM_IOCTL_IRQ_BUSID(r2, 0xc0106403, &(0x7f0000000100)={0x8875, 0x800, 0x0, 0xc2}) ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000180)) ioctl$VHOST_SET_VRING_CALL(0xffffffffffffffff, 0x4008af21, &(0x7f0000000380)={0x0, r1}) r3 = fcntl$dupfd(r1, 0x0, r2) setsockopt$IP_VS_SO_SET_STOPDAEMON(r3, 0x0, 0x48c, &(0x7f0000000140)={0x3, 'veth0\x00'}, 0x18) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.cpu/syz1\x00', 0x1ff) openat$snapshot(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/snapshot\x00', 0x0, 0x0) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0xf7fffffffffffffd, 0x2012, r2, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000a40)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x20008000}, 0x24044000) unshare(0x40000000) mount$9p_virtio(&(0x7f00000003c0)='em0%$!,cgroup#\x00', &(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='9p\x00', 0x200000, &(0x7f0000000500)={'trans=virtio,', {[{@afid={'afid', 0x3d, 0x6}}, {@version_L='version=9p2000.L'}, {@cache_none='cache=none'}], [{@subj_role={'subj_role', 0x3d, '/dev/dsp#\x00'}}, {@permit_directio='permit_directio'}, {@measure='measure'}, {@context={'context', 0x3d, 'system_u'}}, {@obj_user={'obj_user'}}, {@dont_hash='dont_hash'}, {@subj_type={'subj_type', 0x3d, '\\eth0('}}, {@fsuuid={'fsuuid', 0x3d, {[0x36, 0x79, 0x0, 0x33, 0x61, 0x62, 0x32], 0x2d, [0x77, 0x32, 0x77, 0x34], 0x2d, [0x7f, 0x67, 0x37, 0x77], 0x2d, [0x0, 0x38, 0x32, 0x33], 0x2d, [0x35, 0x37, 0x7f, 0x7b, 0x37, 0x39, 0x77, 0x33]}}}, {@dont_measure='dont_measure'}]}}) ioctl$VIDIOC_ENUMINPUT(r1, 0xc050561a, &(0x7f0000000300)={0x4, "443b36c4364670c73c2ad26e1952769039650793d10fc72d24ce46e327d06e2f", 0x3, 0x100, 0x4, 0x1057ff, 0x0, 0x6}) 06:22:15 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = creat(&(0x7f0000000000)='./bus\x00', 0x0) getrlimit(0x0, &(0x7f00000000c0)) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x800400}) 06:22:15 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) getsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000400), &(0x7f0000000440)=0x8) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, &(0x7f00000019c0)={0x20}, 0x1) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r1, 0x111, 0x5, 0xc3, 0x4) r2 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x1, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r2, 0xc0045516, &(0x7f0000000040)=0x4) arch_prctl$ARCH_GET_CPUID(0x1011) getpgrp(0x0) flock(r0, 0x0) ioctl$BLKRRPART(0xffffffffffffffff, 0x125f, 0x0) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000200)={@mcast2}) fcntl$F_GET_FILE_RW_HINT(r0, 0x40d, &(0x7f00000000c0)) setsockopt$RDS_CONG_MONITOR(r2, 0x114, 0x6, &(0x7f0000000280), 0x4) ioctl$VHOST_SET_LOG_FD(r2, 0x4004af07, 0x0) ioctl$DRM_IOCTL_IRQ_BUSID(r2, 0xc0106403, &(0x7f0000000100)={0x8875, 0x800, 0x0, 0xc2}) ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000180)) ioctl$VHOST_SET_VRING_CALL(0xffffffffffffffff, 0x4008af21, &(0x7f0000000380)={0x0, r1}) r3 = fcntl$dupfd(r1, 0x0, r2) setsockopt$IP_VS_SO_SET_STOPDAEMON(r3, 0x0, 0x48c, &(0x7f0000000140)={0x3, 'veth0\x00'}, 0x18) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.cpu/syz1\x00', 0x1ff) openat$snapshot(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/snapshot\x00', 0x0, 0x0) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0xf7fffffffffffffd, 0x2012, r2, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000a40)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x20008000}, 0x24044000) unshare(0x40000000) mount$9p_virtio(&(0x7f00000003c0)='em0%$!,cgroup#\x00', &(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='9p\x00', 0x200000, &(0x7f0000000500)={'trans=virtio,', {[{@afid={'afid', 0x3d, 0x6}}, {@version_L='version=9p2000.L'}, {@cache_none='cache=none'}], [{@subj_role={'subj_role', 0x3d, '/dev/dsp#\x00'}}, {@permit_directio='permit_directio'}, {@measure='measure'}, {@context={'context', 0x3d, 'system_u'}}, {@obj_user={'obj_user'}}, {@dont_hash='dont_hash'}, {@subj_type={'subj_type', 0x3d, '\\eth0('}}, {@fsuuid={'fsuuid', 0x3d, {[0x36, 0x79, 0x0, 0x33, 0x61, 0x62, 0x32], 0x2d, [0x77, 0x32, 0x77, 0x34], 0x2d, [0x7f, 0x67, 0x37, 0x77], 0x2d, [0x0, 0x38, 0x32, 0x33], 0x2d, [0x35, 0x37, 0x7f, 0x7b, 0x37, 0x39, 0x77, 0x33]}}}, {@dont_measure='dont_measure'}]}}) ioctl$VIDIOC_ENUMINPUT(r1, 0xc050561a, &(0x7f0000000300)={0x4, "443b36c4364670c73c2ad26e1952769039650793d10fc72d24ce46e327d06e2f", 0x3, 0x100, 0x4, 0x1057ff, 0x0, 0x6}) 06:22:15 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000040)="2e007c012500817ee45ae087185082cf0f24b0eba06ec400002339e00586f9835b3f0016914879008cd90080e230", 0x2e}], 0x1}, 0x0) [ 439.727119][T16538] IPVS: ftp: loaded support on port[0] = 21 [ 439.845119][T16545] IPVS: ftp: loaded support on port[0] = 21 06:22:15 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000040)="2e0000002505817ee45ae087185082cf0f24b0eba06ec400002339e00586f9835b3f0016914879008cd90080e230", 0x2e}], 0x1}, 0x0) [ 439.945076][T16550] IPVS: ftp: loaded support on port[0] = 21 06:22:16 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000040)="2e0000032500817ee45ae087185082cf0f24b0eba06ec400002339e00586f9835b3f0016914879008cd90080e230", 0x2e}], 0x1}, 0x0) 06:22:16 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) getsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000400), &(0x7f0000000440)=0x8) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, &(0x7f00000019c0)={0x20}, 0x1) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r1, 0x111, 0x5, 0xc3, 0x4) r2 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x1, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r2, 0xc0045516, &(0x7f0000000040)=0x4) arch_prctl$ARCH_GET_CPUID(0x1011) getpgrp(0x0) flock(r0, 0x0) ioctl$BLKRRPART(0xffffffffffffffff, 0x125f, 0x0) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000200)={@mcast2}) fcntl$F_GET_FILE_RW_HINT(r0, 0x40d, 0x0) setsockopt$RDS_CONG_MONITOR(r2, 0x114, 0x6, &(0x7f0000000280), 0x4) ioctl$VHOST_SET_LOG_FD(r2, 0x4004af07, 0x0) ioctl$DRM_IOCTL_IRQ_BUSID(r2, 0xc0106403, &(0x7f0000000100)={0x8875, 0x800, 0x8000, 0xc2}) ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000180)) ioctl$VHOST_SET_VRING_CALL(0xffffffffffffffff, 0x4008af21, &(0x7f0000000380)={0x0, r1}) r3 = fcntl$dupfd(r1, 0x0, r2) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.cpu/syz1\x00', 0x1ff) openat$snapshot(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/snapshot\x00', 0x0, 0x0) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0xf7fffffffffffffd, 0x2012, r2, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000a40)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x20008000}, 0x24044000) unshare(0x40000000) mount$9p_virtio(&(0x7f00000003c0)='em0%$!,cgroup#\x00', &(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='9p\x00', 0x200000, &(0x7f0000000500)={'trans=virtio,', {[{@afid={'afid', 0x3d, 0x6}}, {@version_L='version=9p2000.L'}, {@cache_none='cache=none'}], [{@subj_role={'subj_role', 0x3d, '/dev/dsp#\x00'}}, {@permit_directio='permit_directio'}, {@measure='measure'}, {@context={'context', 0x3d, 'system_u'}}, {@obj_user={'obj_user'}}, {@dont_hash='dont_hash'}, {@subj_type={'subj_type', 0x3d, '\\eth0('}}, {@fsuuid={'fsuuid', 0x3d, {[0x36, 0x79, 0x0, 0x33, 0x61, 0x62, 0x32], 0x2d, [0x77, 0x32, 0x77, 0x34], 0x2d, [0x7f, 0x67, 0x37, 0x77], 0x2d, [0x0, 0x38, 0x32, 0x33], 0x2d, [0x35, 0x37, 0x7f, 0x7b, 0x37, 0x39, 0x77, 0x33]}}}, {@dont_measure='dont_measure'}]}}) ioctl$VIDIOC_ENUMINPUT(r1, 0xc050561a, &(0x7f0000000300)={0x4, "443b36c4364670c73c2ad26e1952769039650793d10fc72d24ce46e327d06e2f", 0x3, 0x100, 0x4, 0x1057ff, 0x0, 0x6}) 06:22:16 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) getsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000400), &(0x7f0000000440)=0x8) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, &(0x7f00000019c0)={0x20}, 0x1) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r1, 0x111, 0x5, 0xc3, 0x4) r2 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x1, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r2, 0xc0045516, &(0x7f0000000040)=0x4) arch_prctl$ARCH_GET_CPUID(0x1011) getpgrp(0x0) flock(r0, 0x0) ioctl$BLKRRPART(0xffffffffffffffff, 0x125f, 0x0) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000200)={@mcast2}) fcntl$F_GET_FILE_RW_HINT(r0, 0x40d, &(0x7f00000000c0)) setsockopt$RDS_CONG_MONITOR(r2, 0x114, 0x6, &(0x7f0000000280), 0x4) ioctl$VHOST_SET_LOG_FD(r2, 0x4004af07, 0x0) ioctl$DRM_IOCTL_IRQ_BUSID(r2, 0xc0106403, &(0x7f0000000100)={0x8875, 0x800, 0x8000}) ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000180)) ioctl$VHOST_SET_VRING_CALL(0xffffffffffffffff, 0x4008af21, &(0x7f0000000380)={0x0, r1}) r3 = fcntl$dupfd(r1, 0x0, r2) setsockopt$IP_VS_SO_SET_STOPDAEMON(r3, 0x0, 0x48c, &(0x7f0000000140)={0x3, 'veth0\x00'}, 0x18) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.cpu/syz1\x00', 0x1ff) openat$snapshot(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/snapshot\x00', 0x0, 0x0) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0xf7fffffffffffffd, 0x2012, r2, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000a40)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x20008000}, 0x24044000) unshare(0x40000000) mount$9p_virtio(&(0x7f00000003c0)='em0%$!,cgroup#\x00', &(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='9p\x00', 0x200000, &(0x7f0000000500)={'trans=virtio,', {[{@afid={'afid', 0x3d, 0x6}}, {@version_L='version=9p2000.L'}, {@cache_none='cache=none'}], [{@subj_role={'subj_role', 0x3d, '/dev/dsp#\x00'}}, {@permit_directio='permit_directio'}, {@measure='measure'}, {@context={'context', 0x3d, 'system_u'}}, {@obj_user={'obj_user'}}, {@dont_hash='dont_hash'}, {@subj_type={'subj_type', 0x3d, '\\eth0('}}, {@fsuuid={'fsuuid', 0x3d, {[0x36, 0x79, 0x0, 0x33, 0x61, 0x62, 0x32], 0x2d, [0x77, 0x32, 0x77, 0x34], 0x2d, [0x7f, 0x67, 0x37, 0x77], 0x2d, [0x0, 0x38, 0x32, 0x33], 0x2d, [0x35, 0x37, 0x7f, 0x7b, 0x37, 0x39, 0x77, 0x33]}}}, {@dont_measure='dont_measure'}]}}) ioctl$VIDIOC_ENUMINPUT(r1, 0xc050561a, &(0x7f0000000300)={0x4, "443b36c4364670c73c2ad26e1952769039650793d10fc72d24ce46e327d06e2f", 0x3, 0x100, 0x4, 0x1057ff, 0x0, 0x6}) 06:22:16 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) getsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000400), &(0x7f0000000440)=0x8) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, &(0x7f00000019c0)={0x20}, 0x1) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r1, 0x111, 0x5, 0xc3, 0x4) r2 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x1, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r2, 0xc0045516, &(0x7f0000000040)=0x4) arch_prctl$ARCH_GET_CPUID(0x1011) getpgrp(0x0) flock(r0, 0x0) ioctl$BLKRRPART(0xffffffffffffffff, 0x125f, 0x0) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000200)={@mcast2}) fcntl$F_GET_FILE_RW_HINT(r0, 0x40d, &(0x7f00000000c0)) setsockopt$RDS_CONG_MONITOR(r2, 0x114, 0x6, &(0x7f0000000280), 0x4) ioctl$VHOST_SET_LOG_FD(r2, 0x4004af07, 0x0) ioctl$DRM_IOCTL_IRQ_BUSID(r2, 0xc0106403, &(0x7f0000000100)={0x8875, 0x0, 0x8000, 0xc2}) ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000180)) ioctl$VHOST_SET_VRING_CALL(0xffffffffffffffff, 0x4008af21, &(0x7f0000000380)={0x0, r1}) r3 = fcntl$dupfd(r1, 0x0, r2) setsockopt$IP_VS_SO_SET_STOPDAEMON(r3, 0x0, 0x48c, &(0x7f0000000140)={0x3, 'veth0\x00'}, 0x18) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.cpu/syz1\x00', 0x1ff) openat$snapshot(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/snapshot\x00', 0x0, 0x0) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0xf7fffffffffffffd, 0x2012, r2, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000a40)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x20008000}, 0x24044000) unshare(0x40000000) mount$9p_virtio(&(0x7f00000003c0)='em0%$!,cgroup#\x00', &(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='9p\x00', 0x200000, &(0x7f0000000500)={'trans=virtio,', {[{@afid={'afid', 0x3d, 0x6}}, {@version_L='version=9p2000.L'}, {@cache_none='cache=none'}], [{@subj_role={'subj_role', 0x3d, '/dev/dsp#\x00'}}, {@permit_directio='permit_directio'}, {@measure='measure'}, {@context={'context', 0x3d, 'system_u'}}, {@obj_user={'obj_user'}}, {@dont_hash='dont_hash'}, {@subj_type={'subj_type', 0x3d, '\\eth0('}}, {@fsuuid={'fsuuid', 0x3d, {[0x36, 0x79, 0x0, 0x33, 0x61, 0x62, 0x32], 0x2d, [0x77, 0x32, 0x77, 0x34], 0x2d, [0x7f, 0x67, 0x37, 0x77], 0x2d, [0x0, 0x38, 0x32, 0x33], 0x2d, [0x35, 0x37, 0x7f, 0x7b, 0x37, 0x39, 0x77, 0x33]}}}, {@dont_measure='dont_measure'}]}}) ioctl$VIDIOC_ENUMINPUT(r1, 0xc050561a, &(0x7f0000000300)={0x4, "443b36c4364670c73c2ad26e1952769039650793d10fc72d24ce46e327d06e2f", 0x3, 0x100, 0x4, 0x1057ff, 0x0, 0x6}) 06:22:16 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = creat(&(0x7f0000000000)='./bus\x00', 0x0) getrlimit(0x0, &(0x7f00000000c0)) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x870000}) [ 441.266792][T16567] IPVS: ftp: loaded support on port[0] = 21 [ 441.307947][T16568] IPVS: ftp: loaded support on port[0] = 21 06:22:17 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000040)="2e0000002506817ee45ae087185082cf0f24b0eba06ec400002339e00586f9835b3f0016914879008cd90080e230", 0x2e}], 0x1}, 0x0) [ 441.452336][T16563] IPVS: ftp: loaded support on port[0] = 21 06:22:17 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000040)="2e0000052500817ee45ae087185082cf0f24b0eba06ec400002339e00586f9835b3f0016914879008cd90080e230", 0x2e}], 0x1}, 0x0) 06:22:18 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) getsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000400), &(0x7f0000000440)=0x8) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, &(0x7f00000019c0)={0x20}, 0x1) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r1, 0x111, 0x5, 0xc3, 0x4) r2 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x1, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r2, 0xc0045516, &(0x7f0000000040)=0x4) arch_prctl$ARCH_GET_CPUID(0x1011) getpgrp(0x0) flock(r0, 0x0) ioctl$BLKRRPART(0xffffffffffffffff, 0x125f, 0x0) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000200)={@mcast2}) fcntl$F_GET_FILE_RW_HINT(r0, 0x40d, 0x0) setsockopt$RDS_CONG_MONITOR(r2, 0x114, 0x6, &(0x7f0000000280), 0x4) ioctl$VHOST_SET_LOG_FD(r2, 0x4004af07, 0x0) ioctl$DRM_IOCTL_IRQ_BUSID(r2, 0xc0106403, &(0x7f0000000100)={0x8875, 0x800, 0x8000, 0xc2}) ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000180)) ioctl$VHOST_SET_VRING_CALL(0xffffffffffffffff, 0x4008af21, &(0x7f0000000380)={0x0, r1}) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x3, 'veth0\x00'}, 0x18) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.cpu/syz1\x00', 0x1ff) openat$snapshot(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/snapshot\x00', 0x0, 0x0) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0xf7fffffffffffffd, 0x2012, r2, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000a40)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x20008000}, 0x24044000) unshare(0x40000000) mount$9p_virtio(&(0x7f00000003c0)='em0%$!,cgroup#\x00', &(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='9p\x00', 0x200000, &(0x7f0000000500)={'trans=virtio,', {[{@afid={'afid', 0x3d, 0x6}}, {@version_L='version=9p2000.L'}, {@cache_none='cache=none'}], [{@subj_role={'subj_role', 0x3d, '/dev/dsp#\x00'}}, {@permit_directio='permit_directio'}, {@measure='measure'}, {@context={'context', 0x3d, 'system_u'}}, {@obj_user={'obj_user'}}, {@dont_hash='dont_hash'}, {@subj_type={'subj_type', 0x3d, '\\eth0('}}, {@fsuuid={'fsuuid', 0x3d, {[0x36, 0x79, 0x0, 0x33, 0x61, 0x62, 0x32], 0x2d, [0x77, 0x32, 0x77, 0x34], 0x2d, [0x7f, 0x67, 0x37, 0x77], 0x2d, [0x0, 0x38, 0x32, 0x33], 0x2d, [0x35, 0x37, 0x7f, 0x7b, 0x37, 0x39, 0x77, 0x33]}}}, {@dont_measure='dont_measure'}]}}) ioctl$VIDIOC_ENUMINPUT(r1, 0xc050561a, &(0x7f0000000300)={0x4, "443b36c4364670c73c2ad26e1952769039650793d10fc72d24ce46e327d06e2f", 0x3, 0x100, 0x4, 0x1057ff, 0x0, 0x6}) [ 442.588141][T16584] IPVS: ftp: loaded support on port[0] = 21 06:22:18 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) getsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000400), &(0x7f0000000440)=0x8) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, &(0x7f00000019c0)={0x20}, 0x1) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r1, 0x111, 0x5, 0xc3, 0x4) r2 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x1, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r2, 0xc0045516, &(0x7f0000000040)=0x4) arch_prctl$ARCH_GET_CPUID(0x1011) getpgrp(0x0) flock(r0, 0x0) ioctl$BLKRRPART(0xffffffffffffffff, 0x125f, 0x0) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000200)={@mcast2}) fcntl$F_GET_FILE_RW_HINT(r0, 0x40d, &(0x7f00000000c0)) setsockopt$RDS_CONG_MONITOR(r2, 0x114, 0x6, &(0x7f0000000280), 0x4) ioctl$VHOST_SET_LOG_FD(r2, 0x4004af07, 0x0) ioctl$DRM_IOCTL_IRQ_BUSID(r2, 0xc0106403, 0x0) ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000180)) ioctl$VHOST_SET_VRING_CALL(0xffffffffffffffff, 0x4008af21, &(0x7f0000000380)={0x0, r1}) r3 = fcntl$dupfd(r1, 0x0, r2) setsockopt$IP_VS_SO_SET_STOPDAEMON(r3, 0x0, 0x48c, &(0x7f0000000140)={0x3, 'veth0\x00'}, 0x18) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.cpu/syz1\x00', 0x1ff) openat$snapshot(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/snapshot\x00', 0x0, 0x0) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0xf7fffffffffffffd, 0x2012, r2, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000a40)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x20008000}, 0x24044000) unshare(0x40000000) mount$9p_virtio(&(0x7f00000003c0)='em0%$!,cgroup#\x00', &(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='9p\x00', 0x200000, &(0x7f0000000500)={'trans=virtio,', {[{@afid={'afid', 0x3d, 0x6}}, {@version_L='version=9p2000.L'}, {@cache_none='cache=none'}], [{@subj_role={'subj_role', 0x3d, '/dev/dsp#\x00'}}, {@permit_directio='permit_directio'}, {@measure='measure'}, {@context={'context', 0x3d, 'system_u'}}, {@obj_user={'obj_user'}}, {@dont_hash='dont_hash'}, {@subj_type={'subj_type', 0x3d, '\\eth0('}}, {@fsuuid={'fsuuid', 0x3d, {[0x36, 0x79, 0x0, 0x33, 0x61, 0x62, 0x32], 0x2d, [0x77, 0x32, 0x77, 0x34], 0x2d, [0x7f, 0x67, 0x37, 0x77], 0x2d, [0x0, 0x38, 0x32, 0x33], 0x2d, [0x35, 0x37, 0x7f, 0x7b, 0x37, 0x39, 0x77, 0x33]}}}, {@dont_measure='dont_measure'}]}}) ioctl$VIDIOC_ENUMINPUT(r1, 0xc050561a, &(0x7f0000000300)={0x4, "443b36c4364670c73c2ad26e1952769039650793d10fc72d24ce46e327d06e2f", 0x3, 0x100, 0x4, 0x1057ff, 0x0, 0x6}) 06:22:18 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000040)="2e0000062500817ee45ae087185082cf0f24b0eba06ec400002339e00586f9835b3f0016914879008cd90080e230", 0x2e}], 0x1}, 0x0) 06:22:18 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) getsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000400), &(0x7f0000000440)=0x8) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, &(0x7f00000019c0)={0x20}, 0x1) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r1, 0x111, 0x5, 0xc3, 0x4) r2 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x1, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r2, 0xc0045516, &(0x7f0000000040)=0x4) arch_prctl$ARCH_GET_CPUID(0x1011) getpgrp(0x0) flock(r0, 0x0) ioctl$BLKRRPART(0xffffffffffffffff, 0x125f, 0x0) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000200)={@mcast2}) fcntl$F_GET_FILE_RW_HINT(r0, 0x40d, &(0x7f00000000c0)) setsockopt$RDS_CONG_MONITOR(r2, 0x114, 0x6, &(0x7f0000000280), 0x4) ioctl$VHOST_SET_LOG_FD(r2, 0x4004af07, 0x0) ioctl$DRM_IOCTL_IRQ_BUSID(r2, 0xc0106403, &(0x7f0000000100)={0x8875, 0x800, 0x8000}) ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000180)) ioctl$VHOST_SET_VRING_CALL(0xffffffffffffffff, 0x4008af21, &(0x7f0000000380)={0x0, r1}) r3 = fcntl$dupfd(r1, 0x0, r2) setsockopt$IP_VS_SO_SET_STOPDAEMON(r3, 0x0, 0x48c, &(0x7f0000000140)={0x3, 'veth0\x00'}, 0x18) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.cpu/syz1\x00', 0x1ff) openat$snapshot(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/snapshot\x00', 0x0, 0x0) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0xf7fffffffffffffd, 0x2012, r2, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000a40)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x20008000}, 0x24044000) unshare(0x40000000) mount$9p_virtio(&(0x7f00000003c0)='em0%$!,cgroup#\x00', &(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='9p\x00', 0x200000, &(0x7f0000000500)={'trans=virtio,', {[{@afid={'afid', 0x3d, 0x6}}, {@version_L='version=9p2000.L'}, {@cache_none='cache=none'}], [{@subj_role={'subj_role', 0x3d, '/dev/dsp#\x00'}}, {@permit_directio='permit_directio'}, {@measure='measure'}, {@context={'context', 0x3d, 'system_u'}}, {@obj_user={'obj_user'}}, {@dont_hash='dont_hash'}, {@subj_type={'subj_type', 0x3d, '\\eth0('}}, {@fsuuid={'fsuuid', 0x3d, {[0x36, 0x79, 0x0, 0x33, 0x61, 0x62, 0x32], 0x2d, [0x77, 0x32, 0x77, 0x34], 0x2d, [0x7f, 0x67, 0x37, 0x77], 0x2d, [0x0, 0x38, 0x32, 0x33], 0x2d, [0x35, 0x37, 0x7f, 0x7b, 0x37, 0x39, 0x77, 0x33]}}}, {@dont_measure='dont_measure'}]}}) ioctl$VIDIOC_ENUMINPUT(r1, 0xc050561a, &(0x7f0000000300)={0x4, "443b36c4364670c73c2ad26e1952769039650793d10fc72d24ce46e327d06e2f", 0x3, 0x100, 0x4, 0x1057ff, 0x0, 0x6}) 06:22:18 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = creat(&(0x7f0000000000)='./bus\x00', 0x0) getrlimit(0x0, &(0x7f00000000c0)) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0c0583b, &(0x7f0000000040)={0x0, 0xa30000}) 06:22:18 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000040)="2e0000002507817ee45ae087185082cf0f24b0eba06ec400002339e00586f9835b3f0016914879008cd90080e230", 0x2e}], 0x1}, 0x0) 06:22:18 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000040)="2e0000072500817ee45ae087185082cf0f24b0eba06ec400002339e00586f9835b3f0016914879008cd90080e230", 0x2e}], 0x1}, 0x0) [ 443.267407][T16594] IPVS: ftp: loaded support on port[0] = 21 [ 443.463831][T16602] IPVS: ftp: loaded support on port[0] = 21 06:22:19 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) getsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000400), &(0x7f0000000440)=0x8) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, &(0x7f00000019c0)={0x20}, 0x1) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r1, 0x111, 0x5, 0xc3, 0x4) r2 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x1, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r2, 0xc0045516, &(0x7f0000000040)=0x4) arch_prctl$ARCH_GET_CPUID(0x1011) getpgrp(0x0) flock(r0, 0x0) ioctl$BLKRRPART(0xffffffffffffffff, 0x125f, 0x0) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000200)={@mcast2}) fcntl$F_GET_FILE_RW_HINT(r0, 0x40d, &(0x7f00000000c0)) setsockopt$RDS_CONG_MONITOR(r2, 0x114, 0x6, &(0x7f0000000280), 0x4) ioctl$VHOST_SET_LOG_FD(r2, 0x4004af07, 0x0) ioctl$DRM_IOCTL_IRQ_BUSID(r2, 0xc0106403, &(0x7f0000000100)={0x8875, 0x800, 0x8000}) ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000180)) ioctl$VHOST_SET_VRING_CALL(0xffffffffffffffff, 0x4008af21, &(0x7f0000000380)={0x0, r1}) r3 = fcntl$dupfd(r1, 0x0, r2) setsockopt$IP_VS_SO_SET_STOPDAEMON(r3, 0x0, 0x48c, &(0x7f0000000140)={0x3, 'veth0\x00'}, 0x18) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.cpu/syz1\x00', 0x1ff) openat$snapshot(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/snapshot\x00', 0x0, 0x0) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0xf7fffffffffffffd, 0x2012, r2, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000a40)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x20008000}, 0x24044000) unshare(0x40000000) mount$9p_virtio(&(0x7f00000003c0)='em0%$!,cgroup#\x00', &(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='9p\x00', 0x200000, &(0x7f0000000500)={'trans=virtio,', {[{@afid={'afid', 0x3d, 0x6}}, {@version_L='version=9p2000.L'}, {@cache_none='cache=none'}], [{@subj_role={'subj_role', 0x3d, '/dev/dsp#\x00'}}, {@permit_directio='permit_directio'}, {@measure='measure'}, {@context={'context', 0x3d, 'system_u'}}, {@obj_user={'obj_user'}}, {@dont_hash='dont_hash'}, {@subj_type={'subj_type', 0x3d, '\\eth0('}}, {@fsuuid={'fsuuid', 0x3d, {[0x36, 0x79, 0x0, 0x33, 0x61, 0x62, 0x32], 0x2d, [0x77, 0x32, 0x77, 0x34], 0x2d, [0x7f, 0x67, 0x37, 0x77], 0x2d, [0x0, 0x38, 0x32, 0x33], 0x2d, [0x35, 0x37, 0x7f, 0x7b, 0x37, 0x39, 0x77, 0x33]}}}, {@dont_measure='dont_measure'}]}}) ioctl$VIDIOC_ENUMINPUT(r1, 0xc050561a, &(0x7f0000000300)={0x4, "443b36c4364670c73c2ad26e1952769039650793d10fc72d24ce46e327d06e2f", 0x3, 0x100, 0x4, 0x1057ff, 0x0, 0x6}) 06:22:19 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) getsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000400), &(0x7f0000000440)=0x8) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, &(0x7f00000019c0)={0x20}, 0x1) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r1, 0x111, 0x5, 0xc3, 0x4) r2 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x1, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r2, 0xc0045516, &(0x7f0000000040)=0x4) arch_prctl$ARCH_GET_CPUID(0x1011) getpgrp(0x0) flock(r0, 0x0) ioctl$BLKRRPART(0xffffffffffffffff, 0x125f, 0x0) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000200)={@mcast2}) fcntl$F_GET_FILE_RW_HINT(r0, 0x40d, 0x0) setsockopt$RDS_CONG_MONITOR(r2, 0x114, 0x6, &(0x7f0000000280), 0x4) ioctl$VHOST_SET_LOG_FD(r2, 0x4004af07, 0x0) ioctl$DRM_IOCTL_IRQ_BUSID(r2, 0xc0106403, &(0x7f0000000100)={0x8875, 0x800, 0x8000, 0xc2}) ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000180)) ioctl$VHOST_SET_VRING_CALL(0xffffffffffffffff, 0x4008af21, &(0x7f0000000380)={0x0, r1}) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x3, 'veth0\x00'}, 0x18) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.cpu/syz1\x00', 0x1ff) openat$snapshot(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/snapshot\x00', 0x0, 0x0) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0xf7fffffffffffffd, 0x2012, r2, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000a40)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x20008000}, 0x24044000) unshare(0x40000000) mount$9p_virtio(&(0x7f00000003c0)='em0%$!,cgroup#\x00', &(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='9p\x00', 0x200000, &(0x7f0000000500)={'trans=virtio,', {[{@afid={'afid', 0x3d, 0x6}}, {@version_L='version=9p2000.L'}, {@cache_none='cache=none'}], [{@subj_role={'subj_role', 0x3d, '/dev/dsp#\x00'}}, {@permit_directio='permit_directio'}, {@measure='measure'}, {@context={'context', 0x3d, 'system_u'}}, {@obj_user={'obj_user'}}, {@dont_hash='dont_hash'}, {@subj_type={'subj_type', 0x3d, '\\eth0('}}, {@fsuuid={'fsuuid', 0x3d, {[0x36, 0x79, 0x0, 0x33, 0x61, 0x62, 0x32], 0x2d, [0x77, 0x32, 0x77, 0x34], 0x2d, [0x7f, 0x67, 0x37, 0x77], 0x2d, [0x0, 0x38, 0x32, 0x33], 0x2d, [0x35, 0x37, 0x7f, 0x7b, 0x37, 0x39, 0x77, 0x33]}}}, {@dont_measure='dont_measure'}]}}) ioctl$VIDIOC_ENUMINPUT(r1, 0xc050561a, &(0x7f0000000300)={0x4, "443b36c4364670c73c2ad26e1952769039650793d10fc72d24ce46e327d06e2f", 0x3, 0x100, 0x4, 0x1057ff, 0x0, 0x6}) 06:22:19 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000040)="2e0000002508817ee45ae087185082cf0f24b0eba06ec400002339e00586f9835b3f0016914879008cd90080e230", 0x2e}], 0x1}, 0x0) 06:22:19 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000040)="2e00000a2500817ee45ae087185082cf0f24b0eba06ec400002339e00586f9835b3f0016914879008cd90080e230", 0x2e}], 0x1}, 0x0) [ 444.559539][T16618] IPVS: ftp: loaded support on port[0] = 21 [ 444.570877][T16616] IPVS: ftp: loaded support on port[0] = 21 06:22:21 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = creat(&(0x7f0000000000)='./bus\x00', 0x0) getrlimit(0x0, &(0x7f00000000c0)) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0c0583b, &(0x7f0000000040)={0x0, 0xa50000}) 06:22:21 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) getsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000400), &(0x7f0000000440)=0x8) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, &(0x7f00000019c0)={0x20}, 0x1) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r1, 0x111, 0x5, 0xc3, 0x4) r2 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x1, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r2, 0xc0045516, &(0x7f0000000040)=0x4) arch_prctl$ARCH_GET_CPUID(0x1011) getpgrp(0x0) flock(r0, 0x0) ioctl$BLKRRPART(0xffffffffffffffff, 0x125f, 0x0) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000200)={@mcast2}) fcntl$F_GET_FILE_RW_HINT(r0, 0x40d, 0x0) setsockopt$RDS_CONG_MONITOR(r2, 0x114, 0x6, &(0x7f0000000280), 0x4) ioctl$VHOST_SET_LOG_FD(r2, 0x4004af07, 0x0) ioctl$DRM_IOCTL_IRQ_BUSID(r2, 0xc0106403, &(0x7f0000000100)={0x8875, 0x800, 0x8000, 0xc2}) ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000180)) ioctl$VHOST_SET_VRING_CALL(0xffffffffffffffff, 0x4008af21, &(0x7f0000000380)={0x0, r1}) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x3, 'veth0\x00'}, 0x18) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.cpu/syz1\x00', 0x1ff) openat$snapshot(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/snapshot\x00', 0x0, 0x0) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0xf7fffffffffffffd, 0x2012, r2, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000a40)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x20008000}, 0x24044000) unshare(0x40000000) mount$9p_virtio(&(0x7f00000003c0)='em0%$!,cgroup#\x00', &(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='9p\x00', 0x200000, &(0x7f0000000500)={'trans=virtio,', {[{@afid={'afid', 0x3d, 0x6}}, {@version_L='version=9p2000.L'}, {@cache_none='cache=none'}], [{@subj_role={'subj_role', 0x3d, '/dev/dsp#\x00'}}, {@permit_directio='permit_directio'}, {@measure='measure'}, {@context={'context', 0x3d, 'system_u'}}, {@obj_user={'obj_user'}}, {@dont_hash='dont_hash'}, {@subj_type={'subj_type', 0x3d, '\\eth0('}}, {@fsuuid={'fsuuid', 0x3d, {[0x36, 0x79, 0x0, 0x33, 0x61, 0x62, 0x32], 0x2d, [0x77, 0x32, 0x77, 0x34], 0x2d, [0x7f, 0x67, 0x37, 0x77], 0x2d, [0x0, 0x38, 0x32, 0x33], 0x2d, [0x35, 0x37, 0x7f, 0x7b, 0x37, 0x39, 0x77, 0x33]}}}, {@dont_measure='dont_measure'}]}}) ioctl$VIDIOC_ENUMINPUT(r1, 0xc050561a, &(0x7f0000000300)={0x4, "443b36c4364670c73c2ad26e1952769039650793d10fc72d24ce46e327d06e2f", 0x3, 0x100, 0x4, 0x1057ff, 0x0, 0x6}) 06:22:21 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) getsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000400), &(0x7f0000000440)=0x8) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, &(0x7f00000019c0)={0x20}, 0x1) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r1, 0x111, 0x5, 0xc3, 0x4) r2 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x1, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r2, 0xc0045516, &(0x7f0000000040)=0x4) arch_prctl$ARCH_GET_CPUID(0x1011) getpgrp(0x0) flock(r0, 0x0) ioctl$BLKRRPART(0xffffffffffffffff, 0x125f, 0x0) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000200)={@mcast2}) fcntl$F_GET_FILE_RW_HINT(r0, 0x40d, &(0x7f00000000c0)) setsockopt$RDS_CONG_MONITOR(r2, 0x114, 0x6, &(0x7f0000000280), 0x4) ioctl$VHOST_SET_LOG_FD(r2, 0x4004af07, 0x0) ioctl$DRM_IOCTL_IRQ_BUSID(r2, 0xc0106403, 0x0) ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000180)) ioctl$VHOST_SET_VRING_CALL(0xffffffffffffffff, 0x4008af21, &(0x7f0000000380)={0x0, r1}) r3 = fcntl$dupfd(r1, 0x0, r2) setsockopt$IP_VS_SO_SET_STOPDAEMON(r3, 0x0, 0x48c, &(0x7f0000000140)={0x3, 'veth0\x00'}, 0x18) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.cpu/syz1\x00', 0x1ff) openat$snapshot(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/snapshot\x00', 0x0, 0x0) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0xf7fffffffffffffd, 0x2012, r2, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000a40)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x20008000}, 0x24044000) unshare(0x40000000) mount$9p_virtio(&(0x7f00000003c0)='em0%$!,cgroup#\x00', &(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='9p\x00', 0x200000, &(0x7f0000000500)={'trans=virtio,', {[{@afid={'afid', 0x3d, 0x6}}, {@version_L='version=9p2000.L'}, {@cache_none='cache=none'}], [{@subj_role={'subj_role', 0x3d, '/dev/dsp#\x00'}}, {@permit_directio='permit_directio'}, {@measure='measure'}, {@context={'context', 0x3d, 'system_u'}}, {@obj_user={'obj_user'}}, {@dont_hash='dont_hash'}, {@subj_type={'subj_type', 0x3d, '\\eth0('}}, {@fsuuid={'fsuuid', 0x3d, {[0x36, 0x79, 0x0, 0x33, 0x61, 0x62, 0x32], 0x2d, [0x77, 0x32, 0x77, 0x34], 0x2d, [0x7f, 0x67, 0x37, 0x77], 0x2d, [0x0, 0x38, 0x32, 0x33], 0x2d, [0x35, 0x37, 0x7f, 0x7b, 0x37, 0x39, 0x77, 0x33]}}}, {@dont_measure='dont_measure'}]}}) ioctl$VIDIOC_ENUMINPUT(r1, 0xc050561a, &(0x7f0000000300)={0x4, "443b36c4364670c73c2ad26e1952769039650793d10fc72d24ce46e327d06e2f", 0x3, 0x100, 0x4, 0x1057ff, 0x0, 0x6}) 06:22:21 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000040)="2e00000e2500817ee45ae087185082cf0f24b0eba06ec400002339e00586f9835b3f0016914879008cd90080e230", 0x2e}], 0x1}, 0x0) 06:22:21 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000040)="2e000000250a817ee45ae087185082cf0f24b0eba06ec400002339e00586f9835b3f0016914879008cd90080e230", 0x2e}], 0x1}, 0x0) 06:22:21 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) getsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000400), &(0x7f0000000440)=0x8) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, &(0x7f00000019c0)={0x20}, 0x1) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r1, 0x111, 0x5, 0xc3, 0x4) r2 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x1, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r2, 0xc0045516, &(0x7f0000000040)=0x4) arch_prctl$ARCH_GET_CPUID(0x1011) getpgrp(0x0) flock(r0, 0x0) ioctl$BLKRRPART(0xffffffffffffffff, 0x125f, 0x0) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000200)={@mcast2}) fcntl$F_GET_FILE_RW_HINT(r0, 0x40d, &(0x7f00000000c0)) setsockopt$RDS_CONG_MONITOR(r2, 0x114, 0x6, &(0x7f0000000280), 0x4) ioctl$VHOST_SET_LOG_FD(r2, 0x4004af07, 0x0) ioctl$DRM_IOCTL_IRQ_BUSID(r2, 0xc0106403, &(0x7f0000000100)={0x8875, 0x800, 0x8000, 0xc2}) ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, 0x0) ioctl$VHOST_SET_VRING_CALL(0xffffffffffffffff, 0x4008af21, &(0x7f0000000380)={0x0, r1}) r3 = fcntl$dupfd(r1, 0x0, r2) setsockopt$IP_VS_SO_SET_STOPDAEMON(r3, 0x0, 0x48c, &(0x7f0000000140)={0x3, 'veth0\x00'}, 0x18) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.cpu/syz1\x00', 0x1ff) openat$snapshot(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/snapshot\x00', 0x0, 0x0) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0xf7fffffffffffffd, 0x2012, r2, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000a40)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x20008000}, 0x24044000) unshare(0x40000000) mount$9p_virtio(&(0x7f00000003c0)='em0%$!,cgroup#\x00', &(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='9p\x00', 0x200000, &(0x7f0000000500)={'trans=virtio,', {[{@afid={'afid', 0x3d, 0x6}}, {@version_L='version=9p2000.L'}, {@cache_none='cache=none'}], [{@subj_role={'subj_role', 0x3d, '/dev/dsp#\x00'}}, {@permit_directio='permit_directio'}, {@measure='measure'}, {@context={'context', 0x3d, 'system_u'}}, {@obj_user={'obj_user'}}, {@dont_hash='dont_hash'}, {@subj_type={'subj_type', 0x3d, '\\eth0('}}, {@fsuuid={'fsuuid', 0x3d, {[0x36, 0x79, 0x0, 0x33, 0x61, 0x62, 0x32], 0x2d, [0x77, 0x32, 0x77, 0x34], 0x2d, [0x7f, 0x67, 0x37, 0x77], 0x2d, [0x0, 0x38, 0x32, 0x33], 0x2d, [0x35, 0x37, 0x7f, 0x7b, 0x37, 0x39, 0x77, 0x33]}}}, {@dont_measure='dont_measure'}]}}) ioctl$VIDIOC_ENUMINPUT(r1, 0xc050561a, &(0x7f0000000300)={0x4, "443b36c4364670c73c2ad26e1952769039650793d10fc72d24ce46e327d06e2f", 0x3, 0x100, 0x4, 0x1057ff, 0x0, 0x6}) 06:22:21 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = creat(&(0x7f0000000000)='./bus\x00', 0x0) getrlimit(0x0, &(0x7f00000000c0)) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0c0583b, &(0x7f0000000040)={0x0, 0xb60200}) [ 446.080301][T16632] IPVS: ftp: loaded support on port[0] = 21 [ 446.118444][T16637] IPVS: ftp: loaded support on port[0] = 21 06:22:23 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000040)="2e000000250e817ee45ae087185082cf0f24b0eba06ec400002339e00586f9835b3f0016914879008cd90080e230", 0x2e}], 0x1}, 0x0) [ 447.353511][T16641] IPVS: ftp: loaded support on port[0] = 21 06:22:23 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) getsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000400), &(0x7f0000000440)=0x8) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, &(0x7f00000019c0)={0x20}, 0x1) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r1, 0x111, 0x5, 0xc3, 0x4) r2 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x1, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r2, 0xc0045516, &(0x7f0000000040)=0x4) arch_prctl$ARCH_GET_CPUID(0x1011) getpgrp(0x0) flock(r0, 0x0) ioctl$BLKRRPART(0xffffffffffffffff, 0x125f, 0x0) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000200)={@mcast2}) fcntl$F_GET_FILE_RW_HINT(r0, 0x40d, &(0x7f00000000c0)) setsockopt$RDS_CONG_MONITOR(r2, 0x114, 0x6, &(0x7f0000000280), 0x4) ioctl$VHOST_SET_LOG_FD(r2, 0x4004af07, 0x0) ioctl$DRM_IOCTL_IRQ_BUSID(r2, 0xc0106403, 0x0) ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000180)) ioctl$VHOST_SET_VRING_CALL(0xffffffffffffffff, 0x4008af21, &(0x7f0000000380)={0x0, r1}) r3 = fcntl$dupfd(r1, 0x0, r2) setsockopt$IP_VS_SO_SET_STOPDAEMON(r3, 0x0, 0x48c, &(0x7f0000000140)={0x3, 'veth0\x00'}, 0x18) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.cpu/syz1\x00', 0x1ff) openat$snapshot(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/snapshot\x00', 0x0, 0x0) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0xf7fffffffffffffd, 0x2012, r2, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000a40)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x20008000}, 0x24044000) unshare(0x40000000) mount$9p_virtio(&(0x7f00000003c0)='em0%$!,cgroup#\x00', &(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='9p\x00', 0x200000, &(0x7f0000000500)={'trans=virtio,', {[{@afid={'afid', 0x3d, 0x6}}, {@version_L='version=9p2000.L'}, {@cache_none='cache=none'}], [{@subj_role={'subj_role', 0x3d, '/dev/dsp#\x00'}}, {@permit_directio='permit_directio'}, {@measure='measure'}, {@context={'context', 0x3d, 'system_u'}}, {@obj_user={'obj_user'}}, {@dont_hash='dont_hash'}, {@subj_type={'subj_type', 0x3d, '\\eth0('}}, {@fsuuid={'fsuuid', 0x3d, {[0x36, 0x79, 0x0, 0x33, 0x61, 0x62, 0x32], 0x2d, [0x77, 0x32, 0x77, 0x34], 0x2d, [0x7f, 0x67, 0x37, 0x77], 0x2d, [0x0, 0x38, 0x32, 0x33], 0x2d, [0x35, 0x37, 0x7f, 0x7b, 0x37, 0x39, 0x77, 0x33]}}}, {@dont_measure='dont_measure'}]}}) ioctl$VIDIOC_ENUMINPUT(r1, 0xc050561a, &(0x7f0000000300)={0x4, "443b36c4364670c73c2ad26e1952769039650793d10fc72d24ce46e327d06e2f", 0x3, 0x100, 0x4, 0x1057ff, 0x0, 0x6}) 06:22:23 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = creat(&(0x7f0000000000)='./bus\x00', 0x0) getrlimit(0x0, &(0x7f00000000c0)) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0c0583b, &(0x7f0000000040)={0x0, 0xf80700}) 06:22:23 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000040)="2e0000002510817ee45ae087185082cf0f24b0eba06ec400002339e00586f9835b3f0016914879008cd90080e230", 0x2e}], 0x1}, 0x0) 06:22:23 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) getsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000400), &(0x7f0000000440)=0x8) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, &(0x7f00000019c0)={0x20}, 0x1) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r1, 0x111, 0x5, 0xc3, 0x4) r2 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x1, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r2, 0xc0045516, &(0x7f0000000040)=0x4) arch_prctl$ARCH_GET_CPUID(0x1011) getpgrp(0x0) flock(r0, 0x0) ioctl$BLKRRPART(0xffffffffffffffff, 0x125f, 0x0) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000200)={@mcast2}) fcntl$F_GET_FILE_RW_HINT(r0, 0x40d, 0x0) setsockopt$RDS_CONG_MONITOR(r2, 0x114, 0x6, &(0x7f0000000280), 0x4) ioctl$VHOST_SET_LOG_FD(r2, 0x4004af07, 0x0) ioctl$DRM_IOCTL_IRQ_BUSID(r2, 0xc0106403, &(0x7f0000000100)={0x8875, 0x800, 0x8000, 0xc2}) ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000180)) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x3, 'veth0\x00'}, 0x18) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.cpu/syz1\x00', 0x1ff) openat$snapshot(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/snapshot\x00', 0x0, 0x0) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0xf7fffffffffffffd, 0x2012, r2, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000a40)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x20008000}, 0x24044000) unshare(0x40000000) mount$9p_virtio(&(0x7f00000003c0)='em0%$!,cgroup#\x00', &(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='9p\x00', 0x200000, &(0x7f0000000500)={'trans=virtio,', {[{@afid={'afid', 0x3d, 0x6}}, {@version_L='version=9p2000.L'}, {@cache_none='cache=none'}], [{@subj_role={'subj_role', 0x3d, '/dev/dsp#\x00'}}, {@permit_directio='permit_directio'}, {@measure='measure'}, {@context={'context', 0x3d, 'system_u'}}, {@obj_user={'obj_user'}}, {@dont_hash='dont_hash'}, {@subj_type={'subj_type', 0x3d, '\\eth0('}}, {@fsuuid={'fsuuid', 0x3d, {[0x36, 0x79, 0x0, 0x33, 0x61, 0x62, 0x32], 0x2d, [0x77, 0x32, 0x77, 0x34], 0x2d, [0x7f, 0x67, 0x37, 0x77], 0x2d, [0x0, 0x38, 0x32, 0x33], 0x2d, [0x35, 0x37, 0x7f, 0x7b, 0x37, 0x39, 0x77, 0x33]}}}, {@dont_measure='dont_measure'}]}}) ioctl$VIDIOC_ENUMINPUT(r1, 0xc050561a, &(0x7f0000000300)={0x4, "443b36c4364670c73c2ad26e1952769039650793d10fc72d24ce46e327d06e2f", 0x3, 0x100, 0x4, 0x1057ff, 0x0, 0x6}) 06:22:23 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000040)="2e00000f2500817ee45ae087185082cf0f24b0eba06ec400002339e00586f9835b3f0016914879008cd90080e230", 0x2e}], 0x1}, 0x0) [ 447.828364][T16656] IPVS: ftp: loaded support on port[0] = 21 [ 448.150607][T16665] IPVS: ftp: loaded support on port[0] = 21 06:22:24 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) getsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000400), &(0x7f0000000440)=0x8) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, &(0x7f00000019c0)={0x20}, 0x1) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r1, 0x111, 0x5, 0xc3, 0x4) r2 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x1, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r2, 0xc0045516, &(0x7f0000000040)=0x4) arch_prctl$ARCH_GET_CPUID(0x1011) getpgrp(0x0) flock(r0, 0x0) ioctl$BLKRRPART(0xffffffffffffffff, 0x125f, 0x0) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000200)={@mcast2}) fcntl$F_GET_FILE_RW_HINT(r0, 0x40d, &(0x7f00000000c0)) setsockopt$RDS_CONG_MONITOR(r2, 0x114, 0x6, &(0x7f0000000280), 0x4) ioctl$VHOST_SET_LOG_FD(r2, 0x4004af07, 0x0) ioctl$DRM_IOCTL_IRQ_BUSID(r2, 0xc0106403, &(0x7f0000000100)={0x8875, 0x800, 0x8000, 0xc2}) ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, 0x0) ioctl$VHOST_SET_VRING_CALL(0xffffffffffffffff, 0x4008af21, &(0x7f0000000380)={0x0, r1}) r3 = fcntl$dupfd(r1, 0x0, r2) setsockopt$IP_VS_SO_SET_STOPDAEMON(r3, 0x0, 0x48c, &(0x7f0000000140)={0x3, 'veth0\x00'}, 0x18) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.cpu/syz1\x00', 0x1ff) openat$snapshot(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/snapshot\x00', 0x0, 0x0) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0xf7fffffffffffffd, 0x2012, r2, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000a40)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x20008000}, 0x24044000) unshare(0x40000000) mount$9p_virtio(&(0x7f00000003c0)='em0%$!,cgroup#\x00', &(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='9p\x00', 0x200000, &(0x7f0000000500)={'trans=virtio,', {[{@afid={'afid', 0x3d, 0x6}}, {@version_L='version=9p2000.L'}, {@cache_none='cache=none'}], [{@subj_role={'subj_role', 0x3d, '/dev/dsp#\x00'}}, {@permit_directio='permit_directio'}, {@measure='measure'}, {@context={'context', 0x3d, 'system_u'}}, {@obj_user={'obj_user'}}, {@dont_hash='dont_hash'}, {@subj_type={'subj_type', 0x3d, '\\eth0('}}, {@fsuuid={'fsuuid', 0x3d, {[0x36, 0x79, 0x0, 0x33, 0x61, 0x62, 0x32], 0x2d, [0x77, 0x32, 0x77, 0x34], 0x2d, [0x7f, 0x67, 0x37, 0x77], 0x2d, [0x0, 0x38, 0x32, 0x33], 0x2d, [0x35, 0x37, 0x7f, 0x7b, 0x37, 0x39, 0x77, 0x33]}}}, {@dont_measure='dont_measure'}]}}) ioctl$VIDIOC_ENUMINPUT(r1, 0xc050561a, &(0x7f0000000300)={0x4, "443b36c4364670c73c2ad26e1952769039650793d10fc72d24ce46e327d06e2f", 0x3, 0x100, 0x4, 0x1057ff, 0x0, 0x6}) [ 448.555191][T16667] IPVS: ftp: loaded support on port[0] = 21 06:22:24 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000040)="2e0000202500817ee45ae087185082cf0f24b0eba06ec400002339e00586f9835b3f0016914879008cd90080e230", 0x2e}], 0x1}, 0x0) 06:22:24 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = creat(&(0x7f0000000000)='./bus\x00', 0x0) getrlimit(0x0, &(0x7f00000000c0)) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0c0583b, &(0x7f0000000040)={0x0, 0xff0700}) 06:22:24 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) getsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000400), &(0x7f0000000440)=0x8) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, &(0x7f00000019c0)={0x20}, 0x1) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r1, 0x111, 0x5, 0xc3, 0x4) r2 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x1, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r2, 0xc0045516, &(0x7f0000000040)=0x4) arch_prctl$ARCH_GET_CPUID(0x1011) getpgrp(0x0) flock(r0, 0x0) ioctl$BLKRRPART(0xffffffffffffffff, 0x125f, 0x0) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000200)={@mcast2}) fcntl$F_GET_FILE_RW_HINT(r0, 0x40d, &(0x7f00000000c0)) setsockopt$RDS_CONG_MONITOR(r2, 0x114, 0x6, &(0x7f0000000280), 0x4) ioctl$VHOST_SET_LOG_FD(r2, 0x4004af07, 0x0) ioctl$DRM_IOCTL_IRQ_BUSID(r2, 0xc0106403, &(0x7f0000000100)={0x8875, 0x800, 0x8000, 0xc2}) ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, 0x0) ioctl$VHOST_SET_VRING_CALL(0xffffffffffffffff, 0x4008af21, &(0x7f0000000380)={0x0, r1}) r3 = fcntl$dupfd(r1, 0x0, r2) setsockopt$IP_VS_SO_SET_STOPDAEMON(r3, 0x0, 0x48c, &(0x7f0000000140)={0x3, 'veth0\x00'}, 0x18) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.cpu/syz1\x00', 0x1ff) openat$snapshot(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/snapshot\x00', 0x0, 0x0) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0xf7fffffffffffffd, 0x2012, r2, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000a40)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x20008000}, 0x24044000) unshare(0x40000000) mount$9p_virtio(&(0x7f00000003c0)='em0%$!,cgroup#\x00', &(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='9p\x00', 0x200000, &(0x7f0000000500)={'trans=virtio,', {[{@afid={'afid', 0x3d, 0x6}}, {@version_L='version=9p2000.L'}, {@cache_none='cache=none'}], [{@subj_role={'subj_role', 0x3d, '/dev/dsp#\x00'}}, {@permit_directio='permit_directio'}, {@measure='measure'}, {@context={'context', 0x3d, 'system_u'}}, {@obj_user={'obj_user'}}, {@dont_hash='dont_hash'}, {@subj_type={'subj_type', 0x3d, '\\eth0('}}, {@fsuuid={'fsuuid', 0x3d, {[0x36, 0x79, 0x0, 0x33, 0x61, 0x62, 0x32], 0x2d, [0x77, 0x32, 0x77, 0x34], 0x2d, [0x7f, 0x67, 0x37, 0x77], 0x2d, [0x0, 0x38, 0x32, 0x33], 0x2d, [0x35, 0x37, 0x7f, 0x7b, 0x37, 0x39, 0x77, 0x33]}}}, {@dont_measure='dont_measure'}]}}) ioctl$VIDIOC_ENUMINPUT(r1, 0xc050561a, &(0x7f0000000300)={0x4, "443b36c4364670c73c2ad26e1952769039650793d10fc72d24ce46e327d06e2f", 0x3, 0x100, 0x4, 0x1057ff, 0x0, 0x6}) 06:22:24 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) getsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000400), &(0x7f0000000440)=0x8) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, &(0x7f00000019c0)={0x20}, 0x1) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r1, 0x111, 0x5, 0xc3, 0x4) r2 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x1, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r2, 0xc0045516, &(0x7f0000000040)=0x4) arch_prctl$ARCH_GET_CPUID(0x1011) getpgrp(0x0) flock(r0, 0x0) ioctl$BLKRRPART(0xffffffffffffffff, 0x125f, 0x0) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000200)={@mcast2}) fcntl$F_GET_FILE_RW_HINT(r0, 0x40d, 0x0) setsockopt$RDS_CONG_MONITOR(r2, 0x114, 0x6, &(0x7f0000000280), 0x4) ioctl$VHOST_SET_LOG_FD(r2, 0x4004af07, 0x0) ioctl$DRM_IOCTL_IRQ_BUSID(r2, 0xc0106403, &(0x7f0000000100)={0x8875, 0x800, 0x8000, 0xc2}) ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000180)) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x3, 'veth0\x00'}, 0x18) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.cpu/syz1\x00', 0x1ff) openat$snapshot(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/snapshot\x00', 0x0, 0x0) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0xf7fffffffffffffd, 0x2012, r2, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000a40)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x20008000}, 0x24044000) unshare(0x40000000) mount$9p_virtio(&(0x7f00000003c0)='em0%$!,cgroup#\x00', &(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='9p\x00', 0x200000, &(0x7f0000000500)={'trans=virtio,', {[{@afid={'afid', 0x3d, 0x6}}, {@version_L='version=9p2000.L'}, {@cache_none='cache=none'}], [{@subj_role={'subj_role', 0x3d, '/dev/dsp#\x00'}}, {@permit_directio='permit_directio'}, {@measure='measure'}, {@context={'context', 0x3d, 'system_u'}}, {@obj_user={'obj_user'}}, {@dont_hash='dont_hash'}, {@subj_type={'subj_type', 0x3d, '\\eth0('}}, {@fsuuid={'fsuuid', 0x3d, {[0x36, 0x79, 0x0, 0x33, 0x61, 0x62, 0x32], 0x2d, [0x77, 0x32, 0x77, 0x34], 0x2d, [0x7f, 0x67, 0x37, 0x77], 0x2d, [0x0, 0x38, 0x32, 0x33], 0x2d, [0x35, 0x37, 0x7f, 0x7b, 0x37, 0x39, 0x77, 0x33]}}}, {@dont_measure='dont_measure'}]}}) ioctl$VIDIOC_ENUMINPUT(r1, 0xc050561a, &(0x7f0000000300)={0x4, "443b36c4364670c73c2ad26e1952769039650793d10fc72d24ce46e327d06e2f", 0x3, 0x100, 0x4, 0x1057ff, 0x0, 0x6}) 06:22:24 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000040)="2e00003f2500817ee45ae087185082cf0f24b0eba06ec400002339e00586f9835b3f0016914879008cd90080e230", 0x2e}], 0x1}, 0x0) 06:22:24 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000040)="2e0000002548817ee45ae087185082cf0f24b0eba06ec400002339e00586f9835b3f0016914879008cd90080e230", 0x2e}], 0x1}, 0x0) 06:22:25 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) getsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000400), &(0x7f0000000440)=0x8) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, &(0x7f00000019c0)={0x20}, 0x1) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r1, 0x111, 0x5, 0xc3, 0x4) r2 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x1, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r2, 0xc0045516, &(0x7f0000000040)=0x4) arch_prctl$ARCH_GET_CPUID(0x1011) getpgrp(0x0) flock(r0, 0x0) ioctl$BLKRRPART(0xffffffffffffffff, 0x125f, 0x0) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000200)={@mcast2}) fcntl$F_GET_FILE_RW_HINT(r0, 0x40d, &(0x7f00000000c0)) setsockopt$RDS_CONG_MONITOR(r2, 0x114, 0x6, &(0x7f0000000280), 0x4) ioctl$VHOST_SET_LOG_FD(r2, 0x4004af07, 0x0) ioctl$DRM_IOCTL_IRQ_BUSID(r2, 0xc0106403, &(0x7f0000000100)={0x8875, 0x800, 0x8000, 0xc2}) ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, 0x0) ioctl$VHOST_SET_VRING_CALL(0xffffffffffffffff, 0x4008af21, &(0x7f0000000380)={0x0, r1}) r3 = fcntl$dupfd(r1, 0x0, r2) setsockopt$IP_VS_SO_SET_STOPDAEMON(r3, 0x0, 0x48c, &(0x7f0000000140)={0x3, 'veth0\x00'}, 0x18) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.cpu/syz1\x00', 0x1ff) openat$snapshot(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/snapshot\x00', 0x0, 0x0) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0xf7fffffffffffffd, 0x2012, r2, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000a40)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x20008000}, 0x24044000) unshare(0x40000000) mount$9p_virtio(&(0x7f00000003c0)='em0%$!,cgroup#\x00', &(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='9p\x00', 0x200000, &(0x7f0000000500)={'trans=virtio,', {[{@afid={'afid', 0x3d, 0x6}}, {@version_L='version=9p2000.L'}, {@cache_none='cache=none'}], [{@subj_role={'subj_role', 0x3d, '/dev/dsp#\x00'}}, {@permit_directio='permit_directio'}, {@measure='measure'}, {@context={'context', 0x3d, 'system_u'}}, {@obj_user={'obj_user'}}, {@dont_hash='dont_hash'}, {@subj_type={'subj_type', 0x3d, '\\eth0('}}, {@fsuuid={'fsuuid', 0x3d, {[0x36, 0x79, 0x0, 0x33, 0x61, 0x62, 0x32], 0x2d, [0x77, 0x32, 0x77, 0x34], 0x2d, [0x7f, 0x67, 0x37, 0x77], 0x2d, [0x0, 0x38, 0x32, 0x33], 0x2d, [0x35, 0x37, 0x7f, 0x7b, 0x37, 0x39, 0x77, 0x33]}}}, {@dont_measure='dont_measure'}]}}) ioctl$VIDIOC_ENUMINPUT(r1, 0xc050561a, &(0x7f0000000300)={0x4, "443b36c4364670c73c2ad26e1952769039650793d10fc72d24ce46e327d06e2f", 0x3, 0x100, 0x4, 0x1057ff, 0x0, 0x6}) [ 449.387277][T16683] IPVS: ftp: loaded support on port[0] = 21 [ 449.473766][T16688] IPVS: ftp: loaded support on port[0] = 21 06:22:26 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) getsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000400), &(0x7f0000000440)=0x8) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, &(0x7f00000019c0)={0x20}, 0x1) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r1, 0x111, 0x5, 0xc3, 0x4) r2 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x1, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r2, 0xc0045516, &(0x7f0000000040)=0x4) arch_prctl$ARCH_GET_CPUID(0x1011) getpgrp(0x0) flock(r0, 0x0) ioctl$BLKRRPART(0xffffffffffffffff, 0x125f, 0x0) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000200)={@mcast2}) fcntl$F_GET_FILE_RW_HINT(r0, 0x40d, 0x0) setsockopt$RDS_CONG_MONITOR(r2, 0x114, 0x6, &(0x7f0000000280), 0x4) ioctl$VHOST_SET_LOG_FD(r2, 0x4004af07, 0x0) ioctl$DRM_IOCTL_IRQ_BUSID(r2, 0xc0106403, &(0x7f0000000100)={0x8875, 0x800, 0x8000, 0xc2}) ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000180)) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x3, 'veth0\x00'}, 0x18) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.cpu/syz1\x00', 0x1ff) openat$snapshot(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/snapshot\x00', 0x0, 0x0) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0xf7fffffffffffffd, 0x2012, r2, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000a40)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x20008000}, 0x24044000) unshare(0x40000000) mount$9p_virtio(&(0x7f00000003c0)='em0%$!,cgroup#\x00', &(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='9p\x00', 0x200000, &(0x7f0000000500)={'trans=virtio,', {[{@afid={'afid', 0x3d, 0x6}}, {@version_L='version=9p2000.L'}, {@cache_none='cache=none'}], [{@subj_role={'subj_role', 0x3d, '/dev/dsp#\x00'}}, {@permit_directio='permit_directio'}, {@measure='measure'}, {@context={'context', 0x3d, 'system_u'}}, {@obj_user={'obj_user'}}, {@dont_hash='dont_hash'}, {@subj_type={'subj_type', 0x3d, '\\eth0('}}, {@fsuuid={'fsuuid', 0x3d, {[0x36, 0x79, 0x0, 0x33, 0x61, 0x62, 0x32], 0x2d, [0x77, 0x32, 0x77, 0x34], 0x2d, [0x7f, 0x67, 0x37, 0x77], 0x2d, [0x0, 0x38, 0x32, 0x33], 0x2d, [0x35, 0x37, 0x7f, 0x7b, 0x37, 0x39, 0x77, 0x33]}}}, {@dont_measure='dont_measure'}]}}) ioctl$VIDIOC_ENUMINPUT(r1, 0xc050561a, &(0x7f0000000300)={0x4, "443b36c4364670c73c2ad26e1952769039650793d10fc72d24ce46e327d06e2f", 0x3, 0x100, 0x4, 0x1057ff, 0x0, 0x6}) [ 450.621344][T16699] IPVS: ftp: loaded support on port[0] = 21 06:22:26 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = creat(&(0x7f0000000000)='./bus\x00', 0x0) getrlimit(0x0, &(0x7f00000000c0)) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x1000000}) 06:22:26 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000040)="2e0000482500817ee45ae087185082cf0f24b0eba06ec400002339e00586f9835b3f0016914879008cd90080e230", 0x2e}], 0x1}, 0x0) 06:22:26 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000040)="2e000000254c817ee45ae087185082cf0f24b0eba06ec400002339e00586f9835b3f0016914879008cd90080e230", 0x2e}], 0x1}, 0x0) [ 451.056080][T16711] IPVS: ftp: loaded support on port[0] = 21 06:22:26 executing program 3: r0 = eventfd(0x6) write$binfmt_elf64(r0, &(0x7f0000000540)=ANY=[@ANYRES32=r0, @ANYRESDEC=r0, @ANYRES32=r0], 0xffffffa6) clock_gettime(0x88, &(0x7f0000000400)) r1 = socket$inet6(0xa, 0x3, 0x800000000006) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000080)={@remote, 0x4, 0x0, 0xff, 0x4, 0x0, 0x80}, 0x20) lookup_dcookie(0xc, &(0x7f0000000900)=""/127, 0x7f) r2 = openat$cgroup_procs(0xffffffffffffff9c, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) ioctl$FS_IOC_GETFSLABEL(r2, 0x81009431, &(0x7f0000000b80)) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000040)={@loopback, 0x0, 0x0, 0x2, 0x3}, 0x20) r3 = openat$full(0xffffffffffffff9c, &(0x7f0000000280)='/dev/full\x00', 0x121003, 0x0) clock_nanosleep(0x7, 0x1, &(0x7f0000000100)={0x0, 0x1c9c380}, &(0x7f0000000140)) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f00000001c0)={@mcast1, 0x8, 0x1, 0x3, 0x2, 0x80000000, 0x7f, 0x6}, 0xfffffffffffffe97) dup2(r0, r0) connect$inet6(r1, &(0x7f0000000240)={0xa, 0x0, 0x88d9, @loopback}, 0x1c) getsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000300)={@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, &(0x7f0000000680)=0x20) r4 = openat$urandom(0xffffffffffffff9c, &(0x7f0000000580)='/dev/urandom\x00', 0x8400, 0x0) getsockopt$sock_int(r1, 0x1, 0x29, &(0x7f00000008c0), &(0x7f0000000480)=0xfa6cd0fb5ecebeec) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000200)={@mcast1, 0x200, 0x3, 0x2, 0x80000000001, 0xeed3, 0x2a57, 0xfffffffffffffffb}, 0x10a35672234e7a91) close(r4) r5 = gettid() syz_open_procfs(r5, &(0x7f0000000380)='net/fib_trie\x00') gettid() ioctl$TCSBRKP(r3, 0x5425, 0x2) r6 = syz_open_procfs(r5, &(0x7f00000006c0)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xac1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xffG\xeb\'\xa19\xf1\x93\"\x80\x7fG3\xc1E\xe6e6\xc6\xc2u\x01% \xe7+0\x97\x84;N\xda\xc4\x80\xc3\xb18N\xbf_\x19_ \xd4_Y%\x05\xf8\x85\x89\xfc\xd2\xd7') sendfile(r6, r6, &(0x7f00000000c0)=0x202, 0xdd) 06:22:26 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000040)="2e00004c2500817ee45ae087185082cf0f24b0eba06ec400002339e00586f9835b3f0016914879008cd90080e230", 0x2e}], 0x1}, 0x0) 06:22:27 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000040)="2e0000002560817ee45ae087185082cf0f24b0eba06ec400002339e00586f9835b3f0016914879008cd90080e230", 0x2e}], 0x1}, 0x0) [ 451.446022][T16722] Can not set IPV6_FL_F_REFLECT if flowlabel_consistency sysctl is enable 06:22:27 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) getsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000400), &(0x7f0000000440)=0x8) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, &(0x7f00000019c0)={0x20}, 0x1) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r1, 0x111, 0x5, 0xc3, 0x4) r2 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x1, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r2, 0xc0045516, &(0x7f0000000040)=0x4) arch_prctl$ARCH_GET_CPUID(0x1011) getpgrp(0x0) flock(r0, 0x0) ioctl$BLKRRPART(0xffffffffffffffff, 0x125f, 0x0) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000200)={@mcast2}) fcntl$F_GET_FILE_RW_HINT(r0, 0x40d, &(0x7f00000000c0)) setsockopt$RDS_CONG_MONITOR(r2, 0x114, 0x6, &(0x7f0000000280), 0x4) ioctl$VHOST_SET_LOG_FD(r2, 0x4004af07, 0x0) ioctl$DRM_IOCTL_IRQ_BUSID(r2, 0xc0106403, &(0x7f0000000100)={0x8875, 0x800, 0x8000, 0xc2}) ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000180)) ioctl$VHOST_SET_VRING_CALL(0xffffffffffffffff, 0x4008af21, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) setsockopt$IP_VS_SO_SET_STOPDAEMON(r3, 0x0, 0x48c, &(0x7f0000000140)={0x3, 'veth0\x00'}, 0x18) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.cpu/syz1\x00', 0x1ff) openat$snapshot(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/snapshot\x00', 0x0, 0x0) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0xf7fffffffffffffd, 0x2012, r2, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000a40)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x20008000}, 0x24044000) unshare(0x40000000) mount$9p_virtio(&(0x7f00000003c0)='em0%$!,cgroup#\x00', &(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='9p\x00', 0x200000, &(0x7f0000000500)={'trans=virtio,', {[{@afid={'afid', 0x3d, 0x6}}, {@version_L='version=9p2000.L'}, {@cache_none='cache=none'}], [{@subj_role={'subj_role', 0x3d, '/dev/dsp#\x00'}}, {@permit_directio='permit_directio'}, {@measure='measure'}, {@context={'context', 0x3d, 'system_u'}}, {@obj_user={'obj_user'}}, {@dont_hash='dont_hash'}, {@subj_type={'subj_type', 0x3d, '\\eth0('}}, {@fsuuid={'fsuuid', 0x3d, {[0x36, 0x79, 0x0, 0x33, 0x61, 0x62, 0x32], 0x2d, [0x77, 0x32, 0x77, 0x34], 0x2d, [0x7f, 0x67, 0x37, 0x77], 0x2d, [0x0, 0x38, 0x32, 0x33], 0x2d, [0x35, 0x37, 0x7f, 0x7b, 0x37, 0x39, 0x77, 0x33]}}}, {@dont_measure='dont_measure'}]}}) ioctl$VIDIOC_ENUMINPUT(r1, 0xc050561a, &(0x7f0000000300)={0x4, "443b36c4364670c73c2ad26e1952769039650793d10fc72d24ce46e327d06e2f", 0x3, 0x100, 0x4, 0x1057ff, 0x0, 0x6}) 06:22:27 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) getsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000400), &(0x7f0000000440)=0x8) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, &(0x7f00000019c0)={0x20}, 0x1) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r1, 0x111, 0x5, 0xc3, 0x4) r2 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x1, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r2, 0xc0045516, &(0x7f0000000040)=0x4) arch_prctl$ARCH_GET_CPUID(0x1011) getpgrp(0x0) flock(r0, 0x0) ioctl$BLKRRPART(0xffffffffffffffff, 0x125f, 0x0) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000200)={@mcast2}) fcntl$F_GET_FILE_RW_HINT(r0, 0x40d, 0x0) setsockopt$RDS_CONG_MONITOR(r2, 0x114, 0x6, &(0x7f0000000280), 0x4) ioctl$VHOST_SET_LOG_FD(r2, 0x4004af07, 0x0) ioctl$DRM_IOCTL_IRQ_BUSID(r2, 0xc0106403, &(0x7f0000000100)={0x8875, 0x800, 0x8000, 0xc2}) ioctl$VHOST_SET_VRING_CALL(0xffffffffffffffff, 0x4008af21, &(0x7f0000000380)={0x0, r1}) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x3, 'veth0\x00'}, 0x18) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.cpu/syz1\x00', 0x1ff) openat$snapshot(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/snapshot\x00', 0x0, 0x0) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0xf7fffffffffffffd, 0x2012, r2, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000a40)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x20008000}, 0x24044000) unshare(0x40000000) mount$9p_virtio(&(0x7f00000003c0)='em0%$!,cgroup#\x00', &(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='9p\x00', 0x200000, &(0x7f0000000500)={'trans=virtio,', {[{@afid={'afid', 0x3d, 0x6}}, {@version_L='version=9p2000.L'}, {@cache_none='cache=none'}], [{@subj_role={'subj_role', 0x3d, '/dev/dsp#\x00'}}, {@permit_directio='permit_directio'}, {@measure='measure'}, {@context={'context', 0x3d, 'system_u'}}, {@obj_user={'obj_user'}}, {@dont_hash='dont_hash'}, {@subj_type={'subj_type', 0x3d, '\\eth0('}}, {@fsuuid={'fsuuid', 0x3d, {[0x36, 0x79, 0x0, 0x33, 0x61, 0x62, 0x32], 0x2d, [0x77, 0x32, 0x77, 0x34], 0x2d, [0x7f, 0x67, 0x37, 0x77], 0x2d, [0x0, 0x38, 0x32, 0x33], 0x2d, [0x35, 0x37, 0x7f, 0x7b, 0x37, 0x39, 0x77, 0x33]}}}, {@dont_measure='dont_measure'}]}}) ioctl$VIDIOC_ENUMINPUT(r1, 0xc050561a, &(0x7f0000000300)={0x4, "443b36c4364670c73c2ad26e1952769039650793d10fc72d24ce46e327d06e2f", 0x3, 0x100, 0x4, 0x1057ff, 0x0, 0x6}) 06:22:27 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = creat(&(0x7f0000000000)='./bus\x00', 0x0) getrlimit(0x0, &(0x7f00000000c0)) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x1080000}) [ 451.580105][T16728] Can not set IPV6_FL_F_REFLECT if flowlabel_consistency sysctl is enable 06:22:27 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000040)="2e0000602500817ee45ae087185082cf0f24b0eba06ec400002339e00586f9835b3f0016914879008cd90080e230", 0x2e}], 0x1}, 0x0) 06:22:27 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000540)=ANY=[@ANYBLOB="f0000000000000000000ffffffffffff000000003200000000000000000000000000ffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a000400000000000000000048000200656362286369706865725f6e756c6c2900000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x1}}, 0x0) [ 451.898174][T16736] IPVS: ftp: loaded support on port[0] = 21 [ 451.905903][T16737] IPVS: ftp: loaded support on port[0] = 21 06:22:28 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000040)="2e0000002568817ee45ae087185082cf0f24b0eba06ec400002339e00586f9835b3f0016914879008cd90080e230", 0x2e}], 0x1}, 0x0) 06:22:28 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = creat(&(0x7f0000000000)='./bus\x00', 0x0) getrlimit(0x0, &(0x7f00000000c0)) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x1800000}) 06:22:28 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) getsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000400), &(0x7f0000000440)=0x8) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, &(0x7f00000019c0)={0x20}, 0x1) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r1, 0x111, 0x5, 0xc3, 0x4) r2 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x1, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r2, 0xc0045516, &(0x7f0000000040)=0x4) arch_prctl$ARCH_GET_CPUID(0x1011) getpgrp(0x0) flock(r0, 0x0) ioctl$BLKRRPART(0xffffffffffffffff, 0x125f, 0x0) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000200)={@mcast2}) fcntl$F_GET_FILE_RW_HINT(r0, 0x40d, 0x0) setsockopt$RDS_CONG_MONITOR(r2, 0x114, 0x6, &(0x7f0000000280), 0x4) ioctl$VHOST_SET_LOG_FD(r2, 0x4004af07, 0x0) ioctl$DRM_IOCTL_IRQ_BUSID(r2, 0xc0106403, &(0x7f0000000100)={0x8875, 0x800, 0x8000, 0xc2}) ioctl$VHOST_SET_VRING_CALL(0xffffffffffffffff, 0x4008af21, &(0x7f0000000380)={0x0, r1}) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x3, 'veth0\x00'}, 0x18) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.cpu/syz1\x00', 0x1ff) openat$snapshot(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/snapshot\x00', 0x0, 0x0) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0xf7fffffffffffffd, 0x2012, r2, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000a40)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x20008000}, 0x24044000) unshare(0x40000000) mount$9p_virtio(&(0x7f00000003c0)='em0%$!,cgroup#\x00', &(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='9p\x00', 0x200000, &(0x7f0000000500)={'trans=virtio,', {[{@afid={'afid', 0x3d, 0x6}}, {@version_L='version=9p2000.L'}, {@cache_none='cache=none'}], [{@subj_role={'subj_role', 0x3d, '/dev/dsp#\x00'}}, {@permit_directio='permit_directio'}, {@measure='measure'}, {@context={'context', 0x3d, 'system_u'}}, {@obj_user={'obj_user'}}, {@dont_hash='dont_hash'}, {@subj_type={'subj_type', 0x3d, '\\eth0('}}, {@fsuuid={'fsuuid', 0x3d, {[0x36, 0x79, 0x0, 0x33, 0x61, 0x62, 0x32], 0x2d, [0x77, 0x32, 0x77, 0x34], 0x2d, [0x7f, 0x67, 0x37, 0x77], 0x2d, [0x0, 0x38, 0x32, 0x33], 0x2d, [0x35, 0x37, 0x7f, 0x7b, 0x37, 0x39, 0x77, 0x33]}}}, {@dont_measure='dont_measure'}]}}) ioctl$VIDIOC_ENUMINPUT(r1, 0xc050561a, &(0x7f0000000300)={0x4, "443b36c4364670c73c2ad26e1952769039650793d10fc72d24ce46e327d06e2f", 0x3, 0x100, 0x4, 0x1057ff, 0x0, 0x6}) 06:22:28 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) getsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000400), &(0x7f0000000440)=0x8) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, &(0x7f00000019c0)={0x20}, 0x1) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r1, 0x111, 0x5, 0xc3, 0x4) r2 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x1, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r2, 0xc0045516, &(0x7f0000000040)=0x4) arch_prctl$ARCH_GET_CPUID(0x1011) getpgrp(0x0) flock(r0, 0x0) ioctl$BLKRRPART(0xffffffffffffffff, 0x125f, 0x0) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000200)={@mcast2}) fcntl$F_GET_FILE_RW_HINT(r0, 0x40d, &(0x7f00000000c0)) setsockopt$RDS_CONG_MONITOR(r2, 0x114, 0x6, &(0x7f0000000280), 0x4) ioctl$VHOST_SET_LOG_FD(r2, 0x4004af07, 0x0) ioctl$DRM_IOCTL_IRQ_BUSID(r2, 0xc0106403, &(0x7f0000000100)={0x8875, 0x800, 0x8000, 0xc2}) ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000180)) ioctl$VHOST_SET_VRING_CALL(0xffffffffffffffff, 0x4008af21, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) setsockopt$IP_VS_SO_SET_STOPDAEMON(r3, 0x0, 0x48c, &(0x7f0000000140)={0x3, 'veth0\x00'}, 0x18) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.cpu/syz1\x00', 0x1ff) openat$snapshot(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/snapshot\x00', 0x0, 0x0) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0xf7fffffffffffffd, 0x2012, r2, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000a40)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x20008000}, 0x24044000) unshare(0x40000000) mount$9p_virtio(&(0x7f00000003c0)='em0%$!,cgroup#\x00', &(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='9p\x00', 0x200000, &(0x7f0000000500)={'trans=virtio,', {[{@afid={'afid', 0x3d, 0x6}}, {@version_L='version=9p2000.L'}, {@cache_none='cache=none'}], [{@subj_role={'subj_role', 0x3d, '/dev/dsp#\x00'}}, {@permit_directio='permit_directio'}, {@measure='measure'}, {@context={'context', 0x3d, 'system_u'}}, {@obj_user={'obj_user'}}, {@dont_hash='dont_hash'}, {@subj_type={'subj_type', 0x3d, '\\eth0('}}, {@fsuuid={'fsuuid', 0x3d, {[0x36, 0x79, 0x0, 0x33, 0x61, 0x62, 0x32], 0x2d, [0x77, 0x32, 0x77, 0x34], 0x2d, [0x7f, 0x67, 0x37, 0x77], 0x2d, [0x0, 0x38, 0x32, 0x33], 0x2d, [0x35, 0x37, 0x7f, 0x7b, 0x37, 0x39, 0x77, 0x33]}}}, {@dont_measure='dont_measure'}]}}) ioctl$VIDIOC_ENUMINPUT(r1, 0xc050561a, &(0x7f0000000300)={0x4, "443b36c4364670c73c2ad26e1952769039650793d10fc72d24ce46e327d06e2f", 0x3, 0x100, 0x4, 0x1057ff, 0x0, 0x6}) 06:22:28 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000040)="2e0000682500817ee45ae087185082cf0f24b0eba06ec400002339e00586f9835b3f0016914879008cd90080e230", 0x2e}], 0x1}, 0x0) 06:22:28 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") pipe(&(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000300)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(seed)\x00'}, 0x58) r4 = accept4(r3, 0x0, 0x0, 0x0) write$binfmt_script(r2, &(0x7f0000000280)=ANY=[], 0xfffffffc) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000000)="ad56b6cc0400aeb995298992ea5400c2", 0x10) splice(r1, 0x0, r4, 0x0, 0x20000000003, 0x0) 06:22:29 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000040)="2e000000256c817ee45ae087185082cf0f24b0eba06ec400002339e00586f9835b3f0016914879008cd90080e230", 0x2e}], 0x1}, 0x0) [ 453.472797][T16761] IPVS: ftp: loaded support on port[0] = 21 [ 453.473286][T16759] IPVS: ftp: loaded support on port[0] = 21 06:22:30 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = creat(&(0x7f0000000000)='./bus\x00', 0x0) getrlimit(0x0, &(0x7f00000000c0)) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x1800100}) 06:22:30 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) getsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000400), &(0x7f0000000440)=0x8) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, &(0x7f00000019c0)={0x20}, 0x1) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r1, 0x111, 0x5, 0xc3, 0x4) r2 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x1, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r2, 0xc0045516, &(0x7f0000000040)=0x4) arch_prctl$ARCH_GET_CPUID(0x1011) getpgrp(0x0) flock(r0, 0x0) ioctl$BLKRRPART(0xffffffffffffffff, 0x125f, 0x0) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000200)={@mcast2}) fcntl$F_GET_FILE_RW_HINT(r0, 0x40d, 0x0) setsockopt$RDS_CONG_MONITOR(r2, 0x114, 0x6, &(0x7f0000000280), 0x4) ioctl$VHOST_SET_LOG_FD(r2, 0x4004af07, 0x0) ioctl$DRM_IOCTL_IRQ_BUSID(r2, 0xc0106403, &(0x7f0000000100)={0x8875, 0x800, 0x8000, 0xc2}) ioctl$VHOST_SET_VRING_CALL(0xffffffffffffffff, 0x4008af21, &(0x7f0000000380)={0x0, r1}) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x3, 'veth0\x00'}, 0x18) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.cpu/syz1\x00', 0x1ff) openat$snapshot(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/snapshot\x00', 0x0, 0x0) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0xf7fffffffffffffd, 0x2012, r2, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000a40)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x20008000}, 0x24044000) unshare(0x40000000) mount$9p_virtio(&(0x7f00000003c0)='em0%$!,cgroup#\x00', &(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='9p\x00', 0x200000, &(0x7f0000000500)={'trans=virtio,', {[{@afid={'afid', 0x3d, 0x6}}, {@version_L='version=9p2000.L'}, {@cache_none='cache=none'}], [{@subj_role={'subj_role', 0x3d, '/dev/dsp#\x00'}}, {@permit_directio='permit_directio'}, {@measure='measure'}, {@context={'context', 0x3d, 'system_u'}}, {@obj_user={'obj_user'}}, {@dont_hash='dont_hash'}, {@subj_type={'subj_type', 0x3d, '\\eth0('}}, {@fsuuid={'fsuuid', 0x3d, {[0x36, 0x79, 0x0, 0x33, 0x61, 0x62, 0x32], 0x2d, [0x77, 0x32, 0x77, 0x34], 0x2d, [0x7f, 0x67, 0x37, 0x77], 0x2d, [0x0, 0x38, 0x32, 0x33], 0x2d, [0x35, 0x37, 0x7f, 0x7b, 0x37, 0x39, 0x77, 0x33]}}}, {@dont_measure='dont_measure'}]}}) ioctl$VIDIOC_ENUMINPUT(r1, 0xc050561a, &(0x7f0000000300)={0x4, "443b36c4364670c73c2ad26e1952769039650793d10fc72d24ce46e327d06e2f", 0x3, 0x100, 0x4, 0x1057ff, 0x0, 0x6}) 06:22:30 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000040)="2e00006c2500817ee45ae087185082cf0f24b0eba06ec400002339e00586f9835b3f0016914879008cd90080e230", 0x2e}], 0x1}, 0x0) 06:22:30 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) getsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000400), &(0x7f0000000440)=0x8) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, &(0x7f00000019c0)={0x20}, 0x1) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r1, 0x111, 0x5, 0xc3, 0x4) r2 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x1, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r2, 0xc0045516, &(0x7f0000000040)=0x4) arch_prctl$ARCH_GET_CPUID(0x1011) getpgrp(0x0) flock(r0, 0x0) ioctl$BLKRRPART(0xffffffffffffffff, 0x125f, 0x0) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000200)={@mcast2}) fcntl$F_GET_FILE_RW_HINT(r0, 0x40d, &(0x7f00000000c0)) setsockopt$RDS_CONG_MONITOR(r2, 0x114, 0x6, &(0x7f0000000280), 0x4) ioctl$VHOST_SET_LOG_FD(r2, 0x4004af07, 0x0) ioctl$DRM_IOCTL_IRQ_BUSID(r2, 0xc0106403, &(0x7f0000000100)={0x8875, 0x800, 0x8000, 0xc2}) ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000180)) ioctl$VHOST_SET_VRING_CALL(0xffffffffffffffff, 0x4008af21, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) setsockopt$IP_VS_SO_SET_STOPDAEMON(r3, 0x0, 0x48c, &(0x7f0000000140)={0x3, 'veth0\x00'}, 0x18) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.cpu/syz1\x00', 0x1ff) openat$snapshot(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/snapshot\x00', 0x0, 0x0) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0xf7fffffffffffffd, 0x2012, r2, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000a40)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x20008000}, 0x24044000) unshare(0x40000000) mount$9p_virtio(&(0x7f00000003c0)='em0%$!,cgroup#\x00', &(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='9p\x00', 0x200000, &(0x7f0000000500)={'trans=virtio,', {[{@afid={'afid', 0x3d, 0x6}}, {@version_L='version=9p2000.L'}, {@cache_none='cache=none'}], [{@subj_role={'subj_role', 0x3d, '/dev/dsp#\x00'}}, {@permit_directio='permit_directio'}, {@measure='measure'}, {@context={'context', 0x3d, 'system_u'}}, {@obj_user={'obj_user'}}, {@dont_hash='dont_hash'}, {@subj_type={'subj_type', 0x3d, '\\eth0('}}, {@fsuuid={'fsuuid', 0x3d, {[0x36, 0x79, 0x0, 0x33, 0x61, 0x62, 0x32], 0x2d, [0x77, 0x32, 0x77, 0x34], 0x2d, [0x7f, 0x67, 0x37, 0x77], 0x2d, [0x0, 0x38, 0x32, 0x33], 0x2d, [0x35, 0x37, 0x7f, 0x7b, 0x37, 0x39, 0x77, 0x33]}}}, {@dont_measure='dont_measure'}]}}) ioctl$VIDIOC_ENUMINPUT(r1, 0xc050561a, &(0x7f0000000300)={0x4, "443b36c4364670c73c2ad26e1952769039650793d10fc72d24ce46e327d06e2f", 0x3, 0x100, 0x4, 0x1057ff, 0x0, 0x6}) [ 454.773189][T16778] IPVS: ftp: loaded support on port[0] = 21 [ 454.981625][T16781] IPVS: ftp: loaded support on port[0] = 21 06:22:31 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000040)="2e0000002574817ee45ae087185082cf0f24b0eba06ec400002339e00586f9835b3f0016914879008cd90080e230", 0x2e}], 0x1}, 0x0) 06:22:31 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) getsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000400), &(0x7f0000000440)=0x8) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, &(0x7f00000019c0)={0x20}, 0x1) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r1, 0x111, 0x5, 0xc3, 0x4) r2 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x1, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r2, 0xc0045516, &(0x7f0000000040)=0x4) arch_prctl$ARCH_GET_CPUID(0x1011) getpgrp(0x0) flock(r0, 0x0) ioctl$BLKRRPART(0xffffffffffffffff, 0x125f, 0x0) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000200)={@mcast2}) fcntl$F_GET_FILE_RW_HINT(r0, 0x40d, 0x0) setsockopt$RDS_CONG_MONITOR(r2, 0x114, 0x6, &(0x7f0000000280), 0x4) ioctl$VHOST_SET_LOG_FD(r2, 0x4004af07, 0x0) ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000180)) ioctl$VHOST_SET_VRING_CALL(0xffffffffffffffff, 0x4008af21, &(0x7f0000000380)={0x0, r1}) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x3, 'veth0\x00'}, 0x18) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.cpu/syz1\x00', 0x1ff) openat$snapshot(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/snapshot\x00', 0x0, 0x0) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0xf7fffffffffffffd, 0x2012, r2, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000a40)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x20008000}, 0x24044000) unshare(0x40000000) mount$9p_virtio(&(0x7f00000003c0)='em0%$!,cgroup#\x00', &(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='9p\x00', 0x200000, &(0x7f0000000500)={'trans=virtio,', {[{@afid={'afid', 0x3d, 0x6}}, {@version_L='version=9p2000.L'}, {@cache_none='cache=none'}], [{@subj_role={'subj_role', 0x3d, '/dev/dsp#\x00'}}, {@permit_directio='permit_directio'}, {@measure='measure'}, {@context={'context', 0x3d, 'system_u'}}, {@obj_user={'obj_user'}}, {@dont_hash='dont_hash'}, {@subj_type={'subj_type', 0x3d, '\\eth0('}}, {@fsuuid={'fsuuid', 0x3d, {[0x36, 0x79, 0x0, 0x33, 0x61, 0x62, 0x32], 0x2d, [0x77, 0x32, 0x77, 0x34], 0x2d, [0x7f, 0x67, 0x37, 0x77], 0x2d, [0x0, 0x38, 0x32, 0x33], 0x2d, [0x35, 0x37, 0x7f, 0x7b, 0x37, 0x39, 0x77, 0x33]}}}, {@dont_measure='dont_measure'}]}}) ioctl$VIDIOC_ENUMINPUT(r1, 0xc050561a, &(0x7f0000000300)={0x4, "443b36c4364670c73c2ad26e1952769039650793d10fc72d24ce46e327d06e2f", 0x3, 0x100, 0x4, 0x1057ff, 0x0, 0x6}) 06:22:31 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = creat(&(0x7f0000000000)='./bus\x00', 0x0) getrlimit(0x0, &(0x7f00000000c0)) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x1800200}) 06:22:31 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000040)="2e0000742500817ee45ae087185082cf0f24b0eba06ec400002339e00586f9835b3f0016914879008cd90080e230", 0x2e}], 0x1}, 0x0) 06:22:31 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sndseq(&(0x7f0000000100)='/dev/snd/seq\x00', 0x0, 0x0) r1 = dup2(r0, r0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r1, 0xc0a85352, &(0x7f0000000140)={{}, 'port1\x00'}) [ 456.065885][T16802] IPVS: ftp: loaded support on port[0] = 21 06:22:31 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000040)="2e000000257a817ee45ae087185082cf0f24b0eba06ec400002339e00586f9835b3f0016914879008cd90080e230", 0x2e}], 0x1}, 0x0) 06:22:31 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) getsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000400), &(0x7f0000000440)=0x8) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, &(0x7f00000019c0)={0x20}, 0x1) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r1, 0x111, 0x5, 0xc3, 0x4) r2 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x1, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r2, 0xc0045516, &(0x7f0000000040)=0x4) arch_prctl$ARCH_GET_CPUID(0x1011) getpgrp(0x0) flock(r0, 0x0) ioctl$BLKRRPART(0xffffffffffffffff, 0x125f, 0x0) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000200)={@mcast2}) fcntl$F_GET_FILE_RW_HINT(r0, 0x40d, &(0x7f00000000c0)) setsockopt$RDS_CONG_MONITOR(r2, 0x114, 0x6, &(0x7f0000000280), 0x4) ioctl$VHOST_SET_LOG_FD(r2, 0x4004af07, 0x0) ioctl$DRM_IOCTL_IRQ_BUSID(r2, 0xc0106403, &(0x7f0000000100)={0x8875, 0x800, 0x8000, 0xc2}) ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000180)) ioctl$VHOST_SET_VRING_CALL(0xffffffffffffffff, 0x4008af21, &(0x7f0000000380)) r3 = fcntl$dupfd(r1, 0x0, r2) setsockopt$IP_VS_SO_SET_STOPDAEMON(r3, 0x0, 0x48c, &(0x7f0000000140)={0x3, 'veth0\x00'}, 0x18) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.cpu/syz1\x00', 0x1ff) openat$snapshot(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/snapshot\x00', 0x0, 0x0) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0xf7fffffffffffffd, 0x2012, r2, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000a40)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x20008000}, 0x24044000) unshare(0x40000000) mount$9p_virtio(&(0x7f00000003c0)='em0%$!,cgroup#\x00', &(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='9p\x00', 0x200000, &(0x7f0000000500)={'trans=virtio,', {[{@afid={'afid', 0x3d, 0x6}}, {@version_L='version=9p2000.L'}, {@cache_none='cache=none'}], [{@subj_role={'subj_role', 0x3d, '/dev/dsp#\x00'}}, {@permit_directio='permit_directio'}, {@measure='measure'}, {@context={'context', 0x3d, 'system_u'}}, {@obj_user={'obj_user'}}, {@dont_hash='dont_hash'}, {@subj_type={'subj_type', 0x3d, '\\eth0('}}, {@fsuuid={'fsuuid', 0x3d, {[0x36, 0x79, 0x0, 0x33, 0x61, 0x62, 0x32], 0x2d, [0x77, 0x32, 0x77, 0x34], 0x2d, [0x7f, 0x67, 0x37, 0x77], 0x2d, [0x0, 0x38, 0x32, 0x33], 0x2d, [0x35, 0x37, 0x7f, 0x7b, 0x37, 0x39, 0x77, 0x33]}}}, {@dont_measure='dont_measure'}]}}) ioctl$VIDIOC_ENUMINPUT(r1, 0xc050561a, &(0x7f0000000300)={0x4, "443b36c4364670c73c2ad26e1952769039650793d10fc72d24ce46e327d06e2f", 0x3, 0x100, 0x4, 0x1057ff, 0x0, 0x6}) 06:22:31 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000040)="2e00007a2500817ee45ae087185082cf0f24b0eba06ec400002339e00586f9835b3f0016914879008cd90080e230", 0x2e}], 0x1}, 0x0) 06:22:32 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = creat(&(0x7f0000000000)='./bus\x00', 0x0) getrlimit(0x0, &(0x7f00000000c0)) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x1800300}) 06:22:32 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000040)="2e00017c2500817ee45ae087185082cf0f24b0eba06ec400002339e00586f9835b3f0016914879008cd90080e230", 0x2e}], 0x1}, 0x0) 06:22:32 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000040)="2e0000002500817ee45ae087185082cf0224b0eba06ec400002339e00586f9835b3f0016914879008cd90080e230", 0x2e}], 0x1}, 0x0) 06:22:32 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) getsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000400), &(0x7f0000000440)=0x8) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, &(0x7f00000019c0)={0x20}, 0x1) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r1, 0x111, 0x5, 0xc3, 0x4) r2 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x1, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r2, 0xc0045516, &(0x7f0000000040)=0x4) arch_prctl$ARCH_GET_CPUID(0x1011) getpgrp(0x0) flock(r0, 0x0) ioctl$BLKRRPART(0xffffffffffffffff, 0x125f, 0x0) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000200)={@mcast2}) fcntl$F_GET_FILE_RW_HINT(r0, 0x40d, 0x0) setsockopt$RDS_CONG_MONITOR(r2, 0x114, 0x6, &(0x7f0000000280), 0x4) ioctl$VHOST_SET_LOG_FD(r2, 0x4004af07, 0x0) ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000180)) ioctl$VHOST_SET_VRING_CALL(0xffffffffffffffff, 0x4008af21, &(0x7f0000000380)={0x0, r1}) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x3, 'veth0\x00'}, 0x18) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.cpu/syz1\x00', 0x1ff) openat$snapshot(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/snapshot\x00', 0x0, 0x0) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0xf7fffffffffffffd, 0x2012, r2, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000a40)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x20008000}, 0x24044000) unshare(0x40000000) mount$9p_virtio(&(0x7f00000003c0)='em0%$!,cgroup#\x00', &(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='9p\x00', 0x200000, &(0x7f0000000500)={'trans=virtio,', {[{@afid={'afid', 0x3d, 0x6}}, {@version_L='version=9p2000.L'}, {@cache_none='cache=none'}], [{@subj_role={'subj_role', 0x3d, '/dev/dsp#\x00'}}, {@permit_directio='permit_directio'}, {@measure='measure'}, {@context={'context', 0x3d, 'system_u'}}, {@obj_user={'obj_user'}}, {@dont_hash='dont_hash'}, {@subj_type={'subj_type', 0x3d, '\\eth0('}}, {@fsuuid={'fsuuid', 0x3d, {[0x36, 0x79, 0x0, 0x33, 0x61, 0x62, 0x32], 0x2d, [0x77, 0x32, 0x77, 0x34], 0x2d, [0x7f, 0x67, 0x37, 0x77], 0x2d, [0x0, 0x38, 0x32, 0x33], 0x2d, [0x35, 0x37, 0x7f, 0x7b, 0x37, 0x39, 0x77, 0x33]}}}, {@dont_measure='dont_measure'}]}}) ioctl$VIDIOC_ENUMINPUT(r1, 0xc050561a, &(0x7f0000000300)={0x4, "443b36c4364670c73c2ad26e1952769039650793d10fc72d24ce46e327d06e2f", 0x3, 0x100, 0x4, 0x1057ff, 0x0, 0x6}) [ 456.690595][T16828] IPVS: ftp: loaded support on port[0] = 21 [ 456.775081][T16832] IPVS: ftp: loaded support on port[0] = 21 06:22:33 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000040)="2e0000f02500817ee45ae087185082cf0f24b0eba06ec400002339e00586f9835b3f0016914879008cd90080e230", 0x2e}], 0x1}, 0x0) 06:22:33 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sndseq(&(0x7f0000000100)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(r0, 0x40505331, &(0x7f0000000140)={{}, {0x7fffffff}}) 06:22:33 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = creat(&(0x7f0000000000)='./bus\x00', 0x0) getrlimit(0x0, &(0x7f00000000c0)) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x1800400}) [ 457.643531][T16834] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.5'. 06:22:33 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) getsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000400), &(0x7f0000000440)=0x8) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, &(0x7f00000019c0)={0x20}, 0x1) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r1, 0x111, 0x5, 0xc3, 0x4) r2 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x1, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r2, 0xc0045516, &(0x7f0000000040)=0x4) arch_prctl$ARCH_GET_CPUID(0x1011) getpgrp(0x0) flock(r0, 0x0) ioctl$BLKRRPART(0xffffffffffffffff, 0x125f, 0x0) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000200)={@mcast2}) fcntl$F_GET_FILE_RW_HINT(r0, 0x40d, 0x0) setsockopt$RDS_CONG_MONITOR(r2, 0x114, 0x6, &(0x7f0000000280), 0x4) ioctl$VHOST_SET_LOG_FD(r2, 0x4004af07, 0x0) ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000180)) ioctl$VHOST_SET_VRING_CALL(0xffffffffffffffff, 0x4008af21, &(0x7f0000000380)={0x0, r1}) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x3, 'veth0\x00'}, 0x18) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.cpu/syz1\x00', 0x1ff) openat$snapshot(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/snapshot\x00', 0x0, 0x0) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0xf7fffffffffffffd, 0x2012, r2, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000a40)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x20008000}, 0x24044000) unshare(0x40000000) mount$9p_virtio(&(0x7f00000003c0)='em0%$!,cgroup#\x00', &(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='9p\x00', 0x200000, &(0x7f0000000500)={'trans=virtio,', {[{@afid={'afid', 0x3d, 0x6}}, {@version_L='version=9p2000.L'}, {@cache_none='cache=none'}], [{@subj_role={'subj_role', 0x3d, '/dev/dsp#\x00'}}, {@permit_directio='permit_directio'}, {@measure='measure'}, {@context={'context', 0x3d, 'system_u'}}, {@obj_user={'obj_user'}}, {@dont_hash='dont_hash'}, {@subj_type={'subj_type', 0x3d, '\\eth0('}}, {@fsuuid={'fsuuid', 0x3d, {[0x36, 0x79, 0x0, 0x33, 0x61, 0x62, 0x32], 0x2d, [0x77, 0x32, 0x77, 0x34], 0x2d, [0x7f, 0x67, 0x37, 0x77], 0x2d, [0x0, 0x38, 0x32, 0x33], 0x2d, [0x35, 0x37, 0x7f, 0x7b, 0x37, 0x39, 0x77, 0x33]}}}, {@dont_measure='dont_measure'}]}}) ioctl$VIDIOC_ENUMINPUT(r1, 0xc050561a, &(0x7f0000000300)={0x4, "443b36c4364670c73c2ad26e1952769039650793d10fc72d24ce46e327d06e2f", 0x3, 0x100, 0x4, 0x1057ff, 0x0, 0x6}) [ 457.754044][T16843] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.5'. 06:22:33 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) getsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000400), &(0x7f0000000440)=0x8) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, &(0x7f00000019c0)={0x20}, 0x1) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r1, 0x111, 0x5, 0xc3, 0x4) r2 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x1, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r2, 0xc0045516, &(0x7f0000000040)=0x4) arch_prctl$ARCH_GET_CPUID(0x1011) getpgrp(0x0) flock(r0, 0x0) ioctl$BLKRRPART(0xffffffffffffffff, 0x125f, 0x0) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000200)={@mcast2}) fcntl$F_GET_FILE_RW_HINT(r0, 0x40d, &(0x7f00000000c0)) setsockopt$RDS_CONG_MONITOR(r2, 0x114, 0x6, &(0x7f0000000280), 0x4) ioctl$VHOST_SET_LOG_FD(r2, 0x4004af07, 0x0) ioctl$DRM_IOCTL_IRQ_BUSID(r2, 0xc0106403, &(0x7f0000000100)={0x8875, 0x800, 0x8000, 0xc2}) ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000180)) ioctl$VHOST_SET_VRING_CALL(0xffffffffffffffff, 0x4008af21, &(0x7f0000000380)) r3 = fcntl$dupfd(r1, 0x0, r2) setsockopt$IP_VS_SO_SET_STOPDAEMON(r3, 0x0, 0x48c, &(0x7f0000000140)={0x3, 'veth0\x00'}, 0x18) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.cpu/syz1\x00', 0x1ff) openat$snapshot(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/snapshot\x00', 0x0, 0x0) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0xf7fffffffffffffd, 0x2012, r2, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000a40)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x20008000}, 0x24044000) unshare(0x40000000) mount$9p_virtio(&(0x7f00000003c0)='em0%$!,cgroup#\x00', &(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='9p\x00', 0x200000, &(0x7f0000000500)={'trans=virtio,', {[{@afid={'afid', 0x3d, 0x6}}, {@version_L='version=9p2000.L'}, {@cache_none='cache=none'}], [{@subj_role={'subj_role', 0x3d, '/dev/dsp#\x00'}}, {@permit_directio='permit_directio'}, {@measure='measure'}, {@context={'context', 0x3d, 'system_u'}}, {@obj_user={'obj_user'}}, {@dont_hash='dont_hash'}, {@subj_type={'subj_type', 0x3d, '\\eth0('}}, {@fsuuid={'fsuuid', 0x3d, {[0x36, 0x79, 0x0, 0x33, 0x61, 0x62, 0x32], 0x2d, [0x77, 0x32, 0x77, 0x34], 0x2d, [0x7f, 0x67, 0x37, 0x77], 0x2d, [0x0, 0x38, 0x32, 0x33], 0x2d, [0x35, 0x37, 0x7f, 0x7b, 0x37, 0x39, 0x77, 0x33]}}}, {@dont_measure='dont_measure'}]}}) ioctl$VIDIOC_ENUMINPUT(r1, 0xc050561a, &(0x7f0000000300)={0x4, "443b36c4364670c73c2ad26e1952769039650793d10fc72d24ce46e327d06e2f", 0x3, 0x100, 0x4, 0x1057ff, 0x0, 0x6}) 06:22:33 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000040)="2e0000000f00817ee45ae087185082cf0f24b0eba06ec400002339e00586f9835b3f0016914879008cd90080e230", 0x2e}], 0x1}, 0x0) 06:22:33 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000040)="2e0000002500817ee45ae087185082cf0324b0eba06ec400002339e00586f9835b3f0016914879008cd90080e230", 0x2e}], 0x1}, 0x0) 06:22:33 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = creat(&(0x7f0000000000)='./bus\x00', 0x0) getrlimit(0x0, &(0x7f00000000c0)) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x1860000}) [ 457.995358][T16856] IPVS: ftp: loaded support on port[0] = 21 06:22:33 executing program 3: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = dup(r0) r2 = fcntl$dupfd(r1, 0x0, r1) bind$bt_rfcomm(r2, &(0x7f0000000040)={0x1f, {0xffffffffffffffff, 0x1ff, 0x3}}, 0xa) getsockopt$IP_VS_SO_GET_TIMEOUT(r2, 0x0, 0x486, 0x0, &(0x7f0000000100)) [ 458.104732][T16854] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.5'. [ 458.244282][T16851] IPVS: ftp: loaded support on port[0] = 21 [ 458.730486][T16870] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.5'. 06:22:34 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000040)="2e0000022500817ee45ae087185082cf0f24b0eba06ec400002339e00586f9835b3f0016914879008cd90080e230", 0x2e}], 0x1}, 0x0) 06:22:34 executing program 3: perf_event_open$cgroup(0x0, 0xffffffffffffff9c, 0x0, 0xffffffffffffff9c, 0x1) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) pipe(0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(0xffffffffffffffff, &(0x7f0000000240)={0x2, 0x0, @broadcast}, 0x10) r1 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) gettid() perf_event_open(&(0x7f00000000c0)={0x0, 0x70, 0xfffffffffffffffa, 0x1, 0x8, 0x1ff, 0x0, 0x8, 0x0, 0x2, 0xd114, 0x100000001, 0x6dd3f521, 0x0, 0xc0000000000000, 0x10000, 0x2, 0x6, 0x5, 0x6, 0x6, 0x80000000, 0x4, 0x4, 0x0, 0x74, 0x5, 0x0, 0x9, 0x2, 0x8389, 0x6, 0x8, 0x7, 0x5, 0x6, 0x0, 0x1, 0x0, 0x2008000, 0x4, @perf_bp={0x0, 0x2}, 0x0, 0x8, 0x2, 0x7, 0x5, 0x7f, 0x8}, 0x0, 0x0, r1, 0x9) sigaltstack(&(0x7f0000ffe000/0x1000)=nil, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setlease(r0, 0x400, 0x1) connect$inet6(0xffffffffffffffff, 0x0, 0x0) setitimer(0x1, &(0x7f0000000180)={{}, {0x0, 0x2710}}, 0x0) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r2, &(0x7f0000deb000)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r2, 0x0, 0x0, 0x400200007fe, &(0x7f00000002c0)={0x2, 0x10084e23, @local}, 0x10) select(0x0, 0x0, &(0x7f0000000140)={0x7, 0x0, 0x4, 0x0, 0x1, 0xffffffffffffff78, 0x6, 0x4}, 0x0, &(0x7f0000000200)) write$binfmt_elf64(r2, &(0x7f00000016c0)=ANY=[@ANYRES64, @ANYRESDEC, @ANYRES16], 0xffffffe6) setsockopt$inet6_udp_encap(0xffffffffffffffff, 0x11, 0x64, 0x0, 0x0) ioctl$RNDCLEARPOOL(0xffffffffffffffff, 0x5206, &(0x7f0000000300)=0x3f) 06:22:34 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) getsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000400), &(0x7f0000000440)=0x8) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, &(0x7f00000019c0)={0x20}, 0x1) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r1, 0x111, 0x5, 0xc3, 0x4) r2 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x1, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r2, 0xc0045516, &(0x7f0000000040)=0x4) arch_prctl$ARCH_GET_CPUID(0x1011) getpgrp(0x0) flock(r0, 0x0) ioctl$BLKRRPART(0xffffffffffffffff, 0x125f, 0x0) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000200)={@mcast2}) fcntl$F_GET_FILE_RW_HINT(r0, 0x40d, &(0x7f00000000c0)) setsockopt$RDS_CONG_MONITOR(r2, 0x114, 0x6, &(0x7f0000000280), 0x4) ioctl$VHOST_SET_LOG_FD(r2, 0x4004af07, 0x0) ioctl$DRM_IOCTL_IRQ_BUSID(r2, 0xc0106403, &(0x7f0000000100)={0x8875, 0x800, 0x8000, 0xc2}) ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000180)) ioctl$VHOST_SET_VRING_CALL(0xffffffffffffffff, 0x4008af21, &(0x7f0000000380)) r3 = fcntl$dupfd(r1, 0x0, r2) setsockopt$IP_VS_SO_SET_STOPDAEMON(r3, 0x0, 0x48c, &(0x7f0000000140)={0x3, 'veth0\x00'}, 0x18) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.cpu/syz1\x00', 0x1ff) openat$snapshot(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/snapshot\x00', 0x0, 0x0) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0xf7fffffffffffffd, 0x2012, r2, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000a40)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x20008000}, 0x24044000) unshare(0x40000000) mount$9p_virtio(&(0x7f00000003c0)='em0%$!,cgroup#\x00', &(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='9p\x00', 0x200000, &(0x7f0000000500)={'trans=virtio,', {[{@afid={'afid', 0x3d, 0x6}}, {@version_L='version=9p2000.L'}, {@cache_none='cache=none'}], [{@subj_role={'subj_role', 0x3d, '/dev/dsp#\x00'}}, {@permit_directio='permit_directio'}, {@measure='measure'}, {@context={'context', 0x3d, 'system_u'}}, {@obj_user={'obj_user'}}, {@dont_hash='dont_hash'}, {@subj_type={'subj_type', 0x3d, '\\eth0('}}, {@fsuuid={'fsuuid', 0x3d, {[0x36, 0x79, 0x0, 0x33, 0x61, 0x62, 0x32], 0x2d, [0x77, 0x32, 0x77, 0x34], 0x2d, [0x7f, 0x67, 0x37, 0x77], 0x2d, [0x0, 0x38, 0x32, 0x33], 0x2d, [0x35, 0x37, 0x7f, 0x7b, 0x37, 0x39, 0x77, 0x33]}}}, {@dont_measure='dont_measure'}]}}) ioctl$VIDIOC_ENUMINPUT(r1, 0xc050561a, &(0x7f0000000300)={0x4, "443b36c4364670c73c2ad26e1952769039650793d10fc72d24ce46e327d06e2f", 0x3, 0x100, 0x4, 0x1057ff, 0x0, 0x6}) 06:22:34 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = creat(&(0x7f0000000000)='./bus\x00', 0x0) getrlimit(0x0, &(0x7f00000000c0)) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x1a40000}) 06:22:34 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000040)="2e0000002500817ee45ae087185082cf0424b0eba06ec400002339e00586f9835b3f0016914879008cd90080e230", 0x2e}], 0x1}, 0x0) 06:22:34 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) getsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000400), &(0x7f0000000440)=0x8) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, &(0x7f00000019c0)={0x20}, 0x1) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r1, 0x111, 0x5, 0xc3, 0x4) r2 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x1, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r2, 0xc0045516, &(0x7f0000000040)=0x4) arch_prctl$ARCH_GET_CPUID(0x1011) getpgrp(0x0) flock(r0, 0x0) ioctl$BLKRRPART(0xffffffffffffffff, 0x125f, 0x0) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000200)={@mcast2}) fcntl$F_GET_FILE_RW_HINT(r0, 0x40d, 0x0) setsockopt$RDS_CONG_MONITOR(r2, 0x114, 0x6, &(0x7f0000000280), 0x4) ioctl$DRM_IOCTL_IRQ_BUSID(r2, 0xc0106403, &(0x7f0000000100)={0x8875, 0x800, 0x8000, 0xc2}) ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000180)) ioctl$VHOST_SET_VRING_CALL(0xffffffffffffffff, 0x4008af21, &(0x7f0000000380)={0x0, r1}) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x3, 'veth0\x00'}, 0x18) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.cpu/syz1\x00', 0x1ff) openat$snapshot(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/snapshot\x00', 0x0, 0x0) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0xf7fffffffffffffd, 0x2012, r2, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000a40)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x20008000}, 0x24044000) unshare(0x40000000) mount$9p_virtio(&(0x7f00000003c0)='em0%$!,cgroup#\x00', &(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='9p\x00', 0x200000, &(0x7f0000000500)={'trans=virtio,', {[{@afid={'afid', 0x3d, 0x6}}, {@version_L='version=9p2000.L'}, {@cache_none='cache=none'}], [{@subj_role={'subj_role', 0x3d, '/dev/dsp#\x00'}}, {@permit_directio='permit_directio'}, {@measure='measure'}, {@context={'context', 0x3d, 'system_u'}}, {@obj_user={'obj_user'}}, {@dont_hash='dont_hash'}, {@subj_type={'subj_type', 0x3d, '\\eth0('}}, {@fsuuid={'fsuuid', 0x3d, {[0x36, 0x79, 0x0, 0x33, 0x61, 0x62, 0x32], 0x2d, [0x77, 0x32, 0x77, 0x34], 0x2d, [0x7f, 0x67, 0x37, 0x77], 0x2d, [0x0, 0x38, 0x32, 0x33], 0x2d, [0x35, 0x37, 0x7f, 0x7b, 0x37, 0x39, 0x77, 0x33]}}}, {@dont_measure='dont_measure'}]}}) ioctl$VIDIOC_ENUMINPUT(r1, 0xc050561a, &(0x7f0000000300)={0x4, "443b36c4364670c73c2ad26e1952769039650793d10fc72d24ce46e327d06e2f", 0x3, 0x100, 0x4, 0x1057ff, 0x0, 0x6}) [ 459.086166][T16888] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.5'. [ 459.176560][T16883] IPVS: ftp: loaded support on port[0] = 21 [ 459.261223][T16891] IPVS: ftp: loaded support on port[0] = 21 06:22:36 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = creat(&(0x7f0000000000)='./bus\x00', 0x0) getrlimit(0x0, &(0x7f00000000c0)) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x2000000}) 06:22:36 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000040)="2e0000032500817ee45ae087185082cf0f24b0eba06ec400002339e00586f9835b3f0016914879008cd90080e230", 0x2e}], 0x1}, 0x0) [ 460.403275][T16892] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.5'. 06:22:36 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) getsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000400), &(0x7f0000000440)=0x8) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, &(0x7f00000019c0)={0x20}, 0x1) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r1, 0x111, 0x5, 0xc3, 0x4) r2 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x1, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r2, 0xc0045516, &(0x7f0000000040)=0x4) arch_prctl$ARCH_GET_CPUID(0x1011) getpgrp(0x0) flock(r0, 0x0) ioctl$BLKRRPART(0xffffffffffffffff, 0x125f, 0x0) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000200)={@mcast2}) fcntl$F_GET_FILE_RW_HINT(r0, 0x40d, &(0x7f00000000c0)) setsockopt$RDS_CONG_MONITOR(r2, 0x114, 0x6, &(0x7f0000000280), 0x4) ioctl$VHOST_SET_LOG_FD(r2, 0x4004af07, 0x0) ioctl$DRM_IOCTL_IRQ_BUSID(r2, 0xc0106403, &(0x7f0000000100)={0x8875, 0x800, 0x8000, 0xc2}) ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000180)) ioctl$VHOST_SET_VRING_CALL(0xffffffffffffffff, 0x4008af21, &(0x7f0000000380)={0x0, r1}) r3 = fcntl$dupfd(0xffffffffffffffff, 0x0, r2) setsockopt$IP_VS_SO_SET_STOPDAEMON(r3, 0x0, 0x48c, &(0x7f0000000140)={0x3, 'veth0\x00'}, 0x18) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.cpu/syz1\x00', 0x1ff) openat$snapshot(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/snapshot\x00', 0x0, 0x0) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0xf7fffffffffffffd, 0x2012, r2, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000a40)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x20008000}, 0x24044000) unshare(0x40000000) mount$9p_virtio(&(0x7f00000003c0)='em0%$!,cgroup#\x00', &(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='9p\x00', 0x200000, &(0x7f0000000500)={'trans=virtio,', {[{@afid={'afid', 0x3d, 0x6}}, {@version_L='version=9p2000.L'}, {@cache_none='cache=none'}], [{@subj_role={'subj_role', 0x3d, '/dev/dsp#\x00'}}, {@permit_directio='permit_directio'}, {@measure='measure'}, {@context={'context', 0x3d, 'system_u'}}, {@obj_user={'obj_user'}}, {@dont_hash='dont_hash'}, {@subj_type={'subj_type', 0x3d, '\\eth0('}}, {@fsuuid={'fsuuid', 0x3d, {[0x36, 0x79, 0x0, 0x33, 0x61, 0x62, 0x32], 0x2d, [0x77, 0x32, 0x77, 0x34], 0x2d, [0x7f, 0x67, 0x37, 0x77], 0x2d, [0x0, 0x38, 0x32, 0x33], 0x2d, [0x35, 0x37, 0x7f, 0x7b, 0x37, 0x39, 0x77, 0x33]}}}, {@dont_measure='dont_measure'}]}}) ioctl$VIDIOC_ENUMINPUT(r1, 0xc050561a, &(0x7f0000000300)={0x4, "443b36c4364670c73c2ad26e1952769039650793d10fc72d24ce46e327d06e2f", 0x3, 0x100, 0x4, 0x1057ff, 0x0, 0x6}) 06:22:36 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000040)="2e0000002500817ee45ae087185082cf0524b0eba06ec400002339e00586f9835b3f0016914879008cd90080e230", 0x2e}], 0x1}, 0x0) 06:22:36 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) getsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000400), &(0x7f0000000440)=0x8) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, &(0x7f00000019c0)={0x20}, 0x1) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r1, 0x111, 0x5, 0xc3, 0x4) r2 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x1, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r2, 0xc0045516, &(0x7f0000000040)=0x4) arch_prctl$ARCH_GET_CPUID(0x1011) getpgrp(0x0) flock(r0, 0x0) ioctl$BLKRRPART(0xffffffffffffffff, 0x125f, 0x0) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000200)={@mcast2}) fcntl$F_GET_FILE_RW_HINT(r0, 0x40d, 0x0) setsockopt$RDS_CONG_MONITOR(r2, 0x114, 0x6, &(0x7f0000000280), 0x4) ioctl$DRM_IOCTL_IRQ_BUSID(r2, 0xc0106403, &(0x7f0000000100)={0x8875, 0x800, 0x8000, 0xc2}) ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000180)) ioctl$VHOST_SET_VRING_CALL(0xffffffffffffffff, 0x4008af21, &(0x7f0000000380)={0x0, r1}) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x3, 'veth0\x00'}, 0x18) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.cpu/syz1\x00', 0x1ff) openat$snapshot(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/snapshot\x00', 0x0, 0x0) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0xf7fffffffffffffd, 0x2012, r2, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000a40)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x20008000}, 0x24044000) unshare(0x40000000) mount$9p_virtio(&(0x7f00000003c0)='em0%$!,cgroup#\x00', &(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='9p\x00', 0x200000, &(0x7f0000000500)={'trans=virtio,', {[{@afid={'afid', 0x3d, 0x6}}, {@version_L='version=9p2000.L'}, {@cache_none='cache=none'}], [{@subj_role={'subj_role', 0x3d, '/dev/dsp#\x00'}}, {@permit_directio='permit_directio'}, {@measure='measure'}, {@context={'context', 0x3d, 'system_u'}}, {@obj_user={'obj_user'}}, {@dont_hash='dont_hash'}, {@subj_type={'subj_type', 0x3d, '\\eth0('}}, {@fsuuid={'fsuuid', 0x3d, {[0x36, 0x79, 0x0, 0x33, 0x61, 0x62, 0x32], 0x2d, [0x77, 0x32, 0x77, 0x34], 0x2d, [0x7f, 0x67, 0x37, 0x77], 0x2d, [0x0, 0x38, 0x32, 0x33], 0x2d, [0x35, 0x37, 0x7f, 0x7b, 0x37, 0x39, 0x77, 0x33]}}}, {@dont_measure='dont_measure'}]}}) ioctl$VIDIOC_ENUMINPUT(r1, 0xc050561a, &(0x7f0000000300)={0x4, "443b36c4364670c73c2ad26e1952769039650793d10fc72d24ce46e327d06e2f", 0x3, 0x100, 0x4, 0x1057ff, 0x0, 0x6}) 06:22:36 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000040)="2e0000042500817ee45ae087185082cf0f24b0eba06ec400002339e00586f9835b3f0016914879008cd90080e230", 0x2e}], 0x1}, 0x0) 06:22:36 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = creat(&(0x7f0000000000)='./bus\x00', 0x0) getrlimit(0x0, &(0x7f00000000c0)) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x2800300}) [ 460.662467][T16908] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.5'. 06:22:36 executing program 3: perf_event_open$cgroup(0x0, 0xffffffffffffff9c, 0x0, 0xffffffffffffff9c, 0x1) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) pipe(0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(0xffffffffffffffff, &(0x7f0000000240)={0x2, 0x0, @broadcast}, 0x10) r1 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) gettid() perf_event_open(&(0x7f00000000c0)={0x0, 0x70, 0xfffffffffffffffa, 0x1, 0x8, 0x1ff, 0x0, 0x8, 0x0, 0x2, 0xd114, 0x100000001, 0x6dd3f521, 0x0, 0xc0000000000000, 0x10000, 0x2, 0x6, 0x5, 0x6, 0x6, 0x80000000, 0x4, 0x4, 0x0, 0x74, 0x5, 0x0, 0x9, 0x2, 0x8389, 0x6, 0x8, 0x7, 0x5, 0x6, 0x0, 0x1, 0x0, 0x2008000, 0x4, @perf_bp={0x0, 0x2}, 0x0, 0x8, 0x2, 0x7, 0x5, 0x7f, 0x8}, 0x0, 0x0, r1, 0x9) sigaltstack(&(0x7f0000ffe000/0x1000)=nil, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setlease(r0, 0x400, 0x1) connect$inet6(0xffffffffffffffff, 0x0, 0x0) setitimer(0x1, &(0x7f0000000180)={{}, {0x0, 0x2710}}, 0x0) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r2, &(0x7f0000deb000)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r2, 0x0, 0x0, 0x400200007fe, &(0x7f00000002c0)={0x2, 0x10084e23, @local}, 0x10) select(0x0, 0x0, &(0x7f0000000140)={0x7, 0x0, 0x4, 0x0, 0x1, 0xffffffffffffff78, 0x6, 0x4}, 0x0, &(0x7f0000000200)) write$binfmt_elf64(r2, &(0x7f00000016c0)=ANY=[@ANYRES64, @ANYRESDEC, @ANYRES16], 0xffffffe6) setsockopt$inet6_udp_encap(0xffffffffffffffff, 0x11, 0x64, 0x0, 0x0) ioctl$RNDCLEARPOOL(0xffffffffffffffff, 0x5206, &(0x7f0000000300)=0x3f) [ 460.887955][T16911] IPVS: ftp: loaded support on port[0] = 21 [ 460.893388][T16906] IPVS: ftp: loaded support on port[0] = 21 [ 462.092132][T16915] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.5'. 06:22:37 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000040)="2e0000002500817ee45ae087185082cf0624b0eba06ec400002339e00586f9835b3f0016914879008cd90080e230", 0x2e}], 0x1}, 0x0) 06:22:37 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) getsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000400), &(0x7f0000000440)=0x8) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, &(0x7f00000019c0)={0x20}, 0x1) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r1, 0x111, 0x5, 0xc3, 0x4) r2 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x1, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r2, 0xc0045516, &(0x7f0000000040)=0x4) arch_prctl$ARCH_GET_CPUID(0x1011) getpgrp(0x0) flock(r0, 0x0) ioctl$BLKRRPART(0xffffffffffffffff, 0x125f, 0x0) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000200)={@mcast2}) fcntl$F_GET_FILE_RW_HINT(r0, 0x40d, &(0x7f00000000c0)) setsockopt$RDS_CONG_MONITOR(r2, 0x114, 0x6, &(0x7f0000000280), 0x4) ioctl$VHOST_SET_LOG_FD(r2, 0x4004af07, 0x0) ioctl$DRM_IOCTL_IRQ_BUSID(r2, 0xc0106403, &(0x7f0000000100)={0x8875, 0x800, 0x8000, 0xc2}) ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000180)) ioctl$VHOST_SET_VRING_CALL(0xffffffffffffffff, 0x4008af21, &(0x7f0000000380)={0x0, r1}) r3 = fcntl$dupfd(0xffffffffffffffff, 0x0, r2) setsockopt$IP_VS_SO_SET_STOPDAEMON(r3, 0x0, 0x48c, &(0x7f0000000140)={0x3, 'veth0\x00'}, 0x18) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.cpu/syz1\x00', 0x1ff) openat$snapshot(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/snapshot\x00', 0x0, 0x0) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0xf7fffffffffffffd, 0x2012, r2, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000a40)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x20008000}, 0x24044000) unshare(0x40000000) mount$9p_virtio(&(0x7f00000003c0)='em0%$!,cgroup#\x00', &(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='9p\x00', 0x200000, &(0x7f0000000500)={'trans=virtio,', {[{@afid={'afid', 0x3d, 0x6}}, {@version_L='version=9p2000.L'}, {@cache_none='cache=none'}], [{@subj_role={'subj_role', 0x3d, '/dev/dsp#\x00'}}, {@permit_directio='permit_directio'}, {@measure='measure'}, {@context={'context', 0x3d, 'system_u'}}, {@obj_user={'obj_user'}}, {@dont_hash='dont_hash'}, {@subj_type={'subj_type', 0x3d, '\\eth0('}}, {@fsuuid={'fsuuid', 0x3d, {[0x36, 0x79, 0x0, 0x33, 0x61, 0x62, 0x32], 0x2d, [0x77, 0x32, 0x77, 0x34], 0x2d, [0x7f, 0x67, 0x37, 0x77], 0x2d, [0x0, 0x38, 0x32, 0x33], 0x2d, [0x35, 0x37, 0x7f, 0x7b, 0x37, 0x39, 0x77, 0x33]}}}, {@dont_measure='dont_measure'}]}}) ioctl$VIDIOC_ENUMINPUT(r1, 0xc050561a, &(0x7f0000000300)={0x4, "443b36c4364670c73c2ad26e1952769039650793d10fc72d24ce46e327d06e2f", 0x3, 0x100, 0x4, 0x1057ff, 0x0, 0x6}) 06:22:38 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000040)="2e0000052500817ee45ae087185082cf0f24b0eba06ec400002339e00586f9835b3f0016914879008cd90080e230", 0x2e}], 0x1}, 0x0) 06:22:38 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) getsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000400), &(0x7f0000000440)=0x8) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, &(0x7f00000019c0)={0x20}, 0x1) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r1, 0x111, 0x5, 0xc3, 0x4) r2 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x1, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r2, 0xc0045516, &(0x7f0000000040)=0x4) arch_prctl$ARCH_GET_CPUID(0x1011) getpgrp(0x0) flock(r0, 0x0) ioctl$BLKRRPART(0xffffffffffffffff, 0x125f, 0x0) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000200)={@mcast2}) fcntl$F_GET_FILE_RW_HINT(r0, 0x40d, 0x0) setsockopt$RDS_CONG_MONITOR(r2, 0x114, 0x6, &(0x7f0000000280), 0x4) ioctl$DRM_IOCTL_IRQ_BUSID(r2, 0xc0106403, &(0x7f0000000100)={0x8875, 0x800, 0x8000, 0xc2}) ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000180)) ioctl$VHOST_SET_VRING_CALL(0xffffffffffffffff, 0x4008af21, &(0x7f0000000380)={0x0, r1}) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x3, 'veth0\x00'}, 0x18) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.cpu/syz1\x00', 0x1ff) openat$snapshot(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/snapshot\x00', 0x0, 0x0) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0xf7fffffffffffffd, 0x2012, r2, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000a40)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x20008000}, 0x24044000) unshare(0x40000000) mount$9p_virtio(&(0x7f00000003c0)='em0%$!,cgroup#\x00', &(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='9p\x00', 0x200000, &(0x7f0000000500)={'trans=virtio,', {[{@afid={'afid', 0x3d, 0x6}}, {@version_L='version=9p2000.L'}, {@cache_none='cache=none'}], [{@subj_role={'subj_role', 0x3d, '/dev/dsp#\x00'}}, {@permit_directio='permit_directio'}, {@measure='measure'}, {@context={'context', 0x3d, 'system_u'}}, {@obj_user={'obj_user'}}, {@dont_hash='dont_hash'}, {@subj_type={'subj_type', 0x3d, '\\eth0('}}, {@fsuuid={'fsuuid', 0x3d, {[0x36, 0x79, 0x0, 0x33, 0x61, 0x62, 0x32], 0x2d, [0x77, 0x32, 0x77, 0x34], 0x2d, [0x7f, 0x67, 0x37, 0x77], 0x2d, [0x0, 0x38, 0x32, 0x33], 0x2d, [0x35, 0x37, 0x7f, 0x7b, 0x37, 0x39, 0x77, 0x33]}}}, {@dont_measure='dont_measure'}]}}) ioctl$VIDIOC_ENUMINPUT(r1, 0xc050561a, &(0x7f0000000300)={0x4, "443b36c4364670c73c2ad26e1952769039650793d10fc72d24ce46e327d06e2f", 0x3, 0x100, 0x4, 0x1057ff, 0x0, 0x6}) 06:22:38 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = creat(&(0x7f0000000000)='./bus\x00', 0x0) getrlimit(0x0, &(0x7f00000000c0)) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x2800400}) [ 462.354221][T16928] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.5'. [ 462.414750][T16933] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.5'. 06:22:38 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000040)="2e0000062500817ee45ae087185082cf0f24b0eba06ec400002339e00586f9835b3f0016914879008cd90080e230", 0x2e}], 0x1}, 0x0) [ 462.580799][T16937] IPVS: ftp: loaded support on port[0] = 21 [ 462.801646][T16945] IPVS: ftp: loaded support on port[0] = 21 06:22:38 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000040)="2e0000002500817ee45ae087185082cf0724b0eba06ec400002339e00586f9835b3f0016914879008cd90080e230", 0x2e}], 0x1}, 0x0) 06:22:38 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000040)="2e0000002500817ee45ae087185082cf0824b0eba06ec400002339e00586f9835b3f0016914879008cd90080e230", 0x2e}], 0x1}, 0x0) 06:22:39 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000040)="2e0000072500817ee45ae087185082cf0f24b0eba06ec400002339e00586f9835b3f0016914879008cd90080e230", 0x2e}], 0x1}, 0x0) 06:22:39 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) getsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000400), &(0x7f0000000440)=0x8) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, &(0x7f00000019c0)={0x20}, 0x1) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r1, 0x111, 0x5, 0xc3, 0x4) r2 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x1, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r2, 0xc0045516, &(0x7f0000000040)=0x4) arch_prctl$ARCH_GET_CPUID(0x1011) getpgrp(0x0) flock(r0, 0x0) ioctl$BLKRRPART(0xffffffffffffffff, 0x125f, 0x0) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000200)={@mcast2}) fcntl$F_GET_FILE_RW_HINT(r0, 0x40d, &(0x7f00000000c0)) setsockopt$RDS_CONG_MONITOR(r2, 0x114, 0x6, &(0x7f0000000280), 0x4) ioctl$VHOST_SET_LOG_FD(r2, 0x4004af07, 0x0) ioctl$DRM_IOCTL_IRQ_BUSID(r2, 0xc0106403, &(0x7f0000000100)={0x8875, 0x800, 0x8000, 0xc2}) ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000180)) ioctl$VHOST_SET_VRING_CALL(0xffffffffffffffff, 0x4008af21, &(0x7f0000000380)={0x0, r1}) r3 = fcntl$dupfd(0xffffffffffffffff, 0x0, r2) setsockopt$IP_VS_SO_SET_STOPDAEMON(r3, 0x0, 0x48c, &(0x7f0000000140)={0x3, 'veth0\x00'}, 0x18) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.cpu/syz1\x00', 0x1ff) openat$snapshot(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/snapshot\x00', 0x0, 0x0) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0xf7fffffffffffffd, 0x2012, r2, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000a40)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x20008000}, 0x24044000) unshare(0x40000000) mount$9p_virtio(&(0x7f00000003c0)='em0%$!,cgroup#\x00', &(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='9p\x00', 0x200000, &(0x7f0000000500)={'trans=virtio,', {[{@afid={'afid', 0x3d, 0x6}}, {@version_L='version=9p2000.L'}, {@cache_none='cache=none'}], [{@subj_role={'subj_role', 0x3d, '/dev/dsp#\x00'}}, {@permit_directio='permit_directio'}, {@measure='measure'}, {@context={'context', 0x3d, 'system_u'}}, {@obj_user={'obj_user'}}, {@dont_hash='dont_hash'}, {@subj_type={'subj_type', 0x3d, '\\eth0('}}, {@fsuuid={'fsuuid', 0x3d, {[0x36, 0x79, 0x0, 0x33, 0x61, 0x62, 0x32], 0x2d, [0x77, 0x32, 0x77, 0x34], 0x2d, [0x7f, 0x67, 0x37, 0x77], 0x2d, [0x0, 0x38, 0x32, 0x33], 0x2d, [0x35, 0x37, 0x7f, 0x7b, 0x37, 0x39, 0x77, 0x33]}}}, {@dont_measure='dont_measure'}]}}) ioctl$VIDIOC_ENUMINPUT(r1, 0xc050561a, &(0x7f0000000300)={0x4, "443b36c4364670c73c2ad26e1952769039650793d10fc72d24ce46e327d06e2f", 0x3, 0x100, 0x4, 0x1057ff, 0x0, 0x6}) 06:22:39 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = creat(&(0x7f0000000000)='./bus\x00', 0x0) getrlimit(0x0, &(0x7f00000000c0)) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x3000000}) 06:22:39 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x3, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x13, 0x5d}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x487, &(0x7f000000cf3d)=""/195}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r0, 0x0, 0xe, 0x0, &(0x7f0000000380)="263abd030e98ff4dc870bd6688a8", 0x0, 0x4af}, 0x28) 06:22:39 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000040)="2e0000082500817ee45ae087185082cf0f24b0eba06ec400002339e00586f9835b3f0016914879008cd90080e230", 0x2e}], 0x1}, 0x0) 06:22:39 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) getsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000400), &(0x7f0000000440)=0x8) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, &(0x7f00000019c0)={0x20}, 0x1) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r1, 0x111, 0x5, 0xc3, 0x4) r2 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x1, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r2, 0xc0045516, &(0x7f0000000040)=0x4) arch_prctl$ARCH_GET_CPUID(0x1011) getpgrp(0x0) flock(r0, 0x0) ioctl$BLKRRPART(0xffffffffffffffff, 0x125f, 0x0) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000200)={@mcast2}) fcntl$F_GET_FILE_RW_HINT(r0, 0x40d, 0x0) ioctl$VHOST_SET_LOG_FD(r2, 0x4004af07, 0x0) ioctl$DRM_IOCTL_IRQ_BUSID(r2, 0xc0106403, &(0x7f0000000100)={0x8875, 0x800, 0x8000, 0xc2}) ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000180)) ioctl$VHOST_SET_VRING_CALL(0xffffffffffffffff, 0x4008af21, &(0x7f0000000380)={0x0, r1}) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x3, 'veth0\x00'}, 0x18) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.cpu/syz1\x00', 0x1ff) openat$snapshot(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/snapshot\x00', 0x0, 0x0) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0xf7fffffffffffffd, 0x2012, r2, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000a40)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x20008000}, 0x24044000) unshare(0x40000000) mount$9p_virtio(&(0x7f00000003c0)='em0%$!,cgroup#\x00', &(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='9p\x00', 0x200000, &(0x7f0000000500)={'trans=virtio,', {[{@afid={'afid', 0x3d, 0x6}}, {@version_L='version=9p2000.L'}, {@cache_none='cache=none'}], [{@subj_role={'subj_role', 0x3d, '/dev/dsp#\x00'}}, {@permit_directio='permit_directio'}, {@measure='measure'}, {@context={'context', 0x3d, 'system_u'}}, {@obj_user={'obj_user'}}, {@dont_hash='dont_hash'}, {@subj_type={'subj_type', 0x3d, '\\eth0('}}, {@fsuuid={'fsuuid', 0x3d, {[0x36, 0x79, 0x0, 0x33, 0x61, 0x62, 0x32], 0x2d, [0x77, 0x32, 0x77, 0x34], 0x2d, [0x7f, 0x67, 0x37, 0x77], 0x2d, [0x0, 0x38, 0x32, 0x33], 0x2d, [0x35, 0x37, 0x7f, 0x7b, 0x37, 0x39, 0x77, 0x33]}}}, {@dont_measure='dont_measure'}]}}) ioctl$VIDIOC_ENUMINPUT(r1, 0xc050561a, &(0x7f0000000300)={0x4, "443b36c4364670c73c2ad26e1952769039650793d10fc72d24ce46e327d06e2f", 0x3, 0x100, 0x4, 0x1057ff, 0x0, 0x6}) 06:22:39 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000040)="2e0000002500817ee45ae087185082cf0924b0eba06ec400002339e00586f9835b3f0016914879008cd90080e230", 0x2e}], 0x1}, 0x0) [ 463.776186][T16959] IPVS: ftp: loaded support on port[0] = 21 [ 463.897383][T16976] __nla_parse: 2 callbacks suppressed [ 463.897546][T16976] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.5'. [ 464.016026][T16975] IPVS: ftp: loaded support on port[0] = 21 [ 464.778699][T16978] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.5'. 06:22:40 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000040)="2e00000a2500817ee45ae087185082cf0f24b0eba06ec400002339e00586f9835b3f0016914879008cd90080e230", 0x2e}], 0x1}, 0x0) 06:22:40 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = creat(&(0x7f0000000000)='./bus\x00', 0x0) getrlimit(0x0, &(0x7f00000000c0)) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x3580300}) 06:22:40 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) getsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000400), &(0x7f0000000440)=0x8) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, &(0x7f00000019c0)={0x20}, 0x1) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r1, 0x111, 0x5, 0xc3, 0x4) r2 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x1, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r2, 0xc0045516, &(0x7f0000000040)=0x4) arch_prctl$ARCH_GET_CPUID(0x1011) getpgrp(0x0) flock(r0, 0x0) ioctl$BLKRRPART(0xffffffffffffffff, 0x125f, 0x0) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000200)={@mcast2}) fcntl$F_GET_FILE_RW_HINT(r0, 0x40d, &(0x7f00000000c0)) setsockopt$RDS_CONG_MONITOR(r2, 0x114, 0x6, &(0x7f0000000280), 0x4) ioctl$VHOST_SET_LOG_FD(r2, 0x4004af07, 0x0) ioctl$DRM_IOCTL_IRQ_BUSID(r2, 0xc0106403, &(0x7f0000000100)={0x8875, 0x800, 0x8000, 0xc2}) ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000180)) ioctl$VHOST_SET_VRING_CALL(0xffffffffffffffff, 0x4008af21, &(0x7f0000000380)={0x0, r1}) r3 = fcntl$dupfd(r1, 0x0, 0xffffffffffffffff) setsockopt$IP_VS_SO_SET_STOPDAEMON(r3, 0x0, 0x48c, &(0x7f0000000140)={0x3, 'veth0\x00'}, 0x18) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.cpu/syz1\x00', 0x1ff) openat$snapshot(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/snapshot\x00', 0x0, 0x0) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0xf7fffffffffffffd, 0x2012, r2, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000a40)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x20008000}, 0x24044000) unshare(0x40000000) mount$9p_virtio(&(0x7f00000003c0)='em0%$!,cgroup#\x00', &(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='9p\x00', 0x200000, &(0x7f0000000500)={'trans=virtio,', {[{@afid={'afid', 0x3d, 0x6}}, {@version_L='version=9p2000.L'}, {@cache_none='cache=none'}], [{@subj_role={'subj_role', 0x3d, '/dev/dsp#\x00'}}, {@permit_directio='permit_directio'}, {@measure='measure'}, {@context={'context', 0x3d, 'system_u'}}, {@obj_user={'obj_user'}}, {@dont_hash='dont_hash'}, {@subj_type={'subj_type', 0x3d, '\\eth0('}}, {@fsuuid={'fsuuid', 0x3d, {[0x36, 0x79, 0x0, 0x33, 0x61, 0x62, 0x32], 0x2d, [0x77, 0x32, 0x77, 0x34], 0x2d, [0x7f, 0x67, 0x37, 0x77], 0x2d, [0x0, 0x38, 0x32, 0x33], 0x2d, [0x35, 0x37, 0x7f, 0x7b, 0x37, 0x39, 0x77, 0x33]}}}, {@dont_measure='dont_measure'}]}}) ioctl$VIDIOC_ENUMINPUT(r1, 0xc050561a, &(0x7f0000000300)={0x4, "443b36c4364670c73c2ad26e1952769039650793d10fc72d24ce46e327d06e2f", 0x3, 0x100, 0x4, 0x1057ff, 0x0, 0x6}) 06:22:40 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000040)="2e0000002500817ee45ae087185082cf0a24b0eba06ec400002339e00586f9835b3f0016914879008cd90080e230", 0x2e}], 0x1}, 0x0) 06:22:40 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) getsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000400), &(0x7f0000000440)=0x8) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, &(0x7f00000019c0)={0x20}, 0x1) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r1, 0x111, 0x5, 0xc3, 0x4) r2 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x1, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r2, 0xc0045516, &(0x7f0000000040)=0x4) arch_prctl$ARCH_GET_CPUID(0x1011) getpgrp(0x0) flock(r0, 0x0) ioctl$BLKRRPART(0xffffffffffffffff, 0x125f, 0x0) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000200)={@mcast2}) fcntl$F_GET_FILE_RW_HINT(r0, 0x40d, 0x0) ioctl$VHOST_SET_LOG_FD(r2, 0x4004af07, 0x0) ioctl$DRM_IOCTL_IRQ_BUSID(r2, 0xc0106403, &(0x7f0000000100)={0x8875, 0x800, 0x8000, 0xc2}) ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000180)) ioctl$VHOST_SET_VRING_CALL(0xffffffffffffffff, 0x4008af21, &(0x7f0000000380)={0x0, r1}) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x3, 'veth0\x00'}, 0x18) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.cpu/syz1\x00', 0x1ff) openat$snapshot(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/snapshot\x00', 0x0, 0x0) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0xf7fffffffffffffd, 0x2012, r2, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000a40)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x20008000}, 0x24044000) unshare(0x40000000) mount$9p_virtio(&(0x7f00000003c0)='em0%$!,cgroup#\x00', &(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='9p\x00', 0x200000, &(0x7f0000000500)={'trans=virtio,', {[{@afid={'afid', 0x3d, 0x6}}, {@version_L='version=9p2000.L'}, {@cache_none='cache=none'}], [{@subj_role={'subj_role', 0x3d, '/dev/dsp#\x00'}}, {@permit_directio='permit_directio'}, {@measure='measure'}, {@context={'context', 0x3d, 'system_u'}}, {@obj_user={'obj_user'}}, {@dont_hash='dont_hash'}, {@subj_type={'subj_type', 0x3d, '\\eth0('}}, {@fsuuid={'fsuuid', 0x3d, {[0x36, 0x79, 0x0, 0x33, 0x61, 0x62, 0x32], 0x2d, [0x77, 0x32, 0x77, 0x34], 0x2d, [0x7f, 0x67, 0x37, 0x77], 0x2d, [0x0, 0x38, 0x32, 0x33], 0x2d, [0x35, 0x37, 0x7f, 0x7b, 0x37, 0x39, 0x77, 0x33]}}}, {@dont_measure='dont_measure'}]}}) ioctl$VIDIOC_ENUMINPUT(r1, 0xc050561a, &(0x7f0000000300)={0x4, "443b36c4364670c73c2ad26e1952769039650793d10fc72d24ce46e327d06e2f", 0x3, 0x100, 0x4, 0x1057ff, 0x0, 0x6}) 06:22:40 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000040)="2e00000e2500817ee45ae087185082cf0f24b0eba06ec400002339e00586f9835b3f0016914879008cd90080e230", 0x2e}], 0x1}, 0x0) 06:22:40 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = creat(&(0x7f0000000000)='./bus\x00', 0x0) getrlimit(0x0, &(0x7f00000000c0)) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x4000000}) 06:22:40 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x3, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x13, 0x5d}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x487, &(0x7f000000cf3d)=""/195}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r0, 0x0, 0xe, 0x0, &(0x7f0000000380)="263abd030e98ff4dc870bd6688a8", 0x0, 0x4af}, 0x28) [ 465.173202][T16998] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.5'. [ 465.271750][T16993] IPVS: ftp: loaded support on port[0] = 21 [ 465.276825][T17005] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.5'. [ 465.506630][T17007] IPVS: ftp: loaded support on port[0] = 21 06:22:41 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000040)="2e00000f2500817ee45ae087185082cf0f24b0eba06ec400002339e00586f9835b3f0016914879008cd90080e230", 0x2e}], 0x1}, 0x0) 06:22:41 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000040)="2e0000102500817ee45ae087185082cf0f24b0eba06ec400002339e00586f9835b3f0016914879008cd90080e230", 0x2e}], 0x1}, 0x0) 06:22:41 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = creat(&(0x7f0000000000)='./bus\x00', 0x0) getrlimit(0x0, &(0x7f00000000c0)) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x4840000}) 06:22:42 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000040)="2e0000002500817ee45ae087185082cf0b24b0eba06ec400002339e00586f9835b3f0016914879008cd90080e230", 0x2e}], 0x1}, 0x0) 06:22:42 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) getsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000400), &(0x7f0000000440)=0x8) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, &(0x7f00000019c0)={0x20}, 0x1) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r1, 0x111, 0x5, 0xc3, 0x4) r2 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x1, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r2, 0xc0045516, &(0x7f0000000040)=0x4) arch_prctl$ARCH_GET_CPUID(0x1011) getpgrp(0x0) flock(r0, 0x0) ioctl$BLKRRPART(0xffffffffffffffff, 0x125f, 0x0) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000200)={@mcast2}) fcntl$F_GET_FILE_RW_HINT(r0, 0x40d, &(0x7f00000000c0)) setsockopt$RDS_CONG_MONITOR(r2, 0x114, 0x6, &(0x7f0000000280), 0x4) ioctl$VHOST_SET_LOG_FD(r2, 0x4004af07, 0x0) ioctl$DRM_IOCTL_IRQ_BUSID(r2, 0xc0106403, &(0x7f0000000100)={0x8875, 0x800, 0x8000, 0xc2}) ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000180)) ioctl$VHOST_SET_VRING_CALL(0xffffffffffffffff, 0x4008af21, &(0x7f0000000380)={0x0, r1}) r3 = fcntl$dupfd(r1, 0x0, 0xffffffffffffffff) setsockopt$IP_VS_SO_SET_STOPDAEMON(r3, 0x0, 0x48c, &(0x7f0000000140)={0x3, 'veth0\x00'}, 0x18) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.cpu/syz1\x00', 0x1ff) openat$snapshot(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/snapshot\x00', 0x0, 0x0) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0xf7fffffffffffffd, 0x2012, r2, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000a40)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x20008000}, 0x24044000) unshare(0x40000000) mount$9p_virtio(&(0x7f00000003c0)='em0%$!,cgroup#\x00', &(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='9p\x00', 0x200000, &(0x7f0000000500)={'trans=virtio,', {[{@afid={'afid', 0x3d, 0x6}}, {@version_L='version=9p2000.L'}, {@cache_none='cache=none'}], [{@subj_role={'subj_role', 0x3d, '/dev/dsp#\x00'}}, {@permit_directio='permit_directio'}, {@measure='measure'}, {@context={'context', 0x3d, 'system_u'}}, {@obj_user={'obj_user'}}, {@dont_hash='dont_hash'}, {@subj_type={'subj_type', 0x3d, '\\eth0('}}, {@fsuuid={'fsuuid', 0x3d, {[0x36, 0x79, 0x0, 0x33, 0x61, 0x62, 0x32], 0x2d, [0x77, 0x32, 0x77, 0x34], 0x2d, [0x7f, 0x67, 0x37, 0x77], 0x2d, [0x0, 0x38, 0x32, 0x33], 0x2d, [0x35, 0x37, 0x7f, 0x7b, 0x37, 0x39, 0x77, 0x33]}}}, {@dont_measure='dont_measure'}]}}) ioctl$VIDIOC_ENUMINPUT(r1, 0xc050561a, &(0x7f0000000300)={0x4, "443b36c4364670c73c2ad26e1952769039650793d10fc72d24ce46e327d06e2f", 0x3, 0x100, 0x4, 0x1057ff, 0x0, 0x6}) 06:22:42 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) getsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000400), &(0x7f0000000440)=0x8) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, &(0x7f00000019c0)={0x20}, 0x1) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r1, 0x111, 0x5, 0xc3, 0x4) r2 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x1, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r2, 0xc0045516, &(0x7f0000000040)=0x4) arch_prctl$ARCH_GET_CPUID(0x1011) getpgrp(0x0) flock(r0, 0x0) ioctl$BLKRRPART(0xffffffffffffffff, 0x125f, 0x0) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000200)={@mcast2}) fcntl$F_GET_FILE_RW_HINT(r0, 0x40d, 0x0) ioctl$VHOST_SET_LOG_FD(r2, 0x4004af07, 0x0) ioctl$DRM_IOCTL_IRQ_BUSID(r2, 0xc0106403, &(0x7f0000000100)={0x8875, 0x800, 0x8000, 0xc2}) ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000180)) ioctl$VHOST_SET_VRING_CALL(0xffffffffffffffff, 0x4008af21, &(0x7f0000000380)={0x0, r1}) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x3, 'veth0\x00'}, 0x18) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.cpu/syz1\x00', 0x1ff) openat$snapshot(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/snapshot\x00', 0x0, 0x0) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0xf7fffffffffffffd, 0x2012, r2, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000a40)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x20008000}, 0x24044000) unshare(0x40000000) mount$9p_virtio(&(0x7f00000003c0)='em0%$!,cgroup#\x00', &(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='9p\x00', 0x200000, &(0x7f0000000500)={'trans=virtio,', {[{@afid={'afid', 0x3d, 0x6}}, {@version_L='version=9p2000.L'}, {@cache_none='cache=none'}], [{@subj_role={'subj_role', 0x3d, '/dev/dsp#\x00'}}, {@permit_directio='permit_directio'}, {@measure='measure'}, {@context={'context', 0x3d, 'system_u'}}, {@obj_user={'obj_user'}}, {@dont_hash='dont_hash'}, {@subj_type={'subj_type', 0x3d, '\\eth0('}}, {@fsuuid={'fsuuid', 0x3d, {[0x36, 0x79, 0x0, 0x33, 0x61, 0x62, 0x32], 0x2d, [0x77, 0x32, 0x77, 0x34], 0x2d, [0x7f, 0x67, 0x37, 0x77], 0x2d, [0x0, 0x38, 0x32, 0x33], 0x2d, [0x35, 0x37, 0x7f, 0x7b, 0x37, 0x39, 0x77, 0x33]}}}, {@dont_measure='dont_measure'}]}}) ioctl$VIDIOC_ENUMINPUT(r1, 0xc050561a, &(0x7f0000000300)={0x4, "443b36c4364670c73c2ad26e1952769039650793d10fc72d24ce46e327d06e2f", 0x3, 0x100, 0x4, 0x1057ff, 0x0, 0x6}) 06:22:42 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000040)="2e0000482500817ee45ae087185082cf0f24b0eba06ec400002339e00586f9835b3f0016914879008cd90080e230", 0x2e}], 0x1}, 0x0) 06:22:42 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x3, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x13, 0x5d}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x487, &(0x7f000000cf3d)=""/195}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r0, 0x0, 0xe, 0x0, &(0x7f0000000380)="263abd030e98ff4dc870bd6688a8", 0x0, 0x4af}, 0x28) 06:22:42 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000040)="2e0000002500817ee45ae087185082cf0c24b0eba06ec400002339e00586f9835b3f0016914879008cd90080e230", 0x2e}], 0x1}, 0x0) [ 466.661168][T17030] IPVS: ftp: loaded support on port[0] = 21 [ 466.744749][T17042] IPVS: ftp: loaded support on port[0] = 21 06:22:42 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = creat(&(0x7f0000000000)='./bus\x00', 0x0) getrlimit(0x0, &(0x7f00000000c0)) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x5000000}) 06:22:43 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000040)="2e00004c2500817ee45ae087185082cf0f24b0eba06ec400002339e00586f9835b3f0016914879008cd90080e230", 0x2e}], 0x1}, 0x0) [ 467.792215][T17045] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.5'. 06:22:43 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) getsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000400), &(0x7f0000000440)=0x8) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, &(0x7f00000019c0)={0x20}, 0x1) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r1, 0x111, 0x5, 0xc3, 0x4) r2 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x1, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r2, 0xc0045516, &(0x7f0000000040)=0x4) arch_prctl$ARCH_GET_CPUID(0x1011) getpgrp(0x0) flock(r0, 0x0) ioctl$BLKRRPART(0xffffffffffffffff, 0x125f, 0x0) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000200)={@mcast2}) fcntl$F_GET_FILE_RW_HINT(r0, 0x40d, &(0x7f00000000c0)) setsockopt$RDS_CONG_MONITOR(r2, 0x114, 0x6, &(0x7f0000000280), 0x4) ioctl$VHOST_SET_LOG_FD(r2, 0x4004af07, 0x0) ioctl$DRM_IOCTL_IRQ_BUSID(r2, 0xc0106403, &(0x7f0000000100)={0x8875, 0x800, 0x8000, 0xc2}) ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000180)) ioctl$VHOST_SET_VRING_CALL(0xffffffffffffffff, 0x4008af21, &(0x7f0000000380)={0x0, r1}) r3 = fcntl$dupfd(r1, 0x0, 0xffffffffffffffff) setsockopt$IP_VS_SO_SET_STOPDAEMON(r3, 0x0, 0x48c, &(0x7f0000000140)={0x3, 'veth0\x00'}, 0x18) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.cpu/syz1\x00', 0x1ff) openat$snapshot(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/snapshot\x00', 0x0, 0x0) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0xf7fffffffffffffd, 0x2012, r2, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000a40)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x20008000}, 0x24044000) unshare(0x40000000) mount$9p_virtio(&(0x7f00000003c0)='em0%$!,cgroup#\x00', &(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='9p\x00', 0x200000, &(0x7f0000000500)={'trans=virtio,', {[{@afid={'afid', 0x3d, 0x6}}, {@version_L='version=9p2000.L'}, {@cache_none='cache=none'}], [{@subj_role={'subj_role', 0x3d, '/dev/dsp#\x00'}}, {@permit_directio='permit_directio'}, {@measure='measure'}, {@context={'context', 0x3d, 'system_u'}}, {@obj_user={'obj_user'}}, {@dont_hash='dont_hash'}, {@subj_type={'subj_type', 0x3d, '\\eth0('}}, {@fsuuid={'fsuuid', 0x3d, {[0x36, 0x79, 0x0, 0x33, 0x61, 0x62, 0x32], 0x2d, [0x77, 0x32, 0x77, 0x34], 0x2d, [0x7f, 0x67, 0x37, 0x77], 0x2d, [0x0, 0x38, 0x32, 0x33], 0x2d, [0x35, 0x37, 0x7f, 0x7b, 0x37, 0x39, 0x77, 0x33]}}}, {@dont_measure='dont_measure'}]}}) ioctl$VIDIOC_ENUMINPUT(r1, 0xc050561a, &(0x7f0000000300)={0x4, "443b36c4364670c73c2ad26e1952769039650793d10fc72d24ce46e327d06e2f", 0x3, 0x100, 0x4, 0x1057ff, 0x0, 0x6}) 06:22:43 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) getsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000400), &(0x7f0000000440)=0x8) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, &(0x7f00000019c0)={0x20}, 0x1) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r1, 0x111, 0x5, 0xc3, 0x4) r2 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x1, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r2, 0xc0045516, &(0x7f0000000040)=0x4) arch_prctl$ARCH_GET_CPUID(0x1011) getpgrp(0x0) flock(r0, 0x0) ioctl$BLKRRPART(0xffffffffffffffff, 0x125f, 0x0) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000200)={@mcast2}) setsockopt$RDS_CONG_MONITOR(r2, 0x114, 0x6, &(0x7f0000000280), 0x4) ioctl$VHOST_SET_LOG_FD(r2, 0x4004af07, 0x0) ioctl$DRM_IOCTL_IRQ_BUSID(r2, 0xc0106403, &(0x7f0000000100)={0x8875, 0x800, 0x8000, 0xc2}) ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000180)) ioctl$VHOST_SET_VRING_CALL(0xffffffffffffffff, 0x4008af21, &(0x7f0000000380)={0x0, r1}) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x3, 'veth0\x00'}, 0x18) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.cpu/syz1\x00', 0x1ff) openat$snapshot(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/snapshot\x00', 0x0, 0x0) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0xf7fffffffffffffd, 0x2012, r2, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000a40)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x20008000}, 0x24044000) unshare(0x40000000) mount$9p_virtio(&(0x7f00000003c0)='em0%$!,cgroup#\x00', &(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='9p\x00', 0x200000, &(0x7f0000000500)={'trans=virtio,', {[{@afid={'afid', 0x3d, 0x6}}, {@version_L='version=9p2000.L'}, {@cache_none='cache=none'}], [{@subj_role={'subj_role', 0x3d, '/dev/dsp#\x00'}}, {@permit_directio='permit_directio'}, {@measure='measure'}, {@context={'context', 0x3d, 'system_u'}}, {@obj_user={'obj_user'}}, {@dont_hash='dont_hash'}, {@subj_type={'subj_type', 0x3d, '\\eth0('}}, {@fsuuid={'fsuuid', 0x3d, {[0x36, 0x79, 0x0, 0x33, 0x61, 0x62, 0x32], 0x2d, [0x77, 0x32, 0x77, 0x34], 0x2d, [0x7f, 0x67, 0x37, 0x77], 0x2d, [0x0, 0x38, 0x32, 0x33], 0x2d, [0x35, 0x37, 0x7f, 0x7b, 0x37, 0x39, 0x77, 0x33]}}}, {@dont_measure='dont_measure'}]}}) ioctl$VIDIOC_ENUMINPUT(r1, 0xc050561a, &(0x7f0000000300)={0x4, "443b36c4364670c73c2ad26e1952769039650793d10fc72d24ce46e327d06e2f", 0x3, 0x100, 0x4, 0x1057ff, 0x0, 0x6}) 06:22:43 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = creat(&(0x7f0000000000)='./bus\x00', 0x0) getrlimit(0x0, &(0x7f00000000c0)) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x5640200}) [ 467.877328][T17052] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.5'. 06:22:43 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xf7d, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr-aes-aesni\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000001c0)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r1 = accept$alg(r0, 0x0, 0x0) recvmmsg(r1, &(0x7f0000008a00)=[{{0x0, 0x0, &(0x7f0000000400)=[{&(0x7f0000000300)=""/230, 0xfe52}], 0x1}}], 0x1, 0x0, 0x0) 06:22:43 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000040)="2e0000602500817ee45ae087185082cf0f24b0eba06ec400002339e00586f9835b3f0016914879008cd90080e230", 0x2e}], 0x1}, 0x0) [ 468.079629][T17055] IPVS: ftp: loaded support on port[0] = 21 [ 468.173760][T17064] IPVS: ftp: loaded support on port[0] = 21 06:22:44 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000040)="2e0000002500817ee45ae087185082cf0d24b0eba06ec400002339e00586f9835b3f0016914879008cd90080e230", 0x2e}], 0x1}, 0x0) 06:22:44 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000040)="2e0000682500817ee45ae087185082cf0f24b0eba06ec400002339e00586f9835b3f0016914879008cd90080e230", 0x2e}], 0x1}, 0x0) 06:22:44 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = creat(&(0x7f0000000000)='./bus\x00', 0x0) getrlimit(0x0, &(0x7f00000000c0)) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x6000000}) 06:22:44 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) getsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000400), &(0x7f0000000440)=0x8) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, &(0x7f00000019c0)={0x20}, 0x1) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r1, 0x111, 0x5, 0xc3, 0x4) r2 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x1, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r2, 0xc0045516, &(0x7f0000000040)=0x4) arch_prctl$ARCH_GET_CPUID(0x1011) getpgrp(0x0) flock(r0, 0x0) ioctl$BLKRRPART(0xffffffffffffffff, 0x125f, 0x0) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000200)={@mcast2}) setsockopt$RDS_CONG_MONITOR(r2, 0x114, 0x6, &(0x7f0000000280), 0x4) ioctl$VHOST_SET_LOG_FD(r2, 0x4004af07, 0x0) ioctl$DRM_IOCTL_IRQ_BUSID(r2, 0xc0106403, &(0x7f0000000100)={0x8875, 0x800, 0x8000, 0xc2}) ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000180)) ioctl$VHOST_SET_VRING_CALL(0xffffffffffffffff, 0x4008af21, &(0x7f0000000380)={0x0, r1}) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x3, 'veth0\x00'}, 0x18) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.cpu/syz1\x00', 0x1ff) openat$snapshot(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/snapshot\x00', 0x0, 0x0) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0xf7fffffffffffffd, 0x2012, r2, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000a40)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x20008000}, 0x24044000) unshare(0x40000000) mount$9p_virtio(&(0x7f00000003c0)='em0%$!,cgroup#\x00', &(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='9p\x00', 0x200000, &(0x7f0000000500)={'trans=virtio,', {[{@afid={'afid', 0x3d, 0x6}}, {@version_L='version=9p2000.L'}, {@cache_none='cache=none'}], [{@subj_role={'subj_role', 0x3d, '/dev/dsp#\x00'}}, {@permit_directio='permit_directio'}, {@measure='measure'}, {@context={'context', 0x3d, 'system_u'}}, {@obj_user={'obj_user'}}, {@dont_hash='dont_hash'}, {@subj_type={'subj_type', 0x3d, '\\eth0('}}, {@fsuuid={'fsuuid', 0x3d, {[0x36, 0x79, 0x0, 0x33, 0x61, 0x62, 0x32], 0x2d, [0x77, 0x32, 0x77, 0x34], 0x2d, [0x7f, 0x67, 0x37, 0x77], 0x2d, [0x0, 0x38, 0x32, 0x33], 0x2d, [0x35, 0x37, 0x7f, 0x7b, 0x37, 0x39, 0x77, 0x33]}}}, {@dont_measure='dont_measure'}]}}) ioctl$VIDIOC_ENUMINPUT(r1, 0xc050561a, &(0x7f0000000300)={0x4, "443b36c4364670c73c2ad26e1952769039650793d10fc72d24ce46e327d06e2f", 0x3, 0x100, 0x4, 0x1057ff, 0x0, 0x6}) [ 469.261700][T17075] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.5'. 06:22:45 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) getsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000400), &(0x7f0000000440)=0x8) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, &(0x7f00000019c0)={0x20}, 0x1) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r1, 0x111, 0x5, 0xc3, 0x4) r2 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x1, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r2, 0xc0045516, &(0x7f0000000040)=0x4) arch_prctl$ARCH_GET_CPUID(0x1011) getpgrp(0x0) flock(r0, 0x0) ioctl$BLKRRPART(0xffffffffffffffff, 0x125f, 0x0) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000200)={@mcast2}) fcntl$F_GET_FILE_RW_HINT(r0, 0x40d, &(0x7f00000000c0)) setsockopt$RDS_CONG_MONITOR(r2, 0x114, 0x6, &(0x7f0000000280), 0x4) ioctl$VHOST_SET_LOG_FD(r2, 0x4004af07, 0x0) ioctl$DRM_IOCTL_IRQ_BUSID(r2, 0xc0106403, &(0x7f0000000100)={0x8875, 0x800, 0x8000, 0xc2}) ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000180)) ioctl$VHOST_SET_VRING_CALL(0xffffffffffffffff, 0x4008af21, &(0x7f0000000380)={0x0, r1}) r3 = fcntl$dupfd(r1, 0x0, r2) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x3, 'veth0\x00'}, 0x18) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.cpu/syz1\x00', 0x1ff) openat$snapshot(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/snapshot\x00', 0x0, 0x0) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0xf7fffffffffffffd, 0x2012, r2, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000a40)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x20008000}, 0x24044000) unshare(0x40000000) mount$9p_virtio(&(0x7f00000003c0)='em0%$!,cgroup#\x00', &(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='9p\x00', 0x200000, &(0x7f0000000500)={'trans=virtio,', {[{@afid={'afid', 0x3d, 0x6}}, {@version_L='version=9p2000.L'}, {@cache_none='cache=none'}], [{@subj_role={'subj_role', 0x3d, '/dev/dsp#\x00'}}, {@permit_directio='permit_directio'}, {@measure='measure'}, {@context={'context', 0x3d, 'system_u'}}, {@obj_user={'obj_user'}}, {@dont_hash='dont_hash'}, {@subj_type={'subj_type', 0x3d, '\\eth0('}}, {@fsuuid={'fsuuid', 0x3d, {[0x36, 0x79, 0x0, 0x33, 0x61, 0x62, 0x32], 0x2d, [0x77, 0x32, 0x77, 0x34], 0x2d, [0x7f, 0x67, 0x37, 0x77], 0x2d, [0x0, 0x38, 0x32, 0x33], 0x2d, [0x35, 0x37, 0x7f, 0x7b, 0x37, 0x39, 0x77, 0x33]}}}, {@dont_measure='dont_measure'}]}}) ioctl$VIDIOC_ENUMINPUT(r1, 0xc050561a, &(0x7f0000000300)={0x4, "443b36c4364670c73c2ad26e1952769039650793d10fc72d24ce46e327d06e2f", 0x3, 0x100, 0x4, 0x1057ff, 0x0, 0x6}) 06:22:45 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = creat(&(0x7f0000000000)='./bus\x00', 0x0) getrlimit(0x0, &(0x7f00000000c0)) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x7000000}) [ 469.509489][T17086] IPVS: ftp: loaded support on port[0] = 21 [ 469.726232][T17094] IPVS: ftp: loaded support on port[0] = 21 06:22:46 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000040)="2e0000002500817ee45ae087185082cf0f2478eba06ec400002339e00586f9835b3f0016914879008cd90080e230", 0x2e}], 0x1}, 0x0) 06:22:46 executing program 3: r0 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) fadvise64(r0, 0x80000000, 0x1, 0x4) 06:22:46 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000040)="2e00006c2500817ee45ae087185082cf0f24b0eba06ec400002339e00586f9835b3f0016914879008cd90080e230", 0x2e}], 0x1}, 0x0) 06:22:46 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) getsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000400), &(0x7f0000000440)=0x8) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, &(0x7f00000019c0)={0x20}, 0x1) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r1, 0x111, 0x5, 0xc3, 0x4) r2 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x1, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r2, 0xc0045516, &(0x7f0000000040)=0x4) arch_prctl$ARCH_GET_CPUID(0x1011) getpgrp(0x0) flock(r0, 0x0) ioctl$BLKRRPART(0xffffffffffffffff, 0x125f, 0x0) setsockopt$RDS_CONG_MONITOR(r2, 0x114, 0x6, &(0x7f0000000280), 0x4) ioctl$VHOST_SET_LOG_FD(r2, 0x4004af07, 0x0) ioctl$DRM_IOCTL_IRQ_BUSID(r2, 0xc0106403, &(0x7f0000000100)={0x8875, 0x800, 0x8000, 0xc2}) ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000180)) ioctl$VHOST_SET_VRING_CALL(0xffffffffffffffff, 0x4008af21, &(0x7f0000000380)={0x0, r1}) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x3, 'veth0\x00'}, 0x18) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.cpu/syz1\x00', 0x1ff) openat$snapshot(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/snapshot\x00', 0x0, 0x0) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0xf7fffffffffffffd, 0x2012, r2, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000a40)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x20008000}, 0x24044000) unshare(0x40000000) mount$9p_virtio(&(0x7f00000003c0)='em0%$!,cgroup#\x00', &(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='9p\x00', 0x200000, &(0x7f0000000500)={'trans=virtio,', {[{@afid={'afid', 0x3d, 0x6}}, {@version_L='version=9p2000.L'}, {@cache_none='cache=none'}], [{@subj_role={'subj_role', 0x3d, '/dev/dsp#\x00'}}, {@permit_directio='permit_directio'}, {@measure='measure'}, {@context={'context', 0x3d, 'system_u'}}, {@obj_user={'obj_user'}}, {@dont_hash='dont_hash'}, {@subj_type={'subj_type', 0x3d, '\\eth0('}}, {@fsuuid={'fsuuid', 0x3d, {[0x36, 0x79, 0x0, 0x33, 0x61, 0x62, 0x32], 0x2d, [0x77, 0x32, 0x77, 0x34], 0x2d, [0x7f, 0x67, 0x37, 0x77], 0x2d, [0x0, 0x38, 0x32, 0x33], 0x2d, [0x35, 0x37, 0x7f, 0x7b, 0x37, 0x39, 0x77, 0x33]}}}, {@dont_measure='dont_measure'}]}}) ioctl$VIDIOC_ENUMINPUT(r1, 0xc050561a, &(0x7f0000000300)={0x4, "443b36c4364670c73c2ad26e1952769039650793d10fc72d24ce46e327d06e2f", 0x3, 0x100, 0x4, 0x1057ff, 0x0, 0x6}) [ 470.721200][T17107] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.5'. 06:22:46 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = creat(&(0x7f0000000000)='./bus\x00', 0x0) getrlimit(0x0, &(0x7f00000000c0)) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x8000000}) 06:22:46 executing program 3: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) r1 = dup(r0) sendmsg(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="24000000260007031dfffd946fa2830020200a0009000300001d85680c1ba3a20400ff7e", 0x24}], 0x1}, 0x0) 06:22:46 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) getsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000400), &(0x7f0000000440)=0x8) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, &(0x7f00000019c0)={0x20}, 0x1) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r1, 0x111, 0x5, 0xc3, 0x4) r2 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x1, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r2, 0xc0045516, &(0x7f0000000040)=0x4) arch_prctl$ARCH_GET_CPUID(0x1011) getpgrp(0x0) flock(r0, 0x0) ioctl$BLKRRPART(0xffffffffffffffff, 0x125f, 0x0) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000200)={@mcast2}) fcntl$F_GET_FILE_RW_HINT(r0, 0x40d, &(0x7f00000000c0)) setsockopt$RDS_CONG_MONITOR(r2, 0x114, 0x6, &(0x7f0000000280), 0x4) ioctl$VHOST_SET_LOG_FD(r2, 0x4004af07, 0x0) ioctl$DRM_IOCTL_IRQ_BUSID(r2, 0xc0106403, &(0x7f0000000100)={0x8875, 0x800, 0x8000, 0xc2}) ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000180)) ioctl$VHOST_SET_VRING_CALL(0xffffffffffffffff, 0x4008af21, &(0x7f0000000380)={0x0, r1}) r3 = fcntl$dupfd(r1, 0x0, r2) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x3, 'veth0\x00'}, 0x18) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.cpu/syz1\x00', 0x1ff) openat$snapshot(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/snapshot\x00', 0x0, 0x0) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0xf7fffffffffffffd, 0x2012, r2, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000a40)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x20008000}, 0x24044000) unshare(0x40000000) mount$9p_virtio(&(0x7f00000003c0)='em0%$!,cgroup#\x00', &(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='9p\x00', 0x200000, &(0x7f0000000500)={'trans=virtio,', {[{@afid={'afid', 0x3d, 0x6}}, {@version_L='version=9p2000.L'}, {@cache_none='cache=none'}], [{@subj_role={'subj_role', 0x3d, '/dev/dsp#\x00'}}, {@permit_directio='permit_directio'}, {@measure='measure'}, {@context={'context', 0x3d, 'system_u'}}, {@obj_user={'obj_user'}}, {@dont_hash='dont_hash'}, {@subj_type={'subj_type', 0x3d, '\\eth0('}}, {@fsuuid={'fsuuid', 0x3d, {[0x36, 0x79, 0x0, 0x33, 0x61, 0x62, 0x32], 0x2d, [0x77, 0x32, 0x77, 0x34], 0x2d, [0x7f, 0x67, 0x37, 0x77], 0x2d, [0x0, 0x38, 0x32, 0x33], 0x2d, [0x35, 0x37, 0x7f, 0x7b, 0x37, 0x39, 0x77, 0x33]}}}, {@dont_measure='dont_measure'}]}}) ioctl$VIDIOC_ENUMINPUT(r1, 0xc050561a, &(0x7f0000000300)={0x4, "443b36c4364670c73c2ad26e1952769039650793d10fc72d24ce46e327d06e2f", 0x3, 0x100, 0x4, 0x1057ff, 0x0, 0x6}) [ 470.819057][T17109] IPVS: ftp: loaded support on port[0] = 21 [ 470.845128][T17113] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.5'. 06:22:46 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000040)="2e0000742500817ee45ae087185082cf0f24b0eba06ec400002339e00586f9835b3f0016914879008cd90080e230", 0x2e}], 0x1}, 0x0) 06:22:46 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = creat(&(0x7f0000000000)='./bus\x00', 0x0) getrlimit(0x0, &(0x7f00000000c0)) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x9000000}) 06:22:46 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000040)="2e0000002500817ee45ae087185082cf0f24b0eb0300c400002339e00586f9835b3f0016914879008cd90080e230", 0x2e}], 0x1}, 0x0) [ 471.237207][T17126] IPVS: ftp: loaded support on port[0] = 21 06:22:47 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000040)="2e00007a2500817ee45ae087185082cf0f24b0eba06ec400002339e00586f9835b3f0016914879008cd90080e230", 0x2e}], 0x1}, 0x0) 06:22:47 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) getsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000400), &(0x7f0000000440)=0x8) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, &(0x7f00000019c0)={0x20}, 0x1) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r1, 0x111, 0x5, 0xc3, 0x4) r2 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x1, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r2, 0xc0045516, &(0x7f0000000040)=0x4) arch_prctl$ARCH_GET_CPUID(0x1011) getpgrp(0x0) flock(r0, 0x0) ioctl$BLKRRPART(0xffffffffffffffff, 0x125f, 0x0) setsockopt$RDS_CONG_MONITOR(r2, 0x114, 0x6, &(0x7f0000000280), 0x4) ioctl$VHOST_SET_LOG_FD(r2, 0x4004af07, 0x0) ioctl$DRM_IOCTL_IRQ_BUSID(r2, 0xc0106403, &(0x7f0000000100)={0x8875, 0x800, 0x8000, 0xc2}) ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000180)) ioctl$VHOST_SET_VRING_CALL(0xffffffffffffffff, 0x4008af21, &(0x7f0000000380)={0x0, r1}) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x3, 'veth0\x00'}, 0x18) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.cpu/syz1\x00', 0x1ff) openat$snapshot(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/snapshot\x00', 0x0, 0x0) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0xf7fffffffffffffd, 0x2012, r2, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000a40)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x20008000}, 0x24044000) unshare(0x40000000) mount$9p_virtio(&(0x7f00000003c0)='em0%$!,cgroup#\x00', &(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='9p\x00', 0x200000, &(0x7f0000000500)={'trans=virtio,', {[{@afid={'afid', 0x3d, 0x6}}, {@version_L='version=9p2000.L'}, {@cache_none='cache=none'}], [{@subj_role={'subj_role', 0x3d, '/dev/dsp#\x00'}}, {@permit_directio='permit_directio'}, {@measure='measure'}, {@context={'context', 0x3d, 'system_u'}}, {@obj_user={'obj_user'}}, {@dont_hash='dont_hash'}, {@subj_type={'subj_type', 0x3d, '\\eth0('}}, {@fsuuid={'fsuuid', 0x3d, {[0x36, 0x79, 0x0, 0x33, 0x61, 0x62, 0x32], 0x2d, [0x77, 0x32, 0x77, 0x34], 0x2d, [0x7f, 0x67, 0x37, 0x77], 0x2d, [0x0, 0x38, 0x32, 0x33], 0x2d, [0x35, 0x37, 0x7f, 0x7b, 0x37, 0x39, 0x77, 0x33]}}}, {@dont_measure='dont_measure'}]}}) ioctl$VIDIOC_ENUMINPUT(r1, 0xc050561a, &(0x7f0000000300)={0x4, "443b36c4364670c73c2ad26e1952769039650793d10fc72d24ce46e327d06e2f", 0x3, 0x100, 0x4, 0x1057ff, 0x0, 0x6}) [ 471.387811][T17135] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.5'. [ 471.550881][T17143] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.5'. 06:22:47 executing program 3: r0 = socket$inet6(0x10, 0x3, 0x0) close(0xffffffffffffffff) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, 0x0, 0x0) dup2(r1, r0) lstat(0x0, 0x0) getresgid(0x0, 0x0, 0x0) setsockopt$inet6_MRT6_ADD_MIF(r0, 0x29, 0xca, &(0x7f0000000000)={0x1, 0x1, 0x5, 0x40, 0x5}, 0xc) 06:22:47 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = creat(&(0x7f0000000000)='./bus\x00', 0x0) getrlimit(0x0, &(0x7f00000000c0)) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0c0583b, &(0x7f0000000040)={0x0, 0xa000000}) 06:22:47 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000040)="2e0000002500817ee45ae087185082cf0f24b0eb1a00c400002339e00586f9835b3f0016914879008cd90080e230", 0x2e}], 0x1}, 0x0) [ 471.804195][T17145] IPVS: ftp: loaded support on port[0] = 21 06:22:47 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) getsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000400), &(0x7f0000000440)=0x8) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, &(0x7f00000019c0)={0x20}, 0x1) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r1, 0x111, 0x5, 0xc3, 0x4) r2 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x1, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r2, 0xc0045516, &(0x7f0000000040)=0x4) arch_prctl$ARCH_GET_CPUID(0x1011) getpgrp(0x0) flock(r0, 0x0) ioctl$BLKRRPART(0xffffffffffffffff, 0x125f, 0x0) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000200)={@mcast2}) fcntl$F_GET_FILE_RW_HINT(r0, 0x40d, &(0x7f00000000c0)) setsockopt$RDS_CONG_MONITOR(r2, 0x114, 0x6, &(0x7f0000000280), 0x4) ioctl$VHOST_SET_LOG_FD(r2, 0x4004af07, 0x0) ioctl$DRM_IOCTL_IRQ_BUSID(r2, 0xc0106403, &(0x7f0000000100)={0x8875, 0x800, 0x8000, 0xc2}) ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000180)) ioctl$VHOST_SET_VRING_CALL(0xffffffffffffffff, 0x4008af21, &(0x7f0000000380)={0x0, r1}) r3 = fcntl$dupfd(r1, 0x0, r2) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x3, 'veth0\x00'}, 0x18) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.cpu/syz1\x00', 0x1ff) openat$snapshot(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/snapshot\x00', 0x0, 0x0) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0xf7fffffffffffffd, 0x2012, r2, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000a40)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x20008000}, 0x24044000) unshare(0x40000000) mount$9p_virtio(&(0x7f00000003c0)='em0%$!,cgroup#\x00', &(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='9p\x00', 0x200000, &(0x7f0000000500)={'trans=virtio,', {[{@afid={'afid', 0x3d, 0x6}}, {@version_L='version=9p2000.L'}, {@cache_none='cache=none'}], [{@subj_role={'subj_role', 0x3d, '/dev/dsp#\x00'}}, {@permit_directio='permit_directio'}, {@measure='measure'}, {@context={'context', 0x3d, 'system_u'}}, {@obj_user={'obj_user'}}, {@dont_hash='dont_hash'}, {@subj_type={'subj_type', 0x3d, '\\eth0('}}, {@fsuuid={'fsuuid', 0x3d, {[0x36, 0x79, 0x0, 0x33, 0x61, 0x62, 0x32], 0x2d, [0x77, 0x32, 0x77, 0x34], 0x2d, [0x7f, 0x67, 0x37, 0x77], 0x2d, [0x0, 0x38, 0x32, 0x33], 0x2d, [0x35, 0x37, 0x7f, 0x7b, 0x37, 0x39, 0x77, 0x33]}}}, {@dont_measure='dont_measure'}]}}) ioctl$VIDIOC_ENUMINPUT(r1, 0xc050561a, &(0x7f0000000300)={0x4, "443b36c4364670c73c2ad26e1952769039650793d10fc72d24ce46e327d06e2f", 0x3, 0x100, 0x4, 0x1057ff, 0x0, 0x6}) 06:22:47 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000040)="2e0000002500817ee45ae087185082cf0f24b0eba025c400002339e00586f9835b3f0016914879008cd90080e230", 0x2e}], 0x1}, 0x0) 06:22:47 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000040)="2e0000003f00817ee45ae087185082cf0f24b0eba06ec400002339e00586f9835b3f0016914879008cd90080e230", 0x2e}], 0x1}, 0x0) 06:22:47 executing program 3: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x101005, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f000082ef0a)=""/246) pwritev(r0, &(0x7f00000000c0)=[{&(0x7f0000000180)="80fde56d4930", 0x6}], 0x1, 0x0) [ 472.263081][T17166] IPVS: ftp: loaded support on port[0] = 21 06:22:48 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000040)="2e0000006800817ee45ae087185082cf0f24b0eba06ec400002339e00586f9835b3f0016914879008cd90080e230", 0x2e}], 0x1}, 0x0) 06:22:48 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = creat(&(0x7f0000000000)='./bus\x00', 0x0) getrlimit(0x0, &(0x7f00000000c0)) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0c0583b, &(0x7f0000000040)={0x0, 0xb000000}) [ 472.344851][T17169] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.5'. [ 472.456272][T17178] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.5'. 06:22:48 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) getsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000400), &(0x7f0000000440)=0x8) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, &(0x7f00000019c0)={0x20}, 0x1) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r1, 0x111, 0x5, 0xc3, 0x4) r2 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x1, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r2, 0xc0045516, &(0x7f0000000040)=0x4) arch_prctl$ARCH_GET_CPUID(0x1011) getpgrp(0x0) flock(r0, 0x0) ioctl$BLKRRPART(0xffffffffffffffff, 0x125f, 0x0) setsockopt$RDS_CONG_MONITOR(r2, 0x114, 0x6, &(0x7f0000000280), 0x4) ioctl$VHOST_SET_LOG_FD(r2, 0x4004af07, 0x0) ioctl$DRM_IOCTL_IRQ_BUSID(r2, 0xc0106403, &(0x7f0000000100)={0x8875, 0x800, 0x8000, 0xc2}) ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000180)) ioctl$VHOST_SET_VRING_CALL(0xffffffffffffffff, 0x4008af21, &(0x7f0000000380)={0x0, r1}) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x3, 'veth0\x00'}, 0x18) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.cpu/syz1\x00', 0x1ff) openat$snapshot(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/snapshot\x00', 0x0, 0x0) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0xf7fffffffffffffd, 0x2012, r2, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000a40)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x20008000}, 0x24044000) unshare(0x40000000) mount$9p_virtio(&(0x7f00000003c0)='em0%$!,cgroup#\x00', &(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='9p\x00', 0x200000, &(0x7f0000000500)={'trans=virtio,', {[{@afid={'afid', 0x3d, 0x6}}, {@version_L='version=9p2000.L'}, {@cache_none='cache=none'}], [{@subj_role={'subj_role', 0x3d, '/dev/dsp#\x00'}}, {@permit_directio='permit_directio'}, {@measure='measure'}, {@context={'context', 0x3d, 'system_u'}}, {@obj_user={'obj_user'}}, {@dont_hash='dont_hash'}, {@subj_type={'subj_type', 0x3d, '\\eth0('}}, {@fsuuid={'fsuuid', 0x3d, {[0x36, 0x79, 0x0, 0x33, 0x61, 0x62, 0x32], 0x2d, [0x77, 0x32, 0x77, 0x34], 0x2d, [0x7f, 0x67, 0x37, 0x77], 0x2d, [0x0, 0x38, 0x32, 0x33], 0x2d, [0x35, 0x37, 0x7f, 0x7b, 0x37, 0x39, 0x77, 0x33]}}}, {@dont_measure='dont_measure'}]}}) ioctl$VIDIOC_ENUMINPUT(r1, 0xc050561a, &(0x7f0000000300)={0x4, "443b36c4364670c73c2ad26e1952769039650793d10fc72d24ce46e327d06e2f", 0x3, 0x100, 0x4, 0x1057ff, 0x0, 0x6}) 06:22:48 executing program 3: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x101005, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f000082ef0a)=""/246) pwritev(r0, &(0x7f00000000c0)=[{&(0x7f0000000180)="80fde56d4930", 0x6}], 0x1, 0x0) 06:22:48 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000040)="2e0000000f00817ee45ae087185082cf0f24b0eba06ec400002339e00586f9835b3f0016914879008cd90080e230", 0x2e}], 0x1}, 0x0) 06:22:48 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000040)="2e0000002500817ee45ae087185082cf0f24b0eba06ec402002339e00586f9835b3f0016914879008cd90080e230", 0x2e}], 0x1}, 0x0) [ 472.859755][T17186] IPVS: ftp: loaded support on port[0] = 21 06:22:48 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000040)="2e0000006800817ee45ae087185082cf0f24b0eba06ec400002339e00586f9835b3f0016914879008cd90080e230", 0x2e}], 0x1}, 0x0) 06:22:48 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) getsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000400), &(0x7f0000000440)=0x8) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, &(0x7f00000019c0)={0x20}, 0x1) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r1, 0x111, 0x5, 0xc3, 0x4) r2 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x1, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r2, 0xc0045516, &(0x7f0000000040)=0x4) arch_prctl$ARCH_GET_CPUID(0x1011) getpgrp(0x0) flock(r0, 0x0) ioctl$BLKRRPART(0xffffffffffffffff, 0x125f, 0x0) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000200)={@mcast2}) fcntl$F_GET_FILE_RW_HINT(r0, 0x40d, &(0x7f00000000c0)) setsockopt$RDS_CONG_MONITOR(r2, 0x114, 0x6, &(0x7f0000000280), 0x4) ioctl$VHOST_SET_LOG_FD(r2, 0x4004af07, 0x0) ioctl$DRM_IOCTL_IRQ_BUSID(r2, 0xc0106403, &(0x7f0000000100)={0x8875, 0x800, 0x8000, 0xc2}) ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000180)) ioctl$VHOST_SET_VRING_CALL(0xffffffffffffffff, 0x4008af21, &(0x7f0000000380)={0x0, r1}) r3 = fcntl$dupfd(r1, 0x0, r2) setsockopt$IP_VS_SO_SET_STOPDAEMON(r3, 0x0, 0x48c, 0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.cpu/syz1\x00', 0x1ff) openat$snapshot(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/snapshot\x00', 0x0, 0x0) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0xf7fffffffffffffd, 0x2012, r2, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000a40)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x20008000}, 0x24044000) unshare(0x40000000) mount$9p_virtio(&(0x7f00000003c0)='em0%$!,cgroup#\x00', &(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='9p\x00', 0x200000, &(0x7f0000000500)={'trans=virtio,', {[{@afid={'afid', 0x3d, 0x6}}, {@version_L='version=9p2000.L'}, {@cache_none='cache=none'}], [{@subj_role={'subj_role', 0x3d, '/dev/dsp#\x00'}}, {@permit_directio='permit_directio'}, {@measure='measure'}, {@context={'context', 0x3d, 'system_u'}}, {@obj_user={'obj_user'}}, {@dont_hash='dont_hash'}, {@subj_type={'subj_type', 0x3d, '\\eth0('}}, {@fsuuid={'fsuuid', 0x3d, {[0x36, 0x79, 0x0, 0x33, 0x61, 0x62, 0x32], 0x2d, [0x77, 0x32, 0x77, 0x34], 0x2d, [0x7f, 0x67, 0x37, 0x77], 0x2d, [0x0, 0x38, 0x32, 0x33], 0x2d, [0x35, 0x37, 0x7f, 0x7b, 0x37, 0x39, 0x77, 0x33]}}}, {@dont_measure='dont_measure'}]}}) ioctl$VIDIOC_ENUMINPUT(r1, 0xc050561a, &(0x7f0000000300)={0x4, "443b36c4364670c73c2ad26e1952769039650793d10fc72d24ce46e327d06e2f", 0x3, 0x100, 0x4, 0x1057ff, 0x0, 0x6}) [ 472.984422][T17198] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.5'. 06:22:48 executing program 3: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x101005, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f000082ef0a)=""/246) pwritev(r0, &(0x7f00000000c0)=[{&(0x7f0000000180)="80fde56d4930", 0x6}], 0x1, 0x0) 06:22:48 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = creat(&(0x7f0000000000)='./bus\x00', 0x0) getrlimit(0x0, &(0x7f00000000c0)) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0c0583b, &(0x7f0000000040)={0x0, 0xc000000}) 06:22:48 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000040)="2e0000002502817ee45ae087185082cf0f24b0eba06ec400002339e00586f9835b3f0016914879008cd90080e230", 0x2e}], 0x1}, 0x0) [ 473.117894][T17200] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.5'. [ 473.375466][T17204] IPVS: ftp: loaded support on port[0] = 21 [ 473.460228][T17217] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.5'. 06:22:49 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000040)="2e0000002500817ee45ae087185082cf0f24b0eba06ec403002339e00586f9835b3f0016914879008cd90080e230", 0x2e}], 0x1}, 0x0) 06:22:49 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000040)="2e0000002503817ee45ae087185082cf0f24b0eba06ec400002339e00586f9835b3f0016914879008cd90080e230", 0x2e}], 0x1}, 0x0) 06:22:49 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = creat(&(0x7f0000000000)='./bus\x00', 0x0) getrlimit(0x0, &(0x7f00000000c0)) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0c0583b, &(0x7f0000000040)={0x0, 0xd000000}) 06:22:49 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) getsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000400), &(0x7f0000000440)=0x8) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, &(0x7f00000019c0)={0x20}, 0x1) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r1, 0x111, 0x5, 0xc3, 0x4) r2 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x1, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r2, 0xc0045516, &(0x7f0000000040)=0x4) arch_prctl$ARCH_GET_CPUID(0x1011) getpgrp(0x0) flock(r0, 0x0) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000200)={@mcast2}) setsockopt$RDS_CONG_MONITOR(r2, 0x114, 0x6, &(0x7f0000000280), 0x4) ioctl$VHOST_SET_LOG_FD(r2, 0x4004af07, 0x0) ioctl$DRM_IOCTL_IRQ_BUSID(r2, 0xc0106403, &(0x7f0000000100)={0x8875, 0x800, 0x8000, 0xc2}) ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000180)) ioctl$VHOST_SET_VRING_CALL(0xffffffffffffffff, 0x4008af21, &(0x7f0000000380)={0x0, r1}) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x3, 'veth0\x00'}, 0x18) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.cpu/syz1\x00', 0x1ff) openat$snapshot(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/snapshot\x00', 0x0, 0x0) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0xf7fffffffffffffd, 0x2012, r2, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000a40)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x20008000}, 0x24044000) unshare(0x40000000) mount$9p_virtio(&(0x7f00000003c0)='em0%$!,cgroup#\x00', &(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='9p\x00', 0x200000, &(0x7f0000000500)={'trans=virtio,', {[{@afid={'afid', 0x3d, 0x6}}, {@version_L='version=9p2000.L'}, {@cache_none='cache=none'}], [{@subj_role={'subj_role', 0x3d, '/dev/dsp#\x00'}}, {@permit_directio='permit_directio'}, {@measure='measure'}, {@context={'context', 0x3d, 'system_u'}}, {@obj_user={'obj_user'}}, {@dont_hash='dont_hash'}, {@subj_type={'subj_type', 0x3d, '\\eth0('}}, {@fsuuid={'fsuuid', 0x3d, {[0x36, 0x79, 0x0, 0x33, 0x61, 0x62, 0x32], 0x2d, [0x77, 0x32, 0x77, 0x34], 0x2d, [0x7f, 0x67, 0x37, 0x77], 0x2d, [0x0, 0x38, 0x32, 0x33], 0x2d, [0x35, 0x37, 0x7f, 0x7b, 0x37, 0x39, 0x77, 0x33]}}}, {@dont_measure='dont_measure'}]}}) ioctl$VIDIOC_ENUMINPUT(r1, 0xc050561a, &(0x7f0000000300)={0x4, "443b36c4364670c73c2ad26e1952769039650793d10fc72d24ce46e327d06e2f", 0x3, 0x100, 0x4, 0x1057ff, 0x0, 0x6}) 06:22:49 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000040)="2e0000002500817ee45ae087185082cf0f24b0eba06ec404002339e00586f9835b3f0016914879008cd90080e230", 0x2e}], 0x1}, 0x0) 06:22:49 executing program 3: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x101005, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f000082ef0a)=""/246) pwritev(r0, &(0x7f00000000c0)=[{&(0x7f0000000180)="80fde56d4930", 0x6}], 0x1, 0x0) 06:22:49 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000040)="2e0000002500817ee45ae087185082cf0f24b0eba06ec405002339e00586f9835b3f0016914879008cd90080e230", 0x2e}], 0x1}, 0x0) 06:22:49 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) getsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000400), &(0x7f0000000440)=0x8) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, &(0x7f00000019c0)={0x20}, 0x1) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r1, 0x111, 0x5, 0xc3, 0x4) r2 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x1, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r2, 0xc0045516, &(0x7f0000000040)=0x4) arch_prctl$ARCH_GET_CPUID(0x1011) getpgrp(0x0) flock(r0, 0x0) ioctl$BLKRRPART(0xffffffffffffffff, 0x125f, 0x0) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000200)={@mcast2}) fcntl$F_GET_FILE_RW_HINT(r0, 0x40d, &(0x7f00000000c0)) setsockopt$RDS_CONG_MONITOR(r2, 0x114, 0x6, &(0x7f0000000280), 0x4) ioctl$VHOST_SET_LOG_FD(r2, 0x4004af07, 0x0) ioctl$DRM_IOCTL_IRQ_BUSID(r2, 0xc0106403, &(0x7f0000000100)={0x8875, 0x800, 0x8000, 0xc2}) ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000180)) ioctl$VHOST_SET_VRING_CALL(0xffffffffffffffff, 0x4008af21, &(0x7f0000000380)={0x0, r1}) r3 = fcntl$dupfd(r1, 0x0, r2) setsockopt$IP_VS_SO_SET_STOPDAEMON(r3, 0x0, 0x48c, 0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.cpu/syz1\x00', 0x1ff) openat$snapshot(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/snapshot\x00', 0x0, 0x0) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0xf7fffffffffffffd, 0x2012, r2, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000a40)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x20008000}, 0x24044000) unshare(0x40000000) mount$9p_virtio(&(0x7f00000003c0)='em0%$!,cgroup#\x00', &(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='9p\x00', 0x200000, &(0x7f0000000500)={'trans=virtio,', {[{@afid={'afid', 0x3d, 0x6}}, {@version_L='version=9p2000.L'}, {@cache_none='cache=none'}], [{@subj_role={'subj_role', 0x3d, '/dev/dsp#\x00'}}, {@permit_directio='permit_directio'}, {@measure='measure'}, {@context={'context', 0x3d, 'system_u'}}, {@obj_user={'obj_user'}}, {@dont_hash='dont_hash'}, {@subj_type={'subj_type', 0x3d, '\\eth0('}}, {@fsuuid={'fsuuid', 0x3d, {[0x36, 0x79, 0x0, 0x33, 0x61, 0x62, 0x32], 0x2d, [0x77, 0x32, 0x77, 0x34], 0x2d, [0x7f, 0x67, 0x37, 0x77], 0x2d, [0x0, 0x38, 0x32, 0x33], 0x2d, [0x35, 0x37, 0x7f, 0x7b, 0x37, 0x39, 0x77, 0x33]}}}, {@dont_measure='dont_measure'}]}}) ioctl$VIDIOC_ENUMINPUT(r1, 0xc050561a, &(0x7f0000000300)={0x4, "443b36c4364670c73c2ad26e1952769039650793d10fc72d24ce46e327d06e2f", 0x3, 0x100, 0x4, 0x1057ff, 0x0, 0x6}) 06:22:49 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000040)="2e0000002504817ee45ae087185082cf0f24b0eba06ec400002339e00586f9835b3f0016914879008cd90080e230", 0x2e}], 0x1}, 0x0) [ 474.133667][T17237] IPVS: ftp: loaded support on port[0] = 21 [ 474.271365][T17246] IPVS: ftp: loaded support on port[0] = 21 06:22:49 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000040)="2e0000002500817ee45ae087185082cf0f24b0eba06ec406002339e00586f9835b3f0016914879008cd90080e230", 0x2e}], 0x1}, 0x0) 06:22:50 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = creat(&(0x7f0000000000)='./bus\x00', 0x0) getrlimit(0x0, &(0x7f00000000c0)) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0c0583b, &(0x7f0000000040)={0x0, 0xe000000}) 06:22:51 executing program 3: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x101005, 0x0) pwritev(r0, &(0x7f00000000c0)=[{&(0x7f0000000180)="80fde56d4930", 0x6}], 0x1, 0x0) 06:22:51 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) getsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000400), &(0x7f0000000440)=0x8) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, &(0x7f00000019c0)={0x20}, 0x1) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r1, 0x111, 0x5, 0xc3, 0x4) r2 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x1, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r2, 0xc0045516, &(0x7f0000000040)=0x4) arch_prctl$ARCH_GET_CPUID(0x1011) getpgrp(0x0) flock(r0, 0x0) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000200)={@mcast2}) setsockopt$RDS_CONG_MONITOR(r2, 0x114, 0x6, &(0x7f0000000280), 0x4) ioctl$VHOST_SET_LOG_FD(r2, 0x4004af07, 0x0) ioctl$DRM_IOCTL_IRQ_BUSID(r2, 0xc0106403, &(0x7f0000000100)={0x8875, 0x800, 0x8000, 0xc2}) ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000180)) ioctl$VHOST_SET_VRING_CALL(0xffffffffffffffff, 0x4008af21, &(0x7f0000000380)={0x0, r1}) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x3, 'veth0\x00'}, 0x18) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.cpu/syz1\x00', 0x1ff) openat$snapshot(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/snapshot\x00', 0x0, 0x0) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0xf7fffffffffffffd, 0x2012, r2, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000a40)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x20008000}, 0x24044000) unshare(0x40000000) mount$9p_virtio(&(0x7f00000003c0)='em0%$!,cgroup#\x00', &(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='9p\x00', 0x200000, &(0x7f0000000500)={'trans=virtio,', {[{@afid={'afid', 0x3d, 0x6}}, {@version_L='version=9p2000.L'}, {@cache_none='cache=none'}], [{@subj_role={'subj_role', 0x3d, '/dev/dsp#\x00'}}, {@permit_directio='permit_directio'}, {@measure='measure'}, {@context={'context', 0x3d, 'system_u'}}, {@obj_user={'obj_user'}}, {@dont_hash='dont_hash'}, {@subj_type={'subj_type', 0x3d, '\\eth0('}}, {@fsuuid={'fsuuid', 0x3d, {[0x36, 0x79, 0x0, 0x33, 0x61, 0x62, 0x32], 0x2d, [0x77, 0x32, 0x77, 0x34], 0x2d, [0x7f, 0x67, 0x37, 0x77], 0x2d, [0x0, 0x38, 0x32, 0x33], 0x2d, [0x35, 0x37, 0x7f, 0x7b, 0x37, 0x39, 0x77, 0x33]}}}, {@dont_measure='dont_measure'}]}}) ioctl$VIDIOC_ENUMINPUT(r1, 0xc050561a, &(0x7f0000000300)={0x4, "443b36c4364670c73c2ad26e1952769039650793d10fc72d24ce46e327d06e2f", 0x3, 0x100, 0x4, 0x1057ff, 0x0, 0x6}) [ 475.375270][T17254] __nla_parse: 5 callbacks suppressed [ 475.375368][T17254] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.5'. 06:22:51 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000040)="2e0000002505817ee45ae087185082cf0f24b0eba06ec400002339e00586f9835b3f0016914879008cd90080e230", 0x2e}], 0x1}, 0x0) 06:22:51 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) getsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000400), &(0x7f0000000440)=0x8) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, &(0x7f00000019c0)={0x20}, 0x1) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r1, 0x111, 0x5, 0xc3, 0x4) r2 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x1, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r2, 0xc0045516, &(0x7f0000000040)=0x4) arch_prctl$ARCH_GET_CPUID(0x1011) getpgrp(0x0) flock(r0, 0x0) ioctl$BLKRRPART(0xffffffffffffffff, 0x125f, 0x0) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000200)={@mcast2}) fcntl$F_GET_FILE_RW_HINT(r0, 0x40d, &(0x7f00000000c0)) setsockopt$RDS_CONG_MONITOR(r2, 0x114, 0x6, &(0x7f0000000280), 0x4) ioctl$VHOST_SET_LOG_FD(r2, 0x4004af07, 0x0) ioctl$DRM_IOCTL_IRQ_BUSID(r2, 0xc0106403, &(0x7f0000000100)={0x8875, 0x800, 0x8000, 0xc2}) ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000180)) ioctl$VHOST_SET_VRING_CALL(0xffffffffffffffff, 0x4008af21, &(0x7f0000000380)={0x0, r1}) r3 = fcntl$dupfd(r1, 0x0, r2) setsockopt$IP_VS_SO_SET_STOPDAEMON(r3, 0x0, 0x48c, 0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.cpu/syz1\x00', 0x1ff) openat$snapshot(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/snapshot\x00', 0x0, 0x0) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0xf7fffffffffffffd, 0x2012, r2, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000a40)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x20008000}, 0x24044000) unshare(0x40000000) mount$9p_virtio(&(0x7f00000003c0)='em0%$!,cgroup#\x00', &(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='9p\x00', 0x200000, &(0x7f0000000500)={'trans=virtio,', {[{@afid={'afid', 0x3d, 0x6}}, {@version_L='version=9p2000.L'}, {@cache_none='cache=none'}], [{@subj_role={'subj_role', 0x3d, '/dev/dsp#\x00'}}, {@permit_directio='permit_directio'}, {@measure='measure'}, {@context={'context', 0x3d, 'system_u'}}, {@obj_user={'obj_user'}}, {@dont_hash='dont_hash'}, {@subj_type={'subj_type', 0x3d, '\\eth0('}}, {@fsuuid={'fsuuid', 0x3d, {[0x36, 0x79, 0x0, 0x33, 0x61, 0x62, 0x32], 0x2d, [0x77, 0x32, 0x77, 0x34], 0x2d, [0x7f, 0x67, 0x37, 0x77], 0x2d, [0x0, 0x38, 0x32, 0x33], 0x2d, [0x35, 0x37, 0x7f, 0x7b, 0x37, 0x39, 0x77, 0x33]}}}, {@dont_measure='dont_measure'}]}}) ioctl$VIDIOC_ENUMINPUT(r1, 0xc050561a, &(0x7f0000000300)={0x4, "443b36c4364670c73c2ad26e1952769039650793d10fc72d24ce46e327d06e2f", 0x3, 0x100, 0x4, 0x1057ff, 0x0, 0x6}) 06:22:51 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = creat(&(0x7f0000000000)='./bus\x00', 0x0) getrlimit(0x0, &(0x7f00000000c0)) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0c0583b, &(0x7f0000000040)={0x0, 0xf000000}) [ 475.521298][T17263] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.5'. [ 475.637889][T17257] IPVS: ftp: loaded support on port[0] = 21 [ 475.720094][T17266] IPVS: ftp: loaded support on port[0] = 21 06:22:52 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) getsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000400), &(0x7f0000000440)=0x8) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, &(0x7f00000019c0)={0x20}, 0x1) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r1, 0x111, 0x5, 0xc3, 0x4) r2 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x1, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r2, 0xc0045516, &(0x7f0000000040)=0x4) arch_prctl$ARCH_GET_CPUID(0x1011) getpgrp(0x0) flock(r0, 0x0) ioctl$BLKRRPART(0xffffffffffffffff, 0x125f, 0x0) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000200)={@mcast2}) fcntl$F_GET_FILE_RW_HINT(r0, 0x40d, &(0x7f00000000c0)) setsockopt$RDS_CONG_MONITOR(r2, 0x114, 0x6, &(0x7f0000000280), 0x4) ioctl$VHOST_SET_LOG_FD(r2, 0x4004af07, 0x0) ioctl$DRM_IOCTL_IRQ_BUSID(r2, 0xc0106403, &(0x7f0000000100)={0x8875, 0x800, 0x8000, 0xc2}) ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000180)) ioctl$VHOST_SET_VRING_CALL(0xffffffffffffffff, 0x4008af21, &(0x7f0000000380)={0x0, r1}) r3 = fcntl$dupfd(r1, 0x0, r2) setsockopt$IP_VS_SO_SET_STOPDAEMON(r3, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'veth0\x00'}, 0x18) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.cpu/syz1\x00', 0x1ff) openat$snapshot(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/snapshot\x00', 0x0, 0x0) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0xf7fffffffffffffd, 0x2012, r2, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000a40)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x20008000}, 0x24044000) unshare(0x40000000) mount$9p_virtio(&(0x7f00000003c0)='em0%$!,cgroup#\x00', &(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='9p\x00', 0x200000, &(0x7f0000000500)={'trans=virtio,', {[{@afid={'afid', 0x3d, 0x6}}, {@version_L='version=9p2000.L'}, {@cache_none='cache=none'}], [{@subj_role={'subj_role', 0x3d, '/dev/dsp#\x00'}}, {@permit_directio='permit_directio'}, {@measure='measure'}, {@context={'context', 0x3d, 'system_u'}}, {@obj_user={'obj_user'}}, {@dont_hash='dont_hash'}, {@subj_type={'subj_type', 0x3d, '\\eth0('}}, {@fsuuid={'fsuuid', 0x3d, {[0x36, 0x79, 0x0, 0x33, 0x61, 0x62, 0x32], 0x2d, [0x77, 0x32, 0x77, 0x34], 0x2d, [0x7f, 0x67, 0x37, 0x77], 0x2d, [0x0, 0x38, 0x32, 0x33], 0x2d, [0x35, 0x37, 0x7f, 0x7b, 0x37, 0x39, 0x77, 0x33]}}}, {@dont_measure='dont_measure'}]}}) ioctl$VIDIOC_ENUMINPUT(r1, 0xc050561a, &(0x7f0000000300)={0x4, "443b36c4364670c73c2ad26e1952769039650793d10fc72d24ce46e327d06e2f", 0x3, 0x100, 0x4, 0x1057ff, 0x0, 0x6}) 06:22:52 executing program 3: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x101005, 0x0) pwritev(r0, &(0x7f00000000c0)=[{&(0x7f0000000180)="80fde56d4930", 0x6}], 0x1, 0x0) 06:22:52 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000040)="2e0000002500817ee45ae087185082cf0f24b0eba06ec407002339e00586f9835b3f0016914879008cd90080e230", 0x2e}], 0x1}, 0x0) 06:22:52 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) getsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000400), &(0x7f0000000440)=0x8) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, &(0x7f00000019c0)={0x20}, 0x1) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r1, 0x111, 0x5, 0xc3, 0x4) r2 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x1, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r2, 0xc0045516, &(0x7f0000000040)=0x4) arch_prctl$ARCH_GET_CPUID(0x1011) getpgrp(0x0) flock(r0, 0x0) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000200)={@mcast2}) setsockopt$RDS_CONG_MONITOR(r2, 0x114, 0x6, &(0x7f0000000280), 0x4) ioctl$VHOST_SET_LOG_FD(r2, 0x4004af07, 0x0) ioctl$DRM_IOCTL_IRQ_BUSID(r2, 0xc0106403, &(0x7f0000000100)={0x8875, 0x800, 0x8000, 0xc2}) ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000180)) ioctl$VHOST_SET_VRING_CALL(0xffffffffffffffff, 0x4008af21, &(0x7f0000000380)={0x0, r1}) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x3, 'veth0\x00'}, 0x18) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.cpu/syz1\x00', 0x1ff) openat$snapshot(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/snapshot\x00', 0x0, 0x0) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0xf7fffffffffffffd, 0x2012, r2, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000a40)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x20008000}, 0x24044000) unshare(0x40000000) mount$9p_virtio(&(0x7f00000003c0)='em0%$!,cgroup#\x00', &(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='9p\x00', 0x200000, &(0x7f0000000500)={'trans=virtio,', {[{@afid={'afid', 0x3d, 0x6}}, {@version_L='version=9p2000.L'}, {@cache_none='cache=none'}], [{@subj_role={'subj_role', 0x3d, '/dev/dsp#\x00'}}, {@permit_directio='permit_directio'}, {@measure='measure'}, {@context={'context', 0x3d, 'system_u'}}, {@obj_user={'obj_user'}}, {@dont_hash='dont_hash'}, {@subj_type={'subj_type', 0x3d, '\\eth0('}}, {@fsuuid={'fsuuid', 0x3d, {[0x36, 0x79, 0x0, 0x33, 0x61, 0x62, 0x32], 0x2d, [0x77, 0x32, 0x77, 0x34], 0x2d, [0x7f, 0x67, 0x37, 0x77], 0x2d, [0x0, 0x38, 0x32, 0x33], 0x2d, [0x35, 0x37, 0x7f, 0x7b, 0x37, 0x39, 0x77, 0x33]}}}, {@dont_measure='dont_measure'}]}}) ioctl$VIDIOC_ENUMINPUT(r1, 0xc050561a, &(0x7f0000000300)={0x4, "443b36c4364670c73c2ad26e1952769039650793d10fc72d24ce46e327d06e2f", 0x3, 0x100, 0x4, 0x1057ff, 0x0, 0x6}) 06:22:52 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000040)="2e0000002506817ee45ae087185082cf0f24b0eba06ec400002339e00586f9835b3f0016914879008cd90080e230", 0x2e}], 0x1}, 0x0) 06:22:52 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = creat(&(0x7f0000000000)='./bus\x00', 0x0) getrlimit(0x0, &(0x7f00000000c0)) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x10000000}) [ 477.114339][T17284] IPVS: ftp: loaded support on port[0] = 21 [ 477.152087][T17288] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.5'. [ 477.291558][T17281] IPVS: ftp: loaded support on port[0] = 21 06:22:53 executing program 3: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x101005, 0x0) pwritev(r0, &(0x7f00000000c0)=[{&(0x7f0000000180)="80fde56d4930", 0x6}], 0x1, 0x0) 06:22:53 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000040)="2e0000002507817ee45ae087185082cf0f24b0eba06ec400002339e00586f9835b3f0016914879008cd90080e230", 0x2e}], 0x1}, 0x0) 06:22:53 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = creat(&(0x7f0000000000)='./bus\x00', 0x0) getrlimit(0x0, &(0x7f00000000c0)) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x11dc0000}) 06:22:53 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000040)="2e0000002500817ee45ae087185082cf0f24b0eba06ec408002339e00586f9835b3f0016914879008cd90080e230", 0x2e}], 0x1}, 0x0) 06:22:53 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) getsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000400), &(0x7f0000000440)=0x8) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, &(0x7f00000019c0)={0x20}, 0x1) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r0, 0x111, 0x5, 0xc3, 0x4) r1 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x1, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r1, 0xc0045516, &(0x7f0000000040)=0x4) arch_prctl$ARCH_GET_CPUID(0x1011) getpgrp(0x0) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000200)={@mcast2}) setsockopt$RDS_CONG_MONITOR(r1, 0x114, 0x6, &(0x7f0000000280), 0x4) ioctl$VHOST_SET_LOG_FD(r1, 0x4004af07, 0x0) ioctl$DRM_IOCTL_IRQ_BUSID(r1, 0xc0106403, &(0x7f0000000100)={0x8875, 0x800, 0x8000, 0xc2}) ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000180)) ioctl$VHOST_SET_VRING_CALL(0xffffffffffffffff, 0x4008af21, &(0x7f0000000380)={0x0, r0}) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x3, 'veth0\x00'}, 0x18) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.cpu/syz1\x00', 0x1ff) openat$snapshot(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/snapshot\x00', 0x0, 0x0) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0xf7fffffffffffffd, 0x2012, r1, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000a40)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x20008000}, 0x24044000) unshare(0x40000000) mount$9p_virtio(&(0x7f00000003c0)='em0%$!,cgroup#\x00', &(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='9p\x00', 0x200000, &(0x7f0000000500)={'trans=virtio,', {[{@afid={'afid', 0x3d, 0x6}}, {@version_L='version=9p2000.L'}, {@cache_none='cache=none'}], [{@subj_role={'subj_role', 0x3d, '/dev/dsp#\x00'}}, {@permit_directio='permit_directio'}, {@measure='measure'}, {@context={'context', 0x3d, 'system_u'}}, {@obj_user={'obj_user'}}, {@dont_hash='dont_hash'}, {@subj_type={'subj_type', 0x3d, '\\eth0('}}, {@fsuuid={'fsuuid', 0x3d, {[0x36, 0x79, 0x0, 0x33, 0x61, 0x62, 0x32], 0x2d, [0x77, 0x32, 0x77, 0x34], 0x2d, [0x7f, 0x67, 0x37, 0x77], 0x2d, [0x0, 0x38, 0x32, 0x33], 0x2d, [0x35, 0x37, 0x7f, 0x7b, 0x37, 0x39, 0x77, 0x33]}}}, {@dont_measure='dont_measure'}]}}) ioctl$VIDIOC_ENUMINPUT(r0, 0xc050561a, &(0x7f0000000300)={0x4, "443b36c4364670c73c2ad26e1952769039650793d10fc72d24ce46e327d06e2f", 0x3, 0x100, 0x4, 0x1057ff, 0x0, 0x6}) 06:22:53 executing program 3: ioctl$EVIOCGPROP(0xffffffffffffffff, 0xc004743e, &(0x7f000082ef0a)=""/246) pwritev(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f0000000180)="80fde56d4930", 0x6}], 0x1, 0x0) 06:22:53 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) getsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000400), &(0x7f0000000440)=0x8) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, &(0x7f00000019c0)={0x20}, 0x1) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r1, 0x111, 0x5, 0xc3, 0x4) r2 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x1, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r2, 0xc0045516, &(0x7f0000000040)=0x4) arch_prctl$ARCH_GET_CPUID(0x1011) getpgrp(0x0) flock(r0, 0x0) ioctl$BLKRRPART(0xffffffffffffffff, 0x125f, 0x0) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000200)={@mcast2}) fcntl$F_GET_FILE_RW_HINT(r0, 0x40d, &(0x7f00000000c0)) setsockopt$RDS_CONG_MONITOR(r2, 0x114, 0x6, &(0x7f0000000280), 0x4) ioctl$VHOST_SET_LOG_FD(r2, 0x4004af07, 0x0) ioctl$DRM_IOCTL_IRQ_BUSID(r2, 0xc0106403, &(0x7f0000000100)={0x8875, 0x800, 0x8000, 0xc2}) ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000180)) ioctl$VHOST_SET_VRING_CALL(0xffffffffffffffff, 0x4008af21, &(0x7f0000000380)={0x0, r1}) r3 = fcntl$dupfd(r1, 0x0, r2) setsockopt$IP_VS_SO_SET_STOPDAEMON(r3, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'veth0\x00'}, 0x18) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.cpu/syz1\x00', 0x1ff) openat$snapshot(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/snapshot\x00', 0x0, 0x0) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0xf7fffffffffffffd, 0x2012, r2, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000a40)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x20008000}, 0x24044000) unshare(0x40000000) mount$9p_virtio(&(0x7f00000003c0)='em0%$!,cgroup#\x00', &(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='9p\x00', 0x200000, &(0x7f0000000500)={'trans=virtio,', {[{@afid={'afid', 0x3d, 0x6}}, {@version_L='version=9p2000.L'}, {@cache_none='cache=none'}], [{@subj_role={'subj_role', 0x3d, '/dev/dsp#\x00'}}, {@permit_directio='permit_directio'}, {@measure='measure'}, {@context={'context', 0x3d, 'system_u'}}, {@obj_user={'obj_user'}}, {@dont_hash='dont_hash'}, {@subj_type={'subj_type', 0x3d, '\\eth0('}}, {@fsuuid={'fsuuid', 0x3d, {[0x36, 0x79, 0x0, 0x33, 0x61, 0x62, 0x32], 0x2d, [0x77, 0x32, 0x77, 0x34], 0x2d, [0x7f, 0x67, 0x37, 0x77], 0x2d, [0x0, 0x38, 0x32, 0x33], 0x2d, [0x35, 0x37, 0x7f, 0x7b, 0x37, 0x39, 0x77, 0x33]}}}, {@dont_measure='dont_measure'}]}}) ioctl$VIDIOC_ENUMINPUT(r1, 0xc050561a, &(0x7f0000000300)={0x4, "443b36c4364670c73c2ad26e1952769039650793d10fc72d24ce46e327d06e2f", 0x3, 0x100, 0x4, 0x1057ff, 0x0, 0x6}) 06:22:54 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000040)="2e0000002508817ee45ae087185082cf0f24b0eba06ec400002339e00586f9835b3f0016914879008cd90080e230", 0x2e}], 0x1}, 0x0) [ 478.330864][T17309] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.5'. 06:22:54 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = creat(&(0x7f0000000000)='./bus\x00', 0x0) getrlimit(0x0, &(0x7f00000000c0)) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x12000000}) [ 478.401582][T17313] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.5'. [ 478.566533][T17311] IPVS: ftp: loaded support on port[0] = 21 [ 478.575171][T17312] IPVS: ftp: loaded support on port[0] = 21 06:22:55 executing program 3: ioctl$EVIOCGPROP(0xffffffffffffffff, 0xc004743e, &(0x7f000082ef0a)=""/246) pwritev(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f0000000180)="80fde56d4930", 0x6}], 0x1, 0x0) 06:22:55 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) getsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000400), &(0x7f0000000440)=0x8) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, &(0x7f00000019c0)={0x20}, 0x1) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r1, 0x111, 0x5, 0xc3, 0x4) r2 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x1, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r2, 0xc0045516, &(0x7f0000000040)=0x4) arch_prctl$ARCH_GET_CPUID(0x1011) getpgrp(0x0) flock(r0, 0x0) ioctl$BLKRRPART(0xffffffffffffffff, 0x125f, 0x0) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000200)={@mcast2}) fcntl$F_GET_FILE_RW_HINT(r0, 0x40d, &(0x7f00000000c0)) setsockopt$RDS_CONG_MONITOR(r2, 0x114, 0x6, &(0x7f0000000280), 0x4) ioctl$VHOST_SET_LOG_FD(r2, 0x4004af07, 0x0) ioctl$DRM_IOCTL_IRQ_BUSID(r2, 0xc0106403, &(0x7f0000000100)={0x8875, 0x800, 0x8000, 0xc2}) ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000180)) ioctl$VHOST_SET_VRING_CALL(0xffffffffffffffff, 0x4008af21, &(0x7f0000000380)={0x0, r1}) r3 = fcntl$dupfd(r1, 0x0, r2) setsockopt$IP_VS_SO_SET_STOPDAEMON(r3, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'veth0\x00'}, 0x18) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.cpu/syz1\x00', 0x1ff) openat$snapshot(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/snapshot\x00', 0x0, 0x0) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0xf7fffffffffffffd, 0x2012, r2, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000a40)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x20008000}, 0x24044000) unshare(0x40000000) mount$9p_virtio(&(0x7f00000003c0)='em0%$!,cgroup#\x00', &(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='9p\x00', 0x200000, &(0x7f0000000500)={'trans=virtio,', {[{@afid={'afid', 0x3d, 0x6}}, {@version_L='version=9p2000.L'}, {@cache_none='cache=none'}], [{@subj_role={'subj_role', 0x3d, '/dev/dsp#\x00'}}, {@permit_directio='permit_directio'}, {@measure='measure'}, {@context={'context', 0x3d, 'system_u'}}, {@obj_user={'obj_user'}}, {@dont_hash='dont_hash'}, {@subj_type={'subj_type', 0x3d, '\\eth0('}}, {@fsuuid={'fsuuid', 0x3d, {[0x36, 0x79, 0x0, 0x33, 0x61, 0x62, 0x32], 0x2d, [0x77, 0x32, 0x77, 0x34], 0x2d, [0x7f, 0x67, 0x37, 0x77], 0x2d, [0x0, 0x38, 0x32, 0x33], 0x2d, [0x35, 0x37, 0x7f, 0x7b, 0x37, 0x39, 0x77, 0x33]}}}, {@dont_measure='dont_measure'}]}}) ioctl$VIDIOC_ENUMINPUT(r1, 0xc050561a, &(0x7f0000000300)={0x4, "443b36c4364670c73c2ad26e1952769039650793d10fc72d24ce46e327d06e2f", 0x3, 0x100, 0x4, 0x1057ff, 0x0, 0x6}) 06:22:55 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) getsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000400), &(0x7f0000000440)=0x8) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, &(0x7f00000019c0)={0x20}, 0x1) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r0, 0x111, 0x5, 0xc3, 0x4) r1 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x1, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r1, 0xc0045516, &(0x7f0000000040)=0x4) arch_prctl$ARCH_GET_CPUID(0x1011) getpgrp(0x0) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000200)={@mcast2}) setsockopt$RDS_CONG_MONITOR(r1, 0x114, 0x6, &(0x7f0000000280), 0x4) ioctl$VHOST_SET_LOG_FD(r1, 0x4004af07, 0x0) ioctl$DRM_IOCTL_IRQ_BUSID(r1, 0xc0106403, &(0x7f0000000100)={0x8875, 0x800, 0x8000, 0xc2}) ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000180)) ioctl$VHOST_SET_VRING_CALL(0xffffffffffffffff, 0x4008af21, &(0x7f0000000380)={0x0, r0}) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x3, 'veth0\x00'}, 0x18) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.cpu/syz1\x00', 0x1ff) openat$snapshot(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/snapshot\x00', 0x0, 0x0) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0xf7fffffffffffffd, 0x2012, r1, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000a40)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x20008000}, 0x24044000) unshare(0x40000000) mount$9p_virtio(&(0x7f00000003c0)='em0%$!,cgroup#\x00', &(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='9p\x00', 0x200000, &(0x7f0000000500)={'trans=virtio,', {[{@afid={'afid', 0x3d, 0x6}}, {@version_L='version=9p2000.L'}, {@cache_none='cache=none'}], [{@subj_role={'subj_role', 0x3d, '/dev/dsp#\x00'}}, {@permit_directio='permit_directio'}, {@measure='measure'}, {@context={'context', 0x3d, 'system_u'}}, {@obj_user={'obj_user'}}, {@dont_hash='dont_hash'}, {@subj_type={'subj_type', 0x3d, '\\eth0('}}, {@fsuuid={'fsuuid', 0x3d, {[0x36, 0x79, 0x0, 0x33, 0x61, 0x62, 0x32], 0x2d, [0x77, 0x32, 0x77, 0x34], 0x2d, [0x7f, 0x67, 0x37, 0x77], 0x2d, [0x0, 0x38, 0x32, 0x33], 0x2d, [0x35, 0x37, 0x7f, 0x7b, 0x37, 0x39, 0x77, 0x33]}}}, {@dont_measure='dont_measure'}]}}) ioctl$VIDIOC_ENUMINPUT(r0, 0xc050561a, &(0x7f0000000300)={0x4, "443b36c4364670c73c2ad26e1952769039650793d10fc72d24ce46e327d06e2f", 0x3, 0x100, 0x4, 0x1057ff, 0x0, 0x6}) 06:22:55 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000040)="2e000000250a817ee45ae087185082cf0f24b0eba06ec400002339e00586f9835b3f0016914879008cd90080e230", 0x2e}], 0x1}, 0x0) 06:22:55 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000040)="2e0000002500817ee45ae087185082cf0f24b0eba06ec40a002339e00586f9835b3f0016914879008cd90080e230", 0x2e}], 0x1}, 0x0) 06:22:55 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = creat(&(0x7f0000000000)='./bus\x00', 0x0) getrlimit(0x0, &(0x7f00000000c0)) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x13260000}) [ 479.953822][T17330] IPVS: ftp: loaded support on port[0] = 21 [ 479.963090][T17332] IPVS: ftp: loaded support on port[0] = 21 06:22:56 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) getsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000400), &(0x7f0000000440)=0x8) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, &(0x7f00000019c0)={0x20}, 0x1) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r0, 0x111, 0x5, 0xc3, 0x4) r1 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x1, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r1, 0xc0045516, &(0x7f0000000040)=0x4) arch_prctl$ARCH_GET_CPUID(0x1011) getpgrp(0x0) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000200)={@mcast2}) setsockopt$RDS_CONG_MONITOR(r1, 0x114, 0x6, &(0x7f0000000280), 0x4) ioctl$VHOST_SET_LOG_FD(r1, 0x4004af07, 0x0) ioctl$DRM_IOCTL_IRQ_BUSID(r1, 0xc0106403, &(0x7f0000000100)={0x8875, 0x800, 0x8000, 0xc2}) ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000180)) ioctl$VHOST_SET_VRING_CALL(0xffffffffffffffff, 0x4008af21, &(0x7f0000000380)={0x0, r0}) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x3, 'veth0\x00'}, 0x18) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.cpu/syz1\x00', 0x1ff) openat$snapshot(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/snapshot\x00', 0x0, 0x0) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0xf7fffffffffffffd, 0x2012, r1, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000a40)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x20008000}, 0x24044000) unshare(0x40000000) mount$9p_virtio(&(0x7f00000003c0)='em0%$!,cgroup#\x00', &(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='9p\x00', 0x200000, &(0x7f0000000500)={'trans=virtio,', {[{@afid={'afid', 0x3d, 0x6}}, {@version_L='version=9p2000.L'}, {@cache_none='cache=none'}], [{@subj_role={'subj_role', 0x3d, '/dev/dsp#\x00'}}, {@permit_directio='permit_directio'}, {@measure='measure'}, {@context={'context', 0x3d, 'system_u'}}, {@obj_user={'obj_user'}}, {@dont_hash='dont_hash'}, {@subj_type={'subj_type', 0x3d, '\\eth0('}}, {@fsuuid={'fsuuid', 0x3d, {[0x36, 0x79, 0x0, 0x33, 0x61, 0x62, 0x32], 0x2d, [0x77, 0x32, 0x77, 0x34], 0x2d, [0x7f, 0x67, 0x37, 0x77], 0x2d, [0x0, 0x38, 0x32, 0x33], 0x2d, [0x35, 0x37, 0x7f, 0x7b, 0x37, 0x39, 0x77, 0x33]}}}, {@dont_measure='dont_measure'}]}}) ioctl$VIDIOC_ENUMINPUT(r0, 0xc050561a, &(0x7f0000000300)={0x4, "443b36c4364670c73c2ad26e1952769039650793d10fc72d24ce46e327d06e2f", 0x3, 0x100, 0x4, 0x1057ff, 0x0, 0x6}) 06:22:56 executing program 3: ioctl$EVIOCGPROP(0xffffffffffffffff, 0xc004743e, &(0x7f000082ef0a)=""/246) pwritev(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f0000000180)="80fde56d4930", 0x6}], 0x1, 0x0) [ 481.092413][T17337] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.5'. 06:22:56 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) getsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000400), &(0x7f0000000440)=0x8) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, &(0x7f00000019c0)={0x20}, 0x1) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r1, 0x111, 0x5, 0xc3, 0x4) r2 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x1, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r2, 0xc0045516, &(0x7f0000000040)=0x4) arch_prctl$ARCH_GET_CPUID(0x1011) getpgrp(0x0) flock(r0, 0x0) ioctl$BLKRRPART(0xffffffffffffffff, 0x125f, 0x0) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000200)={@mcast2}) fcntl$F_GET_FILE_RW_HINT(r0, 0x40d, &(0x7f00000000c0)) setsockopt$RDS_CONG_MONITOR(r2, 0x114, 0x6, &(0x7f0000000280), 0x4) ioctl$VHOST_SET_LOG_FD(r2, 0x4004af07, 0x0) ioctl$DRM_IOCTL_IRQ_BUSID(r2, 0xc0106403, &(0x7f0000000100)={0x8875, 0x800, 0x8000, 0xc2}) ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000180)) ioctl$VHOST_SET_VRING_CALL(0xffffffffffffffff, 0x4008af21, &(0x7f0000000380)={0x0, r1}) r3 = fcntl$dupfd(r1, 0x0, r2) setsockopt$IP_VS_SO_SET_STOPDAEMON(r3, 0x0, 0x48c, &(0x7f0000000140)={0x3, 'veth0\x00'}, 0x18) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) openat$snapshot(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/snapshot\x00', 0x0, 0x0) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0xf7fffffffffffffd, 0x2012, r2, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000a40)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x20008000}, 0x24044000) unshare(0x40000000) mount$9p_virtio(&(0x7f00000003c0)='em0%$!,cgroup#\x00', &(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='9p\x00', 0x200000, &(0x7f0000000500)={'trans=virtio,', {[{@afid={'afid', 0x3d, 0x6}}, {@version_L='version=9p2000.L'}, {@cache_none='cache=none'}], [{@subj_role={'subj_role', 0x3d, '/dev/dsp#\x00'}}, {@permit_directio='permit_directio'}, {@measure='measure'}, {@context={'context', 0x3d, 'system_u'}}, {@obj_user={'obj_user'}}, {@dont_hash='dont_hash'}, {@subj_type={'subj_type', 0x3d, '\\eth0('}}, {@fsuuid={'fsuuid', 0x3d, {[0x36, 0x79, 0x0, 0x33, 0x61, 0x62, 0x32], 0x2d, [0x77, 0x32, 0x77, 0x34], 0x2d, [0x7f, 0x67, 0x37, 0x77], 0x2d, [0x0, 0x38, 0x32, 0x33], 0x2d, [0x35, 0x37, 0x7f, 0x7b, 0x37, 0x39, 0x77, 0x33]}}}, {@dont_measure='dont_measure'}]}}) ioctl$VIDIOC_ENUMINPUT(r1, 0xc050561a, &(0x7f0000000300)={0x4, "443b36c4364670c73c2ad26e1952769039650793d10fc72d24ce46e327d06e2f", 0x3, 0x100, 0x4, 0x1057ff, 0x0, 0x6}) [ 481.154858][T17343] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.5'. 06:22:56 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000040)="2e0000002500817ee45ae087185082cf0f24b0eba06ec40e002339e00586f9835b3f0016914879008cd90080e230", 0x2e}], 0x1}, 0x0) 06:22:56 executing program 3: r0 = openat$ppp(0xffffffffffffff9c, 0x0, 0x101005, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f000082ef0a)=""/246) pwritev(r0, &(0x7f00000000c0)=[{&(0x7f0000000180)="80fde56d4930", 0x6}], 0x1, 0x0) 06:22:56 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000040)="2e000000250e817ee45ae087185082cf0f24b0eba06ec400002339e00586f9835b3f0016914879008cd90080e230", 0x2e}], 0x1}, 0x0) [ 481.329172][T17351] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.5'. [ 481.352703][T17348] IPVS: ftp: loaded support on port[0] = 21 [ 481.511569][T17352] IPVS: ftp: loaded support on port[0] = 21 [ 482.270406][T17354] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.5'. 06:22:58 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = creat(&(0x7f0000000000)='./bus\x00', 0x0) getrlimit(0x0, &(0x7f00000000c0)) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x21000000}) 06:22:58 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) getsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000400), &(0x7f0000000440)=0x8) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, &(0x7f00000019c0)={0x20}, 0x1) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r1, 0x111, 0x5, 0xc3, 0x4) r2 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x1, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r2, 0xc0045516, &(0x7f0000000040)=0x4) arch_prctl$ARCH_GET_CPUID(0x1011) flock(r0, 0x0) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000200)={@mcast2}) setsockopt$RDS_CONG_MONITOR(r2, 0x114, 0x6, &(0x7f0000000280), 0x4) ioctl$VHOST_SET_LOG_FD(r2, 0x4004af07, 0x0) ioctl$DRM_IOCTL_IRQ_BUSID(r2, 0xc0106403, &(0x7f0000000100)={0x8875, 0x800, 0x8000, 0xc2}) ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000180)) ioctl$VHOST_SET_VRING_CALL(0xffffffffffffffff, 0x4008af21, &(0x7f0000000380)={0x0, r1}) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x3, 'veth0\x00'}, 0x18) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.cpu/syz1\x00', 0x1ff) openat$snapshot(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/snapshot\x00', 0x0, 0x0) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0xf7fffffffffffffd, 0x2012, r2, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000a40)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x20008000}, 0x24044000) unshare(0x40000000) mount$9p_virtio(&(0x7f00000003c0)='em0%$!,cgroup#\x00', &(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='9p\x00', 0x200000, &(0x7f0000000500)={'trans=virtio,', {[{@afid={'afid', 0x3d, 0x6}}, {@version_L='version=9p2000.L'}, {@cache_none='cache=none'}], [{@subj_role={'subj_role', 0x3d, '/dev/dsp#\x00'}}, {@permit_directio='permit_directio'}, {@measure='measure'}, {@context={'context', 0x3d, 'system_u'}}, {@obj_user={'obj_user'}}, {@dont_hash='dont_hash'}, {@subj_type={'subj_type', 0x3d, '\\eth0('}}, {@fsuuid={'fsuuid', 0x3d, {[0x36, 0x79, 0x0, 0x33, 0x61, 0x62, 0x32], 0x2d, [0x77, 0x32, 0x77, 0x34], 0x2d, [0x7f, 0x67, 0x37, 0x77], 0x2d, [0x0, 0x38, 0x32, 0x33], 0x2d, [0x35, 0x37, 0x7f, 0x7b, 0x37, 0x39, 0x77, 0x33]}}}, {@dont_measure='dont_measure'}]}}) ioctl$VIDIOC_ENUMINPUT(r1, 0xc050561a, &(0x7f0000000300)={0x4, "443b36c4364670c73c2ad26e1952769039650793d10fc72d24ce46e327d06e2f", 0x3, 0x100, 0x4, 0x1057ff, 0x0, 0x6}) 06:22:58 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000040)="2e000000250f817ee45ae087185082cf0f24b0eba06ec400002339e00586f9835b3f0016914879008cd90080e230", 0x2e}], 0x1}, 0x0) 06:22:58 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000040)="2e0000002500817ee45ae087185082cf0f24b0eba06ec410002339e00586f9835b3f0016914879008cd90080e230", 0x2e}], 0x1}, 0x0) 06:22:58 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) getsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000400), &(0x7f0000000440)=0x8) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, &(0x7f00000019c0)={0x20}, 0x1) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r1, 0x111, 0x5, 0xc3, 0x4) r2 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x1, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r2, 0xc0045516, &(0x7f0000000040)=0x4) arch_prctl$ARCH_GET_CPUID(0x1011) getpgrp(0x0) flock(r0, 0x0) ioctl$BLKRRPART(0xffffffffffffffff, 0x125f, 0x0) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000200)={@mcast2}) fcntl$F_GET_FILE_RW_HINT(r0, 0x40d, &(0x7f00000000c0)) setsockopt$RDS_CONG_MONITOR(r2, 0x114, 0x6, &(0x7f0000000280), 0x4) ioctl$VHOST_SET_LOG_FD(r2, 0x4004af07, 0x0) ioctl$DRM_IOCTL_IRQ_BUSID(r2, 0xc0106403, &(0x7f0000000100)={0x8875, 0x800, 0x8000, 0xc2}) ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000180)) ioctl$VHOST_SET_VRING_CALL(0xffffffffffffffff, 0x4008af21, &(0x7f0000000380)={0x0, r1}) r3 = fcntl$dupfd(r1, 0x0, r2) setsockopt$IP_VS_SO_SET_STOPDAEMON(r3, 0x0, 0x48c, &(0x7f0000000140)={0x3, 'veth0\x00'}, 0x18) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) openat$snapshot(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/snapshot\x00', 0x0, 0x0) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0xf7fffffffffffffd, 0x2012, r2, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000a40)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x20008000}, 0x24044000) unshare(0x40000000) mount$9p_virtio(&(0x7f00000003c0)='em0%$!,cgroup#\x00', &(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='9p\x00', 0x200000, &(0x7f0000000500)={'trans=virtio,', {[{@afid={'afid', 0x3d, 0x6}}, {@version_L='version=9p2000.L'}, {@cache_none='cache=none'}], [{@subj_role={'subj_role', 0x3d, '/dev/dsp#\x00'}}, {@permit_directio='permit_directio'}, {@measure='measure'}, {@context={'context', 0x3d, 'system_u'}}, {@obj_user={'obj_user'}}, {@dont_hash='dont_hash'}, {@subj_type={'subj_type', 0x3d, '\\eth0('}}, {@fsuuid={'fsuuid', 0x3d, {[0x36, 0x79, 0x0, 0x33, 0x61, 0x62, 0x32], 0x2d, [0x77, 0x32, 0x77, 0x34], 0x2d, [0x7f, 0x67, 0x37, 0x77], 0x2d, [0x0, 0x38, 0x32, 0x33], 0x2d, [0x35, 0x37, 0x7f, 0x7b, 0x37, 0x39, 0x77, 0x33]}}}, {@dont_measure='dont_measure'}]}}) ioctl$VIDIOC_ENUMINPUT(r1, 0xc050561a, &(0x7f0000000300)={0x4, "443b36c4364670c73c2ad26e1952769039650793d10fc72d24ce46e327d06e2f", 0x3, 0x100, 0x4, 0x1057ff, 0x0, 0x6}) 06:22:58 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000040)="2e0000002510817ee45ae087185082cf0f24b0eba06ec400002339e00586f9835b3f0016914879008cd90080e230", 0x2e}], 0x1}, 0x0) [ 482.656225][T17375] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.5'. [ 482.688824][T17369] IPVS: ftp: loaded support on port[0] = 21 [ 482.748186][T17378] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.5'. [ 482.977359][T17379] IPVS: ftp: loaded support on port[0] = 21 06:22:58 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = creat(&(0x7f0000000000)='./bus\x00', 0x0) getrlimit(0x0, &(0x7f00000000c0)) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x22000000}) 06:22:58 executing program 3: r0 = openat$ppp(0xffffffffffffff9c, 0x0, 0x101005, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f000082ef0a)=""/246) pwritev(r0, &(0x7f00000000c0)=[{&(0x7f0000000180)="80fde56d4930", 0x6}], 0x1, 0x0) 06:22:59 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000040)="2e0000002548817ee45ae087185082cf0f24b0eba06ec400002339e00586f9835b3f0016914879008cd90080e230", 0x2e}], 0x1}, 0x0) 06:22:59 executing program 3: r0 = openat$ppp(0xffffffffffffff9c, 0x0, 0x101005, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f000082ef0a)=""/246) pwritev(r0, &(0x7f00000000c0)=[{&(0x7f0000000180)="80fde56d4930", 0x6}], 0x1, 0x0) 06:22:59 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000040)="2e0000002500817ee45ae087185082cf0f24b0eba06ec448002339e00586f9835b3f0016914879008cd90080e230", 0x2e}], 0x1}, 0x0) 06:22:59 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000040)="2e000000254c817ee45ae087185082cf0f24b0eba06ec400002339e00586f9835b3f0016914879008cd90080e230", 0x2e}], 0x1}, 0x0) 06:22:59 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) getsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000400), &(0x7f0000000440)=0x8) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, &(0x7f00000019c0)={0x20}, 0x1) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r1, 0x111, 0x5, 0xc3, 0x4) r2 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x1, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r2, 0xc0045516, &(0x7f0000000040)=0x4) arch_prctl$ARCH_GET_CPUID(0x1011) flock(r0, 0x0) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000200)={@mcast2}) setsockopt$RDS_CONG_MONITOR(r2, 0x114, 0x6, &(0x7f0000000280), 0x4) ioctl$VHOST_SET_LOG_FD(r2, 0x4004af07, 0x0) ioctl$DRM_IOCTL_IRQ_BUSID(r2, 0xc0106403, &(0x7f0000000100)={0x8875, 0x800, 0x8000, 0xc2}) ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000180)) ioctl$VHOST_SET_VRING_CALL(0xffffffffffffffff, 0x4008af21, &(0x7f0000000380)={0x0, r1}) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x3, 'veth0\x00'}, 0x18) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.cpu/syz1\x00', 0x1ff) openat$snapshot(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/snapshot\x00', 0x0, 0x0) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0xf7fffffffffffffd, 0x2012, r2, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000a40)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x20008000}, 0x24044000) unshare(0x40000000) mount$9p_virtio(&(0x7f00000003c0)='em0%$!,cgroup#\x00', &(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='9p\x00', 0x200000, &(0x7f0000000500)={'trans=virtio,', {[{@afid={'afid', 0x3d, 0x6}}, {@version_L='version=9p2000.L'}, {@cache_none='cache=none'}], [{@subj_role={'subj_role', 0x3d, '/dev/dsp#\x00'}}, {@permit_directio='permit_directio'}, {@measure='measure'}, {@context={'context', 0x3d, 'system_u'}}, {@obj_user={'obj_user'}}, {@dont_hash='dont_hash'}, {@subj_type={'subj_type', 0x3d, '\\eth0('}}, {@fsuuid={'fsuuid', 0x3d, {[0x36, 0x79, 0x0, 0x33, 0x61, 0x62, 0x32], 0x2d, [0x77, 0x32, 0x77, 0x34], 0x2d, [0x7f, 0x67, 0x37, 0x77], 0x2d, [0x0, 0x38, 0x32, 0x33], 0x2d, [0x35, 0x37, 0x7f, 0x7b, 0x37, 0x39, 0x77, 0x33]}}}, {@dont_measure='dont_measure'}]}}) ioctl$VIDIOC_ENUMINPUT(r1, 0xc050561a, &(0x7f0000000300)={0x4, "443b36c4364670c73c2ad26e1952769039650793d10fc72d24ce46e327d06e2f", 0x3, 0x100, 0x4, 0x1057ff, 0x0, 0x6}) [ 483.695824][T17400] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.5'. [ 483.716444][T17401] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.5'. 06:22:59 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = creat(&(0x7f0000000000)='./bus\x00', 0x0) getrlimit(0x0, &(0x7f00000000c0)) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x34a20000}) 06:22:59 executing program 3: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f000082ef0a)=""/246) pwritev(r0, &(0x7f00000000c0)=[{&(0x7f0000000180)="80fde56d4930", 0x6}], 0x1, 0x0) 06:22:59 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) getsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000400), &(0x7f0000000440)=0x8) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, &(0x7f00000019c0)={0x20}, 0x1) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r1, 0x111, 0x5, 0xc3, 0x4) r2 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x1, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r2, 0xc0045516, &(0x7f0000000040)=0x4) arch_prctl$ARCH_GET_CPUID(0x1011) getpgrp(0x0) flock(r0, 0x0) ioctl$BLKRRPART(0xffffffffffffffff, 0x125f, 0x0) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000200)={@mcast2}) fcntl$F_GET_FILE_RW_HINT(r0, 0x40d, &(0x7f00000000c0)) setsockopt$RDS_CONG_MONITOR(r2, 0x114, 0x6, &(0x7f0000000280), 0x4) ioctl$VHOST_SET_LOG_FD(r2, 0x4004af07, 0x0) ioctl$DRM_IOCTL_IRQ_BUSID(r2, 0xc0106403, &(0x7f0000000100)={0x8875, 0x800, 0x8000, 0xc2}) ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000180)) ioctl$VHOST_SET_VRING_CALL(0xffffffffffffffff, 0x4008af21, &(0x7f0000000380)={0x0, r1}) r3 = fcntl$dupfd(r1, 0x0, r2) setsockopt$IP_VS_SO_SET_STOPDAEMON(r3, 0x0, 0x48c, &(0x7f0000000140)={0x3, 'veth0\x00'}, 0x18) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) openat$snapshot(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/snapshot\x00', 0x0, 0x0) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0xf7fffffffffffffd, 0x2012, r2, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000a40)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x20008000}, 0x24044000) unshare(0x40000000) mount$9p_virtio(&(0x7f00000003c0)='em0%$!,cgroup#\x00', &(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='9p\x00', 0x200000, &(0x7f0000000500)={'trans=virtio,', {[{@afid={'afid', 0x3d, 0x6}}, {@version_L='version=9p2000.L'}, {@cache_none='cache=none'}], [{@subj_role={'subj_role', 0x3d, '/dev/dsp#\x00'}}, {@permit_directio='permit_directio'}, {@measure='measure'}, {@context={'context', 0x3d, 'system_u'}}, {@obj_user={'obj_user'}}, {@dont_hash='dont_hash'}, {@subj_type={'subj_type', 0x3d, '\\eth0('}}, {@fsuuid={'fsuuid', 0x3d, {[0x36, 0x79, 0x0, 0x33, 0x61, 0x62, 0x32], 0x2d, [0x77, 0x32, 0x77, 0x34], 0x2d, [0x7f, 0x67, 0x37, 0x77], 0x2d, [0x0, 0x38, 0x32, 0x33], 0x2d, [0x35, 0x37, 0x7f, 0x7b, 0x37, 0x39, 0x77, 0x33]}}}, {@dont_measure='dont_measure'}]}}) ioctl$VIDIOC_ENUMINPUT(r1, 0xc050561a, &(0x7f0000000300)={0x4, "443b36c4364670c73c2ad26e1952769039650793d10fc72d24ce46e327d06e2f", 0x3, 0x100, 0x4, 0x1057ff, 0x0, 0x6}) 06:22:59 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000040)="2e0000002500817ee45ae087185082cf0f24b0eba06ec44c002339e00586f9835b3f0016914879008cd90080e230", 0x2e}], 0x1}, 0x0) [ 483.990322][T17405] IPVS: ftp: loaded support on port[0] = 21 [ 484.106778][T17417] IPVS: ftp: loaded support on port[0] = 21 06:22:59 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000040)="2e0000002560817ee45ae087185082cf0f24b0eba06ec400002339e00586f9835b3f0016914879008cd90080e230", 0x2e}], 0x1}, 0x0) 06:23:00 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) getsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000400), &(0x7f0000000440)=0x8) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, &(0x7f00000019c0)={0x20}, 0x1) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r1, 0x111, 0x5, 0xc3, 0x4) r2 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x1, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r2, 0xc0045516, &(0x7f0000000040)=0x4) arch_prctl$ARCH_GET_CPUID(0x1011) flock(r0, 0x0) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000200)={@mcast2}) setsockopt$RDS_CONG_MONITOR(r2, 0x114, 0x6, &(0x7f0000000280), 0x4) ioctl$VHOST_SET_LOG_FD(r2, 0x4004af07, 0x0) ioctl$DRM_IOCTL_IRQ_BUSID(r2, 0xc0106403, &(0x7f0000000100)={0x8875, 0x800, 0x8000, 0xc2}) ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000180)) ioctl$VHOST_SET_VRING_CALL(0xffffffffffffffff, 0x4008af21, &(0x7f0000000380)={0x0, r1}) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x3, 'veth0\x00'}, 0x18) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.cpu/syz1\x00', 0x1ff) openat$snapshot(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/snapshot\x00', 0x0, 0x0) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0xf7fffffffffffffd, 0x2012, r2, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000a40)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x20008000}, 0x24044000) unshare(0x40000000) mount$9p_virtio(&(0x7f00000003c0)='em0%$!,cgroup#\x00', &(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='9p\x00', 0x200000, &(0x7f0000000500)={'trans=virtio,', {[{@afid={'afid', 0x3d, 0x6}}, {@version_L='version=9p2000.L'}, {@cache_none='cache=none'}], [{@subj_role={'subj_role', 0x3d, '/dev/dsp#\x00'}}, {@permit_directio='permit_directio'}, {@measure='measure'}, {@context={'context', 0x3d, 'system_u'}}, {@obj_user={'obj_user'}}, {@dont_hash='dont_hash'}, {@subj_type={'subj_type', 0x3d, '\\eth0('}}, {@fsuuid={'fsuuid', 0x3d, {[0x36, 0x79, 0x0, 0x33, 0x61, 0x62, 0x32], 0x2d, [0x77, 0x32, 0x77, 0x34], 0x2d, [0x7f, 0x67, 0x37, 0x77], 0x2d, [0x0, 0x38, 0x32, 0x33], 0x2d, [0x35, 0x37, 0x7f, 0x7b, 0x37, 0x39, 0x77, 0x33]}}}, {@dont_measure='dont_measure'}]}}) ioctl$VIDIOC_ENUMINPUT(r1, 0xc050561a, &(0x7f0000000300)={0x4, "443b36c4364670c73c2ad26e1952769039650793d10fc72d24ce46e327d06e2f", 0x3, 0x100, 0x4, 0x1057ff, 0x0, 0x6}) [ 484.886288][T17428] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.5'. 06:23:00 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000040)="2e0000002568817ee45ae087185082cf0f24b0eba06ec400002339e00586f9835b3f0016914879008cd90080e230", 0x2e}], 0x1}, 0x0) 06:23:00 executing program 3: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f000082ef0a)=""/246) pwritev(r0, &(0x7f00000000c0)=[{&(0x7f0000000180)="80fde56d4930", 0x6}], 0x1, 0x0) 06:23:00 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) getsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000400), &(0x7f0000000440)=0x8) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, &(0x7f00000019c0)={0x20}, 0x1) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r1, 0x111, 0x5, 0xc3, 0x4) r2 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x1, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r2, 0xc0045516, &(0x7f0000000040)=0x4) arch_prctl$ARCH_GET_CPUID(0x1011) getpgrp(0x0) flock(r0, 0x0) ioctl$BLKRRPART(0xffffffffffffffff, 0x125f, 0x0) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000200)={@mcast2}) fcntl$F_GET_FILE_RW_HINT(r0, 0x40d, &(0x7f00000000c0)) setsockopt$RDS_CONG_MONITOR(r2, 0x114, 0x6, &(0x7f0000000280), 0x4) ioctl$VHOST_SET_LOG_FD(r2, 0x4004af07, 0x0) ioctl$DRM_IOCTL_IRQ_BUSID(r2, 0xc0106403, &(0x7f0000000100)={0x8875, 0x800, 0x8000, 0xc2}) ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000180)) ioctl$VHOST_SET_VRING_CALL(0xffffffffffffffff, 0x4008af21, &(0x7f0000000380)={0x0, r1}) r3 = fcntl$dupfd(r1, 0x0, r2) setsockopt$IP_VS_SO_SET_STOPDAEMON(r3, 0x0, 0x48c, &(0x7f0000000140)={0x3, 'veth0\x00'}, 0x18) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.cpu/syz1\x00', 0x1ff) openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0xf7fffffffffffffd, 0x2012, r2, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000a40)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x20008000}, 0x24044000) unshare(0x40000000) mount$9p_virtio(&(0x7f00000003c0)='em0%$!,cgroup#\x00', &(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='9p\x00', 0x200000, &(0x7f0000000500)={'trans=virtio,', {[{@afid={'afid', 0x3d, 0x6}}, {@version_L='version=9p2000.L'}, {@cache_none='cache=none'}], [{@subj_role={'subj_role', 0x3d, '/dev/dsp#\x00'}}, {@permit_directio='permit_directio'}, {@measure='measure'}, {@context={'context', 0x3d, 'system_u'}}, {@obj_user={'obj_user'}}, {@dont_hash='dont_hash'}, {@subj_type={'subj_type', 0x3d, '\\eth0('}}, {@fsuuid={'fsuuid', 0x3d, {[0x36, 0x79, 0x0, 0x33, 0x61, 0x62, 0x32], 0x2d, [0x77, 0x32, 0x77, 0x34], 0x2d, [0x7f, 0x67, 0x37, 0x77], 0x2d, [0x0, 0x38, 0x32, 0x33], 0x2d, [0x35, 0x37, 0x7f, 0x7b, 0x37, 0x39, 0x77, 0x33]}}}, {@dont_measure='dont_measure'}]}}) ioctl$VIDIOC_ENUMINPUT(r1, 0xc050561a, &(0x7f0000000300)={0x4, "443b36c4364670c73c2ad26e1952769039650793d10fc72d24ce46e327d06e2f", 0x3, 0x100, 0x4, 0x1057ff, 0x0, 0x6}) [ 485.015046][T17431] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.5'. 06:23:00 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = creat(&(0x7f0000000000)='./bus\x00', 0x0) getrlimit(0x0, &(0x7f00000000c0)) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x39620200}) 06:23:00 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000040)="2e0000002500817ee45ae087185082cf0f24b0eba06ec460002339e00586f9835b3f0016914879008cd90080e230", 0x2e}], 0x1}, 0x0) 06:23:00 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000040)="2e000000256c817ee45ae087185082cf0f24b0eba06ec400002339e00586f9835b3f0016914879008cd90080e230", 0x2e}], 0x1}, 0x0) [ 485.224254][T17436] IPVS: ftp: loaded support on port[0] = 21 [ 485.493900][T17448] IPVS: ftp: loaded support on port[0] = 21 06:23:01 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = creat(&(0x7f0000000000)='./bus\x00', 0x0) getrlimit(0x0, &(0x7f00000000c0)) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x3f000000}) 06:23:01 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000040)="2e0000002500817ee45ae087185082cf0f24b0eba06ec468002339e00586f9835b3f0016914879008cd90080e230", 0x2e}], 0x1}, 0x0) 06:23:01 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000040)="2e0000002574817ee45ae087185082cf0f24b0eba06ec400002339e00586f9835b3f0016914879008cd90080e230", 0x2e}], 0x1}, 0x0) 06:23:02 executing program 3: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f000082ef0a)=""/246) pwritev(r0, &(0x7f00000000c0)=[{&(0x7f0000000180)="80fde56d4930", 0x6}], 0x1, 0x0) 06:23:02 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) getsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000400), &(0x7f0000000440)=0x8) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, &(0x7f00000019c0)={0x20}, 0x1) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r1, 0x111, 0x5, 0xc3, 0x4) r2 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x1, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r2, 0xc0045516, &(0x7f0000000040)=0x4) getpgrp(0x0) flock(r0, 0x0) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000200)={@mcast2}) setsockopt$RDS_CONG_MONITOR(r2, 0x114, 0x6, &(0x7f0000000280), 0x4) ioctl$VHOST_SET_LOG_FD(r2, 0x4004af07, 0x0) ioctl$DRM_IOCTL_IRQ_BUSID(r2, 0xc0106403, &(0x7f0000000100)={0x8875, 0x800, 0x8000, 0xc2}) ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000180)) ioctl$VHOST_SET_VRING_CALL(0xffffffffffffffff, 0x4008af21, &(0x7f0000000380)={0x0, r1}) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x3, 'veth0\x00'}, 0x18) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.cpu/syz1\x00', 0x1ff) openat$snapshot(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/snapshot\x00', 0x0, 0x0) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0xf7fffffffffffffd, 0x2012, r2, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000a40)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x20008000}, 0x24044000) unshare(0x40000000) mount$9p_virtio(&(0x7f00000003c0)='em0%$!,cgroup#\x00', &(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='9p\x00', 0x200000, &(0x7f0000000500)={'trans=virtio,', {[{@afid={'afid', 0x3d, 0x6}}, {@version_L='version=9p2000.L'}, {@cache_none='cache=none'}], [{@subj_role={'subj_role', 0x3d, '/dev/dsp#\x00'}}, {@permit_directio='permit_directio'}, {@measure='measure'}, {@context={'context', 0x3d, 'system_u'}}, {@obj_user={'obj_user'}}, {@dont_hash='dont_hash'}, {@subj_type={'subj_type', 0x3d, '\\eth0('}}, {@fsuuid={'fsuuid', 0x3d, {[0x36, 0x79, 0x0, 0x33, 0x61, 0x62, 0x32], 0x2d, [0x77, 0x32, 0x77, 0x34], 0x2d, [0x7f, 0x67, 0x37, 0x77], 0x2d, [0x0, 0x38, 0x32, 0x33], 0x2d, [0x35, 0x37, 0x7f, 0x7b, 0x37, 0x39, 0x77, 0x33]}}}, {@dont_measure='dont_measure'}]}}) ioctl$VIDIOC_ENUMINPUT(r1, 0xc050561a, &(0x7f0000000300)={0x4, "443b36c4364670c73c2ad26e1952769039650793d10fc72d24ce46e327d06e2f", 0x3, 0x100, 0x4, 0x1057ff, 0x0, 0x6}) 06:23:02 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) getsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000400), &(0x7f0000000440)=0x8) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, &(0x7f00000019c0)={0x20}, 0x1) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r1, 0x111, 0x5, 0xc3, 0x4) r2 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x1, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r2, 0xc0045516, &(0x7f0000000040)=0x4) arch_prctl$ARCH_GET_CPUID(0x1011) getpgrp(0x0) flock(r0, 0x0) ioctl$BLKRRPART(0xffffffffffffffff, 0x125f, 0x0) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000200)={@mcast2}) fcntl$F_GET_FILE_RW_HINT(r0, 0x40d, &(0x7f00000000c0)) setsockopt$RDS_CONG_MONITOR(r2, 0x114, 0x6, &(0x7f0000000280), 0x4) ioctl$VHOST_SET_LOG_FD(r2, 0x4004af07, 0x0) ioctl$DRM_IOCTL_IRQ_BUSID(r2, 0xc0106403, &(0x7f0000000100)={0x8875, 0x800, 0x8000, 0xc2}) ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000180)) ioctl$VHOST_SET_VRING_CALL(0xffffffffffffffff, 0x4008af21, &(0x7f0000000380)={0x0, r1}) r3 = fcntl$dupfd(r1, 0x0, r2) setsockopt$IP_VS_SO_SET_STOPDAEMON(r3, 0x0, 0x48c, &(0x7f0000000140)={0x3, 'veth0\x00'}, 0x18) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.cpu/syz1\x00', 0x1ff) openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0xf7fffffffffffffd, 0x2012, r2, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000a40)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x20008000}, 0x24044000) unshare(0x40000000) mount$9p_virtio(&(0x7f00000003c0)='em0%$!,cgroup#\x00', &(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='9p\x00', 0x200000, &(0x7f0000000500)={'trans=virtio,', {[{@afid={'afid', 0x3d, 0x6}}, {@version_L='version=9p2000.L'}, {@cache_none='cache=none'}], [{@subj_role={'subj_role', 0x3d, '/dev/dsp#\x00'}}, {@permit_directio='permit_directio'}, {@measure='measure'}, {@context={'context', 0x3d, 'system_u'}}, {@obj_user={'obj_user'}}, {@dont_hash='dont_hash'}, {@subj_type={'subj_type', 0x3d, '\\eth0('}}, {@fsuuid={'fsuuid', 0x3d, {[0x36, 0x79, 0x0, 0x33, 0x61, 0x62, 0x32], 0x2d, [0x77, 0x32, 0x77, 0x34], 0x2d, [0x7f, 0x67, 0x37, 0x77], 0x2d, [0x0, 0x38, 0x32, 0x33], 0x2d, [0x35, 0x37, 0x7f, 0x7b, 0x37, 0x39, 0x77, 0x33]}}}, {@dont_measure='dont_measure'}]}}) ioctl$VIDIOC_ENUMINPUT(r1, 0xc050561a, &(0x7f0000000300)={0x4, "443b36c4364670c73c2ad26e1952769039650793d10fc72d24ce46e327d06e2f", 0x3, 0x100, 0x4, 0x1057ff, 0x0, 0x6}) [ 486.422268][T17465] __nla_parse: 2 callbacks suppressed [ 486.422278][T17465] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.5'. 06:23:02 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = creat(&(0x7f0000000000)='./bus\x00', 0x0) getrlimit(0x0, &(0x7f00000000c0)) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x3fd50000}) [ 486.516958][T17473] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.5'. [ 486.665798][T17475] IPVS: ftp: loaded support on port[0] = 21 [ 486.783179][T17476] IPVS: ftp: loaded support on port[0] = 21 06:23:02 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000040)="2e000000257a817ee45ae087185082cf0f24b0eba06ec400002339e00586f9835b3f0016914879008cd90080e230", 0x2e}], 0x1}, 0x0) 06:23:03 executing program 3: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x101005, 0x0) ioctl$EVIOCGPROP(0xffffffffffffffff, 0xc004743e, &(0x7f000082ef0a)=""/246) pwritev(r0, &(0x7f00000000c0)=[{&(0x7f0000000180)="80fde56d4930", 0x6}], 0x1, 0x0) 06:23:03 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000040)="2e0000002500817ee45ae087185082cf0f24b0eba06ec46c002339e00586f9835b3f0016914879008cd90080e230", 0x2e}], 0x1}, 0x0) 06:23:03 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000040)="2e0000002500817ee468e087185082cf0f24b0eba06ec400002339e00586f9835b3f0016914879008cd90080e230", 0x2e}], 0x1}, 0x0) 06:23:03 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) getsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000400), &(0x7f0000000440)=0x8) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, &(0x7f00000019c0)={0x20}, 0x1) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r1, 0x111, 0x5, 0xc3, 0x4) r2 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x1, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r2, 0xc0045516, &(0x7f0000000040)=0x4) arch_prctl$ARCH_GET_CPUID(0x1011) getpgrp(0x0) flock(r0, 0x0) ioctl$BLKRRPART(0xffffffffffffffff, 0x125f, 0x0) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000200)={@mcast2}) fcntl$F_GET_FILE_RW_HINT(r0, 0x40d, &(0x7f00000000c0)) setsockopt$RDS_CONG_MONITOR(r2, 0x114, 0x6, &(0x7f0000000280), 0x4) ioctl$VHOST_SET_LOG_FD(r2, 0x4004af07, 0x0) ioctl$DRM_IOCTL_IRQ_BUSID(r2, 0xc0106403, &(0x7f0000000100)={0x8875, 0x800, 0x8000, 0xc2}) ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000180)) ioctl$VHOST_SET_VRING_CALL(0xffffffffffffffff, 0x4008af21, &(0x7f0000000380)={0x0, r1}) r3 = fcntl$dupfd(r1, 0x0, r2) setsockopt$IP_VS_SO_SET_STOPDAEMON(r3, 0x0, 0x48c, &(0x7f0000000140)={0x3, 'veth0\x00'}, 0x18) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.cpu/syz1\x00', 0x1ff) openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0xf7fffffffffffffd, 0x2012, r2, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000a40)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x20008000}, 0x24044000) unshare(0x40000000) mount$9p_virtio(&(0x7f00000003c0)='em0%$!,cgroup#\x00', &(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='9p\x00', 0x200000, &(0x7f0000000500)={'trans=virtio,', {[{@afid={'afid', 0x3d, 0x6}}, {@version_L='version=9p2000.L'}, {@cache_none='cache=none'}], [{@subj_role={'subj_role', 0x3d, '/dev/dsp#\x00'}}, {@permit_directio='permit_directio'}, {@measure='measure'}, {@context={'context', 0x3d, 'system_u'}}, {@obj_user={'obj_user'}}, {@dont_hash='dont_hash'}, {@subj_type={'subj_type', 0x3d, '\\eth0('}}, {@fsuuid={'fsuuid', 0x3d, {[0x36, 0x79, 0x0, 0x33, 0x61, 0x62, 0x32], 0x2d, [0x77, 0x32, 0x77, 0x34], 0x2d, [0x7f, 0x67, 0x37, 0x77], 0x2d, [0x0, 0x38, 0x32, 0x33], 0x2d, [0x35, 0x37, 0x7f, 0x7b, 0x37, 0x39, 0x77, 0x33]}}}, {@dont_measure='dont_measure'}]}}) ioctl$VIDIOC_ENUMINPUT(r1, 0xc050561a, &(0x7f0000000300)={0x4, "443b36c4364670c73c2ad26e1952769039650793d10fc72d24ce46e327d06e2f", 0x3, 0x100, 0x4, 0x1057ff, 0x0, 0x6}) 06:23:03 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) getsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000400), &(0x7f0000000440)=0x8) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, &(0x7f00000019c0)={0x20}, 0x1) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r1, 0x111, 0x5, 0xc3, 0x4) r2 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x1, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r2, 0xc0045516, &(0x7f0000000040)=0x4) getpgrp(0x0) flock(r0, 0x0) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000200)={@mcast2}) setsockopt$RDS_CONG_MONITOR(r2, 0x114, 0x6, &(0x7f0000000280), 0x4) ioctl$VHOST_SET_LOG_FD(r2, 0x4004af07, 0x0) ioctl$DRM_IOCTL_IRQ_BUSID(r2, 0xc0106403, &(0x7f0000000100)={0x8875, 0x800, 0x8000, 0xc2}) ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000180)) ioctl$VHOST_SET_VRING_CALL(0xffffffffffffffff, 0x4008af21, &(0x7f0000000380)={0x0, r1}) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x3, 'veth0\x00'}, 0x18) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.cpu/syz1\x00', 0x1ff) openat$snapshot(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/snapshot\x00', 0x0, 0x0) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0xf7fffffffffffffd, 0x2012, r2, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000a40)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x20008000}, 0x24044000) unshare(0x40000000) mount$9p_virtio(&(0x7f00000003c0)='em0%$!,cgroup#\x00', &(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='9p\x00', 0x200000, &(0x7f0000000500)={'trans=virtio,', {[{@afid={'afid', 0x3d, 0x6}}, {@version_L='version=9p2000.L'}, {@cache_none='cache=none'}], [{@subj_role={'subj_role', 0x3d, '/dev/dsp#\x00'}}, {@permit_directio='permit_directio'}, {@measure='measure'}, {@context={'context', 0x3d, 'system_u'}}, {@obj_user={'obj_user'}}, {@dont_hash='dont_hash'}, {@subj_type={'subj_type', 0x3d, '\\eth0('}}, {@fsuuid={'fsuuid', 0x3d, {[0x36, 0x79, 0x0, 0x33, 0x61, 0x62, 0x32], 0x2d, [0x77, 0x32, 0x77, 0x34], 0x2d, [0x7f, 0x67, 0x37, 0x77], 0x2d, [0x0, 0x38, 0x32, 0x33], 0x2d, [0x35, 0x37, 0x7f, 0x7b, 0x37, 0x39, 0x77, 0x33]}}}, {@dont_measure='dont_measure'}]}}) ioctl$VIDIOC_ENUMINPUT(r1, 0xc050561a, &(0x7f0000000300)={0x4, "443b36c4364670c73c2ad26e1952769039650793d10fc72d24ce46e327d06e2f", 0x3, 0x100, 0x4, 0x1057ff, 0x0, 0x6}) 06:23:03 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = creat(&(0x7f0000000000)='./bus\x00', 0x0) getrlimit(0x0, &(0x7f00000000c0)) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x61620200}) 06:23:03 executing program 3: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x101005, 0x0) ioctl$EVIOCGPROP(0xffffffffffffffff, 0xc004743e, &(0x7f000082ef0a)=""/246) pwritev(r0, &(0x7f00000000c0)=[{&(0x7f0000000180)="80fde56d4930", 0x6}], 0x1, 0x0) [ 487.850823][T17492] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.5'. [ 487.981722][T17496] IPVS: ftp: loaded support on port[0] = 21 [ 488.224043][T17502] IPVS: ftp: loaded support on port[0] = 21 [ 488.862298][T17494] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.4'. [ 488.909733][T17506] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.5'. 06:23:04 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = creat(&(0x7f0000000000)='./bus\x00', 0x0) getrlimit(0x0, &(0x7f00000000c0)) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x80a40200}) 06:23:04 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000040)="2e0000002500817ee45ae087185082cf0f24b0eba06ec474002339e00586f9835b3f0016914879008cd90080e230", 0x2e}], 0x1}, 0x0) 06:23:04 executing program 3: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x101005, 0x0) ioctl$EVIOCGPROP(0xffffffffffffffff, 0xc004743e, &(0x7f000082ef0a)=""/246) pwritev(r0, &(0x7f00000000c0)=[{&(0x7f0000000180)="80fde56d4930", 0x6}], 0x1, 0x0) [ 488.969049][T17510] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.4'. 06:23:04 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000040)="2e0000002500817ee45ae0872f5082cf0f24b0eba06ec400002339e00586f9835b3f0016914879008cd90080e230", 0x2e}], 0x1}, 0x0) 06:23:04 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) getsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000400), &(0x7f0000000440)=0x8) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, &(0x7f00000019c0)={0x20}, 0x1) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r1, 0x111, 0x5, 0xc3, 0x4) r2 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x1, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r2, 0xc0045516, &(0x7f0000000040)=0x4) getpgrp(0x0) flock(r0, 0x0) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000200)={@mcast2}) setsockopt$RDS_CONG_MONITOR(r2, 0x114, 0x6, &(0x7f0000000280), 0x4) ioctl$VHOST_SET_LOG_FD(r2, 0x4004af07, 0x0) ioctl$DRM_IOCTL_IRQ_BUSID(r2, 0xc0106403, &(0x7f0000000100)={0x8875, 0x800, 0x8000, 0xc2}) ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000180)) ioctl$VHOST_SET_VRING_CALL(0xffffffffffffffff, 0x4008af21, &(0x7f0000000380)={0x0, r1}) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x3, 'veth0\x00'}, 0x18) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.cpu/syz1\x00', 0x1ff) openat$snapshot(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/snapshot\x00', 0x0, 0x0) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0xf7fffffffffffffd, 0x2012, r2, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000a40)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x20008000}, 0x24044000) unshare(0x40000000) mount$9p_virtio(&(0x7f00000003c0)='em0%$!,cgroup#\x00', &(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='9p\x00', 0x200000, &(0x7f0000000500)={'trans=virtio,', {[{@afid={'afid', 0x3d, 0x6}}, {@version_L='version=9p2000.L'}, {@cache_none='cache=none'}], [{@subj_role={'subj_role', 0x3d, '/dev/dsp#\x00'}}, {@permit_directio='permit_directio'}, {@measure='measure'}, {@context={'context', 0x3d, 'system_u'}}, {@obj_user={'obj_user'}}, {@dont_hash='dont_hash'}, {@subj_type={'subj_type', 0x3d, '\\eth0('}}, {@fsuuid={'fsuuid', 0x3d, {[0x36, 0x79, 0x0, 0x33, 0x61, 0x62, 0x32], 0x2d, [0x77, 0x32, 0x77, 0x34], 0x2d, [0x7f, 0x67, 0x37, 0x77], 0x2d, [0x0, 0x38, 0x32, 0x33], 0x2d, [0x35, 0x37, 0x7f, 0x7b, 0x37, 0x39, 0x77, 0x33]}}}, {@dont_measure='dont_measure'}]}}) ioctl$VIDIOC_ENUMINPUT(r1, 0xc050561a, &(0x7f0000000300)={0x4, "443b36c4364670c73c2ad26e1952769039650793d10fc72d24ce46e327d06e2f", 0x3, 0x100, 0x4, 0x1057ff, 0x0, 0x6}) 06:23:04 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) getsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000400), &(0x7f0000000440)=0x8) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, &(0x7f00000019c0)={0x20}, 0x1) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r1, 0x111, 0x5, 0xc3, 0x4) r2 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x1, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r2, 0xc0045516, &(0x7f0000000040)=0x4) arch_prctl$ARCH_GET_CPUID(0x1011) getpgrp(0x0) flock(r0, 0x0) ioctl$BLKRRPART(0xffffffffffffffff, 0x125f, 0x0) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000200)={@mcast2}) fcntl$F_GET_FILE_RW_HINT(r0, 0x40d, &(0x7f00000000c0)) setsockopt$RDS_CONG_MONITOR(r2, 0x114, 0x6, &(0x7f0000000280), 0x4) ioctl$VHOST_SET_LOG_FD(r2, 0x4004af07, 0x0) ioctl$DRM_IOCTL_IRQ_BUSID(r2, 0xc0106403, &(0x7f0000000100)={0x8875, 0x800, 0x8000, 0xc2}) ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000180)) ioctl$VHOST_SET_VRING_CALL(0xffffffffffffffff, 0x4008af21, &(0x7f0000000380)={0x0, r1}) r3 = fcntl$dupfd(r1, 0x0, r2) setsockopt$IP_VS_SO_SET_STOPDAEMON(r3, 0x0, 0x48c, &(0x7f0000000140)={0x3, 'veth0\x00'}, 0x18) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.cpu/syz1\x00', 0x1ff) openat$snapshot(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/snapshot\x00', 0x0, 0x0) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x2012, r2, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000a40)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x20008000}, 0x24044000) unshare(0x40000000) mount$9p_virtio(&(0x7f00000003c0)='em0%$!,cgroup#\x00', &(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='9p\x00', 0x200000, &(0x7f0000000500)={'trans=virtio,', {[{@afid={'afid', 0x3d, 0x6}}, {@version_L='version=9p2000.L'}, {@cache_none='cache=none'}], [{@subj_role={'subj_role', 0x3d, '/dev/dsp#\x00'}}, {@permit_directio='permit_directio'}, {@measure='measure'}, {@context={'context', 0x3d, 'system_u'}}, {@obj_user={'obj_user'}}, {@dont_hash='dont_hash'}, {@subj_type={'subj_type', 0x3d, '\\eth0('}}, {@fsuuid={'fsuuid', 0x3d, {[0x36, 0x79, 0x0, 0x33, 0x61, 0x62, 0x32], 0x2d, [0x77, 0x32, 0x77, 0x34], 0x2d, [0x7f, 0x67, 0x37, 0x77], 0x2d, [0x0, 0x38, 0x32, 0x33], 0x2d, [0x35, 0x37, 0x7f, 0x7b, 0x37, 0x39, 0x77, 0x33]}}}, {@dont_measure='dont_measure'}]}}) ioctl$VIDIOC_ENUMINPUT(r1, 0xc050561a, &(0x7f0000000300)={0x4, "443b36c4364670c73c2ad26e1952769039650793d10fc72d24ce46e327d06e2f", 0x3, 0x100, 0x4, 0x1057ff, 0x0, 0x6}) [ 489.128573][T17520] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.5'. 06:23:04 executing program 3: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x101005, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, 0x0) pwritev(r0, &(0x7f00000000c0)=[{&(0x7f0000000180)="80fde56d4930", 0x6}], 0x1, 0x0) [ 489.322970][T17523] IPVS: ftp: loaded support on port[0] = 21 [ 489.375443][T17528] IPVS: ftp: loaded support on port[0] = 21 06:23:06 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = creat(&(0x7f0000000000)='./bus\x00', 0x0) getrlimit(0x0, &(0x7f00000000c0)) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0c0583b, &(0x7f0000000040)={0x0, 0xc4840000}) [ 490.684035][T17522] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.4'. 06:23:06 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) getsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000400), &(0x7f0000000440)=0x8) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, &(0x7f00000019c0)={0x20}, 0x1) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r1, 0x111, 0x5, 0xc3, 0x4) r2 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x1, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r2, 0xc0045516, &(0x7f0000000040)=0x4) arch_prctl$ARCH_GET_CPUID(0x1011) getpgrp(0x0) flock(r0, 0x0) ioctl$BLKRRPART(0xffffffffffffffff, 0x125f, 0x0) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000200)={@mcast2}) fcntl$F_GET_FILE_RW_HINT(r0, 0x40d, &(0x7f00000000c0)) setsockopt$RDS_CONG_MONITOR(r2, 0x114, 0x6, &(0x7f0000000280), 0x4) ioctl$VHOST_SET_LOG_FD(r2, 0x4004af07, 0x0) ioctl$DRM_IOCTL_IRQ_BUSID(r2, 0xc0106403, &(0x7f0000000100)={0x8875, 0x800, 0x8000, 0xc2}) ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000180)) ioctl$VHOST_SET_VRING_CALL(0xffffffffffffffff, 0x4008af21, &(0x7f0000000380)={0x0, r1}) r3 = fcntl$dupfd(r1, 0x0, r2) setsockopt$IP_VS_SO_SET_STOPDAEMON(r3, 0x0, 0x48c, &(0x7f0000000140)={0x3, 'veth0\x00'}, 0x18) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.cpu/syz1\x00', 0x1ff) openat$snapshot(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/snapshot\x00', 0x0, 0x0) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x2012, r2, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000a40)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x20008000}, 0x24044000) unshare(0x40000000) mount$9p_virtio(&(0x7f00000003c0)='em0%$!,cgroup#\x00', &(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='9p\x00', 0x200000, &(0x7f0000000500)={'trans=virtio,', {[{@afid={'afid', 0x3d, 0x6}}, {@version_L='version=9p2000.L'}, {@cache_none='cache=none'}], [{@subj_role={'subj_role', 0x3d, '/dev/dsp#\x00'}}, {@permit_directio='permit_directio'}, {@measure='measure'}, {@context={'context', 0x3d, 'system_u'}}, {@obj_user={'obj_user'}}, {@dont_hash='dont_hash'}, {@subj_type={'subj_type', 0x3d, '\\eth0('}}, {@fsuuid={'fsuuid', 0x3d, {[0x36, 0x79, 0x0, 0x33, 0x61, 0x62, 0x32], 0x2d, [0x77, 0x32, 0x77, 0x34], 0x2d, [0x7f, 0x67, 0x37, 0x77], 0x2d, [0x0, 0x38, 0x32, 0x33], 0x2d, [0x35, 0x37, 0x7f, 0x7b, 0x37, 0x39, 0x77, 0x33]}}}, {@dont_measure='dont_measure'}]}}) ioctl$VIDIOC_ENUMINPUT(r1, 0xc050561a, &(0x7f0000000300)={0x4, "443b36c4364670c73c2ad26e1952769039650793d10fc72d24ce46e327d06e2f", 0x3, 0x100, 0x4, 0x1057ff, 0x0, 0x6}) [ 490.734562][T17531] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.4'. 06:23:06 executing program 3: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x101005, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, 0x0) pwritev(r0, &(0x7f00000000c0)=[{&(0x7f0000000180)="80fde56d4930", 0x6}], 0x1, 0x0) [ 490.775173][T17533] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.5'. 06:23:06 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000040)="2e0000002500817ee45ae087185082cf0f24b0eba06ec47a002339e00586f9835b3f0016914879008cd90080e230", 0x2e}], 0x1}, 0x0) 06:23:06 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000040)="2e0000002500817ee45ae087685082cf0f24b0eba06ec400002339e00586f9835b3f0016914879008cd90080e230", 0x2e}], 0x1}, 0x0) 06:23:06 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) getsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000400), &(0x7f0000000440)=0x8) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, &(0x7f00000019c0)={0x20}, 0x1) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r1, 0x111, 0x5, 0xc3, 0x4) r2 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x1, 0x0) arch_prctl$ARCH_GET_CPUID(0x1011) getpgrp(0x0) flock(r0, 0x0) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000200)={@mcast2}) setsockopt$RDS_CONG_MONITOR(r2, 0x114, 0x6, &(0x7f0000000280), 0x4) ioctl$VHOST_SET_LOG_FD(r2, 0x4004af07, 0x0) ioctl$DRM_IOCTL_IRQ_BUSID(r2, 0xc0106403, &(0x7f0000000100)={0x8875, 0x800, 0x8000, 0xc2}) ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000180)) ioctl$VHOST_SET_VRING_CALL(0xffffffffffffffff, 0x4008af21, &(0x7f0000000380)={0x0, r1}) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x3, 'veth0\x00'}, 0x18) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.cpu/syz1\x00', 0x1ff) openat$snapshot(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/snapshot\x00', 0x0, 0x0) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0xf7fffffffffffffd, 0x2012, r2, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000a40)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x20008000}, 0x24044000) unshare(0x40000000) mount$9p_virtio(&(0x7f00000003c0)='em0%$!,cgroup#\x00', &(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='9p\x00', 0x200000, &(0x7f0000000500)={'trans=virtio,', {[{@afid={'afid', 0x3d, 0x6}}, {@version_L='version=9p2000.L'}, {@cache_none='cache=none'}], [{@subj_role={'subj_role', 0x3d, '/dev/dsp#\x00'}}, {@permit_directio='permit_directio'}, {@measure='measure'}, {@context={'context', 0x3d, 'system_u'}}, {@obj_user={'obj_user'}}, {@dont_hash='dont_hash'}, {@subj_type={'subj_type', 0x3d, '\\eth0('}}, {@fsuuid={'fsuuid', 0x3d, {[0x36, 0x79, 0x0, 0x33, 0x61, 0x62, 0x32], 0x2d, [0x77, 0x32, 0x77, 0x34], 0x2d, [0x7f, 0x67, 0x37, 0x77], 0x2d, [0x0, 0x38, 0x32, 0x33], 0x2d, [0x35, 0x37, 0x7f, 0x7b, 0x37, 0x39, 0x77, 0x33]}}}, {@dont_measure='dont_measure'}]}}) ioctl$VIDIOC_ENUMINPUT(r1, 0xc050561a, &(0x7f0000000300)={0x4, "443b36c4364670c73c2ad26e1952769039650793d10fc72d24ce46e327d06e2f", 0x3, 0x100, 0x4, 0x1057ff, 0x0, 0x6}) [ 490.985329][T17538] IPVS: ftp: loaded support on port[0] = 21 06:23:06 executing program 3: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x101005, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, 0x0) pwritev(r0, &(0x7f00000000c0)=[{&(0x7f0000000180)="80fde56d4930", 0x6}], 0x1, 0x0) 06:23:06 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000040)="2e0000002500817ee45ae087186882cf0f24b0eba06ec400002339e00586f9835b3f0016914879008cd90080e230", 0x2e}], 0x1}, 0x0) 06:23:06 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000040)="2e0000002500817ee45ae087185082cf0f24b0eba06ec4f0002339e00586f9835b3f0016914879008cd90080e230", 0x2e}], 0x1}, 0x0) 06:23:06 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = creat(&(0x7f0000000000)='./bus\x00', 0x0) getrlimit(0x0, &(0x7f00000000c0)) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0c0583b, &(0x7f0000000040)={0x0, 0xe9830200}) [ 491.351550][T17558] IPVS: ftp: loaded support on port[0] = 21 [ 491.833685][T17565] __nla_parse: 4 callbacks suppressed [ 491.833694][T17565] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.4'. 06:23:07 executing program 3: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x101005, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f000082ef0a)=""/246) pwritev(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f0000000180)="80fde56d4930", 0x6}], 0x1, 0x0) 06:23:07 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) getsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000400), &(0x7f0000000440)=0x8) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, &(0x7f00000019c0)={0x20}, 0x1) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r1, 0x111, 0x5, 0xc3, 0x4) r2 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x1, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r2, 0xc0045516, &(0x7f0000000040)=0x4) arch_prctl$ARCH_GET_CPUID(0x1011) getpgrp(0x0) flock(r0, 0x0) ioctl$BLKRRPART(0xffffffffffffffff, 0x125f, 0x0) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000200)={@mcast2}) fcntl$F_GET_FILE_RW_HINT(r0, 0x40d, &(0x7f00000000c0)) setsockopt$RDS_CONG_MONITOR(r2, 0x114, 0x6, &(0x7f0000000280), 0x4) ioctl$VHOST_SET_LOG_FD(r2, 0x4004af07, 0x0) ioctl$DRM_IOCTL_IRQ_BUSID(r2, 0xc0106403, &(0x7f0000000100)={0x8875, 0x800, 0x8000, 0xc2}) ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000180)) ioctl$VHOST_SET_VRING_CALL(0xffffffffffffffff, 0x4008af21, &(0x7f0000000380)={0x0, r1}) r3 = fcntl$dupfd(r1, 0x0, r2) setsockopt$IP_VS_SO_SET_STOPDAEMON(r3, 0x0, 0x48c, &(0x7f0000000140)={0x3, 'veth0\x00'}, 0x18) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.cpu/syz1\x00', 0x1ff) openat$snapshot(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/snapshot\x00', 0x0, 0x0) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x2012, r2, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000a40)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x20008000}, 0x24044000) unshare(0x40000000) mount$9p_virtio(&(0x7f00000003c0)='em0%$!,cgroup#\x00', &(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='9p\x00', 0x200000, &(0x7f0000000500)={'trans=virtio,', {[{@afid={'afid', 0x3d, 0x6}}, {@version_L='version=9p2000.L'}, {@cache_none='cache=none'}], [{@subj_role={'subj_role', 0x3d, '/dev/dsp#\x00'}}, {@permit_directio='permit_directio'}, {@measure='measure'}, {@context={'context', 0x3d, 'system_u'}}, {@obj_user={'obj_user'}}, {@dont_hash='dont_hash'}, {@subj_type={'subj_type', 0x3d, '\\eth0('}}, {@fsuuid={'fsuuid', 0x3d, {[0x36, 0x79, 0x0, 0x33, 0x61, 0x62, 0x32], 0x2d, [0x77, 0x32, 0x77, 0x34], 0x2d, [0x7f, 0x67, 0x37, 0x77], 0x2d, [0x0, 0x38, 0x32, 0x33], 0x2d, [0x35, 0x37, 0x7f, 0x7b, 0x37, 0x39, 0x77, 0x33]}}}, {@dont_measure='dont_measure'}]}}) ioctl$VIDIOC_ENUMINPUT(r1, 0xc050561a, &(0x7f0000000300)={0x4, "443b36c4364670c73c2ad26e1952769039650793d10fc72d24ce46e327d06e2f", 0x3, 0x100, 0x4, 0x1057ff, 0x0, 0x6}) [ 491.939016][T17571] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.5'. 06:23:07 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) getsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000400), &(0x7f0000000440)=0x8) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, &(0x7f00000019c0)={0x20}, 0x1) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r1, 0x111, 0x5, 0xc3, 0x4) r2 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x1, 0x0) arch_prctl$ARCH_GET_CPUID(0x1011) getpgrp(0x0) flock(r0, 0x0) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000200)={@mcast2}) setsockopt$RDS_CONG_MONITOR(r2, 0x114, 0x6, &(0x7f0000000280), 0x4) ioctl$VHOST_SET_LOG_FD(r2, 0x4004af07, 0x0) ioctl$DRM_IOCTL_IRQ_BUSID(r2, 0xc0106403, &(0x7f0000000100)={0x8875, 0x800, 0x8000, 0xc2}) ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000180)) ioctl$VHOST_SET_VRING_CALL(0xffffffffffffffff, 0x4008af21, &(0x7f0000000380)={0x0, r1}) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x3, 'veth0\x00'}, 0x18) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.cpu/syz1\x00', 0x1ff) openat$snapshot(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/snapshot\x00', 0x0, 0x0) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0xf7fffffffffffffd, 0x2012, r2, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000a40)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x20008000}, 0x24044000) unshare(0x40000000) mount$9p_virtio(&(0x7f00000003c0)='em0%$!,cgroup#\x00', &(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='9p\x00', 0x200000, &(0x7f0000000500)={'trans=virtio,', {[{@afid={'afid', 0x3d, 0x6}}, {@version_L='version=9p2000.L'}, {@cache_none='cache=none'}], [{@subj_role={'subj_role', 0x3d, '/dev/dsp#\x00'}}, {@permit_directio='permit_directio'}, {@measure='measure'}, {@context={'context', 0x3d, 'system_u'}}, {@obj_user={'obj_user'}}, {@dont_hash='dont_hash'}, {@subj_type={'subj_type', 0x3d, '\\eth0('}}, {@fsuuid={'fsuuid', 0x3d, {[0x36, 0x79, 0x0, 0x33, 0x61, 0x62, 0x32], 0x2d, [0x77, 0x32, 0x77, 0x34], 0x2d, [0x7f, 0x67, 0x37, 0x77], 0x2d, [0x0, 0x38, 0x32, 0x33], 0x2d, [0x35, 0x37, 0x7f, 0x7b, 0x37, 0x39, 0x77, 0x33]}}}, {@dont_measure='dont_measure'}]}}) ioctl$VIDIOC_ENUMINPUT(r1, 0xc050561a, &(0x7f0000000300)={0x4, "443b36c4364670c73c2ad26e1952769039650793d10fc72d24ce46e327d06e2f", 0x3, 0x100, 0x4, 0x1057ff, 0x0, 0x6}) 06:23:07 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = creat(&(0x7f0000000000)='./bus\x00', 0x0) getrlimit(0x0, &(0x7f00000000c0)) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0c0583b, &(0x7f0000000040)={0x0, 0xfdfdffff}) [ 491.995213][T17572] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.4'. [ 492.033424][T17571] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.5'. 06:23:07 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000040)="2e0000002500817ee45ae087185082cf0f24b0eba06ec439012339e00586f9835b3f0016914879008cd90080e230", 0x2e}], 0x1}, 0x0) [ 492.290920][T17579] IPVS: ftp: loaded support on port[0] = 21 [ 492.291434][T17578] IPVS: ftp: loaded support on port[0] = 21 06:23:09 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000040)="2e0000002500817ee45ae087185082cf0224b0eba06ec400002339e00586f9835b3f0016914879008cd90080e230", 0x2e}], 0x1}, 0x0) 06:23:09 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) getsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000400), &(0x7f0000000440)=0x8) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, &(0x7f00000019c0)={0x20}, 0x1) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r1, 0x111, 0x5, 0xc3, 0x4) r2 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x1, 0x0) arch_prctl$ARCH_GET_CPUID(0x1011) getpgrp(0x0) flock(r0, 0x0) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000200)={@mcast2}) setsockopt$RDS_CONG_MONITOR(r2, 0x114, 0x6, &(0x7f0000000280), 0x4) ioctl$VHOST_SET_LOG_FD(r2, 0x4004af07, 0x0) ioctl$DRM_IOCTL_IRQ_BUSID(r2, 0xc0106403, &(0x7f0000000100)={0x8875, 0x800, 0x8000, 0xc2}) ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000180)) ioctl$VHOST_SET_VRING_CALL(0xffffffffffffffff, 0x4008af21, &(0x7f0000000380)={0x0, r1}) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x3, 'veth0\x00'}, 0x18) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.cpu/syz1\x00', 0x1ff) openat$snapshot(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/snapshot\x00', 0x0, 0x0) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0xf7fffffffffffffd, 0x2012, r2, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000a40)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x20008000}, 0x24044000) unshare(0x40000000) mount$9p_virtio(&(0x7f00000003c0)='em0%$!,cgroup#\x00', &(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='9p\x00', 0x200000, &(0x7f0000000500)={'trans=virtio,', {[{@afid={'afid', 0x3d, 0x6}}, {@version_L='version=9p2000.L'}, {@cache_none='cache=none'}], [{@subj_role={'subj_role', 0x3d, '/dev/dsp#\x00'}}, {@permit_directio='permit_directio'}, {@measure='measure'}, {@context={'context', 0x3d, 'system_u'}}, {@obj_user={'obj_user'}}, {@dont_hash='dont_hash'}, {@subj_type={'subj_type', 0x3d, '\\eth0('}}, {@fsuuid={'fsuuid', 0x3d, {[0x36, 0x79, 0x0, 0x33, 0x61, 0x62, 0x32], 0x2d, [0x77, 0x32, 0x77, 0x34], 0x2d, [0x7f, 0x67, 0x37, 0x77], 0x2d, [0x0, 0x38, 0x32, 0x33], 0x2d, [0x35, 0x37, 0x7f, 0x7b, 0x37, 0x39, 0x77, 0x33]}}}, {@dont_measure='dont_measure'}]}}) ioctl$VIDIOC_ENUMINPUT(r1, 0xc050561a, &(0x7f0000000300)={0x4, "443b36c4364670c73c2ad26e1952769039650793d10fc72d24ce46e327d06e2f", 0x3, 0x100, 0x4, 0x1057ff, 0x0, 0x6}) 06:23:09 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) getsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000400), &(0x7f0000000440)=0x8) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, &(0x7f00000019c0)={0x20}, 0x1) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r1, 0x111, 0x5, 0xc3, 0x4) r2 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x1, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r2, 0xc0045516, &(0x7f0000000040)=0x4) arch_prctl$ARCH_GET_CPUID(0x1011) getpgrp(0x0) flock(r0, 0x0) ioctl$BLKRRPART(0xffffffffffffffff, 0x125f, 0x0) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000200)={@mcast2}) fcntl$F_GET_FILE_RW_HINT(r0, 0x40d, &(0x7f00000000c0)) setsockopt$RDS_CONG_MONITOR(r2, 0x114, 0x6, &(0x7f0000000280), 0x4) ioctl$VHOST_SET_LOG_FD(r2, 0x4004af07, 0x0) ioctl$DRM_IOCTL_IRQ_BUSID(r2, 0xc0106403, &(0x7f0000000100)={0x8875, 0x800, 0x8000, 0xc2}) ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000180)) ioctl$VHOST_SET_VRING_CALL(0xffffffffffffffff, 0x4008af21, &(0x7f0000000380)={0x0, r1}) r3 = fcntl$dupfd(r1, 0x0, r2) setsockopt$IP_VS_SO_SET_STOPDAEMON(r3, 0x0, 0x48c, &(0x7f0000000140)={0x3, 'veth0\x00'}, 0x18) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.cpu/syz1\x00', 0x1ff) openat$snapshot(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/snapshot\x00', 0x0, 0x0) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0xf7fffffffffffffd, 0x10, r2, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000a40)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x20008000}, 0x24044000) unshare(0x40000000) mount$9p_virtio(&(0x7f00000003c0)='em0%$!,cgroup#\x00', &(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='9p\x00', 0x200000, &(0x7f0000000500)={'trans=virtio,', {[{@afid={'afid', 0x3d, 0x6}}, {@version_L='version=9p2000.L'}, {@cache_none='cache=none'}], [{@subj_role={'subj_role', 0x3d, '/dev/dsp#\x00'}}, {@permit_directio='permit_directio'}, {@measure='measure'}, {@context={'context', 0x3d, 'system_u'}}, {@obj_user={'obj_user'}}, {@dont_hash='dont_hash'}, {@subj_type={'subj_type', 0x3d, '\\eth0('}}, {@fsuuid={'fsuuid', 0x3d, {[0x36, 0x79, 0x0, 0x33, 0x61, 0x62, 0x32], 0x2d, [0x77, 0x32, 0x77, 0x34], 0x2d, [0x7f, 0x67, 0x37, 0x77], 0x2d, [0x0, 0x38, 0x32, 0x33], 0x2d, [0x35, 0x37, 0x7f, 0x7b, 0x37, 0x39, 0x77, 0x33]}}}, {@dont_measure='dont_measure'}]}}) ioctl$VIDIOC_ENUMINPUT(r1, 0xc050561a, &(0x7f0000000300)={0x4, "443b36c4364670c73c2ad26e1952769039650793d10fc72d24ce46e327d06e2f", 0x3, 0x100, 0x4, 0x1057ff, 0x0, 0x6}) [ 493.537783][T17587] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.5'. [ 493.571041][T17592] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.4'. 06:23:09 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = creat(&(0x7f0000000000)='./bus\x00', 0x0) getrlimit(0x0, &(0x7f00000000c0)) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0c0583b, &(0x7f0000000040)={0x0, 0xff7f0000}) 06:23:09 executing program 3: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x101005, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f000082ef0a)=""/246) pwritev(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f0000000180)="80fde56d4930", 0x6}], 0x1, 0x0) [ 493.610981][T17593] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.5'. [ 493.664034][T17596] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.4'. [ 493.872502][T17602] IPVS: ftp: loaded support on port[0] = 21 [ 493.880769][T17597] IPVS: ftp: loaded support on port[0] = 21 06:23:10 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000040)="2e0000002500817ee45ae087185082cf0f24b0eba06ec400032339e00586f9835b3f0016914879008cd90080e230", 0x2e}], 0x1}, 0x0) 06:23:10 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000040)="2e0000002500817ee45ae087185082cf0324b0eba06ec400002339e00586f9835b3f0016914879008cd90080e230", 0x2e}], 0x1}, 0x0) 06:23:10 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = creat(&(0x7f0000000000)='./bus\x00', 0x0) getrlimit(0x0, &(0x7f00000000c0)) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0c0583b, &(0x7f0000000040)={0x0, 0xfffe0700}) 06:23:10 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) getsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000400), &(0x7f0000000440)=0x8) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, &(0x7f00000019c0)={0x20}, 0x1) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r1, 0x111, 0x5, 0xc3, 0x4) r2 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x1, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r2, 0xc0045516, &(0x7f0000000040)=0x4) arch_prctl$ARCH_GET_CPUID(0x1011) getpgrp(0x0) flock(r0, 0x0) ioctl$BLKRRPART(0xffffffffffffffff, 0x125f, 0x0) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000200)={@mcast2}) fcntl$F_GET_FILE_RW_HINT(r0, 0x40d, &(0x7f00000000c0)) setsockopt$RDS_CONG_MONITOR(r2, 0x114, 0x6, &(0x7f0000000280), 0x4) ioctl$VHOST_SET_LOG_FD(r2, 0x4004af07, 0x0) ioctl$DRM_IOCTL_IRQ_BUSID(r2, 0xc0106403, &(0x7f0000000100)={0x8875, 0x800, 0x8000, 0xc2}) ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000180)) ioctl$VHOST_SET_VRING_CALL(0xffffffffffffffff, 0x4008af21, &(0x7f0000000380)={0x0, r1}) r3 = fcntl$dupfd(r1, 0x0, r2) setsockopt$IP_VS_SO_SET_STOPDAEMON(r3, 0x0, 0x48c, &(0x7f0000000140)={0x3, 'veth0\x00'}, 0x18) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.cpu/syz1\x00', 0x1ff) openat$snapshot(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/snapshot\x00', 0x0, 0x0) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0xf7fffffffffffffd, 0x10, r2, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000a40)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x20008000}, 0x24044000) unshare(0x40000000) mount$9p_virtio(&(0x7f00000003c0)='em0%$!,cgroup#\x00', &(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='9p\x00', 0x200000, &(0x7f0000000500)={'trans=virtio,', {[{@afid={'afid', 0x3d, 0x6}}, {@version_L='version=9p2000.L'}, {@cache_none='cache=none'}], [{@subj_role={'subj_role', 0x3d, '/dev/dsp#\x00'}}, {@permit_directio='permit_directio'}, {@measure='measure'}, {@context={'context', 0x3d, 'system_u'}}, {@obj_user={'obj_user'}}, {@dont_hash='dont_hash'}, {@subj_type={'subj_type', 0x3d, '\\eth0('}}, {@fsuuid={'fsuuid', 0x3d, {[0x36, 0x79, 0x0, 0x33, 0x61, 0x62, 0x32], 0x2d, [0x77, 0x32, 0x77, 0x34], 0x2d, [0x7f, 0x67, 0x37, 0x77], 0x2d, [0x0, 0x38, 0x32, 0x33], 0x2d, [0x35, 0x37, 0x7f, 0x7b, 0x37, 0x39, 0x77, 0x33]}}}, {@dont_measure='dont_measure'}]}}) ioctl$VIDIOC_ENUMINPUT(r1, 0xc050561a, &(0x7f0000000300)={0x4, "443b36c4364670c73c2ad26e1952769039650793d10fc72d24ce46e327d06e2f", 0x3, 0x100, 0x4, 0x1057ff, 0x0, 0x6}) 06:23:10 executing program 3: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x101005, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f000082ef0a)=""/246) pwritev(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f0000000180)="80fde56d4930", 0x6}], 0x1, 0x0) 06:23:10 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) getsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000400), &(0x7f0000000440)=0x8) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, &(0x7f00000019c0)={0x20}, 0x1) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r1, 0x111, 0x5, 0xc3, 0x4) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(0xffffffffffffffff, 0xc0045516, &(0x7f0000000040)=0x4) arch_prctl$ARCH_GET_CPUID(0x1011) getpgrp(0x0) flock(r0, 0x0) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000200)={@mcast2}) setsockopt$RDS_CONG_MONITOR(0xffffffffffffffff, 0x114, 0x6, &(0x7f0000000280), 0x4) ioctl$VHOST_SET_LOG_FD(0xffffffffffffffff, 0x4004af07, 0x0) ioctl$DRM_IOCTL_IRQ_BUSID(0xffffffffffffffff, 0xc0106403, &(0x7f0000000100)={0x8875, 0x800, 0x8000, 0xc2}) ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000180)) ioctl$VHOST_SET_VRING_CALL(0xffffffffffffffff, 0x4008af21, &(0x7f0000000380)={0x0, r1}) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x3, 'veth0\x00'}, 0x18) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.cpu/syz1\x00', 0x1ff) openat$snapshot(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/snapshot\x00', 0x0, 0x0) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0xf7fffffffffffffd, 0x2012, 0xffffffffffffffff, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000a40)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x20008000}, 0x24044000) unshare(0x40000000) mount$9p_virtio(&(0x7f00000003c0)='em0%$!,cgroup#\x00', &(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='9p\x00', 0x200000, &(0x7f0000000500)={'trans=virtio,', {[{@afid={'afid', 0x3d, 0x6}}, {@version_L='version=9p2000.L'}, {@cache_none='cache=none'}], [{@subj_role={'subj_role', 0x3d, '/dev/dsp#\x00'}}, {@permit_directio='permit_directio'}, {@measure='measure'}, {@context={'context', 0x3d, 'system_u'}}, {@obj_user={'obj_user'}}, {@dont_hash='dont_hash'}, {@subj_type={'subj_type', 0x3d, '\\eth0('}}, {@fsuuid={'fsuuid', 0x3d, {[0x36, 0x79, 0x0, 0x33, 0x61, 0x62, 0x32], 0x2d, [0x77, 0x32, 0x77, 0x34], 0x2d, [0x7f, 0x67, 0x37, 0x77], 0x2d, [0x0, 0x38, 0x32, 0x33], 0x2d, [0x35, 0x37, 0x7f, 0x7b, 0x37, 0x39, 0x77, 0x33]}}}, {@dont_measure='dont_measure'}]}}) ioctl$VIDIOC_ENUMINPUT(r1, 0xc050561a, &(0x7f0000000300)={0x4, "443b36c4364670c73c2ad26e1952769039650793d10fc72d24ce46e327d06e2f", 0x3, 0x100, 0x4, 0x1057ff, 0x0, 0x6}) [ 495.295599][T17621] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.5'. [ 495.344330][T17618] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.4'. [ 495.554886][T17628] IPVS: ftp: loaded support on port[0] = 21 [ 495.560899][T17625] IPVS: ftp: loaded support on port[0] = 21 06:23:11 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = creat(&(0x7f0000000000)='./bus\x00', 0x0) getrlimit(0x0, &(0x7f00000000c0)) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0c0583b, &(0x7f0000000040)={0x0, 0xfffffdfd}) 06:23:12 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000040)="2e0000002500817ee45ae087185082cf0424b0eba06ec400002339e00586f9835b3f0016914879008cd90080e230", 0x2e}], 0x1}, 0x0) 06:23:12 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) getsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000400), &(0x7f0000000440)=0x8) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, &(0x7f00000019c0)={0x20}, 0x1) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r1, 0x111, 0x5, 0xc3, 0x4) r2 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x1, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r2, 0xc0045516, &(0x7f0000000040)=0x4) arch_prctl$ARCH_GET_CPUID(0x1011) getpgrp(0x0) flock(r0, 0x0) ioctl$BLKRRPART(0xffffffffffffffff, 0x125f, 0x0) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000200)={@mcast2}) fcntl$F_GET_FILE_RW_HINT(r0, 0x40d, &(0x7f00000000c0)) setsockopt$RDS_CONG_MONITOR(r2, 0x114, 0x6, &(0x7f0000000280), 0x4) ioctl$VHOST_SET_LOG_FD(r2, 0x4004af07, 0x0) ioctl$DRM_IOCTL_IRQ_BUSID(r2, 0xc0106403, &(0x7f0000000100)={0x8875, 0x800, 0x8000, 0xc2}) ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000180)) ioctl$VHOST_SET_VRING_CALL(0xffffffffffffffff, 0x4008af21, &(0x7f0000000380)={0x0, r1}) r3 = fcntl$dupfd(r1, 0x0, r2) setsockopt$IP_VS_SO_SET_STOPDAEMON(r3, 0x0, 0x48c, &(0x7f0000000140)={0x3, 'veth0\x00'}, 0x18) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.cpu/syz1\x00', 0x1ff) openat$snapshot(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/snapshot\x00', 0x0, 0x0) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0xf7fffffffffffffd, 0x10, r2, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000a40)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x20008000}, 0x24044000) unshare(0x40000000) mount$9p_virtio(&(0x7f00000003c0)='em0%$!,cgroup#\x00', &(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='9p\x00', 0x200000, &(0x7f0000000500)={'trans=virtio,', {[{@afid={'afid', 0x3d, 0x6}}, {@version_L='version=9p2000.L'}, {@cache_none='cache=none'}], [{@subj_role={'subj_role', 0x3d, '/dev/dsp#\x00'}}, {@permit_directio='permit_directio'}, {@measure='measure'}, {@context={'context', 0x3d, 'system_u'}}, {@obj_user={'obj_user'}}, {@dont_hash='dont_hash'}, {@subj_type={'subj_type', 0x3d, '\\eth0('}}, {@fsuuid={'fsuuid', 0x3d, {[0x36, 0x79, 0x0, 0x33, 0x61, 0x62, 0x32], 0x2d, [0x77, 0x32, 0x77, 0x34], 0x2d, [0x7f, 0x67, 0x37, 0x77], 0x2d, [0x0, 0x38, 0x32, 0x33], 0x2d, [0x35, 0x37, 0x7f, 0x7b, 0x37, 0x39, 0x77, 0x33]}}}, {@dont_measure='dont_measure'}]}}) ioctl$VIDIOC_ENUMINPUT(r1, 0xc050561a, &(0x7f0000000300)={0x4, "443b36c4364670c73c2ad26e1952769039650793d10fc72d24ce46e327d06e2f", 0x3, 0x100, 0x4, 0x1057ff, 0x0, 0x6}) 06:23:12 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000040)="2e0000002500817ee45ae087185082cf0f24b0eba06ec400052339e00586f9835b3f0016914879008cd90080e230", 0x2e}], 0x1}, 0x0) 06:23:12 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) getsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000400), &(0x7f0000000440)=0x8) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, &(0x7f00000019c0)={0x20}, 0x1) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r1, 0x111, 0x5, 0xc3, 0x4) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(0xffffffffffffffff, 0xc0045516, &(0x7f0000000040)=0x4) arch_prctl$ARCH_GET_CPUID(0x1011) getpgrp(0x0) flock(r0, 0x0) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000200)={@mcast2}) setsockopt$RDS_CONG_MONITOR(0xffffffffffffffff, 0x114, 0x6, &(0x7f0000000280), 0x4) ioctl$VHOST_SET_LOG_FD(0xffffffffffffffff, 0x4004af07, 0x0) ioctl$DRM_IOCTL_IRQ_BUSID(0xffffffffffffffff, 0xc0106403, &(0x7f0000000100)={0x8875, 0x800, 0x8000, 0xc2}) ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000180)) ioctl$VHOST_SET_VRING_CALL(0xffffffffffffffff, 0x4008af21, &(0x7f0000000380)={0x0, r1}) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x3, 'veth0\x00'}, 0x18) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.cpu/syz1\x00', 0x1ff) openat$snapshot(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/snapshot\x00', 0x0, 0x0) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0xf7fffffffffffffd, 0x2012, 0xffffffffffffffff, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000a40)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x20008000}, 0x24044000) unshare(0x40000000) mount$9p_virtio(&(0x7f00000003c0)='em0%$!,cgroup#\x00', &(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='9p\x00', 0x200000, &(0x7f0000000500)={'trans=virtio,', {[{@afid={'afid', 0x3d, 0x6}}, {@version_L='version=9p2000.L'}, {@cache_none='cache=none'}], [{@subj_role={'subj_role', 0x3d, '/dev/dsp#\x00'}}, {@permit_directio='permit_directio'}, {@measure='measure'}, {@context={'context', 0x3d, 'system_u'}}, {@obj_user={'obj_user'}}, {@dont_hash='dont_hash'}, {@subj_type={'subj_type', 0x3d, '\\eth0('}}, {@fsuuid={'fsuuid', 0x3d, {[0x36, 0x79, 0x0, 0x33, 0x61, 0x62, 0x32], 0x2d, [0x77, 0x32, 0x77, 0x34], 0x2d, [0x7f, 0x67, 0x37, 0x77], 0x2d, [0x0, 0x38, 0x32, 0x33], 0x2d, [0x35, 0x37, 0x7f, 0x7b, 0x37, 0x39, 0x77, 0x33]}}}, {@dont_measure='dont_measure'}]}}) ioctl$VIDIOC_ENUMINPUT(r1, 0xc050561a, &(0x7f0000000300)={0x4, "443b36c4364670c73c2ad26e1952769039650793d10fc72d24ce46e327d06e2f", 0x3, 0x100, 0x4, 0x1057ff, 0x0, 0x6}) 06:23:12 executing program 3: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x101005, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f000082ef0a)=""/246) pwritev(r0, 0x0, 0x0, 0x0) 06:23:12 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000040)="2e0000002500817ee45ae087185082cf0524b0eba06ec400002339e00586f9835b3f0016914879008cd90080e230", 0x2e}], 0x1}, 0x0) 06:23:12 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = creat(&(0x7f0000000000)='./bus\x00', 0x0) getrlimit(0x0, &(0x7f00000000c0)) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x66020000000000}) [ 496.902197][T17644] __nla_parse: 4 callbacks suppressed [ 496.902206][T17644] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.5'. [ 496.964254][T17641] IPVS: ftp: loaded support on port[0] = 21 [ 497.173166][T17652] IPVS: ftp: loaded support on port[0] = 21 06:23:13 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000040)="2e0000002500817ee45ae087185082cf0f24b0eba06ec400062339e00586f9835b3f0016914879008cd90080e230", 0x2e}], 0x1}, 0x0) [ 497.672583][T17655] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.5'. [ 497.733069][T17658] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.4'. [ 497.799335][T17662] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.4'. [ 497.856040][T17664] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.5'. 06:23:13 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) getsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000400), &(0x7f0000000440)=0x8) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, &(0x7f00000019c0)={0x20}, 0x1) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r1, 0x111, 0x5, 0xc3, 0x4) r2 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x1, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r2, 0xc0045516, &(0x7f0000000040)=0x4) arch_prctl$ARCH_GET_CPUID(0x1011) getpgrp(0x0) flock(r0, 0x0) ioctl$BLKRRPART(0xffffffffffffffff, 0x125f, 0x0) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000200)={@mcast2}) fcntl$F_GET_FILE_RW_HINT(r0, 0x40d, &(0x7f00000000c0)) setsockopt$RDS_CONG_MONITOR(r2, 0x114, 0x6, &(0x7f0000000280), 0x4) ioctl$VHOST_SET_LOG_FD(r2, 0x4004af07, 0x0) ioctl$DRM_IOCTL_IRQ_BUSID(r2, 0xc0106403, &(0x7f0000000100)={0x8875, 0x800, 0x8000, 0xc2}) ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000180)) ioctl$VHOST_SET_VRING_CALL(0xffffffffffffffff, 0x4008af21, &(0x7f0000000380)={0x0, r1}) r3 = fcntl$dupfd(r1, 0x0, r2) setsockopt$IP_VS_SO_SET_STOPDAEMON(r3, 0x0, 0x48c, &(0x7f0000000140)={0x3, 'veth0\x00'}, 0x18) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.cpu/syz1\x00', 0x1ff) openat$snapshot(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/snapshot\x00', 0x0, 0x0) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0xf7fffffffffffffd, 0x2012, 0xffffffffffffffff, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000a40)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x20008000}, 0x24044000) unshare(0x40000000) mount$9p_virtio(&(0x7f00000003c0)='em0%$!,cgroup#\x00', &(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='9p\x00', 0x200000, &(0x7f0000000500)={'trans=virtio,', {[{@afid={'afid', 0x3d, 0x6}}, {@version_L='version=9p2000.L'}, {@cache_none='cache=none'}], [{@subj_role={'subj_role', 0x3d, '/dev/dsp#\x00'}}, {@permit_directio='permit_directio'}, {@measure='measure'}, {@context={'context', 0x3d, 'system_u'}}, {@obj_user={'obj_user'}}, {@dont_hash='dont_hash'}, {@subj_type={'subj_type', 0x3d, '\\eth0('}}, {@fsuuid={'fsuuid', 0x3d, {[0x36, 0x79, 0x0, 0x33, 0x61, 0x62, 0x32], 0x2d, [0x77, 0x32, 0x77, 0x34], 0x2d, [0x7f, 0x67, 0x37, 0x77], 0x2d, [0x0, 0x38, 0x32, 0x33], 0x2d, [0x35, 0x37, 0x7f, 0x7b, 0x37, 0x39, 0x77, 0x33]}}}, {@dont_measure='dont_measure'}]}}) ioctl$VIDIOC_ENUMINPUT(r1, 0xc050561a, &(0x7f0000000300)={0x4, "443b36c4364670c73c2ad26e1952769039650793d10fc72d24ce46e327d06e2f", 0x3, 0x100, 0x4, 0x1057ff, 0x0, 0x6}) 06:23:13 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = creat(&(0x7f0000000000)='./bus\x00', 0x0) getrlimit(0x0, &(0x7f00000000c0)) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x80000000000000}) 06:23:13 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) getsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000400), &(0x7f0000000440)=0x8) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, &(0x7f00000019c0)={0x20}, 0x1) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r1, 0x111, 0x5, 0xc3, 0x4) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(0xffffffffffffffff, 0xc0045516, &(0x7f0000000040)=0x4) arch_prctl$ARCH_GET_CPUID(0x1011) getpgrp(0x0) flock(r0, 0x0) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000200)={@mcast2}) setsockopt$RDS_CONG_MONITOR(0xffffffffffffffff, 0x114, 0x6, &(0x7f0000000280), 0x4) ioctl$VHOST_SET_LOG_FD(0xffffffffffffffff, 0x4004af07, 0x0) ioctl$DRM_IOCTL_IRQ_BUSID(0xffffffffffffffff, 0xc0106403, &(0x7f0000000100)={0x8875, 0x800, 0x8000, 0xc2}) ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000180)) ioctl$VHOST_SET_VRING_CALL(0xffffffffffffffff, 0x4008af21, &(0x7f0000000380)={0x0, r1}) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x3, 'veth0\x00'}, 0x18) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.cpu/syz1\x00', 0x1ff) openat$snapshot(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/snapshot\x00', 0x0, 0x0) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0xf7fffffffffffffd, 0x2012, 0xffffffffffffffff, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000a40)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x20008000}, 0x24044000) unshare(0x40000000) mount$9p_virtio(&(0x7f00000003c0)='em0%$!,cgroup#\x00', &(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='9p\x00', 0x200000, &(0x7f0000000500)={'trans=virtio,', {[{@afid={'afid', 0x3d, 0x6}}, {@version_L='version=9p2000.L'}, {@cache_none='cache=none'}], [{@subj_role={'subj_role', 0x3d, '/dev/dsp#\x00'}}, {@permit_directio='permit_directio'}, {@measure='measure'}, {@context={'context', 0x3d, 'system_u'}}, {@obj_user={'obj_user'}}, {@dont_hash='dont_hash'}, {@subj_type={'subj_type', 0x3d, '\\eth0('}}, {@fsuuid={'fsuuid', 0x3d, {[0x36, 0x79, 0x0, 0x33, 0x61, 0x62, 0x32], 0x2d, [0x77, 0x32, 0x77, 0x34], 0x2d, [0x7f, 0x67, 0x37, 0x77], 0x2d, [0x0, 0x38, 0x32, 0x33], 0x2d, [0x35, 0x37, 0x7f, 0x7b, 0x37, 0x39, 0x77, 0x33]}}}, {@dont_measure='dont_measure'}]}}) ioctl$VIDIOC_ENUMINPUT(r1, 0xc050561a, &(0x7f0000000300)={0x4, "443b36c4364670c73c2ad26e1952769039650793d10fc72d24ce46e327d06e2f", 0x3, 0x100, 0x4, 0x1057ff, 0x0, 0x6}) [ 497.909624][T17666] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.5'. 06:23:13 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000040)="2e0000002500817ee45ae087185082cf0624b0eba06ec400002339e00586f9835b3f0016914879008cd90080e230", 0x2e}], 0x1}, 0x0) [ 498.099442][T17668] IPVS: ftp: loaded support on port[0] = 21 [ 498.325686][T17677] IPVS: ftp: loaded support on port[0] = 21 06:23:13 executing program 3: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x101005, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f000082ef0a)=""/246) pwritev(r0, 0x0, 0x0, 0x0) [ 499.187018][T17679] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.4'. 06:23:14 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) getsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000400), &(0x7f0000000440)=0x8) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, &(0x7f00000019c0)={0x20}, 0x1) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r1, 0x111, 0x5, 0xc3, 0x4) r2 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x1, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r2, 0xc0045516, &(0x7f0000000040)=0x4) arch_prctl$ARCH_GET_CPUID(0x1011) getpgrp(0x0) flock(r0, 0x0) ioctl$BLKRRPART(0xffffffffffffffff, 0x125f, 0x0) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000200)={@mcast2}) fcntl$F_GET_FILE_RW_HINT(r0, 0x40d, &(0x7f00000000c0)) setsockopt$RDS_CONG_MONITOR(r2, 0x114, 0x6, &(0x7f0000000280), 0x4) ioctl$VHOST_SET_LOG_FD(r2, 0x4004af07, 0x0) ioctl$DRM_IOCTL_IRQ_BUSID(r2, 0xc0106403, &(0x7f0000000100)={0x8875, 0x800, 0x8000, 0xc2}) ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000180)) ioctl$VHOST_SET_VRING_CALL(0xffffffffffffffff, 0x4008af21, &(0x7f0000000380)={0x0, r1}) r3 = fcntl$dupfd(r1, 0x0, r2) setsockopt$IP_VS_SO_SET_STOPDAEMON(r3, 0x0, 0x48c, &(0x7f0000000140)={0x3, 'veth0\x00'}, 0x18) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.cpu/syz1\x00', 0x1ff) openat$snapshot(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/snapshot\x00', 0x0, 0x0) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0xf7fffffffffffffd, 0x2012, 0xffffffffffffffff, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000a40)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x20008000}, 0x24044000) unshare(0x40000000) mount$9p_virtio(&(0x7f00000003c0)='em0%$!,cgroup#\x00', &(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='9p\x00', 0x200000, &(0x7f0000000500)={'trans=virtio,', {[{@afid={'afid', 0x3d, 0x6}}, {@version_L='version=9p2000.L'}, {@cache_none='cache=none'}], [{@subj_role={'subj_role', 0x3d, '/dev/dsp#\x00'}}, {@permit_directio='permit_directio'}, {@measure='measure'}, {@context={'context', 0x3d, 'system_u'}}, {@obj_user={'obj_user'}}, {@dont_hash='dont_hash'}, {@subj_type={'subj_type', 0x3d, '\\eth0('}}, {@fsuuid={'fsuuid', 0x3d, {[0x36, 0x79, 0x0, 0x33, 0x61, 0x62, 0x32], 0x2d, [0x77, 0x32, 0x77, 0x34], 0x2d, [0x7f, 0x67, 0x37, 0x77], 0x2d, [0x0, 0x38, 0x32, 0x33], 0x2d, [0x35, 0x37, 0x7f, 0x7b, 0x37, 0x39, 0x77, 0x33]}}}, {@dont_measure='dont_measure'}]}}) ioctl$VIDIOC_ENUMINPUT(r1, 0xc050561a, &(0x7f0000000300)={0x4, "443b36c4364670c73c2ad26e1952769039650793d10fc72d24ce46e327d06e2f", 0x3, 0x100, 0x4, 0x1057ff, 0x0, 0x6}) 06:23:14 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000040)="2e0000002500817ee45ae087185082cf0f24b0eba06ec400072339e00586f9835b3f0016914879008cd90080e230", 0x2e}], 0x1}, 0x0) [ 499.288569][T17679] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.4'. 06:23:15 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) getsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000400), &(0x7f0000000440)=0x8) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, &(0x7f00000019c0)={0x20}, 0x1) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) r2 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x1, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r2, 0xc0045516, &(0x7f0000000040)=0x4) arch_prctl$ARCH_GET_CPUID(0x1011) getpgrp(0x0) flock(r0, 0x0) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000200)={@mcast2}) setsockopt$RDS_CONG_MONITOR(r2, 0x114, 0x6, &(0x7f0000000280), 0x4) ioctl$VHOST_SET_LOG_FD(r2, 0x4004af07, 0x0) ioctl$DRM_IOCTL_IRQ_BUSID(r2, 0xc0106403, &(0x7f0000000100)={0x8875, 0x800, 0x8000, 0xc2}) ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000180)) ioctl$VHOST_SET_VRING_CALL(0xffffffffffffffff, 0x4008af21, &(0x7f0000000380)={0x0, r1}) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x3, 'veth0\x00'}, 0x18) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.cpu/syz1\x00', 0x1ff) openat$snapshot(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/snapshot\x00', 0x0, 0x0) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0xf7fffffffffffffd, 0x2012, r2, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000a40)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x20008000}, 0x24044000) unshare(0x40000000) mount$9p_virtio(&(0x7f00000003c0)='em0%$!,cgroup#\x00', &(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='9p\x00', 0x200000, &(0x7f0000000500)={'trans=virtio,', {[{@afid={'afid', 0x3d, 0x6}}, {@version_L='version=9p2000.L'}, {@cache_none='cache=none'}], [{@subj_role={'subj_role', 0x3d, '/dev/dsp#\x00'}}, {@permit_directio='permit_directio'}, {@measure='measure'}, {@context={'context', 0x3d, 'system_u'}}, {@obj_user={'obj_user'}}, {@dont_hash='dont_hash'}, {@subj_type={'subj_type', 0x3d, '\\eth0('}}, {@fsuuid={'fsuuid', 0x3d, {[0x36, 0x79, 0x0, 0x33, 0x61, 0x62, 0x32], 0x2d, [0x77, 0x32, 0x77, 0x34], 0x2d, [0x7f, 0x67, 0x37, 0x77], 0x2d, [0x0, 0x38, 0x32, 0x33], 0x2d, [0x35, 0x37, 0x7f, 0x7b, 0x37, 0x39, 0x77, 0x33]}}}, {@dont_measure='dont_measure'}]}}) ioctl$VIDIOC_ENUMINPUT(r1, 0xc050561a, &(0x7f0000000300)={0x4, "443b36c4364670c73c2ad26e1952769039650793d10fc72d24ce46e327d06e2f", 0x3, 0x100, 0x4, 0x1057ff, 0x0, 0x6}) 06:23:15 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000040)="2e0000002500817ee45ae087185082cf0724b0eba06ec400002339e00586f9835b3f0016914879008cd90080e230", 0x2e}], 0x1}, 0x0) [ 499.399685][T17689] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.5'. [ 499.513010][T17694] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.4'. [ 499.595949][T17688] IPVS: ftp: loaded support on port[0] = 21 [ 499.666810][T17690] IPVS: ftp: loaded support on port[0] = 21 06:23:16 executing program 3: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x101005, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f000082ef0a)=""/246) pwritev(r0, 0x0, 0x0, 0x0) 06:23:16 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = creat(&(0x7f0000000000)='./bus\x00', 0x0) getrlimit(0x0, &(0x7f00000000c0)) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x80010000000000}) 06:23:16 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000040)="2e0000002500817ee45ae087185082cf0f24b0eba06ec4000a2339e00586f9835b3f0016914879008cd90080e230", 0x2e}], 0x1}, 0x0) 06:23:16 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) getsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000400), &(0x7f0000000440)=0x8) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, &(0x7f00000019c0)={0x20}, 0x1) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r1, 0x111, 0x5, 0xc3, 0x4) r2 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x1, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r2, 0xc0045516, &(0x7f0000000040)=0x4) arch_prctl$ARCH_GET_CPUID(0x1011) getpgrp(0x0) flock(r0, 0x0) ioctl$BLKRRPART(0xffffffffffffffff, 0x125f, 0x0) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000200)={@mcast2}) fcntl$F_GET_FILE_RW_HINT(r0, 0x40d, &(0x7f00000000c0)) setsockopt$RDS_CONG_MONITOR(r2, 0x114, 0x6, &(0x7f0000000280), 0x4) ioctl$VHOST_SET_LOG_FD(r2, 0x4004af07, 0x0) ioctl$DRM_IOCTL_IRQ_BUSID(r2, 0xc0106403, &(0x7f0000000100)={0x8875, 0x800, 0x8000, 0xc2}) ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000180)) ioctl$VHOST_SET_VRING_CALL(0xffffffffffffffff, 0x4008af21, &(0x7f0000000380)={0x0, r1}) r3 = fcntl$dupfd(r1, 0x0, r2) setsockopt$IP_VS_SO_SET_STOPDAEMON(r3, 0x0, 0x48c, &(0x7f0000000140)={0x3, 'veth0\x00'}, 0x18) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.cpu/syz1\x00', 0x1ff) openat$snapshot(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/snapshot\x00', 0x0, 0x0) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0xf7fffffffffffffd, 0x2012, 0xffffffffffffffff, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000a40)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x20008000}, 0x24044000) unshare(0x40000000) mount$9p_virtio(&(0x7f00000003c0)='em0%$!,cgroup#\x00', &(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='9p\x00', 0x200000, &(0x7f0000000500)={'trans=virtio,', {[{@afid={'afid', 0x3d, 0x6}}, {@version_L='version=9p2000.L'}, {@cache_none='cache=none'}], [{@subj_role={'subj_role', 0x3d, '/dev/dsp#\x00'}}, {@permit_directio='permit_directio'}, {@measure='measure'}, {@context={'context', 0x3d, 'system_u'}}, {@obj_user={'obj_user'}}, {@dont_hash='dont_hash'}, {@subj_type={'subj_type', 0x3d, '\\eth0('}}, {@fsuuid={'fsuuid', 0x3d, {[0x36, 0x79, 0x0, 0x33, 0x61, 0x62, 0x32], 0x2d, [0x77, 0x32, 0x77, 0x34], 0x2d, [0x7f, 0x67, 0x37, 0x77], 0x2d, [0x0, 0x38, 0x32, 0x33], 0x2d, [0x35, 0x37, 0x7f, 0x7b, 0x37, 0x39, 0x77, 0x33]}}}, {@dont_measure='dont_measure'}]}}) ioctl$VIDIOC_ENUMINPUT(r1, 0xc050561a, &(0x7f0000000300)={0x4, "443b36c4364670c73c2ad26e1952769039650793d10fc72d24ce46e327d06e2f", 0x3, 0x100, 0x4, 0x1057ff, 0x0, 0x6}) 06:23:16 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000040)="2e0000002500817ee45ae087185082cf0824b0eba06ec400002339e00586f9835b3f0016914879008cd90080e230", 0x2e}], 0x1}, 0x0) 06:23:16 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) getsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000400), &(0x7f0000000440)=0x8) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, &(0x7f00000019c0)={0x20}, 0x1) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) r2 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x1, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r2, 0xc0045516, &(0x7f0000000040)=0x4) arch_prctl$ARCH_GET_CPUID(0x1011) getpgrp(0x0) flock(r0, 0x0) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000200)={@mcast2}) setsockopt$RDS_CONG_MONITOR(r2, 0x114, 0x6, &(0x7f0000000280), 0x4) ioctl$VHOST_SET_LOG_FD(r2, 0x4004af07, 0x0) ioctl$DRM_IOCTL_IRQ_BUSID(r2, 0xc0106403, &(0x7f0000000100)={0x8875, 0x800, 0x8000, 0xc2}) ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000180)) ioctl$VHOST_SET_VRING_CALL(0xffffffffffffffff, 0x4008af21, &(0x7f0000000380)={0x0, r1}) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x3, 'veth0\x00'}, 0x18) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.cpu/syz1\x00', 0x1ff) openat$snapshot(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/snapshot\x00', 0x0, 0x0) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0xf7fffffffffffffd, 0x2012, r2, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000a40)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x20008000}, 0x24044000) unshare(0x40000000) mount$9p_virtio(&(0x7f00000003c0)='em0%$!,cgroup#\x00', &(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='9p\x00', 0x200000, &(0x7f0000000500)={'trans=virtio,', {[{@afid={'afid', 0x3d, 0x6}}, {@version_L='version=9p2000.L'}, {@cache_none='cache=none'}], [{@subj_role={'subj_role', 0x3d, '/dev/dsp#\x00'}}, {@permit_directio='permit_directio'}, {@measure='measure'}, {@context={'context', 0x3d, 'system_u'}}, {@obj_user={'obj_user'}}, {@dont_hash='dont_hash'}, {@subj_type={'subj_type', 0x3d, '\\eth0('}}, {@fsuuid={'fsuuid', 0x3d, {[0x36, 0x79, 0x0, 0x33, 0x61, 0x62, 0x32], 0x2d, [0x77, 0x32, 0x77, 0x34], 0x2d, [0x7f, 0x67, 0x37, 0x77], 0x2d, [0x0, 0x38, 0x32, 0x33], 0x2d, [0x35, 0x37, 0x7f, 0x7b, 0x37, 0x39, 0x77, 0x33]}}}, {@dont_measure='dont_measure'}]}}) ioctl$VIDIOC_ENUMINPUT(r1, 0xc050561a, &(0x7f0000000300)={0x4, "443b36c4364670c73c2ad26e1952769039650793d10fc72d24ce46e327d06e2f", 0x3, 0x100, 0x4, 0x1057ff, 0x0, 0x6}) 06:23:16 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = creat(&(0x7f0000000000)='./bus\x00', 0x0) getrlimit(0x0, &(0x7f00000000c0)) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x80020000000000}) [ 501.196621][T17716] IPVS: ftp: loaded support on port[0] = 21 [ 501.208778][T17714] IPVS: ftp: loaded support on port[0] = 21 06:23:18 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000040)="2e0000002500817ee45ae087185082cf0f24b0eba06ec4000e2339e00586f9835b3f0016914879008cd90080e230", 0x2e}], 0x1}, 0x0) 06:23:18 executing program 3: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x101005, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f000082ef0a)=""/246) pwritev(r0, &(0x7f00000000c0), 0x0, 0x0) 06:23:18 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000040)="2e0000002500817ee45ae087185082cf0924b0eba06ec400002339e00586f9835b3f0016914879008cd90080e230", 0x2e}], 0x1}, 0x0) 06:23:18 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) getsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000400), &(0x7f0000000440)=0x8) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, &(0x7f00000019c0)={0x20}, 0x1) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) r2 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x1, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r2, 0xc0045516, &(0x7f0000000040)=0x4) arch_prctl$ARCH_GET_CPUID(0x1011) getpgrp(0x0) flock(r0, 0x0) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000200)={@mcast2}) setsockopt$RDS_CONG_MONITOR(r2, 0x114, 0x6, &(0x7f0000000280), 0x4) ioctl$VHOST_SET_LOG_FD(r2, 0x4004af07, 0x0) ioctl$DRM_IOCTL_IRQ_BUSID(r2, 0xc0106403, &(0x7f0000000100)={0x8875, 0x800, 0x8000, 0xc2}) ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000180)) ioctl$VHOST_SET_VRING_CALL(0xffffffffffffffff, 0x4008af21, &(0x7f0000000380)={0x0, r1}) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x3, 'veth0\x00'}, 0x18) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.cpu/syz1\x00', 0x1ff) openat$snapshot(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/snapshot\x00', 0x0, 0x0) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0xf7fffffffffffffd, 0x2012, r2, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000a40)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x20008000}, 0x24044000) unshare(0x40000000) mount$9p_virtio(&(0x7f00000003c0)='em0%$!,cgroup#\x00', &(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='9p\x00', 0x200000, &(0x7f0000000500)={'trans=virtio,', {[{@afid={'afid', 0x3d, 0x6}}, {@version_L='version=9p2000.L'}, {@cache_none='cache=none'}], [{@subj_role={'subj_role', 0x3d, '/dev/dsp#\x00'}}, {@permit_directio='permit_directio'}, {@measure='measure'}, {@context={'context', 0x3d, 'system_u'}}, {@obj_user={'obj_user'}}, {@dont_hash='dont_hash'}, {@subj_type={'subj_type', 0x3d, '\\eth0('}}, {@fsuuid={'fsuuid', 0x3d, {[0x36, 0x79, 0x0, 0x33, 0x61, 0x62, 0x32], 0x2d, [0x77, 0x32, 0x77, 0x34], 0x2d, [0x7f, 0x67, 0x37, 0x77], 0x2d, [0x0, 0x38, 0x32, 0x33], 0x2d, [0x35, 0x37, 0x7f, 0x7b, 0x37, 0x39, 0x77, 0x33]}}}, {@dont_measure='dont_measure'}]}}) ioctl$VIDIOC_ENUMINPUT(r1, 0xc050561a, &(0x7f0000000300)={0x4, "443b36c4364670c73c2ad26e1952769039650793d10fc72d24ce46e327d06e2f", 0x3, 0x100, 0x4, 0x1057ff, 0x0, 0x6}) [ 502.429910][T17728] __nla_parse: 3 callbacks suppressed [ 502.429920][T17728] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.5'. 06:23:18 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) getsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000400), &(0x7f0000000440)=0x8) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, &(0x7f00000019c0)={0x20}, 0x1) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r1, 0x111, 0x5, 0xc3, 0x4) r2 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x1, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r2, 0xc0045516, &(0x7f0000000040)=0x4) arch_prctl$ARCH_GET_CPUID(0x1011) getpgrp(0x0) flock(r0, 0x0) ioctl$BLKRRPART(0xffffffffffffffff, 0x125f, 0x0) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000200)={@mcast2}) fcntl$F_GET_FILE_RW_HINT(r0, 0x40d, &(0x7f00000000c0)) setsockopt$RDS_CONG_MONITOR(r2, 0x114, 0x6, &(0x7f0000000280), 0x4) ioctl$VHOST_SET_LOG_FD(r2, 0x4004af07, 0x0) ioctl$DRM_IOCTL_IRQ_BUSID(r2, 0xc0106403, &(0x7f0000000100)={0x8875, 0x800, 0x8000, 0xc2}) ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000180)) ioctl$VHOST_SET_VRING_CALL(0xffffffffffffffff, 0x4008af21, &(0x7f0000000380)={0x0, r1}) r3 = fcntl$dupfd(r1, 0x0, r2) setsockopt$IP_VS_SO_SET_STOPDAEMON(r3, 0x0, 0x48c, &(0x7f0000000140)={0x3, 'veth0\x00'}, 0x18) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.cpu/syz1\x00', 0x1ff) openat$snapshot(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/snapshot\x00', 0x0, 0x0) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0xf7fffffffffffffd, 0x2012, r2, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000a40)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x20008000}, 0x24044000) unshare(0x40000000) mount$9p_virtio(&(0x7f00000003c0)='em0%$!,cgroup#\x00', &(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='9p\x00', 0x200000, &(0x7f0000000500)={'trans=virtio,', {[{@afid={'afid', 0x3d, 0x6}}, {@version_L='version=9p2000.L'}, {@cache_none='cache=none'}], [{@subj_role={'subj_role', 0x3d, '/dev/dsp#\x00'}}, {@permit_directio='permit_directio'}, {@measure='measure'}, {@context={'context', 0x3d, 'system_u'}}, {@obj_user={'obj_user'}}, {@dont_hash='dont_hash'}, {@subj_type={'subj_type', 0x3d, '\\eth0('}}, {@fsuuid={'fsuuid', 0x3d, {[0x36, 0x79, 0x0, 0x33, 0x61, 0x62, 0x32], 0x2d, [0x77, 0x32, 0x77, 0x34], 0x2d, [0x7f, 0x67, 0x37, 0x77], 0x2d, [0x0, 0x38, 0x32, 0x33], 0x2d, [0x35, 0x37, 0x7f, 0x7b, 0x37, 0x39, 0x77, 0x33]}}}, {@dont_measure='dont_measure'}]}}) ioctl$VIDIOC_ENUMINPUT(r1, 0xc050561a, &(0x7f0000000300)={0x4, "443b36c4364670c73c2ad26e1952769039650793d10fc72d24ce46e327d06e2f", 0x3, 0x100, 0x4, 0x1057ff, 0x0, 0x6}) [ 502.498666][T17731] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.4'. 06:23:18 executing program 3: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x101005, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f000082ef0a)=""/246) pwritev(r0, &(0x7f00000000c0), 0x0, 0x0) 06:23:18 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = creat(&(0x7f0000000000)='./bus\x00', 0x0) getrlimit(0x0, &(0x7f00000000c0)) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x80030000000000}) [ 502.692513][T17735] IPVS: ftp: loaded support on port[0] = 21 [ 502.796078][T17739] IPVS: ftp: loaded support on port[0] = 21 06:23:19 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000040)="2e0000002500817ee45ae087185082cf0f24b0eba06ec401392339e00586f9835b3f0016914879008cd90080e230", 0x2e}], 0x1}, 0x0) 06:23:19 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000040)="2e0000002500817ee45ae087185082cf0a24b0eba06ec400002339e00586f9835b3f0016914879008cd90080e230", 0x2e}], 0x1}, 0x0) 06:23:19 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) getsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000400), &(0x7f0000000440)=0x8) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, &(0x7f00000019c0)={0x20}, 0x1) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(0xffffffffffffffff, 0x111, 0x5, 0xc3, 0x4) r1 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x1, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r1, 0xc0045516, &(0x7f0000000040)=0x4) arch_prctl$ARCH_GET_CPUID(0x1011) getpgrp(0x0) flock(r0, 0x0) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000200)={@mcast2}) setsockopt$RDS_CONG_MONITOR(r1, 0x114, 0x6, &(0x7f0000000280), 0x4) ioctl$VHOST_SET_LOG_FD(r1, 0x4004af07, 0x0) ioctl$DRM_IOCTL_IRQ_BUSID(r1, 0xc0106403, &(0x7f0000000100)={0x8875, 0x800, 0x8000, 0xc2}) ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000180)) ioctl$VHOST_SET_VRING_CALL(0xffffffffffffffff, 0x4008af21, &(0x7f0000000380)) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x3, 'veth0\x00'}, 0x18) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.cpu/syz1\x00', 0x1ff) openat$snapshot(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/snapshot\x00', 0x0, 0x0) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0xf7fffffffffffffd, 0x2012, r1, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000a40)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x20008000}, 0x24044000) unshare(0x40000000) mount$9p_virtio(&(0x7f00000003c0)='em0%$!,cgroup#\x00', &(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='9p\x00', 0x200000, &(0x7f0000000500)={'trans=virtio,', {[{@afid={'afid', 0x3d, 0x6}}, {@version_L='version=9p2000.L'}, {@cache_none='cache=none'}], [{@subj_role={'subj_role', 0x3d, '/dev/dsp#\x00'}}, {@permit_directio='permit_directio'}, {@measure='measure'}, {@context={'context', 0x3d, 'system_u'}}, {@obj_user={'obj_user'}}, {@dont_hash='dont_hash'}, {@subj_type={'subj_type', 0x3d, '\\eth0('}}, {@fsuuid={'fsuuid', 0x3d, {[0x36, 0x79, 0x0, 0x33, 0x61, 0x62, 0x32], 0x2d, [0x77, 0x32, 0x77, 0x34], 0x2d, [0x7f, 0x67, 0x37, 0x77], 0x2d, [0x0, 0x38, 0x32, 0x33], 0x2d, [0x35, 0x37, 0x7f, 0x7b, 0x37, 0x39, 0x77, 0x33]}}}, {@dont_measure='dont_measure'}]}}) ioctl$VIDIOC_ENUMINPUT(0xffffffffffffffff, 0xc050561a, &(0x7f0000000300)={0x4, "443b36c4364670c73c2ad26e1952769039650793d10fc72d24ce46e327d06e2f", 0x3, 0x100, 0x4, 0x1057ff, 0x0, 0x6}) 06:23:19 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) getsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000400), &(0x7f0000000440)=0x8) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, &(0x7f00000019c0)={0x20}, 0x1) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r1, 0x111, 0x5, 0xc3, 0x4) r2 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x1, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r2, 0xc0045516, &(0x7f0000000040)=0x4) arch_prctl$ARCH_GET_CPUID(0x1011) getpgrp(0x0) flock(r0, 0x0) ioctl$BLKRRPART(0xffffffffffffffff, 0x125f, 0x0) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000200)={@mcast2}) fcntl$F_GET_FILE_RW_HINT(r0, 0x40d, &(0x7f00000000c0)) setsockopt$RDS_CONG_MONITOR(r2, 0x114, 0x6, &(0x7f0000000280), 0x4) ioctl$VHOST_SET_LOG_FD(r2, 0x4004af07, 0x0) ioctl$DRM_IOCTL_IRQ_BUSID(r2, 0xc0106403, &(0x7f0000000100)={0x8875, 0x800, 0x8000, 0xc2}) ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000180)) ioctl$VHOST_SET_VRING_CALL(0xffffffffffffffff, 0x4008af21, &(0x7f0000000380)={0x0, r1}) r3 = fcntl$dupfd(r1, 0x0, r2) setsockopt$IP_VS_SO_SET_STOPDAEMON(r3, 0x0, 0x48c, &(0x7f0000000140)={0x3, 'veth0\x00'}, 0x18) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.cpu/syz1\x00', 0x1ff) openat$snapshot(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/snapshot\x00', 0x0, 0x0) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0xf7fffffffffffffd, 0x2012, r2, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000a40)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x20008000}, 0x24044000) unshare(0x40000000) mount$9p_virtio(&(0x7f00000003c0)='em0%$!,cgroup#\x00', &(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='9p\x00', 0x200000, &(0x7f0000000500)={'trans=virtio,', {[{@afid={'afid', 0x3d, 0x6}}, {@version_L='version=9p2000.L'}, {@cache_none='cache=none'}], [{@subj_role={'subj_role', 0x3d, '/dev/dsp#\x00'}}, {@permit_directio='permit_directio'}, {@measure='measure'}, {@context={'context', 0x3d, 'system_u'}}, {@obj_user={'obj_user'}}, {@dont_hash='dont_hash'}, {@subj_type={'subj_type', 0x3d, '\\eth0('}}, {@fsuuid={'fsuuid', 0x3d, {[0x36, 0x79, 0x0, 0x33, 0x61, 0x62, 0x32], 0x2d, [0x77, 0x32, 0x77, 0x34], 0x2d, [0x7f, 0x67, 0x37, 0x77], 0x2d, [0x0, 0x38, 0x32, 0x33], 0x2d, [0x35, 0x37, 0x7f, 0x7b, 0x37, 0x39, 0x77, 0x33]}}}, {@dont_measure='dont_measure'}]}}) ioctl$VIDIOC_ENUMINPUT(r1, 0xc050561a, &(0x7f0000000300)={0x4, "443b36c4364670c73c2ad26e1952769039650793d10fc72d24ce46e327d06e2f", 0x3, 0x100, 0x4, 0x1057ff, 0x0, 0x6}) [ 503.826314][T17753] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.5'. [ 503.866123][T17757] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.5'. 06:23:19 executing program 3: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x101005, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f000082ef0a)=""/246) pwritev(r0, &(0x7f00000000c0), 0x0, 0x0) 06:23:19 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = creat(&(0x7f0000000000)='./bus\x00', 0x0) getrlimit(0x0, &(0x7f00000000c0)) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x80040000000000}) [ 503.903465][T17752] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.4'. [ 504.060149][T17760] IPVS: ftp: loaded support on port[0] = 21 [ 504.207712][T17759] IPVS: ftp: loaded support on port[0] = 21 06:23:19 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000040)="2e0000002500817ee45ae087185082cf0f24b0eba06ec4003f2339e00586f9835b3f0016914879008cd90080e230", 0x2e}], 0x1}, 0x0) 06:23:20 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000040)="2e0000002500817ee45ae087185082cf0b24b0eba06ec400002339e00586f9835b3f0016914879008cd90080e230", 0x2e}], 0x1}, 0x0) 06:23:20 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = creat(&(0x7f0000000000)='./bus\x00', 0x0) getrlimit(0x0, &(0x7f00000000c0)) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x87000000000000}) 06:23:20 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) getsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000400), &(0x7f0000000440)=0x8) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, &(0x7f00000019c0)={0x20}, 0x1) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(0xffffffffffffffff, 0x111, 0x5, 0xc3, 0x4) r1 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x1, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r1, 0xc0045516, &(0x7f0000000040)=0x4) arch_prctl$ARCH_GET_CPUID(0x1011) getpgrp(0x0) flock(r0, 0x0) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000200)={@mcast2}) setsockopt$RDS_CONG_MONITOR(r1, 0x114, 0x6, &(0x7f0000000280), 0x4) ioctl$VHOST_SET_LOG_FD(r1, 0x4004af07, 0x0) ioctl$DRM_IOCTL_IRQ_BUSID(r1, 0xc0106403, &(0x7f0000000100)={0x8875, 0x800, 0x8000, 0xc2}) ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000180)) ioctl$VHOST_SET_VRING_CALL(0xffffffffffffffff, 0x4008af21, &(0x7f0000000380)) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x3, 'veth0\x00'}, 0x18) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.cpu/syz1\x00', 0x1ff) openat$snapshot(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/snapshot\x00', 0x0, 0x0) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0xf7fffffffffffffd, 0x2012, r1, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000a40)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x20008000}, 0x24044000) unshare(0x40000000) mount$9p_virtio(&(0x7f00000003c0)='em0%$!,cgroup#\x00', &(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='9p\x00', 0x200000, &(0x7f0000000500)={'trans=virtio,', {[{@afid={'afid', 0x3d, 0x6}}, {@version_L='version=9p2000.L'}, {@cache_none='cache=none'}], [{@subj_role={'subj_role', 0x3d, '/dev/dsp#\x00'}}, {@permit_directio='permit_directio'}, {@measure='measure'}, {@context={'context', 0x3d, 'system_u'}}, {@obj_user={'obj_user'}}, {@dont_hash='dont_hash'}, {@subj_type={'subj_type', 0x3d, '\\eth0('}}, {@fsuuid={'fsuuid', 0x3d, {[0x36, 0x79, 0x0, 0x33, 0x61, 0x62, 0x32], 0x2d, [0x77, 0x32, 0x77, 0x34], 0x2d, [0x7f, 0x67, 0x37, 0x77], 0x2d, [0x0, 0x38, 0x32, 0x33], 0x2d, [0x35, 0x37, 0x7f, 0x7b, 0x37, 0x39, 0x77, 0x33]}}}, {@dont_measure='dont_measure'}]}}) ioctl$VIDIOC_ENUMINPUT(0xffffffffffffffff, 0xc050561a, &(0x7f0000000300)={0x4, "443b36c4364670c73c2ad26e1952769039650793d10fc72d24ce46e327d06e2f", 0x3, 0x100, 0x4, 0x1057ff, 0x0, 0x6}) [ 505.124829][T17774] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.5'. 06:23:20 executing program 3: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x101005, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f000082ef0a)=""/246) pwritev(r0, &(0x7f00000000c0)=[{0x0}], 0x1, 0x0) 06:23:20 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) getsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000400), &(0x7f0000000440)=0x8) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, &(0x7f00000019c0)={0x20}, 0x1) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r1, 0x111, 0x5, 0xc3, 0x4) r2 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x1, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r2, 0xc0045516, &(0x7f0000000040)=0x4) arch_prctl$ARCH_GET_CPUID(0x1011) getpgrp(0x0) flock(r0, 0x0) ioctl$BLKRRPART(0xffffffffffffffff, 0x125f, 0x0) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000200)={@mcast2}) fcntl$F_GET_FILE_RW_HINT(r0, 0x40d, &(0x7f00000000c0)) setsockopt$RDS_CONG_MONITOR(r2, 0x114, 0x6, &(0x7f0000000280), 0x4) ioctl$VHOST_SET_LOG_FD(r2, 0x4004af07, 0x0) ioctl$DRM_IOCTL_IRQ_BUSID(r2, 0xc0106403, &(0x7f0000000100)={0x8875, 0x800, 0x8000, 0xc2}) ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000180)) ioctl$VHOST_SET_VRING_CALL(0xffffffffffffffff, 0x4008af21, &(0x7f0000000380)={0x0, r1}) r3 = fcntl$dupfd(r1, 0x0, r2) setsockopt$IP_VS_SO_SET_STOPDAEMON(r3, 0x0, 0x48c, &(0x7f0000000140)={0x3, 'veth0\x00'}, 0x18) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.cpu/syz1\x00', 0x1ff) openat$snapshot(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/snapshot\x00', 0x0, 0x0) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0xf7fffffffffffffd, 0x2012, r2, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000a40)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x20008000}, 0x24044000) unshare(0x40000000) mount$9p_virtio(&(0x7f00000003c0)='em0%$!,cgroup#\x00', &(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='9p\x00', 0x200000, &(0x7f0000000500)={'trans=virtio,', {[{@afid={'afid', 0x3d, 0x6}}, {@version_L='version=9p2000.L'}, {@cache_none='cache=none'}], [{@subj_role={'subj_role', 0x3d, '/dev/dsp#\x00'}}, {@permit_directio='permit_directio'}, {@measure='measure'}, {@context={'context', 0x3d, 'system_u'}}, {@obj_user={'obj_user'}}, {@dont_hash='dont_hash'}, {@subj_type={'subj_type', 0x3d, '\\eth0('}}, {@fsuuid={'fsuuid', 0x3d, {[0x36, 0x79, 0x0, 0x33, 0x61, 0x62, 0x32], 0x2d, [0x77, 0x32, 0x77, 0x34], 0x2d, [0x7f, 0x67, 0x37, 0x77], 0x2d, [0x0, 0x38, 0x32, 0x33], 0x2d, [0x35, 0x37, 0x7f, 0x7b, 0x37, 0x39, 0x77, 0x33]}}}, {@dont_measure='dont_measure'}]}}) ioctl$VIDIOC_ENUMINPUT(r1, 0xc050561a, &(0x7f0000000300)={0x4, "443b36c4364670c73c2ad26e1952769039650793d10fc72d24ce46e327d06e2f", 0x3, 0x100, 0x4, 0x1057ff, 0x0, 0x6}) [ 505.261314][T17783] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.5'. 06:23:21 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = creat(&(0x7f0000000000)='./bus\x00', 0x0) getrlimit(0x0, &(0x7f00000000c0)) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0c0583b, &(0x7f0000000040)={0x0, 0xa3000000000000}) [ 505.409446][T17784] IPVS: ftp: loaded support on port[0] = 21 [ 505.551086][T17791] IPVS: ftp: loaded support on port[0] = 21 06:23:22 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000040)="2e0000002500817ee45ae087185082cf0f24b0eba06ec400482339e00586f9835b3f0016914879008cd90080e230", 0x2e}], 0x1}, 0x0) 06:23:22 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) getsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000400), &(0x7f0000000440)=0x8) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, &(0x7f00000019c0)={0x20}, 0x1) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r1, 0x111, 0x5, 0xc3, 0x4) r2 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x1, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r2, 0xc0045516, &(0x7f0000000040)=0x4) arch_prctl$ARCH_GET_CPUID(0x1011) getpgrp(0x0) flock(r0, 0x0) ioctl$BLKRRPART(0xffffffffffffffff, 0x125f, 0x0) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000200)={@mcast2}) fcntl$F_GET_FILE_RW_HINT(r0, 0x40d, &(0x7f00000000c0)) setsockopt$RDS_CONG_MONITOR(r2, 0x114, 0x6, &(0x7f0000000280), 0x4) ioctl$VHOST_SET_LOG_FD(r2, 0x4004af07, 0x0) ioctl$DRM_IOCTL_IRQ_BUSID(r2, 0xc0106403, &(0x7f0000000100)={0x8875, 0x800, 0x8000, 0xc2}) ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000180)) ioctl$VHOST_SET_VRING_CALL(0xffffffffffffffff, 0x4008af21, &(0x7f0000000380)={0x0, r1}) r3 = fcntl$dupfd(r1, 0x0, r2) setsockopt$IP_VS_SO_SET_STOPDAEMON(r3, 0x0, 0x48c, &(0x7f0000000140)={0x3, 'veth0\x00'}, 0x18) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.cpu/syz1\x00', 0x1ff) openat$snapshot(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/snapshot\x00', 0x0, 0x0) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0xf7fffffffffffffd, 0x2012, r2, 0x0) sendmsg$nl_route_sched(r3, 0x0, 0x24044000) unshare(0x40000000) mount$9p_virtio(&(0x7f00000003c0)='em0%$!,cgroup#\x00', &(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='9p\x00', 0x200000, &(0x7f0000000500)={'trans=virtio,', {[{@afid={'afid', 0x3d, 0x6}}, {@version_L='version=9p2000.L'}, {@cache_none='cache=none'}], [{@subj_role={'subj_role', 0x3d, '/dev/dsp#\x00'}}, {@permit_directio='permit_directio'}, {@measure='measure'}, {@context={'context', 0x3d, 'system_u'}}, {@obj_user={'obj_user'}}, {@dont_hash='dont_hash'}, {@subj_type={'subj_type', 0x3d, '\\eth0('}}, {@fsuuid={'fsuuid', 0x3d, {[0x36, 0x79, 0x0, 0x33, 0x61, 0x62, 0x32], 0x2d, [0x77, 0x32, 0x77, 0x34], 0x2d, [0x7f, 0x67, 0x37, 0x77], 0x2d, [0x0, 0x38, 0x32, 0x33], 0x2d, [0x35, 0x37, 0x7f, 0x7b, 0x37, 0x39, 0x77, 0x33]}}}, {@dont_measure='dont_measure'}]}}) ioctl$VIDIOC_ENUMINPUT(r1, 0xc050561a, &(0x7f0000000300)={0x4, "443b36c4364670c73c2ad26e1952769039650793d10fc72d24ce46e327d06e2f", 0x3, 0x100, 0x4, 0x1057ff, 0x0, 0x6}) 06:23:22 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000040)="2e0000002500817ee45ae087185082cf0c24b0eba06ec400002339e00586f9835b3f0016914879008cd90080e230", 0x2e}], 0x1}, 0x0) 06:23:22 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) getsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000400), &(0x7f0000000440)=0x8) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, &(0x7f00000019c0)={0x20}, 0x1) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(0xffffffffffffffff, 0x111, 0x5, 0xc3, 0x4) r1 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x1, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r1, 0xc0045516, &(0x7f0000000040)=0x4) arch_prctl$ARCH_GET_CPUID(0x1011) getpgrp(0x0) flock(r0, 0x0) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000200)={@mcast2}) setsockopt$RDS_CONG_MONITOR(r1, 0x114, 0x6, &(0x7f0000000280), 0x4) ioctl$VHOST_SET_LOG_FD(r1, 0x4004af07, 0x0) ioctl$DRM_IOCTL_IRQ_BUSID(r1, 0xc0106403, &(0x7f0000000100)={0x8875, 0x800, 0x8000, 0xc2}) ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000180)) ioctl$VHOST_SET_VRING_CALL(0xffffffffffffffff, 0x4008af21, &(0x7f0000000380)) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x3, 'veth0\x00'}, 0x18) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.cpu/syz1\x00', 0x1ff) openat$snapshot(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/snapshot\x00', 0x0, 0x0) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0xf7fffffffffffffd, 0x2012, r1, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000a40)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x20008000}, 0x24044000) unshare(0x40000000) mount$9p_virtio(&(0x7f00000003c0)='em0%$!,cgroup#\x00', &(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='9p\x00', 0x200000, &(0x7f0000000500)={'trans=virtio,', {[{@afid={'afid', 0x3d, 0x6}}, {@version_L='version=9p2000.L'}, {@cache_none='cache=none'}], [{@subj_role={'subj_role', 0x3d, '/dev/dsp#\x00'}}, {@permit_directio='permit_directio'}, {@measure='measure'}, {@context={'context', 0x3d, 'system_u'}}, {@obj_user={'obj_user'}}, {@dont_hash='dont_hash'}, {@subj_type={'subj_type', 0x3d, '\\eth0('}}, {@fsuuid={'fsuuid', 0x3d, {[0x36, 0x79, 0x0, 0x33, 0x61, 0x62, 0x32], 0x2d, [0x77, 0x32, 0x77, 0x34], 0x2d, [0x7f, 0x67, 0x37, 0x77], 0x2d, [0x0, 0x38, 0x32, 0x33], 0x2d, [0x35, 0x37, 0x7f, 0x7b, 0x37, 0x39, 0x77, 0x33]}}}, {@dont_measure='dont_measure'}]}}) ioctl$VIDIOC_ENUMINPUT(0xffffffffffffffff, 0xc050561a, &(0x7f0000000300)={0x4, "443b36c4364670c73c2ad26e1952769039650793d10fc72d24ce46e327d06e2f", 0x3, 0x100, 0x4, 0x1057ff, 0x0, 0x6}) [ 506.653369][T17801] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.5'. 06:23:22 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = creat(&(0x7f0000000000)='./bus\x00', 0x0) getrlimit(0x0, &(0x7f00000000c0)) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0c0583b, &(0x7f0000000040)={0x0, 0xa5000000000000}) 06:23:22 executing program 3: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x101005, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f000082ef0a)=""/246) pwritev(r0, &(0x7f00000000c0)=[{0x0}], 0x1, 0x0) [ 506.852545][T17813] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.5'. [ 506.871028][T17807] IPVS: ftp: loaded support on port[0] = 21 [ 506.911721][T17806] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.4'. 06:23:22 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000040)="2e0000002500817ee45ae087185082cf0f24b0eba06ec4004c2339e00586f9835b3f0016914879008cd90080e230", 0x2e}], 0x1}, 0x0) 06:23:22 executing program 3: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x101005, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f000082ef0a)=""/246) pwritev(r0, &(0x7f00000000c0)=[{0x0}], 0x1, 0x0) 06:23:22 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000040)="2e0000002500817ee45ae087185082cf0d24b0eba06ec400002339e00586f9835b3f0016914879008cd90080e230", 0x2e}], 0x1}, 0x0) 06:23:23 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = creat(&(0x7f0000000000)='./bus\x00', 0x0) getrlimit(0x0, &(0x7f00000000c0)) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0c0583b, &(0x7f0000000040)={0x0, 0xb6020000000000}) [ 507.349671][T17805] IPVS: ftp: loaded support on port[0] = 21 06:23:23 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) getsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000400), &(0x7f0000000440)=0x8) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, &(0x7f00000019c0)={0x20}, 0x1) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r1, 0x111, 0x5, 0xc3, 0x4) r2 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x1, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r2, 0xc0045516, &(0x7f0000000040)=0x4) arch_prctl$ARCH_GET_CPUID(0x1011) getpgrp(0x0) flock(r0, 0x0) ioctl$BLKRRPART(0xffffffffffffffff, 0x125f, 0x0) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000200)={@mcast2}) fcntl$F_GET_FILE_RW_HINT(r0, 0x40d, &(0x7f00000000c0)) setsockopt$RDS_CONG_MONITOR(r2, 0x114, 0x6, &(0x7f0000000280), 0x4) ioctl$VHOST_SET_LOG_FD(r2, 0x4004af07, 0x0) ioctl$DRM_IOCTL_IRQ_BUSID(r2, 0xc0106403, &(0x7f0000000100)={0x8875, 0x800, 0x8000, 0xc2}) ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000180)) ioctl$VHOST_SET_VRING_CALL(0xffffffffffffffff, 0x4008af21, &(0x7f0000000380)={0x0, r1}) r3 = fcntl$dupfd(r1, 0x0, r2) setsockopt$IP_VS_SO_SET_STOPDAEMON(r3, 0x0, 0x48c, &(0x7f0000000140)={0x3, 'veth0\x00'}, 0x18) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.cpu/syz1\x00', 0x1ff) openat$snapshot(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/snapshot\x00', 0x0, 0x0) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0xf7fffffffffffffd, 0x2012, r2, 0x0) sendmsg$nl_route_sched(r3, 0x0, 0x24044000) unshare(0x40000000) mount$9p_virtio(&(0x7f00000003c0)='em0%$!,cgroup#\x00', &(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='9p\x00', 0x200000, &(0x7f0000000500)={'trans=virtio,', {[{@afid={'afid', 0x3d, 0x6}}, {@version_L='version=9p2000.L'}, {@cache_none='cache=none'}], [{@subj_role={'subj_role', 0x3d, '/dev/dsp#\x00'}}, {@permit_directio='permit_directio'}, {@measure='measure'}, {@context={'context', 0x3d, 'system_u'}}, {@obj_user={'obj_user'}}, {@dont_hash='dont_hash'}, {@subj_type={'subj_type', 0x3d, '\\eth0('}}, {@fsuuid={'fsuuid', 0x3d, {[0x36, 0x79, 0x0, 0x33, 0x61, 0x62, 0x32], 0x2d, [0x77, 0x32, 0x77, 0x34], 0x2d, [0x7f, 0x67, 0x37, 0x77], 0x2d, [0x0, 0x38, 0x32, 0x33], 0x2d, [0x35, 0x37, 0x7f, 0x7b, 0x37, 0x39, 0x77, 0x33]}}}, {@dont_measure='dont_measure'}]}}) ioctl$VIDIOC_ENUMINPUT(r1, 0xc050561a, &(0x7f0000000300)={0x4, "443b36c4364670c73c2ad26e1952769039650793d10fc72d24ce46e327d06e2f", 0x3, 0x100, 0x4, 0x1057ff, 0x0, 0x6}) 06:23:23 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000040)="2e0000002500817ee45ae087185082cf0f24b0eba06ec400602339e00586f9835b3f0016914879008cd90080e230", 0x2e}], 0x1}, 0x0) [ 507.507033][T17834] __nla_parse: 2 callbacks suppressed [ 507.507042][T17834] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.4'. 06:23:23 executing program 3: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x101005, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f000082ef0a)=""/246) pwritev(r0, &(0x7f00000000c0)=[{&(0x7f0000000180)}], 0x1, 0x0) [ 507.645486][T17845] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.4'. [ 507.647843][T17840] IPVS: ftp: loaded support on port[0] = 21 06:23:23 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = creat(&(0x7f0000000000)='./bus\x00', 0x0) getrlimit(0x0, &(0x7f00000000c0)) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0c0583b, &(0x7f0000000040)={0x0, 0xf8070000000000}) [ 507.718237][T17843] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.5'. 06:23:23 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000040)="2e0000002500817ee45ae087185082cf0e24b0eba06ec400002339e00586f9835b3f0016914879008cd90080e230", 0x2e}], 0x1}, 0x0) [ 507.783901][T17850] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.5'. 06:23:25 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) getsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000400), &(0x7f0000000440)=0x8) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r1, 0x111, 0x5, 0xc3, 0x4) r2 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x1, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r2, 0xc0045516, &(0x7f0000000040)=0x4) arch_prctl$ARCH_GET_CPUID(0x1011) getpgrp(0x0) flock(r0, 0x0) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000200)={@mcast2}) setsockopt$RDS_CONG_MONITOR(r2, 0x114, 0x6, &(0x7f0000000280), 0x4) ioctl$VHOST_SET_LOG_FD(r2, 0x4004af07, 0x0) ioctl$DRM_IOCTL_IRQ_BUSID(r2, 0xc0106403, &(0x7f0000000100)={0x8875, 0x800, 0x8000, 0xc2}) ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000180)) ioctl$VHOST_SET_VRING_CALL(0xffffffffffffffff, 0x4008af21, &(0x7f0000000380)={0x0, r1}) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x3, 'veth0\x00'}, 0x18) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.cpu/syz1\x00', 0x1ff) openat$snapshot(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/snapshot\x00', 0x0, 0x0) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0xf7fffffffffffffd, 0x2012, r2, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000a40)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x20008000}, 0x24044000) unshare(0x40000000) mount$9p_virtio(&(0x7f00000003c0)='em0%$!,cgroup#\x00', &(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='9p\x00', 0x200000, &(0x7f0000000500)={'trans=virtio,', {[{@afid={'afid', 0x3d, 0x6}}, {@version_L='version=9p2000.L'}, {@cache_none='cache=none'}], [{@subj_role={'subj_role', 0x3d, '/dev/dsp#\x00'}}, {@permit_directio='permit_directio'}, {@measure='measure'}, {@context={'context', 0x3d, 'system_u'}}, {@obj_user={'obj_user'}}, {@dont_hash='dont_hash'}, {@subj_type={'subj_type', 0x3d, '\\eth0('}}, {@fsuuid={'fsuuid', 0x3d, {[0x36, 0x79, 0x0, 0x33, 0x61, 0x62, 0x32], 0x2d, [0x77, 0x32, 0x77, 0x34], 0x2d, [0x7f, 0x67, 0x37, 0x77], 0x2d, [0x0, 0x38, 0x32, 0x33], 0x2d, [0x35, 0x37, 0x7f, 0x7b, 0x37, 0x39, 0x77, 0x33]}}}, {@dont_measure='dont_measure'}]}}) ioctl$VIDIOC_ENUMINPUT(r1, 0xc050561a, &(0x7f0000000300)={0x4, "443b36c4364670c73c2ad26e1952769039650793d10fc72d24ce46e327d06e2f", 0x3, 0x100, 0x4, 0x1057ff, 0x0, 0x6}) 06:23:25 executing program 3: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x101005, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f000082ef0a)=""/246) pwritev(r0, &(0x7f00000000c0)=[{&(0x7f0000000180)}], 0x1, 0x0) 06:23:25 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000040)="2e0000002500817ee45ae087185082cf0f24b0eba06ec400682339e00586f9835b3f0016914879008cd90080e230", 0x2e}], 0x1}, 0x0) 06:23:25 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = creat(&(0x7f0000000000)='./bus\x00', 0x0) getrlimit(0x0, &(0x7f00000000c0)) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0c0583b, &(0x7f0000000040)={0x0, 0xff070000000000}) 06:23:25 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000040)="2e0000002500817ee45ae087185082cf1024b0eba06ec400002339e00586f9835b3f0016914879008cd90080e230", 0x2e}], 0x1}, 0x0) 06:23:25 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) getsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000400), &(0x7f0000000440)=0x8) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, &(0x7f00000019c0)={0x20}, 0x1) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r1, 0x111, 0x5, 0xc3, 0x4) r2 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x1, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r2, 0xc0045516, &(0x7f0000000040)=0x4) arch_prctl$ARCH_GET_CPUID(0x1011) getpgrp(0x0) flock(r0, 0x0) ioctl$BLKRRPART(0xffffffffffffffff, 0x125f, 0x0) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000200)={@mcast2}) fcntl$F_GET_FILE_RW_HINT(r0, 0x40d, &(0x7f00000000c0)) setsockopt$RDS_CONG_MONITOR(r2, 0x114, 0x6, &(0x7f0000000280), 0x4) ioctl$VHOST_SET_LOG_FD(r2, 0x4004af07, 0x0) ioctl$DRM_IOCTL_IRQ_BUSID(r2, 0xc0106403, &(0x7f0000000100)={0x8875, 0x800, 0x8000, 0xc2}) ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000180)) ioctl$VHOST_SET_VRING_CALL(0xffffffffffffffff, 0x4008af21, &(0x7f0000000380)={0x0, r1}) r3 = fcntl$dupfd(r1, 0x0, r2) setsockopt$IP_VS_SO_SET_STOPDAEMON(r3, 0x0, 0x48c, &(0x7f0000000140)={0x3, 'veth0\x00'}, 0x18) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.cpu/syz1\x00', 0x1ff) openat$snapshot(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/snapshot\x00', 0x0, 0x0) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0xf7fffffffffffffd, 0x2012, r2, 0x0) sendmsg$nl_route_sched(r3, 0x0, 0x24044000) unshare(0x40000000) mount$9p_virtio(&(0x7f00000003c0)='em0%$!,cgroup#\x00', &(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='9p\x00', 0x200000, &(0x7f0000000500)={'trans=virtio,', {[{@afid={'afid', 0x3d, 0x6}}, {@version_L='version=9p2000.L'}, {@cache_none='cache=none'}], [{@subj_role={'subj_role', 0x3d, '/dev/dsp#\x00'}}, {@permit_directio='permit_directio'}, {@measure='measure'}, {@context={'context', 0x3d, 'system_u'}}, {@obj_user={'obj_user'}}, {@dont_hash='dont_hash'}, {@subj_type={'subj_type', 0x3d, '\\eth0('}}, {@fsuuid={'fsuuid', 0x3d, {[0x36, 0x79, 0x0, 0x33, 0x61, 0x62, 0x32], 0x2d, [0x77, 0x32, 0x77, 0x34], 0x2d, [0x7f, 0x67, 0x37, 0x77], 0x2d, [0x0, 0x38, 0x32, 0x33], 0x2d, [0x35, 0x37, 0x7f, 0x7b, 0x37, 0x39, 0x77, 0x33]}}}, {@dont_measure='dont_measure'}]}}) ioctl$VIDIOC_ENUMINPUT(r1, 0xc050561a, &(0x7f0000000300)={0x4, "443b36c4364670c73c2ad26e1952769039650793d10fc72d24ce46e327d06e2f", 0x3, 0x100, 0x4, 0x1057ff, 0x0, 0x6}) [ 509.773802][T17868] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.4'. [ 509.810957][T17872] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.5'. [ 509.837922][T17874] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.5'. [ 509.930917][T17869] IPVS: ftp: loaded support on port[0] = 21 06:23:25 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000040)="2e0000002500817ee45ae087185082cf0f24b0eba06ec4006c2339e00586f9835b3f0016914879008cd90080e230", 0x2e}], 0x1}, 0x0) [ 510.007344][T17879] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.4'. [ 510.081993][T17880] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.5'. [ 510.088793][T17878] IPVS: ftp: loaded support on port[0] = 21 [ 510.104648][T17881] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.5'. 06:23:25 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000040)="2e0000002500817ee45ae087185082cf1124b0eba06ec400002339e00586f9835b3f0016914879008cd90080e230", 0x2e}], 0x1}, 0x0) 06:23:25 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000040)="2e0000002500817ee45ae087185082cf0f24b0eba06ec400742339e00586f9835b3f0016914879008cd90080e230", 0x2e}], 0x1}, 0x0) 06:23:25 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000040)="2e0000002500817ee45ae087185082cf1224b0eba06ec400002339e00586f9835b3f0016914879008cd90080e230", 0x2e}], 0x1}, 0x0) 06:23:26 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000040)="2e0000002500817ee45ae087185082cf0f24b0eba06ec4007a2339e00586f9835b3f0016914879008cd90080e230", 0x2e}], 0x1}, 0x0) 06:23:26 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000040)="2e0000002500817ee45ae087185082cf6824b0eba06ec400002339e00586f9835b3f0016914879008cd90080e230", 0x2e}], 0x1}, 0x0) 06:23:27 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) getsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000400), &(0x7f0000000440)=0x8) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r1, 0x111, 0x5, 0xc3, 0x4) r2 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x1, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r2, 0xc0045516, &(0x7f0000000040)=0x4) arch_prctl$ARCH_GET_CPUID(0x1011) getpgrp(0x0) flock(r0, 0x0) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000200)={@mcast2}) setsockopt$RDS_CONG_MONITOR(r2, 0x114, 0x6, &(0x7f0000000280), 0x4) ioctl$VHOST_SET_LOG_FD(r2, 0x4004af07, 0x0) ioctl$DRM_IOCTL_IRQ_BUSID(r2, 0xc0106403, &(0x7f0000000100)={0x8875, 0x800, 0x8000, 0xc2}) ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000180)) ioctl$VHOST_SET_VRING_CALL(0xffffffffffffffff, 0x4008af21, &(0x7f0000000380)={0x0, r1}) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x3, 'veth0\x00'}, 0x18) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.cpu/syz1\x00', 0x1ff) openat$snapshot(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/snapshot\x00', 0x0, 0x0) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0xf7fffffffffffffd, 0x2012, r2, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000a40)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x20008000}, 0x24044000) unshare(0x40000000) mount$9p_virtio(&(0x7f00000003c0)='em0%$!,cgroup#\x00', &(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='9p\x00', 0x200000, &(0x7f0000000500)={'trans=virtio,', {[{@afid={'afid', 0x3d, 0x6}}, {@version_L='version=9p2000.L'}, {@cache_none='cache=none'}], [{@subj_role={'subj_role', 0x3d, '/dev/dsp#\x00'}}, {@permit_directio='permit_directio'}, {@measure='measure'}, {@context={'context', 0x3d, 'system_u'}}, {@obj_user={'obj_user'}}, {@dont_hash='dont_hash'}, {@subj_type={'subj_type', 0x3d, '\\eth0('}}, {@fsuuid={'fsuuid', 0x3d, {[0x36, 0x79, 0x0, 0x33, 0x61, 0x62, 0x32], 0x2d, [0x77, 0x32, 0x77, 0x34], 0x2d, [0x7f, 0x67, 0x37, 0x77], 0x2d, [0x0, 0x38, 0x32, 0x33], 0x2d, [0x35, 0x37, 0x7f, 0x7b, 0x37, 0x39, 0x77, 0x33]}}}, {@dont_measure='dont_measure'}]}}) ioctl$VIDIOC_ENUMINPUT(r1, 0xc050561a, &(0x7f0000000300)={0x4, "443b36c4364670c73c2ad26e1952769039650793d10fc72d24ce46e327d06e2f", 0x3, 0x100, 0x4, 0x1057ff, 0x0, 0x6}) 06:23:27 executing program 3: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x101005, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f000082ef0a)=""/246) pwritev(r0, &(0x7f00000000c0)=[{&(0x7f0000000180)}], 0x1, 0x0) 06:23:27 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = creat(&(0x7f0000000000)='./bus\x00', 0x0) getrlimit(0x0, &(0x7f00000000c0)) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x100000000000000}) 06:23:27 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) getsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000400), &(0x7f0000000440)=0x8) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, &(0x7f00000019c0)={0x20}, 0x1) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r1, 0x111, 0x5, 0xc3, 0x4) r2 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x1, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r2, 0xc0045516, &(0x7f0000000040)=0x4) arch_prctl$ARCH_GET_CPUID(0x1011) getpgrp(0x0) flock(r0, 0x0) ioctl$BLKRRPART(0xffffffffffffffff, 0x125f, 0x0) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000200)={@mcast2}) fcntl$F_GET_FILE_RW_HINT(r0, 0x40d, &(0x7f00000000c0)) setsockopt$RDS_CONG_MONITOR(r2, 0x114, 0x6, &(0x7f0000000280), 0x4) ioctl$VHOST_SET_LOG_FD(r2, 0x4004af07, 0x0) ioctl$DRM_IOCTL_IRQ_BUSID(r2, 0xc0106403, &(0x7f0000000100)={0x8875, 0x800, 0x8000, 0xc2}) ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000180)) ioctl$VHOST_SET_VRING_CALL(0xffffffffffffffff, 0x4008af21, &(0x7f0000000380)={0x0, r1}) r3 = fcntl$dupfd(r1, 0x0, r2) setsockopt$IP_VS_SO_SET_STOPDAEMON(r3, 0x0, 0x48c, &(0x7f0000000140)={0x3, 'veth0\x00'}, 0x18) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.cpu/syz1\x00', 0x1ff) openat$snapshot(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/snapshot\x00', 0x0, 0x0) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0xf7fffffffffffffd, 0x2012, r2, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000a40)={0x0, 0x0, 0x0}, 0x24044000) unshare(0x40000000) mount$9p_virtio(&(0x7f00000003c0)='em0%$!,cgroup#\x00', &(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='9p\x00', 0x200000, &(0x7f0000000500)={'trans=virtio,', {[{@afid={'afid', 0x3d, 0x6}}, {@version_L='version=9p2000.L'}, {@cache_none='cache=none'}], [{@subj_role={'subj_role', 0x3d, '/dev/dsp#\x00'}}, {@permit_directio='permit_directio'}, {@measure='measure'}, {@context={'context', 0x3d, 'system_u'}}, {@obj_user={'obj_user'}}, {@dont_hash='dont_hash'}, {@subj_type={'subj_type', 0x3d, '\\eth0('}}, {@fsuuid={'fsuuid', 0x3d, {[0x36, 0x79, 0x0, 0x33, 0x61, 0x62, 0x32], 0x2d, [0x77, 0x32, 0x77, 0x34], 0x2d, [0x7f, 0x67, 0x37, 0x77], 0x2d, [0x0, 0x38, 0x32, 0x33], 0x2d, [0x35, 0x37, 0x7f, 0x7b, 0x37, 0x39, 0x77, 0x33]}}}, {@dont_measure='dont_measure'}]}}) ioctl$VIDIOC_ENUMINPUT(r1, 0xc050561a, &(0x7f0000000300)={0x4, "443b36c4364670c73c2ad26e1952769039650793d10fc72d24ce46e327d06e2f", 0x3, 0x100, 0x4, 0x1057ff, 0x0, 0x6}) 06:23:27 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000040)="2e0000002500817ee45ae087185082cf0f24b0eba06ec400f02339e00586f9835b3f0016914879008cd90080e230", 0x2e}], 0x1}, 0x0) 06:23:27 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000040)="2e0000002500817ee45ae087185082cf0f68b0eba06ec400002339e00586f9835b3f0016914879008cd90080e230", 0x2e}], 0x1}, 0x0) 06:23:27 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000040)="2e0000002500817ee45ae087185082cf0f24b0eba06ec400022339e00586f9835b3f0016914879008cd90080e230", 0x2e}], 0x1}, 0x0) 06:23:27 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000040)="2e0000002500817ee45ae087185082cf0f24b0eb0300c400002339e00586f9835b3f0016914879008cd90080e230", 0x2e}], 0x1}, 0x0) [ 511.733630][T17917] IPVS: ftp: loaded support on port[0] = 21 06:23:27 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000040)="2e0000002500817ee45ae087185082cf0f24b0eba06ec400032339e00586f9835b3f0016914879008cd90080e230", 0x2e}], 0x1}, 0x0) 06:23:27 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000040)="2e0000002500817ee45ae087185082cf0f24b0eb1a00c400002339e00586f9835b3f0016914879008cd90080e230", 0x2e}], 0x1}, 0x0) [ 511.907856][T17908] IPVS: ftp: loaded support on port[0] = 21 06:23:27 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000040)="2e0000002500817ee45ae087185082cf0f24b0eba06ec400042339e00586f9835b3f0016914879008cd90080e230", 0x2e}], 0x1}, 0x0) 06:23:27 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000040)="2e0000002500817ee45ae087185082cf0f24b0eba00ac400002339e00586f9835b3f0016914879008cd90080e230", 0x2e}], 0x1}, 0x0) 06:23:29 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) getsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000400), &(0x7f0000000440)=0x8) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r1, 0x111, 0x5, 0xc3, 0x4) r2 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x1, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r2, 0xc0045516, &(0x7f0000000040)=0x4) arch_prctl$ARCH_GET_CPUID(0x1011) getpgrp(0x0) flock(r0, 0x0) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000200)={@mcast2}) setsockopt$RDS_CONG_MONITOR(r2, 0x114, 0x6, &(0x7f0000000280), 0x4) ioctl$VHOST_SET_LOG_FD(r2, 0x4004af07, 0x0) ioctl$DRM_IOCTL_IRQ_BUSID(r2, 0xc0106403, &(0x7f0000000100)={0x8875, 0x800, 0x8000, 0xc2}) ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000180)) ioctl$VHOST_SET_VRING_CALL(0xffffffffffffffff, 0x4008af21, &(0x7f0000000380)={0x0, r1}) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x3, 'veth0\x00'}, 0x18) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.cpu/syz1\x00', 0x1ff) openat$snapshot(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/snapshot\x00', 0x0, 0x0) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0xf7fffffffffffffd, 0x2012, r2, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000a40)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x20008000}, 0x24044000) unshare(0x40000000) mount$9p_virtio(&(0x7f00000003c0)='em0%$!,cgroup#\x00', &(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='9p\x00', 0x200000, &(0x7f0000000500)={'trans=virtio,', {[{@afid={'afid', 0x3d, 0x6}}, {@version_L='version=9p2000.L'}, {@cache_none='cache=none'}], [{@subj_role={'subj_role', 0x3d, '/dev/dsp#\x00'}}, {@permit_directio='permit_directio'}, {@measure='measure'}, {@context={'context', 0x3d, 'system_u'}}, {@obj_user={'obj_user'}}, {@dont_hash='dont_hash'}, {@subj_type={'subj_type', 0x3d, '\\eth0('}}, {@fsuuid={'fsuuid', 0x3d, {[0x36, 0x79, 0x0, 0x33, 0x61, 0x62, 0x32], 0x2d, [0x77, 0x32, 0x77, 0x34], 0x2d, [0x7f, 0x67, 0x37, 0x77], 0x2d, [0x0, 0x38, 0x32, 0x33], 0x2d, [0x35, 0x37, 0x7f, 0x7b, 0x37, 0x39, 0x77, 0x33]}}}, {@dont_measure='dont_measure'}]}}) ioctl$VIDIOC_ENUMINPUT(r1, 0xc050561a, &(0x7f0000000300)={0x4, "443b36c4364670c73c2ad26e1952769039650793d10fc72d24ce46e327d06e2f", 0x3, 0x100, 0x4, 0x1057ff, 0x0, 0x6}) 06:23:29 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000040)="2e0000002500817ee45ae087185082cf0f24b0eba06ec400052339e00586f9835b3f0016914879008cd90080e230", 0x2e}], 0x1}, 0x0) 06:23:29 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) getsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000400), &(0x7f0000000440)=0x8) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, &(0x7f00000019c0)={0x20}, 0x1) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r1, 0x111, 0x5, 0xc3, 0x4) r2 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x1, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r2, 0xc0045516, &(0x7f0000000040)=0x4) arch_prctl$ARCH_GET_CPUID(0x1011) getpgrp(0x0) flock(r0, 0x0) ioctl$BLKRRPART(0xffffffffffffffff, 0x125f, 0x0) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000200)={@mcast2}) fcntl$F_GET_FILE_RW_HINT(r0, 0x40d, &(0x7f00000000c0)) setsockopt$RDS_CONG_MONITOR(r2, 0x114, 0x6, &(0x7f0000000280), 0x4) ioctl$VHOST_SET_LOG_FD(r2, 0x4004af07, 0x0) ioctl$DRM_IOCTL_IRQ_BUSID(r2, 0xc0106403, &(0x7f0000000100)={0x8875, 0x800, 0x8000, 0xc2}) ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000180)) ioctl$VHOST_SET_VRING_CALL(0xffffffffffffffff, 0x4008af21, &(0x7f0000000380)={0x0, r1}) r3 = fcntl$dupfd(r1, 0x0, r2) setsockopt$IP_VS_SO_SET_STOPDAEMON(r3, 0x0, 0x48c, &(0x7f0000000140)={0x3, 'veth0\x00'}, 0x18) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.cpu/syz1\x00', 0x1ff) openat$snapshot(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/snapshot\x00', 0x0, 0x0) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0xf7fffffffffffffd, 0x2012, r2, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000a40)={0x0, 0x0, 0x0}, 0x24044000) unshare(0x40000000) mount$9p_virtio(&(0x7f00000003c0)='em0%$!,cgroup#\x00', &(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='9p\x00', 0x200000, &(0x7f0000000500)={'trans=virtio,', {[{@afid={'afid', 0x3d, 0x6}}, {@version_L='version=9p2000.L'}, {@cache_none='cache=none'}], [{@subj_role={'subj_role', 0x3d, '/dev/dsp#\x00'}}, {@permit_directio='permit_directio'}, {@measure='measure'}, {@context={'context', 0x3d, 'system_u'}}, {@obj_user={'obj_user'}}, {@dont_hash='dont_hash'}, {@subj_type={'subj_type', 0x3d, '\\eth0('}}, {@fsuuid={'fsuuid', 0x3d, {[0x36, 0x79, 0x0, 0x33, 0x61, 0x62, 0x32], 0x2d, [0x77, 0x32, 0x77, 0x34], 0x2d, [0x7f, 0x67, 0x37, 0x77], 0x2d, [0x0, 0x38, 0x32, 0x33], 0x2d, [0x35, 0x37, 0x7f, 0x7b, 0x37, 0x39, 0x77, 0x33]}}}, {@dont_measure='dont_measure'}]}}) ioctl$VIDIOC_ENUMINPUT(r1, 0xc050561a, &(0x7f0000000300)={0x4, "443b36c4364670c73c2ad26e1952769039650793d10fc72d24ce46e327d06e2f", 0x3, 0x100, 0x4, 0x1057ff, 0x0, 0x6}) 06:23:29 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000040)="2e0000002500817ee45ae087185082cf0f24b0eba025c400002339e00586f9835b3f0016914879008cd90080e230", 0x2e}], 0x1}, 0x0) 06:23:29 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = creat(&(0x7f0000000000)='./bus\x00', 0x0) getrlimit(0x0, &(0x7f00000000c0)) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x108000000000000}) 06:23:29 executing program 3: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x101005, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f000082ef0a)=""/246) pwritev(r0, &(0x7f00000000c0)=[{&(0x7f0000000180)="80fde5", 0x3}], 0x1, 0x0) [ 514.260499][T17961] __nla_parse: 20 callbacks suppressed [ 514.260583][T17961] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.5'. [ 514.408806][T17964] IPVS: ftp: loaded support on port[0] = 21 [ 514.463153][T17968] IPVS: ftp: loaded support on port[0] = 21 [ 514.509918][T17966] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.4'. [ 514.538435][T17971] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.5'. [ 514.556187][T17972] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.4'. 06:23:30 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000040)="2e0000002500817ee45ae087185082cf0f24b0eba063c400002339e00586f9835b3f0016914879008cd90080e230", 0x2e}], 0x1}, 0x0) 06:23:30 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000040)="2e0000002500817ee45ae087185082cf0f24b0eba06ec400062339e00586f9835b3f0016914879008cd90080e230", 0x2e}], 0x1}, 0x0) [ 514.714773][T17979] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.5'. [ 514.726853][T17980] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.4'. 06:23:30 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000040)="2e0000002500817ee45ae087185082cf0f24b0eba06ec400072339e00586f9835b3f0016914879008cd90080e230", 0x2e}], 0x1}, 0x0) [ 514.767813][T17981] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.5'. [ 514.786851][T17982] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.4'. 06:23:31 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000040)="2e0000002500817ee45ae087185082cf0f24b0eba06ec402002339e00586f9835b3f0016914879008cd90080e230", 0x2e}], 0x1}, 0x0) 06:23:31 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, &(0x7f00000019c0)={0x20}, 0x1) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r1, 0x111, 0x5, 0xc3, 0x4) r2 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x1, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r2, 0xc0045516, &(0x7f0000000040)=0x4) arch_prctl$ARCH_GET_CPUID(0x1011) getpgrp(0x0) flock(r0, 0x0) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000200)={@mcast2}) setsockopt$RDS_CONG_MONITOR(r2, 0x114, 0x6, &(0x7f0000000280), 0x4) ioctl$VHOST_SET_LOG_FD(r2, 0x4004af07, 0x0) ioctl$DRM_IOCTL_IRQ_BUSID(r2, 0xc0106403, &(0x7f0000000100)={0x8875, 0x800, 0x8000, 0xc2}) ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000180)) ioctl$VHOST_SET_VRING_CALL(0xffffffffffffffff, 0x4008af21, &(0x7f0000000380)={0x0, r1}) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x3, 'veth0\x00'}, 0x18) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.cpu/syz1\x00', 0x1ff) openat$snapshot(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/snapshot\x00', 0x0, 0x0) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0xf7fffffffffffffd, 0x2012, r2, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000a40)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x20008000}, 0x24044000) unshare(0x40000000) mount$9p_virtio(&(0x7f00000003c0)='em0%$!,cgroup#\x00', &(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='9p\x00', 0x200000, &(0x7f0000000500)={'trans=virtio,', {[{@afid={'afid', 0x3d, 0x6}}, {@version_L='version=9p2000.L'}, {@cache_none='cache=none'}], [{@subj_role={'subj_role', 0x3d, '/dev/dsp#\x00'}}, {@permit_directio='permit_directio'}, {@measure='measure'}, {@context={'context', 0x3d, 'system_u'}}, {@obj_user={'obj_user'}}, {@dont_hash='dont_hash'}, {@subj_type={'subj_type', 0x3d, '\\eth0('}}, {@fsuuid={'fsuuid', 0x3d, {[0x36, 0x79, 0x0, 0x33, 0x61, 0x62, 0x32], 0x2d, [0x77, 0x32, 0x77, 0x34], 0x2d, [0x7f, 0x67, 0x37, 0x77], 0x2d, [0x0, 0x38, 0x32, 0x33], 0x2d, [0x35, 0x37, 0x7f, 0x7b, 0x37, 0x39, 0x77, 0x33]}}}, {@dont_measure='dont_measure'}]}}) ioctl$VIDIOC_ENUMINPUT(r1, 0xc050561a, &(0x7f0000000300)={0x4, "443b36c4364670c73c2ad26e1952769039650793d10fc72d24ce46e327d06e2f", 0x3, 0x100, 0x4, 0x1057ff, 0x0, 0x6}) 06:23:31 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) getsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000400), &(0x7f0000000440)=0x8) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, &(0x7f00000019c0)={0x20}, 0x1) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r1, 0x111, 0x5, 0xc3, 0x4) r2 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x1, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r2, 0xc0045516, &(0x7f0000000040)=0x4) arch_prctl$ARCH_GET_CPUID(0x1011) getpgrp(0x0) flock(r0, 0x0) ioctl$BLKRRPART(0xffffffffffffffff, 0x125f, 0x0) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000200)={@mcast2}) fcntl$F_GET_FILE_RW_HINT(r0, 0x40d, &(0x7f00000000c0)) setsockopt$RDS_CONG_MONITOR(r2, 0x114, 0x6, &(0x7f0000000280), 0x4) ioctl$VHOST_SET_LOG_FD(r2, 0x4004af07, 0x0) ioctl$DRM_IOCTL_IRQ_BUSID(r2, 0xc0106403, &(0x7f0000000100)={0x8875, 0x800, 0x8000, 0xc2}) ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000180)) ioctl$VHOST_SET_VRING_CALL(0xffffffffffffffff, 0x4008af21, &(0x7f0000000380)={0x0, r1}) r3 = fcntl$dupfd(r1, 0x0, r2) setsockopt$IP_VS_SO_SET_STOPDAEMON(r3, 0x0, 0x48c, &(0x7f0000000140)={0x3, 'veth0\x00'}, 0x18) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.cpu/syz1\x00', 0x1ff) openat$snapshot(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/snapshot\x00', 0x0, 0x0) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0xf7fffffffffffffd, 0x2012, r2, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000a40)={0x0, 0x0, 0x0}, 0x24044000) unshare(0x40000000) mount$9p_virtio(&(0x7f00000003c0)='em0%$!,cgroup#\x00', &(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='9p\x00', 0x200000, &(0x7f0000000500)={'trans=virtio,', {[{@afid={'afid', 0x3d, 0x6}}, {@version_L='version=9p2000.L'}, {@cache_none='cache=none'}], [{@subj_role={'subj_role', 0x3d, '/dev/dsp#\x00'}}, {@permit_directio='permit_directio'}, {@measure='measure'}, {@context={'context', 0x3d, 'system_u'}}, {@obj_user={'obj_user'}}, {@dont_hash='dont_hash'}, {@subj_type={'subj_type', 0x3d, '\\eth0('}}, {@fsuuid={'fsuuid', 0x3d, {[0x36, 0x79, 0x0, 0x33, 0x61, 0x62, 0x32], 0x2d, [0x77, 0x32, 0x77, 0x34], 0x2d, [0x7f, 0x67, 0x37, 0x77], 0x2d, [0x0, 0x38, 0x32, 0x33], 0x2d, [0x35, 0x37, 0x7f, 0x7b, 0x37, 0x39, 0x77, 0x33]}}}, {@dont_measure='dont_measure'}]}}) ioctl$VIDIOC_ENUMINPUT(r1, 0xc050561a, &(0x7f0000000300)={0x4, "443b36c4364670c73c2ad26e1952769039650793d10fc72d24ce46e327d06e2f", 0x3, 0x100, 0x4, 0x1057ff, 0x0, 0x6}) 06:23:31 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = creat(&(0x7f0000000000)='./bus\x00', 0x0) getrlimit(0x0, &(0x7f00000000c0)) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x180000000000000}) [ 515.796829][T17989] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.4'. 06:23:31 executing program 3: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x101005, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f000082ef0a)=""/246) pwritev(r0, &(0x7f00000000c0)=[{&(0x7f0000000180)="80fde5", 0x3}], 0x1, 0x0) [ 515.868828][T17997] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.4'. 06:23:31 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000040)="2e0000002500817ee45ae087185082cf0f24b0eba06ec403002339e00586f9835b3f0016914879008cd90080e230", 0x2e}], 0x1}, 0x0) 06:23:31 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000040)="2e0000002500817ee45ae087185082cf0f24b0eba06ec400082339e00586f9835b3f0016914879008cd90080e230", 0x2e}], 0x1}, 0x0) [ 516.032161][T18000] IPVS: ftp: loaded support on port[0] = 21 06:23:31 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000040)="2e0000002500817ee45ae087185082cf0f24b0eba06ec404002339e00586f9835b3f0016914879008cd90080e230", 0x2e}], 0x1}, 0x0) 06:23:31 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000040)="2e0000002500817ee45ae087185082cf0f24b0eba06ec4000a2339e00586f9835b3f0016914879008cd90080e230", 0x2e}], 0x1}, 0x0) [ 516.416370][T17996] IPVS: ftp: loaded support on port[0] = 21 06:23:32 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000040)="2e0000002500817ee45ae087185082cf0f24b0eba06ec405002339e00586f9835b3f0016914879008cd90080e230", 0x2e}], 0x1}, 0x0) 06:23:32 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000040)="2e0000002500817ee45ae087185082cf0f24b0eba06ec4000e2339e00586f9835b3f0016914879008cd90080e230", 0x2e}], 0x1}, 0x0) 06:23:32 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = creat(&(0x7f0000000000)='./bus\x00', 0x0) getrlimit(0x0, &(0x7f00000000c0)) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x180010000000000}) 06:23:32 executing program 3: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x101005, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f000082ef0a)=""/246) pwritev(r0, &(0x7f00000000c0)=[{&(0x7f0000000180)="80fde5", 0x3}], 0x1, 0x0) 06:23:35 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, &(0x7f00000019c0)={0x20}, 0x1) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r1, 0x111, 0x5, 0xc3, 0x4) r2 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x1, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r2, 0xc0045516, &(0x7f0000000040)=0x4) arch_prctl$ARCH_GET_CPUID(0x1011) getpgrp(0x0) flock(r0, 0x0) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000200)={@mcast2}) setsockopt$RDS_CONG_MONITOR(r2, 0x114, 0x6, &(0x7f0000000280), 0x4) ioctl$VHOST_SET_LOG_FD(r2, 0x4004af07, 0x0) ioctl$DRM_IOCTL_IRQ_BUSID(r2, 0xc0106403, &(0x7f0000000100)={0x8875, 0x800, 0x8000, 0xc2}) ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000180)) ioctl$VHOST_SET_VRING_CALL(0xffffffffffffffff, 0x4008af21, &(0x7f0000000380)={0x0, r1}) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x3, 'veth0\x00'}, 0x18) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.cpu/syz1\x00', 0x1ff) openat$snapshot(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/snapshot\x00', 0x0, 0x0) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0xf7fffffffffffffd, 0x2012, r2, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000a40)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x20008000}, 0x24044000) unshare(0x40000000) mount$9p_virtio(&(0x7f00000003c0)='em0%$!,cgroup#\x00', &(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='9p\x00', 0x200000, &(0x7f0000000500)={'trans=virtio,', {[{@afid={'afid', 0x3d, 0x6}}, {@version_L='version=9p2000.L'}, {@cache_none='cache=none'}], [{@subj_role={'subj_role', 0x3d, '/dev/dsp#\x00'}}, {@permit_directio='permit_directio'}, {@measure='measure'}, {@context={'context', 0x3d, 'system_u'}}, {@obj_user={'obj_user'}}, {@dont_hash='dont_hash'}, {@subj_type={'subj_type', 0x3d, '\\eth0('}}, {@fsuuid={'fsuuid', 0x3d, {[0x36, 0x79, 0x0, 0x33, 0x61, 0x62, 0x32], 0x2d, [0x77, 0x32, 0x77, 0x34], 0x2d, [0x7f, 0x67, 0x37, 0x77], 0x2d, [0x0, 0x38, 0x32, 0x33], 0x2d, [0x35, 0x37, 0x7f, 0x7b, 0x37, 0x39, 0x77, 0x33]}}}, {@dont_measure='dont_measure'}]}}) ioctl$VIDIOC_ENUMINPUT(r1, 0xc050561a, &(0x7f0000000300)={0x4, "443b36c4364670c73c2ad26e1952769039650793d10fc72d24ce46e327d06e2f", 0x3, 0x100, 0x4, 0x1057ff, 0x0, 0x6}) 06:23:35 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000040)="2e0000002500817ee45ae087185082cf0f24b0eba06ec406002339e00586f9835b3f0016914879008cd90080e230", 0x2e}], 0x1}, 0x0) 06:23:35 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = creat(&(0x7f0000000000)='./bus\x00', 0x0) getrlimit(0x0, &(0x7f00000000c0)) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x180020000000000}) 06:23:35 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000040)="2e0000002500817ee45ae087185082cf0f24b0eba06ec400102339e00586f9835b3f0016914879008cd90080e230", 0x2e}], 0x1}, 0x0) 06:23:35 executing program 3: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x101005, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f000082ef0a)=""/246) pwritev(r0, &(0x7f00000000c0)=[{&(0x7f0000000180)="80fde56d49", 0x5}], 0x1, 0x0) 06:23:35 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) getsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000400), &(0x7f0000000440)=0x8) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, &(0x7f00000019c0)={0x20}, 0x1) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r1, 0x111, 0x5, 0xc3, 0x4) r2 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x1, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r2, 0xc0045516, &(0x7f0000000040)=0x4) arch_prctl$ARCH_GET_CPUID(0x1011) getpgrp(0x0) flock(r0, 0x0) ioctl$BLKRRPART(0xffffffffffffffff, 0x125f, 0x0) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000200)={@mcast2}) fcntl$F_GET_FILE_RW_HINT(r0, 0x40d, &(0x7f00000000c0)) setsockopt$RDS_CONG_MONITOR(r2, 0x114, 0x6, &(0x7f0000000280), 0x4) ioctl$VHOST_SET_LOG_FD(r2, 0x4004af07, 0x0) ioctl$DRM_IOCTL_IRQ_BUSID(r2, 0xc0106403, &(0x7f0000000100)={0x8875, 0x800, 0x8000, 0xc2}) ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000180)) ioctl$VHOST_SET_VRING_CALL(0xffffffffffffffff, 0x4008af21, &(0x7f0000000380)={0x0, r1}) r3 = fcntl$dupfd(r1, 0x0, r2) setsockopt$IP_VS_SO_SET_STOPDAEMON(r3, 0x0, 0x48c, &(0x7f0000000140)={0x3, 'veth0\x00'}, 0x18) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.cpu/syz1\x00', 0x1ff) openat$snapshot(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/snapshot\x00', 0x0, 0x0) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0xf7fffffffffffffd, 0x2012, r2, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000a40)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x20008000}, 0x0) unshare(0x40000000) mount$9p_virtio(&(0x7f00000003c0)='em0%$!,cgroup#\x00', &(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='9p\x00', 0x200000, &(0x7f0000000500)={'trans=virtio,', {[{@afid={'afid', 0x3d, 0x6}}, {@version_L='version=9p2000.L'}, {@cache_none='cache=none'}], [{@subj_role={'subj_role', 0x3d, '/dev/dsp#\x00'}}, {@permit_directio='permit_directio'}, {@measure='measure'}, {@context={'context', 0x3d, 'system_u'}}, {@obj_user={'obj_user'}}, {@dont_hash='dont_hash'}, {@subj_type={'subj_type', 0x3d, '\\eth0('}}, {@fsuuid={'fsuuid', 0x3d, {[0x36, 0x79, 0x0, 0x33, 0x61, 0x62, 0x32], 0x2d, [0x77, 0x32, 0x77, 0x34], 0x2d, [0x7f, 0x67, 0x37, 0x77], 0x2d, [0x0, 0x38, 0x32, 0x33], 0x2d, [0x35, 0x37, 0x7f, 0x7b, 0x37, 0x39, 0x77, 0x33]}}}, {@dont_measure='dont_measure'}]}}) ioctl$VIDIOC_ENUMINPUT(r1, 0xc050561a, &(0x7f0000000300)={0x4, "443b36c4364670c73c2ad26e1952769039650793d10fc72d24ce46e327d06e2f", 0x3, 0x100, 0x4, 0x1057ff, 0x0, 0x6}) [ 520.244557][T18051] __nla_parse: 14 callbacks suppressed [ 520.244567][T18051] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.5'. [ 520.282519][T18047] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.4'. [ 520.445779][T18054] IPVS: ftp: loaded support on port[0] = 21 [ 520.456725][T18057] IPVS: ftp: loaded support on port[0] = 21 [ 520.556607][T18061] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.4'. [ 520.581213][T18059] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.5'. 06:23:36 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000040)="2e0000002500817ee45ae087185082cf0f24b0eba06ec400482339e00586f9835b3f0016914879008cd90080e230", 0x2e}], 0x1}, 0x0) 06:23:36 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000040)="2e0000002500817ee45ae087185082cf0f24b0eba06ec407002339e00586f9835b3f0016914879008cd90080e230", 0x2e}], 0x1}, 0x0) 06:23:36 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = creat(&(0x7f0000000000)='./bus\x00', 0x0) getrlimit(0x0, &(0x7f00000000c0)) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x180030000000000}) [ 520.724078][T18071] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.5'. [ 520.758172][T18074] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.5'. [ 520.790477][T18075] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.4'. [ 520.829776][T18078] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.4'. 06:23:36 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000040)="2e0000002500817ee45ae087185082cf0f24b0eba06ec4004c2339e00586f9835b3f0016914879008cd90080e230", 0x2e}], 0x1}, 0x0) 06:23:36 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000040)="2e0000002500817ee45ae087185082cf0f24b0eba06ec408002339e00586f9835b3f0016914879008cd90080e230", 0x2e}], 0x1}, 0x0) [ 521.252432][T18082] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.4'. [ 521.266061][T18083] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.4'. 06:23:37 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000040)="2e0000002500817ee45ae087185082cf0f24b0eba06ec400602339e00586f9835b3f0016914879008cd90080e230", 0x2e}], 0x1}, 0x0) 06:23:37 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, &(0x7f00000019c0)={0x20}, 0x1) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r1, 0x111, 0x5, 0xc3, 0x4) r2 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x1, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r2, 0xc0045516, &(0x7f0000000040)=0x4) arch_prctl$ARCH_GET_CPUID(0x1011) getpgrp(0x0) flock(r0, 0x0) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000200)={@mcast2}) setsockopt$RDS_CONG_MONITOR(r2, 0x114, 0x6, &(0x7f0000000280), 0x4) ioctl$VHOST_SET_LOG_FD(r2, 0x4004af07, 0x0) ioctl$DRM_IOCTL_IRQ_BUSID(r2, 0xc0106403, &(0x7f0000000100)={0x8875, 0x800, 0x8000, 0xc2}) ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000180)) ioctl$VHOST_SET_VRING_CALL(0xffffffffffffffff, 0x4008af21, &(0x7f0000000380)={0x0, r1}) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x3, 'veth0\x00'}, 0x18) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.cpu/syz1\x00', 0x1ff) openat$snapshot(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/snapshot\x00', 0x0, 0x0) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0xf7fffffffffffffd, 0x2012, r2, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000a40)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x20008000}, 0x24044000) unshare(0x40000000) mount$9p_virtio(&(0x7f00000003c0)='em0%$!,cgroup#\x00', &(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='9p\x00', 0x200000, &(0x7f0000000500)={'trans=virtio,', {[{@afid={'afid', 0x3d, 0x6}}, {@version_L='version=9p2000.L'}, {@cache_none='cache=none'}], [{@subj_role={'subj_role', 0x3d, '/dev/dsp#\x00'}}, {@permit_directio='permit_directio'}, {@measure='measure'}, {@context={'context', 0x3d, 'system_u'}}, {@obj_user={'obj_user'}}, {@dont_hash='dont_hash'}, {@subj_type={'subj_type', 0x3d, '\\eth0('}}, {@fsuuid={'fsuuid', 0x3d, {[0x36, 0x79, 0x0, 0x33, 0x61, 0x62, 0x32], 0x2d, [0x77, 0x32, 0x77, 0x34], 0x2d, [0x7f, 0x67, 0x37, 0x77], 0x2d, [0x0, 0x38, 0x32, 0x33], 0x2d, [0x35, 0x37, 0x7f, 0x7b, 0x37, 0x39, 0x77, 0x33]}}}, {@dont_measure='dont_measure'}]}}) ioctl$VIDIOC_ENUMINPUT(r1, 0xc050561a, &(0x7f0000000300)={0x4, "443b36c4364670c73c2ad26e1952769039650793d10fc72d24ce46e327d06e2f", 0x3, 0x100, 0x4, 0x1057ff, 0x0, 0x6}) 06:23:37 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = creat(&(0x7f0000000000)='./bus\x00', 0x0) getrlimit(0x0, &(0x7f00000000c0)) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x180040000000000}) 06:23:37 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000040)="2e0000002500817ee45ae087185082cf0f24b0eba06ec40a002339e00586f9835b3f0016914879008cd90080e230", 0x2e}], 0x1}, 0x0) 06:23:37 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) getsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000400), &(0x7f0000000440)=0x8) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, &(0x7f00000019c0)={0x20}, 0x1) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r1, 0x111, 0x5, 0xc3, 0x4) r2 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x1, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r2, 0xc0045516, &(0x7f0000000040)=0x4) arch_prctl$ARCH_GET_CPUID(0x1011) getpgrp(0x0) flock(r0, 0x0) ioctl$BLKRRPART(0xffffffffffffffff, 0x125f, 0x0) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000200)={@mcast2}) fcntl$F_GET_FILE_RW_HINT(r0, 0x40d, &(0x7f00000000c0)) setsockopt$RDS_CONG_MONITOR(r2, 0x114, 0x6, &(0x7f0000000280), 0x4) ioctl$VHOST_SET_LOG_FD(r2, 0x4004af07, 0x0) ioctl$DRM_IOCTL_IRQ_BUSID(r2, 0xc0106403, &(0x7f0000000100)={0x8875, 0x800, 0x8000, 0xc2}) ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000180)) ioctl$VHOST_SET_VRING_CALL(0xffffffffffffffff, 0x4008af21, &(0x7f0000000380)={0x0, r1}) r3 = fcntl$dupfd(r1, 0x0, r2) setsockopt$IP_VS_SO_SET_STOPDAEMON(r3, 0x0, 0x48c, &(0x7f0000000140)={0x3, 'veth0\x00'}, 0x18) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.cpu/syz1\x00', 0x1ff) openat$snapshot(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/snapshot\x00', 0x0, 0x0) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0xf7fffffffffffffd, 0x2012, r2, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000a40)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x20008000}, 0x0) unshare(0x40000000) mount$9p_virtio(&(0x7f00000003c0)='em0%$!,cgroup#\x00', &(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='9p\x00', 0x200000, &(0x7f0000000500)={'trans=virtio,', {[{@afid={'afid', 0x3d, 0x6}}, {@version_L='version=9p2000.L'}, {@cache_none='cache=none'}], [{@subj_role={'subj_role', 0x3d, '/dev/dsp#\x00'}}, {@permit_directio='permit_directio'}, {@measure='measure'}, {@context={'context', 0x3d, 'system_u'}}, {@obj_user={'obj_user'}}, {@dont_hash='dont_hash'}, {@subj_type={'subj_type', 0x3d, '\\eth0('}}, {@fsuuid={'fsuuid', 0x3d, {[0x36, 0x79, 0x0, 0x33, 0x61, 0x62, 0x32], 0x2d, [0x77, 0x32, 0x77, 0x34], 0x2d, [0x7f, 0x67, 0x37, 0x77], 0x2d, [0x0, 0x38, 0x32, 0x33], 0x2d, [0x35, 0x37, 0x7f, 0x7b, 0x37, 0x39, 0x77, 0x33]}}}, {@dont_measure='dont_measure'}]}}) ioctl$VIDIOC_ENUMINPUT(r1, 0xc050561a, &(0x7f0000000300)={0x4, "443b36c4364670c73c2ad26e1952769039650793d10fc72d24ce46e327d06e2f", 0x3, 0x100, 0x4, 0x1057ff, 0x0, 0x6}) 06:23:37 executing program 3: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x101005, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f000082ef0a)=""/246) pwritev(r0, &(0x7f00000000c0)=[{&(0x7f0000000180)="80fde56d49", 0x5}], 0x1, 0x0) 06:23:37 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000040)="2e0000002500817ee45ae087185082cf0f24b0eba06ec40e002339e00586f9835b3f0016914879008cd90080e230", 0x2e}], 0x1}, 0x0) [ 521.699982][T18103] IPVS: ftp: loaded support on port[0] = 21 [ 521.701592][T18104] IPVS: ftp: loaded support on port[0] = 21 06:23:38 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000040)="2e0000002500817ee45ae087185082cf0f24b0eba06ec400682339e00586f9835b3f0016914879008cd90080e230", 0x2e}], 0x1}, 0x0) 06:23:38 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = creat(&(0x7f0000000000)='./bus\x00', 0x0) getrlimit(0x0, &(0x7f00000000c0)) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x186000000000000}) 06:23:38 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000400), &(0x7f0000000440)=0x8) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, &(0x7f00000019c0)={0x20}, 0x1) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r1, 0x111, 0x5, 0xc3, 0x4) r2 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x1, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r2, 0xc0045516, &(0x7f0000000040)=0x4) arch_prctl$ARCH_GET_CPUID(0x1011) getpgrp(0x0) flock(r0, 0x0) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000200)={@mcast2}) setsockopt$RDS_CONG_MONITOR(r2, 0x114, 0x6, &(0x7f0000000280), 0x4) ioctl$VHOST_SET_LOG_FD(r2, 0x4004af07, 0x0) ioctl$DRM_IOCTL_IRQ_BUSID(r2, 0xc0106403, &(0x7f0000000100)={0x8875, 0x800, 0x8000, 0xc2}) ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000180)) ioctl$VHOST_SET_VRING_CALL(0xffffffffffffffff, 0x4008af21, &(0x7f0000000380)={0x0, r1}) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x3, 'veth0\x00'}, 0x18) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.cpu/syz1\x00', 0x1ff) openat$snapshot(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/snapshot\x00', 0x0, 0x0) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0xf7fffffffffffffd, 0x2012, r2, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000a40)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x20008000}, 0x24044000) unshare(0x40000000) mount$9p_virtio(&(0x7f00000003c0)='em0%$!,cgroup#\x00', &(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='9p\x00', 0x200000, &(0x7f0000000500)={'trans=virtio,', {[{@afid={'afid', 0x3d, 0x6}}, {@version_L='version=9p2000.L'}, {@cache_none='cache=none'}], [{@subj_role={'subj_role', 0x3d, '/dev/dsp#\x00'}}, {@permit_directio='permit_directio'}, {@measure='measure'}, {@context={'context', 0x3d, 'system_u'}}, {@obj_user={'obj_user'}}, {@dont_hash='dont_hash'}, {@subj_type={'subj_type', 0x3d, '\\eth0('}}, {@fsuuid={'fsuuid', 0x3d, {[0x36, 0x79, 0x0, 0x33, 0x61, 0x62, 0x32], 0x2d, [0x77, 0x32, 0x77, 0x34], 0x2d, [0x7f, 0x67, 0x37, 0x77], 0x2d, [0x0, 0x38, 0x32, 0x33], 0x2d, [0x35, 0x37, 0x7f, 0x7b, 0x37, 0x39, 0x77, 0x33]}}}, {@dont_measure='dont_measure'}]}}) ioctl$VIDIOC_ENUMINPUT(r1, 0xc050561a, &(0x7f0000000300)={0x4, "443b36c4364670c73c2ad26e1952769039650793d10fc72d24ce46e327d06e2f", 0x3, 0x100, 0x4, 0x1057ff, 0x0, 0x6}) 06:23:38 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) getsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000400), &(0x7f0000000440)=0x8) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, &(0x7f00000019c0)={0x20}, 0x1) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r1, 0x111, 0x5, 0xc3, 0x4) r2 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x1, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r2, 0xc0045516, &(0x7f0000000040)=0x4) arch_prctl$ARCH_GET_CPUID(0x1011) getpgrp(0x0) flock(r0, 0x0) ioctl$BLKRRPART(0xffffffffffffffff, 0x125f, 0x0) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000200)={@mcast2}) fcntl$F_GET_FILE_RW_HINT(r0, 0x40d, &(0x7f00000000c0)) setsockopt$RDS_CONG_MONITOR(r2, 0x114, 0x6, &(0x7f0000000280), 0x4) ioctl$VHOST_SET_LOG_FD(r2, 0x4004af07, 0x0) ioctl$DRM_IOCTL_IRQ_BUSID(r2, 0xc0106403, &(0x7f0000000100)={0x8875, 0x800, 0x8000, 0xc2}) ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000180)) ioctl$VHOST_SET_VRING_CALL(0xffffffffffffffff, 0x4008af21, &(0x7f0000000380)={0x0, r1}) r3 = fcntl$dupfd(r1, 0x0, r2) setsockopt$IP_VS_SO_SET_STOPDAEMON(r3, 0x0, 0x48c, &(0x7f0000000140)={0x3, 'veth0\x00'}, 0x18) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.cpu/syz1\x00', 0x1ff) openat$snapshot(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/snapshot\x00', 0x0, 0x0) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0xf7fffffffffffffd, 0x2012, r2, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000a40)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x20008000}, 0x0) unshare(0x40000000) mount$9p_virtio(&(0x7f00000003c0)='em0%$!,cgroup#\x00', &(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='9p\x00', 0x200000, &(0x7f0000000500)={'trans=virtio,', {[{@afid={'afid', 0x3d, 0x6}}, {@version_L='version=9p2000.L'}, {@cache_none='cache=none'}], [{@subj_role={'subj_role', 0x3d, '/dev/dsp#\x00'}}, {@permit_directio='permit_directio'}, {@measure='measure'}, {@context={'context', 0x3d, 'system_u'}}, {@obj_user={'obj_user'}}, {@dont_hash='dont_hash'}, {@subj_type={'subj_type', 0x3d, '\\eth0('}}, {@fsuuid={'fsuuid', 0x3d, {[0x36, 0x79, 0x0, 0x33, 0x61, 0x62, 0x32], 0x2d, [0x77, 0x32, 0x77, 0x34], 0x2d, [0x7f, 0x67, 0x37, 0x77], 0x2d, [0x0, 0x38, 0x32, 0x33], 0x2d, [0x35, 0x37, 0x7f, 0x7b, 0x37, 0x39, 0x77, 0x33]}}}, {@dont_measure='dont_measure'}]}}) ioctl$VIDIOC_ENUMINPUT(r1, 0xc050561a, &(0x7f0000000300)={0x4, "443b36c4364670c73c2ad26e1952769039650793d10fc72d24ce46e327d06e2f", 0x3, 0x100, 0x4, 0x1057ff, 0x0, 0x6}) 06:23:38 executing program 3: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x101005, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f000082ef0a)=""/246) pwritev(r0, &(0x7f00000000c0)=[{&(0x7f0000000180)="80fde56d49", 0x5}], 0x1, 0x0) 06:23:38 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000040)="2e0000002500817ee45ae087185082cf0f24b0eba06ec40f002339e00586f9835b3f0016914879008cd90080e230", 0x2e}], 0x1}, 0x0) 06:23:38 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = creat(&(0x7f0000000000)='./bus\x00', 0x0) getrlimit(0x0, &(0x7f00000000c0)) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x1a4000000000000}) 06:23:38 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000040)="2e0000002500817ee45ae087185082cf0f24b0eba06ec4006c2339e00586f9835b3f0016914879008cd90080e230", 0x2e}], 0x1}, 0x0) [ 523.054931][T18134] IPVS: ftp: loaded support on port[0] = 21 [ 523.068912][T18129] IPVS: ftp: loaded support on port[0] = 21 06:23:38 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000040)="2e0000002500817ee45ae087185082cf0f24b0eba06ec410002339e00586f9835b3f0016914879008cd90080e230", 0x2e}], 0x1}, 0x0) 06:23:38 executing program 3: 06:23:38 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000040)="2e0000002500817ee45ae087185082cf0f24b0eba06ec400742339e00586f9835b3f0016914879008cd90080e230", 0x2e}], 0x1}, 0x0) 06:23:38 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000040)="2e0000002500817ee45ae087185082cf0f24b0eba06ec448002339e00586f9835b3f0016914879008cd90080e230", 0x2e}], 0x1}, 0x0) 06:23:39 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = creat(&(0x7f0000000000)='./bus\x00', 0x0) getrlimit(0x0, &(0x7f00000000c0)) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x200000000000000}) 06:23:39 executing program 3: 06:23:39 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000400), &(0x7f0000000440)=0x8) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, &(0x7f00000019c0)={0x20}, 0x1) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r1, 0x111, 0x5, 0xc3, 0x4) r2 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x1, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r2, 0xc0045516, &(0x7f0000000040)=0x4) arch_prctl$ARCH_GET_CPUID(0x1011) getpgrp(0x0) flock(r0, 0x0) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000200)={@mcast2}) setsockopt$RDS_CONG_MONITOR(r2, 0x114, 0x6, &(0x7f0000000280), 0x4) ioctl$VHOST_SET_LOG_FD(r2, 0x4004af07, 0x0) ioctl$DRM_IOCTL_IRQ_BUSID(r2, 0xc0106403, &(0x7f0000000100)={0x8875, 0x800, 0x8000, 0xc2}) ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000180)) ioctl$VHOST_SET_VRING_CALL(0xffffffffffffffff, 0x4008af21, &(0x7f0000000380)={0x0, r1}) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x3, 'veth0\x00'}, 0x18) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.cpu/syz1\x00', 0x1ff) openat$snapshot(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/snapshot\x00', 0x0, 0x0) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0xf7fffffffffffffd, 0x2012, r2, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000a40)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x20008000}, 0x24044000) unshare(0x40000000) mount$9p_virtio(&(0x7f00000003c0)='em0%$!,cgroup#\x00', &(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='9p\x00', 0x200000, &(0x7f0000000500)={'trans=virtio,', {[{@afid={'afid', 0x3d, 0x6}}, {@version_L='version=9p2000.L'}, {@cache_none='cache=none'}], [{@subj_role={'subj_role', 0x3d, '/dev/dsp#\x00'}}, {@permit_directio='permit_directio'}, {@measure='measure'}, {@context={'context', 0x3d, 'system_u'}}, {@obj_user={'obj_user'}}, {@dont_hash='dont_hash'}, {@subj_type={'subj_type', 0x3d, '\\eth0('}}, {@fsuuid={'fsuuid', 0x3d, {[0x36, 0x79, 0x0, 0x33, 0x61, 0x62, 0x32], 0x2d, [0x77, 0x32, 0x77, 0x34], 0x2d, [0x7f, 0x67, 0x37, 0x77], 0x2d, [0x0, 0x38, 0x32, 0x33], 0x2d, [0x35, 0x37, 0x7f, 0x7b, 0x37, 0x39, 0x77, 0x33]}}}, {@dont_measure='dont_measure'}]}}) ioctl$VIDIOC_ENUMINPUT(r1, 0xc050561a, &(0x7f0000000300)={0x4, "443b36c4364670c73c2ad26e1952769039650793d10fc72d24ce46e327d06e2f", 0x3, 0x100, 0x4, 0x1057ff, 0x0, 0x6}) 06:23:39 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) getsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000400), &(0x7f0000000440)=0x8) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, &(0x7f00000019c0)={0x20}, 0x1) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r1, 0x111, 0x5, 0xc3, 0x4) r2 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x1, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r2, 0xc0045516, &(0x7f0000000040)=0x4) arch_prctl$ARCH_GET_CPUID(0x1011) getpgrp(0x0) flock(r0, 0x0) ioctl$BLKRRPART(0xffffffffffffffff, 0x125f, 0x0) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000200)={@mcast2}) fcntl$F_GET_FILE_RW_HINT(r0, 0x40d, &(0x7f00000000c0)) setsockopt$RDS_CONG_MONITOR(r2, 0x114, 0x6, &(0x7f0000000280), 0x4) ioctl$VHOST_SET_LOG_FD(r2, 0x4004af07, 0x0) ioctl$DRM_IOCTL_IRQ_BUSID(r2, 0xc0106403, &(0x7f0000000100)={0x8875, 0x800, 0x8000, 0xc2}) ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000180)) ioctl$VHOST_SET_VRING_CALL(0xffffffffffffffff, 0x4008af21, &(0x7f0000000380)={0x0, r1}) r3 = fcntl$dupfd(r1, 0x0, r2) setsockopt$IP_VS_SO_SET_STOPDAEMON(r3, 0x0, 0x48c, &(0x7f0000000140)={0x3, 'veth0\x00'}, 0x18) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.cpu/syz1\x00', 0x1ff) openat$snapshot(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/snapshot\x00', 0x0, 0x0) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0xf7fffffffffffffd, 0x2012, r2, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000a40)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x20008000}, 0x24044000) unshare(0x0) mount$9p_virtio(&(0x7f00000003c0)='em0%$!,cgroup#\x00', &(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='9p\x00', 0x200000, &(0x7f0000000500)={'trans=virtio,', {[{@afid={'afid', 0x3d, 0x6}}, {@version_L='version=9p2000.L'}, {@cache_none='cache=none'}], [{@subj_role={'subj_role', 0x3d, '/dev/dsp#\x00'}}, {@permit_directio='permit_directio'}, {@measure='measure'}, {@context={'context', 0x3d, 'system_u'}}, {@obj_user={'obj_user'}}, {@dont_hash='dont_hash'}, {@subj_type={'subj_type', 0x3d, '\\eth0('}}, {@fsuuid={'fsuuid', 0x3d, {[0x36, 0x79, 0x0, 0x33, 0x61, 0x62, 0x32], 0x2d, [0x77, 0x32, 0x77, 0x34], 0x2d, [0x7f, 0x67, 0x37, 0x77], 0x2d, [0x0, 0x38, 0x32, 0x33], 0x2d, [0x35, 0x37, 0x7f, 0x7b, 0x37, 0x39, 0x77, 0x33]}}}, {@dont_measure='dont_measure'}]}}) ioctl$VIDIOC_ENUMINPUT(r1, 0xc050561a, &(0x7f0000000300)={0x4, "443b36c4364670c73c2ad26e1952769039650793d10fc72d24ce46e327d06e2f", 0x3, 0x100, 0x4, 0x1057ff, 0x0, 0x6}) 06:23:39 executing program 3: 06:23:39 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000040)="2e0000002500817ee45ae087185082cf0f24b0eba06ec4007a2339e00586f9835b3f0016914879008cd90080e230", 0x2e}], 0x1}, 0x0) 06:23:39 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000040)="2e0000002500817ee45ae087185082cf0f24b0eba06ec44c002339e00586f9835b3f0016914879008cd90080e230", 0x2e}], 0x1}, 0x0) 06:23:39 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = creat(&(0x7f0000000000)='./bus\x00', 0x0) getrlimit(0x0, &(0x7f00000000c0)) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x280030000000000}) 06:23:39 executing program 3: 06:23:39 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) getsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000400), &(0x7f0000000440)=0x8) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, &(0x7f00000019c0)={0x20}, 0x1) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r1, 0x111, 0x5, 0xc3, 0x4) r2 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x1, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r2, 0xc0045516, &(0x7f0000000040)=0x4) arch_prctl$ARCH_GET_CPUID(0x1011) getpgrp(0x0) flock(r0, 0x0) ioctl$BLKRRPART(0xffffffffffffffff, 0x125f, 0x0) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000200)={@mcast2}) fcntl$F_GET_FILE_RW_HINT(r0, 0x40d, &(0x7f00000000c0)) setsockopt$RDS_CONG_MONITOR(r2, 0x114, 0x6, &(0x7f0000000280), 0x4) ioctl$VHOST_SET_LOG_FD(r2, 0x4004af07, 0x0) ioctl$DRM_IOCTL_IRQ_BUSID(r2, 0xc0106403, &(0x7f0000000100)={0x8875, 0x800, 0x8000, 0xc2}) ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000180)) ioctl$VHOST_SET_VRING_CALL(0xffffffffffffffff, 0x4008af21, &(0x7f0000000380)={0x0, r1}) r3 = fcntl$dupfd(r1, 0x0, r2) setsockopt$IP_VS_SO_SET_STOPDAEMON(r3, 0x0, 0x48c, &(0x7f0000000140)={0x3, 'veth0\x00'}, 0x18) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.cpu/syz1\x00', 0x1ff) openat$snapshot(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/snapshot\x00', 0x0, 0x0) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0xf7fffffffffffffd, 0x2012, r2, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000a40)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x20008000}, 0x24044000) unshare(0x0) mount$9p_virtio(&(0x7f00000003c0)='em0%$!,cgroup#\x00', &(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='9p\x00', 0x200000, &(0x7f0000000500)={'trans=virtio,', {[{@afid={'afid', 0x3d, 0x6}}, {@version_L='version=9p2000.L'}, {@cache_none='cache=none'}], [{@subj_role={'subj_role', 0x3d, '/dev/dsp#\x00'}}, {@permit_directio='permit_directio'}, {@measure='measure'}, {@context={'context', 0x3d, 'system_u'}}, {@obj_user={'obj_user'}}, {@dont_hash='dont_hash'}, {@subj_type={'subj_type', 0x3d, '\\eth0('}}, {@fsuuid={'fsuuid', 0x3d, {[0x36, 0x79, 0x0, 0x33, 0x61, 0x62, 0x32], 0x2d, [0x77, 0x32, 0x77, 0x34], 0x2d, [0x7f, 0x67, 0x37, 0x77], 0x2d, [0x0, 0x38, 0x32, 0x33], 0x2d, [0x35, 0x37, 0x7f, 0x7b, 0x37, 0x39, 0x77, 0x33]}}}, {@dont_measure='dont_measure'}]}}) ioctl$VIDIOC_ENUMINPUT(r1, 0xc050561a, &(0x7f0000000300)={0x4, "443b36c4364670c73c2ad26e1952769039650793d10fc72d24ce46e327d06e2f", 0x3, 0x100, 0x4, 0x1057ff, 0x0, 0x6}) 06:23:39 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000040)="2e0000002500817ee45ae087185082cf0f24b0eba06ec460002339e00586f9835b3f0016914879008cd90080e230", 0x2e}], 0x1}, 0x0) 06:23:39 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000040)="2e0000002500817ee45ae087185082cf0f24b0eba06ec400002339e00f86f9835b3f0016914879008cd90080e230", 0x2e}], 0x1}, 0x0) 06:23:39 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = creat(&(0x7f0000000000)='./bus\x00', 0x0) getrlimit(0x0, &(0x7f00000000c0)) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x280040000000000}) 06:23:39 executing program 3: [ 523.840388][T18190] IPVS: ftp: loaded support on port[0] = 21 06:23:39 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000400), &(0x7f0000000440)=0x8) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, &(0x7f00000019c0)={0x20}, 0x1) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r1, 0x111, 0x5, 0xc3, 0x4) r2 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x1, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r2, 0xc0045516, &(0x7f0000000040)=0x4) arch_prctl$ARCH_GET_CPUID(0x1011) getpgrp(0x0) flock(r0, 0x0) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000200)={@mcast2}) setsockopt$RDS_CONG_MONITOR(r2, 0x114, 0x6, &(0x7f0000000280), 0x4) ioctl$VHOST_SET_LOG_FD(r2, 0x4004af07, 0x0) ioctl$DRM_IOCTL_IRQ_BUSID(r2, 0xc0106403, &(0x7f0000000100)={0x8875, 0x800, 0x8000, 0xc2}) ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000180)) ioctl$VHOST_SET_VRING_CALL(0xffffffffffffffff, 0x4008af21, &(0x7f0000000380)={0x0, r1}) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x3, 'veth0\x00'}, 0x18) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.cpu/syz1\x00', 0x1ff) openat$snapshot(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/snapshot\x00', 0x0, 0x0) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0xf7fffffffffffffd, 0x2012, r2, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000a40)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x20008000}, 0x24044000) unshare(0x40000000) mount$9p_virtio(&(0x7f00000003c0)='em0%$!,cgroup#\x00', &(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='9p\x00', 0x200000, &(0x7f0000000500)={'trans=virtio,', {[{@afid={'afid', 0x3d, 0x6}}, {@version_L='version=9p2000.L'}, {@cache_none='cache=none'}], [{@subj_role={'subj_role', 0x3d, '/dev/dsp#\x00'}}, {@permit_directio='permit_directio'}, {@measure='measure'}, {@context={'context', 0x3d, 'system_u'}}, {@obj_user={'obj_user'}}, {@dont_hash='dont_hash'}, {@subj_type={'subj_type', 0x3d, '\\eth0('}}, {@fsuuid={'fsuuid', 0x3d, {[0x36, 0x79, 0x0, 0x33, 0x61, 0x62, 0x32], 0x2d, [0x77, 0x32, 0x77, 0x34], 0x2d, [0x7f, 0x67, 0x37, 0x77], 0x2d, [0x0, 0x38, 0x32, 0x33], 0x2d, [0x35, 0x37, 0x7f, 0x7b, 0x37, 0x39, 0x77, 0x33]}}}, {@dont_measure='dont_measure'}]}}) ioctl$VIDIOC_ENUMINPUT(r1, 0xc050561a, &(0x7f0000000300)={0x4, "443b36c4364670c73c2ad26e1952769039650793d10fc72d24ce46e327d06e2f", 0x3, 0x100, 0x4, 0x1057ff, 0x0, 0x6}) 06:23:39 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000040)="2e0000002500817ee45ae087185082cf0f24b0eba06ec468002339e00586f9835b3f0016914879008cd90080e230", 0x2e}], 0x1}, 0x0) 06:23:39 executing program 3: 06:23:39 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000040)="2e0000002500817ee45ae087185082cf0f24b0eba06ec400002339e01086f9835b3f0016914879008cd90080e230", 0x2e}], 0x1}, 0x0) 06:23:39 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = creat(&(0x7f0000000000)='./bus\x00', 0x0) getrlimit(0x0, &(0x7f00000000c0)) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x300000000000000}) 06:23:39 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) getsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000400), &(0x7f0000000440)=0x8) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, &(0x7f00000019c0)={0x20}, 0x1) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r1, 0x111, 0x5, 0xc3, 0x4) r2 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x1, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r2, 0xc0045516, &(0x7f0000000040)=0x4) arch_prctl$ARCH_GET_CPUID(0x1011) getpgrp(0x0) flock(r0, 0x0) ioctl$BLKRRPART(0xffffffffffffffff, 0x125f, 0x0) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000200)={@mcast2}) fcntl$F_GET_FILE_RW_HINT(r0, 0x40d, &(0x7f00000000c0)) setsockopt$RDS_CONG_MONITOR(r2, 0x114, 0x6, &(0x7f0000000280), 0x4) ioctl$VHOST_SET_LOG_FD(r2, 0x4004af07, 0x0) ioctl$DRM_IOCTL_IRQ_BUSID(r2, 0xc0106403, &(0x7f0000000100)={0x8875, 0x800, 0x8000, 0xc2}) ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000180)) ioctl$VHOST_SET_VRING_CALL(0xffffffffffffffff, 0x4008af21, &(0x7f0000000380)={0x0, r1}) r3 = fcntl$dupfd(r1, 0x0, r2) setsockopt$IP_VS_SO_SET_STOPDAEMON(r3, 0x0, 0x48c, &(0x7f0000000140)={0x3, 'veth0\x00'}, 0x18) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.cpu/syz1\x00', 0x1ff) openat$snapshot(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/snapshot\x00', 0x0, 0x0) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0xf7fffffffffffffd, 0x2012, r2, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000a40)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x20008000}, 0x24044000) unshare(0x0) mount$9p_virtio(&(0x7f00000003c0)='em0%$!,cgroup#\x00', &(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='9p\x00', 0x200000, &(0x7f0000000500)={'trans=virtio,', {[{@afid={'afid', 0x3d, 0x6}}, {@version_L='version=9p2000.L'}, {@cache_none='cache=none'}], [{@subj_role={'subj_role', 0x3d, '/dev/dsp#\x00'}}, {@permit_directio='permit_directio'}, {@measure='measure'}, {@context={'context', 0x3d, 'system_u'}}, {@obj_user={'obj_user'}}, {@dont_hash='dont_hash'}, {@subj_type={'subj_type', 0x3d, '\\eth0('}}, {@fsuuid={'fsuuid', 0x3d, {[0x36, 0x79, 0x0, 0x33, 0x61, 0x62, 0x32], 0x2d, [0x77, 0x32, 0x77, 0x34], 0x2d, [0x7f, 0x67, 0x37, 0x77], 0x2d, [0x0, 0x38, 0x32, 0x33], 0x2d, [0x35, 0x37, 0x7f, 0x7b, 0x37, 0x39, 0x77, 0x33]}}}, {@dont_measure='dont_measure'}]}}) ioctl$VIDIOC_ENUMINPUT(r1, 0xc050561a, &(0x7f0000000300)={0x4, "443b36c4364670c73c2ad26e1952769039650793d10fc72d24ce46e327d06e2f", 0x3, 0x100, 0x4, 0x1057ff, 0x0, 0x6}) 06:23:39 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x200, 0x0, 0x0, 0x0, 0x0) execve(&(0x7f0000000400)='./file0\x00', 0x0, 0x0) r1 = creat(&(0x7f0000000100)='\xe9\x1fq\x89Y\x1e\x923aK\x00', 0x40) dup2(r0, r1) open$dir(&(0x7f00000000c0)='./file0\x00', 0x841, 0x0) clone(0x3102001ff6, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000140)='\xe9\x1fq\x89Y\x1e\x923aK\x00', 0x0, 0x0) write$P9_RXATTRWALK(r1, 0x0, 0x0) 06:23:39 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000040)="2e0000002500817ee45ae087185082cf0f24b0eba06ec46c002339e00586f9835b3f0016914879008cd90080e230", 0x2e}], 0x1}, 0x0) 06:23:40 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) getsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000400), &(0x7f0000000440)=0x8) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, &(0x7f00000019c0)={0x20}, 0x1) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r1, 0x111, 0x5, 0xc3, 0x4) r2 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x1, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r2, 0xc0045516, &(0x7f0000000040)=0x4) arch_prctl$ARCH_GET_CPUID(0x1011) getpgrp(0x0) flock(r0, 0x0) ioctl$BLKRRPART(0xffffffffffffffff, 0x125f, 0x0) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000200)={@mcast2}) fcntl$F_GET_FILE_RW_HINT(r0, 0x40d, &(0x7f00000000c0)) setsockopt$RDS_CONG_MONITOR(r2, 0x114, 0x6, &(0x7f0000000280), 0x4) ioctl$VHOST_SET_LOG_FD(r2, 0x4004af07, 0x0) ioctl$DRM_IOCTL_IRQ_BUSID(r2, 0xc0106403, &(0x7f0000000100)={0x8875, 0x800, 0x8000, 0xc2}) ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000180)) ioctl$VHOST_SET_VRING_CALL(0xffffffffffffffff, 0x4008af21, &(0x7f0000000380)={0x0, r1}) r3 = fcntl$dupfd(r1, 0x0, r2) setsockopt$IP_VS_SO_SET_STOPDAEMON(r3, 0x0, 0x48c, &(0x7f0000000140)={0x3, 'veth0\x00'}, 0x18) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.cpu/syz1\x00', 0x1ff) openat$snapshot(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/snapshot\x00', 0x0, 0x0) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0xf7fffffffffffffd, 0x2012, r2, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000a40)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x20008000}, 0x24044000) unshare(0x40000000) mount$9p_virtio(0x0, &(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='9p\x00', 0x200000, &(0x7f0000000500)={'trans=virtio,', {[{@afid={'afid', 0x3d, 0x6}}, {@version_L='version=9p2000.L'}, {@cache_none='cache=none'}], [{@subj_role={'subj_role', 0x3d, '/dev/dsp#\x00'}}, {@permit_directio='permit_directio'}, {@measure='measure'}, {@context={'context', 0x3d, 'system_u'}}, {@obj_user={'obj_user'}}, {@dont_hash='dont_hash'}, {@subj_type={'subj_type', 0x3d, '\\eth0('}}, {@fsuuid={'fsuuid', 0x3d, {[0x36, 0x79, 0x0, 0x33, 0x61, 0x62, 0x32], 0x2d, [0x77, 0x32, 0x77, 0x34], 0x2d, [0x7f, 0x67, 0x37, 0x77], 0x2d, [0x0, 0x38, 0x32, 0x33], 0x2d, [0x35, 0x37, 0x7f, 0x7b, 0x37, 0x39, 0x77, 0x33]}}}, {@dont_measure='dont_measure'}]}}) ioctl$VIDIOC_ENUMINPUT(r1, 0xc050561a, &(0x7f0000000300)={0x4, "443b36c4364670c73c2ad26e1952769039650793d10fc72d24ce46e327d06e2f", 0x3, 0x100, 0x4, 0x1057ff, 0x0, 0x6}) 06:23:40 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = creat(&(0x7f0000000000)='./bus\x00', 0x0) getrlimit(0x0, &(0x7f00000000c0)) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x358030000000000}) 06:23:40 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000040)="2e0000002500817ee45ae087185082cf0f24b0eba06ec400002339e00586f9835b250016914879008cd90080e230", 0x2e}], 0x1}, 0x0) [ 524.410602][T18235] IPVS: ftp: loaded support on port[0] = 21 06:23:40 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000040)="2e0000002500817ee45ae087185082cf0f24b0eba06ec474002339e00586f9835b3f0016914879008cd90080e230", 0x2e}], 0x1}, 0x0) [ 524.477730][T18248] IPVS: ftp: loaded support on port[0] = 21 06:23:40 executing program 0: sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) getsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000400), &(0x7f0000000440)=0x8) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, &(0x7f00000019c0)={0x20}, 0x1) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r0, 0x111, 0x5, 0xc3, 0x4) r1 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x1, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r1, 0xc0045516, &(0x7f0000000040)=0x4) arch_prctl$ARCH_GET_CPUID(0x1011) getpgrp(0x0) flock(0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000200)={@mcast2}) setsockopt$RDS_CONG_MONITOR(r1, 0x114, 0x6, &(0x7f0000000280), 0x4) ioctl$VHOST_SET_LOG_FD(r1, 0x4004af07, 0x0) ioctl$DRM_IOCTL_IRQ_BUSID(r1, 0xc0106403, &(0x7f0000000100)={0x8875, 0x800, 0x8000, 0xc2}) ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000180)) ioctl$VHOST_SET_VRING_CALL(0xffffffffffffffff, 0x4008af21, &(0x7f0000000380)={0x0, r0}) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x3, 'veth0\x00'}, 0x18) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.cpu/syz1\x00', 0x1ff) openat$snapshot(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/snapshot\x00', 0x0, 0x0) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0xf7fffffffffffffd, 0x2012, r1, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000a40)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x20008000}, 0x24044000) unshare(0x40000000) mount$9p_virtio(&(0x7f00000003c0)='em0%$!,cgroup#\x00', &(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='9p\x00', 0x200000, &(0x7f0000000500)={'trans=virtio,', {[{@afid={'afid', 0x3d, 0x6}}, {@version_L='version=9p2000.L'}, {@cache_none='cache=none'}], [{@subj_role={'subj_role', 0x3d, '/dev/dsp#\x00'}}, {@permit_directio='permit_directio'}, {@measure='measure'}, {@context={'context', 0x3d, 'system_u'}}, {@obj_user={'obj_user'}}, {@dont_hash='dont_hash'}, {@subj_type={'subj_type', 0x3d, '\\eth0('}}, {@fsuuid={'fsuuid', 0x3d, {[0x36, 0x79, 0x0, 0x33, 0x61, 0x62, 0x32], 0x2d, [0x77, 0x32, 0x77, 0x34], 0x2d, [0x7f, 0x67, 0x37, 0x77], 0x2d, [0x0, 0x38, 0x32, 0x33], 0x2d, [0x35, 0x37, 0x7f, 0x7b, 0x37, 0x39, 0x77, 0x33]}}}, {@dont_measure='dont_measure'}]}}) ioctl$VIDIOC_ENUMINPUT(r0, 0xc050561a, &(0x7f0000000300)={0x4, "443b36c4364670c73c2ad26e1952769039650793d10fc72d24ce46e327d06e2f", 0x3, 0x100, 0x4, 0x1057ff, 0x0, 0x6}) 06:23:40 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) dup3(r0, r1, 0x0) 06:23:40 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000040)="2e0000002500817ee45ae087185082cf0f24b0eba06ec400002339e00586f9835b3f0216914879008cd90080e230", 0x2e}], 0x1}, 0x0) 06:23:40 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = creat(&(0x7f0000000000)='./bus\x00', 0x0) getrlimit(0x0, &(0x7f00000000c0)) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x400000000000000}) 06:23:40 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000040)="2e0000002500817ee45ae087185082cf0f24b0eba06ec47a002339e00586f9835b3f0016914879008cd90080e230", 0x2e}], 0x1}, 0x0) 06:23:40 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) getsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000400), &(0x7f0000000440)=0x8) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, &(0x7f00000019c0)={0x20}, 0x1) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r1, 0x111, 0x5, 0xc3, 0x4) r2 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x1, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r2, 0xc0045516, &(0x7f0000000040)=0x4) arch_prctl$ARCH_GET_CPUID(0x1011) getpgrp(0x0) flock(r0, 0x0) ioctl$BLKRRPART(0xffffffffffffffff, 0x125f, 0x0) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000200)={@mcast2}) fcntl$F_GET_FILE_RW_HINT(r0, 0x40d, &(0x7f00000000c0)) setsockopt$RDS_CONG_MONITOR(r2, 0x114, 0x6, &(0x7f0000000280), 0x4) ioctl$VHOST_SET_LOG_FD(r2, 0x4004af07, 0x0) ioctl$DRM_IOCTL_IRQ_BUSID(r2, 0xc0106403, &(0x7f0000000100)={0x8875, 0x800, 0x8000, 0xc2}) ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000180)) ioctl$VHOST_SET_VRING_CALL(0xffffffffffffffff, 0x4008af21, &(0x7f0000000380)={0x0, r1}) r3 = fcntl$dupfd(r1, 0x0, r2) setsockopt$IP_VS_SO_SET_STOPDAEMON(r3, 0x0, 0x48c, &(0x7f0000000140)={0x3, 'veth0\x00'}, 0x18) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.cpu/syz1\x00', 0x1ff) openat$snapshot(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/snapshot\x00', 0x0, 0x0) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0xf7fffffffffffffd, 0x2012, r2, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000a40)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x20008000}, 0x24044000) unshare(0x40000000) mount$9p_virtio(0x0, &(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='9p\x00', 0x200000, &(0x7f0000000500)={'trans=virtio,', {[{@afid={'afid', 0x3d, 0x6}}, {@version_L='version=9p2000.L'}, {@cache_none='cache=none'}], [{@subj_role={'subj_role', 0x3d, '/dev/dsp#\x00'}}, {@permit_directio='permit_directio'}, {@measure='measure'}, {@context={'context', 0x3d, 'system_u'}}, {@obj_user={'obj_user'}}, {@dont_hash='dont_hash'}, {@subj_type={'subj_type', 0x3d, '\\eth0('}}, {@fsuuid={'fsuuid', 0x3d, {[0x36, 0x79, 0x0, 0x33, 0x61, 0x62, 0x32], 0x2d, [0x77, 0x32, 0x77, 0x34], 0x2d, [0x7f, 0x67, 0x37, 0x77], 0x2d, [0x0, 0x38, 0x32, 0x33], 0x2d, [0x35, 0x37, 0x7f, 0x7b, 0x37, 0x39, 0x77, 0x33]}}}, {@dont_measure='dont_measure'}]}}) ioctl$VIDIOC_ENUMINPUT(r1, 0xc050561a, &(0x7f0000000300)={0x4, "443b36c4364670c73c2ad26e1952769039650793d10fc72d24ce46e327d06e2f", 0x3, 0x100, 0x4, 0x1057ff, 0x0, 0x6}) [ 524.869335][T18279] IPVS: ftp: loaded support on port[0] = 21 06:23:40 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000040)="2e0000002500817ee45ae087185082cf0f24b0eba06ec4f0002339e00586f9835b3f0016914879008cd90080e230", 0x2e}], 0x1}, 0x0) 06:23:40 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = creat(&(0x7f0000000000)='./bus\x00', 0x0) getrlimit(0x0, &(0x7f00000000c0)) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x484000000000000}) 06:23:40 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000040)="2e0000002500817ee45ae087185082cf0f24b0eba06ec400002339e00586f9835b3f0316914879008cd90080e230", 0x2e}], 0x1}, 0x0) 06:23:40 executing program 0: sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) getsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000400), &(0x7f0000000440)=0x8) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, &(0x7f00000019c0)={0x20}, 0x1) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r0, 0x111, 0x5, 0xc3, 0x4) r1 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x1, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r1, 0xc0045516, &(0x7f0000000040)=0x4) arch_prctl$ARCH_GET_CPUID(0x1011) getpgrp(0x0) flock(0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000200)={@mcast2}) setsockopt$RDS_CONG_MONITOR(r1, 0x114, 0x6, &(0x7f0000000280), 0x4) ioctl$VHOST_SET_LOG_FD(r1, 0x4004af07, 0x0) ioctl$DRM_IOCTL_IRQ_BUSID(r1, 0xc0106403, &(0x7f0000000100)={0x8875, 0x800, 0x8000, 0xc2}) ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000180)) ioctl$VHOST_SET_VRING_CALL(0xffffffffffffffff, 0x4008af21, &(0x7f0000000380)={0x0, r0}) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x3, 'veth0\x00'}, 0x18) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.cpu/syz1\x00', 0x1ff) openat$snapshot(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/snapshot\x00', 0x0, 0x0) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0xf7fffffffffffffd, 0x2012, r1, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000a40)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x20008000}, 0x24044000) unshare(0x40000000) mount$9p_virtio(&(0x7f00000003c0)='em0%$!,cgroup#\x00', &(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='9p\x00', 0x200000, &(0x7f0000000500)={'trans=virtio,', {[{@afid={'afid', 0x3d, 0x6}}, {@version_L='version=9p2000.L'}, {@cache_none='cache=none'}], [{@subj_role={'subj_role', 0x3d, '/dev/dsp#\x00'}}, {@permit_directio='permit_directio'}, {@measure='measure'}, {@context={'context', 0x3d, 'system_u'}}, {@obj_user={'obj_user'}}, {@dont_hash='dont_hash'}, {@subj_type={'subj_type', 0x3d, '\\eth0('}}, {@fsuuid={'fsuuid', 0x3d, {[0x36, 0x79, 0x0, 0x33, 0x61, 0x62, 0x32], 0x2d, [0x77, 0x32, 0x77, 0x34], 0x2d, [0x7f, 0x67, 0x37, 0x77], 0x2d, [0x0, 0x38, 0x32, 0x33], 0x2d, [0x35, 0x37, 0x7f, 0x7b, 0x37, 0x39, 0x77, 0x33]}}}, {@dont_measure='dont_measure'}]}}) ioctl$VIDIOC_ENUMINPUT(r0, 0xc050561a, &(0x7f0000000300)={0x4, "443b36c4364670c73c2ad26e1952769039650793d10fc72d24ce46e327d06e2f", 0x3, 0x100, 0x4, 0x1057ff, 0x0, 0x6}) 06:23:40 executing program 3: socket$inet6(0xa, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x202, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000000)=0x8, 0x4) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000100)=ANY=[], 0xff4a) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x20032600) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x7a0f, 0x1700) 06:23:40 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000040)="2e0000002500817ee45ae087185082cf0f24b0eba06ec400002339e00586f9835b3f0416914879008cd90080e230", 0x2e}], 0x1}, 0x0) [ 525.132398][T18298] IPVS: ftp: loaded support on port[0] = 21 [ 525.179251][T18271] IPVS: ftp: loaded support on port[0] = 21 06:23:40 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000040)="2e0000002500817ee45ae087185082cf0f24b0eba06ec47c012339e00586f9835b3f0016914879008cd90080e230", 0x2e}], 0x1}, 0x0) 06:23:40 executing program 0: sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) getsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000400), &(0x7f0000000440)=0x8) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, &(0x7f00000019c0)={0x20}, 0x1) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r0, 0x111, 0x5, 0xc3, 0x4) r1 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x1, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r1, 0xc0045516, &(0x7f0000000040)=0x4) arch_prctl$ARCH_GET_CPUID(0x1011) getpgrp(0x0) flock(0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000200)={@mcast2}) setsockopt$RDS_CONG_MONITOR(r1, 0x114, 0x6, &(0x7f0000000280), 0x4) ioctl$VHOST_SET_LOG_FD(r1, 0x4004af07, 0x0) ioctl$DRM_IOCTL_IRQ_BUSID(r1, 0xc0106403, &(0x7f0000000100)={0x8875, 0x800, 0x8000, 0xc2}) ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000180)) ioctl$VHOST_SET_VRING_CALL(0xffffffffffffffff, 0x4008af21, &(0x7f0000000380)={0x0, r0}) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x3, 'veth0\x00'}, 0x18) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.cpu/syz1\x00', 0x1ff) openat$snapshot(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/snapshot\x00', 0x0, 0x0) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0xf7fffffffffffffd, 0x2012, r1, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000a40)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x20008000}, 0x24044000) unshare(0x40000000) mount$9p_virtio(&(0x7f00000003c0)='em0%$!,cgroup#\x00', &(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='9p\x00', 0x200000, &(0x7f0000000500)={'trans=virtio,', {[{@afid={'afid', 0x3d, 0x6}}, {@version_L='version=9p2000.L'}, {@cache_none='cache=none'}], [{@subj_role={'subj_role', 0x3d, '/dev/dsp#\x00'}}, {@permit_directio='permit_directio'}, {@measure='measure'}, {@context={'context', 0x3d, 'system_u'}}, {@obj_user={'obj_user'}}, {@dont_hash='dont_hash'}, {@subj_type={'subj_type', 0x3d, '\\eth0('}}, {@fsuuid={'fsuuid', 0x3d, {[0x36, 0x79, 0x0, 0x33, 0x61, 0x62, 0x32], 0x2d, [0x77, 0x32, 0x77, 0x34], 0x2d, [0x7f, 0x67, 0x37, 0x77], 0x2d, [0x0, 0x38, 0x32, 0x33], 0x2d, [0x35, 0x37, 0x7f, 0x7b, 0x37, 0x39, 0x77, 0x33]}}}, {@dont_measure='dont_measure'}]}}) ioctl$VIDIOC_ENUMINPUT(r0, 0xc050561a, &(0x7f0000000300)={0x4, "443b36c4364670c73c2ad26e1952769039650793d10fc72d24ce46e327d06e2f", 0x3, 0x100, 0x4, 0x1057ff, 0x0, 0x6}) 06:23:40 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = creat(&(0x7f0000000000)='./bus\x00', 0x0) getrlimit(0x0, &(0x7f00000000c0)) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x500000000000000}) [ 525.325771][T18310] __nla_parse: 46 callbacks suppressed [ 525.325781][T18310] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.4'. 06:23:41 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = creat(&(0x7f0000000000)='./bus\x00', 0x0) getrlimit(0x0, &(0x7f00000000c0)) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x564020000000000}) [ 525.381280][T18313] IPVS: ftp: loaded support on port[0] = 21 [ 525.384821][T18307] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.5'. [ 525.414956][T18315] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.4'. [ 525.435940][T18317] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.5'. 06:23:41 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000040)="2e0000002500817ee45ae087185082cf0f24b0eba06ec400032339e00586f9835b3f0016914879008cd90080e230", 0x2e}], 0x1}, 0x0) [ 525.619899][T18325] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.4'. [ 525.693170][T18326] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.4'. 06:23:41 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = creat(&(0x7f0000000000)='./bus\x00', 0x0) getrlimit(0x0, &(0x7f00000000c0)) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x600000000000000}) 06:23:41 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000040)="2e0000002500817ee45ae087185082cf0f24b0eba06ec400002339e00586f9835b3f0516914879008cd90080e230", 0x2e}], 0x1}, 0x0) 06:23:41 executing program 0: r0 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) getsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000400), &(0x7f0000000440)=0x8) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, &(0x7f00000019c0)={0x20}, 0x1) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r1, 0x111, 0x5, 0xc3, 0x4) r2 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x1, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r2, 0xc0045516, &(0x7f0000000040)=0x4) arch_prctl$ARCH_GET_CPUID(0x1011) getpgrp(0x0) flock(r0, 0x0) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000200)={@mcast2}) setsockopt$RDS_CONG_MONITOR(r2, 0x114, 0x6, &(0x7f0000000280), 0x4) ioctl$VHOST_SET_LOG_FD(r2, 0x4004af07, 0x0) ioctl$DRM_IOCTL_IRQ_BUSID(r2, 0xc0106403, &(0x7f0000000100)={0x8875, 0x800, 0x8000, 0xc2}) ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000180)) ioctl$VHOST_SET_VRING_CALL(0xffffffffffffffff, 0x4008af21, &(0x7f0000000380)={0x0, r1}) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x3, 'veth0\x00'}, 0x18) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.cpu/syz1\x00', 0x1ff) openat$snapshot(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/snapshot\x00', 0x0, 0x0) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0xf7fffffffffffffd, 0x2012, r2, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000a40)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x20008000}, 0x24044000) unshare(0x40000000) mount$9p_virtio(&(0x7f00000003c0)='em0%$!,cgroup#\x00', &(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='9p\x00', 0x200000, &(0x7f0000000500)={'trans=virtio,', {[{@afid={'afid', 0x3d, 0x6}}, {@version_L='version=9p2000.L'}, {@cache_none='cache=none'}], [{@subj_role={'subj_role', 0x3d, '/dev/dsp#\x00'}}, {@permit_directio='permit_directio'}, {@measure='measure'}, {@context={'context', 0x3d, 'system_u'}}, {@obj_user={'obj_user'}}, {@dont_hash='dont_hash'}, {@subj_type={'subj_type', 0x3d, '\\eth0('}}, {@fsuuid={'fsuuid', 0x3d, {[0x36, 0x79, 0x0, 0x33, 0x61, 0x62, 0x32], 0x2d, [0x77, 0x32, 0x77, 0x34], 0x2d, [0x7f, 0x67, 0x37, 0x77], 0x2d, [0x0, 0x38, 0x32, 0x33], 0x2d, [0x35, 0x37, 0x7f, 0x7b, 0x37, 0x39, 0x77, 0x33]}}}, {@dont_measure='dont_measure'}]}}) ioctl$VIDIOC_ENUMINPUT(r1, 0xc050561a, &(0x7f0000000300)={0x4, "443b36c4364670c73c2ad26e1952769039650793d10fc72d24ce46e327d06e2f", 0x3, 0x100, 0x4, 0x1057ff, 0x0, 0x6}) 06:23:41 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) getsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000400), &(0x7f0000000440)=0x8) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, &(0x7f00000019c0)={0x20}, 0x1) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r1, 0x111, 0x5, 0xc3, 0x4) r2 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x1, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r2, 0xc0045516, &(0x7f0000000040)=0x4) arch_prctl$ARCH_GET_CPUID(0x1011) getpgrp(0x0) flock(r0, 0x0) ioctl$BLKRRPART(0xffffffffffffffff, 0x125f, 0x0) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000200)={@mcast2}) fcntl$F_GET_FILE_RW_HINT(r0, 0x40d, &(0x7f00000000c0)) setsockopt$RDS_CONG_MONITOR(r2, 0x114, 0x6, &(0x7f0000000280), 0x4) ioctl$VHOST_SET_LOG_FD(r2, 0x4004af07, 0x0) ioctl$DRM_IOCTL_IRQ_BUSID(r2, 0xc0106403, &(0x7f0000000100)={0x8875, 0x800, 0x8000, 0xc2}) ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000180)) ioctl$VHOST_SET_VRING_CALL(0xffffffffffffffff, 0x4008af21, &(0x7f0000000380)={0x0, r1}) r3 = fcntl$dupfd(r1, 0x0, r2) setsockopt$IP_VS_SO_SET_STOPDAEMON(r3, 0x0, 0x48c, &(0x7f0000000140)={0x3, 'veth0\x00'}, 0x18) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.cpu/syz1\x00', 0x1ff) openat$snapshot(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/snapshot\x00', 0x0, 0x0) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0xf7fffffffffffffd, 0x2012, r2, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000a40)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x20008000}, 0x24044000) unshare(0x40000000) mount$9p_virtio(0x0, &(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='9p\x00', 0x200000, &(0x7f0000000500)={'trans=virtio,', {[{@afid={'afid', 0x3d, 0x6}}, {@version_L='version=9p2000.L'}, {@cache_none='cache=none'}], [{@subj_role={'subj_role', 0x3d, '/dev/dsp#\x00'}}, {@permit_directio='permit_directio'}, {@measure='measure'}, {@context={'context', 0x3d, 'system_u'}}, {@obj_user={'obj_user'}}, {@dont_hash='dont_hash'}, {@subj_type={'subj_type', 0x3d, '\\eth0('}}, {@fsuuid={'fsuuid', 0x3d, {[0x36, 0x79, 0x0, 0x33, 0x61, 0x62, 0x32], 0x2d, [0x77, 0x32, 0x77, 0x34], 0x2d, [0x7f, 0x67, 0x37, 0x77], 0x2d, [0x0, 0x38, 0x32, 0x33], 0x2d, [0x35, 0x37, 0x7f, 0x7b, 0x37, 0x39, 0x77, 0x33]}}}, {@dont_measure='dont_measure'}]}}) ioctl$VIDIOC_ENUMINPUT(r1, 0xc050561a, &(0x7f0000000300)={0x4, "443b36c4364670c73c2ad26e1952769039650793d10fc72d24ce46e327d06e2f", 0x3, 0x100, 0x4, 0x1057ff, 0x0, 0x6}) 06:23:41 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000040)="2e0000002500817ee45ae087185082cf0f24b0eba06ec400052339e00586f9835b3f0016914879008cd90080e230", 0x2e}], 0x1}, 0x0) [ 525.851218][ T26] audit: type=1804 audit(1550989421.506:36): pid=18311 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir770209075/syzkaller.cMtti8/463/memory.events" dev="sda1" ino=16528 res=1 [ 525.875186][T18332] IPVS: ftp: loaded support on port[0] = 21 [ 525.923568][T18337] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.5'. [ 525.981863][ T26] audit: type=1800 audit(1550989421.506:37): pid=18311 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.3" name="memory.events" dev="sda1" ino=16528 res=0 [ 526.015869][T18331] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.4'. [ 526.073007][T18344] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.5'. [ 526.112981][T18343] IPVS: ftp: loaded support on port[0] = 21 [ 526.118484][T18346] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.4'. [ 526.562527][ T26] audit: type=1804 audit(1550989422.226:38): pid=18342 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir770209075/syzkaller.cMtti8/463/memory.events" dev="sda1" ino=16528 res=1 06:23:42 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) setsockopt$sock_linger(r0, 0x1, 0xd, &(0x7f0000000000)={0xfffffffffffffffe, 0x4008001}, 0x8) shutdown(r0, 0x0) 06:23:42 executing program 0: r0 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) getsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000400), &(0x7f0000000440)=0x8) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, &(0x7f00000019c0)={0x20}, 0x1) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r1, 0x111, 0x5, 0xc3, 0x4) r2 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x1, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r2, 0xc0045516, &(0x7f0000000040)=0x4) arch_prctl$ARCH_GET_CPUID(0x1011) getpgrp(0x0) flock(r0, 0x0) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000200)={@mcast2}) setsockopt$RDS_CONG_MONITOR(r2, 0x114, 0x6, &(0x7f0000000280), 0x4) ioctl$VHOST_SET_LOG_FD(r2, 0x4004af07, 0x0) ioctl$DRM_IOCTL_IRQ_BUSID(r2, 0xc0106403, &(0x7f0000000100)={0x8875, 0x800, 0x8000, 0xc2}) ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000180)) ioctl$VHOST_SET_VRING_CALL(0xffffffffffffffff, 0x4008af21, &(0x7f0000000380)={0x0, r1}) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x3, 'veth0\x00'}, 0x18) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.cpu/syz1\x00', 0x1ff) openat$snapshot(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/snapshot\x00', 0x0, 0x0) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0xf7fffffffffffffd, 0x2012, r2, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000a40)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x20008000}, 0x24044000) unshare(0x40000000) mount$9p_virtio(&(0x7f00000003c0)='em0%$!,cgroup#\x00', &(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='9p\x00', 0x200000, &(0x7f0000000500)={'trans=virtio,', {[{@afid={'afid', 0x3d, 0x6}}, {@version_L='version=9p2000.L'}, {@cache_none='cache=none'}], [{@subj_role={'subj_role', 0x3d, '/dev/dsp#\x00'}}, {@permit_directio='permit_directio'}, {@measure='measure'}, {@context={'context', 0x3d, 'system_u'}}, {@obj_user={'obj_user'}}, {@dont_hash='dont_hash'}, {@subj_type={'subj_type', 0x3d, '\\eth0('}}, {@fsuuid={'fsuuid', 0x3d, {[0x36, 0x79, 0x0, 0x33, 0x61, 0x62, 0x32], 0x2d, [0x77, 0x32, 0x77, 0x34], 0x2d, [0x7f, 0x67, 0x37, 0x77], 0x2d, [0x0, 0x38, 0x32, 0x33], 0x2d, [0x35, 0x37, 0x7f, 0x7b, 0x37, 0x39, 0x77, 0x33]}}}, {@dont_measure='dont_measure'}]}}) ioctl$VIDIOC_ENUMINPUT(r1, 0xc050561a, &(0x7f0000000300)={0x4, "443b36c4364670c73c2ad26e1952769039650793d10fc72d24ce46e327d06e2f", 0x3, 0x100, 0x4, 0x1057ff, 0x0, 0x6}) 06:23:42 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000040)="2e0000002500817ee45ae087185082cf0f24b0eba06ec400002339e00586f9835b3f0616914879008cd90080e230", 0x2e}], 0x1}, 0x0) 06:23:42 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000040)="2e0000002500817ee45ae087185082cf0f24b0eba06ec400062339e00586f9835b3f0016914879008cd90080e230", 0x2e}], 0x1}, 0x0) 06:23:42 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = creat(&(0x7f0000000000)='./bus\x00', 0x0) getrlimit(0x0, &(0x7f00000000c0)) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x700000000000000}) 06:23:42 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) getsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000400), &(0x7f0000000440)=0x8) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, &(0x7f00000019c0)={0x20}, 0x1) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r1, 0x111, 0x5, 0xc3, 0x4) r2 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x1, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r2, 0xc0045516, &(0x7f0000000040)=0x4) arch_prctl$ARCH_GET_CPUID(0x1011) getpgrp(0x0) flock(r0, 0x0) ioctl$BLKRRPART(0xffffffffffffffff, 0x125f, 0x0) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000200)={@mcast2}) fcntl$F_GET_FILE_RW_HINT(r0, 0x40d, &(0x7f00000000c0)) setsockopt$RDS_CONG_MONITOR(r2, 0x114, 0x6, &(0x7f0000000280), 0x4) ioctl$VHOST_SET_LOG_FD(r2, 0x4004af07, 0x0) ioctl$DRM_IOCTL_IRQ_BUSID(r2, 0xc0106403, &(0x7f0000000100)={0x8875, 0x800, 0x8000, 0xc2}) ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000180)) ioctl$VHOST_SET_VRING_CALL(0xffffffffffffffff, 0x4008af21, &(0x7f0000000380)={0x0, r1}) r3 = fcntl$dupfd(r1, 0x0, r2) setsockopt$IP_VS_SO_SET_STOPDAEMON(r3, 0x0, 0x48c, &(0x7f0000000140)={0x3, 'veth0\x00'}, 0x18) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.cpu/syz1\x00', 0x1ff) openat$snapshot(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/snapshot\x00', 0x0, 0x0) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0xf7fffffffffffffd, 0x2012, r2, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000a40)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x20008000}, 0x24044000) unshare(0x40000000) mount$9p_virtio(&(0x7f00000003c0)='em0%$!,cgroup#\x00', 0x0, &(0x7f00000004c0)='9p\x00', 0x200000, &(0x7f0000000500)={'trans=virtio,', {[{@afid={'afid', 0x3d, 0x6}}, {@version_L='version=9p2000.L'}, {@cache_none='cache=none'}], [{@subj_role={'subj_role', 0x3d, '/dev/dsp#\x00'}}, {@permit_directio='permit_directio'}, {@measure='measure'}, {@context={'context', 0x3d, 'system_u'}}, {@obj_user={'obj_user'}}, {@dont_hash='dont_hash'}, {@subj_type={'subj_type', 0x3d, '\\eth0('}}, {@fsuuid={'fsuuid', 0x3d, {[0x36, 0x79, 0x0, 0x33, 0x61, 0x62, 0x32], 0x2d, [0x77, 0x32, 0x77, 0x34], 0x2d, [0x7f, 0x67, 0x37, 0x77], 0x2d, [0x0, 0x38, 0x32, 0x33], 0x2d, [0x35, 0x37, 0x7f, 0x7b, 0x37, 0x39, 0x77, 0x33]}}}, {@dont_measure='dont_measure'}]}}) ioctl$VIDIOC_ENUMINPUT(r1, 0xc050561a, &(0x7f0000000300)={0x4, "443b36c4364670c73c2ad26e1952769039650793d10fc72d24ce46e327d06e2f", 0x3, 0x100, 0x4, 0x1057ff, 0x0, 0x6}) [ 526.668975][ T26] audit: type=1800 audit(1550989422.226:39): pid=18342 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.3" name="memory.events" dev="sda1" ino=16528 res=0 [ 526.752541][T18357] IPVS: ftp: loaded support on port[0] = 21 [ 526.820827][T18363] IPVS: ftp: loaded support on port[0] = 21 [ 526.934653][T18369] IPVS: ftp: loaded support on port[0] = 21 06:23:42 executing program 0: r0 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) getsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000400), &(0x7f0000000440)=0x8) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, &(0x7f00000019c0)={0x20}, 0x1) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r1, 0x111, 0x5, 0xc3, 0x4) r2 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x1, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r2, 0xc0045516, &(0x7f0000000040)=0x4) arch_prctl$ARCH_GET_CPUID(0x1011) getpgrp(0x0) flock(r0, 0x0) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000200)={@mcast2}) setsockopt$RDS_CONG_MONITOR(r2, 0x114, 0x6, &(0x7f0000000280), 0x4) ioctl$VHOST_SET_LOG_FD(r2, 0x4004af07, 0x0) ioctl$DRM_IOCTL_IRQ_BUSID(r2, 0xc0106403, &(0x7f0000000100)={0x8875, 0x800, 0x8000, 0xc2}) ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000180)) ioctl$VHOST_SET_VRING_CALL(0xffffffffffffffff, 0x4008af21, &(0x7f0000000380)={0x0, r1}) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x3, 'veth0\x00'}, 0x18) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.cpu/syz1\x00', 0x1ff) openat$snapshot(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/snapshot\x00', 0x0, 0x0) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0xf7fffffffffffffd, 0x2012, r2, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000a40)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x20008000}, 0x24044000) unshare(0x40000000) mount$9p_virtio(&(0x7f00000003c0)='em0%$!,cgroup#\x00', &(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='9p\x00', 0x200000, &(0x7f0000000500)={'trans=virtio,', {[{@afid={'afid', 0x3d, 0x6}}, {@version_L='version=9p2000.L'}, {@cache_none='cache=none'}], [{@subj_role={'subj_role', 0x3d, '/dev/dsp#\x00'}}, {@permit_directio='permit_directio'}, {@measure='measure'}, {@context={'context', 0x3d, 'system_u'}}, {@obj_user={'obj_user'}}, {@dont_hash='dont_hash'}, {@subj_type={'subj_type', 0x3d, '\\eth0('}}, {@fsuuid={'fsuuid', 0x3d, {[0x36, 0x79, 0x0, 0x33, 0x61, 0x62, 0x32], 0x2d, [0x77, 0x32, 0x77, 0x34], 0x2d, [0x7f, 0x67, 0x37, 0x77], 0x2d, [0x0, 0x38, 0x32, 0x33], 0x2d, [0x35, 0x37, 0x7f, 0x7b, 0x37, 0x39, 0x77, 0x33]}}}, {@dont_measure='dont_measure'}]}}) ioctl$VIDIOC_ENUMINPUT(r1, 0xc050561a, &(0x7f0000000300)={0x4, "443b36c4364670c73c2ad26e1952769039650793d10fc72d24ce46e327d06e2f", 0x3, 0x100, 0x4, 0x1057ff, 0x0, 0x6}) 06:23:42 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = creat(&(0x7f0000000000)='./bus\x00', 0x0) getrlimit(0x0, &(0x7f00000000c0)) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x800000000000000}) 06:23:42 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000040)="2e0000002500817ee45ae087185082cf0f24b0eba06ec400002339e00586f9835b3f0716914879008cd90080e230", 0x2e}], 0x1}, 0x0) 06:23:42 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000040)="2e0000002500817ee45ae087185082cf0f24b0eba06ec400072339e00586f9835b3f0016914879008cd90080e230", 0x2e}], 0x1}, 0x0) 06:23:42 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) getsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000400), &(0x7f0000000440)=0x8) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, &(0x7f00000019c0)={0x20}, 0x1) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r1, 0x111, 0x5, 0xc3, 0x4) r2 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x1, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r2, 0xc0045516, &(0x7f0000000040)=0x4) arch_prctl$ARCH_GET_CPUID(0x1011) getpgrp(0x0) flock(r0, 0x0) ioctl$BLKRRPART(0xffffffffffffffff, 0x125f, 0x0) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000200)={@mcast2}) fcntl$F_GET_FILE_RW_HINT(r0, 0x40d, &(0x7f00000000c0)) setsockopt$RDS_CONG_MONITOR(r2, 0x114, 0x6, &(0x7f0000000280), 0x4) ioctl$VHOST_SET_LOG_FD(r2, 0x4004af07, 0x0) ioctl$DRM_IOCTL_IRQ_BUSID(r2, 0xc0106403, &(0x7f0000000100)={0x8875, 0x800, 0x8000, 0xc2}) ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000180)) ioctl$VHOST_SET_VRING_CALL(0xffffffffffffffff, 0x4008af21, &(0x7f0000000380)={0x0, r1}) r3 = fcntl$dupfd(r1, 0x0, r2) setsockopt$IP_VS_SO_SET_STOPDAEMON(r3, 0x0, 0x48c, &(0x7f0000000140)={0x3, 'veth0\x00'}, 0x18) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.cpu/syz1\x00', 0x1ff) openat$snapshot(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/snapshot\x00', 0x0, 0x0) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0xf7fffffffffffffd, 0x2012, r2, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000a40)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x20008000}, 0x24044000) unshare(0x40000000) mount$9p_virtio(&(0x7f00000003c0)='em0%$!,cgroup#\x00', 0x0, &(0x7f00000004c0)='9p\x00', 0x200000, &(0x7f0000000500)={'trans=virtio,', {[{@afid={'afid', 0x3d, 0x6}}, {@version_L='version=9p2000.L'}, {@cache_none='cache=none'}], [{@subj_role={'subj_role', 0x3d, '/dev/dsp#\x00'}}, {@permit_directio='permit_directio'}, {@measure='measure'}, {@context={'context', 0x3d, 'system_u'}}, {@obj_user={'obj_user'}}, {@dont_hash='dont_hash'}, {@subj_type={'subj_type', 0x3d, '\\eth0('}}, {@fsuuid={'fsuuid', 0x3d, {[0x36, 0x79, 0x0, 0x33, 0x61, 0x62, 0x32], 0x2d, [0x77, 0x32, 0x77, 0x34], 0x2d, [0x7f, 0x67, 0x37, 0x77], 0x2d, [0x0, 0x38, 0x32, 0x33], 0x2d, [0x35, 0x37, 0x7f, 0x7b, 0x37, 0x39, 0x77, 0x33]}}}, {@dont_measure='dont_measure'}]}}) ioctl$VIDIOC_ENUMINPUT(r1, 0xc050561a, &(0x7f0000000300)={0x4, "443b36c4364670c73c2ad26e1952769039650793d10fc72d24ce46e327d06e2f", 0x3, 0x100, 0x4, 0x1057ff, 0x0, 0x6}) 06:23:42 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) getsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000400), &(0x7f0000000440)=0x8) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, &(0x7f00000019c0)={0x20}, 0x1) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r1, 0x111, 0x5, 0xc3, 0x4) r2 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x1, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r2, 0xc0045516, &(0x7f0000000040)=0x4) arch_prctl$ARCH_GET_CPUID(0x1011) getpgrp(0x0) flock(r0, 0x0) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000200)={@mcast2}) setsockopt$RDS_CONG_MONITOR(r2, 0x114, 0x6, &(0x7f0000000280), 0x4) ioctl$VHOST_SET_LOG_FD(r2, 0x4004af07, 0x0) ioctl$DRM_IOCTL_IRQ_BUSID(r2, 0xc0106403, &(0x7f0000000100)={0x8875, 0x800, 0x8000, 0xc2}) ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000180)) ioctl$VHOST_SET_VRING_CALL(0xffffffffffffffff, 0x4008af21, &(0x7f0000000380)={0x0, r1}) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x3, 'veth0\x00'}, 0x18) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.cpu/syz1\x00', 0x1ff) openat$snapshot(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/snapshot\x00', 0x0, 0x0) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0xf7fffffffffffffd, 0x2012, r2, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000a40)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x20008000}, 0x24044000) unshare(0x40000000) mount$9p_virtio(&(0x7f00000003c0)='em0%$!,cgroup#\x00', &(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='9p\x00', 0x200000, &(0x7f0000000500)={'trans=virtio,', {[{@afid={'afid', 0x3d, 0x6}}, {@version_L='version=9p2000.L'}, {@cache_none='cache=none'}], [{@subj_role={'subj_role', 0x3d, '/dev/dsp#\x00'}}, {@permit_directio='permit_directio'}, {@measure='measure'}, {@context={'context', 0x3d, 'system_u'}}, {@obj_user={'obj_user'}}, {@dont_hash='dont_hash'}, {@subj_type={'subj_type', 0x3d, '\\eth0('}}, {@fsuuid={'fsuuid', 0x3d, {[0x36, 0x79, 0x0, 0x33, 0x61, 0x62, 0x32], 0x2d, [0x77, 0x32, 0x77, 0x34], 0x2d, [0x7f, 0x67, 0x37, 0x77], 0x2d, [0x0, 0x38, 0x32, 0x33], 0x2d, [0x35, 0x37, 0x7f, 0x7b, 0x37, 0x39, 0x77, 0x33]}}}, {@dont_measure='dont_measure'}]}}) ioctl$VIDIOC_ENUMINPUT(r1, 0xc050561a, &(0x7f0000000300)={0x4, "443b36c4364670c73c2ad26e1952769039650793d10fc72d24ce46e327d06e2f", 0x3, 0x100, 0x4, 0x1057ff, 0x0, 0x6}) [ 527.380009][T18390] IPVS: ftp: loaded support on port[0] = 21 [ 527.416098][T18383] IPVS: ftp: loaded support on port[0] = 21 06:23:43 executing program 3: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) clone(0x210007fa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) tkill(r0, 0xc) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) exit_group(0x0) 06:23:43 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = creat(&(0x7f0000000000)='./bus\x00', 0x0) getrlimit(0x0, &(0x7f00000000c0)) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x900000000000000}) 06:23:43 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000040)="2e0000002500817ee45ae087185082cf0f24b0eba06ec400002339e00586f9835b3f0816914879008cd90080e230", 0x2e}], 0x1}, 0x0) 06:23:43 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000040)="2e0000002500817ee45ae087185082cf0f24b0eba06ec4000a2339e00586f9835b3f0016914879008cd90080e230", 0x2e}], 0x1}, 0x0) 06:23:43 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) getsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000400), &(0x7f0000000440)=0x8) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, &(0x7f00000019c0)={0x20}, 0x1) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r1, 0x111, 0x5, 0xc3, 0x4) r2 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x1, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r2, 0xc0045516, &(0x7f0000000040)=0x4) arch_prctl$ARCH_GET_CPUID(0x1011) getpgrp(0x0) flock(r0, 0x0) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000200)={@mcast2}) setsockopt$RDS_CONG_MONITOR(r2, 0x114, 0x6, &(0x7f0000000280), 0x4) ioctl$VHOST_SET_LOG_FD(r2, 0x4004af07, 0x0) ioctl$DRM_IOCTL_IRQ_BUSID(r2, 0xc0106403, &(0x7f0000000100)={0x8875, 0x800, 0x8000, 0xc2}) ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000180)) ioctl$VHOST_SET_VRING_CALL(0xffffffffffffffff, 0x4008af21, &(0x7f0000000380)={0x0, r1}) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x3, 'veth0\x00'}, 0x18) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.cpu/syz1\x00', 0x1ff) openat$snapshot(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/snapshot\x00', 0x0, 0x0) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0xf7fffffffffffffd, 0x2012, r2, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000a40)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x20008000}, 0x24044000) unshare(0x40000000) mount$9p_virtio(&(0x7f00000003c0)='em0%$!,cgroup#\x00', &(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='9p\x00', 0x200000, &(0x7f0000000500)={'trans=virtio,', {[{@afid={'afid', 0x3d, 0x6}}, {@version_L='version=9p2000.L'}, {@cache_none='cache=none'}], [{@subj_role={'subj_role', 0x3d, '/dev/dsp#\x00'}}, {@permit_directio='permit_directio'}, {@measure='measure'}, {@context={'context', 0x3d, 'system_u'}}, {@obj_user={'obj_user'}}, {@dont_hash='dont_hash'}, {@subj_type={'subj_type', 0x3d, '\\eth0('}}, {@fsuuid={'fsuuid', 0x3d, {[0x36, 0x79, 0x0, 0x33, 0x61, 0x62, 0x32], 0x2d, [0x77, 0x32, 0x77, 0x34], 0x2d, [0x7f, 0x67, 0x37, 0x77], 0x2d, [0x0, 0x38, 0x32, 0x33], 0x2d, [0x35, 0x37, 0x7f, 0x7b, 0x37, 0x39, 0x77, 0x33]}}}, {@dont_measure='dont_measure'}]}}) ioctl$VIDIOC_ENUMINPUT(r1, 0xc050561a, &(0x7f0000000300)={0x4, "443b36c4364670c73c2ad26e1952769039650793d10fc72d24ce46e327d06e2f", 0x3, 0x100, 0x4, 0x1057ff, 0x0, 0x6}) 06:23:43 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = creat(&(0x7f0000000000)='./bus\x00', 0x0) getrlimit(0x0, &(0x7f00000000c0)) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0c0583b, &(0x7f0000000040)={0x0, 0xa00000000000000}) 06:23:43 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000040)="2e0000002500817ee45ae087185082cf0f24b0eba06ec400002339e00586f9835b3f0a16914879008cd90080e230", 0x2e}], 0x1}, 0x0) [ 527.802358][T18409] IPVS: ftp: loaded support on port[0] = 21 06:23:43 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) getsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000400), &(0x7f0000000440)=0x8) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, &(0x7f00000019c0)={0x20}, 0x1) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r1, 0x111, 0x5, 0xc3, 0x4) r2 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x1, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r2, 0xc0045516, &(0x7f0000000040)=0x4) arch_prctl$ARCH_GET_CPUID(0x1011) getpgrp(0x0) flock(r0, 0x0) ioctl$BLKRRPART(0xffffffffffffffff, 0x125f, 0x0) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000200)={@mcast2}) fcntl$F_GET_FILE_RW_HINT(r0, 0x40d, &(0x7f00000000c0)) setsockopt$RDS_CONG_MONITOR(r2, 0x114, 0x6, &(0x7f0000000280), 0x4) ioctl$VHOST_SET_LOG_FD(r2, 0x4004af07, 0x0) ioctl$DRM_IOCTL_IRQ_BUSID(r2, 0xc0106403, &(0x7f0000000100)={0x8875, 0x800, 0x8000, 0xc2}) ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000180)) ioctl$VHOST_SET_VRING_CALL(0xffffffffffffffff, 0x4008af21, &(0x7f0000000380)={0x0, r1}) r3 = fcntl$dupfd(r1, 0x0, r2) setsockopt$IP_VS_SO_SET_STOPDAEMON(r3, 0x0, 0x48c, &(0x7f0000000140)={0x3, 'veth0\x00'}, 0x18) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.cpu/syz1\x00', 0x1ff) openat$snapshot(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/snapshot\x00', 0x0, 0x0) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0xf7fffffffffffffd, 0x2012, r2, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000a40)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x20008000}, 0x24044000) unshare(0x40000000) mount$9p_virtio(&(0x7f00000003c0)='em0%$!,cgroup#\x00', 0x0, &(0x7f00000004c0)='9p\x00', 0x200000, &(0x7f0000000500)={'trans=virtio,', {[{@afid={'afid', 0x3d, 0x6}}, {@version_L='version=9p2000.L'}, {@cache_none='cache=none'}], [{@subj_role={'subj_role', 0x3d, '/dev/dsp#\x00'}}, {@permit_directio='permit_directio'}, {@measure='measure'}, {@context={'context', 0x3d, 'system_u'}}, {@obj_user={'obj_user'}}, {@dont_hash='dont_hash'}, {@subj_type={'subj_type', 0x3d, '\\eth0('}}, {@fsuuid={'fsuuid', 0x3d, {[0x36, 0x79, 0x0, 0x33, 0x61, 0x62, 0x32], 0x2d, [0x77, 0x32, 0x77, 0x34], 0x2d, [0x7f, 0x67, 0x37, 0x77], 0x2d, [0x0, 0x38, 0x32, 0x33], 0x2d, [0x35, 0x37, 0x7f, 0x7b, 0x37, 0x39, 0x77, 0x33]}}}, {@dont_measure='dont_measure'}]}}) ioctl$VIDIOC_ENUMINPUT(r1, 0xc050561a, &(0x7f0000000300)={0x4, "443b36c4364670c73c2ad26e1952769039650793d10fc72d24ce46e327d06e2f", 0x3, 0x100, 0x4, 0x1057ff, 0x0, 0x6}) 06:23:43 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000040)="2e0000002500817ee45ae087185082cf0f24b0eba06ec4000e2339e00586f9835b3f0016914879008cd90080e230", 0x2e}], 0x1}, 0x0) 06:23:43 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) getsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000400), &(0x7f0000000440)=0x8) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, &(0x7f00000019c0)={0x20}, 0x1) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r1, 0x111, 0x5, 0xc3, 0x4) r2 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x1, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r2, 0xc0045516, &(0x7f0000000040)=0x4) arch_prctl$ARCH_GET_CPUID(0x1011) getpgrp(0x0) flock(r0, 0x0) ioctl$BLKRRPART(0xffffffffffffffff, 0x125f, 0x0) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000200)={@mcast2}) fcntl$F_GET_FILE_RW_HINT(r0, 0x40d, &(0x7f00000000c0)) setsockopt$RDS_CONG_MONITOR(r2, 0x114, 0x6, &(0x7f0000000280), 0x4) ioctl$VHOST_SET_LOG_FD(r2, 0x4004af07, 0x0) ioctl$DRM_IOCTL_IRQ_BUSID(r2, 0xc0106403, &(0x7f0000000100)={0x8875, 0x800, 0x8000, 0xc2}) ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000180)) ioctl$VHOST_SET_VRING_CALL(0xffffffffffffffff, 0x4008af21, &(0x7f0000000380)={0x0, r1}) r3 = fcntl$dupfd(r1, 0x0, r2) setsockopt$IP_VS_SO_SET_STOPDAEMON(r3, 0x0, 0x48c, &(0x7f0000000140)={0x3, 'veth0\x00'}, 0x18) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.cpu/syz1\x00', 0x1ff) openat$snapshot(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/snapshot\x00', 0x0, 0x0) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0xf7fffffffffffffd, 0x2012, r2, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000a40)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x20008000}, 0x24044000) unshare(0x40000000) mount$9p_virtio(&(0x7f00000003c0)='em0%$!,cgroup#\x00', 0x0, &(0x7f00000004c0)='9p\x00', 0x200000, &(0x7f0000000500)={'trans=virtio,', {[{@afid={'afid', 0x3d, 0x6}}, {@version_L='version=9p2000.L'}, {@cache_none='cache=none'}], [{@subj_role={'subj_role', 0x3d, '/dev/dsp#\x00'}}, {@permit_directio='permit_directio'}, {@measure='measure'}, {@context={'context', 0x3d, 'system_u'}}, {@obj_user={'obj_user'}}, {@dont_hash='dont_hash'}, {@subj_type={'subj_type', 0x3d, '\\eth0('}}, {@fsuuid={'fsuuid', 0x3d, {[0x36, 0x79, 0x0, 0x33, 0x61, 0x62, 0x32], 0x2d, [0x77, 0x32, 0x77, 0x34], 0x2d, [0x7f, 0x67, 0x37, 0x77], 0x2d, [0x0, 0x38, 0x32, 0x33], 0x2d, [0x35, 0x37, 0x7f, 0x7b, 0x37, 0x39, 0x77, 0x33]}}}, {@dont_measure='dont_measure'}]}}) ioctl$VIDIOC_ENUMINPUT(r1, 0xc050561a, &(0x7f0000000300)={0x4, "443b36c4364670c73c2ad26e1952769039650793d10fc72d24ce46e327d06e2f", 0x3, 0x100, 0x4, 0x1057ff, 0x0, 0x6}) 06:23:43 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = creat(&(0x7f0000000000)='./bus\x00', 0x0) getrlimit(0x0, &(0x7f00000000c0)) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0c0583b, &(0x7f0000000040)={0x0, 0xb00000000000000}) 06:23:43 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000040)="2e0000002500817ee45ae087185082cf0f24b0eba06ec400002339e00586f9835b3f0e16914879008cd90080e230", 0x2e}], 0x1}, 0x0) [ 528.240762][T18426] IPVS: ftp: loaded support on port[0] = 21 [ 528.260210][T18434] IPVS: ftp: loaded support on port[0] = 21 06:23:45 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) getsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000400), &(0x7f0000000440)=0x8) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, &(0x7f00000019c0)={0x20}, 0x1) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r1, 0x111, 0x5, 0xc3, 0x4) r2 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x1, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r2, 0xc0045516, &(0x7f0000000040)=0x4) arch_prctl$ARCH_GET_CPUID(0x1011) getpgrp(0x0) flock(r0, 0x0) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000200)={@mcast2}) setsockopt$RDS_CONG_MONITOR(r2, 0x114, 0x6, &(0x7f0000000280), 0x4) ioctl$VHOST_SET_LOG_FD(r2, 0x4004af07, 0x0) ioctl$DRM_IOCTL_IRQ_BUSID(r2, 0xc0106403, &(0x7f0000000100)={0x8875, 0x800, 0x8000, 0xc2}) ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000180)) ioctl$VHOST_SET_VRING_CALL(0xffffffffffffffff, 0x4008af21, &(0x7f0000000380)={0x0, r1}) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x3, 'veth0\x00'}, 0x18) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.cpu/syz1\x00', 0x1ff) openat$snapshot(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/snapshot\x00', 0x0, 0x0) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0xf7fffffffffffffd, 0x2012, r2, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000a40)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x20008000}, 0x24044000) unshare(0x40000000) mount$9p_virtio(&(0x7f00000003c0)='em0%$!,cgroup#\x00', &(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='9p\x00', 0x200000, &(0x7f0000000500)={'trans=virtio,', {[{@afid={'afid', 0x3d, 0x6}}, {@version_L='version=9p2000.L'}, {@cache_none='cache=none'}], [{@subj_role={'subj_role', 0x3d, '/dev/dsp#\x00'}}, {@permit_directio='permit_directio'}, {@measure='measure'}, {@context={'context', 0x3d, 'system_u'}}, {@obj_user={'obj_user'}}, {@dont_hash='dont_hash'}, {@subj_type={'subj_type', 0x3d, '\\eth0('}}, {@fsuuid={'fsuuid', 0x3d, {[0x36, 0x79, 0x0, 0x33, 0x61, 0x62, 0x32], 0x2d, [0x77, 0x32, 0x77, 0x34], 0x2d, [0x7f, 0x67, 0x37, 0x77], 0x2d, [0x0, 0x38, 0x32, 0x33], 0x2d, [0x35, 0x37, 0x7f, 0x7b, 0x37, 0x39, 0x77, 0x33]}}}, {@dont_measure='dont_measure'}]}}) ioctl$VIDIOC_ENUMINPUT(r1, 0xc050561a, &(0x7f0000000300)={0x4, "443b36c4364670c73c2ad26e1952769039650793d10fc72d24ce46e327d06e2f", 0x3, 0x100, 0x4, 0x1057ff, 0x0, 0x6}) 06:23:45 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000040)="2e0000002500817ee45ae087185082cf0f24b0eba06ec4000f2339e00586f9835b3f0016914879008cd90080e230", 0x2e}], 0x1}, 0x0) 06:23:45 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) getsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000400), &(0x7f0000000440)=0x8) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, &(0x7f00000019c0)={0x20}, 0x1) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r1, 0x111, 0x5, 0xc3, 0x4) r2 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x1, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r2, 0xc0045516, &(0x7f0000000040)=0x4) arch_prctl$ARCH_GET_CPUID(0x1011) getpgrp(0x0) flock(r0, 0x0) ioctl$BLKRRPART(0xffffffffffffffff, 0x125f, 0x0) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000200)={@mcast2}) fcntl$F_GET_FILE_RW_HINT(r0, 0x40d, &(0x7f00000000c0)) setsockopt$RDS_CONG_MONITOR(r2, 0x114, 0x6, &(0x7f0000000280), 0x4) ioctl$VHOST_SET_LOG_FD(r2, 0x4004af07, 0x0) ioctl$DRM_IOCTL_IRQ_BUSID(r2, 0xc0106403, &(0x7f0000000100)={0x8875, 0x800, 0x8000, 0xc2}) ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000180)) ioctl$VHOST_SET_VRING_CALL(0xffffffffffffffff, 0x4008af21, &(0x7f0000000380)={0x0, r1}) r3 = fcntl$dupfd(r1, 0x0, r2) setsockopt$IP_VS_SO_SET_STOPDAEMON(r3, 0x0, 0x48c, &(0x7f0000000140)={0x3, 'veth0\x00'}, 0x18) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.cpu/syz1\x00', 0x1ff) openat$snapshot(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/snapshot\x00', 0x0, 0x0) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0xf7fffffffffffffd, 0x2012, r2, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000a40)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x20008000}, 0x24044000) unshare(0x40000000) mount$9p_virtio(&(0x7f00000003c0)='em0%$!,cgroup#\x00', &(0x7f0000000480)='./file0\x00', 0x0, 0x200000, &(0x7f0000000500)={'trans=virtio,', {[{@afid={'afid', 0x3d, 0x6}}, {@version_L='version=9p2000.L'}, {@cache_none='cache=none'}], [{@subj_role={'subj_role', 0x3d, '/dev/dsp#\x00'}}, {@permit_directio='permit_directio'}, {@measure='measure'}, {@context={'context', 0x3d, 'system_u'}}, {@obj_user={'obj_user'}}, {@dont_hash='dont_hash'}, {@subj_type={'subj_type', 0x3d, '\\eth0('}}, {@fsuuid={'fsuuid', 0x3d, {[0x36, 0x79, 0x0, 0x33, 0x61, 0x62, 0x32], 0x2d, [0x77, 0x32, 0x77, 0x34], 0x2d, [0x7f, 0x67, 0x37, 0x77], 0x2d, [0x0, 0x38, 0x32, 0x33], 0x2d, [0x35, 0x37, 0x7f, 0x7b, 0x37, 0x39, 0x77, 0x33]}}}, {@dont_measure='dont_measure'}]}}) ioctl$VIDIOC_ENUMINPUT(r1, 0xc050561a, &(0x7f0000000300)={0x4, "443b36c4364670c73c2ad26e1952769039650793d10fc72d24ce46e327d06e2f", 0x3, 0x100, 0x4, 0x1057ff, 0x0, 0x6}) [ 529.464938][T18449] IPVS: ftp: loaded support on port[0] = 21 [ 529.542087][T18450] IPVS: ftp: loaded support on port[0] = 21 06:23:45 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000040)="2e0000002500817ee45ae087185082cf0f24b0eba06ec400002339e00586f9835b3f1016914879008cd90080e230", 0x2e}], 0x1}, 0x0) 06:23:45 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000040)="2e0000002500817ee45ae087185082cf0f24b0eba06ec400202339e00586f9835b3f0016914879008cd90080e230", 0x2e}], 0x1}, 0x0) 06:23:45 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = creat(&(0x7f0000000000)='./bus\x00', 0x0) getrlimit(0x0, &(0x7f00000000c0)) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0c0583b, &(0x7f0000000040)={0x0, 0xc00000000000000}) 06:23:45 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) getsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000400), &(0x7f0000000440)=0x8) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, &(0x7f00000019c0)={0x20}, 0x1) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r1, 0x111, 0x5, 0xc3, 0x4) r2 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x1, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r2, 0xc0045516, &(0x7f0000000040)=0x4) arch_prctl$ARCH_GET_CPUID(0x1011) getpgrp(0x0) flock(r0, 0x0) ioctl$BLKRRPART(0xffffffffffffffff, 0x125f, 0x0) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000200)={@mcast2}) fcntl$F_GET_FILE_RW_HINT(r0, 0x40d, &(0x7f00000000c0)) setsockopt$RDS_CONG_MONITOR(r2, 0x114, 0x6, &(0x7f0000000280), 0x4) ioctl$VHOST_SET_LOG_FD(r2, 0x4004af07, 0x0) ioctl$DRM_IOCTL_IRQ_BUSID(r2, 0xc0106403, &(0x7f0000000100)={0x8875, 0x800, 0x8000, 0xc2}) ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000180)) ioctl$VHOST_SET_VRING_CALL(0xffffffffffffffff, 0x4008af21, &(0x7f0000000380)={0x0, r1}) r3 = fcntl$dupfd(r1, 0x0, r2) setsockopt$IP_VS_SO_SET_STOPDAEMON(r3, 0x0, 0x48c, &(0x7f0000000140)={0x3, 'veth0\x00'}, 0x18) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.cpu/syz1\x00', 0x1ff) openat$snapshot(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/snapshot\x00', 0x0, 0x0) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0xf7fffffffffffffd, 0x2012, r2, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000a40)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x20008000}, 0x24044000) unshare(0x40000000) mount$9p_virtio(0x0, &(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='9p\x00', 0x200000, &(0x7f0000000500)={'trans=virtio,', {[{@afid={'afid', 0x3d, 0x6}}, {@version_L='version=9p2000.L'}, {@cache_none='cache=none'}], [{@subj_role={'subj_role', 0x3d, '/dev/dsp#\x00'}}, {@permit_directio='permit_directio'}, {@measure='measure'}, {@context={'context', 0x3d, 'system_u'}}, {@obj_user={'obj_user'}}, {@dont_hash='dont_hash'}, {@subj_type={'subj_type', 0x3d, '\\eth0('}}, {@fsuuid={'fsuuid', 0x3d, {[0x36, 0x79, 0x0, 0x33, 0x61, 0x62, 0x32], 0x2d, [0x77, 0x32, 0x77, 0x34], 0x2d, [0x7f, 0x67, 0x37, 0x77], 0x2d, [0x0, 0x38, 0x32, 0x33], 0x2d, [0x35, 0x37, 0x7f, 0x7b, 0x37, 0x39, 0x77, 0x33]}}}, {@dont_measure='dont_measure'}]}}) ioctl$VIDIOC_ENUMINPUT(r1, 0xc050561a, &(0x7f0000000300)={0x4, "443b36c4364670c73c2ad26e1952769039650793d10fc72d24ce46e327d06e2f", 0x3, 0x100, 0x4, 0x1057ff, 0x0, 0x6}) 06:23:45 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) getsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000400), &(0x7f0000000440)=0x8) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, &(0x7f00000019c0)={0x20}, 0x1) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r1, 0x111, 0x5, 0xc3, 0x4) r2 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x1, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r2, 0xc0045516, &(0x7f0000000040)=0x4) arch_prctl$ARCH_GET_CPUID(0x1011) getpgrp(0x0) flock(r0, 0x0) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000200)={@mcast2}) setsockopt$RDS_CONG_MONITOR(r2, 0x114, 0x6, &(0x7f0000000280), 0x4) ioctl$VHOST_SET_LOG_FD(r2, 0x4004af07, 0x0) ioctl$DRM_IOCTL_IRQ_BUSID(r2, 0xc0106403, &(0x7f0000000100)={0x8875, 0x800, 0x8000, 0xc2}) ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000180)) ioctl$VHOST_SET_VRING_CALL(0xffffffffffffffff, 0x4008af21, &(0x7f0000000380)={0x0, r1}) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x3, 'veth0\x00'}, 0x18) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.cpu/syz1\x00', 0x1ff) openat$snapshot(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/snapshot\x00', 0x0, 0x0) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0xf7fffffffffffffd, 0x2012, r2, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000a40)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x20008000}, 0x24044000) unshare(0x40000000) mount$9p_virtio(&(0x7f00000003c0)='em0%$!,cgroup#\x00', &(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='9p\x00', 0x200000, &(0x7f0000000500)={'trans=virtio,', {[{@afid={'afid', 0x3d, 0x6}}, {@version_L='version=9p2000.L'}, {@cache_none='cache=none'}], [{@subj_role={'subj_role', 0x3d, '/dev/dsp#\x00'}}, {@permit_directio='permit_directio'}, {@measure='measure'}, {@context={'context', 0x3d, 'system_u'}}, {@obj_user={'obj_user'}}, {@dont_hash='dont_hash'}, {@subj_type={'subj_type', 0x3d, '\\eth0('}}, {@fsuuid={'fsuuid', 0x3d, {[0x36, 0x79, 0x0, 0x33, 0x61, 0x62, 0x32], 0x2d, [0x77, 0x32, 0x77, 0x34], 0x2d, [0x7f, 0x67, 0x37, 0x77], 0x2d, [0x0, 0x38, 0x32, 0x33], 0x2d, [0x35, 0x37, 0x7f, 0x7b, 0x37, 0x39, 0x77, 0x33]}}}, {@dont_measure='dont_measure'}]}}) ioctl$VIDIOC_ENUMINPUT(r1, 0xc050561a, &(0x7f0000000300)={0x4, "443b36c4364670c73c2ad26e1952769039650793d10fc72d24ce46e327d06e2f", 0x3, 0x100, 0x4, 0x1057ff, 0x0, 0x6}) 06:23:45 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = creat(&(0x7f0000000000)='./bus\x00', 0x0) getrlimit(0x0, &(0x7f00000000c0)) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0c0583b, &(0x7f0000000040)={0x0, 0xd00000000000000}) 06:23:45 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000040)="2e0000002500817ee45ae087185082cf0f24b0eba06ec400002339e00586f9835b3f4816914879008cd90080e230", 0x2e}], 0x1}, 0x0) 06:23:45 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000040)="2e0000002500817ee45ae087185082cf0f24b0eba06ec4003f2339e00586f9835b3f0016914879008cd90080e230", 0x2e}], 0x1}, 0x0) [ 530.063672][T18469] IPVS: ftp: loaded support on port[0] = 21 06:23:45 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) getsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000400), &(0x7f0000000440)=0x8) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, &(0x7f00000019c0)={0x20}, 0x1) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r1, 0x111, 0x5, 0xc3, 0x4) r2 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x1, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r2, 0xc0045516, &(0x7f0000000040)=0x4) arch_prctl$ARCH_GET_CPUID(0x1011) getpgrp(0x0) flock(r0, 0x0) ioctl$BLKRRPART(0xffffffffffffffff, 0x125f, 0x0) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000200)={@mcast2}) fcntl$F_GET_FILE_RW_HINT(r0, 0x40d, &(0x7f00000000c0)) setsockopt$RDS_CONG_MONITOR(r2, 0x114, 0x6, &(0x7f0000000280), 0x4) ioctl$VHOST_SET_LOG_FD(r2, 0x4004af07, 0x0) ioctl$DRM_IOCTL_IRQ_BUSID(r2, 0xc0106403, &(0x7f0000000100)={0x8875, 0x800, 0x8000, 0xc2}) ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000180)) ioctl$VHOST_SET_VRING_CALL(0xffffffffffffffff, 0x4008af21, &(0x7f0000000380)={0x0, r1}) r3 = fcntl$dupfd(r1, 0x0, r2) setsockopt$IP_VS_SO_SET_STOPDAEMON(r3, 0x0, 0x48c, &(0x7f0000000140)={0x3, 'veth0\x00'}, 0x18) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.cpu/syz1\x00', 0x1ff) openat$snapshot(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/snapshot\x00', 0x0, 0x0) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0xf7fffffffffffffd, 0x2012, r2, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000a40)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x20008000}, 0x24044000) unshare(0x40000000) mount$9p_virtio(&(0x7f00000003c0)='em0%$!,cgroup#\x00', &(0x7f0000000480)='./file0\x00', 0x0, 0x200000, &(0x7f0000000500)={'trans=virtio,', {[{@afid={'afid', 0x3d, 0x6}}, {@version_L='version=9p2000.L'}, {@cache_none='cache=none'}], [{@subj_role={'subj_role', 0x3d, '/dev/dsp#\x00'}}, {@permit_directio='permit_directio'}, {@measure='measure'}, {@context={'context', 0x3d, 'system_u'}}, {@obj_user={'obj_user'}}, {@dont_hash='dont_hash'}, {@subj_type={'subj_type', 0x3d, '\\eth0('}}, {@fsuuid={'fsuuid', 0x3d, {[0x36, 0x79, 0x0, 0x33, 0x61, 0x62, 0x32], 0x2d, [0x77, 0x32, 0x77, 0x34], 0x2d, [0x7f, 0x67, 0x37, 0x77], 0x2d, [0x0, 0x38, 0x32, 0x33], 0x2d, [0x35, 0x37, 0x7f, 0x7b, 0x37, 0x39, 0x77, 0x33]}}}, {@dont_measure='dont_measure'}]}}) ioctl$VIDIOC_ENUMINPUT(r1, 0xc050561a, &(0x7f0000000300)={0x4, "443b36c4364670c73c2ad26e1952769039650793d10fc72d24ce46e327d06e2f", 0x3, 0x100, 0x4, 0x1057ff, 0x0, 0x6}) [ 530.137286][T18470] IPVS: ftp: loaded support on port[0] = 21 [ 530.536196][T18486] IPVS: ftp: loaded support on port[0] = 21 [ 530.802972][T18488] IPVS: ftp: loaded support on port[0] = 21 06:23:46 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) getsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000400), &(0x7f0000000440)=0x8) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, &(0x7f00000019c0)={0x20}, 0x1) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r1, 0x111, 0x5, 0xc3, 0x4) r2 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x1, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r2, 0xc0045516, &(0x7f0000000040)=0x4) arch_prctl$ARCH_GET_CPUID(0x1011) getpgrp(0x0) flock(r0, 0x0) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000200)={@mcast2}) setsockopt$RDS_CONG_MONITOR(r2, 0x114, 0x6, &(0x7f0000000280), 0x4) ioctl$VHOST_SET_LOG_FD(r2, 0x4004af07, 0x0) ioctl$DRM_IOCTL_IRQ_BUSID(r2, 0xc0106403, &(0x7f0000000100)={0x8875, 0x800, 0x8000, 0xc2}) ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000180)) ioctl$VHOST_SET_VRING_CALL(0xffffffffffffffff, 0x4008af21, &(0x7f0000000380)={0x0, r1}) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x3, 'veth0\x00'}, 0x18) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.cpu/syz1\x00', 0x1ff) openat$snapshot(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/snapshot\x00', 0x0, 0x0) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0xf7fffffffffffffd, 0x2012, r2, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000a40)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x20008000}, 0x24044000) unshare(0x40000000) mount$9p_virtio(&(0x7f00000003c0)='em0%$!,cgroup#\x00', &(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='9p\x00', 0x200000, &(0x7f0000000500)={'trans=virtio,', {[{@afid={'afid', 0x3d, 0x6}}, {@version_L='version=9p2000.L'}, {@cache_none='cache=none'}], [{@subj_role={'subj_role', 0x3d, '/dev/dsp#\x00'}}, {@permit_directio='permit_directio'}, {@measure='measure'}, {@context={'context', 0x3d, 'system_u'}}, {@obj_user={'obj_user'}}, {@dont_hash='dont_hash'}, {@subj_type={'subj_type', 0x3d, '\\eth0('}}, {@fsuuid={'fsuuid', 0x3d, {[0x36, 0x79, 0x0, 0x33, 0x61, 0x62, 0x32], 0x2d, [0x77, 0x32, 0x77, 0x34], 0x2d, [0x7f, 0x67, 0x37, 0x77], 0x2d, [0x0, 0x38, 0x32, 0x33], 0x2d, [0x35, 0x37, 0x7f, 0x7b, 0x37, 0x39, 0x77, 0x33]}}}, {@dont_measure='dont_measure'}]}}) ioctl$VIDIOC_ENUMINPUT(r1, 0xc050561a, &(0x7f0000000300)={0x4, "443b36c4364670c73c2ad26e1952769039650793d10fc72d24ce46e327d06e2f", 0x3, 0x100, 0x4, 0x1057ff, 0x0, 0x6}) 06:23:46 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = creat(&(0x7f0000000000)='./bus\x00', 0x0) getrlimit(0x0, &(0x7f00000000c0)) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0c0583b, &(0x7f0000000040)={0x0, 0xe00000000000000}) 06:23:46 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000040)="2e0000002500817ee45ae087185082cf0f24b0eba06ec400002339e00586f9835b3f4c16914879008cd90080e230", 0x2e}], 0x1}, 0x0) 06:23:46 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000040)="2e0000002500817ee45ae087185082cf0f24b0eba06ec400482339e00586f9835b3f0016914879008cd90080e230", 0x2e}], 0x1}, 0x0) 06:23:46 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) getsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000400), &(0x7f0000000440)=0x8) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, &(0x7f00000019c0)={0x20}, 0x1) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r1, 0x111, 0x5, 0xc3, 0x4) r2 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x1, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r2, 0xc0045516, &(0x7f0000000040)=0x4) arch_prctl$ARCH_GET_CPUID(0x1011) getpgrp(0x0) flock(r0, 0x0) ioctl$BLKRRPART(0xffffffffffffffff, 0x125f, 0x0) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000200)={@mcast2}) fcntl$F_GET_FILE_RW_HINT(r0, 0x40d, &(0x7f00000000c0)) setsockopt$RDS_CONG_MONITOR(r2, 0x114, 0x6, &(0x7f0000000280), 0x4) ioctl$VHOST_SET_LOG_FD(r2, 0x4004af07, 0x0) ioctl$DRM_IOCTL_IRQ_BUSID(r2, 0xc0106403, &(0x7f0000000100)={0x8875, 0x800, 0x8000, 0xc2}) ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000180)) ioctl$VHOST_SET_VRING_CALL(0xffffffffffffffff, 0x4008af21, &(0x7f0000000380)={0x0, r1}) r3 = fcntl$dupfd(r1, 0x0, r2) setsockopt$IP_VS_SO_SET_STOPDAEMON(r3, 0x0, 0x48c, &(0x7f0000000140)={0x3, 'veth0\x00'}, 0x18) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.cpu/syz1\x00', 0x1ff) openat$snapshot(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/snapshot\x00', 0x0, 0x0) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0xf7fffffffffffffd, 0x2012, r2, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000a40)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x20008000}, 0x24044000) unshare(0x40000000) mount$9p_virtio(&(0x7f00000003c0)='em0%$!,cgroup#\x00', &(0x7f0000000480)='./file0\x00', 0x0, 0x200000, &(0x7f0000000500)={'trans=virtio,', {[{@afid={'afid', 0x3d, 0x6}}, {@version_L='version=9p2000.L'}, {@cache_none='cache=none'}], [{@subj_role={'subj_role', 0x3d, '/dev/dsp#\x00'}}, {@permit_directio='permit_directio'}, {@measure='measure'}, {@context={'context', 0x3d, 'system_u'}}, {@obj_user={'obj_user'}}, {@dont_hash='dont_hash'}, {@subj_type={'subj_type', 0x3d, '\\eth0('}}, {@fsuuid={'fsuuid', 0x3d, {[0x36, 0x79, 0x0, 0x33, 0x61, 0x62, 0x32], 0x2d, [0x77, 0x32, 0x77, 0x34], 0x2d, [0x7f, 0x67, 0x37, 0x77], 0x2d, [0x0, 0x38, 0x32, 0x33], 0x2d, [0x35, 0x37, 0x7f, 0x7b, 0x37, 0x39, 0x77, 0x33]}}}, {@dont_measure='dont_measure'}]}}) ioctl$VIDIOC_ENUMINPUT(r1, 0xc050561a, &(0x7f0000000300)={0x4, "443b36c4364670c73c2ad26e1952769039650793d10fc72d24ce46e327d06e2f", 0x3, 0x100, 0x4, 0x1057ff, 0x0, 0x6}) 06:23:46 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) getsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000400), &(0x7f0000000440)=0x8) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, &(0x7f00000019c0)={0x20}, 0x1) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r1, 0x111, 0x5, 0xc3, 0x4) r2 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x1, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r2, 0xc0045516, &(0x7f0000000040)=0x4) arch_prctl$ARCH_GET_CPUID(0x1011) getpgrp(0x0) flock(r0, 0x0) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000200)={@mcast2}) setsockopt$RDS_CONG_MONITOR(r2, 0x114, 0x6, &(0x7f0000000280), 0x4) ioctl$VHOST_SET_LOG_FD(r2, 0x4004af07, 0x0) ioctl$DRM_IOCTL_IRQ_BUSID(r2, 0xc0106403, &(0x7f0000000100)={0x8875, 0x800, 0x8000, 0xc2}) ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000180)) ioctl$VHOST_SET_VRING_CALL(0xffffffffffffffff, 0x4008af21, &(0x7f0000000380)={0x0, r1}) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x3, 'veth0\x00'}, 0x18) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.cpu/syz1\x00', 0x1ff) openat$snapshot(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/snapshot\x00', 0x0, 0x0) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0xf7fffffffffffffd, 0x2012, r2, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000a40)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x20008000}, 0x24044000) unshare(0x40000000) mount$9p_virtio(&(0x7f00000003c0)='em0%$!,cgroup#\x00', &(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='9p\x00', 0x200000, &(0x7f0000000500)={'trans=virtio,', {[{@afid={'afid', 0x3d, 0x6}}, {@version_L='version=9p2000.L'}, {@cache_none='cache=none'}], [{@subj_role={'subj_role', 0x3d, '/dev/dsp#\x00'}}, {@permit_directio='permit_directio'}, {@measure='measure'}, {@context={'context', 0x3d, 'system_u'}}, {@obj_user={'obj_user'}}, {@dont_hash='dont_hash'}, {@subj_type={'subj_type', 0x3d, '\\eth0('}}, {@fsuuid={'fsuuid', 0x3d, {[0x36, 0x79, 0x0, 0x33, 0x61, 0x62, 0x32], 0x2d, [0x77, 0x32, 0x77, 0x34], 0x2d, [0x7f, 0x67, 0x37, 0x77], 0x2d, [0x0, 0x38, 0x32, 0x33], 0x2d, [0x35, 0x37, 0x7f, 0x7b, 0x37, 0x39, 0x77, 0x33]}}}, {@dont_measure='dont_measure'}]}}) ioctl$VIDIOC_ENUMINPUT(r1, 0xc050561a, &(0x7f0000000300)={0x4, "443b36c4364670c73c2ad26e1952769039650793d10fc72d24ce46e327d06e2f", 0x3, 0x100, 0x4, 0x1057ff, 0x0, 0x6}) 06:23:46 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = creat(&(0x7f0000000000)='./bus\x00', 0x0) getrlimit(0x0, &(0x7f00000000c0)) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0c0583b, &(0x7f0000000040)={0x0, 0xf00000000000000}) 06:23:46 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) getsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000400), &(0x7f0000000440)=0x8) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, &(0x7f00000019c0)={0x20}, 0x1) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r1, 0x111, 0x5, 0xc3, 0x4) r2 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x1, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r2, 0xc0045516, &(0x7f0000000040)=0x4) arch_prctl$ARCH_GET_CPUID(0x1011) getpgrp(0x0) flock(r0, 0x0) ioctl$BLKRRPART(0xffffffffffffffff, 0x125f, 0x0) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000200)={@mcast2}) fcntl$F_GET_FILE_RW_HINT(r0, 0x40d, &(0x7f00000000c0)) setsockopt$RDS_CONG_MONITOR(r2, 0x114, 0x6, &(0x7f0000000280), 0x4) ioctl$VHOST_SET_LOG_FD(r2, 0x4004af07, 0x0) ioctl$DRM_IOCTL_IRQ_BUSID(r2, 0xc0106403, &(0x7f0000000100)={0x8875, 0x800, 0x8000, 0xc2}) ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000180)) ioctl$VHOST_SET_VRING_CALL(0xffffffffffffffff, 0x4008af21, &(0x7f0000000380)={0x0, r1}) r3 = fcntl$dupfd(r1, 0x0, r2) setsockopt$IP_VS_SO_SET_STOPDAEMON(r3, 0x0, 0x48c, &(0x7f0000000140)={0x3, 'veth0\x00'}, 0x18) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.cpu/syz1\x00', 0x1ff) openat$snapshot(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/snapshot\x00', 0x0, 0x0) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0xf7fffffffffffffd, 0x2012, r2, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000a40)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x20008000}, 0x24044000) unshare(0x40000000) mount$9p_virtio(&(0x7f00000003c0)='em0%$!,cgroup#\x00', &(0x7f0000000480)='./file0\x00', 0x0, 0x200000, &(0x7f0000000500)={'trans=virtio,', {[{@afid={'afid', 0x3d, 0x6}}, {@version_L='version=9p2000.L'}, {@cache_none='cache=none'}], [{@subj_role={'subj_role', 0x3d, '/dev/dsp#\x00'}}, {@permit_directio='permit_directio'}, {@measure='measure'}, {@context={'context', 0x3d, 'system_u'}}, {@obj_user={'obj_user'}}, {@dont_hash='dont_hash'}, {@subj_type={'subj_type', 0x3d, '\\eth0('}}, {@fsuuid={'fsuuid', 0x3d, {[0x36, 0x79, 0x0, 0x33, 0x61, 0x62, 0x32], 0x2d, [0x77, 0x32, 0x77, 0x34], 0x2d, [0x7f, 0x67, 0x37, 0x77], 0x2d, [0x0, 0x38, 0x32, 0x33], 0x2d, [0x35, 0x37, 0x7f, 0x7b, 0x37, 0x39, 0x77, 0x33]}}}, {@dont_measure='dont_measure'}]}}) ioctl$VIDIOC_ENUMINPUT(r1, 0xc050561a, &(0x7f0000000300)={0x4, "443b36c4364670c73c2ad26e1952769039650793d10fc72d24ce46e327d06e2f", 0x3, 0x100, 0x4, 0x1057ff, 0x0, 0x6}) [ 531.112227][T18501] __nla_parse: 28 callbacks suppressed [ 531.112237][T18501] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.5'. [ 531.198424][T18500] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.4'. [ 531.246281][T18509] IPVS: ftp: loaded support on port[0] = 21 [ 531.299510][T18512] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.5'. [ 531.377104][T18511] IPVS: ftp: loaded support on port[0] = 21 [ 531.461650][T18508] IPVS: ftp: loaded support on port[0] = 21 06:23:48 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) getsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000400), &(0x7f0000000440)=0x8) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, &(0x7f00000019c0)={0x20}, 0x1) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r1, 0x111, 0x5, 0xc3, 0x4) r2 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x1, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r2, 0xc0045516, &(0x7f0000000040)=0x4) arch_prctl$ARCH_GET_CPUID(0x1011) getpgrp(0x0) flock(r0, 0x0) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000200)={@mcast2}) setsockopt$RDS_CONG_MONITOR(r2, 0x114, 0x6, &(0x7f0000000280), 0x4) ioctl$VHOST_SET_LOG_FD(r2, 0x4004af07, 0x0) ioctl$DRM_IOCTL_IRQ_BUSID(r2, 0xc0106403, &(0x7f0000000100)={0x8875, 0x800, 0x8000, 0xc2}) ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000180)) ioctl$VHOST_SET_VRING_CALL(0xffffffffffffffff, 0x4008af21, &(0x7f0000000380)={0x0, r1}) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x3, 'veth0\x00'}, 0x18) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.cpu/syz1\x00', 0x1ff) openat$snapshot(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/snapshot\x00', 0x0, 0x0) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0xf7fffffffffffffd, 0x2012, r2, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000a40)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x20008000}, 0x24044000) unshare(0x40000000) mount$9p_virtio(&(0x7f00000003c0)='em0%$!,cgroup#\x00', &(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='9p\x00', 0x200000, &(0x7f0000000500)={'trans=virtio,', {[{@afid={'afid', 0x3d, 0x6}}, {@version_L='version=9p2000.L'}, {@cache_none='cache=none'}], [{@subj_role={'subj_role', 0x3d, '/dev/dsp#\x00'}}, {@permit_directio='permit_directio'}, {@measure='measure'}, {@context={'context', 0x3d, 'system_u'}}, {@obj_user={'obj_user'}}, {@dont_hash='dont_hash'}, {@subj_type={'subj_type', 0x3d, '\\eth0('}}, {@fsuuid={'fsuuid', 0x3d, {[0x36, 0x79, 0x0, 0x33, 0x61, 0x62, 0x32], 0x2d, [0x77, 0x32, 0x77, 0x34], 0x2d, [0x7f, 0x67, 0x37, 0x77], 0x2d, [0x0, 0x38, 0x32, 0x33], 0x2d, [0x35, 0x37, 0x7f, 0x7b, 0x37, 0x39, 0x77, 0x33]}}}, {@dont_measure='dont_measure'}]}}) ioctl$VIDIOC_ENUMINPUT(r1, 0xc050561a, &(0x7f0000000300)={0x4, "443b36c4364670c73c2ad26e1952769039650793d10fc72d24ce46e327d06e2f", 0x3, 0x100, 0x4, 0x1057ff, 0x0, 0x6}) 06:23:48 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000040)="2e0000002500817ee45ae087185082cf0f24b0eba06ec4004c2339e00586f9835b3f0016914879008cd90080e230", 0x2e}], 0x1}, 0x0) 06:23:48 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) getsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000400), &(0x7f0000000440)=0x8) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, &(0x7f00000019c0)={0x20}, 0x1) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r1, 0x111, 0x5, 0xc3, 0x4) r2 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x1, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r2, 0xc0045516, &(0x7f0000000040)=0x4) arch_prctl$ARCH_GET_CPUID(0x1011) getpgrp(0x0) flock(r0, 0x0) ioctl$BLKRRPART(0xffffffffffffffff, 0x125f, 0x0) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000200)={@mcast2}) fcntl$F_GET_FILE_RW_HINT(r0, 0x40d, &(0x7f00000000c0)) setsockopt$RDS_CONG_MONITOR(r2, 0x114, 0x6, &(0x7f0000000280), 0x4) ioctl$VHOST_SET_LOG_FD(r2, 0x4004af07, 0x0) ioctl$DRM_IOCTL_IRQ_BUSID(r2, 0xc0106403, &(0x7f0000000100)={0x8875, 0x800, 0x8000, 0xc2}) ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000180)) ioctl$VHOST_SET_VRING_CALL(0xffffffffffffffff, 0x4008af21, &(0x7f0000000380)={0x0, r1}) r3 = fcntl$dupfd(r1, 0x0, r2) setsockopt$IP_VS_SO_SET_STOPDAEMON(r3, 0x0, 0x48c, &(0x7f0000000140)={0x3, 'veth0\x00'}, 0x18) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.cpu/syz1\x00', 0x1ff) openat$snapshot(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/snapshot\x00', 0x0, 0x0) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0xf7fffffffffffffd, 0x2012, r2, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000a40)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x20008000}, 0x24044000) unshare(0x40000000) mount$9p_virtio(&(0x7f00000003c0)='em0%$!,cgroup#\x00', &(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='9p\x00', 0x0, &(0x7f0000000500)={'trans=virtio,', {[{@afid={'afid', 0x3d, 0x6}}, {@version_L='version=9p2000.L'}, {@cache_none='cache=none'}], [{@subj_role={'subj_role', 0x3d, '/dev/dsp#\x00'}}, {@permit_directio='permit_directio'}, {@measure='measure'}, {@context={'context', 0x3d, 'system_u'}}, {@obj_user={'obj_user'}}, {@dont_hash='dont_hash'}, {@subj_type={'subj_type', 0x3d, '\\eth0('}}, {@fsuuid={'fsuuid', 0x3d, {[0x36, 0x79, 0x0, 0x33, 0x61, 0x62, 0x32], 0x2d, [0x77, 0x32, 0x77, 0x34], 0x2d, [0x7f, 0x67, 0x37, 0x77], 0x2d, [0x0, 0x38, 0x32, 0x33], 0x2d, [0x35, 0x37, 0x7f, 0x7b, 0x37, 0x39, 0x77, 0x33]}}}, {@dont_measure='dont_measure'}]}}) ioctl$VIDIOC_ENUMINPUT(r1, 0xc050561a, &(0x7f0000000300)={0x4, "443b36c4364670c73c2ad26e1952769039650793d10fc72d24ce46e327d06e2f", 0x3, 0x100, 0x4, 0x1057ff, 0x0, 0x6}) 06:23:48 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000040)="2e0000002500817ee45ae087185082cf0f24b0eba06ec400002339e00586f9835b3f6016914879008cd90080e230", 0x2e}], 0x1}, 0x0) 06:23:48 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = creat(&(0x7f0000000000)='./bus\x00', 0x0) getrlimit(0x0, &(0x7f00000000c0)) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x1000000000000000}) [ 532.725309][T18521] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.4'. [ 532.978175][T18531] IPVS: ftp: loaded support on port[0] = 21 [ 532.982893][T18527] IPVS: ftp: loaded support on port[0] = 21 [ 534.221710][T18525] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.5'. 06:23:49 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000040)="2e0000002500817ee45ae087185082cf0f24b0eba06ec400202339e00586f9835b3f0016914879008cd90080e230", 0x2e}], 0x1}, 0x0) 06:23:50 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = creat(&(0x7f0000000000)='./bus\x00', 0x0) getrlimit(0x0, &(0x7f00000000c0)) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x11dc000000000000}) [ 534.280319][T18536] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.5'. 06:23:50 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) getsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000400), &(0x7f0000000440)=0x8) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, &(0x7f00000019c0)={0x20}, 0x1) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r1, 0x111, 0x5, 0xc3, 0x4) r2 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x1, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r2, 0xc0045516, &(0x7f0000000040)=0x4) arch_prctl$ARCH_GET_CPUID(0x1011) getpgrp(0x0) flock(r0, 0x0) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000200)={@mcast2}) setsockopt$RDS_CONG_MONITOR(r2, 0x114, 0x6, &(0x7f0000000280), 0x4) ioctl$VHOST_SET_LOG_FD(r2, 0x4004af07, 0x0) ioctl$DRM_IOCTL_IRQ_BUSID(r2, 0xc0106403, &(0x7f0000000100)={0x8875, 0x800, 0x8000, 0xc2}) ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000180)) ioctl$VHOST_SET_VRING_CALL(0xffffffffffffffff, 0x4008af21, &(0x7f0000000380)={0x0, r1}) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x3, 'veth0\x00'}, 0x18) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.cpu/syz1\x00', 0x1ff) openat$snapshot(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/snapshot\x00', 0x0, 0x0) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0xf7fffffffffffffd, 0x2012, r2, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000a40)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x20008000}, 0x24044000) unshare(0x40000000) mount$9p_virtio(&(0x7f00000003c0)='em0%$!,cgroup#\x00', &(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='9p\x00', 0x200000, &(0x7f0000000500)={'trans=virtio,', {[{@afid={'afid', 0x3d, 0x6}}, {@version_L='version=9p2000.L'}, {@cache_none='cache=none'}], [{@subj_role={'subj_role', 0x3d, '/dev/dsp#\x00'}}, {@permit_directio='permit_directio'}, {@measure='measure'}, {@context={'context', 0x3d, 'system_u'}}, {@obj_user={'obj_user'}}, {@dont_hash='dont_hash'}, {@subj_type={'subj_type', 0x3d, '\\eth0('}}, {@fsuuid={'fsuuid', 0x3d, {[0x36, 0x79, 0x0, 0x33, 0x61, 0x62, 0x32], 0x2d, [0x77, 0x32, 0x77, 0x34], 0x2d, [0x7f, 0x67, 0x37, 0x77], 0x2d, [0x0, 0x38, 0x32, 0x33], 0x2d, [0x35, 0x37, 0x7f, 0x7b, 0x37, 0x39, 0x77, 0x33]}}}, {@dont_measure='dont_measure'}]}}) ioctl$VIDIOC_ENUMINPUT(r1, 0xc050561a, &(0x7f0000000300)={0x4, "443b36c4364670c73c2ad26e1952769039650793d10fc72d24ce46e327d06e2f", 0x3, 0x100, 0x4, 0x1057ff, 0x0, 0x6}) 06:23:50 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) getsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000400), &(0x7f0000000440)=0x8) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, &(0x7f00000019c0)={0x20}, 0x1) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r1, 0x111, 0x5, 0xc3, 0x4) r2 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x1, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r2, 0xc0045516, &(0x7f0000000040)=0x4) arch_prctl$ARCH_GET_CPUID(0x1011) getpgrp(0x0) flock(r0, 0x0) ioctl$BLKRRPART(0xffffffffffffffff, 0x125f, 0x0) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000200)={@mcast2}) fcntl$F_GET_FILE_RW_HINT(r0, 0x40d, &(0x7f00000000c0)) setsockopt$RDS_CONG_MONITOR(r2, 0x114, 0x6, &(0x7f0000000280), 0x4) ioctl$VHOST_SET_LOG_FD(r2, 0x4004af07, 0x0) ioctl$DRM_IOCTL_IRQ_BUSID(r2, 0xc0106403, &(0x7f0000000100)={0x8875, 0x800, 0x8000, 0xc2}) ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000180)) ioctl$VHOST_SET_VRING_CALL(0xffffffffffffffff, 0x4008af21, &(0x7f0000000380)={0x0, r1}) r3 = fcntl$dupfd(r1, 0x0, r2) setsockopt$IP_VS_SO_SET_STOPDAEMON(r3, 0x0, 0x48c, &(0x7f0000000140)={0x3, 'veth0\x00'}, 0x18) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.cpu/syz1\x00', 0x1ff) openat$snapshot(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/snapshot\x00', 0x0, 0x0) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0xf7fffffffffffffd, 0x2012, r2, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000a40)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x20008000}, 0x24044000) unshare(0x40000000) mount$9p_virtio(&(0x7f00000003c0)='em0%$!,cgroup#\x00', &(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='9p\x00', 0x0, &(0x7f0000000500)={'trans=virtio,', {[{@afid={'afid', 0x3d, 0x6}}, {@version_L='version=9p2000.L'}, {@cache_none='cache=none'}], [{@subj_role={'subj_role', 0x3d, '/dev/dsp#\x00'}}, {@permit_directio='permit_directio'}, {@measure='measure'}, {@context={'context', 0x3d, 'system_u'}}, {@obj_user={'obj_user'}}, {@dont_hash='dont_hash'}, {@subj_type={'subj_type', 0x3d, '\\eth0('}}, {@fsuuid={'fsuuid', 0x3d, {[0x36, 0x79, 0x0, 0x33, 0x61, 0x62, 0x32], 0x2d, [0x77, 0x32, 0x77, 0x34], 0x2d, [0x7f, 0x67, 0x37, 0x77], 0x2d, [0x0, 0x38, 0x32, 0x33], 0x2d, [0x35, 0x37, 0x7f, 0x7b, 0x37, 0x39, 0x77, 0x33]}}}, {@dont_measure='dont_measure'}]}}) ioctl$VIDIOC_ENUMINPUT(r1, 0xc050561a, &(0x7f0000000300)={0x4, "443b36c4364670c73c2ad26e1952769039650793d10fc72d24ce46e327d06e2f", 0x3, 0x100, 0x4, 0x1057ff, 0x0, 0x6}) [ 534.339387][T18538] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.4'. [ 534.391740][T18540] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.3'. 06:23:50 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000040)="2e0000002500817ee45ae087185082cf0f24b0eba06ec400002339e00586f9835b3f6816914879008cd90080e230", 0x2e}], 0x1}, 0x0) [ 534.505204][T18545] IPVS: ftp: loaded support on port[0] = 21 [ 534.671681][T18549] IPVS: ftp: loaded support on port[0] = 21 06:23:51 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000040)="2e0000002500817ee45ae087185082cf0f24b0eba06ec400602339e00586f9835b3f0016914879008cd90080e230", 0x2e}], 0x1}, 0x0) 06:23:51 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) getsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000400), &(0x7f0000000440)=0x8) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, &(0x7f00000019c0)={0x20}, 0x1) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r1, 0x111, 0x5, 0xc3, 0x4) r2 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x1, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r2, 0xc0045516, &(0x7f0000000040)=0x4) arch_prctl$ARCH_GET_CPUID(0x1011) getpgrp(0x0) flock(r0, 0x0) ioctl$BLKRRPART(0xffffffffffffffff, 0x125f, 0x0) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000200)={@mcast2}) fcntl$F_GET_FILE_RW_HINT(r0, 0x40d, &(0x7f00000000c0)) setsockopt$RDS_CONG_MONITOR(r2, 0x114, 0x6, &(0x7f0000000280), 0x4) ioctl$VHOST_SET_LOG_FD(r2, 0x4004af07, 0x0) ioctl$DRM_IOCTL_IRQ_BUSID(r2, 0xc0106403, &(0x7f0000000100)={0x8875, 0x800, 0x8000, 0xc2}) ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000180)) ioctl$VHOST_SET_VRING_CALL(0xffffffffffffffff, 0x4008af21, &(0x7f0000000380)={0x0, r1}) r3 = fcntl$dupfd(r1, 0x0, r2) setsockopt$IP_VS_SO_SET_STOPDAEMON(r3, 0x0, 0x48c, &(0x7f0000000140)={0x3, 'veth0\x00'}, 0x18) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.cpu/syz1\x00', 0x1ff) openat$snapshot(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/snapshot\x00', 0x0, 0x0) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0xf7fffffffffffffd, 0x2012, r2, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000a40)={0x0, 0x0, 0x0}, 0x24044000) unshare(0x40000000) mount$9p_virtio(&(0x7f00000003c0)='em0%$!,cgroup#\x00', &(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='9p\x00', 0x200000, &(0x7f0000000500)={'trans=virtio,', {[{@afid={'afid', 0x3d, 0x6}}, {@version_L='version=9p2000.L'}, {@cache_none='cache=none'}], [{@subj_role={'subj_role', 0x3d, '/dev/dsp#\x00'}}, {@permit_directio='permit_directio'}, {@measure='measure'}, {@context={'context', 0x3d, 'system_u'}}, {@obj_user={'obj_user'}}, {@dont_hash='dont_hash'}, {@subj_type={'subj_type', 0x3d, '\\eth0('}}, {@fsuuid={'fsuuid', 0x3d, {[0x36, 0x79, 0x0, 0x33, 0x61, 0x62, 0x32], 0x2d, [0x77, 0x32, 0x77, 0x34], 0x2d, [0x7f, 0x67, 0x37, 0x77], 0x2d, [0x0, 0x38, 0x32, 0x33], 0x2d, [0x35, 0x37, 0x7f, 0x7b, 0x37, 0x39, 0x77, 0x33]}}}, {@dont_measure='dont_measure'}]}}) ioctl$VIDIOC_ENUMINPUT(r1, 0xc050561a, &(0x7f0000000300)={0x4, "443b36c4364670c73c2ad26e1952769039650793d10fc72d24ce46e327d06e2f", 0x3, 0x100, 0x4, 0x1057ff, 0x0, 0x6}) [ 535.505912][T18554] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.5'. 06:23:51 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = creat(&(0x7f0000000000)='./bus\x00', 0x0) getrlimit(0x0, &(0x7f00000000c0)) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x1200000000000000}) [ 535.569190][T18558] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.4'. 06:23:51 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) getsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000400), &(0x7f0000000440)=0x8) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, &(0x7f00000019c0)={0x20}, 0x1) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r1, 0x111, 0x5, 0xc3, 0x4) r2 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x1, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r2, 0xc0045516, &(0x7f0000000040)=0x4) arch_prctl$ARCH_GET_CPUID(0x1011) getpgrp(0x0) flock(r0, 0x0) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000200)={@mcast2}) setsockopt$RDS_CONG_MONITOR(r2, 0x114, 0x6, &(0x7f0000000280), 0x4) ioctl$VHOST_SET_LOG_FD(r2, 0x4004af07, 0x0) ioctl$DRM_IOCTL_IRQ_BUSID(r2, 0xc0106403, &(0x7f0000000100)={0x8875, 0x800, 0x8000, 0xc2}) ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000180)) ioctl$VHOST_SET_VRING_CALL(0xffffffffffffffff, 0x4008af21, &(0x7f0000000380)={0x0, r1}) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x3, 'veth0\x00'}, 0x18) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.cpu/syz1\x00', 0x1ff) openat$snapshot(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/snapshot\x00', 0x0, 0x0) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0xf7fffffffffffffd, 0x2012, r2, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000a40)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x20008000}, 0x24044000) unshare(0x40000000) mount$9p_virtio(&(0x7f00000003c0)='em0%$!,cgroup#\x00', &(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='9p\x00', 0x200000, &(0x7f0000000500)={'trans=virtio,', {[{@afid={'afid', 0x3d, 0x6}}, {@version_L='version=9p2000.L'}, {@cache_none='cache=none'}], [{@subj_role={'subj_role', 0x3d, '/dev/dsp#\x00'}}, {@permit_directio='permit_directio'}, {@measure='measure'}, {@context={'context', 0x3d, 'system_u'}}, {@obj_user={'obj_user'}}, {@dont_hash='dont_hash'}, {@subj_type={'subj_type', 0x3d, '\\eth0('}}, {@fsuuid={'fsuuid', 0x3d, {[0x36, 0x79, 0x0, 0x33, 0x61, 0x62, 0x32], 0x2d, [0x77, 0x32, 0x77, 0x34], 0x2d, [0x7f, 0x67, 0x37, 0x77], 0x2d, [0x0, 0x38, 0x32, 0x33], 0x2d, [0x35, 0x37, 0x7f, 0x7b, 0x37, 0x39, 0x77, 0x33]}}}, {@dont_measure='dont_measure'}]}}) ioctl$VIDIOC_ENUMINPUT(r1, 0xc050561a, &(0x7f0000000300)={0x4, "443b36c4364670c73c2ad26e1952769039650793d10fc72d24ce46e327d06e2f", 0x3, 0x100, 0x4, 0x1057ff, 0x0, 0x6}) 06:23:51 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000040)="2e0000002500817ee45ae087185082cf0f24b0eba06ec400002339e00586f9835b3f6c16914879008cd90080e230", 0x2e}], 0x1}, 0x0) 06:23:51 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000040)="2e0000002500817ee45ae087185082cf0f24b0eba06ec400682339e00586f9835b3f0016914879008cd90080e230", 0x2e}], 0x1}, 0x0) 06:23:51 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) getsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000400), &(0x7f0000000440)=0x8) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, &(0x7f00000019c0)={0x20}, 0x1) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r1, 0x111, 0x5, 0xc3, 0x4) r2 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x1, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r2, 0xc0045516, &(0x7f0000000040)=0x4) arch_prctl$ARCH_GET_CPUID(0x1011) getpgrp(0x0) flock(r0, 0x0) ioctl$BLKRRPART(0xffffffffffffffff, 0x125f, 0x0) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000200)={@mcast2}) fcntl$F_GET_FILE_RW_HINT(r0, 0x40d, &(0x7f00000000c0)) setsockopt$RDS_CONG_MONITOR(r2, 0x114, 0x6, &(0x7f0000000280), 0x4) ioctl$VHOST_SET_LOG_FD(r2, 0x4004af07, 0x0) ioctl$DRM_IOCTL_IRQ_BUSID(r2, 0xc0106403, &(0x7f0000000100)={0x8875, 0x800, 0x8000, 0xc2}) ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000180)) ioctl$VHOST_SET_VRING_CALL(0xffffffffffffffff, 0x4008af21, &(0x7f0000000380)={0x0, r1}) r3 = fcntl$dupfd(r1, 0x0, r2) setsockopt$IP_VS_SO_SET_STOPDAEMON(r3, 0x0, 0x48c, &(0x7f0000000140)={0x3, 'veth0\x00'}, 0x18) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.cpu/syz1\x00', 0x1ff) openat$snapshot(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/snapshot\x00', 0x0, 0x0) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0xf7fffffffffffffd, 0x2012, r2, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000a40)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x20008000}, 0x24044000) unshare(0x40000000) mount$9p_virtio(&(0x7f00000003c0)='em0%$!,cgroup#\x00', &(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='9p\x00', 0x0, &(0x7f0000000500)={'trans=virtio,', {[{@afid={'afid', 0x3d, 0x6}}, {@version_L='version=9p2000.L'}, {@cache_none='cache=none'}], [{@subj_role={'subj_role', 0x3d, '/dev/dsp#\x00'}}, {@permit_directio='permit_directio'}, {@measure='measure'}, {@context={'context', 0x3d, 'system_u'}}, {@obj_user={'obj_user'}}, {@dont_hash='dont_hash'}, {@subj_type={'subj_type', 0x3d, '\\eth0('}}, {@fsuuid={'fsuuid', 0x3d, {[0x36, 0x79, 0x0, 0x33, 0x61, 0x62, 0x32], 0x2d, [0x77, 0x32, 0x77, 0x34], 0x2d, [0x7f, 0x67, 0x37, 0x77], 0x2d, [0x0, 0x38, 0x32, 0x33], 0x2d, [0x35, 0x37, 0x7f, 0x7b, 0x37, 0x39, 0x77, 0x33]}}}, {@dont_measure='dont_measure'}]}}) ioctl$VIDIOC_ENUMINPUT(r1, 0xc050561a, &(0x7f0000000300)={0x4, "443b36c4364670c73c2ad26e1952769039650793d10fc72d24ce46e327d06e2f", 0x3, 0x100, 0x4, 0x1057ff, 0x0, 0x6}) [ 535.853650][T18565] IPVS: ftp: loaded support on port[0] = 21 [ 535.873676][T18569] IPVS: ftp: loaded support on port[0] = 21 06:23:52 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) getsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000400), &(0x7f0000000440)=0x8) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, &(0x7f00000019c0)={0x20}, 0x1) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r1, 0x111, 0x5, 0xc3, 0x4) r2 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x1, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r2, 0xc0045516, &(0x7f0000000040)=0x4) arch_prctl$ARCH_GET_CPUID(0x1011) getpgrp(0x0) flock(r0, 0x0) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000200)={@mcast2}) setsockopt$RDS_CONG_MONITOR(r2, 0x114, 0x6, &(0x7f0000000280), 0x4) ioctl$VHOST_SET_LOG_FD(r2, 0x4004af07, 0x0) ioctl$DRM_IOCTL_IRQ_BUSID(r2, 0xc0106403, &(0x7f0000000100)={0x8875, 0x800, 0x8000, 0xc2}) ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000180)) ioctl$VHOST_SET_VRING_CALL(0xffffffffffffffff, 0x4008af21, &(0x7f0000000380)={0x0, r1}) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x3, 'veth0\x00'}, 0x18) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.cpu/syz1\x00', 0x1ff) openat$snapshot(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/snapshot\x00', 0x0, 0x0) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0xf7fffffffffffffd, 0x2012, r2, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000a40)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x20008000}, 0x24044000) unshare(0x40000000) mount$9p_virtio(&(0x7f00000003c0)='em0%$!,cgroup#\x00', &(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='9p\x00', 0x200000, &(0x7f0000000500)={'trans=virtio,', {[{@afid={'afid', 0x3d, 0x6}}, {@version_L='version=9p2000.L'}, {@cache_none='cache=none'}], [{@subj_role={'subj_role', 0x3d, '/dev/dsp#\x00'}}, {@permit_directio='permit_directio'}, {@measure='measure'}, {@context={'context', 0x3d, 'system_u'}}, {@obj_user={'obj_user'}}, {@dont_hash='dont_hash'}, {@subj_type={'subj_type', 0x3d, '\\eth0('}}, {@fsuuid={'fsuuid', 0x3d, {[0x36, 0x79, 0x0, 0x33, 0x61, 0x62, 0x32], 0x2d, [0x77, 0x32, 0x77, 0x34], 0x2d, [0x7f, 0x67, 0x37, 0x77], 0x2d, [0x0, 0x38, 0x32, 0x33], 0x2d, [0x35, 0x37, 0x7f, 0x7b, 0x37, 0x39, 0x77, 0x33]}}}, {@dont_measure='dont_measure'}]}}) ioctl$VIDIOC_ENUMINPUT(r1, 0xc050561a, &(0x7f0000000300)={0x4, "443b36c4364670c73c2ad26e1952769039650793d10fc72d24ce46e327d06e2f", 0x3, 0x100, 0x4, 0x1057ff, 0x0, 0x6}) [ 536.907591][T18574] __nla_parse: 2 callbacks suppressed [ 536.907619][T18574] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.5'. 06:23:52 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = creat(&(0x7f0000000000)='./bus\x00', 0x0) getrlimit(0x0, &(0x7f00000000c0)) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x1326000000000000}) [ 536.953352][T18576] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.4'. [ 536.996477][T18581] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.4'. [ 537.063870][T18577] IPVS: ftp: loaded support on port[0] = 21 06:23:52 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000040)="2e0000002500817ee45ae087185082cf0f24b0eba06ec4006c2339e00586f9835b3f0016914879008cd90080e230", 0x2e}], 0x1}, 0x0) 06:23:52 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) getsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000400), &(0x7f0000000440)=0x8) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, &(0x7f00000019c0)={0x20}, 0x1) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r1, 0x111, 0x5, 0xc3, 0x4) r2 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x1, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r2, 0xc0045516, &(0x7f0000000040)=0x4) arch_prctl$ARCH_GET_CPUID(0x1011) getpgrp(0x0) flock(r0, 0x0) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000200)={@mcast2}) setsockopt$RDS_CONG_MONITOR(r2, 0x114, 0x6, &(0x7f0000000280), 0x4) ioctl$VHOST_SET_LOG_FD(r2, 0x4004af07, 0x0) ioctl$DRM_IOCTL_IRQ_BUSID(r2, 0xc0106403, &(0x7f0000000100)={0x8875, 0x800, 0x8000, 0xc2}) ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000180)) ioctl$VHOST_SET_VRING_CALL(0xffffffffffffffff, 0x4008af21, &(0x7f0000000380)={0x0, r1}) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x3, 'veth0\x00'}, 0x18) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.cpu/syz1\x00', 0x1ff) openat$snapshot(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/snapshot\x00', 0x0, 0x0) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0xf7fffffffffffffd, 0x2012, r2, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000a40)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x20008000}, 0x24044000) unshare(0x40000000) mount$9p_virtio(&(0x7f00000003c0)='em0%$!,cgroup#\x00', &(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='9p\x00', 0x200000, &(0x7f0000000500)={'trans=virtio,', {[{@afid={'afid', 0x3d, 0x6}}, {@version_L='version=9p2000.L'}, {@cache_none='cache=none'}], [{@subj_role={'subj_role', 0x3d, '/dev/dsp#\x00'}}, {@permit_directio='permit_directio'}, {@measure='measure'}, {@context={'context', 0x3d, 'system_u'}}, {@obj_user={'obj_user'}}, {@dont_hash='dont_hash'}, {@subj_type={'subj_type', 0x3d, '\\eth0('}}, {@fsuuid={'fsuuid', 0x3d, {[0x36, 0x79, 0x0, 0x33, 0x61, 0x62, 0x32], 0x2d, [0x77, 0x32, 0x77, 0x34], 0x2d, [0x7f, 0x67, 0x37, 0x77], 0x2d, [0x0, 0x38, 0x32, 0x33], 0x2d, [0x35, 0x37, 0x7f, 0x7b, 0x37, 0x39, 0x77, 0x33]}}}, {@dont_measure='dont_measure'}]}}) ioctl$VIDIOC_ENUMINPUT(r1, 0xc050561a, &(0x7f0000000300)={0x4, "443b36c4364670c73c2ad26e1952769039650793d10fc72d24ce46e327d06e2f", 0x3, 0x100, 0x4, 0x1057ff, 0x0, 0x6}) 06:23:53 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = creat(&(0x7f0000000000)='./bus\x00', 0x0) getrlimit(0x0, &(0x7f00000000c0)) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x2100000000000000}) [ 537.391099][T18592] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.4'. 06:23:53 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000040)="2e0000002500817ee45ae087185082cf0f24b0eba06ec400002339e00586f9835b3f7416914879008cd90080e230", 0x2e}], 0x1}, 0x0) [ 537.547176][T18580] IPVS: ftp: loaded support on port[0] = 21 [ 537.548826][T18599] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.4'. [ 537.684168][T18596] IPVS: ftp: loaded support on port[0] = 21 06:23:54 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) getsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000400), &(0x7f0000000440)=0x8) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, &(0x7f00000019c0)={0x20}, 0x1) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r1, 0x111, 0x5, 0xc3, 0x4) r2 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x1, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r2, 0xc0045516, &(0x7f0000000040)=0x4) arch_prctl$ARCH_GET_CPUID(0x1011) getpgrp(0x0) flock(r0, 0x0) ioctl$BLKRRPART(0xffffffffffffffff, 0x125f, 0x0) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000200)={@mcast2}) fcntl$F_GET_FILE_RW_HINT(r0, 0x40d, &(0x7f00000000c0)) setsockopt$RDS_CONG_MONITOR(r2, 0x114, 0x6, &(0x7f0000000280), 0x4) ioctl$VHOST_SET_LOG_FD(r2, 0x4004af07, 0x0) ioctl$DRM_IOCTL_IRQ_BUSID(r2, 0xc0106403, &(0x7f0000000100)={0x8875, 0x800, 0x8000, 0xc2}) ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000180)) ioctl$VHOST_SET_VRING_CALL(0xffffffffffffffff, 0x4008af21, &(0x7f0000000380)={0x0, r1}) r3 = fcntl$dupfd(r1, 0x0, r2) setsockopt$IP_VS_SO_SET_STOPDAEMON(r3, 0x0, 0x48c, &(0x7f0000000140)={0x3, 'veth0\x00'}, 0x18) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.cpu/syz1\x00', 0x1ff) openat$snapshot(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/snapshot\x00', 0x0, 0x0) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0xf7fffffffffffffd, 0x2012, r2, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000a40)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x20008000}, 0x24044000) unshare(0x40000000) mount$9p_virtio(&(0x7f00000003c0)='em0%$!,cgroup#\x00', &(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='9p\x00', 0x200000, 0x0) ioctl$VIDIOC_ENUMINPUT(r1, 0xc050561a, &(0x7f0000000300)={0x4, "443b36c4364670c73c2ad26e1952769039650793d10fc72d24ce46e327d06e2f", 0x3, 0x100, 0x4, 0x1057ff, 0x0, 0x6}) [ 538.567999][T18601] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.5'. 06:23:54 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000040)="2e0000002500817ee45ae087185082cf0f24b0eba06ec400742339e00586f9835b3f0016914879008cd90080e230", 0x2e}], 0x1}, 0x0) 06:23:54 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) getsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000400), &(0x7f0000000440)=0x8) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, &(0x7f00000019c0)={0x20}, 0x1) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r1, 0x111, 0x5, 0xc3, 0x4) r2 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x1, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r2, 0xc0045516, &(0x7f0000000040)=0x4) arch_prctl$ARCH_GET_CPUID(0x1011) getpgrp(0x0) flock(r0, 0x0) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000200)={@mcast2}) setsockopt$RDS_CONG_MONITOR(r2, 0x114, 0x6, &(0x7f0000000280), 0x4) ioctl$VHOST_SET_LOG_FD(r2, 0x4004af07, 0x0) ioctl$DRM_IOCTL_IRQ_BUSID(r2, 0xc0106403, &(0x7f0000000100)={0x8875, 0x800, 0x8000, 0xc2}) ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000180)) ioctl$VHOST_SET_VRING_CALL(0xffffffffffffffff, 0x4008af21, &(0x7f0000000380)={0x0, r1}) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x3, 'veth0\x00'}, 0x18) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.cpu/syz1\x00', 0x1ff) openat$snapshot(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/snapshot\x00', 0x0, 0x0) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0xf7fffffffffffffd, 0x2012, r2, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000a40)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x20008000}, 0x24044000) unshare(0x40000000) mount$9p_virtio(&(0x7f00000003c0)='em0%$!,cgroup#\x00', &(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='9p\x00', 0x200000, &(0x7f0000000500)={'trans=virtio,', {[{@afid={'afid', 0x3d, 0x6}}, {@version_L='version=9p2000.L'}, {@cache_none='cache=none'}], [{@subj_role={'subj_role', 0x3d, '/dev/dsp#\x00'}}, {@permit_directio='permit_directio'}, {@measure='measure'}, {@context={'context', 0x3d, 'system_u'}}, {@obj_user={'obj_user'}}, {@dont_hash='dont_hash'}, {@subj_type={'subj_type', 0x3d, '\\eth0('}}, {@fsuuid={'fsuuid', 0x3d, {[0x36, 0x79, 0x0, 0x33, 0x61, 0x62, 0x32], 0x2d, [0x77, 0x32, 0x77, 0x34], 0x2d, [0x7f, 0x67, 0x37, 0x77], 0x2d, [0x0, 0x38, 0x32, 0x33], 0x2d, [0x35, 0x37, 0x7f, 0x7b, 0x37, 0x39, 0x77, 0x33]}}}, {@dont_measure='dont_measure'}]}}) ioctl$VIDIOC_ENUMINPUT(r1, 0xc050561a, &(0x7f0000000300)={0x4, "443b36c4364670c73c2ad26e1952769039650793d10fc72d24ce46e327d06e2f", 0x3, 0x100, 0x4, 0x1057ff, 0x0, 0x6}) [ 538.683024][T18610] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.4'. [ 538.704758][T18606] IPVS: ftp: loaded support on port[0] = 21 [ 538.705585][T18609] IPVS: ftp: loaded support on port[0] = 21 06:23:54 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = creat(&(0x7f0000000000)='./bus\x00', 0x0) getrlimit(0x0, &(0x7f00000000c0)) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x2200000000000000}) [ 538.825558][T18613] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.4'. 06:23:54 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) getsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000400), &(0x7f0000000440)=0x8) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, &(0x7f00000019c0)={0x20}, 0x1) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r1, 0x111, 0x5, 0xc3, 0x4) r2 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x1, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r2, 0xc0045516, &(0x7f0000000040)=0x4) arch_prctl$ARCH_GET_CPUID(0x1011) getpgrp(0x0) flock(r0, 0x0) ioctl$BLKRRPART(0xffffffffffffffff, 0x125f, 0x0) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000200)={@mcast2}) fcntl$F_GET_FILE_RW_HINT(r0, 0x40d, &(0x7f00000000c0)) setsockopt$RDS_CONG_MONITOR(r2, 0x114, 0x6, &(0x7f0000000280), 0x4) ioctl$VHOST_SET_LOG_FD(r2, 0x4004af07, 0x0) ioctl$DRM_IOCTL_IRQ_BUSID(r2, 0xc0106403, &(0x7f0000000100)={0x8875, 0x800, 0x8000, 0xc2}) ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000180)) ioctl$VHOST_SET_VRING_CALL(0xffffffffffffffff, 0x4008af21, &(0x7f0000000380)={0x0, r1}) r3 = fcntl$dupfd(r1, 0x0, r2) setsockopt$IP_VS_SO_SET_STOPDAEMON(r3, 0x0, 0x48c, &(0x7f0000000140)={0x3, 'veth0\x00'}, 0x18) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.cpu/syz1\x00', 0x1ff) openat$snapshot(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/snapshot\x00', 0x0, 0x0) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0xf7fffffffffffffd, 0x2012, r2, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000a40)={0x0, 0x0, 0x0}, 0x24044000) unshare(0x40000000) mount$9p_virtio(&(0x7f00000003c0)='em0%$!,cgroup#\x00', &(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='9p\x00', 0x200000, &(0x7f0000000500)={'trans=virtio,', {[{@afid={'afid', 0x3d, 0x6}}, {@version_L='version=9p2000.L'}, {@cache_none='cache=none'}], [{@subj_role={'subj_role', 0x3d, '/dev/dsp#\x00'}}, {@permit_directio='permit_directio'}, {@measure='measure'}, {@context={'context', 0x3d, 'system_u'}}, {@obj_user={'obj_user'}}, {@dont_hash='dont_hash'}, {@subj_type={'subj_type', 0x3d, '\\eth0('}}, {@fsuuid={'fsuuid', 0x3d, {[0x36, 0x79, 0x0, 0x33, 0x61, 0x62, 0x32], 0x2d, [0x77, 0x32, 0x77, 0x34], 0x2d, [0x7f, 0x67, 0x37, 0x77], 0x2d, [0x0, 0x38, 0x32, 0x33], 0x2d, [0x35, 0x37, 0x7f, 0x7b, 0x37, 0x39, 0x77, 0x33]}}}, {@dont_measure='dont_measure'}]}}) ioctl$VIDIOC_ENUMINPUT(r1, 0xc050561a, &(0x7f0000000300)={0x4, "443b36c4364670c73c2ad26e1952769039650793d10fc72d24ce46e327d06e2f", 0x3, 0x100, 0x4, 0x1057ff, 0x0, 0x6}) 06:23:54 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000040)="2e0000002500817ee45ae087185082cf0f24b0eba06ec400002339e00586f9835b3f7a16914879008cd90080e230", 0x2e}], 0x1}, 0x0) 06:23:54 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000040)="2e0000002500817ee45ae087185082cf0f24b0eba06ec4007a2339e00586f9835b3f0016914879008cd90080e230", 0x2e}], 0x1}, 0x0) 06:23:54 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = creat(&(0x7f0000000000)='./bus\x00', 0x0) getrlimit(0x0, &(0x7f00000000c0)) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x34a2000000000000}) 06:23:54 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) getsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000400), &(0x7f0000000440)=0x8) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, &(0x7f00000019c0)={0x20}, 0x1) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r1, 0x111, 0x5, 0xc3, 0x4) r2 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x1, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r2, 0xc0045516, &(0x7f0000000040)=0x4) arch_prctl$ARCH_GET_CPUID(0x1011) getpgrp(0x0) flock(r0, 0x0) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000200)={@mcast2}) setsockopt$RDS_CONG_MONITOR(r2, 0x114, 0x6, &(0x7f0000000280), 0x4) ioctl$VHOST_SET_LOG_FD(r2, 0x4004af07, 0x0) ioctl$DRM_IOCTL_IRQ_BUSID(r2, 0xc0106403, &(0x7f0000000100)={0x8875, 0x800, 0x8000, 0xc2}) ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000180)) ioctl$VHOST_SET_VRING_CALL(0xffffffffffffffff, 0x4008af21, &(0x7f0000000380)={0x0, r1}) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x3, 'veth0\x00'}, 0x18) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.cpu/syz1\x00', 0x1ff) openat$snapshot(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/snapshot\x00', 0x0, 0x0) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0xf7fffffffffffffd, 0x2012, r2, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000a40)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x20008000}, 0x24044000) unshare(0x40000000) mount$9p_virtio(&(0x7f00000003c0)='em0%$!,cgroup#\x00', &(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='9p\x00', 0x200000, &(0x7f0000000500)={'trans=virtio,', {[{@afid={'afid', 0x3d, 0x6}}, {@version_L='version=9p2000.L'}, {@cache_none='cache=none'}], [{@subj_role={'subj_role', 0x3d, '/dev/dsp#\x00'}}, {@permit_directio='permit_directio'}, {@measure='measure'}, {@context={'context', 0x3d, 'system_u'}}, {@obj_user={'obj_user'}}, {@dont_hash='dont_hash'}, {@subj_type={'subj_type', 0x3d, '\\eth0('}}, {@fsuuid={'fsuuid', 0x3d, {[0x36, 0x79, 0x0, 0x33, 0x61, 0x62, 0x32], 0x2d, [0x77, 0x32, 0x77, 0x34], 0x2d, [0x7f, 0x67, 0x37, 0x77], 0x2d, [0x0, 0x38, 0x32, 0x33], 0x2d, [0x35, 0x37, 0x7f, 0x7b, 0x37, 0x39, 0x77, 0x33]}}}, {@dont_measure='dont_measure'}]}}) ioctl$VIDIOC_ENUMINPUT(r1, 0xc050561a, &(0x7f0000000300)={0x4, "443b36c4364670c73c2ad26e1952769039650793d10fc72d24ce46e327d06e2f", 0x3, 0x100, 0x4, 0x1057ff, 0x0, 0x6}) 06:23:54 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) getsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000400), &(0x7f0000000440)=0x8) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, &(0x7f00000019c0)={0x20}, 0x1) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r1, 0x111, 0x5, 0xc3, 0x4) r2 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x1, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r2, 0xc0045516, &(0x7f0000000040)=0x4) arch_prctl$ARCH_GET_CPUID(0x1011) getpgrp(0x0) flock(r0, 0x0) ioctl$BLKRRPART(0xffffffffffffffff, 0x125f, 0x0) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000200)={@mcast2}) fcntl$F_GET_FILE_RW_HINT(r0, 0x40d, &(0x7f00000000c0)) setsockopt$RDS_CONG_MONITOR(r2, 0x114, 0x6, &(0x7f0000000280), 0x4) ioctl$VHOST_SET_LOG_FD(r2, 0x4004af07, 0x0) ioctl$DRM_IOCTL_IRQ_BUSID(r2, 0xc0106403, &(0x7f0000000100)={0x8875, 0x800, 0x8000, 0xc2}) ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000180)) ioctl$VHOST_SET_VRING_CALL(0xffffffffffffffff, 0x4008af21, &(0x7f0000000380)={0x0, r1}) r3 = fcntl$dupfd(r1, 0x0, r2) setsockopt$IP_VS_SO_SET_STOPDAEMON(r3, 0x0, 0x48c, &(0x7f0000000140)={0x3, 'veth0\x00'}, 0x18) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.cpu/syz1\x00', 0x1ff) openat$snapshot(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/snapshot\x00', 0x0, 0x0) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0xf7fffffffffffffd, 0x2012, r2, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000a40)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x20008000}, 0x24044000) unshare(0x40000000) mount$9p_virtio(&(0x7f00000003c0)='em0%$!,cgroup#\x00', &(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='9p\x00', 0x200000, 0x0) ioctl$VIDIOC_ENUMINPUT(r1, 0xc050561a, &(0x7f0000000300)={0x4, "443b36c4364670c73c2ad26e1952769039650793d10fc72d24ce46e327d06e2f", 0x3, 0x100, 0x4, 0x1057ff, 0x0, 0x6}) [ 539.202950][T18627] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.5'. [ 539.269762][T18632] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.4'. [ 539.356819][T18631] IPVS: ftp: loaded support on port[0] = 21 [ 539.409971][T18623] IPVS: ftp: loaded support on port[0] = 21 06:23:56 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) getsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000400), &(0x7f0000000440)=0x8) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, &(0x7f00000019c0)={0x20}, 0x1) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r1, 0x111, 0x5, 0xc3, 0x4) r2 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x1, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r2, 0xc0045516, &(0x7f0000000040)=0x4) arch_prctl$ARCH_GET_CPUID(0x1011) getpgrp(0x0) flock(r0, 0x0) ioctl$BLKRRPART(0xffffffffffffffff, 0x125f, 0x0) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000200)={@mcast2}) fcntl$F_GET_FILE_RW_HINT(r0, 0x40d, &(0x7f00000000c0)) setsockopt$RDS_CONG_MONITOR(r2, 0x114, 0x6, &(0x7f0000000280), 0x4) ioctl$VHOST_SET_LOG_FD(r2, 0x4004af07, 0x0) ioctl$DRM_IOCTL_IRQ_BUSID(r2, 0xc0106403, &(0x7f0000000100)={0x8875, 0x800, 0x8000, 0xc2}) ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000180)) ioctl$VHOST_SET_VRING_CALL(0xffffffffffffffff, 0x4008af21, &(0x7f0000000380)={0x0, r1}) r3 = fcntl$dupfd(r1, 0x0, r2) setsockopt$IP_VS_SO_SET_STOPDAEMON(r3, 0x0, 0x48c, &(0x7f0000000140)={0x3, 'veth0\x00'}, 0x18) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.cpu/syz1\x00', 0x1ff) openat$snapshot(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/snapshot\x00', 0x0, 0x0) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0xf7fffffffffffffd, 0x2012, r2, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000a40)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x20008000}, 0x24044000) unshare(0x40000000) mount$9p_virtio(&(0x7f00000003c0)='em0%$!,cgroup#\x00', &(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='9p\x00', 0x200000, 0x0) ioctl$VIDIOC_ENUMINPUT(r1, 0xc050561a, &(0x7f0000000300)={0x4, "443b36c4364670c73c2ad26e1952769039650793d10fc72d24ce46e327d06e2f", 0x3, 0x100, 0x4, 0x1057ff, 0x0, 0x6}) [ 540.545258][T18635] IPVS: ftp: loaded support on port[0] = 21 [ 540.806445][T18644] IPVS: ftp: loaded support on port[0] = 21 06:23:56 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = creat(&(0x7f0000000000)='./bus\x00', 0x0) getrlimit(0x0, &(0x7f00000000c0)) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x3962020000000000}) 06:23:56 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000040)="2e0000002500817ee45ae087185082cf0f24b0eba06ec4017c2339e00586f9835b3f0016914879008cd90080e230", 0x2e}], 0x1}, 0x0) 06:23:56 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000040)="2e0000002500817ee45ae087185082cf0f24b0eba06ec400002339e00586f9835b3f0016914825008cd90080e230", 0x2e}], 0x1}, 0x0) 06:23:57 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, 0x0, 0x0) getsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000400), &(0x7f0000000440)=0x8) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, &(0x7f00000019c0)={0x20}, 0x1) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r1, 0x111, 0x5, 0xc3, 0x4) r2 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x1, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r2, 0xc0045516, &(0x7f0000000040)=0x4) arch_prctl$ARCH_GET_CPUID(0x1011) getpgrp(0x0) flock(r0, 0x0) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000200)={@mcast2}) setsockopt$RDS_CONG_MONITOR(r2, 0x114, 0x6, &(0x7f0000000280), 0x4) ioctl$VHOST_SET_LOG_FD(r2, 0x4004af07, 0x0) ioctl$DRM_IOCTL_IRQ_BUSID(r2, 0xc0106403, &(0x7f0000000100)={0x8875, 0x800, 0x8000, 0xc2}) ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000180)) ioctl$VHOST_SET_VRING_CALL(0xffffffffffffffff, 0x4008af21, &(0x7f0000000380)={0x0, r1}) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x3, 'veth0\x00'}, 0x18) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.cpu/syz1\x00', 0x1ff) openat$snapshot(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/snapshot\x00', 0x0, 0x0) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0xf7fffffffffffffd, 0x2012, r2, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000a40)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x20008000}, 0x24044000) unshare(0x40000000) mount$9p_virtio(&(0x7f00000003c0)='em0%$!,cgroup#\x00', &(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='9p\x00', 0x200000, &(0x7f0000000500)={'trans=virtio,', {[{@afid={'afid', 0x3d, 0x6}}, {@version_L='version=9p2000.L'}, {@cache_none='cache=none'}], [{@subj_role={'subj_role', 0x3d, '/dev/dsp#\x00'}}, {@permit_directio='permit_directio'}, {@measure='measure'}, {@context={'context', 0x3d, 'system_u'}}, {@obj_user={'obj_user'}}, {@dont_hash='dont_hash'}, {@subj_type={'subj_type', 0x3d, '\\eth0('}}, {@fsuuid={'fsuuid', 0x3d, {[0x36, 0x79, 0x0, 0x33, 0x61, 0x62, 0x32], 0x2d, [0x77, 0x32, 0x77, 0x34], 0x2d, [0x7f, 0x67, 0x37, 0x77], 0x2d, [0x0, 0x38, 0x32, 0x33], 0x2d, [0x35, 0x37, 0x7f, 0x7b, 0x37, 0x39, 0x77, 0x33]}}}, {@dont_measure='dont_measure'}]}}) ioctl$VIDIOC_ENUMINPUT(r1, 0xc050561a, &(0x7f0000000300)={0x4, "443b36c4364670c73c2ad26e1952769039650793d10fc72d24ce46e327d06e2f", 0x3, 0x100, 0x4, 0x1057ff, 0x0, 0x6}) 06:23:57 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) getsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000400), &(0x7f0000000440)=0x8) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, &(0x7f00000019c0)={0x20}, 0x1) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r1, 0x111, 0x5, 0xc3, 0x4) r2 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x1, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r2, 0xc0045516, &(0x7f0000000040)=0x4) arch_prctl$ARCH_GET_CPUID(0x1011) getpgrp(0x0) flock(r0, 0x0) ioctl$BLKRRPART(0xffffffffffffffff, 0x125f, 0x0) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000200)={@mcast2}) fcntl$F_GET_FILE_RW_HINT(r0, 0x40d, &(0x7f00000000c0)) setsockopt$RDS_CONG_MONITOR(r2, 0x114, 0x6, &(0x7f0000000280), 0x4) ioctl$VHOST_SET_LOG_FD(r2, 0x4004af07, 0x0) ioctl$DRM_IOCTL_IRQ_BUSID(r2, 0xc0106403, &(0x7f0000000100)={0x8875, 0x800, 0x8000, 0xc2}) ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000180)) ioctl$VHOST_SET_VRING_CALL(0xffffffffffffffff, 0x4008af21, &(0x7f0000000380)={0x0, r1}) r3 = fcntl$dupfd(r1, 0x0, r2) setsockopt$IP_VS_SO_SET_STOPDAEMON(r3, 0x0, 0x48c, &(0x7f0000000140)={0x3, 'veth0\x00'}, 0x18) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.cpu/syz1\x00', 0x1ff) openat$snapshot(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/snapshot\x00', 0x0, 0x0) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0xf7fffffffffffffd, 0x2012, r2, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000a40)={0x0, 0x0, 0x0}, 0x24044000) unshare(0x40000000) mount$9p_virtio(&(0x7f00000003c0)='em0%$!,cgroup#\x00', &(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='9p\x00', 0x200000, &(0x7f0000000500)={'trans=virtio,', {[{@afid={'afid', 0x3d, 0x6}}, {@version_L='version=9p2000.L'}, {@cache_none='cache=none'}], [{@subj_role={'subj_role', 0x3d, '/dev/dsp#\x00'}}, {@permit_directio='permit_directio'}, {@measure='measure'}, {@context={'context', 0x3d, 'system_u'}}, {@obj_user={'obj_user'}}, {@dont_hash='dont_hash'}, {@subj_type={'subj_type', 0x3d, '\\eth0('}}, {@fsuuid={'fsuuid', 0x3d, {[0x36, 0x79, 0x0, 0x33, 0x61, 0x62, 0x32], 0x2d, [0x77, 0x32, 0x77, 0x34], 0x2d, [0x7f, 0x67, 0x37, 0x77], 0x2d, [0x0, 0x38, 0x32, 0x33], 0x2d, [0x35, 0x37, 0x7f, 0x7b, 0x37, 0x39, 0x77, 0x33]}}}, {@dont_measure='dont_measure'}]}}) ioctl$VIDIOC_ENUMINPUT(r1, 0xc050561a, &(0x7f0000000300)={0x4, "443b36c4364670c73c2ad26e1952769039650793d10fc72d24ce46e327d06e2f", 0x3, 0x100, 0x4, 0x1057ff, 0x0, 0x6}) 06:23:57 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) getsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000400), &(0x7f0000000440)=0x8) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, &(0x7f00000019c0)={0x20}, 0x1) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r1, 0x111, 0x5, 0xc3, 0x4) r2 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x1, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r2, 0xc0045516, &(0x7f0000000040)=0x4) arch_prctl$ARCH_GET_CPUID(0x1011) getpgrp(0x0) flock(r0, 0x0) ioctl$BLKRRPART(0xffffffffffffffff, 0x125f, 0x0) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000200)={@mcast2}) fcntl$F_GET_FILE_RW_HINT(r0, 0x40d, &(0x7f00000000c0)) setsockopt$RDS_CONG_MONITOR(r2, 0x114, 0x6, &(0x7f0000000280), 0x4) ioctl$VHOST_SET_LOG_FD(r2, 0x4004af07, 0x0) ioctl$DRM_IOCTL_IRQ_BUSID(r2, 0xc0106403, &(0x7f0000000100)={0x8875, 0x800, 0x8000, 0xc2}) ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000180)) ioctl$VHOST_SET_VRING_CALL(0xffffffffffffffff, 0x4008af21, &(0x7f0000000380)={0x0, r1}) r3 = fcntl$dupfd(r1, 0x0, r2) setsockopt$IP_VS_SO_SET_STOPDAEMON(r3, 0x0, 0x48c, &(0x7f0000000140)={0x3, 'veth0\x00'}, 0x18) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.cpu/syz1\x00', 0x1ff) openat$snapshot(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/snapshot\x00', 0x0, 0x0) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0xf7fffffffffffffd, 0x2012, r2, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000a40)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x20008000}, 0x24044000) unshare(0x40000000) mount$9p_virtio(&(0x7f00000003c0)='em0%$!,cgroup#\x00', &(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='9p\x00', 0x200000, &(0x7f0000000500)={'trans=virtio,', {[{@afid={'afid', 0x3d, 0x6}}, {@version_L='version=9p2000.L'}], [{@subj_role={'subj_role', 0x3d, '/dev/dsp#\x00'}}, {@permit_directio='permit_directio'}, {@measure='measure'}, {@context={'context', 0x3d, 'system_u'}}, {@obj_user={'obj_user'}}, {@dont_hash='dont_hash'}, {@subj_type={'subj_type', 0x3d, '\\eth0('}}, {@fsuuid={'fsuuid', 0x3d, {[0x36, 0x79, 0x0, 0x33, 0x61, 0x62, 0x32], 0x2d, [0x77, 0x32, 0x77, 0x34], 0x2d, [0x7f, 0x67, 0x37, 0x77], 0x2d, [0x0, 0x38, 0x32, 0x33], 0x2d, [0x35, 0x37, 0x7f, 0x7b, 0x37, 0x39, 0x77, 0x33]}}}, {@dont_measure='dont_measure'}]}}) ioctl$VIDIOC_ENUMINPUT(r1, 0xc050561a, &(0x7f0000000300)={0x4, "443b36c4364670c73c2ad26e1952769039650793d10fc72d24ce46e327d06e2f", 0x3, 0x100, 0x4, 0x1057ff, 0x0, 0x6}) 06:23:57 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000040)="2e0000002500817ee45ae087185082cf0f24b0eba06ec400002339e00586f9835b3f0016914879028cd90080e230", 0x2e}], 0x1}, 0x0) 06:23:57 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000040)="2e0000002500817ee45ae087185082cf0f24b0eba06ec400f02339e00586f9835b3f0016914879008cd90080e230", 0x2e}], 0x1}, 0x0) 06:23:57 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = creat(&(0x7f0000000000)='./bus\x00', 0x0) getrlimit(0x0, &(0x7f00000000c0)) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x3f00000000000000}) [ 541.650387][T18673] IPVS: ftp: loaded support on port[0] = 21 [ 541.684815][T18671] IPVS: ftp: loaded support on port[0] = 21 06:23:57 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000040)="2e0000002500817ee45ae087185082cf0f24b0eba06ec400002339e00586f9835b3f0016914879038cd90080e230", 0x2e}], 0x1}, 0x0) [ 541.697504][T18680] IPVS: ftp: loaded support on port[0] = 21 06:23:57 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = creat(&(0x7f0000000000)='./bus\x00', 0x0) getrlimit(0x0, &(0x7f00000000c0)) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x3fd5000000000000}) 06:23:57 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000040)="2e0000002500817ee45ae087185082cf0f24b0eba06ec400022339e00586f9835b3f0016914879008cd90080e230", 0x2e}], 0x1}, 0x0) 06:23:57 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000040)="2e0000002500817ee45ae087185082cf0f24b0eba06ec400002339e00586f9835b3f0016914879048cd90080e230", 0x2e}], 0x1}, 0x0) 06:23:57 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) getsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000400), &(0x7f0000000440)=0x8) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, &(0x7f00000019c0)={0x20}, 0x1) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r1, 0x111, 0x5, 0xc3, 0x4) r2 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x1, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r2, 0xc0045516, &(0x7f0000000040)=0x4) arch_prctl$ARCH_GET_CPUID(0x1011) getpgrp(0x0) flock(r0, 0x0) ioctl$BLKRRPART(0xffffffffffffffff, 0x125f, 0x0) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000200)={@mcast2}) fcntl$F_GET_FILE_RW_HINT(r0, 0x40d, &(0x7f00000000c0)) setsockopt$RDS_CONG_MONITOR(r2, 0x114, 0x6, &(0x7f0000000280), 0x4) ioctl$VHOST_SET_LOG_FD(r2, 0x4004af07, 0x0) ioctl$DRM_IOCTL_IRQ_BUSID(r2, 0xc0106403, &(0x7f0000000100)={0x8875, 0x800, 0x8000, 0xc2}) ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000180)) ioctl$VHOST_SET_VRING_CALL(0xffffffffffffffff, 0x4008af21, &(0x7f0000000380)={0x0, r1}) r3 = fcntl$dupfd(r1, 0x0, r2) setsockopt$IP_VS_SO_SET_STOPDAEMON(r3, 0x0, 0x48c, &(0x7f0000000140)={0x3, 'veth0\x00'}, 0x18) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.cpu/syz1\x00', 0x1ff) openat$snapshot(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/snapshot\x00', 0x0, 0x0) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0xf7fffffffffffffd, 0x2012, r2, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000a40)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x20008000}, 0x24044000) unshare(0x40000000) mount$9p_virtio(&(0x7f00000003c0)='em0%$!,cgroup#\x00', &(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='9p\x00', 0x200000, &(0x7f0000000500)={'trans=virtio,', {[{@afid={'afid', 0x3d, 0x6}}, {@version_L='version=9p2000.L'}], [{@subj_role={'subj_role', 0x3d, '/dev/dsp#\x00'}}, {@permit_directio='permit_directio'}, {@measure='measure'}, {@context={'context', 0x3d, 'system_u'}}, {@obj_user={'obj_user'}}, {@dont_hash='dont_hash'}, {@subj_type={'subj_type', 0x3d, '\\eth0('}}, {@fsuuid={'fsuuid', 0x3d, {[0x36, 0x79, 0x0, 0x33, 0x61, 0x62, 0x32], 0x2d, [0x77, 0x32, 0x77, 0x34], 0x2d, [0x7f, 0x67, 0x37, 0x77], 0x2d, [0x0, 0x38, 0x32, 0x33], 0x2d, [0x35, 0x37, 0x7f, 0x7b, 0x37, 0x39, 0x77, 0x33]}}}, {@dont_measure='dont_measure'}]}}) ioctl$VIDIOC_ENUMINPUT(r1, 0xc050561a, &(0x7f0000000300)={0x4, "443b36c4364670c73c2ad26e1952769039650793d10fc72d24ce46e327d06e2f", 0x3, 0x100, 0x4, 0x1057ff, 0x0, 0x6}) [ 541.927289][T18694] __nla_parse: 11 callbacks suppressed [ 541.927298][T18694] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.4'. [ 541.962198][T18698] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.4'. [ 542.023049][T18697] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.5'. [ 542.061099][T18703] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.5'. 06:23:57 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000040)="2e0000002500817ee45ae087185082cf0f24b0eba06ec400032339e00586f9835b3f0016914879008cd90080e230", 0x2e}], 0x1}, 0x0) [ 542.162506][T18702] IPVS: ftp: loaded support on port[0] = 21 06:23:58 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, 0x0, 0x0) getsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000400), &(0x7f0000000440)=0x8) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, &(0x7f00000019c0)={0x20}, 0x1) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r1, 0x111, 0x5, 0xc3, 0x4) r2 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x1, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r2, 0xc0045516, &(0x7f0000000040)=0x4) arch_prctl$ARCH_GET_CPUID(0x1011) getpgrp(0x0) flock(r0, 0x0) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000200)={@mcast2}) setsockopt$RDS_CONG_MONITOR(r2, 0x114, 0x6, &(0x7f0000000280), 0x4) ioctl$VHOST_SET_LOG_FD(r2, 0x4004af07, 0x0) ioctl$DRM_IOCTL_IRQ_BUSID(r2, 0xc0106403, &(0x7f0000000100)={0x8875, 0x800, 0x8000, 0xc2}) ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000180)) ioctl$VHOST_SET_VRING_CALL(0xffffffffffffffff, 0x4008af21, &(0x7f0000000380)={0x0, r1}) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x3, 'veth0\x00'}, 0x18) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.cpu/syz1\x00', 0x1ff) openat$snapshot(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/snapshot\x00', 0x0, 0x0) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0xf7fffffffffffffd, 0x2012, r2, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000a40)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x20008000}, 0x24044000) unshare(0x40000000) mount$9p_virtio(&(0x7f00000003c0)='em0%$!,cgroup#\x00', &(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='9p\x00', 0x200000, &(0x7f0000000500)={'trans=virtio,', {[{@afid={'afid', 0x3d, 0x6}}, {@version_L='version=9p2000.L'}, {@cache_none='cache=none'}], [{@subj_role={'subj_role', 0x3d, '/dev/dsp#\x00'}}, {@permit_directio='permit_directio'}, {@measure='measure'}, {@context={'context', 0x3d, 'system_u'}}, {@obj_user={'obj_user'}}, {@dont_hash='dont_hash'}, {@subj_type={'subj_type', 0x3d, '\\eth0('}}, {@fsuuid={'fsuuid', 0x3d, {[0x36, 0x79, 0x0, 0x33, 0x61, 0x62, 0x32], 0x2d, [0x77, 0x32, 0x77, 0x34], 0x2d, [0x7f, 0x67, 0x37, 0x77], 0x2d, [0x0, 0x38, 0x32, 0x33], 0x2d, [0x35, 0x37, 0x7f, 0x7b, 0x37, 0x39, 0x77, 0x33]}}}, {@dont_measure='dont_measure'}]}}) ioctl$VIDIOC_ENUMINPUT(r1, 0xc050561a, &(0x7f0000000300)={0x4, "443b36c4364670c73c2ad26e1952769039650793d10fc72d24ce46e327d06e2f", 0x3, 0x100, 0x4, 0x1057ff, 0x0, 0x6}) [ 542.285700][T18707] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.4'. [ 542.387614][T18709] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.4'. 06:23:58 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) getsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000400), &(0x7f0000000440)=0x8) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, &(0x7f00000019c0)={0x20}, 0x1) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r1, 0x111, 0x5, 0xc3, 0x4) r2 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x1, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r2, 0xc0045516, &(0x7f0000000040)=0x4) arch_prctl$ARCH_GET_CPUID(0x1011) getpgrp(0x0) flock(r0, 0x0) ioctl$BLKRRPART(0xffffffffffffffff, 0x125f, 0x0) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000200)={@mcast2}) fcntl$F_GET_FILE_RW_HINT(r0, 0x40d, &(0x7f00000000c0)) setsockopt$RDS_CONG_MONITOR(r2, 0x114, 0x6, &(0x7f0000000280), 0x4) ioctl$VHOST_SET_LOG_FD(r2, 0x4004af07, 0x0) ioctl$DRM_IOCTL_IRQ_BUSID(r2, 0xc0106403, &(0x7f0000000100)={0x8875, 0x800, 0x8000, 0xc2}) ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000180)) ioctl$VHOST_SET_VRING_CALL(0xffffffffffffffff, 0x4008af21, &(0x7f0000000380)={0x0, r1}) r3 = fcntl$dupfd(r1, 0x0, r2) setsockopt$IP_VS_SO_SET_STOPDAEMON(r3, 0x0, 0x48c, &(0x7f0000000140)={0x3, 'veth0\x00'}, 0x18) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.cpu/syz1\x00', 0x1ff) openat$snapshot(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/snapshot\x00', 0x0, 0x0) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0xf7fffffffffffffd, 0x2012, r2, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000a40)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x20008000}, 0x24044000) unshare(0x40000000) mount$9p_virtio(&(0x7f00000003c0)='em0%$!,cgroup#\x00', &(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='9p\x00', 0x200000, 0x0) ioctl$VIDIOC_ENUMINPUT(r1, 0xc050561a, &(0x7f0000000300)={0x4, "443b36c4364670c73c2ad26e1952769039650793d10fc72d24ce46e327d06e2f", 0x3, 0x100, 0x4, 0x1057ff, 0x0, 0x6}) 06:23:58 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000040)="2e0000002500817ee45ae087185082cf0f24b0eba06ec400002339e00586f9835b3f0016914879058cd90080e230", 0x2e}], 0x1}, 0x0) 06:23:58 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = creat(&(0x7f0000000000)='./bus\x00', 0x0) getrlimit(0x0, &(0x7f00000000c0)) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x6162020000000000}) [ 542.506047][T18714] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.5'. 06:23:58 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000040)="2e0000002500817ee45ae087185082cf0f24b0eba06ec400042339e00586f9835b3f0016914879008cd90080e230", 0x2e}], 0x1}, 0x0) [ 542.648646][T18721] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.5'. 06:23:58 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) getsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000400), &(0x7f0000000440)=0x8) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, &(0x7f00000019c0)={0x20}, 0x1) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r1, 0x111, 0x5, 0xc3, 0x4) r2 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x1, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r2, 0xc0045516, &(0x7f0000000040)=0x4) arch_prctl$ARCH_GET_CPUID(0x1011) getpgrp(0x0) flock(r0, 0x0) ioctl$BLKRRPART(0xffffffffffffffff, 0x125f, 0x0) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000200)={@mcast2}) fcntl$F_GET_FILE_RW_HINT(r0, 0x40d, &(0x7f00000000c0)) setsockopt$RDS_CONG_MONITOR(r2, 0x114, 0x6, &(0x7f0000000280), 0x4) ioctl$VHOST_SET_LOG_FD(r2, 0x4004af07, 0x0) ioctl$DRM_IOCTL_IRQ_BUSID(r2, 0xc0106403, &(0x7f0000000100)={0x8875, 0x800, 0x8000, 0xc2}) ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000180)) ioctl$VHOST_SET_VRING_CALL(0xffffffffffffffff, 0x4008af21, &(0x7f0000000380)={0x0, r1}) r3 = fcntl$dupfd(r1, 0x0, r2) setsockopt$IP_VS_SO_SET_STOPDAEMON(r3, 0x0, 0x48c, &(0x7f0000000140)={0x3, 'veth0\x00'}, 0x18) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.cpu/syz1\x00', 0x1ff) openat$snapshot(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/snapshot\x00', 0x0, 0x0) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0xf7fffffffffffffd, 0x2012, r2, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000a40)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x20008000}, 0x24044000) unshare(0x40000000) mount$9p_virtio(&(0x7f00000003c0)='em0%$!,cgroup#\x00', &(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='9p\x00', 0x200000, &(0x7f0000000500)={'trans=virtio,', {[{@afid={'afid', 0x3d, 0x6}}, {@version_L='version=9p2000.L'}], [{@subj_role={'subj_role', 0x3d, '/dev/dsp#\x00'}}, {@permit_directio='permit_directio'}, {@measure='measure'}, {@context={'context', 0x3d, 'system_u'}}, {@obj_user={'obj_user'}}, {@dont_hash='dont_hash'}, {@subj_type={'subj_type', 0x3d, '\\eth0('}}, {@fsuuid={'fsuuid', 0x3d, {[0x36, 0x79, 0x0, 0x33, 0x61, 0x62, 0x32], 0x2d, [0x77, 0x32, 0x77, 0x34], 0x2d, [0x7f, 0x67, 0x37, 0x77], 0x2d, [0x0, 0x38, 0x32, 0x33], 0x2d, [0x35, 0x37, 0x7f, 0x7b, 0x37, 0x39, 0x77, 0x33]}}}, {@dont_measure='dont_measure'}]}}) ioctl$VIDIOC_ENUMINPUT(r1, 0xc050561a, &(0x7f0000000300)={0x4, "443b36c4364670c73c2ad26e1952769039650793d10fc72d24ce46e327d06e2f", 0x3, 0x100, 0x4, 0x1057ff, 0x0, 0x6}) 06:23:58 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = creat(&(0x7f0000000000)='./bus\x00', 0x0) getrlimit(0x0, &(0x7f00000000c0)) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x80a4020000000000}) [ 542.745899][T18726] IPVS: ftp: loaded support on port[0] = 21 [ 542.765890][T18720] IPVS: ftp: loaded support on port[0] = 21 [ 542.779957][T18728] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.4'. 06:23:58 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000040)="2e0000002500817ee45ae087185082cf0f24b0eba06ec400002339e00586f9835b3f0016914879068cd90080e230", 0x2e}], 0x1}, 0x0) [ 542.835393][T18732] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.4'. 06:23:58 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000040)="2e0000002500817ee45ae087185082cf0f24b0eba06ec400052339e00586f9835b3f0016914879008cd90080e230", 0x2e}], 0x1}, 0x0) [ 542.934148][T18731] IPVS: ftp: loaded support on port[0] = 21 06:23:58 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000040)="2e0000002500817ee45ae087185082cf0f24b0eba06ec400002339e00586f9835b3f0016914879078cd90080e230", 0x2e}], 0x1}, 0x0) 06:23:58 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = creat(&(0x7f0000000000)='./bus\x00', 0x0) getrlimit(0x0, &(0x7f00000000c0)) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0c0583b, &(0x7f0000000040)={0x0, 0xc484000000000000}) 06:23:58 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000040)="2e0000002500817ee45ae087185082cf0f24b0eba06ec400002339e00586f9835b3f0016914879088cd90080e230", 0x2e}], 0x1}, 0x0) 06:24:01 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, 0x0, 0x0) getsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000400), &(0x7f0000000440)=0x8) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, &(0x7f00000019c0)={0x20}, 0x1) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r1, 0x111, 0x5, 0xc3, 0x4) r2 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x1, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r2, 0xc0045516, &(0x7f0000000040)=0x4) arch_prctl$ARCH_GET_CPUID(0x1011) getpgrp(0x0) flock(r0, 0x0) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000200)={@mcast2}) setsockopt$RDS_CONG_MONITOR(r2, 0x114, 0x6, &(0x7f0000000280), 0x4) ioctl$VHOST_SET_LOG_FD(r2, 0x4004af07, 0x0) ioctl$DRM_IOCTL_IRQ_BUSID(r2, 0xc0106403, &(0x7f0000000100)={0x8875, 0x800, 0x8000, 0xc2}) ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000180)) ioctl$VHOST_SET_VRING_CALL(0xffffffffffffffff, 0x4008af21, &(0x7f0000000380)={0x0, r1}) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x3, 'veth0\x00'}, 0x18) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.cpu/syz1\x00', 0x1ff) openat$snapshot(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/snapshot\x00', 0x0, 0x0) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0xf7fffffffffffffd, 0x2012, r2, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000a40)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x20008000}, 0x24044000) unshare(0x40000000) mount$9p_virtio(&(0x7f00000003c0)='em0%$!,cgroup#\x00', &(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='9p\x00', 0x200000, &(0x7f0000000500)={'trans=virtio,', {[{@afid={'afid', 0x3d, 0x6}}, {@version_L='version=9p2000.L'}, {@cache_none='cache=none'}], [{@subj_role={'subj_role', 0x3d, '/dev/dsp#\x00'}}, {@permit_directio='permit_directio'}, {@measure='measure'}, {@context={'context', 0x3d, 'system_u'}}, {@obj_user={'obj_user'}}, {@dont_hash='dont_hash'}, {@subj_type={'subj_type', 0x3d, '\\eth0('}}, {@fsuuid={'fsuuid', 0x3d, {[0x36, 0x79, 0x0, 0x33, 0x61, 0x62, 0x32], 0x2d, [0x77, 0x32, 0x77, 0x34], 0x2d, [0x7f, 0x67, 0x37, 0x77], 0x2d, [0x0, 0x38, 0x32, 0x33], 0x2d, [0x35, 0x37, 0x7f, 0x7b, 0x37, 0x39, 0x77, 0x33]}}}, {@dont_measure='dont_measure'}]}}) ioctl$VIDIOC_ENUMINPUT(r1, 0xc050561a, &(0x7f0000000300)={0x4, "443b36c4364670c73c2ad26e1952769039650793d10fc72d24ce46e327d06e2f", 0x3, 0x100, 0x4, 0x1057ff, 0x0, 0x6}) 06:24:01 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000040)="2e0000002500817ee45ae087185082cf0f24b0eba06ec400062339e00586f9835b3f0016914879008cd90080e230", 0x2e}], 0x1}, 0x0) 06:24:01 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = creat(&(0x7f0000000000)='./bus\x00', 0x0) getrlimit(0x0, &(0x7f00000000c0)) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0c0583b, &(0x7f0000000040)={0x0, 0xe983020000000000}) 06:24:01 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000040)="2e0000002500817ee45ae087185082cf0f24b0eba06ec400002339e00586f9835b3f00169148790a8cd90080e230", 0x2e}], 0x1}, 0x0) 06:24:01 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) getsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000400), &(0x7f0000000440)=0x8) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, &(0x7f00000019c0)={0x20}, 0x1) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r1, 0x111, 0x5, 0xc3, 0x4) r2 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x1, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r2, 0xc0045516, &(0x7f0000000040)=0x4) arch_prctl$ARCH_GET_CPUID(0x1011) getpgrp(0x0) flock(r0, 0x0) ioctl$BLKRRPART(0xffffffffffffffff, 0x125f, 0x0) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000200)={@mcast2}) fcntl$F_GET_FILE_RW_HINT(r0, 0x40d, &(0x7f00000000c0)) setsockopt$RDS_CONG_MONITOR(r2, 0x114, 0x6, &(0x7f0000000280), 0x4) ioctl$VHOST_SET_LOG_FD(r2, 0x4004af07, 0x0) ioctl$DRM_IOCTL_IRQ_BUSID(r2, 0xc0106403, &(0x7f0000000100)={0x8875, 0x800, 0x8000, 0xc2}) ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000180)) ioctl$VHOST_SET_VRING_CALL(0xffffffffffffffff, 0x4008af21, &(0x7f0000000380)={0x0, r1}) r3 = fcntl$dupfd(r1, 0x0, r2) setsockopt$IP_VS_SO_SET_STOPDAEMON(r3, 0x0, 0x48c, &(0x7f0000000140)={0x3, 'veth0\x00'}, 0x18) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.cpu/syz1\x00', 0x1ff) openat$snapshot(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/snapshot\x00', 0x0, 0x0) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0xf7fffffffffffffd, 0x2012, r2, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000a40)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x20008000}, 0x24044000) unshare(0x40000000) mount$9p_virtio(&(0x7f00000003c0)='em0%$!,cgroup#\x00', &(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='9p\x00', 0x200000, &(0x7f0000000500)={'trans=virtio,', {[{@afid={'afid', 0x3d, 0x6}}, {@cache_none='cache=none'}], [{@subj_role={'subj_role', 0x3d, '/dev/dsp#\x00'}}, {@permit_directio='permit_directio'}, {@measure='measure'}, {@context={'context', 0x3d, 'system_u'}}, {@obj_user={'obj_user'}}, {@dont_hash='dont_hash'}, {@subj_type={'subj_type', 0x3d, '\\eth0('}}, {@fsuuid={'fsuuid', 0x3d, {[0x36, 0x79, 0x0, 0x33, 0x61, 0x62, 0x32], 0x2d, [0x77, 0x32, 0x77, 0x34], 0x2d, [0x7f, 0x67, 0x37, 0x77], 0x2d, [0x0, 0x38, 0x32, 0x33], 0x2d, [0x35, 0x37, 0x7f, 0x7b, 0x37, 0x39, 0x77, 0x33]}}}, {@dont_measure='dont_measure'}]}}) ioctl$VIDIOC_ENUMINPUT(r1, 0xc050561a, &(0x7f0000000300)={0x4, "443b36c4364670c73c2ad26e1952769039650793d10fc72d24ce46e327d06e2f", 0x3, 0x100, 0x4, 0x1057ff, 0x0, 0x6}) 06:24:01 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) getsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000400), &(0x7f0000000440)=0x8) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, &(0x7f00000019c0)={0x20}, 0x1) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r1, 0x111, 0x5, 0xc3, 0x4) r2 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x1, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r2, 0xc0045516, &(0x7f0000000040)=0x4) arch_prctl$ARCH_GET_CPUID(0x1011) getpgrp(0x0) flock(r0, 0x0) ioctl$BLKRRPART(0xffffffffffffffff, 0x125f, 0x0) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000200)={@mcast2}) fcntl$F_GET_FILE_RW_HINT(r0, 0x40d, &(0x7f00000000c0)) setsockopt$RDS_CONG_MONITOR(r2, 0x114, 0x6, &(0x7f0000000280), 0x4) ioctl$VHOST_SET_LOG_FD(r2, 0x4004af07, 0x0) ioctl$DRM_IOCTL_IRQ_BUSID(r2, 0xc0106403, &(0x7f0000000100)={0x8875, 0x800, 0x8000, 0xc2}) ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000180)) ioctl$VHOST_SET_VRING_CALL(0xffffffffffffffff, 0x4008af21, &(0x7f0000000380)={0x0, r1}) r3 = fcntl$dupfd(r1, 0x0, r2) setsockopt$IP_VS_SO_SET_STOPDAEMON(r3, 0x0, 0x48c, &(0x7f0000000140)={0x3, 'veth0\x00'}, 0x18) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.cpu/syz1\x00', 0x1ff) openat$snapshot(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/snapshot\x00', 0x0, 0x0) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0xf7fffffffffffffd, 0x2012, r2, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000a40)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x20008000}, 0x24044000) unshare(0x40000000) mount$9p_virtio(&(0x7f00000003c0)='em0%$!,cgroup#\x00', &(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='9p\x00', 0x200000, 0x0) ioctl$VIDIOC_ENUMINPUT(r1, 0xc050561a, &(0x7f0000000300)={0x4, "443b36c4364670c73c2ad26e1952769039650793d10fc72d24ce46e327d06e2f", 0x3, 0x100, 0x4, 0x1057ff, 0x0, 0x6}) [ 545.805843][T18767] IPVS: ftp: loaded support on port[0] = 21 [ 545.837801][T18772] IPVS: ftp: loaded support on port[0] = 21 06:24:02 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = creat(&(0x7f0000000000)='./bus\x00', 0x0) getrlimit(0x0, &(0x7f00000000c0)) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0c0583b, &(0x7f0000000040)={0x0, 0xfdfdffff00000000}) 06:24:02 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000040)="2e0000002500817ee45ae087185082cf0f24b0eba06ec400072339e00586f9835b3f0016914879008cd90080e230", 0x2e}], 0x1}, 0x0) 06:24:02 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000040)="2e0000002500817ee45ae087185082cf0f24b0eba06ec400002339e00586f9835b3f00169148790e8cd90080e230", 0x2e}], 0x1}, 0x0) 06:24:02 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) getsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000400), &(0x7f0000000440)=0x8) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, &(0x7f00000019c0)={0x20}, 0x1) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r1, 0x111, 0x5, 0xc3, 0x4) r2 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x1, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r2, 0xc0045516, &(0x7f0000000040)=0x4) arch_prctl$ARCH_GET_CPUID(0x1011) getpgrp(0x0) flock(r0, 0x0) ioctl$BLKRRPART(0xffffffffffffffff, 0x125f, 0x0) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000200)={@mcast2}) fcntl$F_GET_FILE_RW_HINT(r0, 0x40d, &(0x7f00000000c0)) setsockopt$RDS_CONG_MONITOR(r2, 0x114, 0x6, &(0x7f0000000280), 0x4) ioctl$VHOST_SET_LOG_FD(r2, 0x4004af07, 0x0) ioctl$DRM_IOCTL_IRQ_BUSID(r2, 0xc0106403, &(0x7f0000000100)={0x8875, 0x800, 0x8000, 0xc2}) ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000180)) ioctl$VHOST_SET_VRING_CALL(0xffffffffffffffff, 0x4008af21, &(0x7f0000000380)={0x0, r1}) r3 = fcntl$dupfd(r1, 0x0, r2) setsockopt$IP_VS_SO_SET_STOPDAEMON(r3, 0x0, 0x48c, &(0x7f0000000140)={0x3, 'veth0\x00'}, 0x18) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.cpu/syz1\x00', 0x1ff) openat$snapshot(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/snapshot\x00', 0x0, 0x0) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0xf7fffffffffffffd, 0x2012, r2, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000a40)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x20008000}, 0x24044000) unshare(0x40000000) mount$9p_virtio(&(0x7f00000003c0)='em0%$!,cgroup#\x00', &(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='9p\x00', 0x200000, &(0x7f0000000500)={'trans=virtio,', {[{@afid={'afid', 0x3d, 0x6}}, {@cache_none='cache=none'}], [{@subj_role={'subj_role', 0x3d, '/dev/dsp#\x00'}}, {@permit_directio='permit_directio'}, {@measure='measure'}, {@context={'context', 0x3d, 'system_u'}}, {@obj_user={'obj_user'}}, {@dont_hash='dont_hash'}, {@subj_type={'subj_type', 0x3d, '\\eth0('}}, {@fsuuid={'fsuuid', 0x3d, {[0x36, 0x79, 0x0, 0x33, 0x61, 0x62, 0x32], 0x2d, [0x77, 0x32, 0x77, 0x34], 0x2d, [0x7f, 0x67, 0x37, 0x77], 0x2d, [0x0, 0x38, 0x32, 0x33], 0x2d, [0x35, 0x37, 0x7f, 0x7b, 0x37, 0x39, 0x77, 0x33]}}}, {@dont_measure='dont_measure'}]}}) ioctl$VIDIOC_ENUMINPUT(r1, 0xc050561a, &(0x7f0000000300)={0x4, "443b36c4364670c73c2ad26e1952769039650793d10fc72d24ce46e327d06e2f", 0x3, 0x100, 0x4, 0x1057ff, 0x0, 0x6}) [ 547.145506][T18785] IPVS: ftp: loaded support on port[0] = 21 [ 547.155627][T18789] __nla_parse: 12 callbacks suppressed [ 547.155676][T18789] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.5'. 06:24:02 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) getsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000400), &(0x7f0000000440)=0x8) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, &(0x7f00000019c0)={0x20}, 0x1) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r1, 0x111, 0x5, 0xc3, 0x4) r2 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x1, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r2, 0xc0045516, &(0x7f0000000040)=0x4) arch_prctl$ARCH_GET_CPUID(0x1011) getpgrp(0x0) flock(r0, 0x0) ioctl$BLKRRPART(0xffffffffffffffff, 0x125f, 0x0) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000200)={@mcast2}) fcntl$F_GET_FILE_RW_HINT(r0, 0x40d, &(0x7f00000000c0)) setsockopt$RDS_CONG_MONITOR(r2, 0x114, 0x6, &(0x7f0000000280), 0x4) ioctl$VHOST_SET_LOG_FD(r2, 0x4004af07, 0x0) ioctl$DRM_IOCTL_IRQ_BUSID(r2, 0xc0106403, &(0x7f0000000100)={0x8875, 0x800, 0x8000, 0xc2}) ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000180)) ioctl$VHOST_SET_VRING_CALL(0xffffffffffffffff, 0x4008af21, &(0x7f0000000380)={0x0, r1}) r3 = fcntl$dupfd(r1, 0x0, r2) setsockopt$IP_VS_SO_SET_STOPDAEMON(r3, 0x0, 0x48c, &(0x7f0000000140)={0x3, 'veth0\x00'}, 0x18) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.cpu/syz1\x00', 0x1ff) openat$snapshot(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/snapshot\x00', 0x0, 0x0) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0xf7fffffffffffffd, 0x2012, r2, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000a40)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x20008000}, 0x24044000) unshare(0x40000000) mount$9p_virtio(&(0x7f00000003c0)='em0%$!,cgroup#\x00', &(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='9p\x00', 0x200000, &(0x7f0000000500)={'trans=virtio,', {[{@afid={'afid', 0x3d, 0x6}}, {@cache_none='cache=none'}], [{@subj_role={'subj_role', 0x3d, '/dev/dsp#\x00'}}, {@permit_directio='permit_directio'}, {@measure='measure'}, {@context={'context', 0x3d, 'system_u'}}, {@obj_user={'obj_user'}}, {@dont_hash='dont_hash'}, {@subj_type={'subj_type', 0x3d, '\\eth0('}}, {@fsuuid={'fsuuid', 0x3d, {[0x36, 0x79, 0x0, 0x33, 0x61, 0x62, 0x32], 0x2d, [0x77, 0x32, 0x77, 0x34], 0x2d, [0x7f, 0x67, 0x37, 0x77], 0x2d, [0x0, 0x38, 0x32, 0x33], 0x2d, [0x35, 0x37, 0x7f, 0x7b, 0x37, 0x39, 0x77, 0x33]}}}, {@dont_measure='dont_measure'}]}}) ioctl$VIDIOC_ENUMINPUT(r1, 0xc050561a, &(0x7f0000000300)={0x4, "443b36c4364670c73c2ad26e1952769039650793d10fc72d24ce46e327d06e2f", 0x3, 0x100, 0x4, 0x1057ff, 0x0, 0x6}) 06:24:03 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = creat(&(0x7f0000000000)='./bus\x00', 0x0) getrlimit(0x0, &(0x7f00000000c0)) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0c0583b, &(0x7f0000000040)={0x0, 0xff7f000000000000}) [ 547.302294][T18795] IPVS: ftp: loaded support on port[0] = 21 [ 547.341239][T18791] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.4'. [ 547.393507][T18797] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.5'. [ 547.502205][T18800] IPVS: ftp: loaded support on port[0] = 21 06:24:04 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) getsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000400), &(0x7f0000000440)=0x8) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, &(0x7f00000019c0)={0x20}, 0x1) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r1, 0x111, 0x5, 0xc3, 0x4) r2 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x1, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r2, 0xc0045516, &(0x7f0000000040)=0x4) arch_prctl$ARCH_GET_CPUID(0x1011) getpgrp(0x0) flock(r0, 0x0) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000200)={@mcast2}) setsockopt$RDS_CONG_MONITOR(r2, 0x114, 0x6, &(0x7f0000000280), 0x4) ioctl$VHOST_SET_LOG_FD(r2, 0x4004af07, 0x0) ioctl$DRM_IOCTL_IRQ_BUSID(r2, 0xc0106403, &(0x7f0000000100)={0x8875, 0x800, 0x8000, 0xc2}) ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000180)) ioctl$VHOST_SET_VRING_CALL(0xffffffffffffffff, 0x4008af21, &(0x7f0000000380)={0x0, r1}) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x3, 'veth0\x00'}, 0x18) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.cpu/syz1\x00', 0x1ff) openat$snapshot(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/snapshot\x00', 0x0, 0x0) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0xf7fffffffffffffd, 0x2012, r2, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000a40)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x20008000}, 0x24044000) unshare(0x40000000) mount$9p_virtio(&(0x7f00000003c0)='em0%$!,cgroup#\x00', &(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='9p\x00', 0x200000, &(0x7f0000000500)={'trans=virtio,', {[{@afid={'afid', 0x3d, 0x6}}, {@version_L='version=9p2000.L'}, {@cache_none='cache=none'}], [{@subj_role={'subj_role', 0x3d, '/dev/dsp#\x00'}}, {@permit_directio='permit_directio'}, {@measure='measure'}, {@context={'context', 0x3d, 'system_u'}}, {@obj_user={'obj_user'}}, {@dont_hash='dont_hash'}, {@subj_type={'subj_type', 0x3d, '\\eth0('}}, {@fsuuid={'fsuuid', 0x3d, {[0x36, 0x79, 0x0, 0x33, 0x61, 0x62, 0x32], 0x2d, [0x77, 0x32, 0x77, 0x34], 0x2d, [0x7f, 0x67, 0x37, 0x77], 0x2d, [0x0, 0x38, 0x32, 0x33], 0x2d, [0x35, 0x37, 0x7f, 0x7b, 0x37, 0x39, 0x77, 0x33]}}}, {@dont_measure='dont_measure'}]}}) ioctl$VIDIOC_ENUMINPUT(r1, 0xc050561a, &(0x7f0000000300)={0x4, "443b36c4364670c73c2ad26e1952769039650793d10fc72d24ce46e327d06e2f", 0x3, 0x100, 0x4, 0x1057ff, 0x0, 0x6}) 06:24:04 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000040)="2e0000002500817ee45ae087185082cf0f24b0eba06ec400002339e00586f9835b3f0016914879108cd90080e230", 0x2e}], 0x1}, 0x0) 06:24:04 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) getsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000400), &(0x7f0000000440)=0x8) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, &(0x7f00000019c0)={0x20}, 0x1) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r1, 0x111, 0x5, 0xc3, 0x4) r2 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x1, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r2, 0xc0045516, &(0x7f0000000040)=0x4) arch_prctl$ARCH_GET_CPUID(0x1011) getpgrp(0x0) flock(r0, 0x0) ioctl$BLKRRPART(0xffffffffffffffff, 0x125f, 0x0) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000200)={@mcast2}) fcntl$F_GET_FILE_RW_HINT(r0, 0x40d, &(0x7f00000000c0)) setsockopt$RDS_CONG_MONITOR(r2, 0x114, 0x6, &(0x7f0000000280), 0x4) ioctl$VHOST_SET_LOG_FD(r2, 0x4004af07, 0x0) ioctl$DRM_IOCTL_IRQ_BUSID(r2, 0xc0106403, &(0x7f0000000100)={0x8875, 0x800, 0x8000, 0xc2}) ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000180)) ioctl$VHOST_SET_VRING_CALL(0xffffffffffffffff, 0x4008af21, &(0x7f0000000380)={0x0, r1}) r3 = fcntl$dupfd(r1, 0x0, r2) setsockopt$IP_VS_SO_SET_STOPDAEMON(r3, 0x0, 0x48c, &(0x7f0000000140)={0x3, 'veth0\x00'}, 0x18) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.cpu/syz1\x00', 0x1ff) openat$snapshot(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/snapshot\x00', 0x0, 0x0) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0xf7fffffffffffffd, 0x2012, r2, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000a40)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x20008000}, 0x24044000) unshare(0x40000000) mount$9p_virtio(&(0x7f00000003c0)='em0%$!,cgroup#\x00', &(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='9p\x00', 0x200000, &(0x7f0000000500)={'trans=virtio,', {[{@afid={'afid', 0x3d, 0x6}}, {@cache_none='cache=none'}], [{@subj_role={'subj_role', 0x3d, '/dev/dsp#\x00'}}, {@permit_directio='permit_directio'}, {@measure='measure'}, {@context={'context', 0x3d, 'system_u'}}, {@obj_user={'obj_user'}}, {@dont_hash='dont_hash'}, {@subj_type={'subj_type', 0x3d, '\\eth0('}}, {@fsuuid={'fsuuid', 0x3d, {[0x36, 0x79, 0x0, 0x33, 0x61, 0x62, 0x32], 0x2d, [0x77, 0x32, 0x77, 0x34], 0x2d, [0x7f, 0x67, 0x37, 0x77], 0x2d, [0x0, 0x38, 0x32, 0x33], 0x2d, [0x35, 0x37, 0x7f, 0x7b, 0x37, 0x39, 0x77, 0x33]}}}, {@dont_measure='dont_measure'}]}}) ioctl$VIDIOC_ENUMINPUT(r1, 0xc050561a, &(0x7f0000000300)={0x4, "443b36c4364670c73c2ad26e1952769039650793d10fc72d24ce46e327d06e2f", 0x3, 0x100, 0x4, 0x1057ff, 0x0, 0x6}) 06:24:04 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000040)="2e0000002500817ee45ae087185082cf0f24b0eba06ec400082339e00586f9835b3f0016914879008cd90080e230", 0x2e}], 0x1}, 0x0) 06:24:04 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = creat(&(0x7f0000000000)='./bus\x00', 0x0) getrlimit(0x0, &(0x7f00000000c0)) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0c0583b, &(0x7f0000000040)={0x0, 0xfffe070000000000}) [ 548.561892][T18817] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.5'. [ 548.654466][T18818] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.4'. [ 548.714781][T18813] IPVS: ftp: loaded support on port[0] = 21 [ 548.747365][T18823] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.4'. 06:24:04 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = creat(&(0x7f0000000000)='./bus\x00', 0x0) getrlimit(0x0, &(0x7f00000000c0)) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0c0583b, &(0x7f0000000040)={0x0, 0xffffffff00000000}) 06:24:04 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) getsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000400), &(0x7f0000000440)=0x8) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, &(0x7f00000019c0)={0x20}, 0x1) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r1, 0x111, 0x5, 0xc3, 0x4) r2 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x1, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r2, 0xc0045516, &(0x7f0000000040)=0x4) arch_prctl$ARCH_GET_CPUID(0x1011) getpgrp(0x0) flock(r0, 0x0) ioctl$BLKRRPART(0xffffffffffffffff, 0x125f, 0x0) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000200)={@mcast2}) fcntl$F_GET_FILE_RW_HINT(r0, 0x40d, &(0x7f00000000c0)) setsockopt$RDS_CONG_MONITOR(r2, 0x114, 0x6, &(0x7f0000000280), 0x4) ioctl$VHOST_SET_LOG_FD(r2, 0x4004af07, 0x0) ioctl$DRM_IOCTL_IRQ_BUSID(r2, 0xc0106403, &(0x7f0000000100)={0x8875, 0x800, 0x8000, 0xc2}) ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000180)) ioctl$VHOST_SET_VRING_CALL(0xffffffffffffffff, 0x4008af21, &(0x7f0000000380)={0x0, r1}) r3 = fcntl$dupfd(r1, 0x0, r2) setsockopt$IP_VS_SO_SET_STOPDAEMON(r3, 0x0, 0x48c, &(0x7f0000000140)={0x3, 'veth0\x00'}, 0x18) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.cpu/syz1\x00', 0x1ff) openat$snapshot(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/snapshot\x00', 0x0, 0x0) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0xf7fffffffffffffd, 0x2012, r2, 0x0) sendmsg$nl_route_sched(r3, 0x0, 0x24044000) unshare(0x40000000) mount$9p_virtio(&(0x7f00000003c0)='em0%$!,cgroup#\x00', &(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='9p\x00', 0x200000, &(0x7f0000000500)={'trans=virtio,', {[{@afid={'afid', 0x3d, 0x6}}, {@version_L='version=9p2000.L'}, {@cache_none='cache=none'}], [{@subj_role={'subj_role', 0x3d, '/dev/dsp#\x00'}}, {@permit_directio='permit_directio'}, {@measure='measure'}, {@context={'context', 0x3d, 'system_u'}}, {@obj_user={'obj_user'}}, {@dont_hash='dont_hash'}, {@subj_type={'subj_type', 0x3d, '\\eth0('}}, {@fsuuid={'fsuuid', 0x3d, {[0x36, 0x79, 0x0, 0x33, 0x61, 0x62, 0x32], 0x2d, [0x77, 0x32, 0x77, 0x34], 0x2d, [0x7f, 0x67, 0x37, 0x77], 0x2d, [0x0, 0x38, 0x32, 0x33], 0x2d, [0x35, 0x37, 0x7f, 0x7b, 0x37, 0x39, 0x77, 0x33]}}}, {@dont_measure='dont_measure'}]}}) ioctl$VIDIOC_ENUMINPUT(r1, 0xc050561a, &(0x7f0000000300)={0x4, "443b36c4364670c73c2ad26e1952769039650793d10fc72d24ce46e327d06e2f", 0x3, 0x100, 0x4, 0x1057ff, 0x0, 0x6}) 06:24:04 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000040)="2e0000002500817ee45ae087185082cf0f24b0eba06ec4000a2339e00586f9835b3f0016914879008cd90080e230", 0x2e}], 0x1}, 0x0) [ 549.036480][T18833] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.5'. [ 549.216803][T18830] IPVS: ftp: loaded support on port[0] = 21 [ 549.289100][T18836] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.4'. 06:24:05 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = creat(&(0x7f0000000000)='./bus\x00', 0x0) getrlimit(0x0, &(0x7f00000000c0)) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x0, 0x2}) 06:24:05 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000040)="2e0000002500817ee45ae087185082cf0f24b0eba06ec400002339e00586f9835b3f0016914879488cd90080e230", 0x2e}], 0x1}, 0x0) 06:24:05 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) getsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000400), &(0x7f0000000440)=0x8) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, &(0x7f00000019c0)={0x20}, 0x1) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r1, 0x111, 0x5, 0xc3, 0x4) r2 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x1, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r2, 0xc0045516, &(0x7f0000000040)=0x4) arch_prctl$ARCH_GET_CPUID(0x1011) getpgrp(0x0) flock(r0, 0x0) ioctl$BLKRRPART(0xffffffffffffffff, 0x125f, 0x0) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000200)={@mcast2}) fcntl$F_GET_FILE_RW_HINT(r0, 0x40d, &(0x7f00000000c0)) setsockopt$RDS_CONG_MONITOR(r2, 0x114, 0x6, &(0x7f0000000280), 0x4) ioctl$VHOST_SET_LOG_FD(r2, 0x4004af07, 0x0) ioctl$DRM_IOCTL_IRQ_BUSID(r2, 0xc0106403, &(0x7f0000000100)={0x8875, 0x800, 0x8000, 0xc2}) ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000180)) ioctl$VHOST_SET_VRING_CALL(0xffffffffffffffff, 0x4008af21, &(0x7f0000000380)={0x0, r1}) r3 = fcntl$dupfd(r1, 0x0, r2) setsockopt$IP_VS_SO_SET_STOPDAEMON(r3, 0x0, 0x48c, &(0x7f0000000140)={0x3, 'veth0\x00'}, 0x18) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.cpu/syz1\x00', 0x1ff) openat$snapshot(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/snapshot\x00', 0x0, 0x0) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0xf7fffffffffffffd, 0x2012, r2, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000a40)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x20008000}, 0x24044000) unshare(0x40000000) mount$9p_virtio(&(0x7f00000003c0)='em0%$!,cgroup#\x00', &(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='9p\x00', 0x200000, &(0x7f0000000500)={'trans=virtio,', {[{@version_L='version=9p2000.L'}, {@cache_none='cache=none'}], [{@subj_role={'subj_role', 0x3d, '/dev/dsp#\x00'}}, {@permit_directio='permit_directio'}, {@measure='measure'}, {@context={'context', 0x3d, 'system_u'}}, {@obj_user={'obj_user'}}, {@dont_hash='dont_hash'}, {@subj_type={'subj_type', 0x3d, '\\eth0('}}, {@fsuuid={'fsuuid', 0x3d, {[0x36, 0x79, 0x0, 0x33, 0x61, 0x62, 0x32], 0x2d, [0x77, 0x32, 0x77, 0x34], 0x2d, [0x7f, 0x67, 0x37, 0x77], 0x2d, [0x0, 0x38, 0x32, 0x33], 0x2d, [0x35, 0x37, 0x7f, 0x7b, 0x37, 0x39, 0x77, 0x33]}}}, {@dont_measure='dont_measure'}]}}) ioctl$VIDIOC_ENUMINPUT(r1, 0xc050561a, &(0x7f0000000300)={0x4, "443b36c4364670c73c2ad26e1952769039650793d10fc72d24ce46e327d06e2f", 0x3, 0x100, 0x4, 0x1057ff, 0x0, 0x6}) [ 549.431303][T18816] IPVS: ftp: loaded support on port[0] = 21 06:24:05 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000040)="2e0000002500817ee45ae087185082cf0f24b0eba06ec4000e2339e00586f9835b3f0016914879008cd90080e230", 0x2e}], 0x1}, 0x0) [ 549.604766][T18848] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.5'. [ 549.755702][T18849] IPVS: ftp: loaded support on port[0] = 21 [ 549.772705][T18854] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.4'. 06:24:07 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) getsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000400), &(0x7f0000000440)=0x8) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, &(0x7f00000019c0)={0x20}, 0x1) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r1, 0x111, 0x5, 0xc3, 0x4) r2 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x1, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r2, 0xc0045516, &(0x7f0000000040)=0x4) arch_prctl$ARCH_GET_CPUID(0x1011) getpgrp(0x0) flock(r0, 0x0) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000200)={@mcast2}) setsockopt$RDS_CONG_MONITOR(r2, 0x114, 0x6, &(0x7f0000000280), 0x4) ioctl$VHOST_SET_LOG_FD(r2, 0x4004af07, 0x0) ioctl$DRM_IOCTL_IRQ_BUSID(r2, 0xc0106403, &(0x7f0000000100)={0x8875, 0x800, 0x8000, 0xc2}) ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000180)) ioctl$VHOST_SET_VRING_CALL(0xffffffffffffffff, 0x4008af21, &(0x7f0000000380)={0x0, r1}) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x3, 'veth0\x00'}, 0x18) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.cpu/syz1\x00', 0x1ff) openat$snapshot(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/snapshot\x00', 0x0, 0x0) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0xf7fffffffffffffd, 0x2012, r2, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000a40)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x20008000}, 0x24044000) unshare(0x40000000) mount$9p_virtio(&(0x7f00000003c0)='em0%$!,cgroup#\x00', &(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='9p\x00', 0x200000, &(0x7f0000000500)={'trans=virtio,', {[{@afid={'afid', 0x3d, 0x6}}, {@version_L='version=9p2000.L'}, {@cache_none='cache=none'}], [{@subj_role={'subj_role', 0x3d, '/dev/dsp#\x00'}}, {@permit_directio='permit_directio'}, {@measure='measure'}, {@context={'context', 0x3d, 'system_u'}}, {@obj_user={'obj_user'}}, {@dont_hash='dont_hash'}, {@subj_type={'subj_type', 0x3d, '\\eth0('}}, {@fsuuid={'fsuuid', 0x3d, {[0x36, 0x79, 0x0, 0x33, 0x61, 0x62, 0x32], 0x2d, [0x77, 0x32, 0x77, 0x34], 0x2d, [0x7f, 0x67, 0x37, 0x77], 0x2d, [0x0, 0x38, 0x32, 0x33], 0x2d, [0x35, 0x37, 0x7f, 0x7b, 0x37, 0x39, 0x77, 0x33]}}}, {@dont_measure='dont_measure'}]}}) ioctl$VIDIOC_ENUMINPUT(r1, 0xc050561a, &(0x7f0000000300)={0x4, "443b36c4364670c73c2ad26e1952769039650793d10fc72d24ce46e327d06e2f", 0x3, 0x100, 0x4, 0x1057ff, 0x0, 0x6}) 06:24:07 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = creat(&(0x7f0000000000)='./bus\x00', 0x0) getrlimit(0x0, &(0x7f00000000c0)) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x0, 0x3}) 06:24:07 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000040)="2e0000002500817ee45ae087185082cf0f24b0eba06ec400002339e00586f9835b3f00169148794c8cd90080e230", 0x2e}], 0x1}, 0x0) 06:24:07 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) getsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000400), &(0x7f0000000440)=0x8) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, &(0x7f00000019c0)={0x20}, 0x1) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r1, 0x111, 0x5, 0xc3, 0x4) r2 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x1, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r2, 0xc0045516, &(0x7f0000000040)=0x4) arch_prctl$ARCH_GET_CPUID(0x1011) getpgrp(0x0) flock(r0, 0x0) ioctl$BLKRRPART(0xffffffffffffffff, 0x125f, 0x0) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000200)={@mcast2}) fcntl$F_GET_FILE_RW_HINT(r0, 0x40d, &(0x7f00000000c0)) setsockopt$RDS_CONG_MONITOR(r2, 0x114, 0x6, &(0x7f0000000280), 0x4) ioctl$VHOST_SET_LOG_FD(r2, 0x4004af07, 0x0) ioctl$DRM_IOCTL_IRQ_BUSID(r2, 0xc0106403, &(0x7f0000000100)={0x8875, 0x800, 0x8000, 0xc2}) ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000180)) ioctl$VHOST_SET_VRING_CALL(0xffffffffffffffff, 0x4008af21, &(0x7f0000000380)={0x0, r1}) r3 = fcntl$dupfd(r1, 0x0, r2) setsockopt$IP_VS_SO_SET_STOPDAEMON(r3, 0x0, 0x48c, &(0x7f0000000140)={0x3, 'veth0\x00'}, 0x18) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.cpu/syz1\x00', 0x1ff) openat$snapshot(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/snapshot\x00', 0x0, 0x0) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0xf7fffffffffffffd, 0x2012, r2, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000a40)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x20008000}, 0x24044000) unshare(0x40000000) mount$9p_virtio(&(0x7f00000003c0)='em0%$!,cgroup#\x00', &(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='9p\x00', 0x200000, &(0x7f0000000500)={'trans=virtio,', {[{@afid={'afid', 0x3d, 0x6}}, {@cache_none='cache=none'}], [{@subj_role={'subj_role', 0x3d, '/dev/dsp#\x00'}}, {@permit_directio='permit_directio'}, {@measure='measure'}, {@context={'context', 0x3d, 'system_u'}}, {@obj_user={'obj_user'}}, {@dont_hash='dont_hash'}, {@subj_type={'subj_type', 0x3d, '\\eth0('}}, {@fsuuid={'fsuuid', 0x3d, {[0x36, 0x79, 0x0, 0x33, 0x61, 0x62, 0x32], 0x2d, [0x77, 0x32, 0x77, 0x34], 0x2d, [0x7f, 0x67, 0x37, 0x77], 0x2d, [0x0, 0x38, 0x32, 0x33], 0x2d, [0x35, 0x37, 0x7f, 0x7b, 0x37, 0x39, 0x77, 0x33]}}}, {@dont_measure='dont_measure'}]}}) ioctl$VIDIOC_ENUMINPUT(r1, 0xc050561a, &(0x7f0000000300)={0x4, "443b36c4364670c73c2ad26e1952769039650793d10fc72d24ce46e327d06e2f", 0x3, 0x100, 0x4, 0x1057ff, 0x0, 0x6}) 06:24:07 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000040)="2e0000002500817ee45ae087185082cf0f24b0eba06ec4000f2339e00586f9835b3f0016914879008cd90080e230", 0x2e}], 0x1}, 0x0) 06:24:07 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) getsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000400), &(0x7f0000000440)=0x8) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, &(0x7f00000019c0)={0x20}, 0x1) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r1, 0x111, 0x5, 0xc3, 0x4) r2 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x1, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r2, 0xc0045516, &(0x7f0000000040)=0x4) arch_prctl$ARCH_GET_CPUID(0x1011) getpgrp(0x0) flock(r0, 0x0) ioctl$BLKRRPART(0xffffffffffffffff, 0x125f, 0x0) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000200)={@mcast2}) fcntl$F_GET_FILE_RW_HINT(r0, 0x40d, &(0x7f00000000c0)) setsockopt$RDS_CONG_MONITOR(r2, 0x114, 0x6, &(0x7f0000000280), 0x4) ioctl$VHOST_SET_LOG_FD(r2, 0x4004af07, 0x0) ioctl$DRM_IOCTL_IRQ_BUSID(r2, 0xc0106403, &(0x7f0000000100)={0x8875, 0x800, 0x8000, 0xc2}) ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000180)) ioctl$VHOST_SET_VRING_CALL(0xffffffffffffffff, 0x4008af21, &(0x7f0000000380)={0x0, r1}) r3 = fcntl$dupfd(r1, 0x0, r2) setsockopt$IP_VS_SO_SET_STOPDAEMON(r3, 0x0, 0x48c, &(0x7f0000000140)={0x3, 'veth0\x00'}, 0x18) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.cpu/syz1\x00', 0x1ff) openat$snapshot(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/snapshot\x00', 0x0, 0x0) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0xf7fffffffffffffd, 0x2012, r2, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000a40)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x20008000}, 0x24044000) unshare(0x40000000) mount$9p_virtio(&(0x7f00000003c0)='em0%$!,cgroup#\x00', &(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='9p\x00', 0x200000, &(0x7f0000000500)={'trans=virtio,', {[{@version_L='version=9p2000.L'}, {@cache_none='cache=none'}], [{@subj_role={'subj_role', 0x3d, '/dev/dsp#\x00'}}, {@permit_directio='permit_directio'}, {@measure='measure'}, {@context={'context', 0x3d, 'system_u'}}, {@obj_user={'obj_user'}}, {@dont_hash='dont_hash'}, {@subj_type={'subj_type', 0x3d, '\\eth0('}}, {@fsuuid={'fsuuid', 0x3d, {[0x36, 0x79, 0x0, 0x33, 0x61, 0x62, 0x32], 0x2d, [0x77, 0x32, 0x77, 0x34], 0x2d, [0x7f, 0x67, 0x37, 0x77], 0x2d, [0x0, 0x38, 0x32, 0x33], 0x2d, [0x35, 0x37, 0x7f, 0x7b, 0x37, 0x39, 0x77, 0x33]}}}, {@dont_measure='dont_measure'}]}}) ioctl$VIDIOC_ENUMINPUT(r1, 0xc050561a, &(0x7f0000000300)={0x4, "443b36c4364670c73c2ad26e1952769039650793d10fc72d24ce46e327d06e2f", 0x3, 0x100, 0x4, 0x1057ff, 0x0, 0x6}) [ 551.580222][T18871] IPVS: ftp: loaded support on port[0] = 21 [ 551.609433][T18868] IPVS: ftp: loaded support on port[0] = 21 06:24:08 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000040)="2e0000002500817ee45ae087185082cf0f24b0eba06ec400102339e00586f9835b3f0016914879008cd90080e230", 0x2e}], 0x1}, 0x0) 06:24:08 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000040)="2e0000002500817ee45ae087185082cf0f24b0eba06ec400002339e00586f9835b3f0016914879608cd90080e230", 0x2e}], 0x1}, 0x0) 06:24:08 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = creat(&(0x7f0000000000)='./bus\x00', 0x0) getrlimit(0x0, &(0x7f00000000c0)) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x0, 0x4}) [ 552.676300][T18878] IPVS: ftp: loaded support on port[0] = 21 06:24:08 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) getsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000400), &(0x7f0000000440)=0x8) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, &(0x7f00000019c0)={0x20}, 0x1) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r1, 0x111, 0x5, 0xc3, 0x4) r2 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x1, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r2, 0xc0045516, &(0x7f0000000040)=0x4) arch_prctl$ARCH_GET_CPUID(0x1011) getpgrp(0x0) flock(r0, 0x0) ioctl$BLKRRPART(0xffffffffffffffff, 0x125f, 0x0) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000200)={@mcast2}) fcntl$F_GET_FILE_RW_HINT(r0, 0x40d, &(0x7f00000000c0)) setsockopt$RDS_CONG_MONITOR(r2, 0x114, 0x6, &(0x7f0000000280), 0x4) ioctl$VHOST_SET_LOG_FD(r2, 0x4004af07, 0x0) ioctl$DRM_IOCTL_IRQ_BUSID(r2, 0xc0106403, &(0x7f0000000100)={0x8875, 0x800, 0x8000, 0xc2}) ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000180)) ioctl$VHOST_SET_VRING_CALL(0xffffffffffffffff, 0x4008af21, &(0x7f0000000380)={0x0, r1}) r3 = fcntl$dupfd(r1, 0x0, r2) setsockopt$IP_VS_SO_SET_STOPDAEMON(r3, 0x0, 0x48c, &(0x7f0000000140)={0x3, 'veth0\x00'}, 0x18) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.cpu/syz1\x00', 0x1ff) openat$snapshot(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/snapshot\x00', 0x0, 0x0) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0xf7fffffffffffffd, 0x2012, r2, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000a40)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x20008000}, 0x24044000) unshare(0x40000000) mount$9p_virtio(&(0x7f00000003c0)='em0%$!,cgroup#\x00', &(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='9p\x00', 0x200000, &(0x7f0000000500)={'trans=virtio,', {[{@version_L='version=9p2000.L'}, {@cache_none='cache=none'}], [{@subj_role={'subj_role', 0x3d, '/dev/dsp#\x00'}}, {@permit_directio='permit_directio'}, {@measure='measure'}, {@context={'context', 0x3d, 'system_u'}}, {@obj_user={'obj_user'}}, {@dont_hash='dont_hash'}, {@subj_type={'subj_type', 0x3d, '\\eth0('}}, {@fsuuid={'fsuuid', 0x3d, {[0x36, 0x79, 0x0, 0x33, 0x61, 0x62, 0x32], 0x2d, [0x77, 0x32, 0x77, 0x34], 0x2d, [0x7f, 0x67, 0x37, 0x77], 0x2d, [0x0, 0x38, 0x32, 0x33], 0x2d, [0x35, 0x37, 0x7f, 0x7b, 0x37, 0x39, 0x77, 0x33]}}}, {@dont_measure='dont_measure'}]}}) ioctl$VIDIOC_ENUMINPUT(r1, 0xc050561a, &(0x7f0000000300)={0x4, "443b36c4364670c73c2ad26e1952769039650793d10fc72d24ce46e327d06e2f", 0x3, 0x100, 0x4, 0x1057ff, 0x0, 0x6}) [ 552.728470][T18885] __nla_parse: 6 callbacks suppressed [ 552.728479][T18885] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.4'. 06:24:08 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) getsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000400), &(0x7f0000000440)=0x8) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, &(0x7f00000019c0)={0x20}, 0x1) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r1, 0x111, 0x5, 0xc3, 0x4) r2 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x1, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r2, 0xc0045516, &(0x7f0000000040)=0x4) arch_prctl$ARCH_GET_CPUID(0x1011) getpgrp(0x0) flock(r0, 0x0) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000200)={@mcast2}) setsockopt$RDS_CONG_MONITOR(r2, 0x114, 0x6, &(0x7f0000000280), 0x4) ioctl$VHOST_SET_LOG_FD(r2, 0x4004af07, 0x0) ioctl$DRM_IOCTL_IRQ_BUSID(r2, 0xc0106403, &(0x7f0000000100)={0x8875, 0x800, 0x8000, 0xc2}) ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000180)) ioctl$VHOST_SET_VRING_CALL(0xffffffffffffffff, 0x4008af21, &(0x7f0000000380)={0x0, r1}) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x3, 'veth0\x00'}, 0x18) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.cpu/syz1\x00', 0x1ff) openat$snapshot(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/snapshot\x00', 0x0, 0x0) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0xf7fffffffffffffd, 0x2012, r2, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000a40)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x20008000}, 0x24044000) unshare(0x40000000) mount$9p_virtio(&(0x7f00000003c0)='em0%$!,cgroup#\x00', &(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='9p\x00', 0x200000, &(0x7f0000000500)={'trans=virtio,', {[{@afid={'afid', 0x3d, 0x6}}, {@version_L='version=9p2000.L'}, {@cache_none='cache=none'}], [{@subj_role={'subj_role', 0x3d, '/dev/dsp#\x00'}}, {@permit_directio='permit_directio'}, {@measure='measure'}, {@context={'context', 0x3d, 'system_u'}}, {@obj_user={'obj_user'}}, {@dont_hash='dont_hash'}, {@subj_type={'subj_type', 0x3d, '\\eth0('}}, {@fsuuid={'fsuuid', 0x3d, {[0x36, 0x79, 0x0, 0x33, 0x61, 0x62, 0x32], 0x2d, [0x77, 0x32, 0x77, 0x34], 0x2d, [0x7f, 0x67, 0x37, 0x77], 0x2d, [0x0, 0x38, 0x32, 0x33], 0x2d, [0x35, 0x37, 0x7f, 0x7b, 0x37, 0x39, 0x77, 0x33]}}}, {@dont_measure='dont_measure'}]}}) ioctl$VIDIOC_ENUMINPUT(r1, 0xc050561a, &(0x7f0000000300)={0x4, "443b36c4364670c73c2ad26e1952769039650793d10fc72d24ce46e327d06e2f", 0x3, 0x100, 0x4, 0x1057ff, 0x0, 0x6}) [ 552.792481][T18889] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.5'. [ 552.817568][T18890] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.4'. [ 552.872188][T18889] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.5'. 06:24:08 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000040)="2e0000002500817ee45ae087185082cf0f24b0eba06ec400482339e00586f9835b3f0016914879008cd90080e230", 0x2e}], 0x1}, 0x0) [ 552.978233][T18894] IPVS: ftp: loaded support on port[0] = 21 [ 553.084574][T18899] IPVS: ftp: loaded support on port[0] = 21 [ 553.100441][T18903] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.4'. [ 553.119722][T18904] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.4'. 06:24:11 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) getsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000400), &(0x7f0000000440)=0x8) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, &(0x7f00000019c0)={0x20}, 0x1) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r1, 0x111, 0x5, 0xc3, 0x4) r2 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x1, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r2, 0xc0045516, &(0x7f0000000040)=0x4) arch_prctl$ARCH_GET_CPUID(0x1011) getpgrp(0x0) flock(r0, 0x0) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000200)={@mcast2}) setsockopt$RDS_CONG_MONITOR(r2, 0x114, 0x6, &(0x7f0000000280), 0x4) ioctl$VHOST_SET_LOG_FD(r2, 0x4004af07, 0x0) ioctl$DRM_IOCTL_IRQ_BUSID(r2, 0xc0106403, &(0x7f0000000100)={0x8875, 0x800, 0x8000, 0xc2}) ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000180)) ioctl$VHOST_SET_VRING_CALL(0xffffffffffffffff, 0x4008af21, &(0x7f0000000380)={0x0, r1}) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x3, 'veth0\x00'}, 0x18) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.cpu/syz1\x00', 0x1ff) openat$snapshot(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/snapshot\x00', 0x0, 0x0) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0xf7fffffffffffffd, 0x2012, r2, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000a40)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x20008000}, 0x24044000) unshare(0x40000000) mount$9p_virtio(&(0x7f00000003c0)='em0%$!,cgroup#\x00', &(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='9p\x00', 0x200000, &(0x7f0000000500)={'trans=virtio,', {[{@afid={'afid', 0x3d, 0x6}}, {@version_L='version=9p2000.L'}, {@cache_none='cache=none'}], [{@subj_role={'subj_role', 0x3d, '/dev/dsp#\x00'}}, {@permit_directio='permit_directio'}, {@measure='measure'}, {@context={'context', 0x3d, 'system_u'}}, {@obj_user={'obj_user'}}, {@dont_hash='dont_hash'}, {@subj_type={'subj_type', 0x3d, '\\eth0('}}, {@fsuuid={'fsuuid', 0x3d, {[0x36, 0x79, 0x0, 0x33, 0x61, 0x62, 0x32], 0x2d, [0x77, 0x32, 0x77, 0x34], 0x2d, [0x7f, 0x67, 0x37, 0x77], 0x2d, [0x0, 0x38, 0x32, 0x33], 0x2d, [0x35, 0x37, 0x7f, 0x7b, 0x37, 0x39, 0x77, 0x33]}}}, {@dont_measure='dont_measure'}]}}) ioctl$VIDIOC_ENUMINPUT(r1, 0xc050561a, &(0x7f0000000300)={0x4, "443b36c4364670c73c2ad26e1952769039650793d10fc72d24ce46e327d06e2f", 0x3, 0x100, 0x4, 0x1057ff, 0x0, 0x6}) 06:24:11 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = creat(&(0x7f0000000000)='./bus\x00', 0x0) getrlimit(0x0, &(0x7f00000000c0)) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x0, 0x5}) 06:24:11 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000040)="2e0000002500817ee45ae087185082cf0f24b0eba06ec400002339e00586f9835b3f0016914879688cd90080e230", 0x2e}], 0x1}, 0x0) 06:24:11 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) getsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000400), &(0x7f0000000440)=0x8) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, &(0x7f00000019c0)={0x20}, 0x1) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r1, 0x111, 0x5, 0xc3, 0x4) r2 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x1, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r2, 0xc0045516, &(0x7f0000000040)=0x4) arch_prctl$ARCH_GET_CPUID(0x1011) getpgrp(0x0) flock(r0, 0x0) ioctl$BLKRRPART(0xffffffffffffffff, 0x125f, 0x0) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000200)={@mcast2}) fcntl$F_GET_FILE_RW_HINT(r0, 0x40d, &(0x7f00000000c0)) setsockopt$RDS_CONG_MONITOR(r2, 0x114, 0x6, &(0x7f0000000280), 0x4) ioctl$VHOST_SET_LOG_FD(r2, 0x4004af07, 0x0) ioctl$DRM_IOCTL_IRQ_BUSID(r2, 0xc0106403, &(0x7f0000000100)={0x8875, 0x800, 0x8000, 0xc2}) ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000180)) ioctl$VHOST_SET_VRING_CALL(0xffffffffffffffff, 0x4008af21, &(0x7f0000000380)={0x0, r1}) r3 = fcntl$dupfd(r1, 0x0, r2) setsockopt$IP_VS_SO_SET_STOPDAEMON(r3, 0x0, 0x48c, &(0x7f0000000140)={0x3, 'veth0\x00'}, 0x18) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.cpu/syz1\x00', 0x1ff) openat$snapshot(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/snapshot\x00', 0x0, 0x0) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0xf7fffffffffffffd, 0x2012, r2, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000a40)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x20008000}, 0x24044000) unshare(0x40000000) mount$9p_virtio(&(0x7f00000003c0)='em0%$!,cgroup#\x00', &(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='9p\x00', 0x200000, &(0x7f0000000500)={'trans=virtio,', {[{@afid={'afid'}}, {@version_L='version=9p2000.L'}, {@cache_none='cache=none'}], [{@subj_role={'subj_role', 0x3d, '/dev/dsp#\x00'}}, {@permit_directio='permit_directio'}, {@measure='measure'}, {@context={'context', 0x3d, 'system_u'}}, {@obj_user={'obj_user'}}, {@dont_hash='dont_hash'}, {@subj_type={'subj_type', 0x3d, '\\eth0('}}, {@fsuuid={'fsuuid', 0x3d, {[0x36, 0x79, 0x0, 0x33, 0x61, 0x62, 0x32], 0x2d, [0x77, 0x32, 0x77, 0x34], 0x2d, [0x7f, 0x67, 0x37, 0x77], 0x2d, [0x0, 0x38, 0x32, 0x33], 0x2d, [0x35, 0x37, 0x7f, 0x7b, 0x37, 0x39, 0x77, 0x33]}}}, {@dont_measure='dont_measure'}]}}) ioctl$VIDIOC_ENUMINPUT(r1, 0xc050561a, &(0x7f0000000300)={0x4, "443b36c4364670c73c2ad26e1952769039650793d10fc72d24ce46e327d06e2f", 0x3, 0x100, 0x4, 0x1057ff, 0x0, 0x6}) 06:24:11 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000040)="2e0000002500817ee45ae087185082cf0f24b0eba06ec4004c2339e00586f9835b3f0016914879008cd90080e230", 0x2e}], 0x1}, 0x0) 06:24:11 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) getsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000400), &(0x7f0000000440)=0x8) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, &(0x7f00000019c0)={0x20}, 0x1) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r1, 0x111, 0x5, 0xc3, 0x4) r2 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x1, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r2, 0xc0045516, &(0x7f0000000040)=0x4) arch_prctl$ARCH_GET_CPUID(0x1011) getpgrp(0x0) flock(r0, 0x0) ioctl$BLKRRPART(0xffffffffffffffff, 0x125f, 0x0) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000200)={@mcast2}) fcntl$F_GET_FILE_RW_HINT(r0, 0x40d, &(0x7f00000000c0)) setsockopt$RDS_CONG_MONITOR(r2, 0x114, 0x6, &(0x7f0000000280), 0x4) ioctl$VHOST_SET_LOG_FD(r2, 0x4004af07, 0x0) ioctl$DRM_IOCTL_IRQ_BUSID(r2, 0xc0106403, &(0x7f0000000100)={0x8875, 0x800, 0x8000, 0xc2}) ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000180)) ioctl$VHOST_SET_VRING_CALL(0xffffffffffffffff, 0x4008af21, &(0x7f0000000380)={0x0, r1}) r3 = fcntl$dupfd(r1, 0x0, r2) setsockopt$IP_VS_SO_SET_STOPDAEMON(r3, 0x0, 0x48c, &(0x7f0000000140)={0x3, 'veth0\x00'}, 0x18) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.cpu/syz1\x00', 0x1ff) openat$snapshot(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/snapshot\x00', 0x0, 0x0) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0xf7fffffffffffffd, 0x2012, r2, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000a40)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x20008000}, 0x24044000) unshare(0x40000000) mount$9p_virtio(&(0x7f00000003c0)='em0%$!,cgroup#\x00', &(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='9p\x00', 0x200000, &(0x7f0000000500)={'trans=virtio,', {[{@version_L='version=9p2000.L'}, {@cache_none='cache=none'}], [{@subj_role={'subj_role', 0x3d, '/dev/dsp#\x00'}}, {@permit_directio='permit_directio'}, {@measure='measure'}, {@context={'context', 0x3d, 'system_u'}}, {@obj_user={'obj_user'}}, {@dont_hash='dont_hash'}, {@subj_type={'subj_type', 0x3d, '\\eth0('}}, {@fsuuid={'fsuuid', 0x3d, {[0x36, 0x79, 0x0, 0x33, 0x61, 0x62, 0x32], 0x2d, [0x77, 0x32, 0x77, 0x34], 0x2d, [0x7f, 0x67, 0x37, 0x77], 0x2d, [0x0, 0x38, 0x32, 0x33], 0x2d, [0x35, 0x37, 0x7f, 0x7b, 0x37, 0x39, 0x77, 0x33]}}}, {@dont_measure='dont_measure'}]}}) ioctl$VIDIOC_ENUMINPUT(r1, 0xc050561a, &(0x7f0000000300)={0x4, "443b36c4364670c73c2ad26e1952769039650793d10fc72d24ce46e327d06e2f", 0x3, 0x100, 0x4, 0x1057ff, 0x0, 0x6}) [ 555.695887][T18910] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.5'. [ 555.897446][T18914] IPVS: ftp: loaded support on port[0] = 21 [ 555.945564][T18918] IPVS: ftp: loaded support on port[0] = 21 06:24:12 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = creat(&(0x7f0000000000)='./bus\x00', 0x0) getrlimit(0x0, &(0x7f00000000c0)) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x0, 0x6}) [ 556.995550][T18921] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.5'. [ 557.052708][T18917] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.4'. [ 557.065430][T18923] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.4'. 06:24:12 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) getsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000400), &(0x7f0000000440)=0x8) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, &(0x7f00000019c0)={0x20}, 0x1) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r1, 0x111, 0x5, 0xc3, 0x4) r2 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x1, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r2, 0xc0045516, &(0x7f0000000040)=0x4) arch_prctl$ARCH_GET_CPUID(0x1011) getpgrp(0x0) flock(r0, 0x0) ioctl$BLKRRPART(0xffffffffffffffff, 0x125f, 0x0) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000200)={@mcast2}) fcntl$F_GET_FILE_RW_HINT(r0, 0x40d, &(0x7f00000000c0)) setsockopt$RDS_CONG_MONITOR(r2, 0x114, 0x6, &(0x7f0000000280), 0x4) ioctl$VHOST_SET_LOG_FD(r2, 0x4004af07, 0x0) ioctl$DRM_IOCTL_IRQ_BUSID(r2, 0xc0106403, &(0x7f0000000100)={0x8875, 0x800, 0x8000, 0xc2}) ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000180)) ioctl$VHOST_SET_VRING_CALL(0xffffffffffffffff, 0x4008af21, &(0x7f0000000380)={0x0, r1}) r3 = fcntl$dupfd(r1, 0x0, r2) setsockopt$IP_VS_SO_SET_STOPDAEMON(r3, 0x0, 0x48c, &(0x7f0000000140)={0x3, 'veth0\x00'}, 0x18) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.cpu/syz1\x00', 0x1ff) openat$snapshot(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/snapshot\x00', 0x0, 0x0) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0xf7fffffffffffffd, 0x2012, r2, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000a40)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x20008000}, 0x24044000) unshare(0x40000000) mount$9p_virtio(&(0x7f00000003c0)='em0%$!,cgroup#\x00', &(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='9p\x00', 0x200000, &(0x7f0000000500)={'trans=virtio,', {[{@afid={'afid'}}, {@version_L='version=9p2000.L'}, {@cache_none='cache=none'}], [{@subj_role={'subj_role', 0x3d, '/dev/dsp#\x00'}}, {@permit_directio='permit_directio'}, {@measure='measure'}, {@context={'context', 0x3d, 'system_u'}}, {@obj_user={'obj_user'}}, {@dont_hash='dont_hash'}, {@subj_type={'subj_type', 0x3d, '\\eth0('}}, {@fsuuid={'fsuuid', 0x3d, {[0x36, 0x79, 0x0, 0x33, 0x61, 0x62, 0x32], 0x2d, [0x77, 0x32, 0x77, 0x34], 0x2d, [0x7f, 0x67, 0x37, 0x77], 0x2d, [0x0, 0x38, 0x32, 0x33], 0x2d, [0x35, 0x37, 0x7f, 0x7b, 0x37, 0x39, 0x77, 0x33]}}}, {@dont_measure='dont_measure'}]}}) ioctl$VIDIOC_ENUMINPUT(r1, 0xc050561a, &(0x7f0000000300)={0x4, "443b36c4364670c73c2ad26e1952769039650793d10fc72d24ce46e327d06e2f", 0x3, 0x100, 0x4, 0x1057ff, 0x0, 0x6}) 06:24:12 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000040)="2e0000002500817ee45ae087185082cf0f24b0eba06ec400602339e00586f9835b3f0016914879008cd90080e230", 0x2e}], 0x1}, 0x0) 06:24:12 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000040)="2e0000002500817ee45ae087185082cf0f24b0eba06ec400002339e00586f9835b3f00169148796c8cd90080e230", 0x2e}], 0x1}, 0x0) 06:24:12 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) getsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000400), &(0x7f0000000440)=0x8) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r1, 0x111, 0x5, 0xc3, 0x4) r2 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x1, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r2, 0xc0045516, &(0x7f0000000040)=0x4) arch_prctl$ARCH_GET_CPUID(0x1011) getpgrp(0x0) flock(r0, 0x0) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000200)={@mcast2}) setsockopt$RDS_CONG_MONITOR(r2, 0x114, 0x6, &(0x7f0000000280), 0x4) ioctl$VHOST_SET_LOG_FD(r2, 0x4004af07, 0x0) ioctl$DRM_IOCTL_IRQ_BUSID(r2, 0xc0106403, &(0x7f0000000100)={0x8875, 0x800, 0x8000, 0xc2}) ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000180)) ioctl$VHOST_SET_VRING_CALL(0xffffffffffffffff, 0x4008af21, &(0x7f0000000380)={0x0, r1}) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x3, 'veth0\x00'}, 0x18) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.cpu/syz1\x00', 0x1ff) openat$snapshot(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/snapshot\x00', 0x0, 0x0) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0xf7fffffffffffffd, 0x2012, r2, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000a40)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x20008000}, 0x24044000) unshare(0x40000000) mount$9p_virtio(&(0x7f00000003c0)='em0%$!,cgroup#\x00', &(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='9p\x00', 0x200000, &(0x7f0000000500)={'trans=virtio,', {[{@afid={'afid', 0x3d, 0x6}}, {@version_L='version=9p2000.L'}, {@cache_none='cache=none'}], [{@subj_role={'subj_role', 0x3d, '/dev/dsp#\x00'}}, {@permit_directio='permit_directio'}, {@measure='measure'}, {@context={'context', 0x3d, 'system_u'}}, {@obj_user={'obj_user'}}, {@dont_hash='dont_hash'}, {@subj_type={'subj_type', 0x3d, '\\eth0('}}, {@fsuuid={'fsuuid', 0x3d, {[0x36, 0x79, 0x0, 0x33, 0x61, 0x62, 0x32], 0x2d, [0x77, 0x32, 0x77, 0x34], 0x2d, [0x7f, 0x67, 0x37, 0x77], 0x2d, [0x0, 0x38, 0x32, 0x33], 0x2d, [0x35, 0x37, 0x7f, 0x7b, 0x37, 0x39, 0x77, 0x33]}}}, {@dont_measure='dont_measure'}]}}) ioctl$VIDIOC_ENUMINPUT(r1, 0xc050561a, &(0x7f0000000300)={0x4, "443b36c4364670c73c2ad26e1952769039650793d10fc72d24ce46e327d06e2f", 0x3, 0x100, 0x4, 0x1057ff, 0x0, 0x6}) [ 557.229961][T18939] IPVS: ftp: loaded support on port[0] = 21 06:24:12 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = creat(&(0x7f0000000000)='./bus\x00', 0x0) getrlimit(0x0, &(0x7f00000000c0)) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x0, 0x7}) [ 557.364918][T18934] IPVS: ftp: loaded support on port[0] = 21 [ 557.490604][T18947] IPVS: ftp: loaded support on port[0] = 21 06:24:15 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0) getsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000400), &(0x7f0000000440)=0x8) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, &(0x7f00000019c0)={0x20}, 0x1) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r1, 0x111, 0x5, 0xc3, 0x4) r2 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x1, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r2, 0xc0045516, &(0x7f0000000040)=0x4) arch_prctl$ARCH_GET_CPUID(0x1011) getpgrp(0x0) flock(r0, 0x0) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000200)={@mcast2}) setsockopt$RDS_CONG_MONITOR(r2, 0x114, 0x6, &(0x7f0000000280), 0x4) ioctl$VHOST_SET_LOG_FD(r2, 0x4004af07, 0x0) ioctl$DRM_IOCTL_IRQ_BUSID(r2, 0xc0106403, &(0x7f0000000100)={0x8875, 0x800, 0x8000, 0xc2}) ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000180)) ioctl$VHOST_SET_VRING_CALL(0xffffffffffffffff, 0x4008af21, &(0x7f0000000380)={0x0, r1}) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x3, 'veth0\x00'}, 0x18) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.cpu/syz1\x00', 0x1ff) openat$snapshot(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/snapshot\x00', 0x0, 0x0) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0xf7fffffffffffffd, 0x2012, r2, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000a40)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x20008000}, 0x24044000) unshare(0x40000000) mount$9p_virtio(&(0x7f00000003c0)='em0%$!,cgroup#\x00', &(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='9p\x00', 0x200000, &(0x7f0000000500)={'trans=virtio,', {[{@afid={'afid', 0x3d, 0x6}}, {@version_L='version=9p2000.L'}, {@cache_none='cache=none'}], [{@subj_role={'subj_role', 0x3d, '/dev/dsp#\x00'}}, {@permit_directio='permit_directio'}, {@measure='measure'}, {@context={'context', 0x3d, 'system_u'}}, {@obj_user={'obj_user'}}, {@dont_hash='dont_hash'}, {@subj_type={'subj_type', 0x3d, '\\eth0('}}, {@fsuuid={'fsuuid', 0x3d, {[0x36, 0x79, 0x0, 0x33, 0x61, 0x62, 0x32], 0x2d, [0x77, 0x32, 0x77, 0x34], 0x2d, [0x7f, 0x67, 0x37, 0x77], 0x2d, [0x0, 0x38, 0x32, 0x33], 0x2d, [0x35, 0x37, 0x7f, 0x7b, 0x37, 0x39, 0x77, 0x33]}}}, {@dont_measure='dont_measure'}]}}) ioctl$VIDIOC_ENUMINPUT(r1, 0xc050561a, &(0x7f0000000300)={0x4, "443b36c4364670c73c2ad26e1952769039650793d10fc72d24ce46e327d06e2f", 0x3, 0x100, 0x4, 0x1057ff, 0x0, 0x6}) 06:24:15 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000040)="2e0000002500817ee45ae087185082cf0f24b0eba06ec400682339e00586f9835b3f0016914879008cd90080e230", 0x2e}], 0x1}, 0x0) 06:24:15 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000040)="2e0000002500817ee45ae087185082cf0f24b0eba06ec400002339e00586f9835b3f0016914879748cd90080e230", 0x2e}], 0x1}, 0x0) 06:24:15 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = creat(&(0x7f0000000000)='./bus\x00', 0x0) getrlimit(0x0, &(0x7f00000000c0)) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x0, 0x8}) 06:24:15 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) getsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000400), &(0x7f0000000440)=0x8) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, &(0x7f00000019c0)={0x20}, 0x1) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r1, 0x111, 0x5, 0xc3, 0x4) r2 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x1, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r2, 0xc0045516, &(0x7f0000000040)=0x4) arch_prctl$ARCH_GET_CPUID(0x1011) getpgrp(0x0) flock(r0, 0x0) ioctl$BLKRRPART(0xffffffffffffffff, 0x125f, 0x0) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000200)={@mcast2}) fcntl$F_GET_FILE_RW_HINT(r0, 0x40d, &(0x7f00000000c0)) setsockopt$RDS_CONG_MONITOR(r2, 0x114, 0x6, &(0x7f0000000280), 0x4) ioctl$VHOST_SET_LOG_FD(r2, 0x4004af07, 0x0) ioctl$DRM_IOCTL_IRQ_BUSID(r2, 0xc0106403, &(0x7f0000000100)={0x8875, 0x800, 0x8000, 0xc2}) ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000180)) ioctl$VHOST_SET_VRING_CALL(0xffffffffffffffff, 0x4008af21, &(0x7f0000000380)={0x0, r1}) r3 = fcntl$dupfd(r1, 0x0, r2) setsockopt$IP_VS_SO_SET_STOPDAEMON(r3, 0x0, 0x48c, &(0x7f0000000140)={0x3, 'veth0\x00'}, 0x18) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.cpu/syz1\x00', 0x1ff) openat$snapshot(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/snapshot\x00', 0x0, 0x0) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0xf7fffffffffffffd, 0x2012, r2, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000a40)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x20008000}, 0x24044000) unshare(0x40000000) mount$9p_virtio(&(0x7f00000003c0)='em0%$!,cgroup#\x00', &(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='9p\x00', 0x200000, &(0x7f0000000500)={'trans=virtio,', {[{@afid={'afid'}}, {@version_L='version=9p2000.L'}, {@cache_none='cache=none'}], [{@subj_role={'subj_role', 0x3d, '/dev/dsp#\x00'}}, {@permit_directio='permit_directio'}, {@measure='measure'}, {@context={'context', 0x3d, 'system_u'}}, {@obj_user={'obj_user'}}, {@dont_hash='dont_hash'}, {@subj_type={'subj_type', 0x3d, '\\eth0('}}, {@fsuuid={'fsuuid', 0x3d, {[0x36, 0x79, 0x0, 0x33, 0x61, 0x62, 0x32], 0x2d, [0x77, 0x32, 0x77, 0x34], 0x2d, [0x7f, 0x67, 0x37, 0x77], 0x2d, [0x0, 0x38, 0x32, 0x33], 0x2d, [0x35, 0x37, 0x7f, 0x7b, 0x37, 0x39, 0x77, 0x33]}}}, {@dont_measure='dont_measure'}]}}) ioctl$VIDIOC_ENUMINPUT(r1, 0xc050561a, &(0x7f0000000300)={0x4, "443b36c4364670c73c2ad26e1952769039650793d10fc72d24ce46e327d06e2f", 0x3, 0x100, 0x4, 0x1057ff, 0x0, 0x6}) 06:24:15 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) getsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000400), &(0x7f0000000440)=0x8) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, &(0x7f00000019c0)={0x20}, 0x1) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r1, 0x111, 0x5, 0xc3, 0x4) r2 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x1, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r2, 0xc0045516, &(0x7f0000000040)=0x4) arch_prctl$ARCH_GET_CPUID(0x1011) getpgrp(0x0) flock(r0, 0x0) ioctl$BLKRRPART(0xffffffffffffffff, 0x125f, 0x0) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000200)={@mcast2}) fcntl$F_GET_FILE_RW_HINT(r0, 0x40d, &(0x7f00000000c0)) setsockopt$RDS_CONG_MONITOR(r2, 0x114, 0x6, &(0x7f0000000280), 0x4) ioctl$VHOST_SET_LOG_FD(r2, 0x4004af07, 0x0) ioctl$DRM_IOCTL_IRQ_BUSID(r2, 0xc0106403, &(0x7f0000000100)={0x8875, 0x800, 0x8000, 0xc2}) ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000180)) ioctl$VHOST_SET_VRING_CALL(0xffffffffffffffff, 0x4008af21, &(0x7f0000000380)={0x0, r1}) r3 = fcntl$dupfd(r1, 0x0, r2) setsockopt$IP_VS_SO_SET_STOPDAEMON(r3, 0x0, 0x48c, &(0x7f0000000140)={0x3, 'veth0\x00'}, 0x18) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.cpu/syz1\x00', 0x1ff) openat$snapshot(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/snapshot\x00', 0x0, 0x0) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0xf7fffffffffffffd, 0x2012, r2, 0x0) sendmsg$nl_route_sched(r3, 0x0, 0x24044000) unshare(0x40000000) mount$9p_virtio(&(0x7f00000003c0)='em0%$!,cgroup#\x00', &(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='9p\x00', 0x200000, &(0x7f0000000500)={'trans=virtio,', {[{@afid={'afid', 0x3d, 0x6}}, {@version_L='version=9p2000.L'}, {@cache_none='cache=none'}], [{@subj_role={'subj_role', 0x3d, '/dev/dsp#\x00'}}, {@permit_directio='permit_directio'}, {@measure='measure'}, {@context={'context', 0x3d, 'system_u'}}, {@obj_user={'obj_user'}}, {@dont_hash='dont_hash'}, {@subj_type={'subj_type', 0x3d, '\\eth0('}}, {@fsuuid={'fsuuid', 0x3d, {[0x36, 0x79, 0x0, 0x33, 0x61, 0x62, 0x32], 0x2d, [0x77, 0x32, 0x77, 0x34], 0x2d, [0x7f, 0x67, 0x37, 0x77], 0x2d, [0x0, 0x38, 0x32, 0x33], 0x2d, [0x35, 0x37, 0x7f, 0x7b, 0x37, 0x39, 0x77, 0x33]}}}, {@dont_measure='dont_measure'}]}}) ioctl$VIDIOC_ENUMINPUT(r1, 0xc050561a, &(0x7f0000000300)={0x4, "443b36c4364670c73c2ad26e1952769039650793d10fc72d24ce46e327d06e2f", 0x3, 0x100, 0x4, 0x1057ff, 0x0, 0x6}) [ 559.524190][T18962] __nla_parse: 4 callbacks suppressed [ 559.524201][T18962] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.5'. [ 559.752013][T18969] IPVS: ftp: loaded support on port[0] = 21 [ 559.804219][T18966] IPVS: ftp: loaded support on port[0] = 21 06:24:16 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = creat(&(0x7f0000000000)='./bus\x00', 0x0) getrlimit(0x0, &(0x7f00000000c0)) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x0, 0x9}) [ 561.001527][T18968] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.4'. [ 561.026897][T18975] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.5'. 06:24:16 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) getsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000400), &(0x7f0000000440)=0x8) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, &(0x7f00000019c0)={0x20}, 0x1) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r1, 0x111, 0x5, 0xc3, 0x4) r2 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x1, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r2, 0xc0045516, &(0x7f0000000040)=0x4) arch_prctl$ARCH_GET_CPUID(0x1011) getpgrp(0x0) flock(r0, 0x0) ioctl$BLKRRPART(0xffffffffffffffff, 0x125f, 0x0) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000200)={@mcast2}) fcntl$F_GET_FILE_RW_HINT(r0, 0x40d, &(0x7f00000000c0)) setsockopt$RDS_CONG_MONITOR(r2, 0x114, 0x6, &(0x7f0000000280), 0x4) ioctl$VHOST_SET_LOG_FD(r2, 0x4004af07, 0x0) ioctl$DRM_IOCTL_IRQ_BUSID(r2, 0xc0106403, &(0x7f0000000100)={0x8875, 0x800, 0x8000, 0xc2}) ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000180)) ioctl$VHOST_SET_VRING_CALL(0xffffffffffffffff, 0x4008af21, &(0x7f0000000380)={0x0, r1}) r3 = fcntl$dupfd(r1, 0x0, r2) setsockopt$IP_VS_SO_SET_STOPDAEMON(r3, 0x0, 0x48c, &(0x7f0000000140)={0x3, 'veth0\x00'}, 0x18) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.cpu/syz1\x00', 0x1ff) openat$snapshot(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/snapshot\x00', 0x0, 0x0) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0xf7fffffffffffffd, 0x2012, r2, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000a40)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x20008000}, 0x24044000) unshare(0x40000000) mount$9p_virtio(&(0x7f00000003c0)='em0%$!,cgroup#\x00', &(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='9p\x00', 0x200000, &(0x7f0000000500)={'trans=virtio,', {[{@afid={'afid', 0x3d, 0x6}}, {@version_L='version=9p2000.L'}, {@cache_none='cache=none'}], [{@subj_role={'subj_role', 0x3d, '/dev/dsp#\x00'}}, {@permit_directio='permit_directio'}, {@measure='measure'}, {@context={'context', 0x3d, 'system_u'}}, {@obj_user={'obj_user'}}, {@dont_hash='dont_hash'}, {@subj_type={'subj_type', 0x3d, '\\eth0('}}, {@fsuuid={'fsuuid', 0x3d, {[0x36, 0x79, 0x0, 0x33, 0x61, 0x62, 0x32], 0x2d, [0x77, 0x32, 0x77, 0x34], 0x2d, [0x7f, 0x67, 0x37, 0x77], 0x2d, [0x0, 0x38, 0x32, 0x33], 0x2d, [0x35, 0x37, 0x7f, 0x7b, 0x37, 0x39, 0x77, 0x33]}}}]}}) ioctl$VIDIOC_ENUMINPUT(r1, 0xc050561a, &(0x7f0000000300)={0x4, "443b36c4364670c73c2ad26e1952769039650793d10fc72d24ce46e327d06e2f", 0x3, 0x100, 0x4, 0x1057ff, 0x0, 0x6}) 06:24:16 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) getsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000400), &(0x7f0000000440)=0x8) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, &(0x7f00000019c0)={0x20}, 0x1) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r1, 0x111, 0x5, 0xc3, 0x4) r2 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x1, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r2, 0xc0045516, &(0x7f0000000040)=0x4) arch_prctl$ARCH_GET_CPUID(0x1011) getpgrp(0x0) flock(r0, 0x0) ioctl$BLKRRPART(0xffffffffffffffff, 0x125f, 0x0) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000200)={@mcast2}) fcntl$F_GET_FILE_RW_HINT(r0, 0x40d, &(0x7f00000000c0)) setsockopt$RDS_CONG_MONITOR(r2, 0x114, 0x6, &(0x7f0000000280), 0x4) ioctl$VHOST_SET_LOG_FD(r2, 0x4004af07, 0x0) ioctl$DRM_IOCTL_IRQ_BUSID(r2, 0xc0106403, &(0x7f0000000100)={0x8875, 0x800, 0x8000, 0xc2}) ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000180)) ioctl$VHOST_SET_VRING_CALL(0xffffffffffffffff, 0x4008af21, &(0x7f0000000380)={0x0, r1}) r3 = fcntl$dupfd(r1, 0x0, r2) setsockopt$IP_VS_SO_SET_STOPDAEMON(r3, 0x0, 0x48c, &(0x7f0000000140)={0x3, 'veth0\x00'}, 0x18) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.cpu/syz1\x00', 0x1ff) openat$snapshot(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/snapshot\x00', 0x0, 0x0) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0xf7fffffffffffffd, 0x2012, r2, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000a40)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x20008000}, 0x24044000) unshare(0x40000000) mount$9p_virtio(&(0x7f00000003c0)='em0%$!,cgroup#\x00', &(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='9p\x00', 0x200000, &(0x7f0000000500)={'trans=virtio,', {[{@afid={'afid'}}, {@version_L='version=9p2000.L'}, {@cache_none='cache=none'}], [{@subj_role={'subj_role', 0x3d, '/dev/dsp#\x00'}}, {@permit_directio='permit_directio'}, {@measure='measure'}, {@context={'context', 0x3d, 'system_u'}}, {@obj_user={'obj_user'}}, {@dont_hash='dont_hash'}, {@subj_type={'subj_type', 0x3d, '\\eth0('}}, {@fsuuid={'fsuuid', 0x3d, {[0x36, 0x79, 0x0, 0x33, 0x61, 0x62, 0x32], 0x2d, [0x77, 0x32, 0x77, 0x34], 0x2d, [0x7f, 0x67, 0x37, 0x77], 0x2d, [0x0, 0x38, 0x32, 0x33], 0x2d, [0x35, 0x37, 0x7f, 0x7b, 0x37, 0x39, 0x77, 0x33]}}}, {@dont_measure='dont_measure'}]}}) ioctl$VIDIOC_ENUMINPUT(r1, 0xc050561a, &(0x7f0000000300)={0x4, "443b36c4364670c73c2ad26e1952769039650793d10fc72d24ce46e327d06e2f", 0x3, 0x100, 0x4, 0x1057ff, 0x0, 0x6}) [ 561.083943][T18973] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.4'. 06:24:16 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000040)="2e0000002500817ee45ae087185082cf0f24b0eba06ec400002339e00586f9835b3f00169148797a8cd90080e230", 0x2e}], 0x1}, 0x0) 06:24:16 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000040)="2e0000002500817ee45ae087185082cf0f24b0eba06ec4006c2339e00586f9835b3f0016914879008cd90080e230", 0x2e}], 0x1}, 0x0) [ 561.175046][T18976] IPVS: ftp: loaded support on port[0] = 21 06:24:16 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = creat(&(0x7f0000000000)='./bus\x00', 0x0) getrlimit(0x0, &(0x7f00000000c0)) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x0, 0xa}) [ 561.237005][T18989] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.5'. [ 561.306721][T18996] IPVS: ftp: loaded support on port[0] = 21 [ 561.345316][T18994] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.4'. [ 561.368148][T18997] IPVS: ftp: loaded support on port[0] = 21 [ 561.389015][T18999] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.5'. [ 561.409636][T19001] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.4'. 06:24:17 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0) getsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000400), &(0x7f0000000440)=0x8) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, &(0x7f00000019c0)={0x20}, 0x1) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r1, 0x111, 0x5, 0xc3, 0x4) r2 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x1, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r2, 0xc0045516, &(0x7f0000000040)=0x4) arch_prctl$ARCH_GET_CPUID(0x1011) getpgrp(0x0) flock(r0, 0x0) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000200)={@mcast2}) setsockopt$RDS_CONG_MONITOR(r2, 0x114, 0x6, &(0x7f0000000280), 0x4) ioctl$VHOST_SET_LOG_FD(r2, 0x4004af07, 0x0) ioctl$DRM_IOCTL_IRQ_BUSID(r2, 0xc0106403, &(0x7f0000000100)={0x8875, 0x800, 0x8000, 0xc2}) ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000180)) ioctl$VHOST_SET_VRING_CALL(0xffffffffffffffff, 0x4008af21, &(0x7f0000000380)={0x0, r1}) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x3, 'veth0\x00'}, 0x18) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.cpu/syz1\x00', 0x1ff) openat$snapshot(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/snapshot\x00', 0x0, 0x0) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0xf7fffffffffffffd, 0x2012, r2, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000a40)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x20008000}, 0x24044000) unshare(0x40000000) mount$9p_virtio(&(0x7f00000003c0)='em0%$!,cgroup#\x00', &(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='9p\x00', 0x200000, &(0x7f0000000500)={'trans=virtio,', {[{@afid={'afid', 0x3d, 0x6}}, {@version_L='version=9p2000.L'}, {@cache_none='cache=none'}], [{@subj_role={'subj_role', 0x3d, '/dev/dsp#\x00'}}, {@permit_directio='permit_directio'}, {@measure='measure'}, {@context={'context', 0x3d, 'system_u'}}, {@obj_user={'obj_user'}}, {@dont_hash='dont_hash'}, {@subj_type={'subj_type', 0x3d, '\\eth0('}}, {@fsuuid={'fsuuid', 0x3d, {[0x36, 0x79, 0x0, 0x33, 0x61, 0x62, 0x32], 0x2d, [0x77, 0x32, 0x77, 0x34], 0x2d, [0x7f, 0x67, 0x37, 0x77], 0x2d, [0x0, 0x38, 0x32, 0x33], 0x2d, [0x35, 0x37, 0x7f, 0x7b, 0x37, 0x39, 0x77, 0x33]}}}, {@dont_measure='dont_measure'}]}}) ioctl$VIDIOC_ENUMINPUT(r1, 0xc050561a, &(0x7f0000000300)={0x4, "443b36c4364670c73c2ad26e1952769039650793d10fc72d24ce46e327d06e2f", 0x3, 0x100, 0x4, 0x1057ff, 0x0, 0x6}) 06:24:17 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000040)="2e0000002500817ee45ae087185082cf0f24b0eba06ec400002339e00586f9835b3f0016914879008cd90280e230", 0x2e}], 0x1}, 0x0) 06:24:17 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = creat(&(0x7f0000000000)='./bus\x00', 0x0) getrlimit(0x0, &(0x7f00000000c0)) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x0, 0xb}) 06:24:17 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000040)="2e0000002500817ee45ae087185082cf0f24b0eba06ec400742339e00586f9835b3f0016914879008cd90080e230", 0x2e}], 0x1}, 0x0) 06:24:17 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) getsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000400), &(0x7f0000000440)=0x8) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, &(0x7f00000019c0)={0x20}, 0x1) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r1, 0x111, 0x5, 0xc3, 0x4) r2 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x1, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r2, 0xc0045516, &(0x7f0000000040)=0x4) arch_prctl$ARCH_GET_CPUID(0x1011) getpgrp(0x0) flock(r0, 0x0) ioctl$BLKRRPART(0xffffffffffffffff, 0x125f, 0x0) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000200)={@mcast2}) fcntl$F_GET_FILE_RW_HINT(r0, 0x40d, &(0x7f00000000c0)) setsockopt$RDS_CONG_MONITOR(r2, 0x114, 0x6, &(0x7f0000000280), 0x4) ioctl$VHOST_SET_LOG_FD(r2, 0x4004af07, 0x0) ioctl$DRM_IOCTL_IRQ_BUSID(r2, 0xc0106403, &(0x7f0000000100)={0x8875, 0x800, 0x8000, 0xc2}) ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000180)) ioctl$VHOST_SET_VRING_CALL(0xffffffffffffffff, 0x4008af21, &(0x7f0000000380)={0x0, r1}) r3 = fcntl$dupfd(r1, 0x0, r2) setsockopt$IP_VS_SO_SET_STOPDAEMON(r3, 0x0, 0x48c, &(0x7f0000000140)={0x3, 'veth0\x00'}, 0x18) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.cpu/syz1\x00', 0x1ff) openat$snapshot(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/snapshot\x00', 0x0, 0x0) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0xf7fffffffffffffd, 0x2012, r2, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000a40)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x20008000}, 0x24044000) unshare(0x40000000) mount$9p_virtio(&(0x7f00000003c0)='em0%$!,cgroup#\x00', &(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='9p\x00', 0x200000, &(0x7f0000000500)={'trans=virtio,', {[{@afid={'afid', 0x3d, 0x6}}, {@version_L='version=9p2000.L'}, {@cache_none='cache=none'}], [{@subj_role={'subj_role', 0x3d, '/dev/dsp#\x00'}}, {@permit_directio='permit_directio'}, {@measure='measure'}, {@context={'context', 0x3d, 'system_u'}}, {@obj_user={'obj_user'}}, {@dont_hash='dont_hash'}, {@subj_type={'subj_type', 0x3d, '\\eth0('}}, {@fsuuid={'fsuuid', 0x3d, {[0x36, 0x79, 0x0, 0x33, 0x61, 0x62, 0x32], 0x2d, [0x77, 0x32, 0x77, 0x34], 0x2d, [0x7f, 0x67, 0x37, 0x77], 0x2d, [0x0, 0x38, 0x32, 0x33], 0x2d, [0x35, 0x37, 0x7f, 0x7b, 0x37, 0x39, 0x77, 0x33]}}}, {@dont_measure='dont_measure'}]}}) ioctl$VIDIOC_ENUMINPUT(r1, 0xc050561a, &(0x7f0000000300)={0x4, "443b36c4364670c73c2ad26e1952769039650793d10fc72d24ce46e327d06e2f", 0x3, 0x100, 0x4, 0x1057ff, 0x0, 0x6}) [ 561.675974][T19011] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.5'. [ 561.730689][T19012] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.4'. 06:24:17 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = creat(&(0x7f0000000000)='./bus\x00', 0x0) getrlimit(0x0, &(0x7f00000000c0)) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x0, 0xc}) 06:24:17 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) getsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000400), &(0x7f0000000440)=0x8) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, &(0x7f00000019c0)={0x20}, 0x1) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r1, 0x111, 0x5, 0xc3, 0x4) r2 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x1, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r2, 0xc0045516, &(0x7f0000000040)=0x4) arch_prctl$ARCH_GET_CPUID(0x1011) getpgrp(0x0) flock(r0, 0x0) ioctl$BLKRRPART(0xffffffffffffffff, 0x125f, 0x0) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000200)={@mcast2}) fcntl$F_GET_FILE_RW_HINT(r0, 0x40d, &(0x7f00000000c0)) setsockopt$RDS_CONG_MONITOR(r2, 0x114, 0x6, &(0x7f0000000280), 0x4) ioctl$VHOST_SET_LOG_FD(r2, 0x4004af07, 0x0) ioctl$DRM_IOCTL_IRQ_BUSID(r2, 0xc0106403, &(0x7f0000000100)={0x8875, 0x800, 0x8000, 0xc2}) ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000180)) ioctl$VHOST_SET_VRING_CALL(0xffffffffffffffff, 0x4008af21, &(0x7f0000000380)={0x0, r1}) r3 = fcntl$dupfd(r1, 0x0, r2) setsockopt$IP_VS_SO_SET_STOPDAEMON(r3, 0x0, 0x48c, &(0x7f0000000140)={0x3, 'veth0\x00'}, 0x18) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.cpu/syz1\x00', 0x1ff) openat$snapshot(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/snapshot\x00', 0x0, 0x0) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0xf7fffffffffffffd, 0x2012, r2, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000a40)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x20008000}, 0x24044000) unshare(0x40000000) mount$9p_virtio(&(0x7f00000003c0)='em0%$!,cgroup#\x00', &(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='9p\x00', 0x200000, &(0x7f0000000500)={'trans=virtio,', {[{@afid={'afid', 0x3d, 0x6}}, {@version_L='version=9p2000.L'}, {@cache_none='cache=none'}], [{@subj_role={'subj_role', 0x3d, '/dev/dsp#\x00'}}, {@permit_directio='permit_directio'}, {@measure='measure'}, {@context={'context', 0x3d, 'system_u'}}, {@obj_user={'obj_user'}}, {@dont_hash='dont_hash'}, {@subj_type={'subj_type', 0x3d, '\\eth0('}}, {@fsuuid={'fsuuid', 0x3d, {[0x36, 0x79, 0x0, 0x33, 0x61, 0x62, 0x32], 0x2d, [0x77, 0x32, 0x77, 0x34], 0x2d, [0x7f, 0x67, 0x37, 0x77], 0x2d, [0x0, 0x38, 0x32, 0x33], 0x2d, [0x35, 0x37, 0x7f, 0x7b, 0x37, 0x39, 0x77, 0x33]}}}]}}) ioctl$VIDIOC_ENUMINPUT(r1, 0xc050561a, &(0x7f0000000300)={0x4, "443b36c4364670c73c2ad26e1952769039650793d10fc72d24ce46e327d06e2f", 0x3, 0x100, 0x4, 0x1057ff, 0x0, 0x6}) [ 561.809517][T19021] IPVS: ftp: loaded support on port[0] = 21 06:24:17 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000040)="2e0000002500817ee45ae087185082cf0f24b0eba06ec400002339e00586f9835b3f0016914879008cd90380e230", 0x2e}], 0x1}, 0x0) 06:24:17 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000040)="2e0000002500817ee45ae087185082cf0f24b0eba06ec4007a2339e00586f9835b3f0016914879008cd90080e230", 0x2e}], 0x1}, 0x0) [ 561.890667][T19031] IPVS: ftp: loaded support on port[0] = 21 [ 561.957005][T19035] IPVS: ftp: loaded support on port[0] = 21 06:24:17 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = creat(&(0x7f0000000000)='./bus\x00', 0x0) getrlimit(0x0, &(0x7f00000000c0)) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x0, 0xd}) 06:24:17 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000040)="2e0000002500817ee45ae087185082cf0f24b0eba06ec400006839e00586f9835b3f0016914879008cd90080e230", 0x2e}], 0x1}, 0x0) 06:24:17 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000040)="2e0000002500817ee45ae087185082cf0f24b0eba06ec400002339e00586f9835b3f0016914879008cd90480e230", 0x2e}], 0x1}, 0x0) 06:24:17 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6}, 0x0) getsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000400), &(0x7f0000000440)=0x8) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, &(0x7f00000019c0)={0x20}, 0x1) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r1, 0x111, 0x5, 0xc3, 0x4) r2 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x1, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r2, 0xc0045516, &(0x7f0000000040)=0x4) arch_prctl$ARCH_GET_CPUID(0x1011) getpgrp(0x0) flock(r0, 0x0) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000200)={@mcast2}) setsockopt$RDS_CONG_MONITOR(r2, 0x114, 0x6, &(0x7f0000000280), 0x4) ioctl$VHOST_SET_LOG_FD(r2, 0x4004af07, 0x0) ioctl$DRM_IOCTL_IRQ_BUSID(r2, 0xc0106403, &(0x7f0000000100)={0x8875, 0x800, 0x8000, 0xc2}) ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000180)) ioctl$VHOST_SET_VRING_CALL(0xffffffffffffffff, 0x4008af21, &(0x7f0000000380)={0x0, r1}) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x3, 'veth0\x00'}, 0x18) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.cpu/syz1\x00', 0x1ff) openat$snapshot(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/snapshot\x00', 0x0, 0x0) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0xf7fffffffffffffd, 0x2012, r2, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000a40)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x20008000}, 0x24044000) unshare(0x40000000) mount$9p_virtio(&(0x7f00000003c0)='em0%$!,cgroup#\x00', &(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='9p\x00', 0x200000, &(0x7f0000000500)={'trans=virtio,', {[{@afid={'afid', 0x3d, 0x6}}, {@version_L='version=9p2000.L'}, {@cache_none='cache=none'}], [{@subj_role={'subj_role', 0x3d, '/dev/dsp#\x00'}}, {@permit_directio='permit_directio'}, {@measure='measure'}, {@context={'context', 0x3d, 'system_u'}}, {@obj_user={'obj_user'}}, {@dont_hash='dont_hash'}, {@subj_type={'subj_type', 0x3d, '\\eth0('}}, {@fsuuid={'fsuuid', 0x3d, {[0x36, 0x79, 0x0, 0x33, 0x61, 0x62, 0x32], 0x2d, [0x77, 0x32, 0x77, 0x34], 0x2d, [0x7f, 0x67, 0x37, 0x77], 0x2d, [0x0, 0x38, 0x32, 0x33], 0x2d, [0x35, 0x37, 0x7f, 0x7b, 0x37, 0x39, 0x77, 0x33]}}}, {@dont_measure='dont_measure'}]}}) ioctl$VIDIOC_ENUMINPUT(r1, 0xc050561a, &(0x7f0000000300)={0x4, "443b36c4364670c73c2ad26e1952769039650793d10fc72d24ce46e327d06e2f", 0x3, 0x100, 0x4, 0x1057ff, 0x0, 0x6}) 06:24:17 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000040)="2e0000002500817ee45ae087185082cf0f24b0eba06ec400002339e00586f9835b3f0016914879008cd90580e230", 0x2e}], 0x1}, 0x0) 06:24:18 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = creat(&(0x7f0000000000)='./bus\x00', 0x0) getrlimit(0x0, &(0x7f00000000c0)) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x0, 0xe}) 06:24:18 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) getsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000400), &(0x7f0000000440)=0x8) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, &(0x7f00000019c0)={0x20}, 0x1) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r1, 0x111, 0x5, 0xc3, 0x4) r2 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x1, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r2, 0xc0045516, &(0x7f0000000040)=0x4) arch_prctl$ARCH_GET_CPUID(0x1011) getpgrp(0x0) flock(r0, 0x0) ioctl$BLKRRPART(0xffffffffffffffff, 0x125f, 0x0) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000200)={@mcast2}) fcntl$F_GET_FILE_RW_HINT(r0, 0x40d, &(0x7f00000000c0)) setsockopt$RDS_CONG_MONITOR(r2, 0x114, 0x6, &(0x7f0000000280), 0x4) ioctl$VHOST_SET_LOG_FD(r2, 0x4004af07, 0x0) ioctl$DRM_IOCTL_IRQ_BUSID(r2, 0xc0106403, &(0x7f0000000100)={0x8875, 0x800, 0x8000, 0xc2}) ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000180)) ioctl$VHOST_SET_VRING_CALL(0xffffffffffffffff, 0x4008af21, &(0x7f0000000380)={0x0, r1}) r3 = fcntl$dupfd(r1, 0x0, r2) setsockopt$IP_VS_SO_SET_STOPDAEMON(r3, 0x0, 0x48c, &(0x7f0000000140)={0x3, 'veth0\x00'}, 0x18) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.cpu/syz1\x00', 0x1ff) openat$snapshot(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/snapshot\x00', 0x0, 0x0) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0xf7fffffffffffffd, 0x2012, r2, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000a40)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x20008000}, 0x24044000) unshare(0x40000000) mount$9p_virtio(&(0x7f00000003c0)='em0%$!,cgroup#\x00', &(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='9p\x00', 0x200000, &(0x7f0000000500)={'trans=virtio,', {[{@afid={'afid', 0x3d, 0x6}}, {@version_L='version=9p2000.L'}, {@cache_none='cache=none'}], [{@subj_role={'subj_role', 0x3d, '/dev/dsp#\x00'}}, {@permit_directio='permit_directio'}, {@measure='measure'}, {@context={'context', 0x3d, 'system_u'}}, {@obj_user={'obj_user'}}, {@dont_hash='dont_hash'}, {@subj_type={'subj_type', 0x3d, '\\eth0('}}, {@fsuuid={'fsuuid', 0x3d, {[0x36, 0x79, 0x0, 0x33, 0x61, 0x62, 0x32], 0x2d, [0x77, 0x32, 0x77, 0x34], 0x2d, [0x7f, 0x67, 0x37, 0x77], 0x2d, [0x0, 0x38, 0x32, 0x33], 0x2d, [0x35, 0x37, 0x7f, 0x7b, 0x37, 0x39, 0x77, 0x33]}}}]}}) ioctl$VIDIOC_ENUMINPUT(r1, 0xc050561a, &(0x7f0000000300)={0x4, "443b36c4364670c73c2ad26e1952769039650793d10fc72d24ce46e327d06e2f", 0x3, 0x100, 0x4, 0x1057ff, 0x0, 0x6}) 06:24:18 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0) getsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000400), &(0x7f0000000440)=0x8) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, &(0x7f00000019c0)={0x20}, 0x1) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r1, 0x111, 0x5, 0xc3, 0x4) r2 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x1, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r2, 0xc0045516, &(0x7f0000000040)=0x4) arch_prctl$ARCH_GET_CPUID(0x1011) getpgrp(0x0) flock(r0, 0x0) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000200)={@mcast2}) setsockopt$RDS_CONG_MONITOR(r2, 0x114, 0x6, &(0x7f0000000280), 0x4) ioctl$VHOST_SET_LOG_FD(r2, 0x4004af07, 0x0) ioctl$DRM_IOCTL_IRQ_BUSID(r2, 0xc0106403, &(0x7f0000000100)={0x8875, 0x800, 0x8000, 0xc2}) ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000180)) ioctl$VHOST_SET_VRING_CALL(0xffffffffffffffff, 0x4008af21, &(0x7f0000000380)={0x0, r1}) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x3, 'veth0\x00'}, 0x18) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.cpu/syz1\x00', 0x1ff) openat$snapshot(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/snapshot\x00', 0x0, 0x0) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0xf7fffffffffffffd, 0x2012, r2, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000a40)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x20008000}, 0x24044000) unshare(0x40000000) mount$9p_virtio(&(0x7f00000003c0)='em0%$!,cgroup#\x00', &(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='9p\x00', 0x200000, &(0x7f0000000500)={'trans=virtio,', {[{@afid={'afid', 0x3d, 0x6}}, {@version_L='version=9p2000.L'}, {@cache_none='cache=none'}], [{@subj_role={'subj_role', 0x3d, '/dev/dsp#\x00'}}, {@permit_directio='permit_directio'}, {@measure='measure'}, {@context={'context', 0x3d, 'system_u'}}, {@obj_user={'obj_user'}}, {@dont_hash='dont_hash'}, {@subj_type={'subj_type', 0x3d, '\\eth0('}}, {@fsuuid={'fsuuid', 0x3d, {[0x36, 0x79, 0x0, 0x33, 0x61, 0x62, 0x32], 0x2d, [0x77, 0x32, 0x77, 0x34], 0x2d, [0x7f, 0x67, 0x37, 0x77], 0x2d, [0x0, 0x38, 0x32, 0x33], 0x2d, [0x35, 0x37, 0x7f, 0x7b, 0x37, 0x39, 0x77, 0x33]}}}, {@dont_measure='dont_measure'}]}}) ioctl$VIDIOC_ENUMINPUT(r1, 0xc050561a, &(0x7f0000000300)={0x4, "443b36c4364670c73c2ad26e1952769039650793d10fc72d24ce46e327d06e2f", 0x3, 0x100, 0x4, 0x1057ff, 0x0, 0x6}) 06:24:18 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000040)="2e0000002500817ee45ae087185082cf0f24b0eba06ec400006839e00586f9835b3f0016914879008cd90080e230", 0x2e}], 0x1}, 0x0) 06:24:18 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000040)="2e0000002500817ee45ae087185082cf0f24b0eba06ec400002339e00586f9835b3f0016914879008cd90680e230", 0x2e}], 0x1}, 0x0) 06:24:18 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = creat(&(0x7f0000000000)='./bus\x00', 0x0) getrlimit(0x0, &(0x7f00000000c0)) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x0, 0xf}) [ 562.553188][T19079] IPVS: ftp: loaded support on port[0] = 21 06:24:18 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000040)="2e0000002500817ee45ae087185082cf0f24b0eba06ec40000230ae00586f9835b3f0016914879008cd90080e230", 0x2e}], 0x1}, 0x0) [ 562.625096][T19075] IPVS: ftp: loaded support on port[0] = 21 [ 562.628507][T19088] IPVS: ftp: loaded support on port[0] = 21 06:24:18 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000040)="2e0000002500817ee45ae087185082cf0f24b0eba06ec400002339e00586f9835b3f0016914879008cd90780e230", 0x2e}], 0x1}, 0x0) 06:24:18 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000040)="2e0000002500817ee45ae087185082cf0f24b0eba06ec400002368e00586f9835b3f0016914879008cd90080e230", 0x2e}], 0x1}, 0x0) 06:24:18 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = creat(&(0x7f0000000000)='./bus\x00', 0x0) getrlimit(0x0, &(0x7f00000000c0)) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x0, 0x10}) 06:24:18 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6}, 0x0) getsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, 0x0, &(0x7f0000000440)) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, &(0x7f00000019c0)={0x20}, 0x1) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r1, 0x111, 0x5, 0xc3, 0x4) r2 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x1, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r2, 0xc0045516, &(0x7f0000000040)=0x4) arch_prctl$ARCH_GET_CPUID(0x1011) getpgrp(0x0) flock(r0, 0x0) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000200)={@mcast2}) setsockopt$RDS_CONG_MONITOR(r2, 0x114, 0x6, &(0x7f0000000280), 0x4) ioctl$VHOST_SET_LOG_FD(r2, 0x4004af07, 0x0) ioctl$DRM_IOCTL_IRQ_BUSID(r2, 0xc0106403, &(0x7f0000000100)={0x8875, 0x800, 0x8000, 0xc2}) ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000180)) ioctl$VHOST_SET_VRING_CALL(0xffffffffffffffff, 0x4008af21, &(0x7f0000000380)={0x0, r1}) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x3, 'veth0\x00'}, 0x18) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.cpu/syz1\x00', 0x1ff) openat$snapshot(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/snapshot\x00', 0x0, 0x0) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0xf7fffffffffffffd, 0x2012, r2, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000a40)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x20008000}, 0x24044000) unshare(0x40000000) mount$9p_virtio(&(0x7f00000003c0)='em0%$!,cgroup#\x00', &(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='9p\x00', 0x200000, &(0x7f0000000500)={'trans=virtio,', {[{@afid={'afid', 0x3d, 0x6}}, {@version_L='version=9p2000.L'}, {@cache_none='cache=none'}], [{@subj_role={'subj_role', 0x3d, '/dev/dsp#\x00'}}, {@permit_directio='permit_directio'}, {@measure='measure'}, {@context={'context', 0x3d, 'system_u'}}, {@obj_user={'obj_user'}}, {@dont_hash='dont_hash'}, {@subj_type={'subj_type', 0x3d, '\\eth0('}}, {@fsuuid={'fsuuid', 0x3d, {[0x36, 0x79, 0x0, 0x33, 0x61, 0x62, 0x32], 0x2d, [0x77, 0x32, 0x77, 0x34], 0x2d, [0x7f, 0x67, 0x37, 0x77], 0x2d, [0x0, 0x38, 0x32, 0x33], 0x2d, [0x35, 0x37, 0x7f, 0x7b, 0x37, 0x39, 0x77, 0x33]}}}, {@dont_measure='dont_measure'}]}}) ioctl$VIDIOC_ENUMINPUT(r1, 0xc050561a, &(0x7f0000000300)={0x4, "443b36c4364670c73c2ad26e1952769039650793d10fc72d24ce46e327d06e2f", 0x3, 0x100, 0x4, 0x1057ff, 0x0, 0x6}) 06:24:18 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000040)="2e0000002500817ee45ae087185082cf0f24b0eba06ec400002339e00586f9835b3f0016914879008cd90880e230", 0x2e}], 0x1}, 0x0) 06:24:18 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000040)="2e0000002500817ee45ae087185082cf0f24b0eba06ec400002339e00486f9835b3f0016914879008cd90080e230", 0x2e}], 0x1}, 0x0) 06:24:18 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = creat(&(0x7f0000000000)='./bus\x00', 0x0) getrlimit(0x0, &(0x7f00000000c0)) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x0, 0x12}) 06:24:18 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) getsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000400), &(0x7f0000000440)=0x8) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, &(0x7f00000019c0)={0x20}, 0x1) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r1, 0x111, 0x5, 0xc3, 0x4) r2 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x1, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r2, 0xc0045516, &(0x7f0000000040)=0x4) arch_prctl$ARCH_GET_CPUID(0x1011) getpgrp(0x0) flock(r0, 0x0) ioctl$BLKRRPART(0xffffffffffffffff, 0x125f, 0x0) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000200)={@mcast2}) fcntl$F_GET_FILE_RW_HINT(r0, 0x40d, &(0x7f00000000c0)) setsockopt$RDS_CONG_MONITOR(r2, 0x114, 0x6, &(0x7f0000000280), 0x4) ioctl$VHOST_SET_LOG_FD(r2, 0x4004af07, 0x0) ioctl$DRM_IOCTL_IRQ_BUSID(r2, 0xc0106403, &(0x7f0000000100)={0x8875, 0x800, 0x8000, 0xc2}) ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000180)) ioctl$VHOST_SET_VRING_CALL(0xffffffffffffffff, 0x4008af21, &(0x7f0000000380)={0x0, r1}) r3 = fcntl$dupfd(r1, 0x0, r2) setsockopt$IP_VS_SO_SET_STOPDAEMON(r3, 0x0, 0x48c, &(0x7f0000000140)={0x3, 'veth0\x00'}, 0x18) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.cpu/syz1\x00', 0x1ff) openat$snapshot(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/snapshot\x00', 0x0, 0x0) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0xf7fffffffffffffd, 0x2012, r2, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000a40)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x20008000}, 0x24044000) unshare(0x40000000) mount$9p_virtio(&(0x7f00000003c0)='em0%$!,cgroup#\x00', &(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='9p\x00', 0x200000, &(0x7f0000000500)={'trans=virtio,', {[{@afid={'afid', 0x3d, 0x6}}, {@version_L='version=9p2000.L'}, {@cache_none='cache=none'}], [{@subj_role={'subj_role', 0x3d, '/dev/dsp#\x00'}}, {@permit_directio='permit_directio'}, {@measure='measure'}, {@context={'context', 0x3d, 'system_u'}}, {@obj_user={'obj_user'}}, {@dont_hash='dont_hash'}, {@subj_type={'subj_type', 0x3d, '\\eth0('}}, {@dont_measure='dont_measure'}]}}) ioctl$VIDIOC_ENUMINPUT(r1, 0xc050561a, &(0x7f0000000300)={0x4, "443b36c4364670c73c2ad26e1952769039650793d10fc72d24ce46e327d06e2f", 0x3, 0x100, 0x4, 0x1057ff, 0x0, 0x6}) 06:24:18 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0) getsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000400), &(0x7f0000000440)=0x8) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, &(0x7f00000019c0)={0x20}, 0x1) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r1, 0x111, 0x5, 0xc3, 0x4) r2 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x1, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r2, 0xc0045516, &(0x7f0000000040)=0x4) arch_prctl$ARCH_GET_CPUID(0x1011) getpgrp(0x0) flock(r0, 0x0) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000200)={@mcast2}) setsockopt$RDS_CONG_MONITOR(r2, 0x114, 0x6, &(0x7f0000000280), 0x4) ioctl$VHOST_SET_LOG_FD(r2, 0x4004af07, 0x0) ioctl$DRM_IOCTL_IRQ_BUSID(r2, 0xc0106403, &(0x7f0000000100)={0x8875, 0x800, 0x8000, 0xc2}) ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000180)) ioctl$VHOST_SET_VRING_CALL(0xffffffffffffffff, 0x4008af21, &(0x7f0000000380)={0x0, r1}) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x3, 'veth0\x00'}, 0x18) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.cpu/syz1\x00', 0x1ff) openat$snapshot(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/snapshot\x00', 0x0, 0x0) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0xf7fffffffffffffd, 0x2012, r2, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000a40)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x20008000}, 0x24044000) unshare(0x40000000) mount$9p_virtio(&(0x7f00000003c0)='em0%$!,cgroup#\x00', &(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='9p\x00', 0x200000, &(0x7f0000000500)={'trans=virtio,', {[{@afid={'afid', 0x3d, 0x6}}, {@version_L='version=9p2000.L'}, {@cache_none='cache=none'}], [{@subj_role={'subj_role', 0x3d, '/dev/dsp#\x00'}}, {@permit_directio='permit_directio'}, {@measure='measure'}, {@context={'context', 0x3d, 'system_u'}}, {@obj_user={'obj_user'}}, {@dont_hash='dont_hash'}, {@subj_type={'subj_type', 0x3d, '\\eth0('}}, {@fsuuid={'fsuuid', 0x3d, {[0x36, 0x79, 0x0, 0x33, 0x61, 0x62, 0x32], 0x2d, [0x77, 0x32, 0x77, 0x34], 0x2d, [0x7f, 0x67, 0x37, 0x77], 0x2d, [0x0, 0x38, 0x32, 0x33], 0x2d, [0x35, 0x37, 0x7f, 0x7b, 0x37, 0x39, 0x77, 0x33]}}}, {@dont_measure='dont_measure'}]}}) ioctl$VIDIOC_ENUMINPUT(r1, 0xc050561a, &(0x7f0000000300)={0x4, "443b36c4364670c73c2ad26e1952769039650793d10fc72d24ce46e327d06e2f", 0x3, 0x100, 0x4, 0x1057ff, 0x0, 0x6}) 06:24:18 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000040)="2e0000002500817ee45ae087185082cf0f24b0eba06ec400002339e00586f9835b3f0016914879008cd90a80e230", 0x2e}], 0x1}, 0x0) [ 563.344278][T19127] IPVS: ftp: loaded support on port[0] = 21 06:24:19 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000040)="2e0000002500817ee45ae087185082cf0f24b0eba06ec400002339e00986f9835b3f0016914879008cd90080e230", 0x2e}], 0x1}, 0x0) 06:24:19 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = creat(&(0x7f0000000000)='./bus\x00', 0x0) getrlimit(0x0, &(0x7f00000000c0)) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x0, 0x21}) 06:24:19 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000040)="2e0000002500817ee45ae087185082cf0f24b0eba06ec400002339e00586f9835b3f0016914879008cd90e80e230", 0x2e}], 0x1}, 0x0) 06:24:19 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000040)="2e0000002500817ee45ae087185082cf0f24b0eba06ec400002339e00f86f9835b3f0016914879008cd90080e230", 0x2e}], 0x1}, 0x0) 06:24:19 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000040)="2e0000002500817ee45ae087185082cf0f24b0eba06ec400002339e00586f9835b3f0016914879008cd91080e230", 0x2e}], 0x1}, 0x0) [ 564.005907][T19122] IPVS: ftp: loaded support on port[0] = 21 [ 564.028475][T19126] IPVS: ftp: loaded support on port[0] = 21 06:24:19 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6}, 0x0) getsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, 0x0, &(0x7f0000000440)) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, &(0x7f00000019c0)={0x20}, 0x1) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r1, 0x111, 0x5, 0xc3, 0x4) r2 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x1, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r2, 0xc0045516, &(0x7f0000000040)=0x4) arch_prctl$ARCH_GET_CPUID(0x1011) getpgrp(0x0) flock(r0, 0x0) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000200)={@mcast2}) setsockopt$RDS_CONG_MONITOR(r2, 0x114, 0x6, &(0x7f0000000280), 0x4) ioctl$VHOST_SET_LOG_FD(r2, 0x4004af07, 0x0) ioctl$DRM_IOCTL_IRQ_BUSID(r2, 0xc0106403, &(0x7f0000000100)={0x8875, 0x800, 0x8000, 0xc2}) ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000180)) ioctl$VHOST_SET_VRING_CALL(0xffffffffffffffff, 0x4008af21, &(0x7f0000000380)={0x0, r1}) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x3, 'veth0\x00'}, 0x18) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.cpu/syz1\x00', 0x1ff) openat$snapshot(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/snapshot\x00', 0x0, 0x0) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0xf7fffffffffffffd, 0x2012, r2, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000a40)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x20008000}, 0x24044000) unshare(0x40000000) mount$9p_virtio(&(0x7f00000003c0)='em0%$!,cgroup#\x00', &(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='9p\x00', 0x200000, &(0x7f0000000500)={'trans=virtio,', {[{@afid={'afid', 0x3d, 0x6}}, {@version_L='version=9p2000.L'}, {@cache_none='cache=none'}], [{@subj_role={'subj_role', 0x3d, '/dev/dsp#\x00'}}, {@permit_directio='permit_directio'}, {@measure='measure'}, {@context={'context', 0x3d, 'system_u'}}, {@obj_user={'obj_user'}}, {@dont_hash='dont_hash'}, {@subj_type={'subj_type', 0x3d, '\\eth0('}}, {@fsuuid={'fsuuid', 0x3d, {[0x36, 0x79, 0x0, 0x33, 0x61, 0x62, 0x32], 0x2d, [0x77, 0x32, 0x77, 0x34], 0x2d, [0x7f, 0x67, 0x37, 0x77], 0x2d, [0x0, 0x38, 0x32, 0x33], 0x2d, [0x35, 0x37, 0x7f, 0x7b, 0x37, 0x39, 0x77, 0x33]}}}, {@dont_measure='dont_measure'}]}}) ioctl$VIDIOC_ENUMINPUT(r1, 0xc050561a, &(0x7f0000000300)={0x4, "443b36c4364670c73c2ad26e1952769039650793d10fc72d24ce46e327d06e2f", 0x3, 0x100, 0x4, 0x1057ff, 0x0, 0x6}) 06:24:19 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000040)="2e0000002500817ee45ae087185082cf0f24b0eba06ec400002339e01086f9835b3f0016914879008cd90080e230", 0x2e}], 0x1}, 0x0) 06:24:19 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) getsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000400), &(0x7f0000000440)=0x8) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, &(0x7f00000019c0)={0x20}, 0x1) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r1, 0x111, 0x5, 0xc3, 0x4) r2 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x1, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r2, 0xc0045516, &(0x7f0000000040)=0x4) arch_prctl$ARCH_GET_CPUID(0x1011) getpgrp(0x0) flock(r0, 0x0) ioctl$BLKRRPART(0xffffffffffffffff, 0x125f, 0x0) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000200)={@mcast2}) fcntl$F_GET_FILE_RW_HINT(r0, 0x40d, &(0x7f00000000c0)) setsockopt$RDS_CONG_MONITOR(r2, 0x114, 0x6, &(0x7f0000000280), 0x4) ioctl$VHOST_SET_LOG_FD(r2, 0x4004af07, 0x0) ioctl$DRM_IOCTL_IRQ_BUSID(r2, 0xc0106403, &(0x7f0000000100)={0x8875, 0x800, 0x8000, 0xc2}) ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000180)) ioctl$VHOST_SET_VRING_CALL(0xffffffffffffffff, 0x4008af21, &(0x7f0000000380)={0x0, r1}) r3 = fcntl$dupfd(r1, 0x0, r2) setsockopt$IP_VS_SO_SET_STOPDAEMON(r3, 0x0, 0x48c, &(0x7f0000000140)={0x3, 'veth0\x00'}, 0x18) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.cpu/syz1\x00', 0x1ff) openat$snapshot(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/snapshot\x00', 0x0, 0x0) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0xf7fffffffffffffd, 0x2012, r2, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000a40)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x20008000}, 0x24044000) unshare(0x40000000) mount$9p_virtio(&(0x7f00000003c0)='em0%$!,cgroup#\x00', &(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='9p\x00', 0x200000, &(0x7f0000000500)={'trans=virtio,', {[{@afid={'afid', 0x3d, 0x6}}, {@version_L='version=9p2000.L'}, {@cache_none='cache=none'}], [{@subj_role={'subj_role', 0x3d, '/dev/dsp#\x00'}}, {@permit_directio='permit_directio'}, {@measure='measure'}, {@context={'context', 0x3d, 'system_u'}}, {@obj_user={'obj_user'}}, {@dont_hash='dont_hash'}, {@subj_type={'subj_type', 0x3d, '\\eth0('}}, {@dont_measure='dont_measure'}]}}) ioctl$VIDIOC_ENUMINPUT(r1, 0xc050561a, &(0x7f0000000300)={0x4, "443b36c4364670c73c2ad26e1952769039650793d10fc72d24ce46e327d06e2f", 0x3, 0x100, 0x4, 0x1057ff, 0x0, 0x6}) 06:24:19 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = creat(&(0x7f0000000000)='./bus\x00', 0x0) getrlimit(0x0, &(0x7f00000000c0)) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x0, 0x22}) 06:24:19 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000040)="2e0000002500817ee45ae087185082cf0f24b0eba06ec400002339e00586f9835b3f0016914879008cd94880e230", 0x2e}], 0x1}, 0x0) [ 564.406371][T19166] IPVS: ftp: loaded support on port[0] = 21 [ 564.892724][T19170] IPVS: ftp: loaded support on port[0] = 21 06:24:21 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0) getsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000400), &(0x7f0000000440)=0x8) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, &(0x7f00000019c0)={0x20}, 0x1) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r1, 0x111, 0x5, 0xc3, 0x4) r2 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x1, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r2, 0xc0045516, &(0x7f0000000040)=0x4) arch_prctl$ARCH_GET_CPUID(0x1011) getpgrp(0x0) flock(r0, 0x0) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000200)={@mcast2}) setsockopt$RDS_CONG_MONITOR(r2, 0x114, 0x6, &(0x7f0000000280), 0x4) ioctl$VHOST_SET_LOG_FD(r2, 0x4004af07, 0x0) ioctl$DRM_IOCTL_IRQ_BUSID(r2, 0xc0106403, &(0x7f0000000100)={0x8875, 0x800, 0x8000, 0xc2}) ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000180)) ioctl$VHOST_SET_VRING_CALL(0xffffffffffffffff, 0x4008af21, &(0x7f0000000380)={0x0, r1}) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x3, 'veth0\x00'}, 0x18) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.cpu/syz1\x00', 0x1ff) openat$snapshot(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/snapshot\x00', 0x0, 0x0) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0xf7fffffffffffffd, 0x2012, r2, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000a40)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x20008000}, 0x24044000) unshare(0x40000000) mount$9p_virtio(&(0x7f00000003c0)='em0%$!,cgroup#\x00', &(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='9p\x00', 0x200000, &(0x7f0000000500)={'trans=virtio,', {[{@afid={'afid', 0x3d, 0x6}}, {@version_L='version=9p2000.L'}, {@cache_none='cache=none'}], [{@subj_role={'subj_role', 0x3d, '/dev/dsp#\x00'}}, {@permit_directio='permit_directio'}, {@measure='measure'}, {@context={'context', 0x3d, 'system_u'}}, {@obj_user={'obj_user'}}, {@dont_hash='dont_hash'}, {@subj_type={'subj_type', 0x3d, '\\eth0('}}, {@fsuuid={'fsuuid', 0x3d, {[0x36, 0x79, 0x0, 0x33, 0x61, 0x62, 0x32], 0x2d, [0x77, 0x32, 0x77, 0x34], 0x2d, [0x7f, 0x67, 0x37, 0x77], 0x2d, [0x0, 0x38, 0x32, 0x33], 0x2d, [0x35, 0x37, 0x7f, 0x7b, 0x37, 0x39, 0x77, 0x33]}}}, {@dont_measure='dont_measure'}]}}) ioctl$VIDIOC_ENUMINPUT(r1, 0xc050561a, &(0x7f0000000300)={0x4, "443b36c4364670c73c2ad26e1952769039650793d10fc72d24ce46e327d06e2f", 0x3, 0x100, 0x4, 0x1057ff, 0x0, 0x6}) 06:24:21 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = creat(&(0x7f0000000000)='./bus\x00', 0x0) getrlimit(0x0, &(0x7f00000000c0)) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x0, 0x87}) 06:24:21 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000040)="2e0000002500817ee45ae087185082cf0f24b0eba06ec400002339e00586f9835b3f0016914879008cd94c80e230", 0x2e}], 0x1}, 0x0) 06:24:21 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000040)="2e0000002500817ee45ae087185082cf0f24b0eba06ec400002339e06886f9835b3f0016914879008cd90080e230", 0x2e}], 0x1}, 0x0) 06:24:21 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) getsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000400), &(0x7f0000000440)=0x8) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, &(0x7f00000019c0)={0x20}, 0x1) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r1, 0x111, 0x5, 0xc3, 0x4) r2 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x1, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r2, 0xc0045516, &(0x7f0000000040)=0x4) arch_prctl$ARCH_GET_CPUID(0x1011) getpgrp(0x0) flock(r0, 0x0) ioctl$BLKRRPART(0xffffffffffffffff, 0x125f, 0x0) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000200)={@mcast2}) fcntl$F_GET_FILE_RW_HINT(r0, 0x40d, &(0x7f00000000c0)) setsockopt$RDS_CONG_MONITOR(r2, 0x114, 0x6, &(0x7f0000000280), 0x4) ioctl$VHOST_SET_LOG_FD(r2, 0x4004af07, 0x0) ioctl$DRM_IOCTL_IRQ_BUSID(r2, 0xc0106403, &(0x7f0000000100)={0x8875, 0x800, 0x8000, 0xc2}) ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000180)) ioctl$VHOST_SET_VRING_CALL(0xffffffffffffffff, 0x4008af21, &(0x7f0000000380)={0x0, r1}) r3 = fcntl$dupfd(r1, 0x0, r2) setsockopt$IP_VS_SO_SET_STOPDAEMON(r3, 0x0, 0x48c, &(0x7f0000000140)={0x3, 'veth0\x00'}, 0x18) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.cpu/syz1\x00', 0x1ff) openat$snapshot(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/snapshot\x00', 0x0, 0x0) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0xf7fffffffffffffd, 0x2012, r2, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000a40)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x20008000}, 0x24044000) unshare(0x40000000) mount$9p_virtio(&(0x7f00000003c0)='em0%$!,cgroup#\x00', &(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='9p\x00', 0x200000, &(0x7f0000000500)={'trans=virtio,', {[{@afid={'afid', 0x3d, 0x6}}, {@version_L='version=9p2000.L'}, {@cache_none='cache=none'}], [{@subj_role={'subj_role', 0x3d, '/dev/dsp#\x00'}}, {@permit_directio='permit_directio'}, {@measure='measure'}, {@context={'context', 0x3d, 'system_u'}}, {@obj_user={'obj_user'}}, {@dont_hash='dont_hash'}, {@subj_type={'subj_type', 0x3d, '\\eth0('}}, {@dont_measure='dont_measure'}]}}) ioctl$VIDIOC_ENUMINPUT(r1, 0xc050561a, &(0x7f0000000300)={0x4, "443b36c4364670c73c2ad26e1952769039650793d10fc72d24ce46e327d06e2f", 0x3, 0x100, 0x4, 0x1057ff, 0x0, 0x6}) 06:24:21 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6}, 0x0) getsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, 0x0, &(0x7f0000000440)) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, &(0x7f00000019c0)={0x20}, 0x1) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r1, 0x111, 0x5, 0xc3, 0x4) r2 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x1, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r2, 0xc0045516, &(0x7f0000000040)=0x4) arch_prctl$ARCH_GET_CPUID(0x1011) getpgrp(0x0) flock(r0, 0x0) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000200)={@mcast2}) setsockopt$RDS_CONG_MONITOR(r2, 0x114, 0x6, &(0x7f0000000280), 0x4) ioctl$VHOST_SET_LOG_FD(r2, 0x4004af07, 0x0) ioctl$DRM_IOCTL_IRQ_BUSID(r2, 0xc0106403, &(0x7f0000000100)={0x8875, 0x800, 0x8000, 0xc2}) ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000180)) ioctl$VHOST_SET_VRING_CALL(0xffffffffffffffff, 0x4008af21, &(0x7f0000000380)={0x0, r1}) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x3, 'veth0\x00'}, 0x18) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.cpu/syz1\x00', 0x1ff) openat$snapshot(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/snapshot\x00', 0x0, 0x0) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0xf7fffffffffffffd, 0x2012, r2, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000a40)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x20008000}, 0x24044000) unshare(0x40000000) mount$9p_virtio(&(0x7f00000003c0)='em0%$!,cgroup#\x00', &(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='9p\x00', 0x200000, &(0x7f0000000500)={'trans=virtio,', {[{@afid={'afid', 0x3d, 0x6}}, {@version_L='version=9p2000.L'}, {@cache_none='cache=none'}], [{@subj_role={'subj_role', 0x3d, '/dev/dsp#\x00'}}, {@permit_directio='permit_directio'}, {@measure='measure'}, {@context={'context', 0x3d, 'system_u'}}, {@obj_user={'obj_user'}}, {@dont_hash='dont_hash'}, {@subj_type={'subj_type', 0x3d, '\\eth0('}}, {@fsuuid={'fsuuid', 0x3d, {[0x36, 0x79, 0x0, 0x33, 0x61, 0x62, 0x32], 0x2d, [0x77, 0x32, 0x77, 0x34], 0x2d, [0x7f, 0x67, 0x37, 0x77], 0x2d, [0x0, 0x38, 0x32, 0x33], 0x2d, [0x35, 0x37, 0x7f, 0x7b, 0x37, 0x39, 0x77, 0x33]}}}, {@dont_measure='dont_measure'}]}}) ioctl$VIDIOC_ENUMINPUT(r1, 0xc050561a, &(0x7f0000000300)={0x4, "443b36c4364670c73c2ad26e1952769039650793d10fc72d24ce46e327d06e2f", 0x3, 0x100, 0x4, 0x1057ff, 0x0, 0x6}) [ 566.292114][T19185] __nla_parse: 38 callbacks suppressed [ 566.292125][T19185] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.5'. [ 566.328169][T19181] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.4'. [ 566.346154][T19189] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.5'. [ 566.369497][T19191] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.4'. [ 566.438245][T19180] IPVS: ftp: loaded support on port[0] = 21 06:24:22 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000040)="2e0000002500817ee45ae087185082cf0f24b0eba06ec400002339e00586f9835b3f0016914879008cd96080e230", 0x2e}], 0x1}, 0x0) 06:24:22 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000040)="2e0000002500817ee45ae087185082cf0f24b0eba06ec400002339e00586f9830a3f0016914879008cd90080e230", 0x2e}], 0x1}, 0x0) [ 566.623915][T19199] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.5'. [ 566.630097][T19192] IPVS: ftp: loaded support on port[0] = 21 06:24:22 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000040)="2e0000002500817ee45ae087185082cf0f24b0eba06ec400002339e00586f9835b3f0016914879008cd96880e230", 0x2e}], 0x1}, 0x0) [ 566.729555][T19200] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.5'. [ 566.782270][T19203] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.4'. [ 566.815835][T19206] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.4'. 06:24:22 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000040)="2e0000002500817ee45ae087185082cf0f24b0eba06ec400002339e00586f983253f0016914879008cd90080e230", 0x2e}], 0x1}, 0x0) [ 566.846001][T19205] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.5'. [ 566.866114][T19186] IPVS: ftp: loaded support on port[0] = 21 [ 566.878680][T19208] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.5'. 06:24:22 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000040)="2e0000002500817ee45ae087185082cf0f24b0eba06ec400002339e00586f9835b3f0016914879008cd96c80e230", 0x2e}], 0x1}, 0x0) 06:24:22 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000040)="2e0000002500817ee45ae087185082cf0f24b0eba06ec400002339e00586f983683f0016914879008cd90080e230", 0x2e}], 0x1}, 0x0) 06:24:26 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000040)="2e0000002500817ee45ae087185082cf0f24b0eba06ec400002339e00586f9835b250016914879008cd90080e230", 0x2e}], 0x1}, 0x0) 06:24:26 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000040)="2e0000002500817ee45ae087185082cf0f24b0eba06ec400002339e00586f9835b3f0016914879008cd97480e230", 0x2e}], 0x1}, 0x0) 06:24:26 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = creat(&(0x7f0000000000)='./bus\x00', 0x0) getrlimit(0x0, &(0x7f00000000c0)) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x0, 0xa3}) 06:24:26 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) getsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000400), &(0x7f0000000440)=0x8) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, &(0x7f00000019c0)={0x20}, 0x1) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r1, 0x111, 0x5, 0xc3, 0x4) r2 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x1, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r2, 0xc0045516, &(0x7f0000000040)=0x4) arch_prctl$ARCH_GET_CPUID(0x1011) getpgrp(0x0) flock(r0, 0x0) ioctl$BLKRRPART(0xffffffffffffffff, 0x125f, 0x0) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000200)={@mcast2}) fcntl$F_GET_FILE_RW_HINT(r0, 0x40d, &(0x7f00000000c0)) setsockopt$RDS_CONG_MONITOR(r2, 0x114, 0x6, &(0x7f0000000280), 0x4) ioctl$VHOST_SET_LOG_FD(r2, 0x4004af07, 0x0) ioctl$DRM_IOCTL_IRQ_BUSID(r2, 0xc0106403, &(0x7f0000000100)={0x8875, 0x800, 0x8000, 0xc2}) ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000180)) ioctl$VHOST_SET_VRING_CALL(0xffffffffffffffff, 0x4008af21, &(0x7f0000000380)={0x0, r1}) r3 = fcntl$dupfd(r1, 0x0, r2) setsockopt$IP_VS_SO_SET_STOPDAEMON(r3, 0x0, 0x48c, &(0x7f0000000140)={0x3, 'veth0\x00'}, 0x18) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.cpu/syz1\x00', 0x1ff) openat$snapshot(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/snapshot\x00', 0x0, 0x0) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0xf7fffffffffffffd, 0x2012, r2, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000a40)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x20008000}, 0x24044000) unshare(0x40000000) mount$9p_virtio(&(0x7f00000003c0)='em0%$!,cgroup#\x00', &(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='9p\x00', 0x200000, &(0x7f0000000500)={'trans=virtio,', {[{@afid={'afid', 0x3d, 0x6}}, {@version_L='version=9p2000.L'}, {@cache_none='cache=none'}], [{@subj_role={'subj_role', 0x3d, '/dev/dsp#\x00'}}, {@permit_directio='permit_directio'}, {@measure='measure'}, {@context={'context', 0x3d, 'system_u'}}, {@obj_user={'obj_user'}}, {@dont_hash='dont_hash'}, {@subj_type={'subj_type', 0x3d, '\\eth0('}}, {@fsuuid={'fsuuid', 0x3d, {[0x36, 0x79, 0x0, 0x33, 0x61, 0x62], 0x2d, [0x77, 0x32, 0x77, 0x34], 0x2d, [0x7f, 0x67, 0x37, 0x77], 0x2d, [0x0, 0x38, 0x32, 0x33], 0x2d, [0x35, 0x37, 0x7f, 0x7b, 0x37, 0x39, 0x77, 0x33]}}}, {@dont_measure='dont_measure'}]}}) ioctl$VIDIOC_ENUMINPUT(r1, 0xc050561a, &(0x7f0000000300)={0x4, "443b36c4364670c73c2ad26e1952769039650793d10fc72d24ce46e327d06e2f", 0x3, 0x100, 0x4, 0x1057ff, 0x0, 0x6}) 06:24:26 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6}, 0x0) getsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000400), 0x0) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, &(0x7f00000019c0)={0x20}, 0x1) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r1, 0x111, 0x5, 0xc3, 0x4) r2 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x1, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r2, 0xc0045516, &(0x7f0000000040)=0x4) arch_prctl$ARCH_GET_CPUID(0x1011) getpgrp(0x0) flock(r0, 0x0) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000200)={@mcast2}) setsockopt$RDS_CONG_MONITOR(r2, 0x114, 0x6, &(0x7f0000000280), 0x4) ioctl$VHOST_SET_LOG_FD(r2, 0x4004af07, 0x0) ioctl$DRM_IOCTL_IRQ_BUSID(r2, 0xc0106403, &(0x7f0000000100)={0x8875, 0x800, 0x8000, 0xc2}) ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000180)) ioctl$VHOST_SET_VRING_CALL(0xffffffffffffffff, 0x4008af21, &(0x7f0000000380)={0x0, r1}) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x3, 'veth0\x00'}, 0x18) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.cpu/syz1\x00', 0x1ff) openat$snapshot(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/snapshot\x00', 0x0, 0x0) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0xf7fffffffffffffd, 0x2012, r2, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000a40)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x20008000}, 0x24044000) unshare(0x40000000) mount$9p_virtio(&(0x7f00000003c0)='em0%$!,cgroup#\x00', &(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='9p\x00', 0x200000, &(0x7f0000000500)={'trans=virtio,', {[{@afid={'afid', 0x3d, 0x6}}, {@version_L='version=9p2000.L'}, {@cache_none='cache=none'}], [{@subj_role={'subj_role', 0x3d, '/dev/dsp#\x00'}}, {@permit_directio='permit_directio'}, {@measure='measure'}, {@context={'context', 0x3d, 'system_u'}}, {@obj_user={'obj_user'}}, {@dont_hash='dont_hash'}, {@subj_type={'subj_type', 0x3d, '\\eth0('}}, {@fsuuid={'fsuuid', 0x3d, {[0x36, 0x79, 0x0, 0x33, 0x61, 0x62, 0x32], 0x2d, [0x77, 0x32, 0x77, 0x34], 0x2d, [0x7f, 0x67, 0x37, 0x77], 0x2d, [0x0, 0x38, 0x32, 0x33], 0x2d, [0x35, 0x37, 0x7f, 0x7b, 0x37, 0x39, 0x77, 0x33]}}}, {@dont_measure='dont_measure'}]}}) ioctl$VIDIOC_ENUMINPUT(r1, 0xc050561a, &(0x7f0000000300)={0x4, "443b36c4364670c73c2ad26e1952769039650793d10fc72d24ce46e327d06e2f", 0x3, 0x100, 0x4, 0x1057ff, 0x0, 0x6}) 06:24:26 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) getsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000400), &(0x7f0000000440)=0x8) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, &(0x7f00000019c0)={0x20}, 0x1) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r1, 0x111, 0x5, 0xc3, 0x4) r2 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x1, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r2, 0xc0045516, &(0x7f0000000040)=0x4) arch_prctl$ARCH_GET_CPUID(0x1011) getpgrp(0x0) flock(r0, 0x0) ioctl$BLKRRPART(0xffffffffffffffff, 0x125f, 0x0) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000200)={@mcast2}) fcntl$F_GET_FILE_RW_HINT(r0, 0x40d, &(0x7f00000000c0)) setsockopt$RDS_CONG_MONITOR(r2, 0x114, 0x6, &(0x7f0000000280), 0x4) ioctl$VHOST_SET_LOG_FD(r2, 0x4004af07, 0x0) ioctl$DRM_IOCTL_IRQ_BUSID(r2, 0xc0106403, &(0x7f0000000100)={0x8875, 0x800, 0x8000, 0xc2}) ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000180)) ioctl$VHOST_SET_VRING_CALL(0xffffffffffffffff, 0x4008af21, &(0x7f0000000380)={0x0, r1}) r3 = fcntl$dupfd(r1, 0x0, r2) setsockopt$IP_VS_SO_SET_STOPDAEMON(r3, 0x0, 0x48c, &(0x7f0000000140)={0x3, 'veth0\x00'}, 0x18) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.cpu/syz1\x00', 0x1ff) openat$snapshot(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/snapshot\x00', 0x0, 0x0) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0xf7fffffffffffffd, 0x2012, r2, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000a40)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x20008000}, 0x24044000) unshare(0x40000000) mount$9p_virtio(&(0x7f00000003c0)='em0%$!,cgroup#\x00', &(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='9p\x00', 0x200000, &(0x7f0000000500)={'trans=virtio,', {[{@afid={'afid', 0x3d, 0x6}}, {@version_L='version=9p2000.L'}, {@cache_none='cache=none'}], [{@subj_role={'subj_role', 0x3d, '/dev/dsp#\x00'}}, {@permit_directio='permit_directio'}, {@measure='measure'}, {@context={'context', 0x3d, 'system_u'}}, {@obj_user={'obj_user'}}, {@dont_hash='dont_hash'}, {@subj_type={'subj_type', 0x3d, '\\eth0('}}, {@dont_measure='dont_measure'}]}}) ioctl$VIDIOC_ENUMINPUT(r1, 0xc050561a, &(0x7f0000000300)={0x4, "443b36c4364670c73c2ad26e1952769039650793d10fc72d24ce46e327d06e2f", 0x3, 0x100, 0x4, 0x1057ff, 0x0, 0x6}) 06:24:26 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000040)="2e0000002500817ee45ae087185082cf0f24b0eba06ec400002339e00586f9835b3f0016914879008cd97a80e230", 0x2e}], 0x1}, 0x0) 06:24:26 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000040)="2e0000002500817ee45ae087185082cf0f24b0eba06ec400002339e00586f9835b680016914879008cd90080e230", 0x2e}], 0x1}, 0x0) [ 570.553230][T19238] IPVS: ftp: loaded support on port[0] = 21 [ 570.705539][T19239] IPVS: ftp: loaded support on port[0] = 21 [ 571.564267][T19250] __nla_parse: 12 callbacks suppressed [ 571.564275][T19250] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.4'. [ 571.594628][T19251] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.4'. 06:24:27 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000040)="2e0000002500817ee45ae087185082cf0f24b0eba06ec400002339e00586f9835b3f0016914879008cd90080e22a", 0x2e}], 0x1}, 0x0) 06:24:27 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000040)="2e0000002500817ee45ae087185082cf0f24b0eba06ec400002339e00586f9835b3f0216914879008cd90080e230", 0x2e}], 0x1}, 0x0) [ 571.647825][T19236] IPVS: ftp: loaded support on port[0] = 21 06:24:27 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = creat(&(0x7f0000000000)='./bus\x00', 0x0) getrlimit(0x0, &(0x7f00000000c0)) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x0, 0xa5}) [ 571.714220][T19257] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.4'. [ 571.774030][T19258] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.5'. [ 571.814003][T19261] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.4'. 06:24:27 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) getsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000400), &(0x7f0000000440)=0x8) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, &(0x7f00000019c0)={0x20}, 0x1) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r1, 0x111, 0x5, 0xc3, 0x4) r2 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x1, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r2, 0xc0045516, &(0x7f0000000040)=0x4) arch_prctl$ARCH_GET_CPUID(0x1011) getpgrp(0x0) flock(r0, 0x0) ioctl$BLKRRPART(0xffffffffffffffff, 0x125f, 0x0) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000200)={@mcast2}) fcntl$F_GET_FILE_RW_HINT(r0, 0x40d, &(0x7f00000000c0)) setsockopt$RDS_CONG_MONITOR(r2, 0x114, 0x6, &(0x7f0000000280), 0x4) ioctl$VHOST_SET_LOG_FD(r2, 0x4004af07, 0x0) ioctl$DRM_IOCTL_IRQ_BUSID(r2, 0xc0106403, &(0x7f0000000100)={0x8875, 0x800, 0x8000, 0xc2}) ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000180)) ioctl$VHOST_SET_VRING_CALL(0xffffffffffffffff, 0x4008af21, &(0x7f0000000380)={0x0, r1}) r3 = fcntl$dupfd(r1, 0x0, r2) setsockopt$IP_VS_SO_SET_STOPDAEMON(r3, 0x0, 0x48c, &(0x7f0000000140)={0x3, 'veth0\x00'}, 0x18) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.cpu/syz1\x00', 0x1ff) openat$snapshot(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/snapshot\x00', 0x0, 0x0) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0xf7fffffffffffffd, 0x2012, r2, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000a40)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x20008000}, 0x24044000) unshare(0x40000000) mount$9p_virtio(&(0x7f00000003c0)='em0%$!,cgroup#\x00', &(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='9p\x00', 0x200000, &(0x7f0000000500)={'trans=virtio,', {[{@afid={'afid', 0x3d, 0x6}}, {@version_L='version=9p2000.L'}, {@cache_none='cache=none'}], [{@subj_role={'subj_role', 0x3d, '/dev/dsp#\x00'}}, {@permit_directio='permit_directio'}, {@measure='measure'}, {@context={'context', 0x3d, 'system_u'}}, {@obj_user={'obj_user'}}, {@dont_hash='dont_hash'}, {@subj_type={'subj_type', 0x3d, '\\eth0('}}, {@dont_measure='dont_measure'}]}}) ioctl$VIDIOC_ENUMINPUT(r1, 0xc050561a, &(0x7f0000000300)={0x4, "443b36c4364670c73c2ad26e1952769039650793d10fc72d24ce46e327d06e2f", 0x3, 0x100, 0x4, 0x1057ff, 0x0, 0x6}) 06:24:27 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) getsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000400), &(0x7f0000000440)=0x8) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, &(0x7f00000019c0)={0x20}, 0x1) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r1, 0x111, 0x5, 0xc3, 0x4) r2 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x1, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r2, 0xc0045516, &(0x7f0000000040)=0x4) arch_prctl$ARCH_GET_CPUID(0x1011) getpgrp(0x0) flock(r0, 0x0) ioctl$BLKRRPART(0xffffffffffffffff, 0x125f, 0x0) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000200)={@mcast2}) fcntl$F_GET_FILE_RW_HINT(r0, 0x40d, &(0x7f00000000c0)) setsockopt$RDS_CONG_MONITOR(r2, 0x114, 0x6, &(0x7f0000000280), 0x4) ioctl$VHOST_SET_LOG_FD(r2, 0x4004af07, 0x0) ioctl$DRM_IOCTL_IRQ_BUSID(r2, 0xc0106403, &(0x7f0000000100)={0x8875, 0x800, 0x8000, 0xc2}) ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000180)) ioctl$VHOST_SET_VRING_CALL(0xffffffffffffffff, 0x4008af21, &(0x7f0000000380)={0x0, r1}) r3 = fcntl$dupfd(r1, 0x0, r2) setsockopt$IP_VS_SO_SET_STOPDAEMON(r3, 0x0, 0x48c, &(0x7f0000000140)={0x3, 'veth0\x00'}, 0x18) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.cpu/syz1\x00', 0x1ff) openat$snapshot(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/snapshot\x00', 0x0, 0x0) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0xf7fffffffffffffd, 0x2012, r2, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000a40)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x20008000}, 0x24044000) unshare(0x40000000) mount$9p_virtio(&(0x7f00000003c0)='em0%$!,cgroup#\x00', &(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='9p\x00', 0x200000, &(0x7f0000000500)={'trans=virtio,', {[{@afid={'afid', 0x3d, 0x6}}, {@version_L='version=9p2000.L'}, {@cache_none='cache=none'}], [{@subj_role={'subj_role', 0x3d, '/dev/dsp#\x00'}}, {@permit_directio='permit_directio'}, {@measure='measure'}, {@context={'context', 0x3d, 'system_u'}}, {@obj_user={'obj_user'}}, {@dont_hash='dont_hash'}, {@subj_type={'subj_type', 0x3d, '\\eth0('}}, {@fsuuid={'fsuuid', 0x3d, {[0x36, 0x79, 0x0, 0x33, 0x61, 0x62], 0x2d, [0x77, 0x32, 0x77, 0x34], 0x2d, [0x7f, 0x67, 0x37, 0x77], 0x2d, [0x0, 0x38, 0x32, 0x33], 0x2d, [0x35, 0x37, 0x7f, 0x7b, 0x37, 0x39, 0x77, 0x33]}}}, {@dont_measure='dont_measure'}]}}) ioctl$VIDIOC_ENUMINPUT(r1, 0xc050561a, &(0x7f0000000300)={0x4, "443b36c4364670c73c2ad26e1952769039650793d10fc72d24ce46e327d06e2f", 0x3, 0x100, 0x4, 0x1057ff, 0x0, 0x6}) 06:24:27 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000040)="2e0000002500817ee45ae087185082cf0f24b0eba06ec400002339e00586f9835b3f0316914879008cd90080e230", 0x2e}], 0x1}, 0x0) [ 571.826010][T19263] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.5'. 06:24:27 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000040)="2e0000002500817ee45ae087185082cf0f24b0eba06ec400002339e00586f9835b3f0016914879008cd90080e230", 0xf}], 0x1}, 0x0) [ 572.030611][T19274] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.4'. [ 572.090657][T19272] IPVS: ftp: loaded support on port[0] = 21 [ 572.146225][T19269] IPVS: ftp: loaded support on port[0] = 21 06:24:27 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000040)="2e0000002500817ee45ae087185082cf0f24b0eba06ec400002339e00586f9835b3f0016914879008cd90080e230", 0x14}], 0x1}, 0x0) [ 572.231292][T19279] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.4'. [ 731.382503][ T1043] INFO: task kworker/0:3:7760 blocked for more than 140 seconds. [ 731.390341][ T1043] Not tainted 5.0.0-rc7-next-20190222 #41 [ 731.397884][ T1043] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 731.406779][ T1043] kworker/0:3 D27280 7760 2 0x80000000 [ 731.413393][ T1043] Workqueue: ipv6_addrconf addrconf_verify_work [ 731.419734][ T1043] Call Trace: [ 731.423105][ T1043] __schedule+0x817/0x1cc0 [ 731.427528][ T1043] ? __mutex_lock+0x721/0x1310 [ 731.432589][ T1043] ? __sched_text_start+0x8/0x8 [ 731.437505][ T1043] schedule+0x92/0x180 [ 731.441650][ T1043] schedule_preempt_disabled+0x13/0x20 [ 731.447115][ T1043] __mutex_lock+0x726/0x1310 [ 731.451855][ T1043] ? rtnl_lock+0x17/0x20 [ 731.456112][ T1043] ? mutex_trylock+0x1e0/0x1e0 [ 731.460924][ T1043] ? process_one_work+0x890/0x1790 [ 731.466090][ T1043] ? find_held_lock+0x35/0x130 [ 731.470868][ T1043] ? process_one_work+0x890/0x1790 [ 731.476101][ T1043] mutex_lock_nested+0x16/0x20 [ 731.480886][ T1043] ? mutex_lock_nested+0x16/0x20 [ 731.485874][ T1043] rtnl_lock+0x17/0x20 [ 731.489947][ T1043] addrconf_verify_work+0xe/0x20 [ 731.494952][ T1043] process_one_work+0x98e/0x1790 [ 731.499949][ T1043] ? pwq_dec_nr_in_flight+0x320/0x320 [ 731.505898][ T1043] ? lock_acquire+0x16f/0x3f0 [ 731.510797][ T1043] worker_thread+0x98/0xe40 [ 731.515526][ T1043] ? trace_hardirqs_on+0x67/0x230 [ 731.520565][ T1043] kthread+0x357/0x430 [ 731.524675][ T1043] ? process_one_work+0x1790/0x1790 [ 731.529883][ T1043] ? kthread_cancel_delayed_work_sync+0x20/0x20 [ 731.536446][ T1043] ret_from_fork+0x3a/0x50 [ 731.540924][ T1043] INFO: task kworker/u4:5:7944 blocked for more than 140 seconds. [ 731.548858][ T1043] Not tainted 5.0.0-rc7-next-20190222 #41 [ 731.555253][ T1043] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 731.564182][ T1043] kworker/u4:5 D26352 7944 2 0x80000000 [ 731.570643][ T1043] Workqueue: netns cleanup_net [ 731.575432][ T1043] Call Trace: [ 731.578722][ T1043] __schedule+0x817/0x1cc0 [ 731.583209][ T1043] ? __sched_text_start+0x8/0x8 [ 731.588213][ T1043] ? wait_woken+0x250/0x250 [ 731.592942][ T1043] schedule+0x92/0x180 [ 731.597176][ T1043] synchronize_rcu_expedited+0x54e/0x5b0 [ 731.602882][ T1043] ? rcu_exp_wait_wake+0x3c0/0x3c0 [ 731.608081][ T1043] ? finish_wait+0x260/0x260 [ 731.612743][ T1043] ? lock_acquire+0x16f/0x3f0 [ 731.617454][ T1043] ? caif_exit_net+0x2f0/0x7d0 [ 731.622298][ T1043] ? __mutex_lock+0x3cd/0x1310 [ 731.627089][ T1043] ? rtnl_lock+0x17/0x20 [ 731.631310][ T1043] ? caif_exit_net+0x2f0/0x7d0 [ 731.636201][ T1043] synchronize_rcu.part.0+0x76/0xe0 [ 731.641490][ T1043] ? synchronize_rcu_expedited+0x5b0/0x5b0 [ 731.647313][ T1043] synchronize_rcu+0x27/0xa0 [ 731.651972][ T1043] cfcnfg_remove+0x30/0x9b [ 731.656402][ T1043] caif_exit_net+0x504/0x7d0 [ 731.660988][ T1043] ? receive+0x4a0/0x4a0 [ 731.665279][ T1043] ops_exit_list.isra.0+0xb0/0x160 [ 731.670403][ T1043] cleanup_net+0x3fb/0x960 [ 731.674867][ T1043] ? netns_install+0x1d0/0x1d0 [ 731.679646][ T1043] process_one_work+0x98e/0x1790 [ 731.684640][ T1043] ? pwq_dec_nr_in_flight+0x320/0x320 [ 731.690027][ T1043] ? lock_acquire+0x16f/0x3f0 [ 731.694739][ T1043] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 731.700983][ T1043] ? move_linked_works+0x233/0x300 [ 731.706973][ T1043] worker_thread+0x98/0xe40 [ 731.711546][ T1043] ? trace_hardirqs_on+0x67/0x230 [ 731.716580][ T1043] kthread+0x357/0x430 [ 731.720633][ T1043] ? process_one_work+0x1790/0x1790 [ 731.725870][ T1043] ? kthread_cancel_delayed_work_sync+0x20/0x20 [ 731.732171][ T1043] ret_from_fork+0x3a/0x50 [ 731.737136][ T1043] INFO: task syz-executor.0:19236 blocked for more than 140 seconds. [ 731.745260][ T1043] Not tainted 5.0.0-rc7-next-20190222 #41 [ 731.751704][ T1043] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 731.760465][ T1043] syz-executor.0 D26000 19236 7749 0x80000004 [ 731.766830][ T1043] Call Trace: [ 731.770123][ T1043] __schedule+0x817/0x1cc0 [ 731.774596][ T1043] ? __mutex_lock+0x721/0x1310 [ 731.779360][ T1043] ? __sched_text_start+0x8/0x8 [ 731.784275][ T1043] schedule+0x92/0x180 [ 731.788354][ T1043] schedule_preempt_disabled+0x13/0x20 [ 731.793867][ T1043] __mutex_lock+0x726/0x1310 [ 731.798463][ T1043] ? rtnl_lock+0x17/0x20 [ 731.802766][ T1043] ? mutex_trylock+0x1e0/0x1e0 [ 731.807546][ T1043] ? kfree+0x173/0x230 [ 731.811706][ T1043] ? cache_destroy_net+0x3c/0x50 [ 731.816649][ T1043] ? kfree+0x173/0x230 [ 731.820700][ T1043] ? lockdep_hardirqs_on+0x418/0x5d0 [ 731.826067][ T1043] ? trace_hardirqs_on+0x67/0x230 [ 731.831113][ T1043] ? cache_destroy_net+0x3c/0x50 [ 731.836090][ T1043] mutex_lock_nested+0x16/0x20 [ 731.840857][ T1043] ? mutex_lock_nested+0x16/0x20 [ 731.845838][ T1043] rtnl_lock+0x17/0x20 [ 731.849944][ T1043] cangw_pernet_exit+0x13/0x30 [ 731.854773][ T1043] ? cgw_remove_all_jobs+0x410/0x410 [ 731.860169][ T1043] ops_exit_list.isra.0+0xb0/0x160 [ 731.865447][ T1043] setup_net+0x3f2/0x730 [ 731.869690][ T1043] ? ops_init+0x410/0x410 [ 731.874092][ T1043] copy_net_ns+0x1d9/0x340 [ 731.878576][ T1043] create_new_namespaces+0x400/0x7b0 [ 731.884004][ T1043] unshare_nsproxy_namespaces+0xc2/0x200 [ 731.889655][ T1043] ksys_unshare+0x440/0x980 [ 731.894213][ T1043] ? walk_process_tree+0x2d0/0x2d0 [ 731.899333][ T1043] __x64_sys_unshare+0x31/0x40 [ 731.904132][ T1043] do_syscall_64+0x103/0x610 [ 731.908731][ T1043] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 731.914671][ T1043] RIP: 0033:0x457e29 [ 731.918574][ T1043] Code: Bad RIP value. [ 731.922695][ T1043] RSP: 002b:00007f2b1622ec78 EFLAGS: 00000246 ORIG_RAX: 0000000000000110 [ 731.931158][ T1043] RAX: ffffffffffffffda RBX: 0000000000000001 RCX: 0000000000457e29 [ 731.939311][ T1043] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000040000000 [ 731.947410][ T1043] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 731.955420][ T1043] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f2b1622f6d4 [ 731.963431][ T1043] R13: 00000000004c6c3b R14: 00000000004dc3f8 R15: 00000000ffffffff [ 731.971570][ T1043] INFO: task syz-executor.1:19262 blocked for more than 140 seconds. [ 731.979996][ T1043] Not tainted 5.0.0-rc7-next-20190222 #41 [ 731.986281][ T1043] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 731.995001][ T1043] syz-executor.1 D29488 19262 7752 0x00000004 [ 732.001336][ T1043] Call Trace: [ 732.004695][ T1043] __schedule+0x817/0x1cc0 [ 732.009240][ T1043] ? __mutex_lock+0x721/0x1310 [ 732.014377][ T1043] ? __sched_text_start+0x8/0x8 [ 732.019363][ T1043] schedule+0x92/0x180 [ 732.023479][ T1043] schedule_preempt_disabled+0x13/0x20 [ 732.029008][ T1043] __mutex_lock+0x726/0x1310 [ 732.033669][ T1043] ? rtnl_lock+0x17/0x20 [ 732.037920][ T1043] ? mutex_trylock+0x1e0/0x1e0 [ 732.042742][ T1043] ? lock_downgrade+0x880/0x880 [ 732.047605][ T1043] mutex_lock_nested+0x16/0x20 [ 732.052430][ T1043] ? mutex_lock_nested+0x16/0x20 [ 732.057378][ T1043] rtnl_lock+0x17/0x20 [ 732.061486][ T1043] sock_do_ioctl+0x254/0x300 [ 732.066079][ T1043] ? compat_ifr_data_ioctl+0x160/0x160 [ 732.071599][ T1043] ? mark_held_locks+0xf0/0xf0 [ 732.076377][ T1043] sock_ioctl+0x32b/0x610 [ 732.080687][ T1043] ? dlci_ioctl_set+0x40/0x40 [ 732.085416][ T1043] ? find_held_lock+0x35/0x130 [ 732.090205][ T1043] ? __fget+0x35a/0x550 [ 732.094444][ T1043] ? dlci_ioctl_set+0x40/0x40 [ 732.099131][ T1043] do_vfs_ioctl+0xd6e/0x1390 [ 732.103797][ T1043] ? kasan_check_read+0x11/0x20 [ 732.108733][ T1043] ? ioctl_preallocate+0x210/0x210 [ 732.113890][ T1043] ? __fget+0x381/0x550 [ 732.118132][ T1043] ? ksys_dup3+0x3e0/0x3e0 [ 732.122692][ T1043] ? nsecs_to_jiffies+0x30/0x30 [ 732.127566][ T1043] ? security_file_ioctl+0x93/0xc0 [ 732.132750][ T1043] ksys_ioctl+0xab/0xd0 [ 732.136910][ T1043] __x64_sys_ioctl+0x73/0xb0 [ 732.141554][ T1043] do_syscall_64+0x103/0x610 [ 732.146146][ T1043] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 732.152095][ T1043] RIP: 0033:0x457e29 [ 732.156142][ T1043] Code: Bad RIP value. [ 732.160196][ T1043] RSP: 002b:00007f59e2554c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 732.168638][ T1043] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000457e29 [ 732.176638][ T1043] RDX: 0000000000400200 RSI: 0000000000008912 RDI: 0000000000000004 [ 732.184647][ T1043] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 732.192760][ T1043] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f59e25556d4 [ 732.200785][ T1043] R13: 00000000004c12be R14: 00000000004d3200 R15: 00000000ffffffff [ 732.208853][ T1043] INFO: task syz-executor.1:19265 blocked for more than 140 seconds. [ 732.217023][ T1043] Not tainted 5.0.0-rc7-next-20190222 #41 [ 732.223324][ T1043] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 732.232059][ T1043] syz-executor.1 D27504 19265 7752 0x00000004 [ 732.238453][ T1043] Call Trace: [ 732.241825][ T1043] __schedule+0x817/0x1cc0 [ 732.246457][ T1043] ? __mutex_lock+0x721/0x1310 [ 732.251207][ T1043] ? __sched_text_start+0x8/0x8 [ 732.256356][ T1043] schedule+0x92/0x180 [ 732.260441][ T1043] schedule_preempt_disabled+0x13/0x20 [ 732.266096][ T1043] __mutex_lock+0x726/0x1310 [ 732.270698][ T1043] ? rtnl_lock+0x17/0x20 [ 732.275034][ T1043] ? mutex_trylock+0x1e0/0x1e0 [ 732.279938][ T1043] ? lock_downgrade+0x880/0x880 [ 732.285011][ T1043] mutex_lock_nested+0x16/0x20 [ 732.291541][ T1043] ? mutex_lock_nested+0x16/0x20 [ 732.296505][ T1043] rtnl_lock+0x17/0x20 [ 732.300568][ T1043] sock_do_ioctl+0x254/0x300 [ 732.305193][ T1043] ? compat_ifr_data_ioctl+0x160/0x160 [ 732.310669][ T1043] ? mark_held_locks+0xf0/0xf0 [ 732.315655][ T1043] sock_ioctl+0x32b/0x610 [ 732.319989][ T1043] ? dlci_ioctl_set+0x40/0x40 [ 732.324700][ T1043] ? find_held_lock+0x35/0x130 [ 732.329474][ T1043] ? __fget+0x35a/0x550 [ 732.333694][ T1043] ? dlci_ioctl_set+0x40/0x40 [ 732.338373][ T1043] do_vfs_ioctl+0xd6e/0x1390 [ 732.343282][ T1043] ? kasan_check_read+0x11/0x20 [ 732.348138][ T1043] ? ioctl_preallocate+0x210/0x210 [ 732.353311][ T1043] ? __fget+0x381/0x550 [ 732.357473][ T1043] ? ksys_dup3+0x3e0/0x3e0 [ 732.361948][ T1043] ? nsecs_to_jiffies+0x30/0x30 [ 732.366810][ T1043] ? security_file_ioctl+0x93/0xc0 [ 732.372074][ T1043] ksys_ioctl+0xab/0xd0 [ 732.376243][ T1043] __x64_sys_ioctl+0x73/0xb0 [ 732.380867][ T1043] do_syscall_64+0x103/0x610 [ 732.385569][ T1043] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 732.391530][ T1043] RIP: 0033:0x457e29 [ 732.395443][ T1043] Code: Bad RIP value. [ 732.399488][ T1043] RSP: 002b:00007f59e2533c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 732.407956][ T1043] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000457e29 [ 732.415958][ T1043] RDX: 0000000000400200 RSI: 0000000000008912 RDI: 0000000000000007 [ 732.424938][ T1043] RBP: 000000000073bfa0 R08: 0000000000000000 R09: 0000000000000000 [ 732.433196][ T1043] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f59e25346d4 [ 732.442002][ T1043] R13: 00000000004c12be R14: 00000000004d3200 R15: 00000000ffffffff [ 732.450000][ T1043] INFO: task syz-executor.3:19269 blocked for more than 140 seconds. [ 732.458227][ T1043] Not tainted 5.0.0-rc7-next-20190222 #41 [ 732.464520][ T1043] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 732.473379][ T1043] syz-executor.3 D27856 19269 7759 0x80000004 [ 732.479731][ T1043] Call Trace: [ 732.483099][ T1043] __schedule+0x817/0x1cc0 [ 732.487536][ T1043] ? __mutex_lock+0x721/0x1310 [ 732.492492][ T1043] ? __sched_text_start+0x8/0x8 [ 732.497367][ T1043] schedule+0x92/0x180 [ 732.501518][ T1043] schedule_preempt_disabled+0x13/0x20 [ 732.506987][ T1043] __mutex_lock+0x726/0x1310 [ 732.511645][ T1043] ? mark_held_locks+0xf0/0xf0 [ 732.516414][ T1043] ? rtnl_lock+0x17/0x20 [ 732.520900][ T1043] ? mutex_trylock+0x1e0/0x1e0 [ 732.525791][ T1043] ? gtp_net_exit+0x192/0x3a0 [ 732.530630][ T1043] ? find_held_lock+0x35/0x130 [ 732.535909][ T1043] ? gtp_net_exit+0x192/0x3a0 [ 732.540650][ T1043] ? lock_downgrade+0x880/0x880 [ 732.545547][ T1043] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 732.551849][ T1043] mutex_lock_nested+0x16/0x20 [ 732.556610][ T1043] ? mutex_lock_nested+0x16/0x20 [ 732.561597][ T1043] rtnl_lock+0x17/0x20 [ 732.565685][ T1043] gtp_net_exit+0x1cd/0x3a0 [ 732.570167][ T1043] ? gtp_genl_del_pdp+0x310/0x310 [ 732.575231][ T1043] ? rcu_read_lock_sched_held+0x110/0x130 [ 732.581022][ T1043] ? loopback_dev_init+0x150/0x150 [ 732.586202][ T1043] ? gtp_genl_del_pdp+0x310/0x310 [ 732.591227][ T1043] ops_exit_list.isra.0+0xb0/0x160 [ 732.596455][ T1043] setup_net+0x3f2/0x730 [ 732.600760][ T1043] ? ops_init+0x410/0x410 [ 732.605232][ T1043] copy_net_ns+0x1d9/0x340 [ 732.609656][ T1043] create_new_namespaces+0x400/0x7b0 [ 732.615008][ T1043] unshare_nsproxy_namespaces+0xc2/0x200 [ 732.620651][ T1043] ksys_unshare+0x440/0x980 [ 732.625298][ T1043] ? walk_process_tree+0x2d0/0x2d0 [ 732.630437][ T1043] __x64_sys_unshare+0x31/0x40 [ 732.635240][ T1043] do_syscall_64+0x103/0x610 [ 732.639847][ T1043] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 732.645880][ T1043] RIP: 0033:0x457e29 [ 732.649795][ T1043] Code: Bad RIP value. [ 732.653924][ T1043] RSP: 002b:00007f44e0844c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000110 [ 732.662403][ T1043] RAX: ffffffffffffffda RBX: 0000000000000001 RCX: 0000000000457e29 [ 732.670378][ T1043] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000040000000 [ 732.678393][ T1043] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 732.686404][ T1043] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f44e08456d4 [ 732.694446][ T1043] R13: 00000000004c6c3b R14: 00000000004dc3f8 R15: 00000000ffffffff [ 732.702599][ T1043] INFO: task syz-executor.2:19272 blocked for more than 140 seconds. [ 732.710662][ T1043] Not tainted 5.0.0-rc7-next-20190222 #41 [ 732.716928][ T1043] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 732.725622][ T1043] syz-executor.2 D28000 19272 7756 0x80000004 [ 732.732017][ T1043] Call Trace: [ 732.735366][ T1043] __schedule+0x817/0x1cc0 [ 732.739945][ T1043] ? __mutex_lock+0x721/0x1310 [ 732.746089][ T1043] ? __sched_text_start+0x8/0x8 [ 732.751115][ T1043] schedule+0x92/0x180 [ 732.755855][ T1043] schedule_preempt_disabled+0x13/0x20 [ 732.761318][ T1043] __mutex_lock+0x726/0x1310 [ 732.766184][ T1043] ? mark_held_locks+0xf0/0xf0 [ 732.770955][ T1043] ? rtnl_lock+0x17/0x20 [ 732.775284][ T1043] ? mutex_trylock+0x1e0/0x1e0 [ 732.780062][ T1043] ? gtp_net_exit+0x192/0x3a0 [ 732.784770][ T1043] ? find_held_lock+0x35/0x130 [ 732.789549][ T1043] ? gtp_net_exit+0x192/0x3a0 [ 732.794305][ T1043] ? lock_downgrade+0x880/0x880 [ 732.799392][ T1043] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 732.805676][ T1043] mutex_lock_nested+0x16/0x20 [ 732.810684][ T1043] ? mutex_lock_nested+0x16/0x20 [ 732.815658][ T1043] rtnl_lock+0x17/0x20 [ 732.819749][ T1043] gtp_net_exit+0x1cd/0x3a0 [ 732.824389][ T1043] ? gtp_genl_del_pdp+0x310/0x310 [ 732.829417][ T1043] ? rcu_read_lock_sched_held+0x110/0x130 [ 732.835175][ T1043] ? loopback_dev_init+0x150/0x150 [ 732.840297][ T1043] ? gtp_genl_del_pdp+0x310/0x310 [ 732.845376][ T1043] ops_exit_list.isra.0+0xb0/0x160 [ 732.850589][ T1043] setup_net+0x3f2/0x730 [ 732.854902][ T1043] ? ops_init+0x410/0x410 [ 732.859372][ T1043] copy_net_ns+0x1d9/0x340 [ 732.864032][ T1043] create_new_namespaces+0x400/0x7b0 [ 732.869494][ T1043] unshare_nsproxy_namespaces+0xc2/0x200 [ 732.875174][ T1043] ksys_unshare+0x440/0x980 [ 732.879694][ T1043] ? walk_process_tree+0x2d0/0x2d0 [ 732.884863][ T1043] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 732.890389][ T1043] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 732.896495][ T1043] ? do_syscall_64+0x26/0x610 [ 732.901182][ T1043] ? lockdep_hardirqs_on+0x418/0x5d0 [ 732.906658][ T1043] __x64_sys_unshare+0x31/0x40 [ 732.911479][ T1043] do_syscall_64+0x103/0x610 [ 732.916080][ T1043] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 732.922023][ T1043] RIP: 0033:0x457e29 [ 732.926072][ T1043] Code: Bad RIP value. [ 732.930218][ T1043] RSP: 002b:00007f27afc6fc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000110 [ 732.938754][ T1043] RAX: ffffffffffffffda RBX: 0000000000000001 RCX: 0000000000457e29 [ 732.946754][ T1043] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000040000000 [ 732.954785][ T1043] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 732.962830][ T1043] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f27afc706d4 [ 732.970821][ T1043] R13: 00000000004c6c3b R14: 00000000004dc3f8 R15: 00000000ffffffff [ 732.978845][ T1043] [ 732.978845][ T1043] Showing all locks held in the system: [ 732.986757][ T1043] 1 lock held by khungtaskd/1043: [ 732.991832][ T1043] #0: 0000000006446d84 (rcu_read_lock){....}, at: debug_show_all_locks+0x5f/0x27e [ 733.001289][ T1043] 1 lock held by rsyslogd/7599: [ 733.006229][ T1043] 2 locks held by getty/7711: [ 733.010905][ T1043] #0: 0000000027c56893 (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x33/0x40 [ 733.019920][ T1043] #1: 00000000532bc023 (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x232/0x1b70 [ 733.029983][ T1043] 2 locks held by getty/7712: [ 733.034719][ T1043] #0: 00000000e1989e99 (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x33/0x40 [ 733.043722][ T1043] #1: 00000000d61c5020 (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x232/0x1b70 [ 733.053344][ T1043] 2 locks held by getty/7713: [ 733.058109][ T1043] #0: 00000000f95931de (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x33/0x40 [ 733.067207][ T1043] #1: 00000000bb9c8a51 (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x232/0x1b70 [ 733.077033][ T1043] 2 locks held by getty/7714: [ 733.081755][ T1043] #0: 000000002f011abc (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x33/0x40 [ 733.090722][ T1043] #1: 00000000fd834ee8 (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x232/0x1b70 [ 733.100358][ T1043] 2 locks held by getty/7715: [ 733.105060][ T1043] #0: 000000001f1a624d (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x33/0x40 [ 733.114063][ T1043] #1: 00000000ecd70d80 (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x232/0x1b70 [ 733.123652][ T1043] 2 locks held by getty/7716: [ 733.128303][ T1043] #0: 000000008e1e2308 (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x33/0x40 [ 733.137276][ T1043] #1: 0000000019ab2dcd (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x232/0x1b70 [ 733.146886][ T1043] 2 locks held by getty/7717: [ 733.151612][ T1043] #0: 000000005ea1d9b4 (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x33/0x40 [ 733.160599][ T1043] #1: 0000000063f7afcb (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x232/0x1b70 [ 733.170220][ T1043] 3 locks held by kworker/0:3/7760: [ 733.175437][ T1043] #0: 00000000b9e36e80 ((wq_completion)"%s"("ipv6_addrconf")){+.+.}, at: process_one_work+0x87e/0x1790 [ 733.186850][ T1043] #1: 0000000019a2293f ((addr_chk_work).work){+.+.}, at: process_one_work+0x8b4/0x1790 [ 733.196628][ T1043] #2: 00000000aef5b5a4 (rtnl_mutex){+.+.}, at: rtnl_lock+0x17/0x20 [ 733.204741][ T1043] 5 locks held by kworker/u4:5/7944: [ 733.210017][ T1043] #0: 00000000c05c9112 ((wq_completion)"%s""netns"){+.+.}, at: process_one_work+0x87e/0x1790 [ 733.220312][ T1043] #1: 00000000b811abf3 (net_cleanup_work){+.+.}, at: process_one_work+0x8b4/0x1790 [ 733.229773][ T1043] #2: 0000000061b81ef9 (pernet_ops_rwsem){++++}, at: cleanup_net+0xae/0x960 [ 733.238589][ T1043] #3: 00000000aef5b5a4 (rtnl_mutex){+.+.}, at: rtnl_lock+0x17/0x20 [ 733.246629][ T1043] #4: 00000000f3c0bf95 (&caifn->caifdevs.lock){+.+.}, at: caif_exit_net+0x2f0/0x7d0 [ 733.256164][ T1043] 2 locks held by syz-executor.0/19236: [ 733.261754][ T1043] #0: 0000000061b81ef9 (pernet_ops_rwsem){++++}, at: copy_net_ns+0x1ba/0x340 [ 733.270626][ T1043] #1: 00000000aef5b5a4 (rtnl_mutex){+.+.}, at: rtnl_lock+0x17/0x20 [ 733.278674][ T1043] 1 lock held by syz-executor.1/19262: [ 733.284158][ T1043] #0: 00000000aef5b5a4 (rtnl_mutex){+.+.}, at: rtnl_lock+0x17/0x20 [ 733.292205][ T1043] 1 lock held by syz-executor.1/19265: [ 733.297670][ T1043] #0: 00000000aef5b5a4 (rtnl_mutex){+.+.}, at: rtnl_lock+0x17/0x20 [ 733.305783][ T1043] 2 locks held by syz-executor.3/19269: [ 733.311339][ T1043] #0: 0000000061b81ef9 (pernet_ops_rwsem){++++}, at: copy_net_ns+0x1ba/0x340 [ 733.320581][ T1043] #1: 00000000aef5b5a4 (rtnl_mutex){+.+.}, at: rtnl_lock+0x17/0x20 [ 733.328631][ T1043] 2 locks held by syz-executor.2/19272: [ 733.334217][ T1043] #0: 0000000061b81ef9 (pernet_ops_rwsem){++++}, at: copy_net_ns+0x1ba/0x340 [ 733.343149][ T1043] #1: 00000000aef5b5a4 (rtnl_mutex){+.+.}, at: rtnl_lock+0x17/0x20 [ 733.351165][ T1043] [ 733.353548][ T1043] ============================================= [ 733.353548][ T1043] [ 733.362005][ T1043] NMI backtrace for cpu 0 [ 733.366335][ T1043] CPU: 0 PID: 1043 Comm: khungtaskd Not tainted 5.0.0-rc7-next-20190222 #41 [ 733.375076][ T1043] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 733.385118][ T1043] Call Trace: [ 733.388404][ T1043] dump_stack+0x172/0x1f0 [ 733.392734][ T1043] nmi_cpu_backtrace.cold+0x63/0xa4 [ 733.398094][ T1043] ? lapic_can_unplug_cpu.cold+0x38/0x38 [ 733.403739][ T1043] nmi_trigger_cpumask_backtrace+0x1be/0x236 [ 733.409722][ T1043] arch_trigger_cpumask_backtrace+0x14/0x20 [ 733.415993][ T1043] watchdog+0x9b2/0xeb0 [ 733.420140][ T1043] kthread+0x357/0x430 [ 733.424189][ T1043] ? reset_hung_task_detector+0x30/0x30 [ 733.429826][ T1043] ? kthread_cancel_delayed_work_sync+0x20/0x20 [ 733.436050][ T1043] ret_from_fork+0x3a/0x50 [ 733.441082][ T1043] Sending NMI from CPU 0 to CPUs 1: [ 733.446364][ C1] NMI backtrace for cpu 1 skipped: idling at native_safe_halt+0x2/0x10 [ 733.447371][ T1043] Kernel panic - not syncing: hung_task: blocked tasks [ 733.461843][ T1043] CPU: 0 PID: 1043 Comm: khungtaskd Not tainted 5.0.0-rc7-next-20190222 #41 [ 733.470512][ T1043] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 733.480555][ T1043] Call Trace: [ 733.483833][ T1043] dump_stack+0x172/0x1f0 [ 733.488143][ T1043] panic+0x2cb/0x65c [ 733.492028][ T1043] ? __warn_printk+0xf3/0xf3 [ 733.496619][ T1043] ? lapic_can_unplug_cpu.cold+0x38/0x38 [ 733.502249][ T1043] ? ___preempt_schedule+0x16/0x18 [ 733.507358][ T1043] ? nmi_trigger_cpumask_backtrace+0x19e/0x236 [ 733.513505][ T1043] ? nmi_trigger_cpumask_backtrace+0x1fa/0x236 [ 733.519653][ T1043] ? nmi_trigger_cpumask_backtrace+0x204/0x236 [ 733.525798][ T1043] ? nmi_trigger_cpumask_backtrace+0x19e/0x236 [ 733.531948][ T1043] watchdog+0x9c3/0xeb0 [ 733.536714][ T1043] kthread+0x357/0x430 [ 733.540963][ T1043] ? reset_hung_task_detector+0x30/0x30 [ 733.546588][ T1043] ? kthread_cancel_delayed_work_sync+0x20/0x20 [ 733.552827][ T1043] ret_from_fork+0x3a/0x50 [ 733.558357][ T1043] Kernel Offset: disabled [ 733.562676][ T1043] Rebooting in 86400 seconds..