IOC_ENABLE(r1, 0x8912, 0x400200) syz_read_part_table(0x7a000000, 0x2, &(0x7f0000002640)=[{0x0, 0x0, 0xfffffffffffffff7}, {&(0x7f0000001540)="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", 0x1e0}]) [ 1167.475123] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=10136 comm=syz-executor.0 [ 1167.614935] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=10136 comm=syz-executor.0 [ 1167.647400] IPVS: ftp: loaded support on port[0] = 21 [ 1167.734297] loop3: [POWERTEC] p1 p2 p3 p4 p5 p6 p7 p8 p9 p10 p11 p12 [ 1167.746038] loop3: p1 start 233194046 is beyond EOD, truncated 08:54:39 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000080)=0x11) r1 = add_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000080), 0xfe28, 0xfffffffffffffffb) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$VIDIOC_TRY_EXT_CTRLS(r3, 0xc0205649, &(0x7f00000003c0)={0xf390000, 0x2000000, 0xb5, r0, 0x0, &(0x7f0000000380)={0x9909d8, 0x0, [], @p_u8=&(0x7f0000000340)=0xa}}) keyctl$read(0xb, r1, 0x0, 0x0) r4 = add_key(&(0x7f0000000000)='trusted\x00', &(0x7f0000000040)={'syz', 0x0}, &(0x7f00000000c0)="f3882e50766688ef9801c5141368e36f2c63686fb855a249f10dcdeb942f02baa287f653edacf358c1bd152eb44eca421346c336cbb488b52a808acb837ddaa3bd8834589c1c837c793813a39828d4a6475366272846e18b51e2f03ae936fe87b7a2e77d16af3b357476b468849c64fc59ed1ce38014de7654fe7180bbc3954c858d1cf14d7cf9a1499325d81b29b37656bb5dd660604c28c4ec305951d928dffff4b3efbda2e1595baea1e22dc82c7c482c218c3eca75f1641a9c3fe6ce3a81e2d4902a285e3acf672cb09893260c", 0xcf, r1) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r5, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000000)={0x3c, 0x0, 0x1, 0x409, 0x0, 0x0, {}, [@CTA_TUPLE_ORIG={0x24, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @broadcast}, {0x8, 0x2, @dev}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_SEQ_ADJ_REPLY={0x4}]}, 0x3c}}, 0x0) getsockopt$IP_VS_SO_GET_SERVICE(r5, 0x0, 0x483, &(0x7f00000001c0), &(0x7f0000000240)=0x68) keyctl$clear(0x7, r4) [ 1167.799561] loop3: p2 start 3569653895 is beyond EOD, truncated [ 1167.849781] loop3: p3 start 926682669 is beyond EOD, truncated [ 1167.871428] loop3: p4 start 1263303888 is beyond EOD, truncated [ 1167.886796] IPVS: ftp: loaded support on port[0] = 21 [ 1167.899234] loop3: p5 start 1281279881 is beyond EOD, truncated [ 1167.916143] loop3: p6 start 3452787639 is beyond EOD, truncated 08:54:40 executing program 5: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000000)=0x3) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r2, 0x40047438, &(0x7f0000000180)=""/246) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r3, 0x0) ioctl$PPPIOCSFLAGS1(r2, 0x80047453, &(0x7f00000000c0)) [ 1167.983446] loop3: p7 start 2263908108 is beyond EOD, truncated [ 1168.021219] loop3: p8 start 1970859340 is beyond EOD, truncated [ 1168.063845] loop3: p9 start 1782333214 is beyond EOD, truncated [ 1168.084727] IPVS: ftp: loaded support on port[0] = 21 [ 1168.096283] loop3: p10 start 1751982490 is beyond EOD, truncated [ 1168.134662] loop3: p11 start 3605249017 is beyond EOD, truncated [ 1168.176219] loop3: p12 start 2400178403 is beyond EOD, truncated 08:54:40 executing program 0: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000000), 0x111, 0x2}}, 0x20) syz_open_dev$tty1(0xc, 0x4, 0x4) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000080)=0x1b) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r2, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000000)={0x3c, 0x0, 0x1, 0x409, 0x0, 0x0, {}, [@CTA_TUPLE_ORIG={0x24, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @broadcast}, {0x8, 0x2, @dev}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_SEQ_ADJ_REPLY={0x4}]}, 0x3c}}, 0x0) r3 = socket$isdn_base(0x22, 0x3, 0x0) dup3(r2, r3, 0x0) 08:54:42 executing program 0: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ttyS3\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x5402, &(0x7f00000000c0)={0x0, 0x0, 0xf843, 0x0, 0x0, "79e9de3d80a657aa9481d73875106c5eba1ada"}) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000080)=0x3) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) write$UHID_INPUT2(r2, &(0x7f0000000000)={0xc, {0x39, "b1e0313fe81cd8b5573d1d9b48afeffd7853b73dea68bcc0c211575fd490632e4fb529bbd54ca7113b91b1ada62b03c95bc48bac011a6b3e41"}}, 0x3f) 08:54:42 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_read_part_table(0x97ffffff, 0x2, &(0x7f0000002640)=[{0x0, 0x0, 0xfffffffffffffff7}, {&(0x7f0000001540)="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", 0x1e0}]) 08:54:42 executing program 5: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000000)=0x3) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r1, 0x40047438, &(0x7f0000000180)=""/246) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r2, 0x0) ioctl$PPPIOCSFLAGS1(r1, 0x80047453, &(0x7f00000000c0)) 08:54:42 executing program 1: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000000)=0x3) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) r2 = socket(0x1000000010, 0x80002, 0x0) sendmmsg$alg(r2, &(0x7f0000000200), 0x10efe10675dec16, 0x0) getpeername$tipc(r2, &(0x7f0000000140), &(0x7f00000002c0)=0x10) ioctl$EVIOCGPROP(r1, 0x40047438, &(0x7f0000000340)=""/246) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000000)={0x3c, 0x0, 0x1, 0x409, 0x0, 0x0, {}, [@CTA_TUPLE_ORIG={0x24, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @broadcast}, {0x8, 0x2, @dev}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_SEQ_ADJ_REPLY={0x4}]}, 0x3c}}, 0x0) fadvise64(0xffffffffffffffff, 0x2, 0x200, 0x3) r4 = socket$inet6(0xa, 0x2, 0x0) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) mknodat(r5, &(0x7f0000000100)='./file1\x00', 0x200, 0x20) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000040)=ANY=[], 0xfea7) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r3, 0x0) ioctl$PPPIOCSFLAGS1(r1, 0x40047457, &(0x7f00000000c0)) 08:54:42 executing program 2: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) r3 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer\x00', 0x2a0002, 0x0) ioctl$TUNSETOFFLOAD(r3, 0x400454d0, 0x10) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000000)=0x3) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r4 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r4, 0x40047438, &(0x7f0000000180)=""/246) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r5, &(0x7f0000000040)=ANY=[], 0xfea7) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r5, 0x0) ioctl$PPPIOCSFLAGS1(r4, 0x40047457, &(0x7f00000000c0)) 08:54:42 executing program 4: unshare(0x40000000) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000000)=0x3) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) r2 = socket(0x1000000010, 0x80002, 0x0) sendmmsg$alg(r2, &(0x7f0000000200), 0x10efe10675dec16, 0x0) ioctl$SIOCPNENABLEPIPE(r2, 0x89ed, 0x0) r3 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ttyS3\x00', 0x0, 0x0) ioctl$TCSETS(r3, 0x5402, &(0x7f00000000c0)={0x0, 0x0, 0xf843, 0x0, 0x0, "79e9de3d80a657aa9481d73875106c5eba1ada"}) ioctl$KDSETLED(r3, 0x4b32, 0x7fff) ioctl$EVIOCGPROP(r1, 0x40047438, &(0x7f0000000180)=""/246) ioctl$PPPIOCSFLAGS1(r1, 0x40047457, &(0x7f00000000c0)) [ 1170.625387] IPVS: ftp: loaded support on port[0] = 21 [ 1170.643577] IPVS: ftp: loaded support on port[0] = 21 [ 1170.643603] IPVS: ftp: loaded support on port[0] = 21 [ 1170.650940] IPVS: ftp: loaded support on port[0] = 21 [ 1170.684725] loop3: [POWERTEC] p1 p2 p3 p4 p5 p6 p7 p8 p9 p10 p11 p12 [ 1170.691843] loop3: p1 start 233194046 is beyond EOD, truncated 08:54:42 executing program 0: r0 = socket(0x1000000010, 0x80002, 0x0) sendmmsg$alg(r0, &(0x7f0000000200), 0x10efe10675dec16, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_REM(r0, 0x84, 0x65, &(0x7f0000000000)=[@in6={0xa, 0x4e20, 0x401, @private2={0xfc, 0x2, [], 0x1}, 0xff}], 0x1c) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) r2 = socket$inet6(0xa, 0x800, 0x0) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$FBIO_WAITFORVSYNC(r3, 0x40044620, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000080)=0x11) [ 1170.733590] loop3: p2 start 3569653895 is beyond EOD, truncated [ 1170.792915] loop3: p3 start 926682669 is beyond EOD, truncated [ 1170.821284] loop3: p4 start 1263303888 is beyond EOD, truncated [ 1170.873379] loop3: p5 start 1281279881 is beyond EOD, truncated [ 1170.929840] loop3: p6 start 3452787639 is beyond EOD, truncated [ 1170.971406] loop3: p7 start 2263908108 is beyond EOD, truncated [ 1171.022368] loop3: p8 start 1970859340 is beyond EOD, truncated [ 1171.057896] IPVS: ftp: loaded support on port[0] = 21 [ 1171.068753] loop3: p9 start 1782333214 is beyond EOD, truncated [ 1171.094533] loop3: p10 start 1751982490 is beyond EOD, truncated [ 1171.121360] loop3: p11 start 3605249017 is beyond EOD, truncated [ 1171.156646] loop3: p12 start 2400178403 is beyond EOD, truncated 08:54:43 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_read_part_table(0x98a61fad, 0x2, &(0x7f0000002640)=[{0x0, 0x0, 0xfffffffffffffff7}, {&(0x7f0000001540)="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", 0x1e0}]) [ 1171.475622] loop3: [POWERTEC] p1 p2 p3 p4 p5 p6 p7 p8 p9 p10 p11 p12 [ 1171.486113] loop3: p1 start 233194046 is beyond EOD, truncated [ 1171.490809] IPVS: ftp: loaded support on port[0] = 21 [ 1171.509602] IPVS: ftp: loaded support on port[0] = 21 [ 1171.512483] loop3: p2 start 3569653895 is beyond EOD, truncated 08:54:43 executing program 5: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000000)=0x3) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r1, 0x40047438, &(0x7f0000000180)=""/246) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r2, 0x0) ioctl$PPPIOCSFLAGS1(r1, 0x80047453, &(0x7f00000000c0)) [ 1171.609521] loop3: p3 start 926682669 is beyond EOD, truncated [ 1171.638356] loop3: p4 start 1263303888 is beyond EOD, truncated [ 1171.651034] loop3: p5 start 1281279881 is beyond EOD, truncated [ 1171.722555] loop3: p6 start 3452787639 is beyond EOD, truncated 08:54:43 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000080)=0x11) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000480)={0x40, 0x0, 0x1, 0x409, 0x0, 0x0, {}, [@CTA_TUPLE_ORIG={0x24, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @initdev={0xac, 0x1e, 0x1, 0x0}}, {0x8, 0x2, @dev}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x3a}}]}, @CTA_MARK={0x8, 0x8, 0x1, 0x0, 0x8}]}, 0x40}}, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r2, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000000)={0x3c, 0x0, 0x1, 0x409, 0x0, 0x0, {}, [@CTA_TUPLE_ORIG={0x24, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @broadcast}, {0x8, 0x2, @dev}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_SEQ_ADJ_REPLY={0x4}]}, 0x3c}}, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_NUMBER(0xffffffffffffffff, 0x84, 0x1c, &(0x7f00000001c0), &(0x7f0000000340)=0x4) r3 = add_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000080), 0xfe28, 0xfffffffffffffffb) keyctl$read(0xb, r3, 0x0, 0x0) add_key(&(0x7f0000000380)='blacklist\x00', &(0x7f00000003c0)={'syz', 0x3}, &(0x7f0000000400)="35ce33bfdd23c944bca65679349a91edaa37deb01d8b27d89acb8203fe58e44a56fff0851221f966c331a270df8c4f0f4fddb8dd850db510e286f4d8db543e5173b5bbe3dd89c68f8ce6f0bcfe7558f86829ce8eaf45eebf52", 0x59, r3) r4 = fcntl$dupfd(r1, 0x406, r2) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r4, 0x84, 0x1d, &(0x7f0000000240)=ANY=[@ANYBLOB="ac8617a5bbe8e7f56cf9fb14", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0], &(0x7f0000000200)=0x10) ioctl$SIOCX25SSUBSCRIP(r4, 0x89e1, &(0x7f00000000c0)={'veth1_vlan\x00', 0x6, 0x8}) [ 1171.789678] loop3: p7 start 2263908108 is beyond EOD, truncated [ 1171.813949] IPVS: ftp: loaded support on port[0] = 21 [ 1171.841172] loop3: p8 start 1970859340 is beyond EOD, truncated [ 1171.896648] loop3: p9 start 1782333214 is beyond EOD, truncated [ 1171.937389] loop3: p10 start 1751982490 is beyond EOD, truncated [ 1171.982463] loop3: p11 start 3605249017 is beyond EOD, truncated [ 1172.021440] loop3: p12 start 2400178403 is beyond EOD, truncated 08:54:44 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_read_part_table(0xad1fa698, 0x2, &(0x7f0000002640)=[{0x0, 0x0, 0xfffffffffffffff7}, {&(0x7f0000001540)="c2ec123b097b69be3e42e60d3f03ff5b20b3406e8d7eebd2456f5388ad7135b73efb98088798c4d4506cd2295e60b5e9f9f2399833ad179a03e098e07644033f2d0e3c37a84095cdde0312f1d81191a92ccbe761424e7d3033a056d7d07c4c4bc2dbbb00079ae5158b76bed5cdd1d93054fff6874b43ef1289c75e4c9b911d69313cbc4e0abcab496b4ce2c83f238a2b30fc8210b75bcdcd0b774ac467962cc4389843f92f418b0718a87f17ae20f1790c7ff086746847e2217207cede6d2af2a58d7148128b2f86806b3be24ced787543219ae633ab66b7828c5bfd87571ee33ab89138401439491e3f3c6a4a56b4bf8a7d532ee9144977f6ac8fae105ab358e231f2cd9a216d68b0877161e158b14837fb1426f4a629f17ddd7bbf9019941ff9bbe3d6fd30d68dbd9e3b3cfb282bc08db959b660ed8f7ebc67714be3d00f8f1e2cbc9404069335265ce12996f7cb48c1f3221f7f892493e4711a6dbd79a0298e0e0b9936b06a3d08821f558f5738b05e2ead126157186dac58de8a7098291efacb6666b2dca73d422fbf6a09b30f3c30cc9e34faa453ef1d770f7008b7c54d644be9716b27aa40b67126130b61c29a254a578365216655e8a5c6955e72fb67e6f1796e499edcaa33e0b43bd172d9977deff713978907e12189743913c7c847", 0x1e0}]) [ 1172.143110] Option ' ' to dns_resolver key: bad/missing value 08:54:44 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vcsa\x00', 0x82140, 0x0) ioctl$VIDIOC_TRY_ENCODER_CMD(r3, 0xc028564e, &(0x7f00000003c0)={0x3, 0x1, [0xfff, 0xe8, 0xc5c5, 0xc84, 0x0, 0x0, 0x400, 0x8]}) ioctl$TCSETXF(r2, 0x5434, &(0x7f0000000000)={0x1, 0x3, [0x5, 0x1, 0x80, 0x6, 0x515e], 0x200}) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000080)=0x11) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) r5 = socket$inet6(0xa, 0x2, 0x0) r6 = dup(r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) ioctl$ION_IOC_HEAP_QUERY(r6, 0xc0184908, &(0x7f0000000340)={0x34, 0x0, &(0x7f0000000240)}) sendmsg$IPCTNL_MSG_CT_NEW(r4, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f00000000c0)=ANY=[@ANYBLOB="3c00002000000000000000000000000000000000240001801400018008000100ffffffff08000200ac1414000c0e0280050001000000000004001080ac6d4bf531241f5d5f509b7e6841ce283708458314cecda030f0285a826ee5c739a5228bc0cb1936c36f05532413f971990faba81bcf6437cac2a94ac476851ec6b4e466726c54e5bbe85d170a6041680a7453819f4b9e83b9a098a484b90befc5c1fd92b2274e05515147e01baa0d8f7b52510e5dbd3df493d8a6f953e3d62e0261ea3bdb8f17605e1bf248613e00b0b9e4c39081d80858c808399ea30677b9e05c33cf37ee2d727eaa14db88e6033df49cdf166874984815206e5af584c52801c73d09a1e97a55bb1b33f766a090a51ac1b43ec92f227ec5fdbe8bf577fce3e1fa4885cb279cf7bbcc83d000709dbe6b239fbaa4fa59cf33aabb623d627cada6fed5067a7303c00883cbd0593d42652f93552a3ad271be2a904d12c3"], 0x3c}}, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r4, 0x6611) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x0, 0x0) [ 1172.310444] loop3: [POWERTEC] p1 p2 p3 p4 p5 p6 p7 p8 p9 p10 p11 p12 [ 1172.350021] loop3: p1 start 233194046 is beyond EOD, truncated [ 1172.395983] loop3: p2 start 3569653895 is beyond EOD, truncated [ 1172.402093] loop3: p3 start 926682669 is beyond EOD, truncated [ 1172.454201] loop3: p4 start 1263303888 is beyond EOD, truncated [ 1172.460313] loop3: p5 start 1281279881 is beyond EOD, truncated [ 1172.506186] loop3: p6 start 3452787639 is beyond EOD, truncated [ 1172.512288] loop3: p7 start 2263908108 is beyond EOD, truncated [ 1172.544117] loop3: p8 start 1970859340 is beyond EOD, truncated 08:54:44 executing program 1: unshare(0x40000000) r0 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ubi_ctrl\x00', 0x41e000, 0x0) ioctl$SCSI_IOCTL_BENCHMARK_COMMAND(r0, 0x3) r1 = gettid() ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x2) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) r2 = syz_open_procfs(r1, &(0x7f0000000100)='fd/3\x00') ioctl$TIOCGPTPEER(r2, 0x5441, 0x647f) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r3, 0x5423, &(0x7f0000000000)=0x3) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r4 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r4, 0x40047438, &(0x7f0000000180)=""/246) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r5, &(0x7f0000000040)=ANY=[], 0xfea7) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r5, 0x0) ioctl$PPPIOCSFLAGS1(r4, 0x40047457, &(0x7f00000000c0)) [ 1172.558599] loop3: p9 start 1782333214 is beyond EOD, truncated [ 1172.575942] loop3: p10 start 1751982490 is beyond EOD, truncated [ 1172.582146] loop3: p11 start 3605249017 is beyond EOD, truncated 08:54:44 executing program 5: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000000)=0x3) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r1, 0x40047438, &(0x7f0000000180)=""/246) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r2, 0x0) ioctl$PPPIOCSFLAGS1(r1, 0x80047453, &(0x7f00000000c0)) [ 1172.639340] loop3: p12 start 2400178403 is beyond EOD, truncated 08:54:44 executing program 0: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) openat(r1, &(0x7f0000000000)='./file0\x00', 0x10000, 0x8) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000080)=0x12) 08:54:44 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_read_part_table(0xf5ffffff, 0x2, &(0x7f0000002640)=[{0x0, 0x0, 0xfffffffffffffff7}, {&(0x7f0000001540)="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", 0x1e0}]) [ 1172.744346] IPVS: ftp: loaded support on port[0] = 21 [ 1172.778039] IPVS: ftp: loaded support on port[0] = 21 08:54:45 executing program 2: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$VIDIOC_SUBDEV_S_SELECTION(r3, 0xc040563e, &(0x7f0000000140)={0x0, 0x0, 0x102, 0x0, {0x5, 0x3f, 0x6, 0x4}}) r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r4, 0x5423, &(0x7f0000000000)=0x3) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r5 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r5, 0x40047438, &(0x7f0000000180)=""/246) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r6, &(0x7f0000000040)=ANY=[], 0xfea7) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r6, 0x0) ioctl$SIOCX25SCAUSEDIAG(r1, 0x89ec, &(0x7f0000000100)={0x8, 0x1}) setsockopt$inet_sctp_SCTP_RESET_ASSOC(r6, 0x84, 0x78, &(0x7f0000000340), 0x4) ioctl$PPPIOCSFLAGS1(r5, 0x40047457, &(0x7f00000000c0)) 08:54:45 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000080)=0x11) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x40, 0x0) setsockopt$inet6_group_source_req(r1, 0x29, 0x2c, &(0x7f00000000c0)={0xb316, {{0xa, 0x4e23, 0x9, @local, 0xffff}}, {{0xa, 0x4e20, 0x9, @dev={0xfe, 0x80, [], 0x36}, 0x3}}}, 0x108) [ 1172.925353] loop3: [POWERTEC] p1 p2 p3 p4 p5 p6 p7 p8 p9 p10 p11 p12 [ 1172.940091] loop3: p1 start 233194046 is beyond EOD, truncated [ 1172.979353] loop3: p2 start 3569653895 is beyond EOD, truncated [ 1173.009249] IPVS: ftp: loaded support on port[0] = 21 [ 1173.017137] loop3: p3 start 926682669 is beyond EOD, truncated [ 1173.023128] loop3: p4 start 1263303888 is beyond EOD, truncated [ 1173.093359] loop3: p5 start 1281279881 is beyond EOD, truncated [ 1173.129919] loop3: p6 start 3452787639 is beyond EOD, truncated [ 1173.174031] loop3: p7 start 2263908108 is beyond EOD, truncated [ 1173.192721] loop3: p8 start 1970859340 is beyond EOD, truncated [ 1173.274321] loop3: p9 start 1782333214 is beyond EOD, truncated [ 1173.280425] loop3: p10 start 1751982490 is beyond EOD, truncated [ 1173.342812] loop3: p11 start 3605249017 is beyond EOD, truncated [ 1173.374465] loop3: p12 start 2400178403 is beyond EOD, truncated 08:54:45 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_read_part_table(0xf73f0000, 0x2, &(0x7f0000002640)=[{0x0, 0x0, 0xfffffffffffffff7}, {&(0x7f0000001540)="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", 0x1e0}]) 08:54:45 executing program 5: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000000)=0x3) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r2, 0x40047438, &(0x7f0000000180)=""/246) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r3, 0x0) ioctl$PPPIOCSFLAGS1(r2, 0x80047453, &(0x7f00000000c0)) [ 1173.651627] IPVS: ftp: loaded support on port[0] = 21 08:54:45 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) write$P9_RLINK(r2, &(0x7f0000000140)={0x7, 0x47, 0x1}, 0x7) sendmsg$IPCTNL_MSG_CT_NEW(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000000)={0x3c, 0x0, 0x1, 0x409, 0x0, 0x0, {}, [@CTA_TUPLE_ORIG={0x24, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @broadcast}, {0x8, 0x2, @dev}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_SEQ_ADJ_REPLY={0x4}]}, 0x3c}}, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r3, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000000)={0x3c, 0x0, 0x1, 0x409, 0x0, 0x0, {}, [@CTA_TUPLE_ORIG={0x24, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @broadcast}, {0x8, 0x2, @dev}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_SEQ_ADJ_REPLY={0x4}]}, 0x3c}}, 0x0) r4 = dup2(r0, r3) r5 = socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000300)='nl80211\x00') sendmsg$NL80211_CMD_JOIN_MESH(r5, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000180)={0x3c, r6, 0x1, 0x0, 0x0, {}, [@NL80211_ATTR_BSS_BASIC_RATES={0x25, 0x24, "5eb943d1332a264ddfc632b1b9ee320e50e18f9e69c21de0c0623eef81daa25d48"}]}, 0x3c}}, 0x0) sendmsg$NL80211_CMD_TRIGGER_SCAN(r4, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f00000000c0)={&(0x7f0000000040)={0x14, r6, 0x100, 0x70bd2d, 0x25dfdbfc}, 0x14}, 0x1, 0x0, 0x0, 0x20004044}, 0x44090) r7 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r7, 0x5423, &(0x7f0000000080)=0x11) [ 1173.674329] loop3: [POWERTEC] p1 p2 p3 p4 p5 p6 p7 p8 p9 p10 p11 p12 [ 1173.703111] loop3: p1 start 233194046 is beyond EOD, truncated [ 1173.739130] loop3: p2 start 3569653895 is beyond EOD, truncated [ 1173.787585] loop3: p3 start 926682669 is beyond EOD, truncated [ 1173.815007] loop3: p4 start 1263303888 is beyond EOD, truncated [ 1173.819525] IPVS: ftp: loaded support on port[0] = 21 [ 1173.839833] loop3: p5 start 1281279881 is beyond EOD, truncated [ 1173.858990] loop3: p6 start 3452787639 is beyond EOD, truncated [ 1173.873377] loop3: p7 start 2263908108 is beyond EOD, truncated [ 1173.899445] loop3: p8 start 1970859340 is beyond EOD, truncated [ 1173.944695] loop3: p9 start 1782333214 is beyond EOD, truncated [ 1173.985350] loop3: p10 start 1751982490 is beyond EOD, truncated [ 1174.009916] loop3: p11 start 3605249017 is beyond EOD, truncated [ 1174.067305] loop3: p12 start 2400178403 is beyond EOD, truncated 08:54:46 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_read_part_table(0xfdffffff, 0x2, &(0x7f0000002640)=[{0x0, 0x0, 0xfffffffffffffff7}, {&(0x7f0000001540)="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", 0x1e0}]) [ 1174.395013] loop3: [POWERTEC] p1 p2 p3 p4 p5 p6 p7 p8 p9 p10 p11 p12 [ 1174.409061] loop3: p1 start 233194046 is beyond EOD, truncated [ 1174.454185] loop3: p2 start 3569653895 is beyond EOD, truncated 08:54:46 executing program 0: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$SG_GET_SCSI_ID(r1, 0x2276, &(0x7f0000000000)) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000080)=0x11) [ 1174.505133] loop3: p3 start 926682669 is beyond EOD, truncated 08:54:46 executing program 5: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000000)=0x3) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r2, 0x40047438, &(0x7f0000000180)=""/246) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r3, 0x0) ioctl$PPPIOCSFLAGS1(r2, 0x80047453, &(0x7f00000000c0)) [ 1174.545339] loop3: p4 start 1263303888 is beyond EOD, truncated [ 1174.584194] loop3: p5 start 1281279881 is beyond EOD, truncated [ 1174.617253] loop3: p6 start 3452787639 is beyond EOD, truncated [ 1174.654822] loop3: p7 start 2263908108 is beyond EOD, truncated [ 1174.677758] loop3: p8 start 1970859340 is beyond EOD, truncated [ 1174.694767] IPVS: ftp: loaded support on port[0] = 21 [ 1174.708926] loop3: p9 start 1782333214 is beyond EOD, truncated [ 1174.734665] loop3: p10 start 1751982490 is beyond EOD, truncated [ 1174.757156] loop3: p11 start 3605249017 is beyond EOD, truncated [ 1174.793229] loop3: p12 start 2400178403 is beyond EOD, truncated 08:54:48 executing program 1: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) syz_mount_image$nfs(&(0x7f0000000100)='nfs\x00', &(0x7f0000000140)='./file0\x00', 0x100, 0x2, &(0x7f0000000380)=[{0x0, 0x0, 0x1ff}, {&(0x7f00000002c0)="3b758f247a024d95ca50878d75f527a340777e1a0b2ed5f85df5d1ea171eec8b53f713593c61c82df1ad4e85a4de994d7fcc5e54925d6b28764e9f57787e5aa7c5b12bf2ad45e4aa4fa150f84988b853dcc6d3206c7ba80f78c3f9bf10f4bafd98800341c269880a274dbc298ecac74ff89749b53f9fbb945c2a3aa38159e5d3732a7deb8f6e4a0b66ba8fb10f10ea79a0c0", 0x92, 0x8}], 0x44420, &(0x7f00000003c0)='^\x00') r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000000)=0x3) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r1, 0x40047438, &(0x7f0000000180)=""/246) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r2, &(0x7f0000000040)=ANY=[], 0xfea7) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r2, 0x0) ioctl$PPPIOCSFLAGS1(r1, 0x40047457, &(0x7f00000000c0)) ioctl$SNDRV_TIMER_IOCTL_STOP(r2, 0x54a1) 08:54:48 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_read_part_table(0xff0f0000, 0x2, &(0x7f0000002640)=[{0x0, 0x0, 0xfffffffffffffff7}, {&(0x7f0000001540)="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", 0x1e0}]) 08:54:48 executing program 0: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) socket$netlink(0x10, 0x3, 0xc) r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000080)=0x11) 08:54:48 executing program 2: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000000)=0x3) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r3 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r3, 0x40047438, &(0x7f0000000180)=""/246) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) r5 = socket$inet6(0xa, 0x2, 0x0) r6 = dup(r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) ioctl$KVM_GET_CLOCK(r6, 0x8030ae7c, &(0x7f0000000100)) write$binfmt_script(r4, &(0x7f0000000040)=ANY=[], 0xfea7) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r4, 0x0) ioctl$PPPIOCSFLAGS1(r3, 0x40047457, &(0x7f00000000c0)) sendmsg$can_bcm(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000440), 0x10, &(0x7f0000000140)={&(0x7f0000000500)={0x4, 0x1, 0x0, {0x0, 0x2710}, {}, {}, 0x1, @can={{}, 0x0, 0x0, 0x0, 0x0, "a4ef08f666c5d148"}}, 0x48}}, 0x0) sendmsg$TCPDIAG_GETSOCK(r4, &(0x7f0000000400)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f00000003c0)={&(0x7f00000002c0)={0xf8, 0x12, 0x20, 0x70bd2d, 0x25dfdbfd, {0x5, 0x6, 0xff, 0x5, {0x4e23, 0x4e21, [0x5, 0x5, 0x5, 0x1000], [0x80000001, 0xffffffff, 0xfffffc01, 0xfffffe00], 0x0, [0x6, 0x3]}, 0xffff, 0x9}, [@INET_DIAG_REQ_BYTECODE={0x1e, 0x1, "932c159580de7ed86dc85a9db305f0de45729eb996117a0a8079"}, @INET_DIAG_REQ_BYTECODE={0x31, 0x1, "9cd6a00bde6b664912f8815e21561971f0a545764bc1d21025f5396bd21e840fe16ee0fd457ec7147696fd3c06"}, @INET_DIAG_REQ_BYTECODE={0x57, 0x1, "074ff57dd9beec9e9746daf06ae3c534ac605648c1415ed769ecb665b28fc9ee35933c2aad0cdd96fce2e8f38c525f5285f05e50d18478458edaaeaa010d4395789d5f3e919b762aaefbbc59709f57b85c3674"}]}, 0xf8}, 0x1, 0x0, 0x0, 0x4000054}, 0x20000800) 08:54:48 executing program 5: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000000)=0x3) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r2, 0x40047438, &(0x7f0000000180)=""/246) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r3, 0x0) ioctl$PPPIOCSFLAGS1(r2, 0x80047453, &(0x7f00000000c0)) 08:54:48 executing program 4: unshare(0x40000000) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000000)=0x3) r1 = socket$inet6(0xa, 0x800, 0xfffffffc) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r3 = openat$null(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/null\x00', 0x60040, 0x0) ioctl$VHOST_SET_VRING_CALL(0xffffffffffffffff, 0x4008af21, &(0x7f00000003c0)={0x1, r3}) ioctl$IOC_PR_RESERVE(r2, 0x401070c9, &(0x7f0000000080)={0x8735, 0xd2}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000cc0)={0xffffffffffffffff, 0xe1, &(0x7f0000000c00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=0x8001, 0x0, 0x0, 0x0, &(0x7f0000000b00)={0x9, 0x4}, 0x0, 0x0, &(0x7f0000000ac0)={0x0, 0x0, 0x0, 0x5}, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000bc0)=0x1}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x19, 0x2, &(0x7f0000000380)=ANY=[@ANYBLOB="8510000000000000caa8f0fff7b55a356e3449a90f2722de60248b219d1a07013e4e472d87f0d8d7155ed6d4eacbb9c57e7a500ce75ba3dd465334"], &(0x7f0000000840)='syzkaller\x00', 0x3, 0x0, 0x0, 0x40f00, 0x0, [], 0x0, 0x9, 0xffffffffffffffff, 0x8, &(0x7f0000000140)={0x2, 0x1}, 0x8, 0x10, &(0x7f00000008c0)={0x1, 0x7, 0x80000000, 0x2}, 0x10, r4}, 0x78) r5 = socket$inet6(0xa, 0x2, 0x0) r6 = dup(r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x61680, 0x8, [], 0x0, 0x3, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, r4, r6}, 0x78) r7 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x200000, 0x0) ioctl$EVIOCGPROP(r7, 0x40047438, &(0x7f0000000180)=""/246) ioctl$PPPIOCSFLAGS1(r7, 0x40047457, &(0x7f00000000c0)) openat$vsock(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vsock\x00', 0x800, 0x0) [ 1176.709355] IPVS: ftp: loaded support on port[0] = 21 [ 1176.719021] IPVS: ftp: loaded support on port[0] = 21 [ 1176.730724] IPVS: ftp: loaded support on port[0] = 21 [ 1176.735692] IPVS: ftp: loaded support on port[0] = 21 [ 1176.794705] loop3: [POWERTEC] p1 p2 p3 p4 p5 p6 p7 p8 p9 p10 p11 p12 [ 1176.810936] loop3: p1 start 233194046 is beyond EOD, truncated 08:54:49 executing program 0: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ttyS3\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x5402, &(0x7f00000000c0)={0x0, 0x0, 0xf843, 0x0, 0x0, "79e9de3d80a657aa9481d73875106c5eba1ada"}) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ttyS3\x00', 0x0, 0x0) ioctl$TCSETS(r3, 0x5402, &(0x7f00000000c0)={0x0, 0x0, 0xf843, 0x0, 0x0, "79e9de3d80a657aa9481d73875106c5eba1ada"}) ioctl$TIOCSETD(r3, 0x5423, &(0x7f0000000080)=0x5) syz_open_dev$ttys(0xc, 0x2, 0x0) [ 1176.868428] loop3: p2 start 3569653895 is beyond EOD, truncated [ 1176.904636] loop3: p3 start 926682669 is beyond EOD, truncated [ 1176.957209] loop3: p4 start 1263303888 is beyond EOD, truncated [ 1176.997536] loop3: p5 start 1281279881 is beyond EOD, truncated [ 1177.027121] loop3: p6 start 3452787639 is beyond EOD, truncated [ 1177.075535] loop3: p7 start 2263908108 is beyond EOD, truncated [ 1177.112671] IPVS: ftp: loaded support on port[0] = 21 [ 1177.117988] loop3: p8 start 1970859340 is beyond EOD, truncated [ 1177.118006] loop3: p9 start 1782333214 is beyond EOD, truncated [ 1177.143765] mkiss: ax0: crc mode is auto. [ 1177.177106] loop3: p10 start 1751982490 is beyond EOD, truncated 08:54:49 executing program 0: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) pipe2(&(0x7f0000000000)={0xffffffffffffffff}, 0x4000) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000080)=0x7) [ 1177.221514] loop3: p11 start 3605249017 is beyond EOD, truncated [ 1177.250678] loop3: p12 start 2400178403 is beyond EOD, truncated 08:54:49 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_read_part_table(0xff3f0000, 0x2, &(0x7f0000002640)=[{0x0, 0x0, 0xfffffffffffffff7}, {&(0x7f0000001540)="c2ec123b097b69be3e42e60d3f03ff5b20b3406e8d7eebd2456f5388ad7135b73efb98088798c4d4506cd2295e60b5e9f9f2399833ad179a03e098e07644033f2d0e3c37a84095cdde0312f1d81191a92ccbe761424e7d3033a056d7d07c4c4bc2dbbb00079ae5158b76bed5cdd1d93054fff6874b43ef1289c75e4c9b911d69313cbc4e0abcab496b4ce2c83f238a2b30fc8210b75bcdcd0b774ac467962cc4389843f92f418b0718a87f17ae20f1790c7ff086746847e2217207cede6d2af2a58d7148128b2f86806b3be24ced787543219ae633ab66b7828c5bfd87571ee33ab89138401439491e3f3c6a4a56b4bf8a7d532ee9144977f6ac8fae105ab358e231f2cd9a216d68b0877161e158b14837fb1426f4a629f17ddd7bbf9019941ff9bbe3d6fd30d68dbd9e3b3cfb282bc08db959b660ed8f7ebc67714be3d00f8f1e2cbc9404069335265ce12996f7cb48c1f3221f7f892493e4711a6dbd79a0298e0e0b9936b06a3d08821f558f5738b05e2ead126157186dac58de8a7098291efacb6666b2dca73d422fbf6a09b30f3c30cc9e34faa453ef1d770f7008b7c54d644be9716b27aa40b67126130b61c29a254a578365216655e8a5c6955e72fb67e6f1796e499edcaa33e0b43bd172d9977deff713978907e12189743913c7c847", 0x1e0}]) 08:54:49 executing program 4: unshare(0x40000000) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000000)=0x3) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x5, [], 0x0, 0x19, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r1, 0x40047438, &(0x7f0000000180)=""/246) ioctl$PPPIOCSFLAGS1(r1, 0x40047457, &(0x7f00000000c0)) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$SCSI_IOCTL_DOORUNLOCK(r3, 0x5381) r4 = socket(0x1000000010, 0x80002, 0x0) sendmmsg$alg(r4, &(0x7f0000000200), 0x10efe10675dec16, 0x0) sendmsg$unix(r4, &(0x7f00000004c0)={&(0x7f0000000100)=@abs={0x1, 0x0, 0x4e24}, 0x6e, &(0x7f0000000080)=[{&(0x7f00000002c0)="5f3821cc09ee985f172e7efe2aa7fe0cdb6dc1a2383609c39df82f5d8f9856cc46682b165a5af3ac22a9eeed39921f6614d5e458ad76292c0943973c2d3d091790a7780f5851020131e245", 0x4b}, {&(0x7f0000000340)="b6d762c2c372978e1b6a01df7b91a7bc8eb795bc8a2c2ded578bfd23f2ce995503a54250a46460a04e1caed7b485434790932c899f9034b2ce622e3cb8f620e15e88e5b1efda6d77bd8be8a7a60d271ba4f3b22c4e1fc65abfdcf21b407098eb26aa9fdd28d05198882b477d5a6dedb54af58e06e852962abf2dc1d95e5dedc6e9bd99982d13761ad44fbc47c7ab70eb13f9048e4f94da394a2ed1a98dee12ccf31d9be367aeed6c54cd739140cd11a3a54af40de77635836a82213c64bd3e555588df80738f23150837b10a22ffd1692cd973efc2e9208fb6a31ce5f27558aa7f45bfe0c77fd637a376a746b5293f58c5de4a236a", 0xf5}, {&(0x7f0000000440)="41a276022e27da730795f601f6f865042870bd828c5e906ec9d00a14e535435d8ac7a98ae83b3ecf336872231e1ae538b9f091f8d9c4f816cabbf10bfeab1038a387ed2524dafcfbbb503c1e77bb00f680b2e2c0c2e4e0421fd54b0d6878df9e7889a2294a", 0x65}], 0x3, 0x0, 0x0, 0x40880}, 0x4000) 08:54:49 executing program 0: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000000)=0x3) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r2, 0x40047438, &(0x7f0000000180)=""/246) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r3, 0x0) ioctl$PPPIOCSFLAGS1(r2, 0x80047453, &(0x7f00000000c0)) [ 1177.528825] IPVS: ftp: loaded support on port[0] = 21 [ 1177.598050] loop3: [POWERTEC] p1 p2 p3 p4 p5 p6 p7 p8 p9 p10 p11 p12 [ 1177.623484] loop3: p1 start 233194046 is beyond EOD, truncated [ 1177.653775] IPVS: ftp: loaded support on port[0] = 21 [ 1177.683596] loop3: p2 start 3569653895 is beyond EOD, truncated [ 1177.704191] IPVS: ftp: loaded support on port[0] = 21 [ 1177.716312] IPVS: ftp: loaded support on port[0] = 21 08:54:49 executing program 5: unshare(0x40000000) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000000)=0x3) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r3 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r3, 0x40047438, &(0x7f0000000180)=""/246) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r4, 0x0) ioctl$PPPIOCSFLAGS1(r3, 0x80047453, &(0x7f00000000c0)) [ 1177.728753] loop3: p3 start 926682669 is beyond EOD, truncated [ 1177.786842] loop3: p4 start 1263303888 is beyond EOD, truncated [ 1177.830936] loop3: p5 start 1281279881 is beyond EOD, truncated [ 1177.883754] loop3: p6 start 3452787639 is beyond EOD, truncated [ 1177.902722] IPVS: ftp: loaded support on port[0] = 21 [ 1177.940570] loop3: p7 start 2263908108 is beyond EOD, truncated [ 1178.015074] loop3: p8 start 1970859340 is beyond EOD, truncated [ 1178.070961] loop3: p9 start 1782333214 is beyond EOD, truncated [ 1178.109341] loop3: p10 start 1751982490 is beyond EOD, truncated [ 1178.150209] loop3: p11 start 3605249017 is beyond EOD, truncated [ 1178.192019] loop3: p12 start 2400178403 is beyond EOD, truncated [ 1178.208511] IPVS: ftp: loaded support on port[0] = 21 08:54:50 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_read_part_table(0xffffff7f, 0x2, &(0x7f0000002640)=[{0x0, 0x0, 0xfffffffffffffff7}, {&(0x7f0000001540)="c2ec123b097b69be3e42e60d3f03ff5b20b3406e8d7eebd2456f5388ad7135b73efb98088798c4d4506cd2295e60b5e9f9f2399833ad179a03e098e07644033f2d0e3c37a84095cdde0312f1d81191a92ccbe761424e7d3033a056d7d07c4c4bc2dbbb00079ae5158b76bed5cdd1d93054fff6874b43ef1289c75e4c9b911d69313cbc4e0abcab496b4ce2c83f238a2b30fc8210b75bcdcd0b774ac467962cc4389843f92f418b0718a87f17ae20f1790c7ff086746847e2217207cede6d2af2a58d7148128b2f86806b3be24ced787543219ae633ab66b7828c5bfd87571ee33ab89138401439491e3f3c6a4a56b4bf8a7d532ee9144977f6ac8fae105ab358e231f2cd9a216d68b0877161e158b14837fb1426f4a629f17ddd7bbf9019941ff9bbe3d6fd30d68dbd9e3b3cfb282bc08db959b660ed8f7ebc67714be3d00f8f1e2cbc9404069335265ce12996f7cb48c1f3221f7f892493e4711a6dbd79a0298e0e0b9936b06a3d08821f558f5738b05e2ead126157186dac58de8a7098291efacb6666b2dca73d422fbf6a09b30f3c30cc9e34faa453ef1d770f7008b7c54d644be9716b27aa40b67126130b61c29a254a578365216655e8a5c6955e72fb67e6f1796e499edcaa33e0b43bd172d9977deff713978907e12189743913c7c847", 0x1e0}]) 08:54:50 executing program 5: unshare(0x40000000) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000000)=0x3) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r3 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r3, 0x40047438, &(0x7f0000000180)=""/246) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r4, 0x0) ioctl$PPPIOCSFLAGS1(r3, 0x80047453, &(0x7f00000000c0)) 08:54:50 executing program 2: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000000)=0x3) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r3 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r3, 0x40047438, &(0x7f0000000180)=""/246) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r4, &(0x7f0000000040)=ANY=[], 0xfea7) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r4, 0x0) ioctl$PPPIOCSFLAGS1(r3, 0x40047457, &(0x7f00000000c0)) r5 = socket(0x1000000010, 0x80002, 0x0) sendmmsg$alg(r5, &(0x7f0000000200), 0x10efe10675dec16, 0x0) setsockopt$XDP_RX_RING(r5, 0x11b, 0x2, &(0x7f0000000100)=0x20, 0x4) 08:54:50 executing program 4: unshare(0x40000000) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000000)=0x3) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r1, 0x40047438, &(0x7f0000000180)=""/246) ioctl$PPPIOCSFLAGS1(r1, 0x40047457, &(0x7f00000000c0)) r2 = socket(0x1000000010, 0x80002, 0x0) sendmmsg$alg(r2, &(0x7f0000000200), 0x10efe10675dec16, 0x0) r3 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r4, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(0xffffffffffffffff, 0x84, 0x71, &(0x7f00000000c0)={r5}, &(0x7f0000000080)=0x18) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r3, 0x84, 0x66, &(0x7f0000000040)={r5, 0xfffffffe}, &(0x7f0000000080)=0x8) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(r2, 0x84, 0x1b, &(0x7f00000002c0)={r5, 0xa3, "90d14fa2644b9c010d0ea17832b4cfa1ee9d621123c3e5f93cc000813fbcf62d32ed31bbe1c2f39e498f89c08b6c6e37c20977e18dc94f851d79ebdf6c1862f00d073a3bbe9595d14950aad45bcacb8c7378e21c4b999cf00fcd398f1872c05e6f6ab773b99a9108ed77f6430941e5c23975512ddb3a56fb6a49c26cbbf274fd64d213e486a8c4ec835400921445657bacd24aa54843523f194641fb9501fb83ba1f94"}, &(0x7f0000000080)=0xab) 08:54:50 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000080)=0x11) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x40, 0x0) setsockopt$inet6_group_source_req(r1, 0x29, 0x2c, &(0x7f00000000c0)={0xb316, {{0xa, 0x4e23, 0x9, @local, 0xffff}}, {{0xa, 0x4e20, 0x9, @dev={0xfe, 0x80, [], 0x36}, 0x3}}}, 0x108) 08:54:50 executing program 1: unshare(0x40000000) r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) ioctl$FS_IOC_GETFSMAP(r0, 0xc0c0583b, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, [], [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x10]}]}) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000000)=0x3) getsockopt$inet_sctp6_SCTP_NODELAY(r0, 0x84, 0x3, &(0x7f0000000340), &(0x7f0000000380)=0x4) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x0, 0x0, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r2, 0x40047438, &(0x7f0000000180)=""/246) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r3, &(0x7f0000000040)=ANY=[], 0xfea7) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r4, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000000)={0x3c, 0x0, 0x1, 0x409, 0x0, 0x0, {}, [@CTA_TUPLE_ORIG={0x24, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @broadcast}, {0x8, 0x2, @dev}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_SEQ_ADJ_REPLY={0x4}]}, 0x3c}}, 0x0) fcntl$dupfd(r4, 0x0, 0xffffffffffffffff) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r3, 0x0) ioctl$PPPIOCSFLAGS1(r2, 0x40047457, &(0x7f00000000c0)) [ 1178.750693] IPVS: ftp: loaded support on port[0] = 21 [ 1178.765346] IPVS: ftp: loaded support on port[0] = 21 [ 1178.781861] IPVS: ftp: loaded support on port[0] = 21 [ 1178.795003] loop3: [POWERTEC] p1 p2 p3 p4 p5 p6 p7 p8 p9 p10 p11 p12 [ 1178.814616] IPVS: ftp: loaded support on port[0] = 21 [ 1178.819900] loop3: p1 start 233194046 is beyond EOD, truncated [ 1178.852489] loop3: p2 start 3569653895 is beyond EOD, truncated [ 1178.876288] loop3: p3 start 926682669 is beyond EOD, truncated [ 1178.945237] loop3: p4 start 1263303888 is beyond EOD, truncated [ 1178.976345] loop3: p5 start 1281279881 is beyond EOD, truncated 08:54:51 executing program 0: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000000)=0x3) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r1, 0x40047438, &(0x7f0000000180)=""/246) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r2, 0x0) ioctl$PPPIOCSFLAGS1(r1, 0x80047453, &(0x7f00000000c0)) [ 1179.028982] loop3: p6 start 3452787639 is beyond EOD, truncated [ 1179.052534] loop3: p7 start 2263908108 is beyond EOD, truncated [ 1179.072511] loop3: p8 start 1970859340 is beyond EOD, truncated [ 1179.101614] loop3: p9 start 1782333214 is beyond EOD, truncated [ 1179.129559] loop3: p10 start 1751982490 is beyond EOD, truncated [ 1179.163019] loop3: p11 start 3605249017 is beyond EOD, truncated [ 1179.192419] loop3: p12 start 2400178403 is beyond EOD, truncated [ 1179.220137] IPVS: ftp: loaded support on port[0] = 21 [ 1179.224747] IPVS: ftp: loaded support on port[0] = 21 08:54:51 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_read_part_table(0xffffff97, 0x2, &(0x7f0000002640)=[{0x0, 0x0, 0xfffffffffffffff7}, {&(0x7f0000001540)="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", 0x1e0}]) 08:54:51 executing program 5: unshare(0x40000000) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000000)=0x3) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r3 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r3, 0x40047438, &(0x7f0000000180)=""/246) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r4, 0x0) ioctl$PPPIOCSFLAGS1(r3, 0x80047453, &(0x7f00000000c0)) [ 1179.427380] IPVS: ftp: loaded support on port[0] = 21 [ 1179.463756] IPVS: ftp: loaded support on port[0] = 21 [ 1179.506395] loop3: [POWERTEC] p1 p2 p3 p4 p5 p6 p7 p8 p9 p10 p11 p12 [ 1179.513498] loop3: p1 start 233194046 is beyond EOD, truncated [ 1179.580851] loop3: p2 start 3569653895 is beyond EOD, truncated [ 1179.606695] IPVS: ftp: loaded support on port[0] = 21 [ 1179.620572] loop3: p3 start 926682669 is beyond EOD, truncated [ 1179.687972] loop3: p4 start 1263303888 is beyond EOD, truncated [ 1179.739120] loop3: p5 start 1281279881 is beyond EOD, truncated [ 1179.771646] loop3: p6 start 3452787639 is beyond EOD, truncated [ 1179.815100] loop3: p7 start 2263908108 is beyond EOD, truncated [ 1179.846752] loop3: p8 start 1970859340 is beyond EOD, truncated [ 1179.875167] loop3: p9 start 1782333214 is beyond EOD, truncated [ 1179.907540] loop3: p10 start 1751982490 is beyond EOD, truncated 08:54:52 executing program 5: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000000)=0x3) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r3 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r3, 0x40047438, &(0x7f0000000180)=""/246) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r4, 0x0) ioctl$PPPIOCSFLAGS1(r3, 0x80047453, &(0x7f00000000c0)) [ 1179.935044] loop3: p11 start 3605249017 is beyond EOD, truncated [ 1179.963725] loop3: p12 start 2400178403 is beyond EOD, truncated 08:54:52 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_read_part_table(0xfffffff5, 0x2, &(0x7f0000002640)=[{0x0, 0x0, 0xfffffffffffffff7}, {&(0x7f0000001540)="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", 0x1e0}]) [ 1180.207178] loop3: [POWERTEC] p1 p2 p3 p4 p5 p6 p7 p8 p9 p10 p11 p12 [ 1180.223674] loop3: p1 start 233194046 is beyond EOD, truncated [ 1180.251267] loop3: p2 start 3569653895 is beyond EOD, truncated [ 1180.281320] loop3: p3 start 926682669 is beyond EOD, truncated 08:54:52 executing program 0: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000000)=0x3) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r3 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r3, 0x40047438, &(0x7f0000000180)=""/246) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r4, &(0x7f0000000040)=ANY=[], 0xfea7) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r4, 0x0) ioctl$PPPIOCSFLAGS1(r3, 0x40047457, &(0x7f00000000c0)=0x40000000) [ 1180.310271] loop3: p4 start 1263303888 is beyond EOD, truncated [ 1180.338401] loop3: p5 start 1281279881 is beyond EOD, truncated 08:54:52 executing program 2: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000000)=0x3) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r3 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r3, 0x40047438, &(0x7f0000000180)=""/246) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r4, &(0x7f0000000040)=ANY=[], 0xfea7) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r4, 0x0) ioctl$PPPIOCSFLAGS1(r3, 0x40047457, &(0x7f00000000c0)) r5 = socket$inet6(0xa, 0x2, 0x0) r6 = dup(r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) read$char_usb(r6, &(0x7f00000002c0)=""/213, 0xd5) [ 1180.376086] loop3: p6 start 3452787639 is beyond EOD, truncated [ 1180.400949] loop3: p7 start 2263908108 is beyond EOD, truncated [ 1180.434737] loop3: p8 start 1970859340 is beyond EOD, truncated [ 1180.460692] IPVS: ftp: loaded support on port[0] = 21 [ 1180.469798] loop3: p9 start 1782333214 is beyond EOD, truncated [ 1180.498955] loop3: p10 start 1751982490 is beyond EOD, truncated [ 1180.542782] loop3: p11 start 3605249017 is beyond EOD, truncated [ 1180.553176] IPVS: ftp: loaded support on port[0] = 21 [ 1180.583426] loop3: p12 start 2400178403 is beyond EOD, truncated 08:54:52 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_read_part_table(0xfffffffd, 0x2, &(0x7f0000002640)=[{0x0, 0x0, 0xfffffffffffffff7}, {&(0x7f0000001540)="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", 0x1e0}]) [ 1180.875264] loop3: [POWERTEC] p1 p2 p3 p4 p5 p6 p7 p8 p9 p10 p11 p12 [ 1180.886863] loop3: p1 start 233194046 is beyond EOD, truncated [ 1180.909391] loop3: p2 start 3569653895 is beyond EOD, truncated 08:54:53 executing program 5: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000000)=0x3) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r3 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r3, 0x40047438, &(0x7f0000000180)=""/246) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r4, 0x0) ioctl$PPPIOCSFLAGS1(r3, 0x80047453, &(0x7f00000000c0)) [ 1180.932045] loop3: p3 start 926682669 is beyond EOD, truncated [ 1180.954594] loop3: p4 start 1263303888 is beyond EOD, truncated [ 1180.991805] loop3: p5 start 1281279881 is beyond EOD, truncated [ 1181.030301] loop3: p6 start 3452787639 is beyond EOD, truncated [ 1181.051206] loop3: p7 start 2263908108 is beyond EOD, truncated [ 1181.083146] loop3: p8 start 1970859340 is beyond EOD, truncated [ 1181.112575] loop3: p9 start 1782333214 is beyond EOD, truncated [ 1181.142489] loop3: p10 start 1751982490 is beyond EOD, truncated [ 1181.171393] loop3: p11 start 3605249017 is beyond EOD, truncated [ 1181.200642] loop3: p12 start 2400178403 is beyond EOD, truncated [ 1181.323363] IPVS: ftp: loaded support on port[0] = 21 08:54:54 executing program 4: unshare(0x40000000) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) r1 = socket(0x1000000010, 0x80002, 0x0) sendmmsg$alg(r1, &(0x7f0000000200), 0x10efe10675dec16, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendmsg$RDMA_NLDEV_CMD_SYS_SET(r1, &(0x7f00000002c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x40, 0x1407, 0x300, 0x70bd28, 0x25dfdbfd, "", [@RDMA_NLDEV_ATTR_DEV_DIM={0x5, 0x54, 0x1}, @RDMA_NLDEV_ATTR_DEV_INDEX={0x8, 0x1, 0x1}, @RDMA_NLDEV_NET_NS_FD={0x8, 0x44, r3}, @RDMA_NLDEV_ATTR_DEV_INDEX={0x8}, @RDMA_NLDEV_ATTR_DEV_INDEX={0x8, 0x1, 0x1}, @RDMA_NLDEV_ATTR_DEV_DIM={0x5}]}, 0x40}, 0x1, 0x0, 0x0, 0x10}, 0x40) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000000)=0x3) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r4 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r4, 0x40047438, &(0x7f0000000180)=""/246) ioctl$PPPIOCSFLAGS1(r4, 0x40047457, &(0x7f00000000c0)) socket$inet6(0xa, 0x2, 0x0) r5 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$DRM_IOCTL_MODE_RMFB(r5, 0xc00464af, &(0x7f0000000300)=0x10000) 08:54:54 executing program 0: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000000)=0x3) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r3 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r3, 0x40047438, &(0x7f0000000180)=""/246) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r4, &(0x7f0000000040)=ANY=[], 0xfea7) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r4, 0x0) ioctl$PPPIOCSFLAGS1(r3, 0x40047457, &(0x7f00000000c0)) r5 = socket(0x1000000010, 0x80002, 0x0) sendmmsg$alg(r5, &(0x7f0000000200), 0x10efe10675dec16, 0x0) setsockopt$XDP_RX_RING(r5, 0x11b, 0x2, &(0x7f0000000100)=0x20, 0x4) 08:54:54 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_read_part_table(0x1000000000, 0x2, &(0x7f0000002640)=[{0x0, 0x0, 0xfffffffffffffff7}, {&(0x7f0000001540)="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", 0x1e0}]) 08:54:54 executing program 5: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000000)=0x3) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r3 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r3, 0x40047438, &(0x7f0000000180)=""/246) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r4, 0x0) ioctl$PPPIOCSFLAGS1(r3, 0x80047453, &(0x7f00000000c0)) 08:54:54 executing program 2: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400) fsetxattr(0xffffffffffffffff, &(0x7f0000000400)=@random={'osx.', '/dev/ppp\x00'}, &(0x7f0000000440)='rose0\x00', 0x6, 0x1) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000000)=0x3) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r3 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r3, 0x40047438, &(0x7f0000000180)=""/246) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) r5 = open(&(0x7f00000003c0)='./file0\x00', 0x8900, 0x183) r6 = socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000140)='l2tp\x00') sendmsg$L2TP_CMD_TUNNEL_CREATE(r6, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000004c0)=ANY=[@ANYBLOB="4bc8d2ea2642ffa9be08228447cc11b2e9b1088af5b44dc8c1d7bc3ade19cbc3fa536547918331bee70a61262219ff20b9ccd5fa17062bb1427acef5b5cbf279fe0c8971579ccc4a3707c3f3c0bbd91135414769b6f06fee39a7bde400e5edafa058d62791f641d0e86431df934b3030df09cc78ab5849da6d4e04ed773b350415926f03a30faf3a51a40d864af1222e8236e9bbbf5749bca9d4f07aa6e049e4cf", @ANYRES16=r7, @ANYBLOB="17090000000000000000010000000500070000000000080009000000000014002000ff00000000000000000000000000000108000a0000000000060002000000000014001f000000000000000000000000000000000006001a0000000000"], 0x64}}, 0x0) sendmsg$L2TP_CMD_TUNNEL_GET(r5, &(0x7f0000000380)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000340)={&(0x7f00000002c0)={0x50, r7, 0x4, 0x70bd27, 0x25dfdbfd, {}, [@L2TP_ATTR_IFNAME={0x14, 0x8, 'rose0\x00'}, @L2TP_ATTR_RECV_SEQ={0x5}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x2}, @L2TP_ATTR_DEBUG={0x8, 0x11, 0x1}, @L2TP_ATTR_UDP_SPORT={0x6, 0x1a, 0x4e20}]}, 0x50}, 0x1, 0x0, 0x0, 0x4000004}, 0x801) write$binfmt_script(r4, &(0x7f0000000040)=ANY=[], 0xfea7) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r4, 0x0) ioctl$PPPIOCSFLAGS1(r3, 0x40047457, &(0x7f00000000c0)) 08:54:54 executing program 1: unshare(0x20040080) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000000)=0x3) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) r2 = socket(0x1000000010, 0x80002, 0x0) sendmmsg$alg(r2, &(0x7f0000000200), 0x10efe10675dec16, 0x0) r3 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$inet(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r4, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(0xffffffffffffffff, 0x84, 0x71, &(0x7f00000000c0)={r5}, &(0x7f0000000080)=0x18) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r3, 0x84, 0x66, &(0x7f0000000040)={r5, 0xfffffffe}, &(0x7f0000000080)=0x8) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(r2, 0x84, 0x73, &(0x7f0000000100)={r5, 0x6, 0x0, 0x85, 0x4}, &(0x7f0000000140)=0x18) ioctl$EVIOCGPROP(r1, 0x40047438, &(0x7f0000000180)=""/246) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r6, &(0x7f0000000040)=ANY=[], 0xfea7) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r6, 0x0) ioctl$PPPIOCSFLAGS1(r1, 0x40047457, &(0x7f00000000c0)) [ 1182.940476] IPVS: ftp: loaded support on port[0] = 21 [ 1182.971590] IPVS: ftp: loaded support on port[0] = 21 [ 1182.982451] IPVS: ftp: loaded support on port[0] = 21 [ 1182.999661] loop3: [POWERTEC] p1 p2 p3 p4 p5 p6 p7 p8 p9 p10 p11 p12 [ 1183.028507] loop3: p1 start 233194046 is beyond EOD, truncated [ 1183.043793] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=5127 sclass=netlink_route_socket pid=11487 comm=syz-executor.4 [ 1183.073808] loop3: p2 start 3569653895 is beyond EOD, truncated [ 1183.093003] loop3: p3 start 926682669 is beyond EOD, truncated [ 1183.102236] loop3: p4 start 1263303888 is beyond EOD, truncated [ 1183.108912] loop3: p5 start 1281279881 is beyond EOD, truncated [ 1183.115767] loop3: p6 start 3452787639 is beyond EOD, truncated [ 1183.130525] loop3: p7 start 2263908108 is beyond EOD, truncated [ 1183.138724] loop3: p8 start 1970859340 is beyond EOD, truncated [ 1183.145875] loop3: p9 start 1782333214 is beyond EOD, truncated [ 1183.152180] loop3: p10 start 1751982490 is beyond EOD, truncated [ 1183.162749] loop3: p11 start 3605249017 is beyond EOD, truncated [ 1183.172612] loop3: p12 start 2400178403 is beyond EOD, truncated 08:54:55 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_read_part_table(0x1000000000000, 0x2, &(0x7f0000002640)=[{0x0, 0x0, 0xfffffffffffffff7}, {&(0x7f0000001540)="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", 0x1e0}]) [ 1183.409821] IPVS: ftp: loaded support on port[0] = 21 [ 1183.429632] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=5127 sclass=netlink_route_socket pid=11487 comm=syz-executor.4 [ 1183.465387] loop3: [POWERTEC] p1 p2 p3 p4 p5 p6 p7 p8 p9 p10 p11 p12 [ 1183.479398] loop3: p1 start 233194046 is beyond EOD, truncated [ 1183.502663] loop3: p2 start 3569653895 is beyond EOD, truncated [ 1183.527872] loop3: p3 start 926682669 is beyond EOD, truncated [ 1183.550228] loop3: p4 start 1263303888 is beyond EOD, truncated [ 1183.573998] loop3: p5 start 1281279881 is beyond EOD, truncated [ 1183.596863] loop3: p6 start 3452787639 is beyond EOD, truncated [ 1183.619605] loop3: p7 start 2263908108 is beyond EOD, truncated [ 1183.644025] loop3: p8 start 1970859340 is beyond EOD, truncated 08:54:55 executing program 4: unshare(0x40000000) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000000)=0xf) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = openat$cgroup_ro(r3, &(0x7f0000000140)='cpuacct.usage_all\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_NODELAY(r4, 0x84, 0x3, &(0x7f0000000400), &(0x7f0000000440)=0x4) sendmsg$IPCTNL_MSG_CT_NEW(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000340)=ANY=[@ANYBLOB="3c00000000010904000000000000400000000000240001801400018008000100ffffffff08000200ac1414000c000280050001000000000004001080f8755946d34c8ecf8cb68970827b37c14017f61c62a52fe05c0f965bc7343689b0c3425cb504ed71f387743f5cee9851fd0754be35254e38"], 0x3c}}, 0x0) fsetxattr$trusted_overlay_redirect(r1, &(0x7f0000000080)='trusted.overlay.redirect\x00', &(0x7f0000000100)='./file0\x00', 0x8, 0x3) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r5 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r5, 0x40047438, &(0x7f0000000180)=""/246) openat$ion(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/ion\x00', 0x501800, 0x0) ioctl$PPPIOCSFLAGS1(r5, 0x40047457, &(0x7f00000000c0)) [ 1183.683277] loop3: p9 start 1782333214 is beyond EOD, truncated [ 1183.745176] loop3: p10 start 1751982490 is beyond EOD, truncated [ 1183.760420] IPVS: ftp: loaded support on port[0] = 21 08:54:55 executing program 5: unshare(0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000000)=0x3) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r3 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r3, 0x40047438, &(0x7f0000000180)=""/246) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r4, 0x0) ioctl$PPPIOCSFLAGS1(r3, 0x80047453, &(0x7f00000000c0)) [ 1183.789758] loop3: p11 start 3605249017 is beyond EOD, truncated [ 1183.839582] loop3: p12 start 2400178403 is beyond EOD, truncated [ 1183.885713] IPVS: ftp: loaded support on port[0] = 21 08:54:56 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_read_part_table(0x2000000000000, 0x2, &(0x7f0000002640)=[{0x0, 0x0, 0xfffffffffffffff7}, {&(0x7f0000001540)="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", 0x1e0}]) 08:54:56 executing program 0: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000000)=0x3) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r3 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r3, 0x40047438, &(0x7f0000000180)=""/246) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r4, &(0x7f0000000040)=ANY=[], 0xfea7) ioctl$PPPIOCSFLAGS1(r3, 0x80047453, &(0x7f00000000c0)) [ 1184.165925] loop3: [POWERTEC] p1 p2 p3 p4 p5 p6 p7 p8 p9 p10 p11 p12 [ 1184.178512] loop3: p1 start 233194046 is beyond EOD, truncated [ 1184.200697] IPVS: ftp: loaded support on port[0] = 21 [ 1184.201850] loop3: p2 start 3569653895 is beyond EOD, truncated [ 1184.226531] loop3: p3 start 926682669 is beyond EOD, truncated [ 1184.242490] IPVS: ftp: loaded support on port[0] = 21 [ 1184.251567] loop3: p4 start 1263303888 is beyond EOD, truncated [ 1184.286301] loop3: p5 start 1281279881 is beyond EOD, truncated [ 1184.315840] loop3: p6 start 3452787639 is beyond EOD, truncated [ 1184.345645] loop3: p7 start 2263908108 is beyond EOD, truncated [ 1184.378548] loop3: p8 start 1970859340 is beyond EOD, truncated [ 1184.412046] loop3: p9 start 1782333214 is beyond EOD, truncated [ 1184.441865] loop3: p10 start 1751982490 is beyond EOD, truncated [ 1184.464606] loop3: p11 start 3605249017 is beyond EOD, truncated [ 1184.495172] loop3: p12 start 2400178403 is beyond EOD, truncated 08:54:56 executing program 1: unshare(0x70040680) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000000)=0x3) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r1, 0x40047438, &(0x7f0000000180)=""/246) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$SCSI_IOCTL_GET_PCI(r3, 0x5387, &(0x7f0000000100)) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r4, &(0x7f0000000040)=ANY=[], 0xfea7) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r4, 0x0) ioctl$PPPIOCSFLAGS1(r1, 0x40047457, &(0x7f00000000c0)) 08:54:56 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_read_part_table(0x8000000000000, 0x2, &(0x7f0000002640)=[{0x0, 0x0, 0xfffffffffffffff7}, {&(0x7f0000001540)="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", 0x1e0}]) 08:54:56 executing program 5: unshare(0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000000)=0x3) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r3 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r3, 0x40047438, &(0x7f0000000180)=""/246) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r4, 0x0) ioctl$PPPIOCSFLAGS1(r3, 0x80047453, &(0x7f00000000c0)) 08:54:56 executing program 2: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000000)=0x3) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41000, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r3 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r3, 0x40047438, &(0x7f0000000180)=""/246) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r4, &(0x7f0000000040)=ANY=[], 0xfea7) r5 = socket$inet6(0xa, 0x2, 0x0) r6 = inotify_add_watch(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x800) inotify_rm_watch(r4, r6) r7 = dup(r5) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) ioctl$KVM_PPC_ALLOCATE_HTAB(r7, 0xc004aea7, &(0x7f0000000100)=0x7) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r4, 0x0) ioctl$PPPIOCSFLAGS1(r3, 0x40047457, &(0x7f00000000c0)) [ 1184.785055] loop3: [POWERTEC] p1 p2 p3 p4 p5 p6 p7 p8 p9 p10 p11 p12 [ 1184.813992] loop3: p1 start 233194046 is beyond EOD, truncated [ 1184.850938] loop3: p2 start 3569653895 is beyond EOD, truncated [ 1184.881624] loop3: p3 start 926682669 is beyond EOD, truncated [ 1184.926528] loop3: p4 start 1263303888 is beyond EOD, truncated [ 1184.942434] IPVS: ftp: loaded support on port[0] = 21 [ 1184.971248] loop3: p5 start 1281279881 is beyond EOD, truncated [ 1185.007396] loop3: p6 start 3452787639 is beyond EOD, truncated [ 1185.040823] loop3: p7 start 2263908108 is beyond EOD, truncated [ 1185.068224] loop3: p8 start 1970859340 is beyond EOD, truncated [ 1185.102960] loop3: p9 start 1782333214 is beyond EOD, truncated [ 1185.128345] loop3: p10 start 1751982490 is beyond EOD, truncated [ 1185.159081] loop3: p11 start 3605249017 is beyond EOD, truncated [ 1185.184379] loop3: p12 start 2400178403 is beyond EOD, truncated 08:54:57 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_read_part_table(0x10000000000000, 0x2, &(0x7f0000002640)=[{0x0, 0x0, 0xfffffffffffffff7}, {&(0x7f0000001540)="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", 0x1e0}]) [ 1185.477609] loop3: [POWERTEC] p1 p2 p3 p4 p5 p6 p7 p8 p9 p10 p11 p12 [ 1185.500824] loop3: p1 start 233194046 is beyond EOD, truncated [ 1185.520604] loop3: p2 start 3569653895 is beyond EOD, truncated [ 1185.548218] loop3: p3 start 926682669 is beyond EOD, truncated [ 1185.571768] loop3: p4 start 1263303888 is beyond EOD, truncated [ 1185.592973] loop3: p5 start 1281279881 is beyond EOD, truncated [ 1185.613850] loop3: p6 start 3452787639 is beyond EOD, truncated [ 1185.633732] IPVS: ftp: loaded support on port[0] = 21 [ 1185.635061] loop3: p7 start 2263908108 is beyond EOD, truncated 08:54:57 executing program 5: unshare(0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000000)=0x3) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r3 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r3, 0x40047438, &(0x7f0000000180)=""/246) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r4, 0x0) ioctl$PPPIOCSFLAGS1(r3, 0x80047453, &(0x7f00000000c0)) [ 1185.701168] loop3: p8 start 1970859340 is beyond EOD, truncated [ 1185.731797] loop3: p9 start 1782333214 is beyond EOD, truncated [ 1185.771728] loop3: p10 start 1751982490 is beyond EOD, truncated [ 1185.802746] loop3: p11 start 3605249017 is beyond EOD, truncated [ 1185.838198] loop3: p12 start 2400178403 is beyond EOD, truncated 08:54:58 executing program 1: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000000)=0x3) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/schedstat\x00', 0x0, 0x0) ioctl$SNDRV_PCM_IOCTL_START(r1, 0x4142, 0x0) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r2, 0x40047438, &(0x7f0000000180)=""/246) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r3, &(0x7f0000000040)=ANY=[], 0xfea7) r4 = syz_open_dev$vcsu(&(0x7f0000000140)='/dev/vcsu#\x00', 0x2, 0x2100) ioctl$PPPIOCSMAXCID(r4, 0x40047451, &(0x7f00000002c0)=0x9) recvfrom$l2tp(r3, &(0x7f0000000300)=""/227, 0xe3, 0x0, &(0x7f0000000400)={0x2, 0x0, @multicast1}, 0x10) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r3, 0x0) ioctl$PPPIOCSFLAGS1(r2, 0x40047457, &(0x7f00000000c0)) 08:54:58 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_read_part_table(0x100000000000000, 0x2, &(0x7f0000002640)=[{0x0, 0x0, 0xfffffffffffffff7}, {&(0x7f0000001540)="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", 0x1e0}]) [ 1186.143696] IPVS: ftp: loaded support on port[0] = 21 [ 1186.355342] loop3: [POWERTEC] p1 p2 p3 p4 p5 p6 p7 p8 p9 p10 p11 p12 [ 1186.370332] loop3: p1 start 233194046 is beyond EOD, truncated [ 1186.398182] loop3: p2 start 3569653895 is beyond EOD, truncated [ 1186.424773] loop3: p3 start 926682669 is beyond EOD, truncated [ 1186.440244] loop3: p4 start 1263303888 is beyond EOD, truncated [ 1186.460782] loop3: p5 start 1281279881 is beyond EOD, truncated [ 1186.491581] loop3: p6 start 3452787639 is beyond EOD, truncated [ 1186.539518] loop3: p7 start 2263908108 is beyond EOD, truncated [ 1186.571157] loop3: p8 start 1970859340 is beyond EOD, truncated [ 1186.600985] loop3: p9 start 1782333214 is beyond EOD, truncated [ 1186.628757] loop3: p10 start 1751982490 is beyond EOD, truncated [ 1186.656308] loop3: p11 start 3605249017 is beyond EOD, truncated [ 1186.687857] loop3: p12 start 2400178403 is beyond EOD, truncated [ 1186.796504] IPVS: ftp: loaded support on port[0] = 21 08:55:00 executing program 4: unshare(0x40000000) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000000)=0x3) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r1, 0x40047438, &(0x7f0000000180)=""/246) ioctl$PPPIOCSFLAGS1(r1, 0x40047457, &(0x7f0000000080)=0x20) r2 = socket(0x1000000010, 0x80002, 0x0) sendmmsg$alg(r2, &(0x7f0000000200), 0x10efe10675dec16, 0x0) getsockopt$TIPC_DEST_DROPPABLE(r2, 0x10f, 0x81, &(0x7f00000000c0), &(0x7f0000000100)=0x4) 08:55:00 executing program 5: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000000)=0x3) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r3 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r3, 0x40047438, &(0x7f0000000180)=""/246) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r4, 0x0) ioctl$PPPIOCSFLAGS1(r3, 0x80047453, &(0x7f00000000c0)) 08:55:00 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_read_part_table(0x200000000000000, 0x2, &(0x7f0000002640)=[{0x0, 0x0, 0xfffffffffffffff7}, {&(0x7f0000001540)="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", 0x1e0}]) [ 1188.348925] IPVS: ftp: loaded support on port[0] = 21 [ 1188.372514] IPVS: ftp: loaded support on port[0] = 21 [ 1188.424759] loop3: [POWERTEC] p1 p2 p3 p4 p5 p6 p7 p8 p9 p10 p11 p12 [ 1188.437485] loop3: p1 start 233194046 is beyond EOD, truncated [ 1188.443474] loop3: p2 start 3569653895 is beyond EOD, truncated [ 1188.449940] loop3: p3 start 926682669 is beyond EOD, truncated [ 1188.464398] loop3: p4 start 1263303888 is beyond EOD, truncated [ 1188.478701] loop3: p5 start 1281279881 is beyond EOD, truncated [ 1188.513373] loop3: p6 start 3452787639 is beyond EOD, truncated [ 1188.544720] loop3: p7 start 2263908108 is beyond EOD, truncated [ 1188.550840] loop3: p8 start 1970859340 is beyond EOD, truncated [ 1188.614420] loop3: p9 start 1782333214 is beyond EOD, truncated [ 1188.620525] loop3: p10 start 1751982490 is beyond EOD, truncated [ 1188.632919] IPVS: ftp: loaded support on port[0] = 21 [ 1188.645166] loop3: p11 start 3605249017 is beyond EOD, truncated [ 1188.674791] loop3: p12 start 2400178403 is beyond EOD, truncated 08:55:01 executing program 0: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000000)=0x3) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r3 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r3, 0x40047438, &(0x7f0000000180)=""/246) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r4, &(0x7f0000000040)=ANY=[], 0xfea7) ioctl$PPPIOCSFLAGS1(r3, 0x80047453, &(0x7f00000000c0)) 08:55:01 executing program 5: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000000)=0x3) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r3 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r3, 0x40047438, &(0x7f0000000180)=""/246) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r4, 0x0) ioctl$PPPIOCSFLAGS1(r3, 0x80047453, &(0x7f00000000c0)) 08:55:01 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_read_part_table(0x300000000000000, 0x2, &(0x7f0000002640)=[{0x0, 0x0, 0xfffffffffffffff7}, {&(0x7f0000001540)="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", 0x1e0}]) 08:55:01 executing program 1: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$TCGETA(r2, 0x5405, &(0x7f0000000100)) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000000)=0x3) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x15, 0x0, 0x0, 0x0, 0x100000, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, r2}, 0x78) r3 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r3, 0x40047438, &(0x7f0000000180)=""/246) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r4, &(0x7f0000000040)=ANY=[], 0xfea7) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r4, 0x0) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="3c0000000001090400f100000000000000efa51f730001801400018008000100ffffffff08000200ac1414000c000280050001000000000004001080"], 0x3c}}, 0x0) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r5, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000000)={0x3c, 0x0, 0x1, 0x409, 0x0, 0x0, {}, [@CTA_TUPLE_ORIG={0x24, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @broadcast}, {0x8, 0x2, @dev}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_SEQ_ADJ_REPLY={0x4}]}, 0x3c}}, 0x0) clock_gettime(0x0, &(0x7f00000002c0)={0x0, 0x0}) ppoll(&(0x7f0000000140)=[{0xffffffffffffffff, 0x200}, {r5, 0x220}], 0x2, &(0x7f0000000300)={r6, r7+10000000}, &(0x7f0000000340)={[0x101]}, 0x8) ioctl$PPPIOCSFLAGS1(r3, 0x40047457, &(0x7f00000000c0)) 08:55:01 executing program 2: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000000)=0x3) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r3 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r3, 0x40047438, &(0x7f0000000180)=""/246) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r4, &(0x7f0000000040)=ANY=[], 0xfea7) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r4, 0x0) ioctl$PPPIOCSFLAGS1(r3, 0x40047457, &(0x7f00000000c0)) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0xffaf) write$RDMA_USER_CM_CMD_QUERY(r5, &(0x7f0000000040)={0x13, 0x10, 0xfa00, {&(0x7f0000001f00), r6, 0x2}}, 0x18) write$RDMA_USER_CM_CMD_BIND_IP(r4, &(0x7f0000000100)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e21, 0x7fffffff, @mcast2, 0x400}, r6}}, 0x30) 08:55:01 executing program 4: unshare(0x40000000) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000000)=0x3) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r1, 0x40047438, &(0x7f0000000180)=""/246) ioctl$PPPIOCSFLAGS1(r1, 0x40047457, &(0x7f00000000c0)) msync(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0) [ 1189.201816] IPVS: ftp: loaded support on port[0] = 21 [ 1189.217593] IPVS: ftp: loaded support on port[0] = 21 [ 1189.219265] IPVS: ftp: loaded support on port[0] = 21 [ 1189.223740] IPVS: ftp: loaded support on port[0] = 21 [ 1189.233699] IPVS: ftp: loaded support on port[0] = 21 [ 1189.248476] loop3: [POWERTEC] p1 p2 p3 p4 p5 p6 p7 p8 p9 p10 p11 p12 [ 1189.268070] loop3: p1 start 233194046 is beyond EOD, truncated [ 1189.307535] loop3: p2 start 3569653895 is beyond EOD, truncated [ 1189.336633] loop3: p3 start 926682669 is beyond EOD, truncated [ 1189.352375] loop3: p4 start 1263303888 is beyond EOD, truncated [ 1189.377063] loop3: p5 start 1281279881 is beyond EOD, truncated [ 1189.392223] loop3: p6 start 3452787639 is beyond EOD, truncated [ 1189.411155] loop3: p7 start 2263908108 is beyond EOD, truncated [ 1189.451791] loop3: p8 start 1970859340 is beyond EOD, truncated [ 1189.472086] loop3: p9 start 1782333214 is beyond EOD, truncated [ 1189.499272] loop3: p10 start 1751982490 is beyond EOD, truncated [ 1189.523982] loop3: p11 start 3605249017 is beyond EOD, truncated [ 1189.551362] loop3: p12 start 2400178403 is beyond EOD, truncated 08:55:01 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_read_part_table(0x400000000000000, 0x2, &(0x7f0000002640)=[{0x0, 0x0, 0xfffffffffffffff7}, {&(0x7f0000001540)="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", 0x1e0}]) [ 1189.724384] IPVS: ftp: loaded support on port[0] = 21 08:55:01 executing program 5: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000000)=0x3) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r3 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r3, 0x40047438, &(0x7f0000000180)=""/246) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r4, 0x0) ioctl$PPPIOCSFLAGS1(r3, 0x80047453, &(0x7f00000000c0)) [ 1189.837353] IPVS: ftp: loaded support on port[0] = 21 [ 1189.864927] loop3: [POWERTEC] p1 p2 p3 p4 p5 p6 p7 p8 p9 p10 p11 p12 [ 1189.878769] loop3: p1 start 233194046 is beyond EOD, truncated [ 1189.915597] loop3: p2 start 3569653895 is beyond EOD, truncated [ 1189.958296] loop3: p3 start 926682669 is beyond EOD, truncated [ 1189.973402] IPVS: ftp: loaded support on port[0] = 21 [ 1190.001247] loop3: p4 start 1263303888 is beyond EOD, truncated [ 1190.038375] loop3: p5 start 1281279881 is beyond EOD, truncated [ 1190.069253] loop3: p6 start 3452787639 is beyond EOD, truncated [ 1190.101982] loop3: p7 start 2263908108 is beyond EOD, truncated [ 1190.113556] IPVS: ftp: loaded support on port[0] = 21 08:55:02 executing program 0: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000000)=0x3) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r3 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r3, 0x40047438, &(0x7f0000000180)=""/246) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r4, 0x0) ioctl$PPPIOCSFLAGS1(r3, 0x80047453, &(0x7f00000000c0)) [ 1190.130191] loop3: p8 start 1970859340 is beyond EOD, truncated [ 1190.168906] loop3: p9 start 1782333214 is beyond EOD, truncated [ 1190.210473] loop3: p10 start 1751982490 is beyond EOD, truncated [ 1190.231563] loop3: p11 start 3605249017 is beyond EOD, truncated [ 1190.254506] loop3: p12 start 2400178403 is beyond EOD, truncated 08:55:02 executing program 5: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x10, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000000)=0x3) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r3 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r3, 0x40047438, &(0x7f0000000180)=""/246) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r4, 0x0) ioctl$PPPIOCSFLAGS1(r3, 0x80047453, &(0x7f00000000c0)) [ 1190.323581] IPVS: ftp: loaded support on port[0] = 21 08:55:02 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_read_part_table(0x500000000000000, 0x2, &(0x7f0000002640)=[{0x0, 0x0, 0xfffffffffffffff7}, {&(0x7f0000001540)="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", 0x1e0}]) [ 1190.527256] IPVS: ftp: loaded support on port[0] = 21 [ 1190.561173] loop3: [POWERTEC] p1 p2 p3 p4 p5 p6 p7 p8 p9 p10 p11 p12 [ 1190.575364] loop3: p1 start 233194046 is beyond EOD, truncated [ 1190.611722] loop3: p2 start 3569653895 is beyond EOD, truncated [ 1190.648111] loop3: p3 start 926682669 is beyond EOD, truncated 08:55:02 executing program 1: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000000)=0x3) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000340)=ANY=[], 0x3c}, 0x1, 0x0, 0x0, 0x46855}, 0x0) r2 = dup(r1) ioctl$UI_SET_ABSBIT(r2, 0x40045567, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r3 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r3, 0x40047438, &(0x7f0000000180)=""/246) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r4, &(0x7f0000000040)=ANY=[], 0xfea7) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r4, 0x0) ioctl$PPPIOCSFLAGS1(r3, 0x40047457, &(0x7f00000000c0)) [ 1190.674880] loop3: p4 start 1263303888 is beyond EOD, truncated [ 1190.711781] loop3: p5 start 1281279881 is beyond EOD, truncated 08:55:02 executing program 0: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000000)=0x3) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r3 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r3, 0x40047438, &(0x7f0000000180)=""/246) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r4, &(0x7f0000000040)=ANY=[], 0xfea7) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r4, 0x0) ioctl$PPPIOCSFLAGS1(r3, 0x80207450, &(0x7f00000000c0)) [ 1190.771011] loop3: p6 start 3452787639 is beyond EOD, truncated [ 1190.808959] loop3: p7 start 2263908108 is beyond EOD, truncated [ 1190.848186] IPVS: ftp: loaded support on port[0] = 21 [ 1190.851721] loop3: p8 start 1970859340 is beyond EOD, truncated 08:55:03 executing program 5: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x10, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000000)=0x3) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r3 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r3, 0x40047438, &(0x7f0000000180)=""/246) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r4, 0x0) ioctl$PPPIOCSFLAGS1(r3, 0x80047453, &(0x7f00000000c0)) [ 1190.891540] loop3: p9 start 1782333214 is beyond EOD, truncated [ 1190.924635] loop3: p10 start 1751982490 is beyond EOD, truncated [ 1190.936485] IPVS: ftp: loaded support on port[0] = 21 [ 1190.959626] loop3: p11 start 3605249017 is beyond EOD, truncated [ 1190.994922] loop3: p12 start 2400178403 is beyond EOD, truncated [ 1191.052633] IPVS: ftp: loaded support on port[0] = 21 08:55:03 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_read_part_table(0x600000000000000, 0x2, &(0x7f0000002640)=[{0x0, 0x0, 0xfffffffffffffff7}, {&(0x7f0000001540)="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", 0x1e0}]) 08:55:03 executing program 2: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000000)=0x3) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r3 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r3, 0x40047438, &(0x7f0000000180)=""/246) ioctl$VIDIOC_G_EXT_CTRLS(r1, 0xc0205647, &(0x7f0000000140)={0x980000, 0x101, 0x101, 0xffffffffffffffff, 0x0, &(0x7f0000000100)={0x990905, 0x5, [], @value64=0xfa}}) ioctl$KVM_TPR_ACCESS_REPORTING(r4, 0xc028ae92, &(0x7f00000002c0)={0x8, 0x9}) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r5, &(0x7f0000000040)=ANY=[], 0xfea7) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r5, 0x0) ioctl$PPPIOCSFLAGS1(r3, 0x40047457, &(0x7f00000000c0)) [ 1191.335436] loop3: [POWERTEC] p1 p2 p3 p4 p5 p6 p7 p8 p9 p10 p11 p12 [ 1191.357633] loop3: p1 start 233194046 is beyond EOD, truncated [ 1191.388462] loop3: p2 start 3569653895 is beyond EOD, truncated [ 1191.418545] loop3: p3 start 926682669 is beyond EOD, truncated 08:55:03 executing program 5: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x10, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000000)=0x3) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r3 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r3, 0x40047438, &(0x7f0000000180)=""/246) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r4, 0x0) ioctl$PPPIOCSFLAGS1(r3, 0x80047453, &(0x7f00000000c0)) [ 1191.459795] loop3: p4 start 1263303888 is beyond EOD, truncated [ 1191.493771] IPVS: ftp: loaded support on port[0] = 21 [ 1191.500327] loop3: p5 start 1281279881 is beyond EOD, truncated [ 1191.529747] loop3: p6 start 3452787639 is beyond EOD, truncated [ 1191.564136] loop3: p7 start 2263908108 is beyond EOD, truncated [ 1191.623253] IPVS: ftp: loaded support on port[0] = 21 [ 1191.625085] loop3: p8 start 1970859340 is beyond EOD, truncated [ 1191.655579] IPVS: ftp: loaded support on port[0] = 21 [ 1191.680161] loop3: p9 start 1782333214 is beyond EOD, truncated [ 1191.721402] loop3: p10 start 1751982490 is beyond EOD, truncated [ 1191.752042] loop3: p11 start 3605249017 is beyond EOD, truncated [ 1191.759498] loop3: p12 start 2400178403 is beyond EOD, truncated [ 1192.178833] IPVS: ftp: loaded support on port[0] = 21 08:55:05 executing program 4: unshare(0x40000000) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) r1 = socket(0x1000000010, 0x80002, 0x0) sendmmsg$alg(r1, &(0x7f0000000200), 0x10efe10675dec16, 0x0) setsockopt$inet_sctp_SCTP_RECVNXTINFO(r1, 0x84, 0x21, &(0x7f0000000080)=0x8, 0x4) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000000)=0x3) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r2, 0x40047438, &(0x7f0000000180)=""/246) ioctl$PPPIOCSFLAGS1(r2, 0x40047457, &(0x7f00000000c0)) 08:55:05 executing program 2: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000000)=0x3) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r3 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) r4 = socket$inet6(0xa, 0x2, 0x0) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$NBD_SET_SIZE(r5, 0xab02, 0x2) ioctl$EVIOCGPROP(r3, 0x40047438, &(0x7f0000000180)=""/246) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r6, &(0x7f0000000040)=ANY=[], 0xfea7) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r6, 0x0) ioctl$PPPIOCSFLAGS1(r3, 0x40047457, &(0x7f00000000c0)) 08:55:05 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_read_part_table(0x700000000000000, 0x2, &(0x7f0000002640)=[{0x0, 0x0, 0xfffffffffffffff7}, {&(0x7f0000001540)="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", 0x1e0}]) 08:55:05 executing program 5: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000000)=0x3) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r3 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r3, 0x40047438, &(0x7f0000000180)=""/246) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r4, 0x0) ioctl$PPPIOCSFLAGS1(r3, 0x80047453, &(0x7f00000000c0)) 08:55:05 executing program 0: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000000)=0x3) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r3 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r3, 0x40047438, &(0x7f0000000180)=""/246) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r4, &(0x7f0000000040)=ANY=[], 0xfea7) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r4, 0x0) ioctl$PPPIOCSFLAGS1(r3, 0x4020744f, &(0x7f00000000c0)) [ 1193.864964] IPVS: ftp: loaded support on port[0] = 21 [ 1193.873200] IPVS: ftp: loaded support on port[0] = 21 [ 1193.880370] IPVS: ftp: loaded support on port[0] = 21 [ 1193.894836] loop3: [POWERTEC] p1 p2 p3 p4 p5 p6 p7 p8 p9 p10 p11 p12 [ 1193.906172] IPVS: ftp: loaded support on port[0] = 21 [ 1193.915501] loop3: p1 start 233194046 is beyond EOD, truncated [ 1193.959943] loop3: p2 start 3569653895 is beyond EOD, truncated [ 1194.011723] loop3: p3 start 926682669 is beyond EOD, truncated [ 1194.058515] loop3: p4 start 1263303888 is beyond EOD, truncated [ 1194.104188] loop3: p5 start 1281279881 is beyond EOD, truncated [ 1194.157957] loop3: p6 start 3452787639 is beyond EOD, truncated [ 1194.195197] loop3: p7 start 2263908108 is beyond EOD, truncated [ 1194.222991] loop3: p8 start 1970859340 is beyond EOD, truncated [ 1194.255854] loop3: p9 start 1782333214 is beyond EOD, truncated [ 1194.283001] IPVS: ftp: loaded support on port[0] = 21 [ 1194.296306] loop3: p10 start 1751982490 is beyond EOD, truncated 08:55:06 executing program 1: r0 = socket(0x1000000010, 0x80002, 0x0) sendmmsg$alg(r0, &(0x7f0000000200), 0x10efe10675dec16, 0x0) getsockopt$XDP_STATISTICS(r0, 0x11b, 0x7, &(0x7f0000000100), &(0x7f0000000140)=0x18) unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000000)=0x3) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r2 = socket(0x1000000010, 0x80002, 0x0) sendmmsg$alg(r2, &(0x7f0000000200), 0x10efe10675dec16, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000300)='nl80211\x00') sendmsg$NL80211_CMD_JOIN_MESH(r3, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000180)={0x3c, r4, 0x1, 0x0, 0x0, {}, [@NL80211_ATTR_BSS_BASIC_RATES={0x25, 0x24, "5eb943d1332a264ddfc632b1b9ee320e50e18f9e69c21de0c0623eef81daa25d48"}]}, 0x3c}}, 0x0) sendmsg$NL80211_CMD_SET_MPATH(r2, &(0x7f0000000380)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000340)={&(0x7f0000000300)={0x20, r4, 0x20, 0x70bd25, 0x25dfdbfd, {}, [@NL80211_ATTR_MPATH_NEXT_HOP={0xa, 0x1a, @remote}]}, 0x20}, 0x1, 0x0, 0x0, 0x24008884}, 0x4004811) r5 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r5, 0x40047438, &(0x7f0000000180)=""/246) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r6, &(0x7f0000000040)=ANY=[], 0xfea7) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r6, 0x0) ioctl$PPPIOCSFLAGS1(r5, 0x40047457, &(0x7f00000000c0)) [ 1194.334306] loop3: p11 start 3605249017 is beyond EOD, truncated [ 1194.370074] loop3: p12 start 2400178403 is beyond EOD, truncated 08:55:06 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_read_part_table(0x900000000000000, 0x2, &(0x7f0000002640)=[{0x0, 0x0, 0xfffffffffffffff7}, {&(0x7f0000001540)="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", 0x1e0}]) [ 1194.554562] IPVS: ftp: loaded support on port[0] = 21 [ 1194.668057] loop3: [POWERTEC] p1 p2 p3 p4 p5 p6 p7 p8 p9 p10 p11 p12 [ 1194.673754] IPVS: ftp: loaded support on port[0] = 21 [ 1194.701577] loop3: p1 start 233194046 is beyond EOD, truncated [ 1194.753420] loop3: p2 start 3569653895 is beyond EOD, truncated [ 1194.783764] loop3: p3 start 926682669 is beyond EOD, truncated 08:55:07 executing program 5: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000000)=0x3) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r3 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r3, 0x40047438, &(0x7f0000000180)=""/246) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r4, 0x0) ioctl$PPPIOCSFLAGS1(r3, 0x80047453, &(0x7f00000000c0)) [ 1194.817352] loop3: p4 start 1263303888 is beyond EOD, truncated [ 1194.846825] loop3: p5 start 1281279881 is beyond EOD, truncated [ 1194.901320] loop3: p6 start 3452787639 is beyond EOD, truncated [ 1194.938379] loop3: p7 start 2263908108 is beyond EOD, truncated [ 1194.970835] loop3: p8 start 1970859340 is beyond EOD, truncated [ 1195.012587] loop3: p9 start 1782333214 is beyond EOD, truncated [ 1195.042518] loop3: p10 start 1751982490 is beyond EOD, truncated [ 1195.052684] IPVS: ftp: loaded support on port[0] = 21 08:55:07 executing program 0: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000000)=0x3) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r3 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r3, 0x40047438, &(0x7f0000000180)=""/246) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r4, &(0x7f0000000040)=ANY=[], 0xfea7) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r4, 0x0) ioctl$PPPIOCSFLAGS1(r3, 0x4020744f, &(0x7f00000000c0)) [ 1195.072172] loop3: p11 start 3605249017 is beyond EOD, truncated [ 1195.099343] loop3: p12 start 2400178403 is beyond EOD, truncated 08:55:07 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_read_part_table(0xd00000000000000, 0x2, &(0x7f0000002640)=[{0x0, 0x0, 0xfffffffffffffff7}, {&(0x7f0000001540)="c2ec123b097b69be3e42e60d3f03ff5b20b3406e8d7eebd2456f5388ad7135b73efb98088798c4d4506cd2295e60b5e9f9f2399833ad179a03e098e07644033f2d0e3c37a84095cdde0312f1d81191a92ccbe761424e7d3033a056d7d07c4c4bc2dbbb00079ae5158b76bed5cdd1d93054fff6874b43ef1289c75e4c9b911d69313cbc4e0abcab496b4ce2c83f238a2b30fc8210b75bcdcd0b774ac467962cc4389843f92f418b0718a87f17ae20f1790c7ff086746847e2217207cede6d2af2a58d7148128b2f86806b3be24ced787543219ae633ab66b7828c5bfd87571ee33ab89138401439491e3f3c6a4a56b4bf8a7d532ee9144977f6ac8fae105ab358e231f2cd9a216d68b0877161e158b14837fb1426f4a629f17ddd7bbf9019941ff9bbe3d6fd30d68dbd9e3b3cfb282bc08db959b660ed8f7ebc67714be3d00f8f1e2cbc9404069335265ce12996f7cb48c1f3221f7f892493e4711a6dbd79a0298e0e0b9936b06a3d08821f558f5738b05e2ead126157186dac58de8a7098291efacb6666b2dca73d422fbf6a09b30f3c30cc9e34faa453ef1d770f7008b7c54d644be9716b27aa40b67126130b61c29a254a578365216655e8a5c6955e72fb67e6f1796e499edcaa33e0b43bd172d9977deff713978907e12189743913c7c847", 0x1e0}]) [ 1195.259896] IPVS: ftp: loaded support on port[0] = 21 [ 1195.290260] IPVS: ftp: loaded support on port[0] = 21 [ 1195.425761] loop3: [POWERTEC] p1 p2 p3 p4 p5 p6 p7 p8 p9 p10 p11 p12 [ 1195.438445] loop3: p1 start 233194046 is beyond EOD, truncated [ 1195.481859] loop3: p2 start 3569653895 is beyond EOD, truncated [ 1195.508919] loop3: p3 start 926682669 is beyond EOD, truncated [ 1195.536293] loop3: p4 start 1263303888 is beyond EOD, truncated [ 1195.572150] loop3: p5 start 1281279881 is beyond EOD, truncated [ 1195.607301] loop3: p6 start 3452787639 is beyond EOD, truncated [ 1195.645353] loop3: p7 start 2263908108 is beyond EOD, truncated [ 1195.672084] loop3: p8 start 1970859340 is beyond EOD, truncated [ 1195.705422] loop3: p9 start 1782333214 is beyond EOD, truncated [ 1195.732054] loop3: p10 start 1751982490 is beyond EOD, truncated [ 1195.759822] loop3: p11 start 3605249017 is beyond EOD, truncated [ 1195.787753] loop3: p12 start 2400178403 is beyond EOD, truncated 08:55:07 executing program 5: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000000)=0x3) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r3 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r3, 0x40047438, &(0x7f0000000180)=""/246) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r4, 0x0) ioctl$PPPIOCSFLAGS1(r3, 0x80047453, &(0x7f00000000c0)) 08:55:08 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_read_part_table(0x1903000000000000, 0x2, &(0x7f0000002640)=[{0x0, 0x0, 0xfffffffffffffff7}, {&(0x7f0000001540)="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", 0x1e0}]) [ 1196.007566] IPVS: ftp: loaded support on port[0] = 21 [ 1196.052729] loop3: [POWERTEC] p1 p2 p3 p4 p5 p6 p7 p8 p9 p10 p11 p12 [ 1196.069318] loop3: p1 start 233194046 is beyond EOD, truncated [ 1196.106051] loop3: p2 start 3569653895 is beyond EOD, truncated [ 1196.139940] loop3: p3 start 926682669 is beyond EOD, truncated [ 1196.179231] loop3: p4 start 1263303888 is beyond EOD, truncated [ 1196.214497] loop3: p5 start 1281279881 is beyond EOD, truncated [ 1196.257805] loop3: p6 start 3452787639 is beyond EOD, truncated [ 1196.292482] loop3: p7 start 2263908108 is beyond EOD, truncated [ 1196.324542] loop3: p8 start 1970859340 is beyond EOD, truncated [ 1196.375823] loop3: p9 start 1782333214 is beyond EOD, truncated [ 1196.408975] loop3: p10 start 1751982490 is beyond EOD, truncated [ 1196.444489] loop3: p11 start 3605249017 is beyond EOD, truncated [ 1196.464845] loop3: p12 start 2400178403 is beyond EOD, truncated 08:55:10 executing program 4: unshare(0x40000000) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x500c1, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000000)=0x3) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r1, 0x40047438, &(0x7f0000000180)=""/246) ioctl$PPPIOCSFLAGS1(r1, 0x40047457, &(0x7f00000000c0)) r2 = gettid() ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x2) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r2, 0x0, 0x0) ptrace$setopts(0x4206, r2, 0x7f, 0x60) 08:55:10 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_read_part_table(0x1f00000000000000, 0x2, &(0x7f0000002640)=[{0x0, 0x0, 0xfffffffffffffff7}, {&(0x7f0000001540)="c2ec123b097b69be3e42e60d3f03ff5b20b3406e8d7eebd2456f5388ad7135b73efb98088798c4d4506cd2295e60b5e9f9f2399833ad179a03e098e07644033f2d0e3c37a84095cdde0312f1d81191a92ccbe761424e7d3033a056d7d07c4c4bc2dbbb00079ae5158b76bed5cdd1d93054fff6874b43ef1289c75e4c9b911d69313cbc4e0abcab496b4ce2c83f238a2b30fc8210b75bcdcd0b774ac467962cc4389843f92f418b0718a87f17ae20f1790c7ff086746847e2217207cede6d2af2a58d7148128b2f86806b3be24ced787543219ae633ab66b7828c5bfd87571ee33ab89138401439491e3f3c6a4a56b4bf8a7d532ee9144977f6ac8fae105ab358e231f2cd9a216d68b0877161e158b14837fb1426f4a629f17ddd7bbf9019941ff9bbe3d6fd30d68dbd9e3b3cfb282bc08db959b660ed8f7ebc67714be3d00f8f1e2cbc9404069335265ce12996f7cb48c1f3221f7f892493e4711a6dbd79a0298e0e0b9936b06a3d08821f558f5738b05e2ead126157186dac58de8a7098291efacb6666b2dca73d422fbf6a09b30f3c30cc9e34faa453ef1d770f7008b7c54d644be9716b27aa40b67126130b61c29a254a578365216655e8a5c6955e72fb67e6f1796e499edcaa33e0b43bd172d9977deff713978907e12189743913c7c847", 0x1e0}]) 08:55:10 executing program 0: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000000)=0x3) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r3 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r3, 0x40047438, &(0x7f0000000180)=""/246) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r4, &(0x7f0000000040)=ANY=[], 0xfea7) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r4, 0x0) ioctl$PPPIOCSFLAGS1(r3, 0x4020744f, &(0x7f00000000c0)) 08:55:10 executing program 1: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) r1 = syz_open_dev$vcsa(&(0x7f0000000400)='/dev/vcsa#\x00', 0xff, 0x10000) ioctl$BINDER_SET_CONTEXT_MGR(r1, 0x40046207, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000000)=0x3) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) sendmsg$IPSET_CMD_FLUSH(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000580)={&(0x7f0000000600)=ANY=[@ANYBLOB="400000000406010200000000000000000000000209020073797a31000000000900020073797a3200000000050001000700000000fe2ace17f7b2c15c34341a77eb048d00"/79], 0x40}, 0x1, 0x0, 0x0, 0x4000000}, 0x8040) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r2, 0x40047438, &(0x7f0000000180)=""/246) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$P9_ROPEN(r1, &(0x7f0000000440)={0x18, 0x71, 0x2, {{0x40, 0x3, 0x2}, 0xffffffff}}, 0x18) write$binfmt_script(r3, &(0x7f0000000040)=ANY=[], 0xfea7) socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$devlink(&(0x7f0000000100)='devlink\x00') sendmsg$DEVLINK_CMD_SB_OCC_SNAPSHOT(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000140)={&(0x7f00000002c0)=ANY=[@ANYBLOB="f0000000", @ANYRES16=r4, @ANYBLOB="00082cbd7000fedbdf251b0000000808551e7f63690011000200303030303a30303a31302e300000000008000b0006000000080001007063690011000200303030303a30303a31302e300000000008000b00ff0300000e0001006e657464657673696d0000004f0002006e657464657673696d30000008000b0008000000080001007063690011000200303030303a30303a31302e300000000008000b0007000000080001007063690011000200301f15303a30303a31302e300000000008000b0007000000080001007063690011000200303030303a30303a31302e300000000008000b0000000000"], 0xf0}, 0x1, 0x0, 0x0, 0x24000000}, 0x490) r5 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_SIOCSIFVLAN_GET_VLAN_REALDEV_NAME_CMD(r5, 0x8983, &(0x7f0000000480)={0x8, 'bond_slave_0\x00', {'veth1_vlan\x00'}, 0x1}) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x10012, 0xffffffffffffffff, 0x0) ioctl$PPPIOCSFLAGS1(r2, 0x40047457, &(0x7f00000000c0)) 08:55:10 executing program 5: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000000)=0x3) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r2, 0x40047438, &(0x7f0000000180)=""/246) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r3, 0x0) ioctl$PPPIOCSFLAGS1(r2, 0x80047453, &(0x7f00000000c0)) 08:55:10 executing program 2: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000000)=0x3) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x979, 0x0, 0x0, 0x0, 0xc, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r3 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r3, 0x40047438, &(0x7f0000000180)=""/246) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r4, &(0x7f0000000040)=ANY=[], 0xfea7) bind$ax25(r1, &(0x7f0000000100)={{0x3, @null, 0x1}, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}]}, 0x48) r5 = socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000400)='IPVS\x00') sendmsg$IPVS_CMD_NEW_SERVICE(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000580)={&(0x7f00000000c0)={0x44, r6, 0x1, 0x0, 0x0, {}, [@IPVS_CMD_ATTR_SERVICE={0x30, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_AF={0x6, 0x1, 0xa}, @IPVS_SVC_ATTR_FLAGS={0xc}, @IPVS_SVC_ATTR_PE_NAME={0x8, 0x6, 'sip\x00'}, @IPVS_SVC_ATTR_TIMEOUT={0x8}, @IPVS_SVC_ATTR_FWMARK={0x8}]}]}, 0x44}, 0x1, 0xa00000000000000}, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(r1, &(0x7f0000000380)={&(0x7f00000002c0), 0xc, &(0x7f0000000340)={&(0x7f0000000300)={0x1c, r6, 0x0, 0x70bd26, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x20}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4040040}, 0x40000) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r4, 0x0) ioctl$PPPIOCSFLAGS1(r3, 0x40047457, &(0x7f00000000c0)) [ 1198.330390] IPVS: ftp: loaded support on port[0] = 21 [ 1198.339773] IPVS: ftp: loaded support on port[0] = 21 [ 1198.341341] IPVS: ftp: loaded support on port[0] = 21 [ 1198.349526] IPVS: ftp: loaded support on port[0] = 21 [ 1198.354797] loop3: [POWERTEC] p1 p2 p3 p4 p5 p6 p7 p8 p9 p10 p11 p12 [ 1198.362638] loop3: p1 start 233194046 is beyond EOD, truncated [ 1198.370632] IPVS: ftp: loaded support on port[0] = 21 [ 1198.406484] loop3: p2 start 3569653895 is beyond EOD, truncated [ 1198.446901] loop3: p3 start 926682669 is beyond EOD, truncated [ 1198.469120] loop3: p4 start 1263303888 is beyond EOD, truncated [ 1198.503463] loop3: p5 start 1281279881 is beyond EOD, truncated [ 1198.560971] loop3: p6 start 3452787639 is beyond EOD, truncated [ 1198.610229] loop3: p7 start 2263908108 is beyond EOD, truncated [ 1198.655617] loop3: p8 start 1970859340 is beyond EOD, truncated [ 1198.673587] loop3: p9 start 1782333214 is beyond EOD, truncated [ 1198.730472] loop3: p10 start 1751982490 is beyond EOD, truncated [ 1198.770310] loop3: p11 start 3605249017 is beyond EOD, truncated [ 1198.799136] loop3: p12 start 2400178403 is beyond EOD, truncated 08:55:11 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_read_part_table(0x2000000000000000, 0x2, &(0x7f0000002640)=[{0x0, 0x0, 0xfffffffffffffff7}, {&(0x7f0000001540)="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", 0x1e0}]) [ 1199.022865] IPVS: ftp: loaded support on port[0] = 21 [ 1199.038504] loop3: [POWERTEC] p1 p2 p3 p4 p5 p6 p7 p8 p9 p10 p11 p12 [ 1199.083962] IPVS: ftp: loaded support on port[0] = 21 08:55:11 executing program 5: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000000)=0x3) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r2, 0x40047438, &(0x7f0000000180)=""/246) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r3, 0x0) ioctl$PPPIOCSFLAGS1(r2, 0x80047453, &(0x7f00000000c0)) [ 1199.150624] loop3: p1 start 233194046 is beyond EOD, truncated [ 1199.160286] loop3: p2 start 3569653895 is beyond EOD, truncated [ 1199.198169] loop3: p3 start 926682669 is beyond EOD, truncated [ 1199.229226] loop3: p4 start 1263303888 is beyond EOD, truncated [ 1199.258115] loop3: p5 start 1281279881 is beyond EOD, truncated [ 1199.282739] loop3: p6 start 3452787639 is beyond EOD, truncated [ 1199.305085] loop3: p7 start 2263908108 is beyond EOD, truncated [ 1199.331497] IPVS: ftp: loaded support on port[0] = 21 [ 1199.340882] loop3: p8 start 1970859340 is beyond EOD, truncated [ 1199.372728] loop3: p9 start 1782333214 is beyond EOD, truncated [ 1199.401661] loop3: p10 start 1751982490 is beyond EOD, truncated [ 1199.432352] loop3: p11 start 3605249017 is beyond EOD, truncated [ 1199.461740] loop3: p12 start 2400178403 is beyond EOD, truncated 08:55:11 executing program 0: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000000)=0x3) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r3 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r3, 0x40047438, &(0x7f0000000180)=""/246) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r4, &(0x7f0000000040)=ANY=[], 0xfea7) ioctl$PPPIOCSFLAGS1(r3, 0x4020744f, &(0x7f00000000c0)) 08:55:11 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_read_part_table(0x2300000000000000, 0x2, &(0x7f0000002640)=[{0x0, 0x0, 0xfffffffffffffff7}, {&(0x7f0000001540)="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", 0x1e0}]) [ 1199.698065] IPVS: ftp: loaded support on port[0] = 21 [ 1199.735744] loop3: [POWERTEC] p1 p2 p3 p4 p5 p6 p7 p8 p9 p10 p11 p12 [ 1199.752371] loop3: p1 start 233194046 is beyond EOD, truncated [ 1199.781405] loop3: p2 start 3569653895 is beyond EOD, truncated [ 1199.810730] loop3: p3 start 926682669 is beyond EOD, truncated [ 1199.847521] loop3: p4 start 1263303888 is beyond EOD, truncated [ 1199.894980] loop3: p5 start 1281279881 is beyond EOD, truncated 08:55:12 executing program 2: mmap(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x1000003, 0x8031, 0xffffffffffffffff, 0x5fdb2000) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)) r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$VIDIOC_S_CROP(r1, 0x4014563c, &(0x7f0000000140)={0x8, {0xd15, 0x4, 0x232, 0x1fd}}) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCL_SETVESABLANK(0xffffffffffffffff, 0x541c, &(0x7f0000000100)) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f0000000000)=0x3) sendmsg$IPCTNL_MSG_CT_NEW(r1, &(0x7f00000004c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000480)={&(0x7f0000000340)={0x120, 0x0, 0x1, 0x101, 0x0, 0x0, {0x0, 0x0, 0x2}, [@CTA_SEQ_ADJ_ORIG={0x14, 0xf, 0x0, 0x1, [@CTA_SEQADJ_OFFSET_BEFORE={0x8, 0x2, 0x1, 0x0, 0x10001}, @CTA_SEQADJ_OFFSET_AFTER={0x8, 0x3, 0x1, 0x0, 0x18}]}, @CTA_TUPLE_ORIG={0x7c, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @remote}, {0x14, 0x4, @dev={0xfe, 0x80, [], 0x42}}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x1}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x11}}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @dev={0xfe, 0x80, [], 0x37}}, {0x14, 0x4, @ipv4={[], [], @remote}}}}]}, @CTA_NAT_SRC={0x20, 0x6, 0x0, 0x1, [@CTA_NAT_V4_MAXIP={0x8, 0x2, @empty}, @CTA_NAT_V6_MAXIP={0x14, 0x5, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x2e}}}]}, @CTA_SEQ_ADJ_REPLY={0x1c, 0x10, 0x0, 0x1, [@CTA_SEQADJ_CORRECTION_POS={0x8, 0x1, 0x1, 0x0, 0x6}, @CTA_SEQADJ_CORRECTION_POS={0x8, 0x1, 0x1, 0x0, 0x3f}, @CTA_SEQADJ_OFFSET_BEFORE={0x8, 0x2, 0x1, 0x0, 0xfffffa11}]}, @CTA_SYNPROXY={0xc, 0x18, 0x0, 0x1, [@CTA_SYNPROXY_ISN={0x8}]}, @CTA_HELP={0x10, 0x5, 0x0, 0x1, {0x9, 0x1, 'syz1\x00'}}, @CTA_TIMEOUT={0x8, 0x7, 0x1, 0x0, 0x3}, @CTA_HELP={0x14, 0x5, 0x0, 0x1, {0xf, 0x1, 'sane-20000\x00'}}, @CTA_TIMEOUT={0x8, 0x7, 0x1, 0x0, 0xffffffff}]}, 0x120}, 0x1, 0x0, 0x0, 0x4001}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r2, 0x40047438, &(0x7f0000000180)=""/246) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r3, &(0x7f0000000040)=ANY=[], 0xfea7) ioctl$TIOCGETD(r1, 0x5424, &(0x7f00000002c0)) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r3, 0x0) ioctl$PPPIOCSFLAGS1(r2, 0x40047457, &(0x7f00000000c0)) [ 1199.946568] loop3: p6 start 3452787639 is beyond EOD, truncated [ 1199.990359] loop3: p7 start 2263908108 is beyond EOD, truncated [ 1200.025246] loop3: p8 start 1970859340 is beyond EOD, truncated [ 1200.050766] loop3: p9 start 1782333214 is beyond EOD, truncated [ 1200.072590] loop3: p10 start 1751982490 is beyond EOD, truncated 08:55:12 executing program 5: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000000)=0x3) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r2, 0x40047438, &(0x7f0000000180)=""/246) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r3, 0x0) ioctl$PPPIOCSFLAGS1(r2, 0x80047453, &(0x7f00000000c0)) [ 1200.097037] loop3: p11 start 3605249017 is beyond EOD, truncated [ 1200.133354] loop3: p12 start 2400178403 is beyond EOD, truncated [ 1200.237795] audit: type=1804 audit(1594716912.372:5394): pid=12858 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir968128286/syzkaller.PF5Zls/734/cgroup.controllers" dev="sda1" ino=17032 res=1 [ 1200.283978] IPVS: ftp: loaded support on port[0] = 21 08:55:13 executing program 4: unshare(0x40000000) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000000)=0x3) userfaultfd(0x800) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r1, 0x40047438, &(0x7f0000000180)=""/246) ioctl$PPPIOCSFLAGS1(r1, 0x40047457, &(0x7f00000000c0)) 08:55:13 executing program 1: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000000)=0x3) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r1 = creat(&(0x7f0000000100)='./file0\x00', 0x1e0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={r1, 0x0, 0x16, 0x0, &(0x7f0000000140)="b98d52821f318f112db2dcdfaae178af3dbefe1d90be", &(0x7f00000002c0), 0x4, 0x0, 0x45, 0xa4, &(0x7f0000000300)="8c40bb17294ad3676670ed922450e2167a2ec39ca507e5bed616711f37801ced7e1a9f7b7ca81ce7069d8aca1cab43fb31287950de046e74fca11b2f918a7bb7fded850170", &(0x7f0000000380)="b9fc35d677934f239c57cb86aa440884f6f0cd868866367b0d3ccf2ed162958d09a43d694ef73bc109e94264d27eb97188b2772f1fdeacfa249146fe9be2c91976a39bb7d485ddfbb828eb3de459936b2d4a22117f289950e3c9b9c1b4aaacde9be3832df1097668d067a7ef27084a84595c96c2eebc6d31abdb1daeb49a86496de0eafa8435f80b20f5b01a8e4f86958388f84c9794a079a792834e26f56314c5d5dd5a"}, 0x40) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r2, 0x40047438, &(0x7f0000000180)=""/246) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r3, &(0x7f0000000040)=ANY=[], 0xfea7) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r3, 0x0) ioctl$PPPIOCSFLAGS1(r2, 0x40047457, &(0x7f00000000c0)) 08:55:13 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_read_part_table(0x3f00000000000000, 0x2, &(0x7f0000002640)=[{0x0, 0x0, 0xfffffffffffffff7}, {&(0x7f0000001540)="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", 0x1e0}]) 08:55:13 executing program 2: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000000)=0x3) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r3 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r3, 0x40047438, &(0x7f0000000180)=""/246) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r4, &(0x7f0000000040)=ANY=[], 0xfea7) accept4$packet(r1, &(0x7f00000002c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000300)=0x14, 0x0) sendmsg$TCPDIAG_GETSOCK(r4, &(0x7f0000000440)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000400)={&(0x7f0000000340)=ANY=[@ANYBLOB="b80000001200000027bd7000f8ffffff18035c014e224e23ffffff7f0400000000f8ffff0080000000000000000400000500000003000000", @ANYRES32=r5, @ANYBLOB="db0000000180000008000000010000003f000100d60b2f7a00b54242081995ba143885547e708f69b62aa8eeea42a2ce3e0c134b295f068a78d564b16411864d093a5e36ea80fc88341084557db02e002c00010030abb01c1fa461ed7fdce2d4b27e49dc2dd4198a73ee554f990dd4ac57e7d455830df59891f8998a"], 0xb8}, 0x1, 0x0, 0x0, 0x10}, 0x0) r6 = socket$inet6(0xa, 0x2, 0x0) r7 = dup(r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) ioctl$KDGETLED(r7, 0x4b31, &(0x7f0000000140)) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r4, 0x0) ioctl$PPPIOCSFLAGS1(r3, 0x40047457, &(0x7f00000000c0)) 08:55:13 executing program 5: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000000)=0x3) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r2, 0x40047438, &(0x7f0000000180)=""/246) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r3, 0x0) ioctl$PPPIOCSFLAGS1(r2, 0x80047453, &(0x7f00000000c0)) [ 1201.702954] IPVS: ftp: loaded support on port[0] = 21 [ 1201.708223] IPVS: ftp: loaded support on port[0] = 21 [ 1201.732204] IPVS: ftp: loaded support on port[0] = 21 [ 1201.739434] loop3: [POWERTEC] p1 p2 p3 p4 p5 p6 p7 p8 p9 p10 p11 p12 [ 1201.757047] IPVS: ftp: loaded support on port[0] = 21 [ 1201.760390] loop3: p1 start 233194046 is beyond EOD, truncated [ 1201.809318] loop3: p2 start 3569653895 is beyond EOD, truncated [ 1201.833657] loop3: p3 start 926682669 is beyond EOD, truncated [ 1201.881281] loop3: p4 start 1263303888 is beyond EOD, truncated [ 1201.905955] loop3: p5 start 1281279881 is beyond EOD, truncated [ 1201.928028] loop3: p6 start 3452787639 is beyond EOD, truncated [ 1201.966293] loop3: p7 start 2263908108 is beyond EOD, truncated [ 1201.991232] loop3: p8 start 1970859340 is beyond EOD, truncated [ 1202.013495] loop3: p9 start 1782333214 is beyond EOD, truncated [ 1202.036665] loop3: p10 start 1751982490 is beyond EOD, truncated [ 1202.058852] loop3: p11 start 3605249017 is beyond EOD, truncated [ 1202.090695] loop3: p12 start 2400178403 is beyond EOD, truncated 08:55:14 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_read_part_table(0x4000000000000000, 0x2, &(0x7f0000002640)=[{0x0, 0x0, 0xfffffffffffffff7}, {&(0x7f0000001540)="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", 0x1e0}]) [ 1202.374716] loop3: [POWERTEC] p1 p2 p3 p4 p5 p6 p7 p8 p9 p10 p11 p12 [ 1202.396833] loop3: p1 start 233194046 is beyond EOD, truncated [ 1202.403854] loop3: p2 start 3569653895 is beyond EOD, truncated [ 1202.430556] loop3: p3 start 926682669 is beyond EOD, truncated [ 1202.461251] loop3: p4 start 1263303888 is beyond EOD, truncated [ 1202.480406] IPVS: ftp: loaded support on port[0] = 21 [ 1202.488542] loop3: p5 start 1281279881 is beyond EOD, truncated [ 1202.492560] IPVS: ftp: loaded support on port[0] = 21 [ 1202.499557] loop3: p6 start 3452787639 is beyond EOD, truncated [ 1202.512906] IPVS: ftp: loaded support on port[0] = 21 [ 1202.541356] loop3: p7 start 2263908108 is beyond EOD, truncated [ 1202.595193] loop3: p8 start 1970859340 is beyond EOD, truncated [ 1202.614422] loop3: p9 start 1782333214 is beyond EOD, truncated 08:55:14 executing program 5: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000000)=0x3) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r2, 0x40047438, &(0x7f0000000180)=""/246) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r3, 0x0) ioctl$PPPIOCSFLAGS1(r2, 0x80047453, &(0x7f00000000c0)) [ 1202.654192] loop3: p10 start 1751982490 is beyond EOD, truncated [ 1202.674536] loop3: p11 start 3605249017 is beyond EOD, truncated [ 1202.696050] loop3: p12 start 2400178403 is beyond EOD, truncated [ 1202.826821] IPVS: ftp: loaded support on port[0] = 21 08:55:15 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_read_part_table(0x4800000000000000, 0x2, &(0x7f0000002640)=[{0x0, 0x0, 0xfffffffffffffff7}, {&(0x7f0000001540)="c2ec123b097b69be3e42e60d3f03ff5b20b3406e8d7eebd2456f5388ad7135b73efb98088798c4d4506cd2295e60b5e9f9f2399833ad179a03e098e07644033f2d0e3c37a84095cdde0312f1d81191a92ccbe761424e7d3033a056d7d07c4c4bc2dbbb00079ae5158b76bed5cdd1d93054fff6874b43ef1289c75e4c9b911d69313cbc4e0abcab496b4ce2c83f238a2b30fc8210b75bcdcd0b774ac467962cc4389843f92f418b0718a87f17ae20f1790c7ff086746847e2217207cede6d2af2a58d7148128b2f86806b3be24ced787543219ae633ab66b7828c5bfd87571ee33ab89138401439491e3f3c6a4a56b4bf8a7d532ee9144977f6ac8fae105ab358e231f2cd9a216d68b0877161e158b14837fb1426f4a629f17ddd7bbf9019941ff9bbe3d6fd30d68dbd9e3b3cfb282bc08db959b660ed8f7ebc67714be3d00f8f1e2cbc9404069335265ce12996f7cb48c1f3221f7f892493e4711a6dbd79a0298e0e0b9936b06a3d08821f558f5738b05e2ead126157186dac58de8a7098291efacb6666b2dca73d422fbf6a09b30f3c30cc9e34faa453ef1d770f7008b7c54d644be9716b27aa40b67126130b61c29a254a578365216655e8a5c6955e72fb67e6f1796e499edcaa33e0b43bd172d9977deff713978907e12189743913c7c847", 0x1e0}]) [ 1203.158808] loop3: [POWERTEC] p1 p2 p3 p4 p5 p6 p7 p8 p9 p10 p11 p12 [ 1203.186855] loop3: p1 start 233194046 is beyond EOD, truncated [ 1203.192936] loop3: p2 start 3569653895 is beyond EOD, truncated [ 1203.234508] loop3: p3 start 926682669 is beyond EOD, truncated [ 1203.240585] loop3: p4 start 1263303888 is beyond EOD, truncated [ 1203.248284] loop3: p5 start 1281279881 is beyond EOD, truncated [ 1203.264276] loop3: p6 start 3452787639 is beyond EOD, truncated [ 1203.270369] loop3: p7 start 2263908108 is beyond EOD, truncated [ 1203.288187] loop3: p8 start 1970859340 is beyond EOD, truncated [ 1203.304731] loop3: p9 start 1782333214 is beyond EOD, truncated [ 1203.316663] loop3: p10 start 1751982490 is beyond EOD, truncated [ 1203.323100] loop3: p11 start 3605249017 is beyond EOD, truncated [ 1203.357297] loop3: p12 start 2400178403 is beyond EOD, truncated 08:55:16 executing program 0: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000000)=0x3) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r3 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r3, 0x40047438, &(0x7f0000000180)=""/246) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r4, &(0x7f0000000040)=ANY=[], 0xfea7) ioctl$PPPIOCSFLAGS1(r3, 0x4020744f, &(0x7f00000000c0)) 08:55:16 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_read_part_table(0x4a57625000000000, 0x2, &(0x7f0000002640)=[{0x0, 0x0, 0xfffffffffffffff7}, {&(0x7f0000001540)="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", 0x1e0}]) [ 1204.849130] IPVS: ftp: loaded support on port[0] = 21 [ 1204.855107] loop3: [POWERTEC] p1 p2 p3 p4 p5 p6 p7 p8 p9 p10 p11 p12 [ 1204.877297] loop3: p1 start 233194046 is beyond EOD, truncated [ 1204.921511] loop3: p2 start 3569653895 is beyond EOD, truncated [ 1204.964296] loop3: p3 start 926682669 is beyond EOD, truncated [ 1205.002260] loop3: p4 start 1263303888 is beyond EOD, truncated [ 1205.042644] loop3: p5 start 1281279881 is beyond EOD, truncated [ 1205.083079] loop3: p6 start 3452787639 is beyond EOD, truncated [ 1205.119054] loop3: p7 start 2263908108 is beyond EOD, truncated [ 1205.152134] loop3: p8 start 1970859340 is beyond EOD, truncated [ 1205.185902] loop3: p9 start 1782333214 is beyond EOD, truncated [ 1205.215059] loop3: p10 start 1751982490 is beyond EOD, truncated [ 1205.241666] loop3: p11 start 3605249017 is beyond EOD, truncated [ 1205.270595] loop3: p12 start 2400178403 is beyond EOD, truncated 08:55:17 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_read_part_table(0x4c00000000000000, 0x2, &(0x7f0000002640)=[{0x0, 0x0, 0xfffffffffffffff7}, {&(0x7f0000001540)="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", 0x1e0}]) [ 1205.505488] loop3: [POWERTEC] p1 p2 p3 p4 p5 p6 p7 p8 p9 p10 p11 p12 [ 1205.518287] loop3: p1 start 233194046 is beyond EOD, truncated [ 1205.576403] loop3: p2 start 3569653895 is beyond EOD, truncated [ 1205.609643] loop3: p3 start 926682669 is beyond EOD, truncated [ 1205.644205] loop3: p4 start 1263303888 is beyond EOD, truncated [ 1205.675141] loop3: p5 start 1281279881 is beyond EOD, truncated [ 1205.701694] loop3: p6 start 3452787639 is beyond EOD, truncated [ 1205.728256] loop3: p7 start 2263908108 is beyond EOD, truncated 08:55:17 executing program 0: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000000)=0x3) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r3 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r3, 0x40047438, &(0x7f0000000180)=""/246) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r4, &(0x7f0000000040)=ANY=[], 0xfea7) ioctl$PPPIOCSFLAGS1(r3, 0x4020744f, &(0x7f00000000c0)) [ 1205.755454] loop3: p8 start 1970859340 is beyond EOD, truncated [ 1205.781693] loop3: p9 start 1782333214 is beyond EOD, truncated [ 1205.823135] loop3: p10 start 1751982490 is beyond EOD, truncated [ 1205.851751] loop3: p11 start 3605249017 is beyond EOD, truncated [ 1205.877998] loop3: p12 start 2400178403 is beyond EOD, truncated [ 1205.918663] IPVS: ftp: loaded support on port[0] = 21 08:55:19 executing program 4: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000000)=0x3) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r2, 0x40047438, &(0x7f0000000180)=""/246) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r3, 0x0) ioctl$PPPIOCSFLAGS1(r2, 0x80047453, &(0x7f00000000c0)) [ 1207.749068] IPVS: ftp: loaded support on port[0] = 21 08:55:20 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_read_part_table(0x5500000000000000, 0x2, &(0x7f0000002640)=[{0x0, 0x0, 0xfffffffffffffff7}, {&(0x7f0000001540)="c2ec123b097b69be3e42e60d3f03ff5b20b3406e8d7eebd2456f5388ad7135b73efb98088798c4d4506cd2295e60b5e9f9f2399833ad179a03e098e07644033f2d0e3c37a84095cdde0312f1d81191a92ccbe761424e7d3033a056d7d07c4c4bc2dbbb00079ae5158b76bed5cdd1d93054fff6874b43ef1289c75e4c9b911d69313cbc4e0abcab496b4ce2c83f238a2b30fc8210b75bcdcd0b774ac467962cc4389843f92f418b0718a87f17ae20f1790c7ff086746847e2217207cede6d2af2a58d7148128b2f86806b3be24ced787543219ae633ab66b7828c5bfd87571ee33ab89138401439491e3f3c6a4a56b4bf8a7d532ee9144977f6ac8fae105ab358e231f2cd9a216d68b0877161e158b14837fb1426f4a629f17ddd7bbf9019941ff9bbe3d6fd30d68dbd9e3b3cfb282bc08db959b660ed8f7ebc67714be3d00f8f1e2cbc9404069335265ce12996f7cb48c1f3221f7f892493e4711a6dbd79a0298e0e0b9936b06a3d08821f558f5738b05e2ead126157186dac58de8a7098291efacb6666b2dca73d422fbf6a09b30f3c30cc9e34faa453ef1d770f7008b7c54d644be9716b27aa40b67126130b61c29a254a578365216655e8a5c6955e72fb67e6f1796e499edcaa33e0b43bd172d9977deff713978907e12189743913c7c847", 0x1e0}]) 08:55:20 executing program 0: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000000)=0x3) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r3 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r3, 0x40047438, &(0x7f0000000180)=""/246) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r4, 0x0) ioctl$PPPIOCSFLAGS1(r3, 0x4020744f, &(0x7f00000000c0)) 08:55:20 executing program 2: unshare(0x40000000) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/net/pfkey\x00', 0x2180, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000000)=0x3) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x1a, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r3 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r4, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000000)={0x3c, 0x0, 0x1, 0x5, 0x0, 0x0, {}, [@CTA_TUPLE_ORIG={0x24, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @broadcast}, {0x8, 0x2, @dev}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_SEQ_ADJ_REPLY={0x4}]}, 0x3c}}, 0x0) ioctl$VIDIOC_G_EXT_CTRLS(r3, 0xc0205647, &(0x7f0000000300)={0x990000, 0x81, 0x4, r4, 0x0, &(0x7f00000002c0)={0x98090e, 0x3c5, [], @p_u8=&(0x7f0000000140)=0x40}}) r5 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x200900, 0x0) ioctl$EVIOCGPROP(r5, 0x40047438, &(0x7f0000000180)=""/246) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r6, &(0x7f0000000040)=ANY=[], 0xfea7) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r6, 0x0) ioctl$PPPIOCSFLAGS1(r5, 0x40047457, &(0x7f00000000c0)) 08:55:20 executing program 1: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$FUSE_IOCTL(r1, &(0x7f0000000100)={0x20, 0x0, 0x1, {0x7, 0x4, 0x9, 0x2}}, 0x20) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000000)=0x3) r3 = socket$inet6(0xa, 0x2, 0x0) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, r4}, 0x78) r5 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x420380, 0x0) ioctl$EVIOCGPROP(r5, 0x40047438, &(0x7f0000000180)=""/246) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r6, &(0x7f0000000040)=ANY=[], 0xfea7) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r6, 0x0) ioctl$PPPIOCSFLAGS1(r5, 0x40047457, &(0x7f00000000c0)) [ 1208.142647] IPVS: ftp: loaded support on port[0] = 21 [ 1208.147443] IPVS: ftp: loaded support on port[0] = 21 [ 1208.169978] IPVS: ftp: loaded support on port[0] = 21 [ 1208.182038] loop3: [POWERTEC] p1 p2 p3 p4 p5 p6 p7 p8 p9 p10 p11 p12 [ 1208.211901] loop3: p1 start 233194046 is beyond EOD, truncated [ 1208.272522] loop3: p2 start 3569653895 is beyond EOD, truncated 08:55:20 executing program 5: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000000)=0x3) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r2, 0x40047438, &(0x7f0000000180)=""/246) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r3, 0x0) ioctl$PPPIOCSFLAGS1(r2, 0x80047453, &(0x7f00000000c0)) [ 1208.331746] loop3: p3 start 926682669 is beyond EOD, truncated [ 1208.369298] loop3: p4 start 1263303888 is beyond EOD, truncated [ 1208.406749] loop3: p5 start 1281279881 is beyond EOD, truncated [ 1208.460722] loop3: p6 start 3452787639 is beyond EOD, truncated 08:55:20 executing program 4: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000000)=0x3) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r1 = creat(&(0x7f0000000100)='./file0\x00', 0x1e0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={r1, 0x0, 0x16, 0x0, &(0x7f0000000140)="b98d52821f318f112db2dcdfaae178af3dbefe1d90be", &(0x7f00000002c0), 0x4, 0x0, 0x45, 0xa4, &(0x7f0000000300)="8c40bb17294ad3676670ed922450e2167a2ec39ca507e5bed616711f37801ced7e1a9f7b7ca81ce7069d8aca1cab43fb31287950de046e74fca11b2f918a7bb7fded850170", &(0x7f0000000380)="b9fc35d677934f239c57cb86aa440884f6f0cd868866367b0d3ccf2ed162958d09a43d694ef73bc109e94264d27eb97188b2772f1fdeacfa249146fe9be2c91976a39bb7d485ddfbb828eb3de459936b2d4a22117f289950e3c9b9c1b4aaacde9be3832df1097668d067a7ef27084a84595c96c2eebc6d31abdb1daeb49a86496de0eafa8435f80b20f5b01a8e4f86958388f84c9794a079a792834e26f56314c5d5dd5a"}, 0x40) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r2, 0x40047438, &(0x7f0000000180)=""/246) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r3, &(0x7f0000000040)=ANY=[], 0xfea7) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r3, 0x0) ioctl$PPPIOCSFLAGS1(r2, 0x40047457, &(0x7f00000000c0)) [ 1208.516624] loop3: p7 start 2263908108 is beyond EOD, truncated [ 1208.553922] loop3: p8 start 1970859340 is beyond EOD, truncated [ 1208.583567] loop3: p9 start 1782333214 is beyond EOD, truncated [ 1208.593906] IPVS: ftp: loaded support on port[0] = 21 [ 1208.615710] loop3: p10 start 1751982490 is beyond EOD, truncated [ 1208.649244] loop3: p11 start 3605249017 is beyond EOD, truncated [ 1208.685298] loop3: p12 start 2400178403 is beyond EOD, truncated [ 1208.688414] IPVS: ftp: loaded support on port[0] = 21 08:55:21 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_read_part_table(0x6000000000000000, 0x2, &(0x7f0000002640)=[{0x0, 0x0, 0xfffffffffffffff7}, {&(0x7f0000001540)="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", 0x1e0}]) [ 1208.982588] IPVS: ftp: loaded support on port[0] = 21 [ 1209.026071] loop3: [POWERTEC] p1 p2 p3 p4 p5 p6 p7 p8 p9 p10 p11 p12 [ 1209.033708] loop3: p1 start 233194046 is beyond EOD, truncated [ 1209.068372] IPVS: ftp: loaded support on port[0] = 21 [ 1209.090912] loop3: p2 start 3569653895 is beyond EOD, truncated [ 1209.128086] loop3: p3 start 926682669 is beyond EOD, truncated [ 1209.165558] loop3: p4 start 1263303888 is beyond EOD, truncated 08:55:21 executing program 0: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000000)=0x3) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r3 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r3, 0x40047438, &(0x7f0000000180)=""/246) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r4, 0x0) ioctl$PPPIOCSFLAGS1(r3, 0x4020744f, &(0x7f00000000c0)) [ 1209.207710] loop3: p5 start 1281279881 is beyond EOD, truncated [ 1209.244991] loop3: p6 start 3452787639 is beyond EOD, truncated [ 1209.282106] loop3: p7 start 2263908108 is beyond EOD, truncated [ 1209.342227] loop3: p8 start 1970859340 is beyond EOD, truncated [ 1209.370241] loop3: p9 start 1782333214 is beyond EOD, truncated [ 1209.404243] loop3: p10 start 1751982490 is beyond EOD, truncated [ 1209.406391] IPVS: ftp: loaded support on port[0] = 21 [ 1209.438054] loop3: p11 start 3605249017 is beyond EOD, truncated [ 1209.473055] loop3: p12 start 2400178403 is beyond EOD, truncated 08:55:21 executing program 1: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x10, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f00000003c0)={0x14c, 0x0, 0x1, 0x409, 0x0, 0x0, {}, [@CTA_TUPLE_ORIG={0x3c, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @rand_addr=' \x01\x00'}, {0x14, 0x4, @mcast1}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_NAT_DST={0xfc, 0xd, 0x0, 0x1, [@CTA_NAT_PROTO={0x2c, 0x3, 0x0, 0x1, [@CTA_PROTONAT_PORT_MAX={0x6, 0x2, 0x4e23}, @CTA_PROTONAT_PORT_MAX={0x6, 0x2, 0x4e21}, @CTA_PROTONAT_PORT_MAX={0x6, 0x2, 0x4e24}, @CTA_PROTONAT_PORT_MAX={0x6, 0x2, 0x4e23}, @CTA_PROTONAT_PORT_MAX={0x6, 0x2, 0x4e20}]}, @CTA_NAT_V6_MAXIP={0x14, 0x5, @private2={0xfc, 0x2, [], 0x1}}, @CTA_NAT_V4_MAXIP={0x8, 0x2, @broadcast}, @CTA_NAT_PROTO={0x14, 0x3, 0x0, 0x1, [@CTA_PROTONAT_PORT_MIN={0x6, 0x1, 0x4e22}, @CTA_PROTONAT_PORT_MAX={0x6, 0x2, 0x4e22}]}, @CTA_NAT_PROTO={0x34, 0x3, 0x0, 0x1, [@CTA_PROTONAT_PORT_MIN={0x6, 0x1, 0x4e22}, @CTA_PROTONAT_PORT_MAX={0x6, 0x2, 0x4e24}, @CTA_PROTONAT_PORT_MIN={0x6, 0x1, 0x4e21}, @CTA_PROTONAT_PORT_MIN={0x6, 0x1, 0x4e24}, @CTA_PROTONAT_PORT_MIN={0x6, 0x1, 0x4e21}, @CTA_PROTONAT_PORT_MIN={0x6, 0x1, 0x4e24}]}, @CTA_NAT_V4_MAXIP={0x8, 0x2, @multicast1}, @CTA_NAT_PROTO={0x34, 0x3, 0x0, 0x1, [@CTA_PROTONAT_PORT_MIN={0x6, 0x1, 0x4e22}, @CTA_PROTONAT_PORT_MIN={0x6, 0x1, 0x4e20}, @CTA_PROTONAT_PORT_MIN={0x6, 0x1, 0x4e24}, @CTA_PROTONAT_PORT_MIN={0x6, 0x1, 0x4e20}, @CTA_PROTONAT_PORT_MIN={0x6, 0x1, 0x4e22}, @CTA_PROTONAT_PORT_MIN={0x6, 0x1, 0x4e21}]}, @CTA_NAT_PROTO={0x2c, 0x3, 0x0, 0x1, [@CTA_PROTONAT_PORT_MAX={0x6, 0x2, 0x4e22}, @CTA_PROTONAT_PORT_MAX={0x6, 0x2, 0x4e23}, @CTA_PROTONAT_PORT_MIN={0x6, 0x1, 0x4e24}, @CTA_PROTONAT_PORT_MIN={0x6, 0x1, 0x4e21}, @CTA_PROTONAT_PORT_MIN={0x6, 0x1, 0x4e24}]}]}]}, 0x14c}}, 0x0) ioctl$sock_SIOCGIFVLAN_GET_VLAN_VID_CMD(r0, 0x8982, &(0x7f0000000100)) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000000)=0x3) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r2, 0x40047438, &(0x7f0000000180)=""/246) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r3, &(0x7f0000000040)=ANY=[], 0xfea7) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r3, 0x0) r4 = socket$inet6(0xa, 0x2, 0x0) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) mmap$binder(&(0x7f000065c000/0x3000)=nil, 0x3000, 0x1, 0x11, r5, 0xb0) ioctl$PPPIOCSFLAGS1(r2, 0x40047457, &(0x7f00000000c0)) 08:55:21 executing program 5: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000000)=0x3) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r2, 0x40047438, &(0x7f0000000180)=""/246) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r3, 0x0) ioctl$PPPIOCSFLAGS1(r2, 0x80047453, &(0x7f00000000c0)) 08:55:21 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_read_part_table(0x6800000000000000, 0x2, &(0x7f0000002640)=[{0x0, 0x0, 0xfffffffffffffff7}, {&(0x7f0000001540)="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", 0x1e0}]) [ 1209.673374] IPVS: ftp: loaded support on port[0] = 21 [ 1209.748878] IPVS: ftp: loaded support on port[0] = 21 [ 1209.806377] loop3: [POWERTEC] p1 p2 p3 p4 p5 p6 p7 p8 p9 p10 p11 p12 [ 1209.821151] loop3: p1 start 233194046 is beyond EOD, truncated 08:55:22 executing program 4: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000000)=0x3) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r2, 0x40047438, &(0x7f0000000180)=""/246) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r3, 0x0) ioctl$PPPIOCSFLAGS1(r2, 0x80047453, &(0x7f00000000c0)) [ 1209.864457] loop3: p2 start 3569653895 is beyond EOD, truncated [ 1209.896524] loop3: p3 start 926682669 is beyond EOD, truncated [ 1209.950719] loop3: p4 start 1263303888 is beyond EOD, truncated [ 1209.989200] loop3: p5 start 1281279881 is beyond EOD, truncated [ 1210.013233] loop3: p6 start 3452787639 is beyond EOD, truncated [ 1210.035676] loop3: p7 start 2263908108 is beyond EOD, truncated 08:55:22 executing program 2: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000000)=0x3) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r3 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r3, 0x40047438, &(0x7f0000000180)=""/246) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) fgetxattr(r3, &(0x7f0000000100)=@random={'trusted.', '/dev/ppp\x00'}, &(0x7f00000002c0)=""/247, 0xf7) write$binfmt_script(r4, &(0x7f0000000040)=ANY=[], 0xfea7) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r4, 0x0) ioctl$PPPIOCSFLAGS1(r3, 0x40047457, &(0x7f00000000c0)) [ 1210.059824] loop3: p8 start 1970859340 is beyond EOD, truncated [ 1210.069366] IPVS: ftp: loaded support on port[0] = 21 [ 1210.080667] loop3: p9 start 1782333214 is beyond EOD, truncated [ 1210.093236] IPVS: ftp: loaded support on port[0] = 21 [ 1210.133774] audit: type=1804 audit(1594716922.262:5395): pid=13527 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir167466058/syzkaller.fubub5/659/cgroup.controllers" dev="sda1" ino=17087 res=1 [ 1210.163754] loop3: p10 start 1751982490 is beyond EOD, truncated [ 1210.193338] loop3: p11 start 3605249017 is beyond EOD, truncated [ 1210.231912] loop3: p12 start 2400178403 is beyond EOD, truncated 08:55:22 executing program 0: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000000)=0x3) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r3 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r3, 0x40047438, &(0x7f0000000180)=""/246) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r4, 0x0) ioctl$PPPIOCSFLAGS1(r3, 0x4020744f, &(0x7f00000000c0)) [ 1210.294880] IPVS: ftp: loaded support on port[0] = 21 08:55:22 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_read_part_table(0x6c00000000000000, 0x2, &(0x7f0000002640)=[{0x0, 0x0, 0xfffffffffffffff7}, {&(0x7f0000001540)="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", 0x1e0}]) [ 1210.495085] loop3: [POWERTEC] p1 p2 p3 p4 p5 p6 p7 p8 p9 p10 p11 p12 [ 1210.508667] loop3: p1 start 233194046 is beyond EOD, truncated [ 1210.530797] IPVS: ftp: loaded support on port[0] = 21 [ 1210.547919] loop3: p2 start 3569653895 is beyond EOD, truncated [ 1210.590548] loop3: p3 start 926682669 is beyond EOD, truncated [ 1210.626716] loop3: p4 start 1263303888 is beyond EOD, truncated [ 1210.659325] loop3: p5 start 1281279881 is beyond EOD, truncated [ 1210.692790] loop3: p6 start 3452787639 is beyond EOD, truncated 08:55:22 executing program 5: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000000)=0x3) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r2, 0x40047438, &(0x7f0000000180)=""/246) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r3, 0x0) ioctl$PPPIOCSFLAGS1(r2, 0x80047453, &(0x7f00000000c0)) [ 1210.726170] loop3: p7 start 2263908108 is beyond EOD, truncated [ 1210.771229] loop3: p8 start 1970859340 is beyond EOD, truncated [ 1210.802821] loop3: p9 start 1782333214 is beyond EOD, truncated [ 1210.872029] loop3: p10 start 1751982490 is beyond EOD, truncated [ 1210.909930] loop3: p11 start 3605249017 is beyond EOD, truncated [ 1210.911830] IPVS: ftp: loaded support on port[0] = 21 [ 1210.933866] loop3: p12 start 2400178403 is beyond EOD, truncated [ 1210.947871] IPVS: ftp: loaded support on port[0] = 21 08:55:23 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_read_part_table(0x7400000000000000, 0x2, &(0x7f0000002640)=[{0x0, 0x0, 0xfffffffffffffff7}, {&(0x7f0000001540)="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", 0x1e0}]) 08:55:23 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$SCSI_IOCTL_GET_PCI(r1, 0x5387, &(0x7f0000000000)) openat$fb0(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fb0\x00', 0x201, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x400d02, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000080)=0x11) r3 = socket$inet6(0xa, 0x2, 0x0) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r5, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000000)={0x3c, 0x0, 0x1, 0x409, 0x0, 0x0, {}, [@CTA_TUPLE_ORIG={0x24, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @broadcast}, {0x8, 0x2, @dev}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_SEQ_ADJ_REPLY={0x4}]}, 0x3c}}, 0x0) sendmsg$IPSET_CMD_PROTOCOL(r5, &(0x7f0000000200)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)={0x4c, 0x1, 0x6, 0x201, 0x0, 0x0, {0x7, 0x0, 0x8}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x4c}, 0x1, 0x0, 0x0, 0x44808}, 0x0) write$cgroup_devices(r4, &(0x7f00000000c0)={'a', ' *:* ', 'r\x00'}, 0x8) [ 1211.315612] loop3: [POWERTEC] p1 p2 p3 p4 p5 p6 p7 p8 p9 p10 p11 p12 [ 1211.344309] loop3: p1 start 233194046 is beyond EOD, truncated [ 1211.383504] loop3: p2 start 3569653895 is beyond EOD, truncated [ 1211.421311] loop3: p3 start 926682669 is beyond EOD, truncated 08:55:23 executing program 0: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000000)=0x3) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r3 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r3, 0x40047438, &(0x7f0000000180)=""/246) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000040)=ANY=[], 0xfea7) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, 0xffffffffffffffff, 0x0) ioctl$PPPIOCSFLAGS1(r3, 0x4020744f, &(0x7f00000000c0)) 08:55:23 executing program 4: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000000)=0x3) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r3 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r3, 0x40047438, &(0x7f0000000180)=""/246) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r4, &(0x7f0000000040)=ANY=[], 0xfea7) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r4, 0x0) ioctl$PPPIOCSFLAGS1(r3, 0x40047459, &(0x7f00000000c0)) [ 1211.455933] loop3: p4 start 1263303888 is beyond EOD, truncated [ 1211.496076] loop3: p5 start 1281279881 is beyond EOD, truncated [ 1211.527252] loop3: p6 start 3452787639 is beyond EOD, truncated [ 1211.561117] loop3: p7 start 2263908108 is beyond EOD, truncated [ 1211.596000] loop3: p8 start 1970859340 is beyond EOD, truncated [ 1211.620791] IPVS: ftp: loaded support on port[0] = 21 [ 1211.621104] loop3: p9 start 1782333214 is beyond EOD, truncated [ 1211.650748] loop3: p10 start 1751982490 is beyond EOD, truncated [ 1211.663446] IPVS: ftp: loaded support on port[0] = 21 [ 1211.690164] loop3: p11 start 3605249017 is beyond EOD, truncated [ 1211.727783] loop3: p12 start 2400178403 is beyond EOD, truncated 08:55:25 executing program 5: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000000)=0x3) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r2, 0x40047438, &(0x7f0000000180)=""/246) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r3, 0x0) ioctl$PPPIOCSFLAGS1(r2, 0x80047453, &(0x7f00000000c0)) 08:55:25 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_read_part_table(0x7a00000000000000, 0x2, &(0x7f0000002640)=[{0x0, 0x0, 0xfffffffffffffff7}, {&(0x7f0000001540)="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", 0x1e0}]) 08:55:25 executing program 2: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r3 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000200)='NLBL_MGMT\x00') sendmsg$NLBL_MGMT_C_VERSION(r2, &(0x7f0000000200)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x1c, r3, 0x2, 0x70bd28, 0x25dfdbfb, {}, [@NLBL_MGMT_A_PROTOCOL={0x8, 0x2, 0x7}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000}, 0x4000) sendmsg$NLBL_MGMT_C_LISTALL(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000140)={0x40, r3, 0x2, 0x70bd2a, 0x25dfdbfe, {}, [@NLBL_MGMT_A_FAMILY={0x6, 0xb, 0x5}, @NLBL_MGMT_A_IPV6MASK={0x14, 0x6, @private2}, @NLBL_MGMT_A_CV4DOI={0x8, 0x4, 0x3}, @NLBL_MGMT_A_PROTOCOL={0x8, 0x2, 0x3}]}, 0x40}, 0x1, 0x0, 0x0, 0x4c091}, 0x8001) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r4, 0x5423, &(0x7f0000000000)=0x3) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r5 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r5, 0x40047438, &(0x7f0000000180)=""/246) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r6, &(0x7f0000000040)=ANY=[], 0xfea7) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r6, 0x0) ioctl$PPPIOCSFLAGS1(r5, 0x40047457, &(0x7f00000000c0)) 08:55:25 executing program 0: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000000)=0x3) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r3 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r3, 0x40047438, &(0x7f0000000180)=""/246) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000040)=ANY=[], 0xfea7) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, 0xffffffffffffffff, 0x0) ioctl$PPPIOCSFLAGS1(r3, 0x4020744f, &(0x7f00000000c0)) 08:55:25 executing program 4: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000000)=0x3) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r3 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r3, 0x40047438, &(0x7f0000000180)=""/246) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r4, &(0x7f0000000040)=ANY=[], 0xfea7) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r4, 0x0) ioctl$PPPIOCSFLAGS1(r3, 0x40047459, &(0x7f00000000c0)) 08:55:25 executing program 1: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000000)=0x3) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r1, 0x40047438, &(0x7f0000000180)=""/246) r2 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ttyS3\x00', 0x0, 0x0) r3 = socket$inet6(0xa, 0x2, 0x0) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$TCSETS(r4, 0x5402, &(0x7f0000000140)={0x42, 0x0, 0x7, 0x0, 0x0, "79e9de3d80a657aa9481d73875106c5eba1ada"}) ioctl$KDGKBENT(r2, 0x4b46, &(0x7f0000000100)={0x1, 0x0, 0x81}) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r5, &(0x7f0000000040)=ANY=[], 0xfea7) r6 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) ioctl$DRM_IOCTL_AGP_ENABLE(r6, 0x40086432, &(0x7f00000002c0)=0x14000000) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r5, 0x0) ioctl$PPPIOCSFLAGS1(r1, 0x40047457, &(0x7f00000000c0)) [ 1213.539475] IPVS: ftp: loaded support on port[0] = 21 [ 1213.551873] IPVS: ftp: loaded support on port[0] = 21 [ 1213.574712] IPVS: ftp: loaded support on port[0] = 21 [ 1213.584705] loop3: [POWERTEC] p1 p2 p3 p4 p5 p6 p7 p8 p9 p10 p11 p12 [ 1213.589661] IPVS: ftp: loaded support on port[0] = 21 [ 1213.592142] loop3: p1 start 233194046 is beyond EOD, truncated [ 1213.628280] IPVS: ftp: loaded support on port[0] = 21 [ 1213.659191] loop3: p2 start 3569653895 is beyond EOD, truncated [ 1213.695020] loop3: p3 start 926682669 is beyond EOD, truncated [ 1213.739619] loop3: p4 start 1263303888 is beyond EOD, truncated [ 1213.785547] loop3: p5 start 1281279881 is beyond EOD, truncated [ 1213.825061] loop3: p6 start 3452787639 is beyond EOD, truncated [ 1213.866284] loop3: p7 start 2263908108 is beyond EOD, truncated [ 1213.902418] loop3: p8 start 1970859340 is beyond EOD, truncated [ 1213.942225] loop3: p9 start 1782333214 is beyond EOD, truncated [ 1213.986161] loop3: p10 start 1751982490 is beyond EOD, truncated [ 1214.030282] loop3: p11 start 3605249017 is beyond EOD, truncated [ 1214.063752] loop3: p12 start 2400178403 is beyond EOD, truncated 08:55:26 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_read_part_table(0x8000000000000000, 0x2, &(0x7f0000002640)=[{0x0, 0x0, 0xfffffffffffffff7}, {&(0x7f0000001540)="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", 0x1e0}]) [ 1214.319504] loop3: [POWERTEC] p1 p2 p3 p4 p5 p6 p7 p8 p9 p10 p11 p12 [ 1214.346998] loop3: p1 start 233194046 is beyond EOD, truncated [ 1214.369075] IPVS: ftp: loaded support on port[0] = 21 [ 1214.375252] loop3: p2 start 3569653895 is beyond EOD, truncated [ 1214.403935] loop3: p3 start 926682669 is beyond EOD, truncated 08:55:26 executing program 5: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000000)=0x3) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r3 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r3, 0x40047438, &(0x7f0000000180)=""/246) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r4, 0x0) ioctl$PPPIOCSFLAGS1(r3, 0x80047453, &(0x7f00000000c0)) [ 1214.447432] loop3: p4 start 1263303888 is beyond EOD, truncated [ 1214.462711] IPVS: ftp: loaded support on port[0] = 21 [ 1214.486885] loop3: p5 start 1281279881 is beyond EOD, truncated 08:55:26 executing program 0: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000000)=0x3) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r3 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r3, 0x40047438, &(0x7f0000000180)=""/246) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000040)=ANY=[], 0xfea7) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, 0xffffffffffffffff, 0x0) ioctl$PPPIOCSFLAGS1(r3, 0x4020744f, &(0x7f00000000c0)) [ 1214.527385] loop3: p6 start 3452787639 is beyond EOD, truncated [ 1214.580532] loop3: p7 start 2263908108 is beyond EOD, truncated [ 1214.604053] loop3: p8 start 1970859340 is beyond EOD, truncated [ 1214.607727] IPVS: ftp: loaded support on port[0] = 21 [ 1214.631770] loop3: p9 start 1782333214 is beyond EOD, truncated [ 1214.661879] IPVS: ftp: loaded support on port[0] = 21 [ 1214.663153] loop3: p10 start 1751982490 is beyond EOD, truncated 08:55:26 executing program 4: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000000)=0x3) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r3 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r3, 0x40047438, &(0x7f0000000180)=""/246) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r4, &(0x7f0000000040)=ANY=[], 0xfea7) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r4, 0x0) ioctl$PPPIOCSFLAGS1(r3, 0x40047459, &(0x7f00000000c0)) [ 1214.732197] loop3: p11 start 3605249017 is beyond EOD, truncated [ 1214.792485] loop3: p12 start 2400178403 is beyond EOD, truncated [ 1214.835841] IPVS: ftp: loaded support on port[0] = 21 08:55:27 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_read_part_table(0x97ffffff00000000, 0x2, &(0x7f0000002640)=[{0x0, 0x0, 0xfffffffffffffff7}, {&(0x7f0000001540)="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", 0x1e0}]) [ 1215.125947] loop3: [POWERTEC] p1 p2 p3 p4 p5 p6 p7 p8 p9 p10 p11 p12 [ 1215.143692] loop3: p1 start 233194046 is beyond EOD, truncated [ 1215.158171] loop3: p2 start 3569653895 is beyond EOD, truncated [ 1215.172292] loop3: p3 start 926682669 is beyond EOD, truncated [ 1215.186831] loop3: p4 start 1263303888 is beyond EOD, truncated [ 1215.201087] loop3: p5 start 1281279881 is beyond EOD, truncated [ 1215.212901] loop3: p6 start 3452787639 is beyond EOD, truncated [ 1215.240207] loop3: p7 start 2263908108 is beyond EOD, truncated [ 1215.270899] loop3: p8 start 1970859340 is beyond EOD, truncated [ 1215.300496] loop3: p9 start 1782333214 is beyond EOD, truncated [ 1215.343687] loop3: p10 start 1751982490 is beyond EOD, truncated [ 1215.373257] loop3: p11 start 3605249017 is beyond EOD, truncated 08:55:27 executing program 0: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000000)=0x3) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r3 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r4, &(0x7f0000000040)=ANY=[], 0xfea7) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r4, 0x0) ioctl$PPPIOCSFLAGS1(r3, 0x4020744f, &(0x7f00000000c0)) [ 1215.402664] loop3: p12 start 2400178403 is beyond EOD, truncated 08:55:27 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_read_part_table(0xad1fa69800000000, 0x2, &(0x7f0000002640)=[{0x0, 0x0, 0xfffffffffffffff7}, {&(0x7f0000001540)="c2ec123b097b69be3e42e60d3f03ff5b20b3406e8d7eebd2456f5388ad7135b73efb98088798c4d4506cd2295e60b5e9f9f2399833ad179a03e098e07644033f2d0e3c37a84095cdde0312f1d81191a92ccbe761424e7d3033a056d7d07c4c4bc2dbbb00079ae5158b76bed5cdd1d93054fff6874b43ef1289c75e4c9b911d69313cbc4e0abcab496b4ce2c83f238a2b30fc8210b75bcdcd0b774ac467962cc4389843f92f418b0718a87f17ae20f1790c7ff086746847e2217207cede6d2af2a58d7148128b2f86806b3be24ced787543219ae633ab66b7828c5bfd87571ee33ab89138401439491e3f3c6a4a56b4bf8a7d532ee9144977f6ac8fae105ab358e231f2cd9a216d68b0877161e158b14837fb1426f4a629f17ddd7bbf9019941ff9bbe3d6fd30d68dbd9e3b3cfb282bc08db959b660ed8f7ebc67714be3d00f8f1e2cbc9404069335265ce12996f7cb48c1f3221f7f892493e4711a6dbd79a0298e0e0b9936b06a3d08821f558f5738b05e2ead126157186dac58de8a7098291efacb6666b2dca73d422fbf6a09b30f3c30cc9e34faa453ef1d770f7008b7c54d644be9716b27aa40b67126130b61c29a254a578365216655e8a5c6955e72fb67e6f1796e499edcaa33e0b43bd172d9977deff713978907e12189743913c7c847", 0x1e0}]) 08:55:27 executing program 5: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000000)=0x3) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r3 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r3, 0x40047438, &(0x7f0000000180)=""/246) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r4, 0x0) ioctl$PPPIOCSFLAGS1(r3, 0x80047453, &(0x7f00000000c0)) [ 1215.554666] IPVS: ftp: loaded support on port[0] = 21 08:55:27 executing program 2: unshare(0x40000000) mmap(&(0x7f000077b000/0x1000)=nil, 0x1000, 0x2000003, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000000)=0x3) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r3 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r3, 0x40047438, &(0x7f0000000180)=""/246) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r4, &(0x7f0000000040)=ANY=[], 0xfea7) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r4, 0x0) ioctl$PPPIOCSFLAGS1(r3, 0x40047457, &(0x7f00000000c0)) [ 1215.641573] loop3: [POWERTEC] p1 p2 p3 p4 p5 p6 p7 p8 p9 p10 p11 p12 [ 1215.665242] loop3: p1 start 233194046 is beyond EOD, truncated [ 1215.666112] IPVS: ftp: loaded support on port[0] = 21 [ 1215.710976] loop3: p2 start 3569653895 is beyond EOD, truncated [ 1215.714374] IPVS: ftp: loaded support on port[0] = 21 [ 1215.758873] loop3: p3 start 926682669 is beyond EOD, truncated [ 1215.798728] loop3: p4 start 1263303888 is beyond EOD, truncated [ 1215.859058] loop3: p5 start 1281279881 is beyond EOD, truncated 08:55:28 executing program 4: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000000)=0x3) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r3 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r3, 0x40047438, &(0x7f0000000180)=""/246) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r4, &(0x7f0000000040)=ANY=[], 0xfea7) ioctl$PPPIOCSFLAGS1(r3, 0x40047459, &(0x7f00000000c0)) [ 1215.916511] loop3: p6 start 3452787639 is beyond EOD, truncated [ 1215.936830] loop3: p7 start 2263908108 is beyond EOD, truncated [ 1216.023129] loop3: p8 start 1970859340 is beyond EOD, truncated [ 1216.036968] IPVS: ftp: loaded support on port[0] = 21 [ 1216.077638] loop3: p9 start 1782333214 is beyond EOD, truncated [ 1216.107749] loop3: p10 start 1751982490 is beyond EOD, truncated [ 1216.130872] IPVS: ftp: loaded support on port[0] = 21 [ 1216.137205] loop3: p11 start 3605249017 is beyond EOD, truncated [ 1216.156441] audit: type=1804 audit(1594716928.292:5396): pid=14122 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir968128286/syzkaller.PF5Zls/739/cgroup.controllers" dev="sda1" ino=16098 res=1 [ 1216.199261] loop3: p12 start 2400178403 is beyond EOD, truncated 08:55:28 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_read_part_table(0xf5ffffff00000000, 0x2, &(0x7f0000002640)=[{0x0, 0x0, 0xfffffffffffffff7}, {&(0x7f0000001540)="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", 0x1e0}]) [ 1216.454919] loop3: [POWERTEC] p1 p2 p3 p4 p5 p6 p7 p8 p9 p10 p11 p12 [ 1216.470281] loop3: p1 start 233194046 is beyond EOD, truncated [ 1216.509471] loop3: p2 start 3569653895 is beyond EOD, truncated [ 1216.546006] loop3: p3 start 926682669 is beyond EOD, truncated [ 1216.579226] loop3: p4 start 1263303888 is beyond EOD, truncated [ 1216.600838] loop3: p5 start 1281279881 is beyond EOD, truncated [ 1216.632714] loop3: p6 start 3452787639 is beyond EOD, truncated [ 1216.652589] loop3: p7 start 2263908108 is beyond EOD, truncated [ 1216.671750] loop3: p8 start 1970859340 is beyond EOD, truncated [ 1216.729645] loop3: p9 start 1782333214 is beyond EOD, truncated [ 1216.756637] loop3: p10 start 1751982490 is beyond EOD, truncated [ 1216.776103] loop3: p11 start 3605249017 is beyond EOD, truncated [ 1216.796960] loop3: p12 start 2400178403 is beyond EOD, truncated 08:55:30 executing program 5: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000000)=0x3) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r3 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r3, 0x40047438, &(0x7f0000000180)=""/246) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r4, 0x0) ioctl$PPPIOCSFLAGS1(r3, 0x80047453, &(0x7f00000000c0)) 08:55:30 executing program 0: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000000)=0x3) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r3 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r4, &(0x7f0000000040)=ANY=[], 0xfea7) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r4, 0x0) ioctl$PPPIOCSFLAGS1(r3, 0x4020744f, &(0x7f00000000c0)) 08:55:30 executing program 4: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000000)=0x3) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r3 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r3, 0x40047438, &(0x7f0000000180)=""/246) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r4, &(0x7f0000000040)=ANY=[], 0xfea7) ioctl$PPPIOCSFLAGS1(r3, 0x40047459, &(0x7f00000000c0)) 08:55:30 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_read_part_table(0xf73f000000000000, 0x2, &(0x7f0000002640)=[{0x0, 0x0, 0xfffffffffffffff7}, {&(0x7f0000001540)="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", 0x1e0}]) 08:55:30 executing program 1: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000000)=0x3) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r1, 0x40047438, &(0x7f00000003c0)=""/248) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r2, &(0x7f0000000040)=ANY=[], 0xfea7) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r2, 0x0) r3 = socket$inet6(0xa, 0x2, 0x0) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = socket$inet6(0xa, 0x2, 0x0) r6 = dup(r5) sendmsg$can_bcm(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000080), 0x10, &(0x7f0000000140)={&(0x7f00000000c0)={0x0, 0x0, 0x0, {0x0, 0x2710}, {0x77359400}, {}, 0x1, @can={{}, 0x0, 0x0, 0x0, 0x0, "a4ef08f666c5d148"}}, 0x48}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000340)={&(0x7f0000000300)=@ipv6_getnetconf={0x24, 0x52, 0x200, 0x70bd2c, 0x25dfdbfe, {}, [@NETCONFA_IFINDEX={0x8}, @IGNORE_ROUTES_WITH_LINKDOWN={0x8, 0x6, 0x10000}]}, 0x24}, 0x1, 0x0, 0x0, 0x8081}, 0x4) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) ioctl$PPPIOCSFLAGS1(r6, 0x40047457, &(0x7f00000000c0)) fsetxattr$trusted_overlay_origin(r2, &(0x7f0000000200)='trusted.overlay.origin\x00', &(0x7f0000000140)='y\x00', 0x2, 0x3) [ 1218.109021] IPVS: ftp: loaded support on port[0] = 21 [ 1218.116072] IPVS: ftp: loaded support on port[0] = 21 [ 1218.122222] IPVS: ftp: loaded support on port[0] = 21 [ 1218.136588] loop3: [POWERTEC] p1 p2 p3 p4 p5 p6 p7 p8 p9 p10 p11 p12 [ 1218.143958] loop3: p1 start 233194046 is beyond EOD, truncated [ 1218.193470] loop3: p2 start 3569653895 is beyond EOD, truncated [ 1218.199356] IPVS: ftp: loaded support on port[0] = 21 [ 1218.244098] loop3: p3 start 926682669 is beyond EOD, truncated [ 1218.299090] loop3: p4 start 1263303888 is beyond EOD, truncated [ 1218.344705] loop3: p5 start 1281279881 is beyond EOD, truncated [ 1218.395237] loop3: p6 start 3452787639 is beyond EOD, truncated [ 1218.418846] loop3: p7 start 2263908108 is beyond EOD, truncated [ 1218.479692] loop3: p8 start 1970859340 is beyond EOD, truncated [ 1218.494608] loop3: p9 start 1782333214 is beyond EOD, truncated [ 1218.508344] loop3: p10 start 1751982490 is beyond EOD, truncated 08:55:30 executing program 2: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000000)=0x3) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r3 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r3, 0x40047438, &(0x7f0000000180)=""/246) r4 = syz_init_net_socket$nfc_raw(0x27, 0x5, 0x0) accept(r4, &(0x7f0000000100)=@alg, &(0x7f00000002c0)=0x80) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r5, &(0x7f0000000040)=ANY=[], 0xfea7) r6 = socket(0x1000000010, 0x80002, 0x0) sendmmsg$alg(r6, &(0x7f0000000200), 0x10efe10675dec16, 0x0) getsockopt$inet_mreqn(r6, 0x0, 0x20, &(0x7f0000000300)={@broadcast, @initdev}, &(0x7f0000000340)=0xc) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r5, 0x0) ioctl$PPPIOCSFLAGS1(r3, 0x40047457, &(0x7f00000000c0)) [ 1218.546081] loop3: p11 start 3605249017 is beyond EOD, truncated [ 1218.587950] loop3: p12 start 2400178403 is beyond EOD, truncated [ 1218.638988] IPVS: ftp: loaded support on port[0] = 21 08:55:30 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_read_part_table(0xfdffffff00000000, 0x2, &(0x7f0000002640)=[{0x0, 0x0, 0xfffffffffffffff7}, {&(0x7f0000001540)="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", 0x1e0}]) [ 1218.836300] loop3: [POWERTEC] p1 p2 p3 p4 p5 p6 p7 p8 p9 p10 p11 p12 [ 1218.859283] loop3: p1 start 233194046 is beyond EOD, truncated [ 1218.896440] loop3: p2 start 3569653895 is beyond EOD, truncated [ 1218.923481] IPVS: ftp: loaded support on port[0] = 21 [ 1218.937453] loop3: p3 start 926682669 is beyond EOD, truncated [ 1218.963921] loop3: p4 start 1263303888 is beyond EOD, truncated [ 1218.987169] loop3: p5 start 1281279881 is beyond EOD, truncated 08:55:31 executing program 4: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000000)=0x3) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r3 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r3, 0x40047438, &(0x7f0000000180)=""/246) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r4, &(0x7f0000000040)=ANY=[], 0xfea7) ioctl$PPPIOCSFLAGS1(r3, 0x40047459, &(0x7f00000000c0)) [ 1219.010796] loop3: p6 start 3452787639 is beyond EOD, truncated 08:55:31 executing program 0: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000000)=0x3) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r3 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r4, &(0x7f0000000040)=ANY=[], 0xfea7) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r4, 0x0) ioctl$PPPIOCSFLAGS1(r3, 0x4020744f, &(0x7f00000000c0)) [ 1219.050877] loop3: p7 start 2263908108 is beyond EOD, truncated 08:55:31 executing program 5: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000000)=0x3) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r3 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r3, 0x40047438, &(0x7f0000000180)=""/246) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r4, 0x0) ioctl$PPPIOCSFLAGS1(r3, 0x80047453, &(0x7f00000000c0)) [ 1219.097019] loop3: p8 start 1970859340 is beyond EOD, truncated [ 1219.137217] loop3: p9 start 1782333214 is beyond EOD, truncated [ 1219.146586] IPVS: ftp: loaded support on port[0] = 21 [ 1219.165731] IPVS: ftp: loaded support on port[0] = 21 [ 1219.173039] loop3: p10 start 1751982490 is beyond EOD, truncated [ 1219.196223] IPVS: ftp: loaded support on port[0] = 21 [ 1219.222230] loop3: p11 start 3605249017 is beyond EOD, truncated [ 1219.260572] loop3: p12 start 2400178403 is beyond EOD, truncated 08:55:31 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_read_part_table(0xff0f000000000000, 0x2, &(0x7f0000002640)=[{0x0, 0x0, 0xfffffffffffffff7}, {&(0x7f0000001540)="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", 0x1e0}]) [ 1219.397485] IPVS: ftp: loaded support on port[0] = 21 [ 1219.575316] loop3: [POWERTEC] p1 p2 p3 p4 p5 p6 p7 p8 p9 p10 p11 p12 [ 1219.589296] loop3: p1 start 233194046 is beyond EOD, truncated [ 1219.628195] loop3: p2 start 3569653895 is beyond EOD, truncated [ 1219.663544] loop3: p3 start 926682669 is beyond EOD, truncated [ 1219.697449] loop3: p4 start 1263303888 is beyond EOD, truncated [ 1219.734210] loop3: p5 start 1281279881 is beyond EOD, truncated [ 1219.777224] loop3: p6 start 3452787639 is beyond EOD, truncated [ 1219.814977] loop3: p7 start 2263908108 is beyond EOD, truncated [ 1219.844885] loop3: p8 start 1970859340 is beyond EOD, truncated [ 1219.879943] loop3: p9 start 1782333214 is beyond EOD, truncated [ 1219.916466] loop3: p10 start 1751982490 is beyond EOD, truncated 08:55:32 executing program 0: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000000)=0x3) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) ioctl$EVIOCGPROP(0xffffffffffffffff, 0x40047438, &(0x7f0000000180)=""/246) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r3, &(0x7f0000000040)=ANY=[], 0xfea7) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r3, 0x0) ioctl$PPPIOCSFLAGS1(0xffffffffffffffff, 0x4020744f, &(0x7f00000000c0)) 08:55:32 executing program 1: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41000, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) tkill(0x0, 0x2) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000680)='net/netstat\x00') r2 = socket$inet6(0xa, 0x2, 0x0) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000740)={0x16, 0x6, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x7d8f}, [@exit, @map_val={0x18, 0xa}]}, &(0x7f0000000140)='GPL\x00', 0x3, 0xa1, &(0x7f0000000500)=""/161, 0x41100, 0x8, [], 0x0, 0x5, r1, 0x8, &(0x7f00000006c0)={0x4, 0x5}, 0x8, 0x10, &(0x7f0000000700)={0x2, 0x10, 0x1, 0x6}, 0x10, 0xffffffffffffffff, r3}, 0x78) ioctl$EVIOCGPROP(r0, 0x40047438, &(0x7f0000000180)=""/246) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r4, &(0x7f0000000040)=ANY=[], 0xfea7) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r4, 0x0) r5 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ttyS3\x00', 0x0, 0x0) ioctl$TCSETS(r5, 0x5402, &(0x7f00000000c0)={0x0, 0x0, 0xf83f, 0x0, 0x0, "79e9de3d80a657aa9481d73875106c5eba1ada"}) ioctl$KDSKBSENT(r5, 0x4b49, &(0x7f00000002c0)={0xba, "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"}) ioctl$PPPIOCSFLAGS1(r0, 0x40047457, &(0x7f00000000c0)) [ 1219.967116] loop3: p11 start 3605249017 is beyond EOD, truncated [ 1219.999998] loop3: p12 start 2400178403 is beyond EOD, truncated 08:55:32 executing program 4: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000000)=0x3) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r3 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r3, 0x40047438, &(0x7f0000000180)=""/246) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r4, 0x0) ioctl$PPPIOCSFLAGS1(r3, 0x40047459, &(0x7f00000000c0)) 08:55:32 executing program 5: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000000)=0x3) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r3 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r3, 0x40047438, &(0x7f0000000180)=""/246) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r4, 0x0) ioctl$PPPIOCSFLAGS1(r3, 0x80047453, &(0x7f00000000c0)) [ 1220.151485] IPVS: ftp: loaded support on port[0] = 21 [ 1220.226460] IPVS: ftp: loaded support on port[0] = 21 [ 1220.247891] IPVS: ftp: loaded support on port[0] = 21 08:55:32 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_read_part_table(0xff3f000000000000, 0x2, &(0x7f0000002640)=[{0x0, 0x0, 0xfffffffffffffff7}, {&(0x7f0000001540)="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", 0x1e0}]) 08:55:32 executing program 2: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000000)={0x3c, 0x0, 0x1, 0x409, 0x0, 0x0, {}, [@CTA_TUPLE_ORIG={0x24, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @broadcast}, {0x8, 0x2, @dev}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_SEQ_ADJ_REPLY={0x4}]}, 0x3c}}, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000000)={0x3c, 0x0, 0x1, 0x409, 0x0, 0x0, {}, [@CTA_TUPLE_ORIG={0x24, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @broadcast}, {0x8, 0x2, @dev}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_SEQ_ADJ_REPLY={0x4}]}, 0x3c}}, 0x0) dup2(r0, r1) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r4, 0x5423, &(0x7f0000000000)=0x3) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r5 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r5, 0x40047438, &(0x7f0000000180)=""/246) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r6, &(0x7f0000000040)=ANY=[], 0xfea7) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r6, 0x0) ioctl$PPPIOCSFLAGS1(r5, 0x40047457, &(0x7f00000000c0)) [ 1220.604971] loop3: [POWERTEC] p1 p2 p3 p4 p5 p6 p7 p8 p9 p10 p11 p12 [ 1220.639687] loop3: p1 start 233194046 is beyond EOD, truncated [ 1220.683618] loop3: p2 start 3569653895 is beyond EOD, truncated [ 1220.705010] IPVS: ftp: loaded support on port[0] = 21 [ 1220.724100] loop3: p3 start 926682669 is beyond EOD, truncated [ 1220.739780] loop3: p4 start 1263303888 is beyond EOD, truncated [ 1220.771834] loop3: p5 start 1281279881 is beyond EOD, truncated [ 1220.793567] loop3: p6 start 3452787639 is beyond EOD, truncated [ 1220.808840] loop3: p7 start 2263908108 is beyond EOD, truncated [ 1220.823045] loop3: p8 start 1970859340 is beyond EOD, truncated [ 1220.837470] loop3: p9 start 1782333214 is beyond EOD, truncated [ 1220.850816] loop3: p10 start 1751982490 is beyond EOD, truncated [ 1220.865190] loop3: p11 start 3605249017 is beyond EOD, truncated [ 1220.899703] loop3: p12 start 2400178403 is beyond EOD, truncated 08:55:33 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_read_part_table(0xffffff7f00000000, 0x2, &(0x7f0000002640)=[{0x0, 0x0, 0xfffffffffffffff7}, {&(0x7f0000001540)="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", 0x1e0}]) [ 1221.195768] loop3: [POWERTEC] p1 p2 p3 p4 p5 p6 p7 p8 p9 p10 p11 p12 [ 1221.207421] loop3: p1 start 233194046 is beyond EOD, truncated [ 1221.230281] loop3: p2 start 3569653895 is beyond EOD, truncated [ 1221.244388] loop3: p3 start 926682669 is beyond EOD, truncated [ 1221.258547] loop3: p4 start 1263303888 is beyond EOD, truncated [ 1221.275220] loop3: p5 start 1281279881 is beyond EOD, truncated [ 1221.289824] loop3: p6 start 3452787639 is beyond EOD, truncated [ 1221.304720] loop3: p7 start 2263908108 is beyond EOD, truncated [ 1221.318920] loop3: p8 start 1970859340 is beyond EOD, truncated [ 1221.326310] loop3: p9 start 1782333214 is beyond EOD, truncated [ 1221.332594] loop3: p10 start 1751982490 is beyond EOD, truncated [ 1221.340992] loop3: p11 start 3605249017 is beyond EOD, truncated [ 1221.347926] loop3: p12 start 2400178403 is beyond EOD, truncated 08:55:33 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_read_part_table(0xffffffff00000000, 0x2, &(0x7f0000002640)=[{0x0, 0x0, 0xfffffffffffffff7}, {&(0x7f0000001540)="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", 0x1e0}]) [ 1221.443315] IPVS: ftp: loaded support on port[0] = 21 08:55:33 executing program 1: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000000)=0x3) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r1, 0x40047438, &(0x7f0000000180)=""/246) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r2, &(0x7f0000000040)=ANY=[], 0xfea7) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r2, 0x0) r3 = socket$inet6(0xa, 0x2, 0x0) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$VHOST_SET_VRING_ERR(r2, 0x4008af22, &(0x7f0000000100)={0x0, r4}) ioctl$PPPIOCSFLAGS1(r1, 0x40047457, &(0x7f00000000c0)) [ 1221.584574] loop3: [POWERTEC] p1 p2 p3 p4 p5 p6 p7 p8 p9 p10 p11 p12 [ 1221.595791] loop3: p1 start 233194046 is beyond EOD, truncated [ 1221.603808] loop3: p2 start 3569653895 is beyond EOD, truncated [ 1221.623927] loop3: p3 start 926682669 is beyond EOD, truncated [ 1221.637908] loop3: p4 start 1263303888 is beyond EOD, truncated [ 1221.658671] loop3: p5 start 1281279881 is beyond EOD, truncated [ 1221.678280] IPVS: ftp: loaded support on port[0] = 21 [ 1221.691300] loop3: p6 start 3452787639 is beyond EOD, truncated [ 1221.712225] loop3: p7 start 2263908108 is beyond EOD, truncated [ 1221.727880] loop3: p8 start 1970859340 is beyond EOD, truncated [ 1221.741149] loop3: p9 start 1782333214 is beyond EOD, truncated [ 1221.755163] loop3: p10 start 1751982490 is beyond EOD, truncated [ 1221.777065] loop3: p11 start 3605249017 is beyond EOD, truncated [ 1221.797231] loop3: p12 start 2400178403 is beyond EOD, truncated 08:55:34 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_read_part_table(0x0, 0x4, &(0x7f0000002640)=[{0x0, 0x0, 0xfffffffffffffff7}, {&(0x7f0000001540)="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", 0x1e0}]) [ 1222.069301] loop3: [POWERTEC] p1 p2 p3 p4 p5 p6 p7 p8 p9 p10 p11 p12 [ 1222.078870] loop3: p1 start 233194046 is beyond EOD, truncated [ 1222.092998] loop3: p2 start 3569653895 is beyond EOD, truncated [ 1222.107907] loop3: p3 start 926682669 is beyond EOD, truncated 08:55:34 executing program 2: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000003c0)) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000000)=0x3) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) ptrace$cont(0x7, 0x0, 0x0, 0x0) r3 = getpgrp(0x0) timer_create(0x4, &(0x7f0000000400)={0x0, 0x1c, 0x0, @tid=r3}, &(0x7f0000000440)) r4 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r4, 0x40047438, &(0x7f0000000180)=""/246) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r5, &(0x7f0000000040)=ANY=[], 0xfea7) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r5, 0x0) ioctl$PPPIOCSFLAGS1(r4, 0x40047457, &(0x7f00000000c0)) r6 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000100)='/dev/dlm-monitor\x00', 0x2140, 0x0) sendmsg$RDMA_NLDEV_CMD_RES_CM_ID_GET(r6, &(0x7f0000000380)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000340)={&(0x7f00000002c0)={0x48, 0x140b, 0x8, 0x70bd25, 0x25dfdbff, "", [@RDMA_NLDEV_ATTR_RES_CM_IDN={0x8, 0x3f, 0x4}, @RDMA_NLDEV_ATTR_DEV_INDEX={0x8}, @RDMA_NLDEV_ATTR_DEV_INDEX={0x8, 0x1, 0x2}, @RDMA_NLDEV_ATTR_DEV_INDEX={0x8, 0x1, 0x2}, @RDMA_NLDEV_ATTR_RES_CM_IDN={0x8}, @RDMA_NLDEV_ATTR_RES_CM_IDN={0x8}, @RDMA_NLDEV_ATTR_PORT_INDEX={0x8, 0x3, 0x3}]}, 0x48}, 0x1, 0x0, 0x0, 0x40895}, 0x4) [ 1222.122234] loop3: p4 start 1263303888 is beyond EOD, truncated [ 1222.129641] loop3: p5 start 1281279881 is beyond EOD, truncated [ 1222.136483] loop3: p6 start 3452787639 is beyond EOD, truncated [ 1222.142746] loop3: p7 start 2263908108 is beyond EOD, truncated [ 1222.151542] loop3: p8 start 1970859340 is beyond EOD, truncated [ 1222.158365] loop3: p9 start 1782333214 is beyond EOD, truncated [ 1222.165319] loop3: p10 start 1751982490 is beyond EOD, truncated [ 1222.171842] loop3: p11 start 3605249017 is beyond EOD, truncated [ 1222.183697] loop3: p12 start 2400178403 is beyond EOD, truncated [ 1222.200186] IPVS: ftp: loaded support on port[0] = 21 08:55:34 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_read_part_table(0x0, 0x7, &(0x7f0000002640)=[{0x0, 0x0, 0xfffffffffffffff7}, {&(0x7f0000001540)="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", 0x1e0}]) [ 1222.452377] IPVS: ftp: loaded support on port[0] = 21 [ 1222.459249] loop3: [POWERTEC] p1 p2 p3 p4 p5 p6 p7 p8 p9 p10 p11 p12 [ 1222.473407] loop3: p1 start 233194046 is beyond EOD, truncated [ 1222.489100] loop3: p2 start 3569653895 is beyond EOD, truncated [ 1222.497247] loop3: p3 start 926682669 is beyond EOD, truncated [ 1222.503868] loop3: p4 start 1263303888 is beyond EOD, truncated [ 1222.510546] loop3: p5 start 1281279881 is beyond EOD, truncated [ 1222.517644] loop3: p6 start 3452787639 is beyond EOD, truncated [ 1222.523971] loop3: p7 start 2263908108 is beyond EOD, truncated [ 1222.537992] loop3: p8 start 1970859340 is beyond EOD, truncated [ 1222.552538] loop3: p9 start 1782333214 is beyond EOD, truncated [ 1222.567052] loop3: p10 start 1751982490 is beyond EOD, truncated [ 1222.589393] loop3: p11 start 3605249017 is beyond EOD, truncated [ 1222.610518] loop3: p12 start 2400178403 is beyond EOD, truncated [ 1223.003570] IPVS: ftp: loaded support on port[0] = 21 08:55:37 executing program 0: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000000)=0x3) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) ioctl$EVIOCGPROP(0xffffffffffffffff, 0x40047438, &(0x7f0000000180)=""/246) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r3, &(0x7f0000000040)=ANY=[], 0xfea7) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r3, 0x0) ioctl$PPPIOCSFLAGS1(0xffffffffffffffff, 0x4020744f, &(0x7f00000000c0)) 08:55:37 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_read_part_table(0x0, 0x8, &(0x7f0000002640)=[{0x0, 0x0, 0xfffffffffffffff7}, {&(0x7f0000001540)="c2ec123b097b69be3e42e60d3f03ff5b20b3406e8d7eebd2456f5388ad7135b73efb98088798c4d4506cd2295e60b5e9f9f2399833ad179a03e098e07644033f2d0e3c37a84095cdde0312f1d81191a92ccbe761424e7d3033a056d7d07c4c4bc2dbbb00079ae5158b76bed5cdd1d93054fff6874b43ef1289c75e4c9b911d69313cbc4e0abcab496b4ce2c83f238a2b30fc8210b75bcdcd0b774ac467962cc4389843f92f418b0718a87f17ae20f1790c7ff086746847e2217207cede6d2af2a58d7148128b2f86806b3be24ced787543219ae633ab66b7828c5bfd87571ee33ab89138401439491e3f3c6a4a56b4bf8a7d532ee9144977f6ac8fae105ab358e231f2cd9a216d68b0877161e158b14837fb1426f4a629f17ddd7bbf9019941ff9bbe3d6fd30d68dbd9e3b3cfb282bc08db959b660ed8f7ebc67714be3d00f8f1e2cbc9404069335265ce12996f7cb48c1f3221f7f892493e4711a6dbd79a0298e0e0b9936b06a3d08821f558f5738b05e2ead126157186dac58de8a7098291efacb6666b2dca73d422fbf6a09b30f3c30cc9e34faa453ef1d770f7008b7c54d644be9716b27aa40b67126130b61c29a254a578365216655e8a5c6955e72fb67e6f1796e499edcaa33e0b43bd172d9977deff713978907e12189743913c7c847", 0x1e0}]) [ 1225.852492] IPVS: ftp: loaded support on port[0] = 21 [ 1225.986713] loop3: [POWERTEC] p1 p2 p3 p4 p5 p6 p7 p8 p9 p10 p11 p12 [ 1226.009382] loop3: p1 start 233194046 is beyond EOD, truncated [ 1226.042757] loop3: p2 start 3569653895 is beyond EOD, truncated 08:55:38 executing program 4: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000000)=0x3) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r3 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r3, 0x40047438, &(0x7f0000000180)=""/246) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r4, 0x0) ioctl$PPPIOCSFLAGS1(r3, 0x40047459, &(0x7f00000000c0)) [ 1226.084992] loop3: p3 start 926682669 is beyond EOD, truncated [ 1226.118577] loop3: p4 start 1263303888 is beyond EOD, truncated 08:55:38 executing program 5: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000000)=0x3) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r3 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r3, 0x40047438, &(0x7f0000000180)=""/246) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r4, 0x0) ioctl$PPPIOCSFLAGS1(r3, 0x80047453, &(0x7f00000000c0)) 08:55:38 executing program 2: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r3, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000000)={0x3c, 0x0, 0x1, 0x409, 0x0, 0x0, {}, [@CTA_TUPLE_ORIG={0x24, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @broadcast}, {0x8, 0x2, @dev}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_SEQ_ADJ_REPLY={0x4}]}, 0x3c}}, 0x0) dup2(0xffffffffffffffff, r3) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000000)=0x3) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r4 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r4, 0x40047438, &(0x7f0000000180)=""/246) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r5, &(0x7f0000000040)=ANY=[], 0xfea7) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r5, 0x0) ioctl$PPPIOCSFLAGS1(r4, 0x40047457, &(0x7f00000000c0)) [ 1226.153498] loop3: p5 start 1281279881 is beyond EOD, truncated [ 1226.188369] loop3: p6 start 3452787639 is beyond EOD, truncated [ 1226.198981] IPVS: ftp: loaded support on port[0] = 21 [ 1226.218158] loop3: p7 start 2263908108 is beyond EOD, truncated [ 1226.260784] loop3: p8 start 1970859340 is beyond EOD, truncated [ 1226.290470] IPVS: ftp: loaded support on port[0] = 21 [ 1226.298848] loop3: p9 start 1782333214 is beyond EOD, truncated [ 1226.301332] IPVS: ftp: loaded support on port[0] = 21 [ 1226.349359] loop3: p10 start 1751982490 is beyond EOD, truncated [ 1226.393002] loop3: p11 start 3605249017 is beyond EOD, truncated [ 1226.441219] loop3: p12 start 2400178403 is beyond EOD, truncated 08:55:38 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_read_part_table(0x0, 0x9, &(0x7f0000002640)=[{0x0, 0x0, 0xfffffffffffffff7}, {&(0x7f0000001540)="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", 0x1e0}]) 08:55:38 executing program 0: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000000)=0x3) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) ioctl$EVIOCGPROP(0xffffffffffffffff, 0x40047438, &(0x7f0000000180)=""/246) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r3, &(0x7f0000000040)=ANY=[], 0xfea7) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r3, 0x0) ioctl$PPPIOCSFLAGS1(0xffffffffffffffff, 0x4020744f, &(0x7f00000000c0)) [ 1226.710260] loop3: [POWERTEC] p1 p2 p3 p4 p5 p6 p7 p8 p9 p10 p11 p12 [ 1226.737785] loop3: p1 start 233194046 is beyond EOD, truncated [ 1226.758436] loop3: p2 start 3569653895 is beyond EOD, truncated [ 1226.792796] loop3: p3 start 926682669 is beyond EOD, truncated [ 1226.808948] IPVS: ftp: loaded support on port[0] = 21 [ 1226.827754] loop3: p4 start 1263303888 is beyond EOD, truncated [ 1226.859073] loop3: p5 start 1281279881 is beyond EOD, truncated [ 1226.891605] loop3: p6 start 3452787639 is beyond EOD, truncated [ 1226.929417] loop3: p7 start 2263908108 is beyond EOD, truncated [ 1226.967873] loop3: p8 start 1970859340 is beyond EOD, truncated [ 1226.999853] loop3: p9 start 1782333214 is beyond EOD, truncated [ 1227.036030] loop3: p10 start 1751982490 is beyond EOD, truncated [ 1227.038456] IPVS: ftp: loaded support on port[0] = 21 [ 1227.076885] loop3: p11 start 3605249017 is beyond EOD, truncated [ 1227.120836] loop3: p12 start 2400178403 is beyond EOD, truncated 08:55:39 executing program 4: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000000)=0x3) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r3 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r3, 0x40047438, &(0x7f0000000180)=""/246) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r4, 0x0) ioctl$PPPIOCSFLAGS1(r3, 0x40047459, &(0x7f00000000c0)) [ 1227.319976] IPVS: ftp: loaded support on port[0] = 21 08:55:39 executing program 5: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f0000000000)=0x3) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r2, 0x40047438, &(0x7f0000000180)=""/246) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r3, 0x0) ioctl$PPPIOCSFLAGS1(r2, 0x80047453, &(0x7f00000000c0)) 08:55:39 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_read_part_table(0x0, 0xa, &(0x7f0000002640)=[{0x0, 0x0, 0xfffffffffffffff7}, {&(0x7f0000001540)="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", 0x1e0}]) 08:55:39 executing program 0: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000000)=0x3) r3 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r3, 0x40047438, &(0x7f0000000180)=""/246) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r4, &(0x7f0000000040)=ANY=[], 0xfea7) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r4, 0x0) ioctl$PPPIOCSFLAGS1(r3, 0x4020744f, &(0x7f00000000c0)) 08:55:39 executing program 1: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = socket$nl_sock_diag(0x10, 0x3, 0x4) ioctl$sock_inet_SIOCSIFBRDADDR(r0, 0x891a, &(0x7f0000000100)={'ip6tnl0\x00', {0x2, 0x4e24, @broadcast}}) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000000)=0x3) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r2, 0x40047438, &(0x7f0000000180)=""/246) r3 = socket$unix(0x1, 0x1, 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_EGRESS_PRIORITY_CMD(r3, 0x8982, &(0x7f0000000140)={0x3, 'veth0_to_bridge\x00', {0x9}, 0x15ad}) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r4, &(0x7f0000000040)=ANY=[], 0xfea7) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r4, 0x0) ioctl$PPPIOCSFLAGS1(r2, 0x40047457, &(0x7f00000000c0)) 08:55:39 executing program 2: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000000)=0x3) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r3 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r3, 0x40047438, &(0x7f0000000180)=""/246) r4 = socket$inet6(0xa, 0x2, 0x0) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) r6 = openat$cgroup_ro(r5, &(0x7f0000000080)='devices.list\x00', 0x275a, 0x0) write$binfmt_script(r6, &(0x7f0000000040)=ANY=[], 0xfea7) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r6, 0x0) ioctl$PPPIOCSFLAGS1(r3, 0x40047457, &(0x7f00000000c0)) [ 1227.796255] IPVS: ftp: loaded support on port[0] = 21 [ 1227.828290] IPVS: ftp: loaded support on port[0] = 21 [ 1227.844717] loop3: [POWERTEC] p1 p2 p3 p4 p5 p6 p7 p8 p9 p10 p11 p12 [ 1227.861755] IPVS: ftp: loaded support on port[0] = 21 [ 1227.871323] loop3: p1 start 233194046 is beyond EOD, truncated [ 1227.901795] IPVS: ftp: loaded support on port[0] = 21 [ 1227.928162] loop3: p2 start 3569653895 is beyond EOD, truncated [ 1227.979105] loop3: p3 start 926682669 is beyond EOD, truncated [ 1228.023049] loop3: p4 start 1263303888 is beyond EOD, truncated [ 1228.064475] loop3: p5 start 1281279881 is beyond EOD, truncated 08:55:40 executing program 4: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000000)=0x3) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r3 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r3, 0x40047438, &(0x7f0000000180)=""/246) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000040)=ANY=[], 0xfea7) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, 0xffffffffffffffff, 0x0) ioctl$PPPIOCSFLAGS1(r3, 0x40047459, &(0x7f00000000c0)) [ 1228.109624] loop3: p6 start 3452787639 is beyond EOD, truncated [ 1228.173704] loop3: p7 start 2263908108 is beyond EOD, truncated [ 1228.209363] loop3: p8 start 1970859340 is beyond EOD, truncated [ 1228.263548] IPVS: ftp: loaded support on port[0] = 21 [ 1228.290700] loop3: p9 start 1782333214 is beyond EOD, truncated [ 1228.331424] loop3: p10 start 1751982490 is beyond EOD, truncated [ 1228.364439] loop3: p11 start 3605249017 is beyond EOD, truncated [ 1228.398199] loop3: p12 start 2400178403 is beyond EOD, truncated 08:55:40 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_read_part_table(0x0, 0xc, &(0x7f0000002640)=[{0x0, 0x0, 0xfffffffffffffff7}, {&(0x7f0000001540)="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", 0x1e0}]) [ 1228.675220] IPVS: ftp: loaded support on port[0] = 21 [ 1228.685502] loop3: [POWERTEC] p1 p2 p3 p4 p5 p6 p7 p8 p9 p10 p11 p12 [ 1228.701668] loop3: p1 start 233194046 is beyond EOD, truncated 08:55:40 executing program 5: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f0000000000)=0x3) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r2, 0x40047438, &(0x7f0000000180)=""/246) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r3, 0x0) ioctl$PPPIOCSFLAGS1(r2, 0x80047453, &(0x7f00000000c0)) [ 1228.737931] loop3: p2 start 3569653895 is beyond EOD, truncated [ 1228.748837] IPVS: ftp: loaded support on port[0] = 21 08:55:40 executing program 0: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000000)=0x3) r3 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r3, 0x40047438, &(0x7f0000000180)=""/246) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r4, &(0x7f0000000040)=ANY=[], 0xfea7) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r4, 0x0) ioctl$PPPIOCSFLAGS1(r3, 0x4020744f, &(0x7f00000000c0)) [ 1228.784747] loop3: p3 start 926682669 is beyond EOD, truncated [ 1228.822943] loop3: p4 start 1263303888 is beyond EOD, truncated [ 1228.854939] loop3: p5 start 1281279881 is beyond EOD, truncated [ 1228.872852] IPVS: ftp: loaded support on port[0] = 21 [ 1228.887475] loop3: p6 start 3452787639 is beyond EOD, truncated [ 1228.935313] loop3: p7 start 2263908108 is beyond EOD, truncated [ 1228.965448] IPVS: ftp: loaded support on port[0] = 21 [ 1228.969021] loop3: p8 start 1970859340 is beyond EOD, truncated [ 1229.034589] loop3: p9 start 1782333214 is beyond EOD, truncated [ 1229.072902] loop3: p10 start 1751982490 is beyond EOD, truncated [ 1229.105536] loop3: p11 start 3605249017 is beyond EOD, truncated [ 1229.137135] loop3: p12 start 2400178403 is beyond EOD, truncated 08:55:41 executing program 4: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000000)=0x3) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r3 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r3, 0x40047438, &(0x7f0000000180)=""/246) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000040)=ANY=[], 0xfea7) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, 0xffffffffffffffff, 0x0) ioctl$PPPIOCSFLAGS1(r3, 0x40047459, &(0x7f00000000c0)) 08:55:41 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_read_part_table(0x0, 0xd, &(0x7f0000002640)=[{0x0, 0x0, 0xfffffffffffffff7}, {&(0x7f0000001540)="c2ec123b097b69be3e42e60d3f03ff5b20b3406e8d7eebd2456f5388ad7135b73efb98088798c4d4506cd2295e60b5e9f9f2399833ad179a03e098e07644033f2d0e3c37a84095cdde0312f1d81191a92ccbe761424e7d3033a056d7d07c4c4bc2dbbb00079ae5158b76bed5cdd1d93054fff6874b43ef1289c75e4c9b911d69313cbc4e0abcab496b4ce2c83f238a2b30fc8210b75bcdcd0b774ac467962cc4389843f92f418b0718a87f17ae20f1790c7ff086746847e2217207cede6d2af2a58d7148128b2f86806b3be24ced787543219ae633ab66b7828c5bfd87571ee33ab89138401439491e3f3c6a4a56b4bf8a7d532ee9144977f6ac8fae105ab358e231f2cd9a216d68b0877161e158b14837fb1426f4a629f17ddd7bbf9019941ff9bbe3d6fd30d68dbd9e3b3cfb282bc08db959b660ed8f7ebc67714be3d00f8f1e2cbc9404069335265ce12996f7cb48c1f3221f7f892493e4711a6dbd79a0298e0e0b9936b06a3d08821f558f5738b05e2ead126157186dac58de8a7098291efacb6666b2dca73d422fbf6a09b30f3c30cc9e34faa453ef1d770f7008b7c54d644be9716b27aa40b67126130b61c29a254a578365216655e8a5c6955e72fb67e6f1796e499edcaa33e0b43bd172d9977deff713978907e12189743913c7c847", 0x1e0}]) [ 1229.370770] IPVS: ftp: loaded support on port[0] = 21 [ 1229.424979] loop3: [POWERTEC] p1 p2 p3 p4 p5 p6 p7 p8 p9 p10 p11 p12 [ 1229.441881] loop3: p1 start 233194046 is beyond EOD, truncated [ 1229.481171] loop3: p2 start 3569653895 is beyond EOD, truncated [ 1229.518856] loop3: p3 start 926682669 is beyond EOD, truncated [ 1229.562410] loop3: p4 start 1263303888 is beyond EOD, truncated [ 1229.598810] loop3: p5 start 1281279881 is beyond EOD, truncated [ 1229.651058] loop3: p6 start 3452787639 is beyond EOD, truncated [ 1229.688112] loop3: p7 start 2263908108 is beyond EOD, truncated [ 1229.733641] loop3: p8 start 1970859340 is beyond EOD, truncated [ 1229.757897] loop3: p9 start 1782333214 is beyond EOD, truncated 08:55:41 executing program 1: unshare(0x46000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000000)=0x3) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) syz_mount_image$nfs(&(0x7f0000000100)='nfs\x00', &(0x7f0000000140)='./file0\x00', 0x7, 0xa, &(0x7f0000002840)=[{&(0x7f00000002c0)="d1894e9f9ade8247d3a8d9b64f65e5c3246346bfb7e76756459379a7e413309d2912a71e870a3de46ccc6de5709cf7d5377380c6adec38886e266d991ec82cf1aad22611e90872b9fc43b04891ad0aa49f7224de1689d974ac890651d2707c17ad93db22a98070bc5682c269a416e4312f8db9d918e02b988e6848f17fe39ad7101d6d5c69360221110a45c893483d0df248d8c66e0a17a9d799fd21026024f9d819d77b17e5160675e030a7139b3722", 0xb0, 0x2}, {&(0x7f0000000380)="50104ca530badd57b9d5e33aec849d03e414231f5f7d51d8ba4cdecba5fca42691733738c0698e91d49e0964c8527ed6a2cbfa745f7f52b74a745f1919ea96772e5653dfe3a29ce3804c5e3d12b67a86aa6d0c9997b7e6cfa2e0c8ae92426338ab10c609fb63d49c49c752a09ccc96228836b8a19cce3ff813649ce4318ac20d5e135d416349ff6b460c070d8472550e896fcc81471bb4fe6cf4001e4ee744896dc9844329021cef87288963bd9c513d12ee86b3f6aca12312266527780f9d3a9ea53b9758820abf90", 0xc9, 0x1}, {&(0x7f0000000480)="c850e6b84a4b161f20e3ec4353b8e216a0ce6729c3a4488c2695acfe393758c8a8ffd740df49d0bf94d9850cf37b5b751f2fd643b6da86d26bf9d03c33eccf77be612b86759d9070b6c2182a8ee89085fc65205bd79ff55661743723c4a2f897fd51f98293cbfdf107558a3cc0b6a3e2e3bac09517806e226b67b4be75a7ea59bf8452ee4010813845d4591b70e1a12e31ffb68b05797632271ec8be4940924bb887c4b42b13689ad0d5c4f743a6a02ac4a93deb8d730224721b198d2d14dfa97dc3a2e84541007c2258684ac85b2ca9b94dfff3738d5865d0f6439fb82c6a8b5c15a33b938ee7df", 0xe8, 0x8001}, {&(0x7f0000000580)="a5672d970adc3e4c25cd83ae824d82a66b132108f479dff603d5ed9a8e69a456eebd80d7127807c9f30afd2d5c2b9c12e47eb0bb70aeec2b98b98b15c310cd753106291250c6e86c28b4a8b674eb17cca2f240e8ccbeb801f8b3aa551418680626aa1c0559376881d32f7593c4eab19706aae9ef1fdd0349aa4dfe91cfbaa26e974f1a", 0x83, 0xf3}, {&(0x7f0000000640)="a6cca958c4eb67a8b2b891fb1e7689b7ff713b6a0b2a83a81e673a0d290f46a00ee58642541e15095752317f06ea6dbbed6724bfefc0851db9a43d39da3a8d4ac17c43f5be1d9c6ae02b4c99d1353277c38b0d", 0x53, 0x10001}, {&(0x7f00000006c0)="81967b0042e2d616c6e696ab5a5dfb4698a4d5e21c64169b231f9e9e672a30a7668b0c14b1c78cde3b4703fcd603f0a3e909ff0e7190ac9503ac766b0760c0ebfd115a5fef9cf313226f059c8c11e5fcca1158e571e598669728a7b2d75f3515b4fc7628670023bbfce5fdd5b373d90ed1502cb854ae8abd08394bc2f38b4f0d27e554db71fce0b8eddff4681b78584b6e16832e76db8b7ffe2f6d8d37ab0399f6a98735e99862a246d72e6455b285cf4f2e1f81ae1cecd92f08a1422f84248bcc5aaa758777309c", 0xc8, 0x5}, {&(0x7f00000007c0)="fc26549d2e3093e2eb63b0f6b5ffaeb3a6b629ae10b4846576b8715350", 0x1d, 0x8}, {&(0x7f0000000800)="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", 0x1000, 0x200}, {&(0x7f0000001800)="94963484306a79b6e2e026b3c330a9e10a68580d2555ba4f09e1d65c", 0x1c, 0x4}, {&(0x7f0000001840)="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", 0x1000, 0x8001}], 0x8000, &(0x7f0000002940)='cgroup.controllers\x00') ioctl$EVIOCGPROP(r1, 0x40047438, &(0x7f0000000180)=""/246) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r2, &(0x7f0000000040)=ANY=[], 0xfea7) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000002980)='/proc/bus/input/handlers\x00', 0x0, 0x0) ioctl$RTC_IRQP_SET(r3, 0x4008700c, 0x1e03) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r2, 0x0) ioctl$PPPIOCSFLAGS1(r1, 0x40047457, &(0x7f00000000c0)) [ 1229.782762] loop3: p10 start 1751982490 is beyond EOD, truncated 08:55:41 executing program 5: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f0000000000)=0x3) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r2, 0x40047438, &(0x7f0000000180)=""/246) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r3, 0x0) ioctl$PPPIOCSFLAGS1(r2, 0x80047453, &(0x7f00000000c0)) [ 1229.846887] loop3: p11 start 3605249017 is beyond EOD, truncated [ 1229.882630] loop3: p12 start 2400178403 is beyond EOD, truncated 08:55:42 executing program 0: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000000)=0x3) r3 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r3, 0x40047438, &(0x7f0000000180)=""/246) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r4, &(0x7f0000000040)=ANY=[], 0xfea7) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r4, 0x0) ioctl$PPPIOCSFLAGS1(r3, 0x4020744f, &(0x7f00000000c0)) [ 1229.913646] IPVS: ftp: loaded support on port[0] = 21 [ 1229.916239] IPVS: ftp: loaded support on port[0] = 21 08:55:42 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_read_part_table(0x0, 0x42, &(0x7f0000002640)=[{0x0, 0x0, 0xfffffffffffffff7}, {&(0x7f0000001540)="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", 0x1e0}]) 08:55:42 executing program 4: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000000)=0x3) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r3 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r3, 0x40047438, &(0x7f0000000180)=""/246) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000040)=ANY=[], 0xfea7) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, 0xffffffffffffffff, 0x0) ioctl$PPPIOCSFLAGS1(r3, 0x40047459, &(0x7f00000000c0)) [ 1230.130605] IPVS: ftp: loaded support on port[0] = 21 [ 1230.234945] loop3: [POWERTEC] p1 p2 p3 p4 p5 p6 p7 p8 p9 p10 p11 p12 [ 1230.242329] loop3: p1 start 233194046 is beyond EOD, truncated [ 1230.249601] IPVS: ftp: loaded support on port[0] = 21 [ 1230.296044] loop3: p2 start 3569653895 is beyond EOD, truncated [ 1230.349785] loop3: p3 start 926682669 is beyond EOD, truncated [ 1230.385830] loop3: p4 start 1263303888 is beyond EOD, truncated [ 1230.417060] loop3: p5 start 1281279881 is beyond EOD, truncated [ 1230.450572] loop3: p6 start 3452787639 is beyond EOD, truncated [ 1230.489454] loop3: p7 start 2263908108 is beyond EOD, truncated [ 1230.528269] loop3: p8 start 1970859340 is beyond EOD, truncated [ 1230.564194] loop3: p9 start 1782333214 is beyond EOD, truncated [ 1230.600550] loop3: p10 start 1751982490 is beyond EOD, truncated [ 1230.637384] loop3: p11 start 3605249017 is beyond EOD, truncated [ 1230.673899] loop3: p12 start 2400178403 is beyond EOD, truncated [ 1230.870282] IPVS: ftp: loaded support on port[0] = 21 08:55:44 executing program 5: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r2, 0x5423, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r3 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r3, 0x40047438, &(0x7f0000000180)=""/246) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r4, 0x0) ioctl$PPPIOCSFLAGS1(r3, 0x80047453, &(0x7f00000000c0)) 08:55:44 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_read_part_table(0x0, 0x43, &(0x7f0000002640)=[{0x0, 0x0, 0xfffffffffffffff7}, {&(0x7f0000001540)="c2ec123b097b69be3e42e60d3f03ff5b20b3406e8d7eebd2456f5388ad7135b73efb98088798c4d4506cd2295e60b5e9f9f2399833ad179a03e098e07644033f2d0e3c37a84095cdde0312f1d81191a92ccbe761424e7d3033a056d7d07c4c4bc2dbbb00079ae5158b76bed5cdd1d93054fff6874b43ef1289c75e4c9b911d69313cbc4e0abcab496b4ce2c83f238a2b30fc8210b75bcdcd0b774ac467962cc4389843f92f418b0718a87f17ae20f1790c7ff086746847e2217207cede6d2af2a58d7148128b2f86806b3be24ced787543219ae633ab66b7828c5bfd87571ee33ab89138401439491e3f3c6a4a56b4bf8a7d532ee9144977f6ac8fae105ab358e231f2cd9a216d68b0877161e158b14837fb1426f4a629f17ddd7bbf9019941ff9bbe3d6fd30d68dbd9e3b3cfb282bc08db959b660ed8f7ebc67714be3d00f8f1e2cbc9404069335265ce12996f7cb48c1f3221f7f892493e4711a6dbd79a0298e0e0b9936b06a3d08821f558f5738b05e2ead126157186dac58de8a7098291efacb6666b2dca73d422fbf6a09b30f3c30cc9e34faa453ef1d770f7008b7c54d644be9716b27aa40b67126130b61c29a254a578365216655e8a5c6955e72fb67e6f1796e499edcaa33e0b43bd172d9977deff713978907e12189743913c7c847", 0x1e0}]) 08:55:44 executing program 0: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r2, 0x40047438, &(0x7f0000000180)=""/246) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r3, &(0x7f0000000040)=ANY=[], 0xfea7) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r3, 0x0) ioctl$PPPIOCSFLAGS1(r2, 0x4020744f, &(0x7f00000000c0)) 08:55:44 executing program 4: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000000)=0x3) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r3 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r4, &(0x7f0000000040)=ANY=[], 0xfea7) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r4, 0x0) ioctl$PPPIOCSFLAGS1(r3, 0x40047459, &(0x7f00000000c0)) 08:55:44 executing program 1: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000000)=0x3) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r1, 0x40047438, &(0x7f00000003c0)=""/224) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r2, &(0x7f0000000040)=ANY=[], 0xfea7) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r2, 0x0) ioctl$PPPIOCSFLAGS1(r1, 0x40047457, &(0x7f00000000c0)) 08:55:44 executing program 2: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) syz_genetlink_get_family_id$l2tp(&(0x7f0000000200)='l2tp\x00') r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) r2 = socket(0x1000000010, 0x80002, 0x0) sendmmsg$alg(r2, &(0x7f0000000200), 0x10efe10675dec16, 0x0) getsockopt$inet_sctp_SCTP_AUTO_ASCONF(r2, 0x84, 0x1e, &(0x7f0000000100), 0x0) r3 = openat$ttyprintk(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ttyprintk\x00', 0x80c02, 0x0) ioctl$TIOCSETD(r3, 0x5423, &(0x7f0000000000)=0x10000003) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r4 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r4, 0x40047438, &(0x7f00000002c0)=""/246) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r5, &(0x7f0000000040)=ANY=[], 0xfea7) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0xb, 0x13, r5, 0x1467000) ioctl$PPPIOCSFLAGS1(r4, 0x40047457, &(0x7f00000000c0)) [ 1232.114558] IPVS: ftp: loaded support on port[0] = 21 [ 1232.128225] IPVS: ftp: loaded support on port[0] = 21 [ 1232.135924] loop3: [POWERTEC] p1 p2 p3 p4 p5 p6 p7 p8 p9 p10 p11 p12 [ 1232.150911] IPVS: ftp: loaded support on port[0] = 21 [ 1232.151411] loop3: p1 start 233194046 is beyond EOD, truncated [ 1232.168446] IPVS: ftp: loaded support on port[0] = 21 [ 1232.207025] loop3: p2 start 3569653895 is beyond EOD, truncated [ 1232.214894] IPVS: ftp: loaded support on port[0] = 21 [ 1232.249820] loop3: p3 start 926682669 is beyond EOD, truncated [ 1232.282787] loop3: p4 start 1263303888 is beyond EOD, truncated [ 1232.330141] loop3: p5 start 1281279881 is beyond EOD, truncated [ 1232.379204] loop3: p6 start 3452787639 is beyond EOD, truncated [ 1232.422208] loop3: p7 start 2263908108 is beyond EOD, truncated [ 1232.469382] loop3: p8 start 1970859340 is beyond EOD, truncated [ 1232.498432] loop3: p9 start 1782333214 is beyond EOD, truncated [ 1232.535059] loop3: p10 start 1751982490 is beyond EOD, truncated [ 1232.574885] loop3: p11 start 3605249017 is beyond EOD, truncated [ 1232.602879] loop3: p12 start 2400178403 is beyond EOD, truncated 08:55:44 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_read_part_table(0x0, 0x49, &(0x7f0000002640)=[{0x0, 0x0, 0xfffffffffffffff7}, {&(0x7f0000001540)="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", 0x1e0}]) [ 1232.904798] loop3: [POWERTEC] p1 p2 p3 p4 p5 p6 p7 p8 p9 p10 p11 p12 [ 1232.918691] loop3: p1 start 233194046 is beyond EOD, truncated [ 1232.954523] loop3: p2 start 3569653895 is beyond EOD, truncated [ 1232.992327] IPVS: ftp: loaded support on port[0] = 21 [ 1232.998899] loop3: p3 start 926682669 is beyond EOD, truncated [ 1233.030976] loop3: p4 start 1263303888 is beyond EOD, truncated [ 1233.031008] IPVS: ftp: loaded support on port[0] = 21 08:55:45 executing program 5: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r2, 0x5423, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r3 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r3, 0x40047438, &(0x7f0000000180)=""/246) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r4, 0x0) ioctl$PPPIOCSFLAGS1(r3, 0x80047453, &(0x7f00000000c0)) [ 1233.074311] loop3: p5 start 1281279881 is beyond EOD, truncated [ 1233.110323] loop3: p6 start 3452787639 is beyond EOD, truncated 08:55:45 executing program 4: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000000)=0x3) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r3 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r4, &(0x7f0000000040)=ANY=[], 0xfea7) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r4, 0x0) ioctl$PPPIOCSFLAGS1(r3, 0x40047459, &(0x7f00000000c0)) [ 1233.154368] loop3: p7 start 2263908108 is beyond EOD, truncated [ 1233.171954] loop3: p8 start 1970859340 is beyond EOD, truncated [ 1233.227393] IPVS: ftp: loaded support on port[0] = 21 08:55:45 executing program 0: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r2, 0x40047438, &(0x7f0000000180)=""/246) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r3, &(0x7f0000000040)=ANY=[], 0xfea7) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r3, 0x0) ioctl$PPPIOCSFLAGS1(r2, 0x4020744f, &(0x7f00000000c0)) [ 1233.254595] loop3: p9 start 1782333214 is beyond EOD, truncated [ 1233.278341] loop3: p10 start 1751982490 is beyond EOD, truncated [ 1233.326416] IPVS: ftp: loaded support on port[0] = 21 [ 1233.332834] loop3: p11 start 3605249017 is beyond EOD, truncated [ 1233.365388] loop3: p12 start 2400178403 is beyond EOD, truncated [ 1233.447744] IPVS: ftp: loaded support on port[0] = 21 08:55:45 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_read_part_table(0x0, 0x63, &(0x7f0000002640)=[{0x0, 0x0, 0xfffffffffffffff7}, {&(0x7f0000001540)="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", 0x1e0}]) [ 1233.735373] loop3: [POWERTEC] p1 p2 p3 p4 p5 p6 p7 p8 p9 p10 p11 p12 [ 1233.754870] loop3: p1 start 233194046 is beyond EOD, truncated [ 1233.788751] loop3: p2 start 3569653895 is beyond EOD, truncated [ 1233.817383] loop3: p3 start 926682669 is beyond EOD, truncated [ 1233.851268] loop3: p4 start 1263303888 is beyond EOD, truncated [ 1233.922344] loop3: p5 start 1281279881 is beyond EOD, truncated [ 1233.970833] loop3: p6 start 3452787639 is beyond EOD, truncated [ 1233.994425] loop3: p7 start 2263908108 is beyond EOD, truncated [ 1234.016488] loop3: p8 start 1970859340 is beyond EOD, truncated [ 1234.044061] loop3: p9 start 1782333214 is beyond EOD, truncated [ 1234.072074] loop3: p10 start 1751982490 is beyond EOD, truncated 08:55:46 executing program 5: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r2, 0x5423, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r3 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r3, 0x40047438, &(0x7f0000000180)=""/246) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r4, 0x0) ioctl$PPPIOCSFLAGS1(r3, 0x80047453, &(0x7f00000000c0)) [ 1234.103981] loop3: p11 start 3605249017 is beyond EOD, truncated [ 1234.135243] loop3: p12 start 2400178403 is beyond EOD, truncated [ 1234.240698] IPVS: ftp: loaded support on port[0] = 21 08:55:46 executing program 2: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000000)=0x3) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r3 = socket$inet6(0xa, 0x2, 0x0) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$KVM_KVMCLOCK_CTRL(r4, 0xaead) r5 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r5, 0x40047438, &(0x7f0000000180)=""/246) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r6, &(0x7f0000000040)=ANY=[], 0xfea7) sendmsg$inet6(r4, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000400)=[{&(0x7f0000000100)="f9fec7a93a6737e6cd6968ff68ee4f62be682cee5ca158df2872fe3e8af20c8030c94f4e7f87e48125e6b317e277c9", 0x2f}, {&(0x7f0000000140)="48808f5605ba93c33e14306b564f8f650fea0691ca9b72882980277c109da5bbc5988159", 0x24}, {&(0x7f00000002c0)}, {&(0x7f0000000300)="f652f44a5d4c0a7be70bfdecda4b26dc35cac092f7c946655c572f18e3ef1efc9e05b2cc223a6c8a080989d21ce1277a7be3756c3e72710699d576ab8f04a686feb2d530cf92c61aeec13350990d66ffd2e4df9036c10e396a83f4cce3e5f625ab1804561430eb059c74beaaef6f0d54ffb4f648a989dec350f26e0764156231668f238f549423c710b34b8798d57c74402b14b7de62d92488ac43b8d5e567e79b4c65bb63bfc8fb9e833f9b717932a4d978e932e7da51f8f00e2611845cfed3b6a86beca89aa1d7c9e44c920d6dc880", 0xd0}], 0x4, &(0x7f0000000440)=[@hoplimit_2292={{0x14, 0x29, 0x8, 0x78}}], 0x18}, 0x20000000) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r6, 0x0) ioctl$PPPIOCSFLAGS1(r5, 0x40047457, &(0x7f00000000c0)) 08:55:46 executing program 4: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000000)=0x3) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r3 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r4, &(0x7f0000000040)=ANY=[], 0xfea7) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r4, 0x0) ioctl$PPPIOCSFLAGS1(r3, 0x40047459, &(0x7f00000000c0)) 08:55:46 executing program 0: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r2, 0x40047438, &(0x7f0000000180)=""/246) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r3, &(0x7f0000000040)=ANY=[], 0xfea7) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r3, 0x0) ioctl$PPPIOCSFLAGS1(r2, 0x4020744f, &(0x7f00000000c0)) 08:55:46 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_read_part_table(0x0, 0x1fc, &(0x7f0000002640)=[{0x0, 0x0, 0xfffffffffffffff7}, {&(0x7f0000001540)="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", 0x1e0}]) [ 1234.393204] IPVS: ftp: loaded support on port[0] = 21 [ 1234.410625] IPVS: ftp: loaded support on port[0] = 21 [ 1234.441881] IPVS: ftp: loaded support on port[0] = 21 [ 1234.534907] loop3: [POWERTEC] p1 p2 p3 p4 p5 p6 p7 p8 p9 p10 p11 p12 [ 1234.562475] loop3: p1 start 233194046 is beyond EOD, truncated [ 1234.604583] loop3: p2 start 3569653895 is beyond EOD, truncated [ 1234.657169] loop3: p3 start 926682669 is beyond EOD, truncated [ 1234.687228] loop3: p4 start 1263303888 is beyond EOD, truncated [ 1234.726527] loop3: p5 start 1281279881 is beyond EOD, truncated [ 1234.757259] loop3: p6 start 3452787639 is beyond EOD, truncated [ 1234.792792] loop3: p7 start 2263908108 is beyond EOD, truncated [ 1234.830658] loop3: p8 start 1970859340 is beyond EOD, truncated [ 1234.866134] loop3: p9 start 1782333214 is beyond EOD, truncated [ 1234.898953] loop3: p10 start 1751982490 is beyond EOD, truncated [ 1234.937126] loop3: p11 start 3605249017 is beyond EOD, truncated [ 1234.967295] loop3: p12 start 2400178403 is beyond EOD, truncated 08:55:47 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_read_part_table(0x0, 0x3e0, &(0x7f0000002640)=[{0x0, 0x0, 0xfffffffffffffff7}, {&(0x7f0000001540)="c2ec123b097b69be3e42e60d3f03ff5b20b3406e8d7eebd2456f5388ad7135b73efb98088798c4d4506cd2295e60b5e9f9f2399833ad179a03e098e07644033f2d0e3c37a84095cdde0312f1d81191a92ccbe761424e7d3033a056d7d07c4c4bc2dbbb00079ae5158b76bed5cdd1d93054fff6874b43ef1289c75e4c9b911d69313cbc4e0abcab496b4ce2c83f238a2b30fc8210b75bcdcd0b774ac467962cc4389843f92f418b0718a87f17ae20f1790c7ff086746847e2217207cede6d2af2a58d7148128b2f86806b3be24ced787543219ae633ab66b7828c5bfd87571ee33ab89138401439491e3f3c6a4a56b4bf8a7d532ee9144977f6ac8fae105ab358e231f2cd9a216d68b0877161e158b14837fb1426f4a629f17ddd7bbf9019941ff9bbe3d6fd30d68dbd9e3b3cfb282bc08db959b660ed8f7ebc67714be3d00f8f1e2cbc9404069335265ce12996f7cb48c1f3221f7f892493e4711a6dbd79a0298e0e0b9936b06a3d08821f558f5738b05e2ead126157186dac58de8a7098291efacb6666b2dca73d422fbf6a09b30f3c30cc9e34faa453ef1d770f7008b7c54d644be9716b27aa40b67126130b61c29a254a578365216655e8a5c6955e72fb67e6f1796e499edcaa33e0b43bd172d9977deff713978907e12189743913c7c847", 0x1e0}]) [ 1235.238087] IPVS: ftp: loaded support on port[0] = 21 [ 1235.284757] loop3: [POWERTEC] p1 p2 p3 p4 p5 p6 p7 p8 p9 p10 p11 p12 [ 1235.294693] loop3: p1 start 233194046 is beyond EOD, truncated [ 1235.321533] loop3: p2 start 3569653895 is beyond EOD, truncated [ 1235.349791] loop3: p3 start 926682669 is beyond EOD, truncated [ 1235.386484] loop3: p4 start 1263303888 is beyond EOD, truncated [ 1235.420422] loop3: p5 start 1281279881 is beyond EOD, truncated [ 1235.440966] loop3: p6 start 3452787639 is beyond EOD, truncated [ 1235.461528] loop3: p7 start 2263908108 is beyond EOD, truncated [ 1235.482692] loop3: p8 start 1970859340 is beyond EOD, truncated [ 1235.495639] loop3: p9 start 1782333214 is beyond EOD, truncated [ 1235.508359] loop3: p10 start 1751982490 is beyond EOD, truncated [ 1235.521362] loop3: p11 start 3605249017 is beyond EOD, truncated [ 1235.548044] loop3: p12 start 2400178403 is beyond EOD, truncated 08:55:48 executing program 1: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000000)=0x3) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r1, 0x40047438, &(0x7f0000000180)=""/246) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r2, &(0x7f0000000040)=ANY=[], 0xfea7) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r2, 0x0) ioctl$PPPIOCSFLAGS1(r1, 0x40047457, &(0x7f00000000c0)) mlock(&(0x7f00001ed000/0x3000)=nil, 0x3000) 08:55:48 executing program 0: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f0000000000)=0x3) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r2, 0x40047438, &(0x7f0000000180)=""/246) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r3, &(0x7f0000000040)=ANY=[], 0xfea7) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r3, 0x0) ioctl$PPPIOCSFLAGS1(r2, 0x4020744f, &(0x7f00000000c0)) 08:55:48 executing program 5: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000000)) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r3 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r3, 0x40047438, &(0x7f0000000180)=""/246) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r4, 0x0) ioctl$PPPIOCSFLAGS1(r3, 0x80047453, &(0x7f00000000c0)) 08:55:48 executing program 4: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000000)=0x3) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) ioctl$EVIOCGPROP(0xffffffffffffffff, 0x40047438, &(0x7f0000000180)=""/246) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r3, &(0x7f0000000040)=ANY=[], 0xfea7) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r3, 0x0) ioctl$PPPIOCSFLAGS1(0xffffffffffffffff, 0x40047459, &(0x7f00000000c0)) 08:55:48 executing program 2: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r0) r1 = socket$inet6(0xa, 0x2, 0x0) dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0xfffffffffffffffd) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000000)=0x3) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r3 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r3, 0x40047438, &(0x7f0000000180)=""/246) r4 = socket$inet6(0xa, 0x2, 0x0) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$SNDRV_PCM_IOCTL_INFO(r5, 0x81204101, &(0x7f00000002c0)) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r6, &(0x7f0000000040)=ANY=[], 0xfea7) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r6, 0x0) ioctl$PPPIOCSFLAGS1(r3, 0x40047457, &(0x7f00000000c0)) 08:55:48 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_read_part_table(0x0, 0x7473e992, &(0x7f0000002640)=[{0x0, 0x0, 0xfffffffffffffff7}, {&(0x7f0000001540)="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", 0x1e0}]) [ 1236.758649] IPVS: ftp: loaded support on port[0] = 21 [ 1236.766686] IPVS: ftp: loaded support on port[0] = 21 [ 1236.775728] IPVS: ftp: loaded support on port[0] = 21 [ 1236.779864] IPVS: ftp: loaded support on port[0] = 21 [ 1236.797768] IPVS: ftp: loaded support on port[0] = 21 08:55:49 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_read_part_table(0x0, 0x2, &(0x7f0000002640)=[{0x0, 0x2, 0xfffffffffffffff7}, {&(0x7f0000001540)="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", 0x1e0}]) 08:55:49 executing program 4: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000000)=0x3) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) ioctl$EVIOCGPROP(0xffffffffffffffff, 0x40047438, &(0x7f0000000180)=""/246) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r3, &(0x7f0000000040)=ANY=[], 0xfea7) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r3, 0x0) ioctl$PPPIOCSFLAGS1(0xffffffffffffffff, 0x40047459, &(0x7f00000000c0)) 08:55:49 executing program 5: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000000)) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r3 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r3, 0x40047438, &(0x7f0000000180)=""/246) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r4, 0x0) ioctl$PPPIOCSFLAGS1(r3, 0x80047453, &(0x7f00000000c0)) [ 1237.636687] IPVS: ftp: loaded support on port[0] = 21 [ 1237.644524] IPVS: ftp: loaded support on port[0] = 21 [ 1237.765046] loop3: [POWERTEC] p1 p2 p3 p4 p5 p6 p7 p8 p9 p10 p11 p12 [ 1237.772507] loop3: p1 start 233194046 is beyond EOD, truncated 08:55:49 executing program 0: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f0000000000)=0x3) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r2, 0x40047438, &(0x7f0000000180)=""/246) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r3, &(0x7f0000000040)=ANY=[], 0xfea7) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r3, 0x0) ioctl$PPPIOCSFLAGS1(r2, 0x4020744f, &(0x7f00000000c0)) [ 1237.830841] loop3: p2 start 3569653895 is beyond EOD, truncated [ 1237.843033] IPVS: ftp: loaded support on port[0] = 21 [ 1237.871706] IPVS: ftp: loaded support on port[0] = 21 [ 1237.873644] loop3: p3 start 926682669 is beyond EOD, truncated [ 1237.905997] loop3: p4 start 1263303888 is beyond EOD, truncated [ 1237.947139] loop3: p5 start 1281279881 is beyond EOD, truncated [ 1237.993707] loop3: p6 start 3452787639 is beyond EOD, truncated [ 1238.013173] IPVS: ftp: loaded support on port[0] = 21 [ 1238.046518] loop3: p7 start 2263908108 is beyond EOD, truncated [ 1238.100446] loop3: p8 start 1970859340 is beyond EOD, truncated [ 1238.139070] loop3: p9 start 1782333214 is beyond EOD, truncated [ 1238.212285] loop3: p10 start 1751982490 is beyond EOD, truncated [ 1238.242322] loop3: p11 start 3605249017 is beyond EOD, truncated [ 1238.269446] loop3: p12 start 2400178403 is beyond EOD, truncated 08:55:50 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_read_part_table(0x0, 0x2, &(0x7f0000002640)=[{0x0, 0x3, 0xfffffffffffffff7}, {&(0x7f0000001540)="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", 0x1e0}]) 08:55:50 executing program 2: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000000)=0x3) r3 = socket(0x1000000010, 0x80002, 0x0) sendmmsg$alg(r3, &(0x7f0000000200), 0x10efe10675dec16, 0x0) sendmsg$tipc(r3, &(0x7f0000001740)={&(0x7f0000000100)=@nameseq={0x1e, 0x1, 0x2, {0x43, 0x4, 0x3}}, 0x10, &(0x7f0000001640)=[{&(0x7f00000002c0)="214d7929a235247fe00433fbb92b81efaaac5a827346f69ecb8475a2069d630469d0f1c7091df248bb09ffb9069690a19ad0ef5c8b46bb1859e89222a1d297c9f6bb5d7774234d83f441c51eb55d3f1594a87540509b0542c1", 0x59}, {&(0x7f0000000140)="5164842ef8fe", 0x6}, {&(0x7f0000000340)="474bb098ca10df99d8b3b1eea0f3769e2aa01a57676829c6bf956991453906136f69b0f1bddb3303ebc91153181b8f15ef66a8fa2500e0319aa565de856be71a349b4dbb3bb5e4dfa2a69bbec3863125f84898edbca54135c8dd4729a1f083ddfa3b280f8add43df128a5fb2cb1f5394b5a094704025a452b4237a", 0x7b}, {&(0x7f00000003c0)="675188c5758125afb8685b607a3b28e34961d3b2945baa067f47caa334e287e8294a3c26332fb5eec5f7efff8785908b88d09e10a709d863d543e34673c66f11293d6a98b83e4aa09914a442ae021a1f797039220a04ba6ba3362a66d6c806d0f6995a094e4708d35468a9fb81b859e020758336291c028e2fdd9fb1", 0x7c}, {&(0x7f0000000440)="64b136cc9aa2171f24f07e45a30d492c0b52c1918b7642f4333826d48f92e1688cf96e895926d3c6938f53f8b3df17f8eccc08740190cc4dd19e3ed8f199255e146b24dc97b8bc0413250fcd045bc5705b8031de88038a62d887ff89022f8738a04801e5d06ef092007f58e5382f7c16de4ec3c58ba99098b4ac9f826962d40c75a2b99a7f1760b413cd79ab7ee8b3775483bdf311c71da19dd22bb1d7a54408a37aceb25f1c2577e99c58e3c2ccea08", 0xb0}, {&(0x7f0000000500)="898c4e67c78acb0dc882582fdbe45c5fc22ad0409b8635afa9c8f7f96dcebe4ed7b79dce70568f91d0c45357d4bea3f075c9b45e9c0a6781004c0b8b783f4bdc1e5a2638ac6dd0c216031cce318383559902172e4ffd485a5f8f5b810633d7f82c6a66268dc22b8de14a0dde3bf3146fb3d9477f42ad39ceb6752962d0c4184029a1b30e66e83562eac1aa9b747060ef56f7f6d2926b87fb7dee85419a9f65062a1f591f920b658a93fcfd595dfcd7c77d8e21ce9b42715fb33bf1cf7baf3e72a10027d659bbc63fed4fc974b61cf2be2c767d676bcbb7986993bc7aef9c8a911f437a3c619444681e105c6e1f5f6fb85940cc02d3857d74d24c9569cb3ac873164b4dd8cab81e64352aeb6dda8b2accfbb19bd8440a6ade982734244f2f7811ff569b106540d9ead22371f776d42047134d38c27e29bfeaf14aff7c3a1e1f76a20a255e641c513225342e9273a2898802518adb267264c0c19d89ad59ba542166410cef9225412ba1d255cb9330704290e5a9b1c726d6cfd0904c28fdb4644e91bedd01ebe5e464358d3e3033c65e734978e8bce2ba51df5d6b79047c94e5e3267f14f860c14827ad539935a54bd532a0cc3679448289ab2da1462965afbd6953f3d11601d36945ee451c595c741ec7ccc7d4ee6ae80fbef3cd66c261822566c0bd43ca390909908902b81a8f5bc16729d7ff7f5086a4126c7ad6cdca9f914d405ccb2fda5a85067701d4ce09143bae44853cdfd94911049d64a6024c284ef058a542348df1a9ec47fafc4199f1e8139116b74f2332b98469bbd7e94cf9911358da6ada60515470c2968f081fb4edd2d6bf2f9c47007434f5f11e36e04662121450b85166f27f2c431acd6592b619164c3681a876c8d4eaf498ccc299527e48f92db41a0757b8a69324e721e6a1a5da17461c790b5367e4b14019b6707ea37ccd6fb09529b27c67e27a3aab87ffea7fe63dae63f6a81ba7b609d59f687d43029c06f3c33b6f106bf63b7f811c7a1f70429a7313c43ba21fbb18a8ed1e74b447697fd63ad69f4af9809d69da32c1727b5eb68fd536c105877e0f4352b9f561eb8683f7918ab510380e69d333caa2670fdc622a66724cb9394268d14f7d4887dcae6b5c959b9f89fe5366d95c1e3ee67b66d50daeff4489127f0375ecdd248308560c5318e4689bd895c629f648bbb1ea5425dd3e60ddc627bc58005a42e828031e2397f9556665a95ee15ff8c20a135ec4b029fc5bd0d01854783e1c940bc8196ce747e7e84fb2a60e658f4297b999919532f03343c642a9f193a0213f051847e43da580955d858c18dfd38d59fa07a6ce574bd7078e733e056c289465db2150c0f22c408937d4bc7a0cd468cfd9bfd3e746b7bbea113fe1fb43637d3681c8b12e209b5ef9a8a0d7adf949dbb37ce8fec0523bb8f4287ea865faa1e56f18a598fb72aff0967fe8b2db1845e99e8f2701b8bdfc3b1414613eda549339e2870bba03ae792c3adb91a87e5ec22ec49b1053a4835ac67eaa5e7cccb9283adf44a5a738a99f47b709d51314371d05479f8cacdf568ba39f887b07526b93f496da09f2471f54b798e6e43d299127096f7d966c895a027043666a020d05e3ab2111fa6b0406e4b7ee04bc171250b9d80d7c1f5a3024376b19a1d41b61e54edc3c29cdf16c000d508497370440809bc0d62cd7ee0613daed810a917a7d3616b3d3bc0d1cf687a8b1c987bab658d3d1bb4a7ff16d87429aa3085d22c85446ce6eba4e22b9019b60bf12a2b8d205e2644a1edb5be0f74a9aa7b1608c5118c6b0b95a57f9b56e70e8656b718f61239fa529e459988bd5aad6a699b2279ebcb0b8ae66e291c408ab8137aa257f577a59d6afb302f74d5476c13d67dcfb4dc0274be0a379e379d37abd3166c8a3df1a35945bfb51c0045dc87ed508bd905322588ad7faa88b132fd7e81659b0c18971269e5e96fde9e6557286c704521f26a6fbe0a452f65a45d8e5f09e10cc64bd68e76202ea088c614012b4e4fb77173c1a873c97fc91847666833c1bd4b57a69e28bdc9697ee142117493e6e2e4bbff45d40dbdda8fe30f6119e0d2f53e7b3f05cdc2fd9bde61bd1cd20830481999f0f2e97ef65c712985e55ce2982f3bb04302de489662853e0b7ecf1cea386544ca966a603a44f36233f1d9dcb300537eca430eb5309b461fdc80db948eff3deb095ce4b330a0405aa597d01ea5fde6d6fa1aa9018888726b6790bbf666c48ea067a9aded60d317bb3266ef0d4bae507b4a8460a02ff5c8b77a3cc0f33b259e57109d9bc1b0374a0e9bc760db81555f0706b6c6842296722aa43d02b12fc2bbaef9bde045f81e5a1b8ec94ce9ec1a296fa9e856829a4406249fec832ac6e486f493176912141468fafc40ae0596cedd08b2c74388c8436883d64ccf226dca44fbccdd4767f7271a1e15b416b01d7541288e885844a4a5b3f6aba50140f5195bde9c1f53f8850eab8521fd7b1d771093db1b260e86ffde2e66cc8828c3a4324c7d766167cc0c68ff5454cb8fa42533bbd598d2a0266d9d127242a53f78a4d3a96b26adb479e26c5c17df44fb66a1177ae9509689f077e8af573329b18a5f2bd0035c4e879ffd3d6aae0b7146b7f790f00bd0c5cff28f5e88c5cab710898861a7158cc6ef6c45c565641e514b4749f24e94794a87ee5ff5d0c2cbe664cb451c87c8f2c1c2416a90bf9e6b2ef5263bd22aa1269f5b4b41384ddef0d62560c069d9de3bbc5d048cc1d23dc1d7986631237ec4f63670bed1d9206940d8c89b661297d24ae84fe10872cc19b6d3bb4097f8c65d92ef373d415705a8737cdc833052974382fe365299c40b58543a041b2201efa7b52a858417259771993328c96d3e9207acc399d7f6c8e675cd34bbfa80ef89f30b9f2f21358b4a3175c96f668709efbb2b6cd05e00fd8011d36c86026dd34ed860e470a205c0de0924a14d3baebab17bdc4a05805ce902254c801c49a98aec13163a872e02726b661cca9e30f05cd5baa23b260a3782b0ccb79483d399ebd071689b7c20078be531e4e9e5ca4677ed47e15e0dc89e9050865aac050ac92be371d3abd34ac9ecfc172f17256beaba72825ad47ccc1e58f37035dfe3710f10d514629c5c7d0a55895c7a82cad38bcf8a9f5281f820e61be7bc30a1b459f0b529ae99116c72877a9d6056c994eb134397b01b73353f5b9b729461c056c89d59b2313bd970d0a69fe8ab44e754cb0fa90672bf2e4ca998802093b24748bf883a4744cee04c621b5f4cccc29c5729b4c5eb56c052f716584f995ff59c897cdbd8327e3373b184f3b4f43bc6e4ad8b1bc9b1eaf7c4dcf5b0b155f006afcec45c3295cc91eac1056e7b4fdead6553b07bf5f852748df69386f1d6c0219c7eb374bc326e8d425183a75a050361e71d28a73347071f1d156e8c6393c476e04086e1b1613dee7b5e75a13df783a01c265436993f4fb06b4bc088248b079875df1cfcdac643482ac70c1aa72ebe3756697be2b63661eb420892427fc997adc5da14c5da53f3d9ea705816c6eea3a2957cf966787e2c606b52c7033708f89f4befc0bd4de4ce5f66be7677997a636a972117226737fded88edfd9288cdba82dd4d95fe7e6dfca92fdd1e72c8f9616c8ad2aed2201c923d1ed154e4e77903a08decef127b237e360790387d6de81cccc21fb9df731bb56c79d64b490f1d4865cb0fdf8d0b6167157d48f42b4822ef232f692c02ee4a32903bb2b7ce44f11d03696fd4aff5e903e193bf3c2ec1335c998102f5cd54675ddb6d905281276be86fe7f97b0bf61bb7eb8fcf2b3f6a6cc875c41bff41933d3d77e3fbab5eb3634403bc55dfef12bc558a47894e42f39aa7c226a6cf79c295787e7e250e8edb63d652cb29f357b3279f0d6762002e27a1ae719380109ca3124541e7a31ef8674d495fa7a0462559ea51c843b62ca3ff5e281fb4a7da8b3fd03f92dc22dcdf6b19a0335e083038078b9a9a4a05f8531bd5483d4da0d965790dc07ea140c33a6a852a1320e4c3640bdeb5a3998158cf7247cfdd35690022ba3b4ee16b46ebc3eff259dd239aad1381a4479eed4a7cdb31ba523fca860f88837e20955216e1844bebe5366beef1665a331922ecadce171b11b3a96a8314aa8b4cb956d8ba177bc82128e9230deecdffd2aac19ce29417755332cd1d631544cde1038cc8857fdc856a736844986831e76fcf2848e95a269e9210b9676cd1d5e77530d380eb004029b3cc4440ea1b8bac3112bad001cc5883dec5cd6fe3d136aeba46bc12c5fe63b1ec289ec22a71d1fdd100b0a05d444cfffafd55760bd6df6499aabd14143e513ef6e69deed194b55173285a69e84d73fe294106acc9eae66e6976ec92ec58681ca3730e175276a3b96ce7aafef9678a190e27bf902a4b4be2284f110660949fc87ae71bccf6264e17789ab5afe1be754e536ce10e4abd144b8f91d08cdaecf5a8ec3d3f7d50748df6701750627099aa7dbd4870091ac12172fc7027f43182a5901eb2319659a59fde0982b0e701377553e4fdfb08ecdd61e9a53f14a7d83ba324bdc8fddcfcf010b634f680d5cca0c80f749da2d170ab567c19fffadb00b7af17bba57a194c1cd7beeb56d492bd19d183765d4d4736a77fe30a1c805b3282f3c46c4ebdc6eaffc74256a5c67b3e0568d07a61fcaab16c050f3b58e4bc4bac07b0340ea9bb55faf98bba23f246525721ebd6c91d44be4b674ac9f1968f686718d7d47c0c209021ae1e0d66de4ea30a7019cb25169e27ff19c60ebecf4e0de1ded7525ddf6fd64f952643f082c7231483edf09a9bb39771561e570b76e87cc1299eee96baf93e82b4afe619ebe6853e08daf1298ad056b5fd9bb6fec8a125aaf43f97c07954dc8eccf028a009b94d00f4fd6ffbe7aa967c5fdb1ceafdf7d2d52767adb22185a5f06f0621441c6f14b36d6d76fd8383dc75738ee6ca5897b740eca3e4aaf991c2d6f599853ceca8a917c2c0db65000d2df6982478422f8eaa28d202ac6f705b35f497429ddba962ff49f856f7396c20dc2fbda855e36e5bfb0a9ac353d2a68512e34374ce5391de16624a99c0ed66168d2bd26ebc9da4dd46a270d5a81b09f76039f7a85d84d1985bc0faf7ada1dbfff1d6c06854b979a44d16bc6c4259e7311009ecfac6cf5f2c925ad1c9c4b7d3eb46b5b43ed0f10496f574438ad49e796d584cd2c936b1655f25f0cf42eff53384d414e12e16c2bcc83eed4aac5e0f30ed570a7f5a7351edb218bfc40267576093a01870f54f39a67a4ddcc97fd47bb8edd0e493c875d28aefb658137ad49ec07c42ca4beea801d0f74c1a6c499ab67ad3f85a6bf3a6372cc92161bea9fc64b41452f449f209bd311e2b4eb7e1731cfb59a2cdc491a7393930c61f8cb700a7685d2897ee4c81b273719ea27eb61ff5065920fcd5e2aed6b93afcc31a0f50f6b41730695f6d74c92e9295c58a063f4af6a22354dacdc5813051f72825f732f562409ee02cf1b4edd0042b4f8567466b68b6ffc919270e2b34b7a9b5f736ce3ef498ad15091843bb8baac89a0b05c87e6329d630417e52c33766fe17502a53f1e337b8cf879ccadd30ddc64ed893befc15d3a68222ee94f5015fc2bef715d164ad68dc60c07e1942afeba3e797266036b736e3354eb4e5c200d98ed1caca0a703f506f2702ead3ecbb07a0dfe702118f87feff077a21f893e8563554f55d632596c189e5e612f26ee8527415a1566a65c980a32ff4729213767e1f204c17dd6ab791d60298e18c95210c15ed873a79223d1", 0x1000}, {&(0x7f0000001500)="e0f80ae119834fc0ff5a39378e2de948bccacf76e707be9670eba5a8876ee3602e4aa5161c7ba5886556b4f482498cb79530ff51fda8ac92ad266a340a8452632badd5e40df5e13968c90a28c44e6ad616f0a7c772fb234794b1964c4078bf099d77be599921d1333cbf33e84e045b8aefe0bf7a08e097efd083", 0x7a}, {&(0x7f0000001580)="371b067e5119c659c9eb13676359aec17aa66ea87a81e995e768f2b496fb895bd62b95b974d786f323675b16bde34220dec97641fb5fa68f65dd26caf5883ed979d31f049ac494be0f86022c6f755146c03e02580e4a55c27438ff1436ca402edcc09406974e0210112482808bdcaf96999141533bc488db45ae89020838648887669db0eb41774e76429685bc939ae7fe8a9765", 0x94}], 0x8, &(0x7f00000016c0)="da29145aaac1e67713d4a982203d9c09fe23a8363636e7eeb7b38280c91db7f9d166239f9625698faf26d5d208c4925d5fa07802b79df0069402362b47d40dfef71dcd9b671a70bad31cc900045c3a773e2dc43ca41c", 0x56, 0x80}, 0x40841) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r4 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r4, 0x40047438, &(0x7f0000000180)=""/246) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r5, &(0x7f0000000040)=ANY=[], 0xfea7) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r5, 0x0) ioctl$PPPIOCSFLAGS1(r4, 0x40047457, &(0x7f00000000c0)) modify_ldt$read_default(0x2, &(0x7f0000001780)=""/255, 0xff) [ 1238.586586] loop3: [POWERTEC] p1 p2 p3 p4 p5 p6 p7 p8 p9 p10 p11 p12 [ 1238.635642] loop3: p1 start 233194046 is beyond EOD, truncated [ 1238.669197] loop3: p2 start 3569653895 is beyond EOD, truncated [ 1238.698295] loop3: p3 start 926682669 is beyond EOD, truncated [ 1238.725068] loop3: p4 start 1263303888 is beyond EOD, truncated [ 1238.743147] IPVS: ftp: loaded support on port[0] = 21 [ 1238.769982] loop3: p5 start 1281279881 is beyond EOD, truncated [ 1238.803562] loop3: p6 start 3452787639 is beyond EOD, truncated [ 1238.846301] loop3: p7 start 2263908108 is beyond EOD, truncated [ 1238.874910] loop3: p8 start 1970859340 is beyond EOD, truncated [ 1238.907113] loop3: p9 start 1782333214 is beyond EOD, truncated [ 1238.930914] loop3: p10 start 1751982490 is beyond EOD, truncated [ 1238.954001] loop3: p11 start 3605249017 is beyond EOD, truncated [ 1238.976279] loop3: p12 start 2400178403 is beyond EOD, truncated [ 1239.232691] IPVS: ftp: loaded support on port[0] = 21 08:55:52 executing program 4: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000000)=0x3) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) ioctl$EVIOCGPROP(0xffffffffffffffff, 0x40047438, &(0x7f0000000180)=""/246) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r3, &(0x7f0000000040)=ANY=[], 0xfea7) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r3, 0x0) ioctl$PPPIOCSFLAGS1(0xffffffffffffffff, 0x40047459, &(0x7f00000000c0)) 08:55:52 executing program 5: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000000)) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r3 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r3, 0x40047438, &(0x7f0000000180)=""/246) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r4, 0x0) ioctl$PPPIOCSFLAGS1(r3, 0x80047453, &(0x7f00000000c0)) 08:55:52 executing program 0: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f0000000000)=0x3) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r2, 0x40047438, &(0x7f0000000180)=""/246) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r3, &(0x7f0000000040)=ANY=[], 0xfea7) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r3, 0x0) ioctl$PPPIOCSFLAGS1(r2, 0x4020744f, &(0x7f00000000c0)) 08:55:52 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_read_part_table(0x0, 0x2, &(0x7f0000002640)=[{0x0, 0x4, 0xfffffffffffffff7}, {&(0x7f0000001540)="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", 0x1e0}]) 08:55:52 executing program 2: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000000)=0x3) r3 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0, 0x0}, 0x0) fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f00000000c0)='system.posix_acl_access\x00', &(0x7f00000004c0)={{}, {0x1, 0x7}, [{0x2, 0x2}, {0x2, 0x4}, {0x2, 0x1}, {0x2, 0x1}, {0x2, 0x1}, {}, {}, {0x2, 0x4}, {0x2, 0x5}], {0x4, 0x2}, [{0x8, 0x7}, {}, {0x8, 0x5}, {0x8, 0x2, r5}], {}, {0x20, 0x7}}, 0x8c, 0x2) write$FUSE_ENTRY(r3, &(0x7f00000002c0)={0x90, 0x7fffffffffffffff, 0x6, {0x6, 0x2, 0xfffffffffffffffe, 0x4, 0x6, 0x2, {0x3, 0x5, 0x0, 0x400, 0x8001, 0x1, 0x7, 0x2, 0x5, 0x1, 0x4, 0xffffffffffffffff, r5, 0xdc, 0x3}}}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r6 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r6, 0x40047438, &(0x7f0000000180)=""/246) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r7, &(0x7f0000000040)=ANY=[], 0xfea7) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r7, 0x0) ioctl$PPPIOCSFLAGS1(r6, 0x40047457, &(0x7f00000000c0)) [ 1240.545019] IPVS: ftp: loaded support on port[0] = 21 [ 1240.552472] IPVS: ftp: loaded support on port[0] = 21 [ 1240.569305] IPVS: ftp: loaded support on port[0] = 21 [ 1240.583332] IPVS: ftp: loaded support on port[0] = 21 08:55:52 executing program 1: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000000)=0x3) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r1, 0x40047438, &(0x7f0000000180)=""/246) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r2, &(0x7f0000000040)=ANY=[], 0xfea7) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setresuid(0x0, r3, 0x0) r4 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setresuid(0x0, r5, 0x0) r6 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) mount$9p_fd(0x0, &(0x7f0000000100)='.\x00', &(0x7f0000000140)='9p\x00', 0x2000000, &(0x7f00000002c0)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno'}, 0x2c, {[{@version_u='version=9p2000.u'}, {@dfltgid={'dfltgid'}}, {@access_any='access=any'}, {@dfltuid={'dfltuid', 0x3d, r3}}, {@loose='loose'}], [{@smackfsfloor={'smackfsfloor', 0x3d, '/-&'}}, {@euid_eq={'euid', 0x3d, r5}}, {@pcr={'pcr', 0x3d, 0x3}}, {@obj_user={'obj_user', 0x3d, 'cgroup.controllers\x00'}}, {@hash='hash'}, {@appraise_type='appraise_type=imasig'}, {@euid_eq={'euid', 0x3d, r7}}]}}) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r2, 0x0) ioctl$PPPIOCSFLAGS1(r1, 0x40047457, &(0x7f00000000c0)) [ 1240.612522] loop3: [POWERTEC] p1 p2 p3 p4 p5 p6 p7 p8 p9 p10 p11 p12 [ 1240.640458] loop3: p1 start 233194046 is beyond EOD, truncated [ 1240.678982] loop3: p2 start 3569653895 is beyond EOD, truncated [ 1240.734620] loop3: p3 start 926682669 is beyond EOD, truncated [ 1240.774492] loop3: p4 start 1263303888 is beyond EOD, truncated [ 1240.812831] IPVS: ftp: loaded support on port[0] = 21 [ 1240.818877] loop3: p5 start 1281279881 is beyond EOD, truncated [ 1240.853369] loop3: p6 start 3452787639 is beyond EOD, truncated [ 1240.878865] loop3: p7 start 2263908108 is beyond EOD, truncated [ 1240.935256] loop3: p8 start 1970859340 is beyond EOD, truncated [ 1240.988964] loop3: p9 start 1782333214 is beyond EOD, truncated [ 1241.028912] loop3: p10 start 1751982490 is beyond EOD, truncated [ 1241.060334] loop3: p11 start 3605249017 is beyond EOD, truncated [ 1241.092779] loop3: p12 start 2400178403 is beyond EOD, truncated 08:55:53 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_read_part_table(0x0, 0x2, &(0x7f0000002640)=[{0x0, 0x5, 0xfffffffffffffff7}, {&(0x7f0000001540)="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", 0x1e0}]) [ 1241.348687] IPVS: ftp: loaded support on port[0] = 21 08:55:53 executing program 4: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000000)=0x3) r3 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r3, 0x40047438, &(0x7f0000000180)=""/246) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r4, &(0x7f0000000040)=ANY=[], 0xfea7) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r4, 0x0) ioctl$PPPIOCSFLAGS1(r3, 0x40047459, &(0x7f00000000c0)) 08:55:53 executing program 5: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000000)=0x3) bpf$PROG_LOAD(0x5, 0x0, 0x0) r3 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r3, 0x40047438, &(0x7f0000000180)=""/246) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r4, 0x0) ioctl$PPPIOCSFLAGS1(r3, 0x80047453, &(0x7f00000000c0)) [ 1241.431391] 9pnet: Insufficient options for proto=fd 08:55:53 executing program 1: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000000)=0x3) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r1, 0x40047438, &(0x7f0000000180)=""/246) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r2, &(0x7f0000000040)=ANY=[], 0xfea7) r3 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vga_arbiter\x00', 0x220000, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000500)={r2, 0xc0, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=0x618, 0x0, 0x0, 0x0, &(0x7f0000000340)={0x4, 0x4}, 0x0, 0x0, &(0x7f0000000380)={0x0, 0x9, 0x8, 0x79}, &(0x7f00000003c0)=0x385, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=0x100}}, 0x10) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000580)={r3, 0x10, &(0x7f0000000540)={&(0x7f00000002c0)=""/79, 0x4f, r4}}, 0x10) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r2, 0x0) ioctl$PPPIOCSFLAGS1(r1, 0x40047457, &(0x7f00000000c0)) [ 1241.491726] loop3: [POWERTEC] p1 p2 p3 p4 p5 p6 p7 p8 p9 p10 p11 p12 [ 1241.522274] loop3: p1 start 233194046 is beyond EOD, truncated 08:55:53 executing program 0: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000000)=0x3) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r2, 0x40047438, &(0x7f0000000180)=""/246) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r3, &(0x7f0000000040)=ANY=[], 0xfea7) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r3, 0x0) ioctl$PPPIOCSFLAGS1(r2, 0x4020744f, &(0x7f00000000c0)) [ 1241.571569] loop3: p2 start 3569653895 is beyond EOD, truncated [ 1241.586303] IPVS: ftp: loaded support on port[0] = 21 [ 1241.597084] loop3: p3 start 926682669 is beyond EOD, truncated [ 1241.633597] IPVS: ftp: loaded support on port[0] = 21 [ 1241.636869] loop3: p4 start 1263303888 is beyond EOD, truncated [ 1241.683651] IPVS: ftp: loaded support on port[0] = 21 [ 1241.691779] loop3: p5 start 1281279881 is beyond EOD, truncated [ 1241.731482] loop3: p6 start 3452787639 is beyond EOD, truncated [ 1241.761328] loop3: p7 start 2263908108 is beyond EOD, truncated [ 1241.787637] IPVS: ftp: loaded support on port[0] = 21 [ 1241.802258] loop3: p8 start 1970859340 is beyond EOD, truncated [ 1241.836577] loop3: p9 start 1782333214 is beyond EOD, truncated [ 1241.876186] loop3: p10 start 1751982490 is beyond EOD, truncated [ 1241.927492] loop3: p11 start 3605249017 is beyond EOD, truncated [ 1241.962460] loop3: p12 start 2400178403 is beyond EOD, truncated 08:55:54 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_read_part_table(0x0, 0x2, &(0x7f0000002640)=[{0x0, 0x6, 0xfffffffffffffff7}, {&(0x7f0000001540)="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", 0x1e0}]) [ 1242.331665] loop3: [POWERTEC] p1 p2 p3 p4 p5 p6 p7 p8 p9 p10 p11 p12 [ 1242.348552] loop3: p1 start 233194046 is beyond EOD, truncated 08:55:54 executing program 2: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000000)=0x3) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) setsockopt$netlink_NETLINK_PKTINFO(r1, 0x10e, 0x3, &(0x7f0000000100), 0x4) r3 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r3, 0x40047438, &(0x7f0000000180)=""/246) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r4, &(0x7f0000000040)=ANY=[], 0xfea7) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r4, 0x0) ioctl$PPPIOCSFLAGS1(r3, 0x40047457, &(0x7f00000000c0)) [ 1242.376266] loop3: p2 start 3569653895 is beyond EOD, truncated 08:55:54 executing program 4: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000000)=0x3) r3 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r3, 0x40047438, &(0x7f0000000180)=""/246) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r4, &(0x7f0000000040)=ANY=[], 0xfea7) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r4, 0x0) ioctl$PPPIOCSFLAGS1(r3, 0x40047459, &(0x7f00000000c0)) [ 1242.422243] loop3: p3 start 926682669 is beyond EOD, truncated [ 1242.448255] IPVS: ftp: loaded support on port[0] = 21 [ 1242.452655] loop3: p4 start 1263303888 is beyond EOD, truncated 08:55:54 executing program 5: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000000)=0x3) bpf$PROG_LOAD(0x5, 0x0, 0x0) r3 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r3, 0x40047438, &(0x7f0000000180)=""/246) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r4, 0x0) ioctl$PPPIOCSFLAGS1(r3, 0x80047453, &(0x7f00000000c0)) [ 1242.505034] loop3: p5 start 1281279881 is beyond EOD, truncated [ 1242.541547] loop3: p6 start 3452787639 is beyond EOD, truncated [ 1242.543172] IPVS: ftp: loaded support on port[0] = 21 [ 1242.576203] loop3: p7 start 2263908108 is beyond EOD, truncated [ 1242.608928] loop3: p8 start 1970859340 is beyond EOD, truncated [ 1242.638601] IPVS: ftp: loaded support on port[0] = 21 08:55:54 executing program 0: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000000)=0x3) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r2, 0x40047438, &(0x7f0000000180)=""/246) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r3, &(0x7f0000000040)=ANY=[], 0xfea7) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r3, 0x0) ioctl$PPPIOCSFLAGS1(r2, 0x4020744f, &(0x7f00000000c0)) [ 1242.662082] loop3: p9 start 1782333214 is beyond EOD, truncated [ 1242.719467] loop3: p10 start 1751982490 is beyond EOD, truncated [ 1242.743806] IPVS: ftp: loaded support on port[0] = 21 [ 1242.765595] loop3: p11 start 3605249017 is beyond EOD, truncated [ 1242.794595] loop3: p12 start 2400178403 is beyond EOD, truncated [ 1242.872231] IPVS: ftp: loaded support on port[0] = 21 08:55:55 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_read_part_table(0x0, 0x2, &(0x7f0000002640)=[{0x0, 0x7, 0xfffffffffffffff7}, {&(0x7f0000001540)="c2ec123b097b69be3e42e60d3f03ff5b20b3406e8d7eebd2456f5388ad7135b73efb98088798c4d4506cd2295e60b5e9f9f2399833ad179a03e098e07644033f2d0e3c37a84095cdde0312f1d81191a92ccbe761424e7d3033a056d7d07c4c4bc2dbbb00079ae5158b76bed5cdd1d93054fff6874b43ef1289c75e4c9b911d69313cbc4e0abcab496b4ce2c83f238a2b30fc8210b75bcdcd0b774ac467962cc4389843f92f418b0718a87f17ae20f1790c7ff086746847e2217207cede6d2af2a58d7148128b2f86806b3be24ced787543219ae633ab66b7828c5bfd87571ee33ab89138401439491e3f3c6a4a56b4bf8a7d532ee9144977f6ac8fae105ab358e231f2cd9a216d68b0877161e158b14837fb1426f4a629f17ddd7bbf9019941ff9bbe3d6fd30d68dbd9e3b3cfb282bc08db959b660ed8f7ebc67714be3d00f8f1e2cbc9404069335265ce12996f7cb48c1f3221f7f892493e4711a6dbd79a0298e0e0b9936b06a3d08821f558f5738b05e2ead126157186dac58de8a7098291efacb6666b2dca73d422fbf6a09b30f3c30cc9e34faa453ef1d770f7008b7c54d644be9716b27aa40b67126130b61c29a254a578365216655e8a5c6955e72fb67e6f1796e499edcaa33e0b43bd172d9977deff713978907e12189743913c7c847", 0x1e0}]) [ 1243.125302] loop3: [POWERTEC] p1 p2 p3 p4 p5 p6 p7 p8 p9 p10 p11 p12 [ 1243.143267] loop3: p1 start 233194046 is beyond EOD, truncated [ 1243.172399] loop3: p2 start 3569653895 is beyond EOD, truncated [ 1243.200508] loop3: p3 start 926682669 is beyond EOD, truncated [ 1243.230564] loop3: p4 start 1263303888 is beyond EOD, truncated [ 1243.258344] loop3: p5 start 1281279881 is beyond EOD, truncated [ 1243.288274] loop3: p6 start 3452787639 is beyond EOD, truncated [ 1243.313826] loop3: p7 start 2263908108 is beyond EOD, truncated [ 1243.342966] loop3: p8 start 1970859340 is beyond EOD, truncated [ 1243.361260] loop3: p9 start 1782333214 is beyond EOD, truncated [ 1243.406187] loop3: p10 start 1751982490 is beyond EOD, truncated [ 1243.415935] loop3: p11 start 3605249017 is beyond EOD, truncated [ 1243.422316] loop3: p12 start 2400178403 is beyond EOD, truncated [ 1243.448885] IPVS: ftp: loaded support on port[0] = 21 08:55:55 executing program 1: unshare(0x40000000) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$can_bcm(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000080)={0x1d, r0}, 0x10, &(0x7f0000000140)={&(0x7f00000000c0)={0x0, 0x0, 0x0, {0x0, 0x2710}, {0x77359400}, {}, 0x1, @can={{}, 0x0, 0x0, 0x0, 0x0, "a4ef08f666c5d148"}}, 0x48}}, 0x0) r1 = socket$can_bcm(0x1d, 0x2, 0x2) connect(r1, &(0x7f0000000740)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$can_bcm(r1, &(0x7f0000000180)={&(0x7f0000000080)={0x1d, r3}, 0x10, &(0x7f0000000140)={&(0x7f00000000c0)=ANY=[@ANYBLOB='\x00'/16, @ANYRES64=0x0, @ANYRES64=0x2710, @ANYRES64=0x77359400, @ANYRES64=0x0, @ANYBLOB="000000000100000000000000000000002832b8fb84c32048"], 0x48}}, 0x0) sendmsg$ETHTOOL_MSG_WOL_SET(0xffffffffffffffff, &(0x7f0000000740)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000700)={&(0x7f00000007c0)={0x134, 0x0, 0x200, 0x70bd2b, 0x25dfdbfd, {}, [@ETHTOOL_A_WOL_MODES={0xbc, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_MASK={0x7, 0x5, "015f43"}, @ETHTOOL_A_BITSET_BITS={0x58, 0x3, 0x0, 0x1, [{0x8, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x10, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x6, 0x2, ':\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x3c, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0xf, 0x2, 'virt_wifi0\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x7f}, @ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0xf, 0x2, 'syzkaller1\x00'}]}]}, @ETHTOOL_A_BITSET_MASK={0x52, 0x5, "6ce448656dd565e255182a041554a05dcc2901b0900debb7205ad9a982160875ff9ef89bba62f57e091a4ae73d5aec534f57bda9ca7aaacbf2b10f47a7b6d54fa2cb53c5da9a0248b8e2ca41556e"}]}, @ETHTOOL_A_WOL_HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}]}, @ETHTOOL_A_WOL_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'virt_wifi0\x00'}]}, @ETHTOOL_A_WOL_HEADER={0x40, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syzkaller1\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r0}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r3}]}]}, 0x134}, 0x1, 0x0, 0x0, 0x84}, 0x880) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r4, 0x5423, &(0x7f0000000000)=0x3) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r5 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r5, 0x40047438, &(0x7f0000000180)=""/246) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r6, &(0x7f0000000040)=ANY=[], 0xfea7) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r6, 0x0) ioctl$PPPIOCSFLAGS1(r5, 0x40047457, &(0x7f00000000c0)) 08:55:55 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_read_part_table(0x0, 0x2, &(0x7f0000002640)=[{0x0, 0x8, 0xfffffffffffffff7}, {&(0x7f0000001540)="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", 0x1e0}]) [ 1243.628855] IPVS: ftp: loaded support on port[0] = 21 [ 1243.759911] loop3: [POWERTEC] p1 p2 p3 p4 p5 p6 p7 p8 p9 p10 p11 p12 [ 1243.769749] loop3: p1 start 233194046 is beyond EOD, truncated [ 1243.808566] loop3: p2 start 3569653895 is beyond EOD, truncated [ 1243.832402] loop3: p3 start 926682669 is beyond EOD, truncated [ 1243.856178] loop3: p4 start 1263303888 is beyond EOD, truncated [ 1243.876563] loop3: p5 start 1281279881 is beyond EOD, truncated [ 1243.891450] loop3: p6 start 3452787639 is beyond EOD, truncated [ 1243.915238] loop3: p7 start 2263908108 is beyond EOD, truncated [ 1243.921370] loop3: p8 start 1970859340 is beyond EOD, truncated [ 1243.940341] loop3: p9 start 1782333214 is beyond EOD, truncated [ 1243.959501] loop3: p10 start 1751982490 is beyond EOD, truncated [ 1243.972013] loop3: p11 start 3605249017 is beyond EOD, truncated [ 1243.979188] loop3: p12 start 2400178403 is beyond EOD, truncated 08:55:56 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_read_part_table(0x0, 0x2, &(0x7f0000002640)=[{0x0, 0x9, 0xfffffffffffffff7}, {&(0x7f0000001540)="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", 0x1e0}]) [ 1244.109324] loop3: [POWERTEC] p1 p2 p3 p4 p5 p6 p7 p8 p9 p10 p11 p12 [ 1244.123355] loop3: p1 start 233194046 is beyond EOD, truncated [ 1244.131399] loop3: p2 start 3569653895 is beyond EOD, truncated [ 1244.137803] loop3: p3 start 926682669 is beyond EOD, truncated [ 1244.144017] loop3: p4 start 1263303888 is beyond EOD, truncated [ 1244.150451] loop3: p5 start 1281279881 is beyond EOD, truncated [ 1244.156802] loop3: p6 start 3452787639 is beyond EOD, truncated [ 1244.163049] loop3: p7 start 2263908108 is beyond EOD, truncated [ 1244.169764] loop3: p8 start 1970859340 is beyond EOD, truncated [ 1244.176915] loop3: p9 start 1782333214 is beyond EOD, truncated [ 1244.183169] loop3: p10 start 1751982490 is beyond EOD, truncated [ 1244.189582] loop3: p11 start 3605249017 is beyond EOD, truncated [ 1244.196099] loop3: p12 start 2400178403 is beyond EOD, truncated 08:55:56 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_read_part_table(0x0, 0x2, &(0x7f0000002640)=[{0x0, 0xd, 0xfffffffffffffff7}, {&(0x7f0000001540)="c2ec123b097b69be3e42e60d3f03ff5b20b3406e8d7eebd2456f5388ad7135b73efb98088798c4d4506cd2295e60b5e9f9f2399833ad179a03e098e07644033f2d0e3c37a84095cdde0312f1d81191a92ccbe761424e7d3033a056d7d07c4c4bc2dbbb00079ae5158b76bed5cdd1d93054fff6874b43ef1289c75e4c9b911d69313cbc4e0abcab496b4ce2c83f238a2b30fc8210b75bcdcd0b774ac467962cc4389843f92f418b0718a87f17ae20f1790c7ff086746847e2217207cede6d2af2a58d7148128b2f86806b3be24ced787543219ae633ab66b7828c5bfd87571ee33ab89138401439491e3f3c6a4a56b4bf8a7d532ee9144977f6ac8fae105ab358e231f2cd9a216d68b0877161e158b14837fb1426f4a629f17ddd7bbf9019941ff9bbe3d6fd30d68dbd9e3b3cfb282bc08db959b660ed8f7ebc67714be3d00f8f1e2cbc9404069335265ce12996f7cb48c1f3221f7f892493e4711a6dbd79a0298e0e0b9936b06a3d08821f558f5738b05e2ead126157186dac58de8a7098291efacb6666b2dca73d422fbf6a09b30f3c30cc9e34faa453ef1d770f7008b7c54d644be9716b27aa40b67126130b61c29a254a578365216655e8a5c6955e72fb67e6f1796e499edcaa33e0b43bd172d9977deff713978907e12189743913c7c847", 0x1e0}]) [ 1244.395097] loop3: [POWERTEC] p1 p2 p3 p4 p5 p6 p7 p8 p9 p10 p11 p12 [ 1244.412299] loop3: p1 start 233194046 is beyond EOD, truncated [ 1244.422187] loop3: p2 start 3569653895 is beyond EOD, truncated [ 1244.431696] loop3: p3 start 926682669 is beyond EOD, truncated [ 1244.441775] loop3: p4 start 1263303888 is beyond EOD, truncated [ 1244.451933] loop3: p5 start 1281279881 is beyond EOD, truncated [ 1244.462466] loop3: p6 start 3452787639 is beyond EOD, truncated [ 1244.469654] loop3: p7 start 2263908108 is beyond EOD, truncated [ 1244.478808] loop3: p8 start 1970859340 is beyond EOD, truncated [ 1244.486419] loop3: p9 start 1782333214 is beyond EOD, truncated [ 1244.493802] loop3: p10 start 1751982490 is beyond EOD, truncated [ 1244.501977] loop3: p11 start 3605249017 is beyond EOD, truncated [ 1244.509087] loop3: p12 start 2400178403 is beyond EOD, truncated 08:55:56 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_read_part_table(0x0, 0x2, &(0x7f0000002640)=[{0x0, 0x10, 0xfffffffffffffff7}, {&(0x7f0000001540)="c2ec123b097b69be3e42e60d3f03ff5b20b3406e8d7eebd2456f5388ad7135b73efb98088798c4d4506cd2295e60b5e9f9f2399833ad179a03e098e07644033f2d0e3c37a84095cdde0312f1d81191a92ccbe761424e7d3033a056d7d07c4c4bc2dbbb00079ae5158b76bed5cdd1d93054fff6874b43ef1289c75e4c9b911d69313cbc4e0abcab496b4ce2c83f238a2b30fc8210b75bcdcd0b774ac467962cc4389843f92f418b0718a87f17ae20f1790c7ff086746847e2217207cede6d2af2a58d7148128b2f86806b3be24ced787543219ae633ab66b7828c5bfd87571ee33ab89138401439491e3f3c6a4a56b4bf8a7d532ee9144977f6ac8fae105ab358e231f2cd9a216d68b0877161e158b14837fb1426f4a629f17ddd7bbf9019941ff9bbe3d6fd30d68dbd9e3b3cfb282bc08db959b660ed8f7ebc67714be3d00f8f1e2cbc9404069335265ce12996f7cb48c1f3221f7f892493e4711a6dbd79a0298e0e0b9936b06a3d08821f558f5738b05e2ead126157186dac58de8a7098291efacb6666b2dca73d422fbf6a09b30f3c30cc9e34faa453ef1d770f7008b7c54d644be9716b27aa40b67126130b61c29a254a578365216655e8a5c6955e72fb67e6f1796e499edcaa33e0b43bd172d9977deff713978907e12189743913c7c847", 0x1e0}]) [ 1244.765386] loop3: [POWERTEC] p1 p2 p3 p4 p5 p6 p7 p8 p9 p10 p11 p12 [ 1244.775879] loop3: p1 start 233194046 is beyond EOD, truncated [ 1244.790529] loop3: p2 start 3569653895 is beyond EOD, truncated [ 1244.805443] loop3: p3 start 926682669 is beyond EOD, truncated [ 1244.819830] loop3: p4 start 1263303888 is beyond EOD, truncated [ 1244.835565] loop3: p5 start 1281279881 is beyond EOD, truncated [ 1244.849702] loop3: p6 start 3452787639 is beyond EOD, truncated [ 1244.874253] loop3: p7 start 2263908108 is beyond EOD, truncated [ 1244.887698] loop3: p8 start 1970859340 is beyond EOD, truncated [ 1244.905794] loop3: p9 start 1782333214 is beyond EOD, truncated [ 1244.912199] loop3: p10 start 1751982490 is beyond EOD, truncated [ 1244.923746] loop3: p11 start 3605249017 is beyond EOD, truncated [ 1244.942172] loop3: p12 start 2400178403 is beyond EOD, truncated 08:55:57 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_read_part_table(0x0, 0x2, &(0x7f0000002640)=[{0x0, 0x23, 0xfffffffffffffff7}, {&(0x7f0000001540)="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", 0x1e0}]) [ 1245.566718] loop3: [POWERTEC] p1 p2 p3 p4 p5 p6 p7 p8 p9 p10 p11 p12 [ 1245.578524] loop3: p1 start 233194046 is beyond EOD, truncated [ 1245.608753] loop3: p2 start 3569653895 is beyond EOD, truncated [ 1245.643397] loop3: p3 start 926682669 is beyond EOD, truncated [ 1245.671435] loop3: p4 start 1263303888 is beyond EOD, truncated [ 1245.696615] loop3: p5 start 1281279881 is beyond EOD, truncated [ 1245.716757] loop3: p6 start 3452787639 is beyond EOD, truncated [ 1245.736942] loop3: p7 start 2263908108 is beyond EOD, truncated [ 1245.758239] loop3: p8 start 1970859340 is beyond EOD, truncated [ 1245.778962] loop3: p9 start 1782333214 is beyond EOD, truncated [ 1245.807629] loop3: p10 start 1751982490 is beyond EOD, truncated [ 1245.838080] loop3: p11 start 3605249017 is beyond EOD, truncated [ 1245.863563] loop3: p12 start 2400178403 is beyond EOD, truncated 08:55:58 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_read_part_table(0x0, 0x2, &(0x7f0000002640)=[{0x0, 0x48, 0xfffffffffffffff7}, {&(0x7f0000001540)="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", 0x1e0}]) [ 1246.098438] loop3: [POWERTEC] p1 p2 p3 p4 p5 p6 p7 p8 p9 p10 p11 p12 [ 1246.111937] loop3: p1 start 233194046 is beyond EOD, truncated [ 1246.142739] loop3: p2 start 3569653895 is beyond EOD, truncated [ 1246.170098] loop3: p3 start 926682669 is beyond EOD, truncated [ 1246.197418] loop3: p4 start 1263303888 is beyond EOD, truncated [ 1246.217203] loop3: p5 start 1281279881 is beyond EOD, truncated [ 1246.237138] loop3: p6 start 3452787639 is beyond EOD, truncated [ 1246.257225] loop3: p7 start 2263908108 is beyond EOD, truncated [ 1246.277206] loop3: p8 start 1970859340 is beyond EOD, truncated [ 1246.298310] loop3: p9 start 1782333214 is beyond EOD, truncated [ 1246.325549] loop3: p10 start 1751982490 is beyond EOD, truncated [ 1246.351670] loop3: p11 start 3605249017 is beyond EOD, truncated [ 1246.379151] loop3: p12 start 2400178403 is beyond EOD, truncated 08:56:00 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_read_part_table(0x0, 0x2, &(0x7f0000002640)=[{0x0, 0x4c, 0xfffffffffffffff7}, {&(0x7f0000001540)="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", 0x1e0}]) 08:56:00 executing program 4: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000000)=0x3) r3 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r3, 0x40047438, &(0x7f0000000180)=""/246) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r4, &(0x7f0000000040)=ANY=[], 0xfea7) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r4, 0x0) ioctl$PPPIOCSFLAGS1(r3, 0x40047459, &(0x7f00000000c0)) [ 1248.336365] loop3: [POWERTEC] p1 p2 p3 p4 p5 p6 p7 p8 p9 p10 p11 p12 [ 1248.345932] loop3: p1 start 233194046 is beyond EOD, truncated [ 1248.351999] loop3: p2 start 3569653895 is beyond EOD, truncated [ 1248.360473] loop3: p3 start 926682669 is beyond EOD, truncated [ 1248.369744] loop3: p4 start 1263303888 is beyond EOD, truncated [ 1248.385535] loop3: p5 start 1281279881 is beyond EOD, truncated [ 1248.396185] loop3: p6 start 3452787639 is beyond EOD, truncated [ 1248.402404] loop3: p7 start 2263908108 is beyond EOD, truncated [ 1248.415949] loop3: p8 start 1970859340 is beyond EOD, truncated [ 1248.429662] loop3: p9 start 1782333214 is beyond EOD, truncated 08:56:00 executing program 2: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000000)=0x3) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r3 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r3, 0x40047438, &(0x7f0000000180)=""/246) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r4, &(0x7f0000000040)=ANY=[], 0xfea7) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r4, 0x0) ioctl$PPPIOCSFLAGS1(r3, 0x40047457, &(0x7f00000000c0)) 08:56:00 executing program 0: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000000)=0x3) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r2, 0x40047438, &(0x7f0000000180)=""/246) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r3, &(0x7f0000000040)=ANY=[], 0xfea7) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r3, 0x0) ioctl$PPPIOCSFLAGS1(r2, 0x4020744f, &(0x7f00000000c0)) 08:56:00 executing program 5: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000000)=0x3) bpf$PROG_LOAD(0x5, 0x0, 0x0) r3 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r3, 0x40047438, &(0x7f0000000180)=""/246) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r4, 0x0) ioctl$PPPIOCSFLAGS1(r3, 0x80047453, &(0x7f00000000c0)) [ 1248.440013] loop3: p10 start 1751982490 is beyond EOD, truncated [ 1248.447901] loop3: p11 start 3605249017 is beyond EOD, truncated [ 1248.459091] loop3: p12 start 2400178403 is beyond EOD, truncated 08:56:09 executing program 4: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r2, 0x40047438, &(0x7f0000000180)=""/246) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r3, &(0x7f0000000040)=ANY=[], 0xfea7) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r3, 0x0) ioctl$PPPIOCSFLAGS1(r2, 0x40047459, &(0x7f00000000c0)) 08:56:09 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_read_part_table(0x0, 0x2, &(0x7f0000002640)=[{0x0, 0x55, 0xfffffffffffffff7}, {&(0x7f0000001540)="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", 0x1e0}]) 08:56:09 executing program 0: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000000)=0x3) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r1, 0x40047438, &(0x7f0000000180)=""/246) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r2, &(0x7f0000000040)=ANY=[], 0xfea7) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r2, 0x0) ioctl$PPPIOCSFLAGS1(r1, 0x4020744f, &(0x7f00000000c0)) 08:56:09 executing program 5: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000000)=0x3) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r3 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r3, 0x40047438, &(0x7f0000000180)=""/246) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r4, 0x0) ioctl$PPPIOCSFLAGS1(r3, 0x80047453, &(0x7f00000000c0)) 08:56:09 executing program 2: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000000)=0x3) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r4 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r4, 0x40047438, &(0x7f0000000180)=""/246) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) fcntl$notify(r3, 0x402, 0x80000019) write$binfmt_script(r5, &(0x7f0000000040)=ANY=[], 0xfea7) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r5, 0x0) ioctl$PPPIOCSFLAGS1(r4, 0x40047457, &(0x7f00000000c0)) r6 = socket(0x1000000010, 0x80002, 0x0) sendmmsg$alg(r6, &(0x7f0000000200), 0x10efe10675dec16, 0x0) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(r6, 0x84, 0x15, &(0x7f0000000040), 0x1) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$SNDRV_CTL_IOCTL_PCM_INFO(0xffffffffffffffff, 0xc1205531, &(0x7f00000002c0)={0x6, 0x8001, 0x1f, 0x8, [], [], [], 0x7, 0x8c8, 0x180000, 0x97c6, "44d4e01c2cdf54efcf9815a83f8f53a9"}) 08:56:09 executing program 1: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) r0 = openat$ocfs2_control(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ocfs2_control\x00', 0x8240, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000140)=0x3) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r1, 0x40047438, &(0x7f0000000180)=""/246) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='freezer.self_freezing\x00', 0x275a, 0x0) r3 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) setsockopt$bt_BT_SNDMTU(r3, 0x112, 0xc, 0x0, 0x0) write$binfmt_script(r2, &(0x7f0000000040)=ANY=[], 0xfea7) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r2, 0x0) ioctl$PPPIOCSFLAGS1(r1, 0x40047457, &(0x7f00000000c0)) [ 1257.841664] IPVS: ftp: loaded support on port[0] = 21 [ 1257.862918] IPVS: ftp: loaded support on port[0] = 21 [ 1257.872413] IPVS: ftp: loaded support on port[0] = 21 [ 1257.880770] IPVS: ftp: loaded support on port[0] = 21 [ 1257.895132] loop3: [POWERTEC] p1 p2 p3 p4 p5 p6 p7 p8 p9 p10 p11 p12 [ 1257.913151] IPVS: ftp: loaded support on port[0] = 21 [ 1257.928271] loop3: p1 start 233194046 is beyond EOD, truncated [ 1257.957365] loop3: p2 start 3569653895 is beyond EOD, truncated [ 1257.996876] loop3: p3 start 926682669 is beyond EOD, truncated [ 1258.018507] loop3: p4 start 1263303888 is beyond EOD, truncated [ 1258.103634] loop3: p5 start 1281279881 is beyond EOD, truncated [ 1258.158510] loop3: p6 start 3452787639 is beyond EOD, truncated [ 1258.203550] loop3: p7 start 2263908108 is beyond EOD, truncated [ 1258.271941] loop3: p8 start 1970859340 is beyond EOD, truncated [ 1258.299268] loop3: p9 start 1782333214 is beyond EOD, truncated [ 1258.321619] loop3: p10 start 1751982490 is beyond EOD, truncated [ 1258.349720] loop3: p11 start 3605249017 is beyond EOD, truncated [ 1258.377736] loop3: p12 start 2400178403 is beyond EOD, truncated 08:56:10 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_read_part_table(0x0, 0x2, &(0x7f0000002640)=[{0x0, 0x60, 0xfffffffffffffff7}, {&(0x7f0000001540)="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", 0x1e0}]) [ 1258.560746] IPVS: ftp: loaded support on port[0] = 21 [ 1258.575318] IPVS: ftp: loaded support on port[0] = 21 [ 1258.687418] loop3: [POWERTEC] p1 p2 p3 p4 p5 p6 p7 p8 p9 p10 p11 p12 [ 1258.707496] loop3: p1 start 233194046 is beyond EOD, truncated [ 1258.713514] loop3: p2 start 3569653895 is beyond EOD, truncated 08:56:10 executing program 0: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000000)=0x3) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r1, 0x40047438, &(0x7f0000000180)=""/246) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r2, &(0x7f0000000040)=ANY=[], 0xfea7) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r2, 0x0) ioctl$PPPIOCSFLAGS1(r1, 0x4020744f, &(0x7f00000000c0)) [ 1258.762384] loop3: p3 start 926682669 is beyond EOD, truncated [ 1258.791851] loop3: p4 start 1263303888 is beyond EOD, truncated 08:56:10 executing program 4: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r2, 0x40047438, &(0x7f0000000180)=""/246) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r3, &(0x7f0000000040)=ANY=[], 0xfea7) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r3, 0x0) ioctl$PPPIOCSFLAGS1(r2, 0x40047459, &(0x7f00000000c0)) 08:56:10 executing program 5: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000000)=0x3) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r3 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r3, 0x40047438, &(0x7f0000000180)=""/246) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r4, 0x0) ioctl$PPPIOCSFLAGS1(r3, 0x80047453, &(0x7f00000000c0)) [ 1258.809805] loop3: p5 start 1281279881 is beyond EOD, truncated [ 1258.821974] loop3: p6 start 3452787639 is beyond EOD, truncated [ 1258.862383] IPVS: ftp: loaded support on port[0] = 21 [ 1258.865129] loop3: p7 start 2263908108 is beyond EOD, truncated [ 1258.900977] loop3: p8 start 1970859340 is beyond EOD, truncated [ 1258.927672] IPVS: ftp: loaded support on port[0] = 21 [ 1258.948424] IPVS: ftp: loaded support on port[0] = 21 [ 1258.957163] loop3: p9 start 1782333214 is beyond EOD, truncated [ 1259.001340] loop3: p10 start 1751982490 is beyond EOD, truncated [ 1259.043659] loop3: p11 start 3605249017 is beyond EOD, truncated [ 1259.078334] loop3: p12 start 2400178403 is beyond EOD, truncated 08:56:11 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_read_part_table(0x0, 0x2, &(0x7f0000002640)=[{0x0, 0x68, 0xfffffffffffffff7}, {&(0x7f0000001540)="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", 0x1e0}]) [ 1259.365634] loop3: [POWERTEC] p1 p2 p3 p4 p5 p6 p7 p8 p9 p10 p11 p12 [ 1259.380543] loop3: p1 start 233194046 is beyond EOD, truncated [ 1259.417480] loop3: p2 start 3569653895 is beyond EOD, truncated [ 1259.454533] loop3: p3 start 926682669 is beyond EOD, truncated [ 1259.488289] loop3: p4 start 1263303888 is beyond EOD, truncated [ 1259.528984] loop3: p5 start 1281279881 is beyond EOD, truncated [ 1259.561247] loop3: p6 start 3452787639 is beyond EOD, truncated [ 1259.603673] loop3: p7 start 2263908108 is beyond EOD, truncated [ 1259.639476] loop3: p8 start 1970859340 is beyond EOD, truncated [ 1259.680046] loop3: p9 start 1782333214 is beyond EOD, truncated [ 1259.698936] loop3: p10 start 1751982490 is beyond EOD, truncated 08:56:11 executing program 0: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000000)=0x3) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r1, 0x40047438, &(0x7f0000000180)=""/246) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r2, &(0x7f0000000040)=ANY=[], 0xfea7) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r2, 0x0) ioctl$PPPIOCSFLAGS1(r1, 0x4020744f, &(0x7f00000000c0)) [ 1259.720272] loop3: p11 start 3605249017 is beyond EOD, truncated [ 1259.738102] loop3: p12 start 2400178403 is beyond EOD, truncated 08:56:11 executing program 5: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000000)=0x3) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r3 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r3, 0x40047438, &(0x7f0000000180)=""/246) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r4, 0x0) ioctl$PPPIOCSFLAGS1(r3, 0x80047453, &(0x7f00000000c0)) 08:56:11 executing program 4: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r2, 0x40047438, &(0x7f0000000180)=""/246) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r3, &(0x7f0000000040)=ANY=[], 0xfea7) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r3, 0x0) ioctl$PPPIOCSFLAGS1(r2, 0x40047459, &(0x7f00000000c0)) 08:56:12 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_read_part_table(0x0, 0x2, &(0x7f0000002640)=[{0x0, 0x6c, 0xfffffffffffffff7}, {&(0x7f0000001540)="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", 0x1e0}]) [ 1259.863577] IPVS: ftp: loaded support on port[0] = 21 [ 1259.916335] IPVS: ftp: loaded support on port[0] = 21 [ 1259.917234] IPVS: ftp: loaded support on port[0] = 21 [ 1260.074770] loop3: [POWERTEC] p1 p2 p3 p4 p5 p6 p7 p8 p9 p10 p11 p12 [ 1260.081852] loop3: p1 start 233194046 is beyond EOD, truncated [ 1260.148987] loop3: p2 start 3569653895 is beyond EOD, truncated [ 1260.188970] loop3: p3 start 926682669 is beyond EOD, truncated [ 1260.237726] loop3: p4 start 1263303888 is beyond EOD, truncated [ 1260.273606] loop3: p5 start 1281279881 is beyond EOD, truncated [ 1260.310924] loop3: p6 start 3452787639 is beyond EOD, truncated [ 1260.344557] loop3: p7 start 2263908108 is beyond EOD, truncated [ 1260.379399] loop3: p8 start 1970859340 is beyond EOD, truncated [ 1260.412800] loop3: p9 start 1782333214 is beyond EOD, truncated [ 1260.445894] loop3: p10 start 1751982490 is beyond EOD, truncated [ 1260.483454] loop3: p11 start 3605249017 is beyond EOD, truncated [ 1260.516565] loop3: p12 start 2400178403 is beyond EOD, truncated 08:56:12 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_read_part_table(0x0, 0x2, &(0x7f0000002640)=[{0x0, 0x74, 0xfffffffffffffff7}, {&(0x7f0000001540)="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", 0x1e0}]) 08:56:12 executing program 4: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f0000000000)=0x3) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r2, 0x40047438, &(0x7f0000000180)=""/246) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r3, &(0x7f0000000040)=ANY=[], 0xfea7) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r3, 0x0) ioctl$PPPIOCSFLAGS1(r2, 0x40047459, &(0x7f00000000c0)) [ 1260.794841] loop3: [POWERTEC] p1 p2 p3 p4 p5 p6 p7 p8 p9 p10 p11 p12 [ 1260.811217] loop3: p1 start 233194046 is beyond EOD, truncated [ 1260.853126] loop3: p2 start 3569653895 is beyond EOD, truncated [ 1260.873088] loop3: p3 start 926682669 is beyond EOD, truncated [ 1260.900345] loop3: p4 start 1263303888 is beyond EOD, truncated [ 1260.911076] IPVS: ftp: loaded support on port[0] = 21 [ 1260.928748] loop3: p5 start 1281279881 is beyond EOD, truncated [ 1260.961272] loop3: p6 start 3452787639 is beyond EOD, truncated [ 1260.994495] loop3: p7 start 2263908108 is beyond EOD, truncated [ 1261.040566] loop3: p8 start 1970859340 is beyond EOD, truncated [ 1261.075782] loop3: p9 start 1782333214 is beyond EOD, truncated [ 1261.082131] loop3: p10 start 1751982490 is beyond EOD, truncated [ 1261.116034] loop3: p11 start 3605249017 is beyond EOD, truncated [ 1261.122229] loop3: p12 start 2400178403 is beyond EOD, truncated 08:56:14 executing program 4: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f0000000000)=0x3) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r2, 0x40047438, &(0x7f0000000180)=""/246) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r3, &(0x7f0000000040)=ANY=[], 0xfea7) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r3, 0x0) ioctl$PPPIOCSFLAGS1(r2, 0x40047459, &(0x7f00000000c0)) 08:56:14 executing program 5: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000000)=0x3) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r3 = openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$EVIOCGPROP(r3, 0x40047438, &(0x7f0000000180)=""/246) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r4, 0x0) ioctl$PPPIOCSFLAGS1(r3, 0x80047453, &(0x7f00000000c0)) 08:56:14 executing program 0: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000000)=0x3) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r2, 0x40047438, &(0x7f0000000180)=""/246) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r3, &(0x7f0000000040)=ANY=[], 0xfea7) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r3, 0x0) ioctl$PPPIOCSFLAGS1(r2, 0x4020744f, &(0x7f00000000c0)) 08:56:14 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_read_part_table(0x0, 0x2, &(0x7f0000002640)=[{0x0, 0x7a, 0xfffffffffffffff7}, {&(0x7f0000001540)="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", 0x1e0}]) 08:56:14 executing program 1: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000000)=0x3) pipe(&(0x7f0000001480)={0xffffffffffffffff}) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, &(0x7f00000014c0)={&(0x7f00000002c0)="45f4a1baa5777444cf2c631a84424213ca33dd9a0f6e9e9f5ede898311e7f7c0b7cfa86fa1f3b3f424002827e751d0d8d905a7577e9e0eaa78723c0fbdb49984dbe8cba86e87e744eeffd0b8612e87c698d680e0a1afed84c99b2095ed24c4444dddc4204a004226aaf06a629fb79d73aa16c4ad6a0796838fb3b72461e2f3fd1d3203ba4b2e26726e52a8cde629a49ffb6b4f4ef5261638630c489fcdced6c094a8545e281c0d75f3e691a82652a66a677683ea28ddfb12abcca4bfd9be", &(0x7f0000000380)=""/4096, &(0x7f0000000100)="1183d8010e7a20ef9df2b7183273d8664a8524ad5cdc0b31e23ed0a472aaf894a5b30ee71e1801ce6c7871f4f214b6766e2d30d2caeba3f9fc5d83b5fb23a03b043ab7d2c332cfeb5fc8c3c310c3bf7a94f1c482256991c5dbad8a4e1f2d25abfa8f9a7ed9d191140a5fe2390d581b5ff859b881a14c72ed", &(0x7f0000001380)="e79a249d7adb9f98d11e82b491586d334db0e403459c6a0fc4d9ffd16130a96b7455336f386506cb35d8cddc9f76707773200b87b7db961ef1b10daf05384ef9c32b88966946a3203d610b335608629174773ce6d9610c1949c5ff1e0fd1ee05cad75e5175fbfa9e3e33c6d830c87e3e82df20bb6ffff2335400d636e434f07bcfffdd09eab180e8e340a8faabcbf6d5fd2d3c05c8715d793bd2846d44b05d09605f61cd178d443474095a2ebbe4691d7d4ea718068ba240537854c4bb4648350c", 0x80, r1, 0x4}, 0x38) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r2, 0x40047438, &(0x7f0000000180)=""/246) r3 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r4, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(0xffffffffffffffff, 0x84, 0x71, &(0x7f00000000c0)={r5}, &(0x7f0000000080)=0x18) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r3, 0x84, 0x66, &(0x7f0000000040)={r5, 0xfffffffe}, &(0x7f0000000080)=0x8) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f0000001500)={r5, @in={{0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x13}}}, 0x101, 0x1, 0x1, 0xdc7e, 0xb0, 0x2, 0x2}, &(0x7f00000015c0)=0x9c) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r6, &(0x7f0000000040)=ANY=[], 0xfea7) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r6, 0x0) ioctl$PPPIOCSFLAGS1(r2, 0x40047457, &(0x7f00000000c0)) [ 1262.699294] IPVS: ftp: loaded support on port[0] = 21 [ 1262.705901] IPVS: ftp: loaded support on port[0] = 21 [ 1262.715418] loop3: [POWERTEC] p1 p2 p3 p4 p5 p6 p7 p8 p9 p10 p11 p12 [ 1262.722677] loop3: p1 start 233194046 is beyond EOD, truncated [ 1262.727791] IPVS: ftp: loaded support on port[0] = 21 [ 1262.781868] IPVS: ftp: loaded support on port[0] = 21 [ 1262.787299] loop3: p2 start 3569653895 is beyond EOD, truncated [ 1262.894657] loop3: p3 start 926682669 is beyond EOD, truncated [ 1262.937391] loop3: p4 start 1263303888 is beyond EOD, truncated [ 1262.976802] loop3: p5 start 1281279881 is beyond EOD, truncated [ 1263.018195] loop3: p6 start 3452787639 is beyond EOD, truncated [ 1263.063701] loop3: p7 start 2263908108 is beyond EOD, truncated [ 1263.094480] loop3: p8 start 1970859340 is beyond EOD, truncated [ 1263.139384] loop3: p9 start 1782333214 is beyond EOD, truncated [ 1263.176677] loop3: p10 start 1751982490 is beyond EOD, truncated [ 1263.198801] loop3: p11 start 3605249017 is beyond EOD, truncated [ 1263.243941] loop3: p12 start 2400178403 is beyond EOD, truncated [ 1263.253416] IPVS: ftp: loaded support on port[0] = 21 08:56:15 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_read_part_table(0x0, 0x2, &(0x7f0000002640)=[{0x0, 0x300, 0xfffffffffffffff7}, {&(0x7f0000001540)="c2ec123b097b69be3e42e60d3f03ff5b20b3406e8d7eebd2456f5388ad7135b73efb98088798c4d4506cd2295e60b5e9f9f2399833ad179a03e098e07644033f2d0e3c37a84095cdde0312f1d81191a92ccbe761424e7d3033a056d7d07c4c4bc2dbbb00079ae5158b76bed5cdd1d93054fff6874b43ef1289c75e4c9b911d69313cbc4e0abcab496b4ce2c83f238a2b30fc8210b75bcdcd0b774ac467962cc4389843f92f418b0718a87f17ae20f1790c7ff086746847e2217207cede6d2af2a58d7148128b2f86806b3be24ced787543219ae633ab66b7828c5bfd87571ee33ab89138401439491e3f3c6a4a56b4bf8a7d532ee9144977f6ac8fae105ab358e231f2cd9a216d68b0877161e158b14837fb1426f4a629f17ddd7bbf9019941ff9bbe3d6fd30d68dbd9e3b3cfb282bc08db959b660ed8f7ebc67714be3d00f8f1e2cbc9404069335265ce12996f7cb48c1f3221f7f892493e4711a6dbd79a0298e0e0b9936b06a3d08821f558f5738b05e2ead126157186dac58de8a7098291efacb6666b2dca73d422fbf6a09b30f3c30cc9e34faa453ef1d770f7008b7c54d644be9716b27aa40b67126130b61c29a254a578365216655e8a5c6955e72fb67e6f1796e499edcaa33e0b43bd172d9977deff713978907e12189743913c7c847", 0x1e0}]) [ 1263.466349] loop3: [POWERTEC] p1 p2 p3 p4 p5 p6 p7 p8 p9 p10 p11 p12 [ 1263.493565] loop3: p1 start 233194046 is beyond EOD, truncated [ 1263.524453] loop3: p2 start 3569653895 is beyond EOD, truncated [ 1263.558596] loop3: p3 start 926682669 is beyond EOD, truncated 08:56:15 executing program 4: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f0000000000)=0x3) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r2, 0x40047438, &(0x7f0000000180)=""/246) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r3, &(0x7f0000000040)=ANY=[], 0xfea7) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r3, 0x0) ioctl$PPPIOCSFLAGS1(r2, 0x40047459, &(0x7f00000000c0)) [ 1263.593270] loop3: p4 start 1263303888 is beyond EOD, truncated [ 1263.630187] loop3: p5 start 1281279881 is beyond EOD, truncated 08:56:15 executing program 5: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000000)=0x3) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r3 = openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$EVIOCGPROP(r3, 0x40047438, &(0x7f0000000180)=""/246) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r4, 0x0) ioctl$PPPIOCSFLAGS1(r3, 0x80047453, &(0x7f00000000c0)) [ 1263.667090] loop3: p6 start 3452787639 is beyond EOD, truncated 08:56:15 executing program 1: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1, 0x8031, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000000)=0x3) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r1, 0x40047438, &(0x7f0000000180)=""/246) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r2, &(0x7f0000000040)=ANY=[], 0xfea7) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r2, 0x0) ioctl$PPPIOCSFLAGS1(r1, 0x40047457, &(0x7f00000000c0)) 08:56:15 executing program 0: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000000)=0x3) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r2, 0x40047438, &(0x7f0000000180)=""/246) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r3, &(0x7f0000000040)=ANY=[], 0xfea7) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r3, 0x0) ioctl$PPPIOCSFLAGS1(r2, 0x4020744f, &(0x7f00000000c0)) [ 1263.712741] loop3: p7 start 2263908108 is beyond EOD, truncated [ 1263.728305] IPVS: ftp: loaded support on port[0] = 21 [ 1263.741926] IPVS: ftp: loaded support on port[0] = 21 [ 1263.755470] loop3: p8 start 1970859340 is beyond EOD, truncated [ 1263.792167] loop3: p9 start 1782333214 is beyond EOD, truncated [ 1263.820606] IPVS: ftp: loaded support on port[0] = 21 [ 1263.835809] loop3: p10 start 1751982490 is beyond EOD, truncated [ 1263.867912] IPVS: ftp: loaded support on port[0] = 21 [ 1263.877751] loop3: p11 start 3605249017 is beyond EOD, truncated [ 1263.903985] loop3: p12 start 2400178403 is beyond EOD, truncated 08:56:16 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_read_part_table(0x0, 0x2, &(0x7f0000002640)=[{0x0, 0x319, 0xfffffffffffffff7}, {&(0x7f0000001540)="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", 0x1e0}]) [ 1264.356911] loop3: [POWERTEC] p1 p2 p3 p4 p5 p6 p7 p8 p9 p10 p11 p12 [ 1264.370962] loop3: p1 start 233194046 is beyond EOD, truncated 08:56:16 executing program 2: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) ioctl$GIO_UNISCRNMAP(r1, 0x4b69, &(0x7f00000002c0)=""/98) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000000)=0x3) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) ioctl$TIOCSRS485(r1, 0x542f, &(0x7f0000000100)={0x40, 0x20, 0x4}) r3 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r3, 0x40047438, &(0x7f0000000180)=""/246) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) setsockopt$inet6_IPV6_RTHDRDSTOPTS(0xffffffffffffffff, 0x29, 0x37, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"], 0x10) ioctl$DRM_IOCTL_ADD_CTX(0xffffffffffffffff, 0xc0086420, &(0x7f0000000240)={0x0}) ioctl$DRM_IOCTL_SWITCH_CTX(0xffffffffffffffff, 0x40086424, &(0x7f0000000280)={r5, 0x2}) ioctl$DRM_IOCTL_DMA(0xffffffffffffffff, 0xc0406429, &(0x7f0000000400)={0x0, 0x7, &(0x7f0000000140)=[0x400, 0x97d, 0x6, 0x1fc000, 0x2f980000, 0x1, 0x2], &(0x7f0000000340), 0xe3, 0x5, 0x4, &(0x7f0000000380)=[0x1f, 0x1, 0x0, 0x30d2, 0x5], &(0x7f00000003c0)=[0x1, 0x3, 0x0, 0x20, 0x3, 0x9]}) write$binfmt_script(r4, &(0x7f0000000040)=ANY=[], 0xfea7) mmap(&(0x7f000018f000/0x4000)=nil, 0x4000, 0x4, 0x10012, r4, 0x0) ioctl$PPPIOCSFLAGS1(r3, 0x40047457, &(0x7f00000000c0)) [ 1264.406035] loop3: p2 start 3569653895 is beyond EOD, truncated [ 1264.455212] loop3: p3 start 926682669 is beyond EOD, truncated [ 1264.507923] loop3: p4 start 1263303888 is beyond EOD, truncated [ 1264.517539] IPVS: ftp: loaded support on port[0] = 21 [ 1264.546338] loop3: p5 start 1281279881 is beyond EOD, truncated [ 1264.588897] loop3: p6 start 3452787639 is beyond EOD, truncated [ 1264.635276] loop3: p7 start 2263908108 is beyond EOD, truncated [ 1264.638491] IPVS: ftp: loaded support on port[0] = 21 [ 1264.677536] loop3: p8 start 1970859340 is beyond EOD, truncated 08:56:16 executing program 4: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000000)=0x3) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r2, 0x40047438, &(0x7f0000000180)=""/246) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r3, &(0x7f0000000040)=ANY=[], 0xfea7) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r3, 0x0) ioctl$PPPIOCSFLAGS1(r2, 0x40047459, &(0x7f00000000c0)) [ 1264.720111] loop3: p9 start 1782333214 is beyond EOD, truncated [ 1264.772309] loop3: p10 start 1751982490 is beyond EOD, truncated 08:56:16 executing program 0: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000000)=0x3) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r2, 0x40047438, &(0x7f0000000180)=""/246) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r3, &(0x7f0000000040)=ANY=[], 0xfea7) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r3, 0x0) ioctl$PPPIOCSFLAGS1(r2, 0x4020744f, &(0x7f00000000c0)) [ 1264.825640] IPVS: ftp: loaded support on port[0] = 21 [ 1264.832148] loop3: p11 start 3605249017 is beyond EOD, truncated [ 1264.921667] loop3: p12 start 2400178403 is beyond EOD, truncated [ 1264.939502] IPVS: ftp: loaded support on port[0] = 21 08:56:17 executing program 5: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000000)=0x3) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r3 = openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$EVIOCGPROP(r3, 0x40047438, &(0x7f0000000180)=""/246) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r4, 0x0) ioctl$PPPIOCSFLAGS1(r3, 0x80047453, &(0x7f00000000c0)) 08:56:17 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_read_part_table(0x0, 0x2, &(0x7f0000002640)=[{0x0, 0x500, 0xfffffffffffffff7}, {&(0x7f0000001540)="c2ec123b097b69be3e42e60d3f03ff5b20b3406e8d7eebd2456f5388ad7135b73efb98088798c4d4506cd2295e60b5e9f9f2399833ad179a03e098e07644033f2d0e3c37a84095cdde0312f1d81191a92ccbe761424e7d3033a056d7d07c4c4bc2dbbb00079ae5158b76bed5cdd1d93054fff6874b43ef1289c75e4c9b911d69313cbc4e0abcab496b4ce2c83f238a2b30fc8210b75bcdcd0b774ac467962cc4389843f92f418b0718a87f17ae20f1790c7ff086746847e2217207cede6d2af2a58d7148128b2f86806b3be24ced787543219ae633ab66b7828c5bfd87571ee33ab89138401439491e3f3c6a4a56b4bf8a7d532ee9144977f6ac8fae105ab358e231f2cd9a216d68b0877161e158b14837fb1426f4a629f17ddd7bbf9019941ff9bbe3d6fd30d68dbd9e3b3cfb282bc08db959b660ed8f7ebc67714be3d00f8f1e2cbc9404069335265ce12996f7cb48c1f3221f7f892493e4711a6dbd79a0298e0e0b9936b06a3d08821f558f5738b05e2ead126157186dac58de8a7098291efacb6666b2dca73d422fbf6a09b30f3c30cc9e34faa453ef1d770f7008b7c54d644be9716b27aa40b67126130b61c29a254a578365216655e8a5c6955e72fb67e6f1796e499edcaa33e0b43bd172d9977deff713978907e12189743913c7c847", 0x1e0}]) [ 1265.139139] IPVS: ftp: loaded support on port[0] = 21 [ 1265.301998] loop3: [POWERTEC] p1 p2 p3 p4 p5 p6 p7 p8 p9 p10 p11 p12 [ 1265.336281] IPVS: ftp: loaded support on port[0] = 21 [ 1265.344959] loop3: p1 start 233194046 is beyond EOD, truncated [ 1265.414006] loop3: p2 start 3569653895 is beyond EOD, truncated [ 1265.459550] loop3: p3 start 926682669 is beyond EOD, truncated [ 1265.496299] loop3: p4 start 1263303888 is beyond EOD, truncated [ 1265.530005] loop3: p5 start 1281279881 is beyond EOD, truncated [ 1265.605226] loop3: p6 start 3452787639 is beyond EOD, truncated [ 1265.641611] loop3: p7 start 2263908108 is beyond EOD, truncated [ 1265.671853] loop3: p8 start 1970859340 is beyond EOD, truncated [ 1265.704051] loop3: p9 start 1782333214 is beyond EOD, truncated [ 1265.735565] loop3: p10 start 1751982490 is beyond EOD, truncated [ 1265.767998] loop3: p11 start 3605249017 is beyond EOD, truncated [ 1265.801560] loop3: p12 start 2400178403 is beyond EOD, truncated 08:56:18 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_read_part_table(0x0, 0x2, &(0x7f0000002640)=[{0x0, 0x600, 0xfffffffffffffff7}, {&(0x7f0000001540)="c2ec123b097b69be3e42e60d3f03ff5b20b3406e8d7eebd2456f5388ad7135b73efb98088798c4d4506cd2295e60b5e9f9f2399833ad179a03e098e07644033f2d0e3c37a84095cdde0312f1d81191a92ccbe761424e7d3033a056d7d07c4c4bc2dbbb00079ae5158b76bed5cdd1d93054fff6874b43ef1289c75e4c9b911d69313cbc4e0abcab496b4ce2c83f238a2b30fc8210b75bcdcd0b774ac467962cc4389843f92f418b0718a87f17ae20f1790c7ff086746847e2217207cede6d2af2a58d7148128b2f86806b3be24ced787543219ae633ab66b7828c5bfd87571ee33ab89138401439491e3f3c6a4a56b4bf8a7d532ee9144977f6ac8fae105ab358e231f2cd9a216d68b0877161e158b14837fb1426f4a629f17ddd7bbf9019941ff9bbe3d6fd30d68dbd9e3b3cfb282bc08db959b660ed8f7ebc67714be3d00f8f1e2cbc9404069335265ce12996f7cb48c1f3221f7f892493e4711a6dbd79a0298e0e0b9936b06a3d08821f558f5738b05e2ead126157186dac58de8a7098291efacb6666b2dca73d422fbf6a09b30f3c30cc9e34faa453ef1d770f7008b7c54d644be9716b27aa40b67126130b61c29a254a578365216655e8a5c6955e72fb67e6f1796e499edcaa33e0b43bd172d9977deff713978907e12189743913c7c847", 0x1e0}]) 08:56:18 executing program 4: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000000)=0x3) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r2, 0x40047438, &(0x7f0000000180)=""/246) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r3, &(0x7f0000000040)=ANY=[], 0xfea7) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r3, 0x0) ioctl$PPPIOCSFLAGS1(r2, 0x40047459, &(0x7f00000000c0)) 08:56:18 executing program 0: unshare(0x40000000) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000000)=0x3) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r3 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r3, 0x40047438, &(0x7f0000000180)=""/246) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r4, &(0x7f0000000040)=ANY=[], 0xfea7) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r4, 0x0) ioctl$PPPIOCSFLAGS1(r3, 0x4020744f, &(0x7f00000000c0)) [ 1266.044814] IPVS: ftp: loaded support on port[0] = 21 [ 1266.058318] loop3: [POWERTEC] p1 p2 p3 p4 p5 p6 p7 p8 p9 p10 p11 p12 08:56:18 executing program 5: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000000)=0x3) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r3 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(0xffffffffffffffff, 0x40047438, &(0x7f0000000180)=""/246) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r4, 0x0) ioctl$PPPIOCSFLAGS1(r3, 0x80047453, &(0x7f00000000c0)) [ 1266.090842] loop3: p1 start 233194046 is beyond EOD, truncated [ 1266.133968] loop3: p2 start 3569653895 is beyond EOD, truncated [ 1266.158631] IPVS: ftp: loaded support on port[0] = 21 [ 1266.170390] loop3: p3 start 926682669 is beyond EOD, truncated [ 1266.193035] IPVS: ftp: loaded support on port[0] = 21 [ 1266.202059] loop3: p4 start 1263303888 is beyond EOD, truncated [ 1266.243591] loop3: p5 start 1281279881 is beyond EOD, truncated [ 1266.273959] loop3: p6 start 3452787639 is beyond EOD, truncated [ 1266.306357] loop3: p7 start 2263908108 is beyond EOD, truncated [ 1266.328081] loop3: p8 start 1970859340 is beyond EOD, truncated [ 1266.350671] loop3: p9 start 1782333214 is beyond EOD, truncated [ 1266.371986] loop3: p10 start 1751982490 is beyond EOD, truncated [ 1266.393292] loop3: p11 start 3605249017 is beyond EOD, truncated [ 1266.413365] loop3: p12 start 2400178403 is beyond EOD, truncated 08:56:19 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_read_part_table(0x0, 0x2, &(0x7f0000002640)=[{0x0, 0x700, 0xfffffffffffffff7}, {&(0x7f0000001540)="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", 0x1e0}]) 08:56:19 executing program 2: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000000)=0x3) r1 = socket(0x1000000010, 0x80002, 0x0) sendmmsg$alg(r1, &(0x7f0000000200), 0x10efe10675dec16, 0x0) recvfrom$rose(r1, &(0x7f00000002c0)=""/248, 0xf8, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r2, 0x40047438, &(0x7f0000000180)=""/246) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r3, &(0x7f0000000040)=ANY=[], 0xfea7) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r3, 0x0) ioctl$PPPIOCSFLAGS1(r2, 0x40047457, &(0x7f00000000c0)) 08:56:19 executing program 0: unshare(0x40000000) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000000)=0x3) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r3 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r3, 0x40047438, &(0x7f0000000180)=""/246) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r4, &(0x7f0000000040)=ANY=[], 0xfea7) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r4, 0x0) ioctl$PPPIOCSFLAGS1(r3, 0x4020744f, &(0x7f00000000c0)) 08:56:19 executing program 4: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000000)=0x3) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r2, 0x40047438, &(0x7f0000000180)=""/246) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r3, &(0x7f0000000040)=ANY=[], 0xfea7) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r3, 0x0) ioctl$PPPIOCSFLAGS1(r2, 0x40047459, &(0x7f00000000c0)) 08:56:19 executing program 5: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000000)=0x3) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r3 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(0xffffffffffffffff, 0x40047438, &(0x7f0000000180)=""/246) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r4, 0x0) ioctl$PPPIOCSFLAGS1(r3, 0x80047453, &(0x7f00000000c0)) [ 1267.901149] IPVS: ftp: loaded support on port[0] = 21 [ 1267.907437] IPVS: ftp: loaded support on port[0] = 21 [ 1267.918682] IPVS: ftp: loaded support on port[0] = 21 [ 1267.918818] IPVS: ftp: loaded support on port[0] = 21 [ 1267.937370] loop3: [POWERTEC] p1 p2 p3 p4 p5 p6 p7 p8 p9 p10 p11 p12 08:56:20 executing program 1: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000000)=0x3) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r1, 0x40047438, &(0x7f0000000180)=""/246) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r2, &(0x7f0000000040)=ANY=[], 0xfea7) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r2, 0x0) r3 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000340)='/dev/dlm-monitor\x00', 0x400, 0x0) ioctl$sock_inet6_tcp_SIOCINQ(r3, 0x541b, &(0x7f0000000380)) ioctl$PPPIOCSFLAGS1(r1, 0x40047457, &(0x7f00000000c0)) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) r5 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r5, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(0xffffffffffffffff, 0x84, 0x71, &(0x7f00000000c0)={r6}, &(0x7f0000000080)=0x18) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000040)={r6, 0xfffffffe}, &(0x7f0000000080)=0x8) getsockopt$inet_sctp_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000000400)=@assoc_id=r6, &(0x7f0000000440)=0x4) sendmsg$IPCTNL_MSG_CT_NEW(r4, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f00000004c0)=ANY=[@ANYBLOB="3c00000000030904000000000000000000000000240001a0140001800800e976582e0100ffffc05bfffefe000300ac1414000c0002800500010200000005040010806bb2c7ffe40c6c94545d8799242474f6de5a3c304804f1dfb9138774291eea7ed3232887952686d06ff6f17287e0dea2773b435dc8814344b906c897080051365effec4869b36ede7a1d3a6388997f73dc8f824e3e2e7e154cd63cc4f9e5d2a7ba83a353d24817f8b4215134283eca9e94d93da4e8cf975df5453248cd8db7413c544b85232836a7a6864506198f22ff16b191d0e39c571bba1cf573054a10"], 0x3c}, 0x1, 0x0, 0x0, 0x4840}, 0x0) ppoll(&(0x7f0000000100)=[{r0, 0x243}, {r4, 0x20}], 0x2, &(0x7f0000000140)={0x0, 0x989680}, &(0x7f00000002c0)={[0x9]}, 0x8) [ 1267.951261] loop3: p1 start 233194046 is beyond EOD, truncated [ 1268.001416] loop3: p2 start 3569653895 is beyond EOD, truncated [ 1268.049142] IPVS: ftp: loaded support on port[0] = 21 [ 1268.054917] loop3: p3 start 926682669 is beyond EOD, truncated [ 1268.075840] loop3: p4 start 1263303888 is beyond EOD, truncated [ 1268.128317] loop3: p5 start 1281279881 is beyond EOD, truncated [ 1268.169136] loop3: p6 start 3452787639 is beyond EOD, truncated [ 1268.204972] loop3: p7 start 2263908108 is beyond EOD, truncated [ 1268.251111] loop3: p8 start 1970859340 is beyond EOD, truncated [ 1268.297306] loop3: p9 start 1782333214 is beyond EOD, truncated [ 1268.332346] loop3: p10 start 1751982490 is beyond EOD, truncated 08:56:20 executing program 0: unshare(0x40000000) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000000)=0x3) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r3 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r3, 0x40047438, &(0x7f0000000180)=""/246) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r4, &(0x7f0000000040)=ANY=[], 0xfea7) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r4, 0x0) ioctl$PPPIOCSFLAGS1(r3, 0x4020744f, &(0x7f00000000c0)) [ 1268.363937] loop3: p11 start 3605249017 is beyond EOD, truncated [ 1268.394256] loop3: p12 start 2400178403 is beyond EOD, truncated 08:56:20 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_read_part_table(0x0, 0x2, &(0x7f0000002640)=[{0x0, 0x900, 0xfffffffffffffff7}, {&(0x7f0000001540)="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", 0x1e0}]) [ 1268.522520] IPVS: ftp: loaded support on port[0] = 21 [ 1268.615062] loop3: [POWERTEC] p1 p2 p3 p4 p5 p6 p7 p8 p9 p10 p11 p12 [ 1268.622263] loop3: p1 start 233194046 is beyond EOD, truncated [ 1268.669515] loop3: p2 start 3569653895 is beyond EOD, truncated [ 1268.695587] loop3: p3 start 926682669 is beyond EOD, truncated [ 1268.718448] loop3: p4 start 1263303888 is beyond EOD, truncated [ 1268.728714] IPVS: ftp: loaded support on port[0] = 21 [ 1268.741830] loop3: p5 start 1281279881 is beyond EOD, truncated [ 1268.761672] IPVS: ftp: loaded support on port[0] = 21 [ 1268.766184] loop3: p6 start 3452787639 is beyond EOD, truncated 08:56:20 executing program 5: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000000)=0x3) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r3 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(0xffffffffffffffff, 0x40047438, &(0x7f0000000180)=""/246) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r4, 0x0) ioctl$PPPIOCSFLAGS1(r3, 0x80047453, &(0x7f00000000c0)) [ 1268.834955] loop3: p7 start 2263908108 is beyond EOD, truncated [ 1268.871926] loop3: p8 start 1970859340 is beyond EOD, truncated [ 1268.909368] loop3: p9 start 1782333214 is beyond EOD, truncated 08:56:21 executing program 0: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000000)=0x3) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r3 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r3, 0x40047438, &(0x7f0000000180)=""/246) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r4, &(0x7f0000000040)=ANY=[], 0xfea7) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r4, 0x0) ioctl$PPPIOCSFLAGS1(r3, 0x4020744f, &(0x7f00000000c0)) 08:56:21 executing program 4: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000000)=0x3) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r1, 0x40047438, &(0x7f0000000180)=""/246) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r2, &(0x7f0000000040)=ANY=[], 0xfea7) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r2, 0x0) ioctl$PPPIOCSFLAGS1(r1, 0x40047459, &(0x7f00000000c0)) [ 1268.950536] IPVS: ftp: loaded support on port[0] = 21 [ 1268.955125] loop3: p10 start 1751982490 is beyond EOD, truncated [ 1268.989300] loop3: p11 start 3605249017 is beyond EOD, truncated [ 1269.034704] loop3: p12 start 2400178403 is beyond EOD, truncated [ 1269.113511] IPVS: ftp: loaded support on port[0] = 21 08:56:21 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_read_part_table(0x0, 0x2, &(0x7f0000002640)=[{0x0, 0xd00, 0xfffffffffffffff7}, {&(0x7f0000001540)="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", 0x1e0}]) [ 1269.357763] loop3: [POWERTEC] p1 p2 p3 p4 p5 p6 p7 p8 p9 p10 p11 p12 [ 1269.385637] loop3: p1 start 233194046 is beyond EOD, truncated [ 1269.421791] loop3: p2 start 3569653895 is beyond EOD, truncated [ 1269.461683] loop3: p3 start 926682669 is beyond EOD, truncated [ 1269.491917] loop3: p4 start 1263303888 is beyond EOD, truncated [ 1269.529762] loop3: p5 start 1281279881 is beyond EOD, truncated [ 1269.560006] loop3: p6 start 3452787639 is beyond EOD, truncated [ 1269.587844] loop3: p7 start 2263908108 is beyond EOD, truncated [ 1269.628411] loop3: p8 start 1970859340 is beyond EOD, truncated [ 1269.671260] loop3: p9 start 1782333214 is beyond EOD, truncated [ 1269.702917] loop3: p10 start 1751982490 is beyond EOD, truncated [ 1269.731987] loop3: p11 start 3605249017 is beyond EOD, truncated [ 1269.776779] loop3: p12 start 2400178403 is beyond EOD, truncated 08:56:22 executing program 0: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000000)=0x3) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r3 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r3, 0x40047438, &(0x7f0000000180)=""/246) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r4, &(0x7f0000000040)=ANY=[], 0xfea7) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r4, 0x0) ioctl$PPPIOCSFLAGS1(r3, 0x4020744f, &(0x7f00000000c0)) 08:56:22 executing program 1: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000000)=0x3) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r1, 0x40047438, &(0x7f0000000180)=""/246) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) getsockopt$bt_rfcomm_RFCOMM_CONNINFO(r2, 0x12, 0x2, &(0x7f00000002c0)=""/134, &(0x7f0000000100)=0x86) write$binfmt_script(r2, &(0x7f0000000040)=ANY=[], 0xfea7) r3 = socket$inet6(0xa, 0x2, 0x0) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$UI_SET_FFBIT(r4, 0x4004556b, 0x6f) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r2, 0x0) ioctl$PPPIOCSFLAGS1(r1, 0x40047457, &(0x7f00000000c0)) 08:56:22 executing program 2: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000000)=0x3) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r3 = socket(0x1000000010, 0x80002, 0x0) sendmmsg$alg(r3, &(0x7f0000000200), 0x10efe10675dec16, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000300)='nl80211\x00') sendmsg$NL80211_CMD_JOIN_MESH(r4, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000180)={0x3c, r5, 0x1, 0x0, 0x0, {}, [@NL80211_ATTR_BSS_BASIC_RATES={0x25, 0x24, "5eb943d1332a264ddfc632b1b9ee320e50e18f9e69c21de0c0623eef81daa25d48"}]}, 0x3c}}, 0x0) sendmsg$NL80211_CMD_JOIN_MESH(r3, &(0x7f0000000400)={&(0x7f0000000100), 0xc, &(0x7f0000000140)={&(0x7f00000002c0)={0x128, r5, 0x8, 0x70bd28, 0x25dfdbff, {}, [@NL80211_ATTR_SOCKET_OWNER={0x4}, @NL80211_ATTR_WIPHY={0x8, 0x1, 0xffffffffffffffff}, @NL80211_ATTR_MESH_CONFIG={0xc, 0x23, 0x0, 0x1, [@NL80211_MESHCONF_HWMP_PREQ_MIN_INTERVAL={0x6, 0xc, 0x2}]}, @NL80211_ATTR_BSS_BASIC_RATES={0xe9, 0x24, "88d35aab67a38db5632bfaf916041bbd11ce97738f1af24f5dc49d99e72a0ddf255cab60f9a18311048a839cbea20c365886d61da3f8db66155a9eb28bb7d554c6182999bad1276a0d28ad0986a35c3a3a51a379afe80bde91d03836a4e3c5228f693226f5b6dc54d7bd3d56730d6d5b6cff72064775537b69968fe4af34a3b72e3d0348eb3e5fc2fbb6072ebe8c2ebae9b6f1586a249a31b3a3497d4ec4b8f8e26cc5d988693964dffca507724f337b3767e9e08a98b1a96a27af1d51e5b8aeb490fcc1bdf2ebcf281f8e7cbf886057aa8e87d225fe2ad3c28e237996fe190f941e843a64"}, @NL80211_ATTR_WIPHY_FREQ={0x8, 0x26, 0x3}, @NL80211_ATTR_WIPHY={0x8, 0x1, 0x3}]}, 0x128}, 0x1, 0x0, 0x0, 0x20000084}, 0x48000) r6 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r6, 0x40047438, &(0x7f0000000180)=""/246) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r7, &(0x7f0000000040)=ANY=[], 0xfea7) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r7, 0x0) ioctl$PPPIOCSFLAGS1(r6, 0x40047457, &(0x7f00000000c0)) 08:56:22 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_read_part_table(0x0, 0x2, &(0x7f0000002640)=[{0x0, 0x1903, 0xfffffffffffffff7}, {&(0x7f0000001540)="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", 0x1e0}]) 08:56:22 executing program 5: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000000)=0x3) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r3 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r3, 0x40047438, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r4, 0x0) ioctl$PPPIOCSFLAGS1(r3, 0x80047453, &(0x7f00000000c0)) [ 1269.963991] IPVS: ftp: loaded support on port[0] = 21 [ 1269.997867] IPVS: ftp: loaded support on port[0] = 21 08:56:22 executing program 4: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000000)=0x3) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r1, 0x40047438, &(0x7f0000000180)=""/246) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r2, &(0x7f0000000040)=ANY=[], 0xfea7) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r2, 0x0) ioctl$PPPIOCSFLAGS1(r1, 0x40047459, &(0x7f00000000c0)) [ 1270.021566] IPVS: ftp: loaded support on port[0] = 21 [ 1270.044890] loop3: [POWERTEC] p1 p2 p3 p4 p5 p6 p7 p8 p9 p10 p11 p12 [ 1270.052073] loop3: p1 start 233194046 is beyond EOD, truncated [ 1270.116951] IPVS: ftp: loaded support on port[0] = 21 [ 1270.118798] loop3: p2 start 3569653895 is beyond EOD, truncated [ 1270.176191] loop3: p3 start 926682669 is beyond EOD, truncated [ 1270.233001] loop3: p4 start 1263303888 is beyond EOD, truncated [ 1270.276906] loop3: p5 start 1281279881 is beyond EOD, truncated [ 1270.311425] loop3: p6 start 3452787639 is beyond EOD, truncated [ 1270.345328] loop3: p7 start 2263908108 is beyond EOD, truncated [ 1270.380253] loop3: p8 start 1970859340 is beyond EOD, truncated [ 1270.416501] loop3: p9 start 1782333214 is beyond EOD, truncated [ 1270.453749] loop3: p10 start 1751982490 is beyond EOD, truncated [ 1270.490313] loop3: p11 start 3605249017 is beyond EOD, truncated [ 1270.520184] loop3: p12 start 2400178403 is beyond EOD, truncated 08:56:22 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_read_part_table(0x0, 0x2, &(0x7f0000002640)=[{0x0, 0x1f00, 0xfffffffffffffff7}, {&(0x7f0000001540)="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", 0x1e0}]) [ 1270.674067] IPVS: ftp: loaded support on port[0] = 21 [ 1270.734931] loop3: [POWERTEC] p1 p2 p3 p4 p5 p6 p7 p8 p9 p10 p11 p12 [ 1270.750472] IPVS: ftp: loaded support on port[0] = 21 [ 1270.752369] loop3: p1 start 233194046 is beyond EOD, truncated [ 1270.785911] loop3: p2 start 3569653895 is beyond EOD, truncated [ 1270.825622] loop3: p3 start 926682669 is beyond EOD, truncated [ 1270.878191] loop3: p4 start 1263303888 is beyond EOD, truncated [ 1270.923038] loop3: p5 start 1281279881 is beyond EOD, truncated 08:56:23 executing program 5: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000000)=0x3) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r3 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r3, 0x40047438, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r4, 0x0) ioctl$PPPIOCSFLAGS1(r3, 0x80047453, &(0x7f00000000c0)) 08:56:23 executing program 0: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000000)=0x3) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r3 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r3, 0x40047438, &(0x7f0000000180)=""/246) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r4, &(0x7f0000000040)=ANY=[], 0xfea7) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r4, 0x0) ioctl$PPPIOCSFLAGS1(r3, 0x4020744f, &(0x7f00000000c0)) [ 1270.968171] loop3: p6 start 3452787639 is beyond EOD, truncated 08:56:23 executing program 4: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000000)=0x3) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r1, 0x40047438, &(0x7f0000000180)=""/246) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r2, &(0x7f0000000040)=ANY=[], 0xfea7) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r2, 0x0) ioctl$PPPIOCSFLAGS1(r1, 0x40047459, &(0x7f00000000c0)) [ 1271.026100] loop3: p7 start 2263908108 is beyond EOD, truncated [ 1271.043565] IPVS: ftp: loaded support on port[0] = 21 [ 1271.061500] loop3: p8 start 1970859340 is beyond EOD, truncated [ 1271.099418] loop3: p9 start 1782333214 is beyond EOD, truncated [ 1271.116021] IPVS: ftp: loaded support on port[0] = 21 [ 1271.134852] loop3: p10 start 1751982490 is beyond EOD, truncated [ 1271.164021] loop3: p11 start 3605249017 is beyond EOD, truncated [ 1271.191451] loop3: p12 start 2400178403 is beyond EOD, truncated [ 1271.223918] loop3: [POWERTEC] p1 p2 p3 p4 p5 p6 p7 p8 p9 p10 p11 p12 [ 1271.238257] loop3: p1 start 233194046 is beyond EOD, truncated [ 1271.267807] loop3: p2 start 3569653895 is beyond EOD, truncated [ 1271.295561] loop3: p3 start 926682669 is beyond EOD, truncated [ 1271.328239] loop3: p4 start 1263303888 is beyond EOD, truncated [ 1271.359447] loop3: p5 start 1281279881 is beyond EOD, truncated [ 1271.389750] loop3: p6 start 3452787639 is beyond EOD, truncated [ 1271.417631] loop3: p7 start 2263908108 is beyond EOD, truncated [ 1271.446663] loop3: p8 start 1970859340 is beyond EOD, truncated [ 1271.478984] loop3: p9 start 1782333214 is beyond EOD, truncated [ 1271.508050] loop3: p10 start 1751982490 is beyond EOD, truncated [ 1271.535905] loop3: p11 start 3605249017 is beyond EOD, truncated [ 1271.567230] loop3: p12 start 2400178403 is beyond EOD, truncated 08:56:23 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_read_part_table(0x0, 0x2, &(0x7f0000002640)=[{0x0, 0x2000, 0xfffffffffffffff7}, {&(0x7f0000001540)="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", 0x1e0}]) 08:56:23 executing program 2: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x9) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000000)=0x3) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r3 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r3, 0x40047438, &(0x7f0000000180)=""/246) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r4, &(0x7f0000000040)=ANY=[], 0xfea7) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x10012, r4, 0x659ee000) ioctl$PPPIOCSFLAGS1(r3, 0x40047457, &(0x7f00000000c0)) [ 1271.785182] loop3: [POWERTEC] p1 p2 p3 p4 p5 p6 p7 p8 p9 p10 p11 p12 [ 1271.796902] loop3: p1 start 233194046 is beyond EOD, truncated 08:56:24 executing program 0: unshare(0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000000)=0x3) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r3 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r3, 0x40047438, &(0x7f0000000180)=""/246) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r4, &(0x7f0000000040)=ANY=[], 0xfea7) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r4, 0x0) ioctl$PPPIOCSFLAGS1(r3, 0x4020744f, &(0x7f00000000c0)) 08:56:24 executing program 5: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000000)=0x3) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r3 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r3, 0x40047438, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r4, 0x0) ioctl$PPPIOCSFLAGS1(r3, 0x80047453, &(0x7f00000000c0)) [ 1271.837777] loop3: p2 start 3569653895 is beyond EOD, truncated [ 1271.870004] loop3: p3 start 926682669 is beyond EOD, truncated [ 1271.912301] IPVS: ftp: loaded support on port[0] = 21 [ 1271.923428] loop3: p4 start 1263303888 is beyond EOD, truncated [ 1271.952098] loop3: p5 start 1281279881 is beyond EOD, truncated [ 1271.985626] loop3: p6 start 3452787639 is beyond EOD, truncated [ 1272.001243] IPVS: ftp: loaded support on port[0] = 21 [ 1272.036302] loop3: p7 start 2263908108 is beyond EOD, truncated [ 1272.073041] loop3: p8 start 1970859340 is beyond EOD, truncated [ 1272.134338] loop3: p9 start 1782333214 is beyond EOD, truncated [ 1272.177836] loop3: p10 start 1751982490 is beyond EOD, truncated [ 1272.228463] loop3: p11 start 3605249017 is beyond EOD, truncated [ 1272.263545] loop3: p12 start 2400178403 is beyond EOD, truncated [ 1272.548250] IPVS: ftp: loaded support on port[0] = 21 08:56:25 executing program 1: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x101400, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000000)=0x3) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000300)='/dev/sequencer2\x00', 0x3, 0x0) ioctl$KVM_SET_IDENTITY_MAP_ADDR(r1, 0x4008ae48, &(0x7f0000000340)) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r2 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000100)='/dev/dlm-monitor\x00', 0x280, 0x0) getsockopt$bt_l2cap_L2CAP_LM(r2, 0x6, 0x3, &(0x7f0000000140), &(0x7f00000002c0)=0x4) r3 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r3, 0x40047438, &(0x7f0000000180)=""/246) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r4, &(0x7f0000000040)=ANY=[], 0xfea7) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r4, 0x0) ioctl$PPPIOCSFLAGS1(r3, 0x40047457, &(0x7f00000000c0)) r5 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x1000, 0x0) write$binfmt_script(r5, &(0x7f00000003c0)={'#! ', './file0', [{}, {0x20, '&/\\{:*'}, {0x20, ']!'}, {0x20, 'cgroup.controllers\x00'}, {}], 0xa, "c3e09fdf1645e95b68e5e46c69af09ac12d6b17006238e89a07368351e681e70b4971774"}, 0x4f) 08:56:25 executing program 4: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000000)=0x3) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r2, 0x40047438, &(0x7f0000000180)=""/246) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r3, &(0x7f0000000040)=ANY=[], 0xfea7) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r3, 0x0) ioctl$PPPIOCSFLAGS1(r2, 0x40047459, &(0x7f00000000c0)) 08:56:25 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_read_part_table(0x0, 0x2, &(0x7f0000002640)=[{0x0, 0x2300, 0xfffffffffffffff7}, {&(0x7f0000001540)="c2ec123b097b69be3e42e60d3f03ff5b20b3406e8d7eebd2456f5388ad7135b73efb98088798c4d4506cd2295e60b5e9f9f2399833ad179a03e098e07644033f2d0e3c37a84095cdde0312f1d81191a92ccbe761424e7d3033a056d7d07c4c4bc2dbbb00079ae5158b76bed5cdd1d93054fff6874b43ef1289c75e4c9b911d69313cbc4e0abcab496b4ce2c83f238a2b30fc8210b75bcdcd0b774ac467962cc4389843f92f418b0718a87f17ae20f1790c7ff086746847e2217207cede6d2af2a58d7148128b2f86806b3be24ced787543219ae633ab66b7828c5bfd87571ee33ab89138401439491e3f3c6a4a56b4bf8a7d532ee9144977f6ac8fae105ab358e231f2cd9a216d68b0877161e158b14837fb1426f4a629f17ddd7bbf9019941ff9bbe3d6fd30d68dbd9e3b3cfb282bc08db959b660ed8f7ebc67714be3d00f8f1e2cbc9404069335265ce12996f7cb48c1f3221f7f892493e4711a6dbd79a0298e0e0b9936b06a3d08821f558f5738b05e2ead126157186dac58de8a7098291efacb6666b2dca73d422fbf6a09b30f3c30cc9e34faa453ef1d770f7008b7c54d644be9716b27aa40b67126130b61c29a254a578365216655e8a5c6955e72fb67e6f1796e499edcaa33e0b43bd172d9977deff713978907e12189743913c7c847", 0x1e0}]) 08:56:25 executing program 0: unshare(0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000000)=0x3) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r3 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r3, 0x40047438, &(0x7f0000000180)=""/246) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r4, &(0x7f0000000040)=ANY=[], 0xfea7) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r4, 0x0) ioctl$PPPIOCSFLAGS1(r3, 0x4020744f, &(0x7f00000000c0)) 08:56:25 executing program 5: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000000)=0x3) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r3 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r3, 0x40047438, &(0x7f0000000180)=""/246) r4 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r4, 0x0) ioctl$PPPIOCSFLAGS1(r3, 0x80047453, &(0x7f00000000c0)) 08:56:25 executing program 2: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000000)=0x3) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r3 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r3, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(0xffffffffffffffff, 0x84, 0x71, &(0x7f00000000c0)={r4}, &(0x7f0000000080)=0x18) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000040)={r4, 0xfffffffe}, &(0x7f0000000080)=0x8) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f00000002c0)={r4, @in6={{0xa, 0x4e23, 0x5, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x3ff}}, 0x9, 0x8a, 0xfffffc01, 0x0, 0x1, 0x80, 0x1f}, &(0x7f0000000380)=0x9c) setsockopt$inet_sctp6_SCTP_AUTH_KEY(r1, 0x84, 0x17, &(0x7f00000003c0)={r5, 0x5, 0x8c, "c5f28252e419dd6c5604fabe2ea2652ee159401b92a73577aa25c8378f526590126c6241312a68840a0b74713ef97c4aff74894de5b0c4baf82bea32158f0c8cd21a54d3dfc63d18bacf569e3de497e27f7c270ca815d46744824e75f5d7d4dd02722d369215d1ff22bff863df6b56417d3f8643aa11097b4e1b6cbf4443f94cab7e591b78c0bdd8bb067fb5"}, 0x94) r6 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r6, 0x40047438, &(0x7f0000000180)=""/246) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r7, &(0x7f0000000040)=ANY=[], 0xfea7) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r7, 0x0) ioctl$PPPIOCSFLAGS1(r6, 0x40047457, &(0x7f00000000c0)) [ 1273.795653] IPVS: ftp: loaded support on port[0] = 21 [ 1273.806994] IPVS: ftp: loaded support on port[0] = 21 [ 1273.816357] loop3: [POWERTEC] p1 p2 p3 p4 p5 p6 p7 p8 p9 p10 p11 p12 [ 1273.826331] loop3: p1 start 233194046 is beyond EOD, truncated [ 1273.830331] IPVS: ftp: loaded support on port[0] = 21 [ 1273.860730] IPVS: ftp: loaded support on port[0] = 21 [ 1273.876229] loop3: p2 start 3569653895 is beyond EOD, truncated [ 1273.966851] loop3: p3 start 926682669 is beyond EOD, truncated [ 1274.029564] loop3: p4 start 1263303888 is beyond EOD, truncated [ 1274.101168] loop3: p5 start 1281279881 is beyond EOD, truncated [ 1274.144472] loop3: p6 start 3452787639 is beyond EOD, truncated [ 1274.198225] loop3: p7 start 2263908108 is beyond EOD, truncated [ 1274.243821] loop3: p8 start 1970859340 is beyond EOD, truncated [ 1274.277379] loop3: p9 start 1782333214 is beyond EOD, truncated [ 1274.306381] loop3: p10 start 1751982490 is beyond EOD, truncated [ 1274.333211] loop3: p11 start 3605249017 is beyond EOD, truncated [ 1274.358125] loop3: p12 start 2400178403 is beyond EOD, truncated [ 1274.431632] IPVS: ftp: loaded support on port[0] = 21 08:56:26 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_read_part_table(0x0, 0x2, &(0x7f0000002640)=[{0x0, 0x3f00, 0xfffffffffffffff7}, {&(0x7f0000001540)="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", 0x1e0}]) 08:56:26 executing program 0: unshare(0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000000)=0x3) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r3 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r3, 0x40047438, &(0x7f0000000180)=""/246) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r4, &(0x7f0000000040)=ANY=[], 0xfea7) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r4, 0x0) ioctl$PPPIOCSFLAGS1(r3, 0x4020744f, &(0x7f00000000c0)) [ 1274.608791] IPVS: ftp: loaded support on port[0] = 21 [ 1274.655044] loop3: [POWERTEC] p1 p2 p3 p4 p5 p6 p7 p8 p9 p10 p11 p12 [ 1274.670396] loop3: p1 start 233194046 is beyond EOD, truncated [ 1274.694658] loop3: p2 start 3569653895 is beyond EOD, truncated 08:56:26 executing program 5: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000000)=0x3) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r3 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r3, 0x40047438, &(0x7f0000000180)=""/246) r4 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r4, 0x0) ioctl$PPPIOCSFLAGS1(r3, 0x80047453, &(0x7f00000000c0)) [ 1274.730371] loop3: p3 start 926682669 is beyond EOD, truncated [ 1274.766238] loop3: p4 start 1263303888 is beyond EOD, truncated 08:56:26 executing program 4: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000000)=0x3) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r2, 0x40047438, &(0x7f0000000180)=""/246) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r3, &(0x7f0000000040)=ANY=[], 0xfea7) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r3, 0x0) ioctl$PPPIOCSFLAGS1(r2, 0x40047459, &(0x7f00000000c0)) [ 1274.808801] loop3: p5 start 1281279881 is beyond EOD, truncated [ 1274.832830] loop3: p6 start 3452787639 is beyond EOD, truncated [ 1274.851483] loop3: p7 start 2263908108 is beyond EOD, truncated [ 1274.886895] IPVS: ftp: loaded support on port[0] = 21 [ 1274.893371] loop3: p8 start 1970859340 is beyond EOD, truncated [ 1274.927450] loop3: p9 start 1782333214 is beyond EOD, truncated [ 1274.937227] IPVS: ftp: loaded support on port[0] = 21 [ 1274.970877] loop3: p10 start 1751982490 is beyond EOD, truncated [ 1275.006678] loop3: p11 start 3605249017 is beyond EOD, truncated [ 1275.035507] loop3: p12 start 2400178403 is beyond EOD, truncated 08:56:27 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_read_part_table(0x0, 0x2, &(0x7f0000002640)=[{0x0, 0x3ff7, 0xfffffffffffffff7}, {&(0x7f0000001540)="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", 0x1e0}]) [ 1275.365528] loop3: [POWERTEC] p1 p2 p3 p4 p5 p6 p7 p8 p9 p10 p11 p12 [ 1275.380016] loop3: p1 start 233194046 is beyond EOD, truncated [ 1275.410340] loop3: p2 start 3569653895 is beyond EOD, truncated [ 1275.438411] loop3: p3 start 926682669 is beyond EOD, truncated [ 1275.459701] loop3: p4 start 1263303888 is beyond EOD, truncated 08:56:27 executing program 1: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000000)=0x3) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r1 = socket(0x1000000010, 0x80002, 0x0) sendmmsg$alg(r1, &(0x7f0000000200), 0x10efe10675dec16, 0x0) getsockopt$XDP_STATISTICS(r1, 0x11b, 0x7, &(0x7f0000000100), &(0x7f0000000140)=0x18) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r2, 0x40047438, &(0x7f0000000180)=""/246) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r3, &(0x7f0000000040)=ANY=[], 0xfea7) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r3, 0x0) ioctl$PPPIOCSFLAGS1(r2, 0x40047457, &(0x7f00000000c0)) [ 1275.484948] loop3: p5 start 1281279881 is beyond EOD, truncated [ 1275.510844] loop3: p6 start 3452787639 is beyond EOD, truncated [ 1275.532645] loop3: p7 start 2263908108 is beyond EOD, truncated [ 1275.546024] loop3: p8 start 1970859340 is beyond EOD, truncated [ 1275.563699] loop3: p9 start 1782333214 is beyond EOD, truncated [ 1275.577863] loop3: p10 start 1751982490 is beyond EOD, truncated [ 1275.591007] loop3: p11 start 3605249017 is beyond EOD, truncated [ 1275.601588] IPVS: ftp: loaded support on port[0] = 21 08:56:27 executing program 2: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000000)=0x3) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r3 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r3, 0x40047438, &(0x7f0000000180)=""/246) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r4, 0x0) r5 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x0, 0x0) ioctl$PPPIOCSFLAGS1(r5, 0x40047457, &(0x7f00000000c0)) r6 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r6, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000000)={0x3c, 0x0, 0x1, 0x409, 0x0, 0x0, {}, [@CTA_TUPLE_ORIG={0x24, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @broadcast}, {0x8, 0x2, @dev}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_SEQ_ADJ_REPLY={0x4}]}, 0x3c}}, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(r6, 0x8934, &(0x7f0000000140)={'veth0_to_hsr\x00', 0x2}) [ 1275.643198] loop3: p12 start 2400178403 is beyond EOD, truncated [ 1275.728304] IPVS: ftp: loaded support on port[0] = 21 08:56:27 executing program 5: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000000)=0x3) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r3 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r3, 0x40047438, &(0x7f0000000180)=""/246) r4 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r4, 0x0) ioctl$PPPIOCSFLAGS1(r3, 0x80047453, &(0x7f00000000c0)) 08:56:28 executing program 4: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000000)=0x3) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r2, 0x40047438, &(0x7f0000000180)=""/246) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r3, &(0x7f0000000040)=ANY=[], 0xfea7) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r3, 0x0) ioctl$PPPIOCSFLAGS1(r2, 0x40047459, &(0x7f00000000c0)) 08:56:28 executing program 0: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000000)=0x3) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r3 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r3, 0x40047438, &(0x7f0000000180)=""/246) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r4, &(0x7f0000000040)=ANY=[], 0xfea7) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r4, 0x0) ioctl$PPPIOCSFLAGS1(r3, 0x4020744f, &(0x7f00000000c0)) [ 1275.930928] IPVS: ftp: loaded support on port[0] = 21 [ 1275.931339] IPVS: ftp: loaded support on port[0] = 21 [ 1275.958421] IPVS: ftp: loaded support on port[0] = 21 08:56:28 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_read_part_table(0x0, 0x2, &(0x7f0000002640)=[{0x0, 0x3fff, 0xfffffffffffffff7}, {&(0x7f0000001540)="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", 0x1e0}]) [ 1276.295682] loop3: [POWERTEC] p1 p2 p3 p4 p5 p6 p7 p8 p9 p10 p11 p12 [ 1276.307253] loop3: p1 start 233194046 is beyond EOD, truncated [ 1276.321994] loop3: p2 start 3569653895 is beyond EOD, truncated [ 1276.353726] loop3: p3 start 926682669 is beyond EOD, truncated [ 1276.373151] IPVS: ftp: loaded support on port[0] = 21 [ 1276.387950] loop3: p4 start 1263303888 is beyond EOD, truncated [ 1276.408897] loop3: p5 start 1281279881 is beyond EOD, truncated [ 1276.435544] loop3: p6 start 3452787639 is beyond EOD, truncated [ 1276.449904] loop3: p7 start 2263908108 is beyond EOD, truncated [ 1276.463126] loop3: p8 start 1970859340 is beyond EOD, truncated [ 1276.476367] loop3: p9 start 1782333214 is beyond EOD, truncated [ 1276.486777] IPVS: ftp: loaded support on port[0] = 21 [ 1276.491850] loop3: p10 start 1751982490 is beyond EOD, truncated [ 1276.506608] loop3: p11 start 3605249017 is beyond EOD, truncated [ 1276.519902] loop3: p12 start 2400178403 is beyond EOD, truncated 08:56:28 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_read_part_table(0x0, 0x2, &(0x7f0000002640)=[{0x0, 0x4000, 0xfffffffffffffff7}, {&(0x7f0000001540)="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", 0x1e0}]) [ 1276.885117] loop3: [POWERTEC] p1 p2 p3 p4 p5 p6 p7 p8 p9 p10 p11 p12 [ 1276.898280] loop3: p1 start 233194046 is beyond EOD, truncated [ 1276.904952] loop3: p2 start 3569653895 is beyond EOD, truncated [ 1276.911327] loop3: p3 start 926682669 is beyond EOD, truncated [ 1276.921293] loop3: p4 start 1263303888 is beyond EOD, truncated [ 1276.929908] loop3: p5 start 1281279881 is beyond EOD, truncated [ 1276.937299] loop3: p6 start 3452787639 is beyond EOD, truncated [ 1276.944002] loop3: p7 start 2263908108 is beyond EOD, truncated [ 1276.950817] loop3: p8 start 1970859340 is beyond EOD, truncated [ 1276.957567] loop3: p9 start 1782333214 is beyond EOD, truncated [ 1276.964396] loop3: p10 start 1751982490 is beyond EOD, truncated [ 1276.971058] loop3: p11 start 3605249017 is beyond EOD, truncated [ 1276.978015] loop3: p12 start 2400178403 is beyond EOD, truncated 08:56:29 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_read_part_table(0x0, 0x2, &(0x7f0000002640)=[{0x0, 0x4800, 0xfffffffffffffff7}, {&(0x7f0000001540)="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", 0x1e0}]) [ 1277.158806] loop3: [POWERTEC] p1 p2 p3 p4 p5 p6 p7 p8 p9 p10 p11 p12 [ 1277.173932] loop3: p1 start 233194046 is beyond EOD, truncated [ 1277.182956] loop3: p2 start 3569653895 is beyond EOD, truncated [ 1277.196578] loop3: p3 start 926682669 is beyond EOD, truncated [ 1277.202918] loop3: p4 start 1263303888 is beyond EOD, truncated [ 1277.216698] loop3: p5 start 1281279881 is beyond EOD, truncated [ 1277.223036] loop3: p6 start 3452787639 is beyond EOD, truncated [ 1277.239154] loop3: p7 start 2263908108 is beyond EOD, truncated [ 1277.250118] loop3: p8 start 1970859340 is beyond EOD, truncated [ 1277.259258] loop3: p9 start 1782333214 is beyond EOD, truncated [ 1277.266448] loop3: p10 start 1751982490 is beyond EOD, truncated [ 1277.273063] loop3: p11 start 3605249017 is beyond EOD, truncated [ 1277.279883] loop3: p12 start 2400178403 is beyond EOD, truncated 08:56:29 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_read_part_table(0x0, 0x2, &(0x7f0000002640)=[{0x0, 0x4c00, 0xfffffffffffffff7}, {&(0x7f0000001540)="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", 0x1e0}]) [ 1277.441223] loop3: [POWERTEC] p1 p2 p3 p4 p5 p6 p7 p8 p9 p10 p11 p12 [ 1277.451236] loop3: p1 start 233194046 is beyond EOD, truncated [ 1277.464965] loop3: p2 start 3569653895 is beyond EOD, truncated [ 1277.471247] loop3: p3 start 926682669 is beyond EOD, truncated [ 1277.477965] loop3: p4 start 1263303888 is beyond EOD, truncated [ 1277.484560] loop3: p5 start 1281279881 is beyond EOD, truncated [ 1277.491118] loop3: p6 start 3452787639 is beyond EOD, truncated [ 1277.504535] loop3: p7 start 2263908108 is beyond EOD, truncated [ 1277.511370] loop3: p8 start 1970859340 is beyond EOD, truncated [ 1277.518354] loop3: p9 start 1782333214 is beyond EOD, truncated [ 1277.527446] loop3: p10 start 1751982490 is beyond EOD, truncated [ 1277.535738] loop3: p11 start 3605249017 is beyond EOD, truncated [ 1277.542790] loop3: p12 start 2400178403 is beyond EOD, truncated 08:56:29 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_read_part_table(0x0, 0x2, &(0x7f0000002640)=[{0x0, 0x5500, 0xfffffffffffffff7}, {&(0x7f0000001540)="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", 0x1e0}]) [ 1277.786011] loop3: [POWERTEC] p1 p2 p3 p4 p5 p6 p7 p8 p9 p10 p11 p12 [ 1277.807699] loop3: p1 start 233194046 is beyond EOD, truncated [ 1277.834081] loop3: p2 start 3569653895 is beyond EOD, truncated [ 1277.863959] loop3: p3 start 926682669 is beyond EOD, truncated [ 1277.900849] loop3: p4 start 1263303888 is beyond EOD, truncated [ 1277.938017] loop3: p5 start 1281279881 is beyond EOD, truncated [ 1277.965450] loop3: p6 start 3452787639 is beyond EOD, truncated [ 1277.991684] loop3: p7 start 2263908108 is beyond EOD, truncated [ 1278.025668] loop3: p8 start 1970859340 is beyond EOD, truncated [ 1278.063819] loop3: p9 start 1782333214 is beyond EOD, truncated [ 1278.099296] loop3: p10 start 1751982490 is beyond EOD, truncated [ 1278.136951] loop3: p11 start 3605249017 is beyond EOD, truncated [ 1278.168191] loop3: p12 start 2400178403 is beyond EOD, truncated 08:56:30 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_read_part_table(0x0, 0x2, &(0x7f0000002640)=[{0x0, 0x6000, 0xfffffffffffffff7}, {&(0x7f0000001540)="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", 0x1e0}]) [ 1278.445998] loop3: [POWERTEC] p1 p2 p3 p4 p5 p6 p7 p8 p9 p10 p11 p12 [ 1278.470399] loop3: p1 start 233194046 is beyond EOD, truncated [ 1278.499171] loop3: p2 start 3569653895 is beyond EOD, truncated [ 1278.529241] loop3: p3 start 926682669 is beyond EOD, truncated [ 1278.560020] loop3: p4 start 1263303888 is beyond EOD, truncated [ 1278.595814] loop3: p5 start 1281279881 is beyond EOD, truncated [ 1278.630899] loop3: p6 start 3452787639 is beyond EOD, truncated [ 1278.667463] loop3: p7 start 2263908108 is beyond EOD, truncated [ 1278.703494] loop3: p8 start 1970859340 is beyond EOD, truncated [ 1278.737262] loop3: p9 start 1782333214 is beyond EOD, truncated [ 1278.769315] loop3: p10 start 1751982490 is beyond EOD, truncated [ 1278.804287] loop3: p11 start 3605249017 is beyond EOD, truncated [ 1278.839797] loop3: p12 start 2400178403 is beyond EOD, truncated 08:56:31 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_read_part_table(0x0, 0x2, &(0x7f0000002640)=[{0x0, 0x6800, 0xfffffffffffffff7}, {&(0x7f0000001540)="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", 0x1e0}]) [ 1279.144826] loop3: [POWERTEC] p1 p2 p3 p4 p5 p6 p7 p8 p9 p10 p11 p12 [ 1279.164661] loop3: p1 start 233194046 is beyond EOD, truncated [ 1279.170702] loop3: p2 start 3569653895 is beyond EOD, truncated [ 1279.229927] loop3: p3 start 926682669 is beyond EOD, truncated [ 1279.264315] loop3: p4 start 1263303888 is beyond EOD, truncated [ 1279.270405] loop3: p5 start 1281279881 is beyond EOD, truncated [ 1279.314541] loop3: p6 start 3452787639 is beyond EOD, truncated [ 1279.320640] loop3: p7 start 2263908108 is beyond EOD, truncated [ 1279.394405] loop3: p8 start 1970859340 is beyond EOD, truncated [ 1279.400532] loop3: p9 start 1782333214 is beyond EOD, truncated [ 1279.454242] loop3: p10 start 1751982490 is beyond EOD, truncated [ 1279.460425] loop3: p11 start 3605249017 is beyond EOD, truncated [ 1279.524351] loop3: p12 start 2400178403 is beyond EOD, truncated 08:56:34 executing program 1: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000000)=0x3) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r1, 0x40047438, &(0x7f0000000180)=""/246) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) ioctl$TIOCMSET(r2, 0x5418, &(0x7f0000000100)=0x1) write$binfmt_script(r2, &(0x7f0000000040)=ANY=[], 0xfea7) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r2, 0x0) ioctl$PPPIOCSFLAGS1(r1, 0x40047457, &(0x7f00000000c0)) 08:56:34 executing program 2: unshare(0x40000000) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000000)={0x3c, 0x0, 0x1, 0x409, 0x0, 0x0, {}, [@CTA_TUPLE_ORIG={0x24, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @broadcast}, {0x8, 0x2, @dev}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_SEQ_ADJ_REPLY={0x4}]}, 0x3c}}, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, r0, 0x68e01000) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r3, 0x5423, &(0x7f0000000000)=0x3) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r4 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r4, 0x40047438, &(0x7f0000000180)=""/246) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r5, &(0x7f0000000040)=ANY=[], 0xfea7) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r5, 0x0) ioctl$PPPIOCSFLAGS1(r4, 0x40047457, &(0x7f00000000c0)) 08:56:34 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_read_part_table(0x0, 0x2, &(0x7f0000002640)=[{0x0, 0x6c00, 0xfffffffffffffff7}, {&(0x7f0000001540)="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", 0x1e0}]) 08:56:34 executing program 0: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000000)=0x3) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r3 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r3, 0x40047438, &(0x7f0000000180)=""/246) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r4, &(0x7f0000000040)=ANY=[], 0xfea7) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r4, 0x0) ioctl$PPPIOCSFLAGS1(r3, 0x4020744f, &(0x7f00000000c0)) 08:56:34 executing program 4: unshare(0x40000000) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000000)=0x3) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r3 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r3, 0x40047438, &(0x7f0000000180)=""/246) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r4, &(0x7f0000000040)=ANY=[], 0xfea7) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r4, 0x0) ioctl$PPPIOCSFLAGS1(r3, 0x40047459, &(0x7f00000000c0)) 08:56:34 executing program 5: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000000)=0x3) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r3 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r3, 0x40047438, &(0x7f0000000180)=""/246) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x10012, r4, 0x0) ioctl$PPPIOCSFLAGS1(r3, 0x80047453, &(0x7f00000000c0)) [ 1282.698981] IPVS: ftp: loaded support on port[0] = 21 [ 1282.705394] IPVS: ftp: loaded support on port[0] = 21 [ 1282.708753] IPVS: ftp: loaded support on port[0] = 21 [ 1282.719266] IPVS: ftp: loaded support on port[0] = 21 [ 1282.724983] loop3: [POWERTEC] p1 p2 p3 p4 p5 p6 p7 p8 p9 p10 p11 p12 [ 1282.732810] loop3: p1 start 233194046 is beyond EOD, truncated [ 1282.751900] IPVS: ftp: loaded support on port[0] = 21 [ 1282.785590] loop3: p2 start 3569653895 is beyond EOD, truncated [ 1282.835710] loop3: p3 start 926682669 is beyond EOD, truncated [ 1282.861973] loop3: p4 start 1263303888 is beyond EOD, truncated [ 1282.889926] loop3: p5 start 1281279881 is beyond EOD, truncated [ 1282.921433] loop3: p6 start 3452787639 is beyond EOD, truncated [ 1282.965690] loop3: p7 start 2263908108 is beyond EOD, truncated [ 1282.997731] loop3: p8 start 1970859340 is beyond EOD, truncated [ 1283.025518] loop3: p9 start 1782333214 is beyond EOD, truncated [ 1283.050852] loop3: p10 start 1751982490 is beyond EOD, truncated [ 1283.089563] loop3: p11 start 3605249017 is beyond EOD, truncated [ 1283.119179] loop3: p12 start 2400178403 is beyond EOD, truncated 08:56:35 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_read_part_table(0x0, 0x2, &(0x7f0000002640)=[{0x0, 0x7400, 0xfffffffffffffff7}, {&(0x7f0000001540)="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", 0x1e0}]) 08:56:35 executing program 4: unshare(0x40000000) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000000)=0x3) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r3 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r3, 0x40047438, &(0x7f0000000180)=""/246) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r4, &(0x7f0000000040)=ANY=[], 0xfea7) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r4, 0x0) ioctl$PPPIOCSFLAGS1(r3, 0x40047459, &(0x7f00000000c0)) 08:56:35 executing program 0: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000000)=0x3) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r3 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r3, 0x40047438, &(0x7f0000000180)=""/246) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r4, &(0x7f0000000040)=ANY=[], 0xfea7) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r4, 0x0) ioctl$PPPIOCSFLAGS1(r3, 0x4020744f, &(0x7f00000000c0)) [ 1283.332925] IPVS: ftp: loaded support on port[0] = 21 [ 1283.338412] loop3: [POWERTEC] p1 p2 p3 p4 p5 p6 p7 p8 p9 p10 p11 p12 [ 1283.356976] loop3: p1 start 233194046 is beyond EOD, truncated [ 1283.375403] IPVS: ftp: loaded support on port[0] = 21 [ 1283.378591] IPVS: ftp: loaded support on port[0] = 21 [ 1283.397230] loop3: p2 start 3569653895 is beyond EOD, truncated [ 1283.397655] IPVS: ftp: loaded support on port[0] = 21 [ 1283.441851] loop3: p3 start 926682669 is beyond EOD, truncated [ 1283.474347] loop3: p4 start 1263303888 is beyond EOD, truncated [ 1283.522421] loop3: p5 start 1281279881 is beyond EOD, truncated [ 1283.543317] loop3: p6 start 3452787639 is beyond EOD, truncated [ 1283.559914] loop3: p7 start 2263908108 is beyond EOD, truncated [ 1283.577244] loop3: p8 start 1970859340 is beyond EOD, truncated [ 1283.620704] loop3: p9 start 1782333214 is beyond EOD, truncated 08:56:35 executing program 5: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000000)=0x3) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r3 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r3, 0x40047438, &(0x7f0000000180)=""/246) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x10, r4, 0x0) ioctl$PPPIOCSFLAGS1(r3, 0x80047453, &(0x7f00000000c0)) [ 1283.667338] loop3: p10 start 1751982490 is beyond EOD, truncated [ 1283.707859] loop3: p11 start 3605249017 is beyond EOD, truncated [ 1283.738074] IPVS: ftp: loaded support on port[0] = 21 [ 1283.747258] loop3: p12 start 2400178403 is beyond EOD, truncated 08:56:35 executing program 4: unshare(0x40000000) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000000)=0x3) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r3 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r3, 0x40047438, &(0x7f0000000180)=""/246) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r4, &(0x7f0000000040)=ANY=[], 0xfea7) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r4, 0x0) ioctl$PPPIOCSFLAGS1(r3, 0x40047459, &(0x7f00000000c0)) 08:56:36 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_read_part_table(0x0, 0x2, &(0x7f0000002640)=[{0x0, 0x7a00, 0xfffffffffffffff7}, {&(0x7f0000001540)="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", 0x1e0}]) [ 1283.970765] IPVS: ftp: loaded support on port[0] = 21 [ 1284.055251] loop3: [POWERTEC] p1 p2 p3 p4 p5 p6 p7 p8 p9 p10 p11 p12 [ 1284.071476] loop3: p1 start 233194046 is beyond EOD, truncated [ 1284.102017] loop3: p2 start 3569653895 is beyond EOD, truncated [ 1284.134158] loop3: p3 start 926682669 is beyond EOD, truncated [ 1284.160396] loop3: p4 start 1263303888 is beyond EOD, truncated [ 1284.189775] loop3: p5 start 1281279881 is beyond EOD, truncated [ 1284.221422] loop3: p6 start 3452787639 is beyond EOD, truncated [ 1284.254661] loop3: p7 start 2263908108 is beyond EOD, truncated [ 1284.284733] loop3: p8 start 1970859340 is beyond EOD, truncated [ 1284.313489] loop3: p9 start 1782333214 is beyond EOD, truncated [ 1284.341553] loop3: p10 start 1751982490 is beyond EOD, truncated [ 1284.356439] loop3: p11 start 3605249017 is beyond EOD, truncated [ 1284.363281] loop3: p12 start 2400178403 is beyond EOD, truncated 08:56:37 executing program 4: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000000)=0x3) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r3 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r3, 0x40047438, &(0x7f0000000180)=""/246) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r4, &(0x7f0000000040)=ANY=[], 0xfea7) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r4, 0x0) ioctl$PPPIOCSFLAGS1(r3, 0x40047459, &(0x7f00000000c0)) 08:56:37 executing program 0: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x10, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000000)=0x3) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r3 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r3, 0x40047438, &(0x7f0000000180)=""/246) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r4, &(0x7f0000000040)=ANY=[], 0xfea7) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r4, 0x0) ioctl$PPPIOCSFLAGS1(r3, 0x4020744f, &(0x7f00000000c0)) 08:56:37 executing program 2: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socket$kcm(0x29, 0x7, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000000)={0x3c, 0x0, 0x1, 0x409, 0x0, 0x0, {}, [@CTA_TUPLE_ORIG={0x24, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @broadcast}, {0x8, 0x2, @dev}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_SEQ_ADJ_REPLY={0x4}]}, 0x3c}}, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000000)={0x3c, 0x0, 0x1, 0x409, 0x0, 0x0, {}, [@CTA_TUPLE_ORIG={0x24, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @broadcast}, {0x8, 0x2, @dev}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_SEQ_ADJ_REPLY={0x4}]}, 0x3c}}, 0x0) ioctl$FICLONERANGE(r1, 0x4020940d, &(0x7f0000000100)={{}, 0x1f, 0x1, 0x3}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r4, 0x5423, &(0x7f0000000000)=0x3) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r5 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r5, 0x40047438, &(0x7f0000000180)=""/246) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r6, &(0x7f0000000040)=ANY=[], 0xfea7) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r6, 0x0) ioctl$PPPIOCSFLAGS1(r5, 0x40047457, &(0x7f00000000c0)) 08:56:37 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_read_part_table(0x0, 0x2, &(0x7f0000002640)=[{0x0, 0xf73f, 0xfffffffffffffff7}, {&(0x7f0000001540)="c2ec123b097b69be3e42e60d3f03ff5b20b3406e8d7eebd2456f5388ad7135b73efb98088798c4d4506cd2295e60b5e9f9f2399833ad179a03e098e07644033f2d0e3c37a84095cdde0312f1d81191a92ccbe761424e7d3033a056d7d07c4c4bc2dbbb00079ae5158b76bed5cdd1d93054fff6874b43ef1289c75e4c9b911d69313cbc4e0abcab496b4ce2c83f238a2b30fc8210b75bcdcd0b774ac467962cc4389843f92f418b0718a87f17ae20f1790c7ff086746847e2217207cede6d2af2a58d7148128b2f86806b3be24ced787543219ae633ab66b7828c5bfd87571ee33ab89138401439491e3f3c6a4a56b4bf8a7d532ee9144977f6ac8fae105ab358e231f2cd9a216d68b0877161e158b14837fb1426f4a629f17ddd7bbf9019941ff9bbe3d6fd30d68dbd9e3b3cfb282bc08db959b660ed8f7ebc67714be3d00f8f1e2cbc9404069335265ce12996f7cb48c1f3221f7f892493e4711a6dbd79a0298e0e0b9936b06a3d08821f558f5738b05e2ead126157186dac58de8a7098291efacb6666b2dca73d422fbf6a09b30f3c30cc9e34faa453ef1d770f7008b7c54d644be9716b27aa40b67126130b61c29a254a578365216655e8a5c6955e72fb67e6f1796e499edcaa33e0b43bd172d9977deff713978907e12189743913c7c847", 0x1e0}]) 08:56:37 executing program 5: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000000)=0x3) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r3 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r3, 0x40047438, &(0x7f0000000180)=""/246) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x10, r4, 0x0) ioctl$PPPIOCSFLAGS1(r3, 0x80047453, &(0x7f00000000c0)) 08:56:37 executing program 1: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) socketpair(0xa, 0x800, 0x6dd, &(0x7f0000000300)) r1 = dup(r0) lsetxattr$trusted_overlay_nlink(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='trusted.overlay.nlink\x00', &(0x7f00000002c0)={'U+', 0x1}, 0x16, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$TIOCSETD(r3, 0x5423, &(0x7f0000000000)=0x13) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r4 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r4, 0x40047438, &(0x7f0000000180)=""/246) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r5, &(0x7f0000000040)=ANY=[], 0xfea7) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r5, 0x0) ioctl$PPPIOCSFLAGS1(r4, 0x40047457, &(0x7f00000000c0)) [ 1285.649847] IPVS: ftp: loaded support on port[0] = 21 [ 1285.658480] IPVS: ftp: loaded support on port[0] = 21 [ 1285.669655] IPVS: ftp: loaded support on port[0] = 21 [ 1285.684966] loop3: [POWERTEC] p1 p2 p3 p4 p5 p6 p7 p8 p9 p10 p11 p12 [ 1285.708054] loop3: p1 start 233194046 is beyond EOD, truncated [ 1285.711864] IPVS: ftp: loaded support on port[0] = 21 [ 1285.756247] loop3: p2 start 3569653895 is beyond EOD, truncated [ 1285.793513] loop3: p3 start 926682669 is beyond EOD, truncated [ 1285.828907] loop3: p4 start 1263303888 is beyond EOD, truncated [ 1285.880082] loop3: p5 start 1281279881 is beyond EOD, truncated [ 1285.911672] loop3: p6 start 3452787639 is beyond EOD, truncated [ 1285.952369] loop3: p7 start 2263908108 is beyond EOD, truncated [ 1285.991505] loop3: p8 start 1970859340 is beyond EOD, truncated [ 1286.028624] loop3: p9 start 1782333214 is beyond EOD, truncated [ 1286.065525] loop3: p10 start 1751982490 is beyond EOD, truncated 08:56:38 executing program 0: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x10, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000000)=0x3) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r3 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r3, 0x40047438, &(0x7f0000000180)=""/246) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r4, &(0x7f0000000040)=ANY=[], 0xfea7) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r4, 0x0) ioctl$PPPIOCSFLAGS1(r3, 0x4020744f, &(0x7f00000000c0)) [ 1286.112514] loop3: p11 start 3605249017 is beyond EOD, truncated [ 1286.151939] loop3: p12 start 2400178403 is beyond EOD, truncated 08:56:38 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_read_part_table(0x0, 0x2, &(0x7f0000002640)=[{0x0, 0xff0f, 0xfffffffffffffff7}, {&(0x7f0000001540)="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", 0x1e0}]) [ 1286.348531] IPVS: ftp: loaded support on port[0] = 21 [ 1286.361295] IPVS: ftp: loaded support on port[0] = 21 [ 1286.361360] IPVS: ftp: loaded support on port[0] = 21 [ 1286.447982] loop3: [POWERTEC] p1 p2 p3 p4 p5 p6 p7 p8 p9 p10 p11 p12 [ 1286.465242] loop3: p1 start 233194046 is beyond EOD, truncated [ 1286.492632] loop3: p2 start 3569653895 is beyond EOD, truncated [ 1286.513778] loop3: p3 start 926682669 is beyond EOD, truncated [ 1286.540310] loop3: p4 start 1263303888 is beyond EOD, truncated [ 1286.561424] loop3: p5 start 1281279881 is beyond EOD, truncated [ 1286.583616] loop3: p6 start 3452787639 is beyond EOD, truncated [ 1286.606638] loop3: p7 start 2263908108 is beyond EOD, truncated [ 1286.626506] loop3: p8 start 1970859340 is beyond EOD, truncated [ 1286.645525] loop3: p9 start 1782333214 is beyond EOD, truncated [ 1286.664278] loop3: p10 start 1751982490 is beyond EOD, truncated [ 1286.686637] loop3: p11 start 3605249017 is beyond EOD, truncated [ 1286.700635] loop3: p12 start 2400178403 is beyond EOD, truncated 08:56:39 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_read_part_table(0x0, 0x2, &(0x7f0000002640)=[{0x0, 0xff3f, 0xfffffffffffffff7}, {&(0x7f0000001540)="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", 0x1e0}]) 08:56:39 executing program 4: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000000)=0x3) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r3 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r3, 0x40047438, &(0x7f0000000180)=""/246) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r4, &(0x7f0000000040)=ANY=[], 0xfea7) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r4, 0x0) ioctl$PPPIOCSFLAGS1(r3, 0x40047459, &(0x7f00000000c0)) [ 1286.965574] loop3: [POWERTEC] p1 p2 p3 p4 p5 p6 p7 p8 p9 p10 p11 p12 [ 1286.982954] loop3: p1 start 233194046 is beyond EOD, truncated 08:56:39 executing program 5: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000000)=0x3) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r3 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r3, 0x40047438, &(0x7f0000000180)=""/246) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x10, r4, 0x0) ioctl$PPPIOCSFLAGS1(r3, 0x80047453, &(0x7f00000000c0)) [ 1287.023200] loop3: p2 start 3569653895 is beyond EOD, truncated [ 1287.045835] loop3: p3 start 926682669 is beyond EOD, truncated [ 1287.060184] loop3: p4 start 1263303888 is beyond EOD, truncated 08:56:39 executing program 0: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x10, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000000)=0x3) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r3 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r3, 0x40047438, &(0x7f0000000180)=""/246) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r4, &(0x7f0000000040)=ANY=[], 0xfea7) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r4, 0x0) ioctl$PPPIOCSFLAGS1(r3, 0x4020744f, &(0x7f00000000c0)) [ 1287.086213] loop3: p5 start 1281279881 is beyond EOD, truncated [ 1287.111148] loop3: p6 start 3452787639 is beyond EOD, truncated [ 1287.132879] IPVS: ftp: loaded support on port[0] = 21 [ 1287.145529] loop3: p7 start 2263908108 is beyond EOD, truncated [ 1287.170793] loop3: p8 start 1970859340 is beyond EOD, truncated [ 1287.183278] IPVS: ftp: loaded support on port[0] = 21 [ 1287.199350] loop3: p9 start 1782333214 is beyond EOD, truncated [ 1287.241088] loop3: p10 start 1751982490 is beyond EOD, truncated [ 1287.280095] loop3: p11 start 3605249017 is beyond EOD, truncated [ 1287.322252] loop3: p12 start 2400178403 is beyond EOD, truncated 08:56:39 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_read_part_table(0x0, 0x2, &(0x7f0000002640)=[{0x0, 0x20000, 0xfffffffffffffff7}, {&(0x7f0000001540)="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", 0x1e0}]) 08:56:39 executing program 0: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000000)=0x3) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r3 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r3, 0x40047438, &(0x7f0000000180)=""/246) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r4, &(0x7f0000000040)=ANY=[], 0xfea7) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r4, 0x0) ioctl$PPPIOCSFLAGS1(r3, 0x4020744f, &(0x7f00000000c0)) [ 1287.597841] loop3: [POWERTEC] p1 p2 p3 p4 p5 p6 p7 p8 p9 p10 p11 p12 [ 1287.619815] loop3: p1 start 233194046 is beyond EOD, truncated [ 1287.655603] loop3: p2 start 3569653895 is beyond EOD, truncated [ 1287.676060] IPVS: ftp: loaded support on port[0] = 21 [ 1287.684135] loop3: p3 start 926682669 is beyond EOD, truncated [ 1287.723950] loop3: p4 start 1263303888 is beyond EOD, truncated [ 1287.752145] loop3: p5 start 1281279881 is beyond EOD, truncated [ 1287.781394] loop3: p6 start 3452787639 is beyond EOD, truncated [ 1287.811579] loop3: p7 start 2263908108 is beyond EOD, truncated [ 1287.841852] loop3: p8 start 1970859340 is beyond EOD, truncated [ 1287.863125] loop3: p9 start 1782333214 is beyond EOD, truncated [ 1287.885800] loop3: p10 start 1751982490 is beyond EOD, truncated [ 1287.908592] loop3: p11 start 3605249017 is beyond EOD, truncated [ 1287.923715] loop3: p12 start 2400178403 is beyond EOD, truncated 08:56:42 executing program 5: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000000)=0x3) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r3 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r3, 0x40047438, &(0x7f0000000180)=""/246) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x10012, 0xffffffffffffffff, 0x0) ioctl$PPPIOCSFLAGS1(r3, 0x80047453, &(0x7f00000000c0)) 08:56:42 executing program 4: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000000)=0x3) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r3 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r3, 0x40047438, &(0x7f0000000180)=""/246) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r4, &(0x7f0000000040)=ANY=[], 0xfea7) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r4, 0x0) ioctl$PPPIOCSFLAGS1(r3, 0x40047459, &(0x7f00000000c0)) 08:56:42 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_read_part_table(0x0, 0x2, &(0x7f0000002640)=[{0x0, 0x80000, 0xfffffffffffffff7}, {&(0x7f0000001540)="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", 0x1e0}]) [ 1290.053926] IPVS: ftp: loaded support on port[0] = 21 [ 1290.066248] loop3: [POWERTEC] p1 p2 p3 p4 p5 p6 p7 p8 p9 p10 p11 p12 [ 1290.080678] loop3: p1 start 233194046 is beyond EOD, truncated 08:56:42 executing program 0: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000000)=0x3) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r3 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r3, 0x40047438, &(0x7f0000000180)=""/246) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r4, &(0x7f0000000040)=ANY=[], 0xfea7) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r4, 0x0) ioctl$PPPIOCSFLAGS1(r3, 0x4020744f, &(0x7f00000000c0)) 08:56:42 executing program 1: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000000)=0x3) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r2, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000000)={0x3c, 0x0, 0x1, 0x409, 0x0, 0x0, {}, [@CTA_TUPLE_ORIG={0x24, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @broadcast}, {0x8, 0x2, @dev}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_SEQ_ADJ_REPLY={0x4}]}, 0x3c}}, 0x0) sendmsg$NFT_MSG_GETCHAIN(r2, &(0x7f0000000380)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000140)={&(0x7f00000002c0)={0x90, 0x4, 0xa, 0x3, 0x0, 0x0, {0x1, 0x0, 0x5}, [@NFTA_CHAIN_TYPE={0x8, 0x7, 'nat\x00'}, @NFTA_CHAIN_HOOK={0x38, 0x4, 0x0, 0x1, [@NFTA_HOOK_PRIORITY={0x8, 0x2, 0x1, 0x0, 0x384929b9}, @NFTA_HOOK_HOOKNUM={0x8, 0x1, 0x1, 0x0, 0x2}, @NFTA_HOOK_DEV={0x14, 0x3, 'vlan0\x00'}, @NFTA_HOOK_PRIORITY={0x8, 0x2, 0x1, 0x0, 0x4a04d539}, @NFTA_HOOK_PRIORITY={0x8, 0x2, 0x1, 0x0, 0x6265b60b}]}, @NFTA_CHAIN_HANDLE={0xc, 0x2, 0x1, 0x0, 0x2}, @NFTA_CHAIN_FLAGS={0x8, 0xa, 0x1, 0x0, 0x2}, @NFTA_CHAIN_COUNTERS={0x1c, 0x8, 0x0, 0x1, [@NFTA_COUNTER_BYTES={0xc, 0x1, 0x1, 0x0, 0x4}, @NFTA_COUNTER_BYTES={0xc, 0x1, 0x1, 0x0, 0x1000}]}, @NFTA_CHAIN_HANDLE={0xc, 0x2, 0x1, 0x0, 0x2}]}, 0x90}, 0x1, 0x0, 0x0, 0x10}, 0x4044050) ioctl$EVIOCGPROP(r1, 0x40047438, &(0x7f0000000180)=""/246) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r3, &(0x7f0000000040)=ANY=[], 0xfea7) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r3, 0x0) ioctl$PPPIOCSFLAGS1(r1, 0x40047457, &(0x7f00000000c0)) 08:56:42 executing program 2: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) pipe(&(0x7f00000003c0)) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000000)=0x3) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x84864c426e120871, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r3 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$SG_GET_LOW_DMA(r1, 0x227a, &(0x7f0000000140)) ioctl$EVIOCGPROP(r3, 0x40047438, &(0x7f0000000180)=""/246) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r4, &(0x7f0000000040)=ANY=[], 0xfea7) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r4, 0x0) ioctl$PPPIOCSFLAGS1(r3, 0x40047457, &(0x7f00000000c0)) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000400)={0x54, 0x0, 0x1, 0x409, 0x0, 0x0, {}, [@CTA_TUPLE_ORIG={0x3c, 0x1, 0x0, 0x1, [@CTA_TUPLE_ZONE={0x0, 0x3, 0x1, 0x0, 0x2}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_SEQ_ADJ_REPLY={0x4}]}, 0x54}}, 0x0) fcntl$getownex(r5, 0x10, &(0x7f0000000380)) llistxattr(&(0x7f0000000100)='./file0\x00', &(0x7f00000002c0)=""/144, 0x90) [ 1290.109344] loop3: p2 start 3569653895 is beyond EOD, truncated [ 1290.164046] loop3: p3 start 926682669 is beyond EOD, truncated [ 1290.191111] IPVS: ftp: loaded support on port[0] = 21 [ 1290.212815] IPVS: ftp: loaded support on port[0] = 21 [ 1290.216370] loop3: p4 start 1263303888 is beyond EOD, truncated [ 1290.238807] IPVS: ftp: loaded support on port[0] = 21 [ 1290.283155] loop3: p5 start 1281279881 is beyond EOD, truncated [ 1290.320699] loop3: p6 start 3452787639 is beyond EOD, truncated [ 1290.369306] loop3: p7 start 2263908108 is beyond EOD, truncated [ 1290.437064] loop3: p8 start 1970859340 is beyond EOD, truncated [ 1290.468050] loop3: p9 start 1782333214 is beyond EOD, truncated [ 1290.500518] loop3: p10 start 1751982490 is beyond EOD, truncated [ 1290.536201] loop3: p11 start 3605249017 is beyond EOD, truncated [ 1290.569847] loop3: p12 start 2400178403 is beyond EOD, truncated 08:56:42 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_read_part_table(0x0, 0x2, &(0x7f0000002640)=[{0x0, 0x100000, 0xfffffffffffffff7}, {&(0x7f0000001540)="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", 0x1e0}]) 08:56:42 executing program 4: unshare(0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000000)=0x3) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r3 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r3, 0x40047438, &(0x7f0000000180)=""/246) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r4, &(0x7f0000000040)=ANY=[], 0xfea7) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r4, 0x0) ioctl$PPPIOCSFLAGS1(r3, 0x40047459, &(0x7f00000000c0)) [ 1290.824998] loop3: [POWERTEC] p1 p2 p3 p4 p5 p6 p7 p8 p9 p10 p11 p12 [ 1290.836428] loop3: p1 start 233194046 is beyond EOD, truncated [ 1290.866770] loop3: p2 start 3569653895 is beyond EOD, truncated [ 1290.884080] IPVS: ftp: loaded support on port[0] = 21 [ 1290.898823] loop3: p3 start 926682669 is beyond EOD, truncated 08:56:43 executing program 5: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000000)=0x3) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r3 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r3, 0x40047438, &(0x7f0000000180)=""/246) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x10012, 0xffffffffffffffff, 0x0) ioctl$PPPIOCSFLAGS1(r3, 0x80047453, &(0x7f00000000c0)) [ 1290.921771] IPVS: ftp: loaded support on port[0] = 21 [ 1290.930773] loop3: p4 start 1263303888 is beyond EOD, truncated [ 1290.953848] loop3: p5 start 1281279881 is beyond EOD, truncated [ 1291.015301] loop3: p6 start 3452787639 is beyond EOD, truncated [ 1291.057488] loop3: p7 start 2263908108 is beyond EOD, truncated [ 1291.075651] IPVS: ftp: loaded support on port[0] = 21 [ 1291.081016] loop3: p8 start 1970859340 is beyond EOD, truncated [ 1291.136994] loop3: p9 start 1782333214 is beyond EOD, truncated 08:56:43 executing program 0: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000000)=0x3) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r3 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r3, 0x40047438, &(0x7f0000000180)=""/246) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r4, &(0x7f0000000040)=ANY=[], 0xfea7) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r4, 0x0) ioctl$PPPIOCSFLAGS1(r3, 0x4020744f, &(0x7f00000000c0)) [ 1291.177865] loop3: p10 start 1751982490 is beyond EOD, truncated [ 1291.211079] loop3: p11 start 3605249017 is beyond EOD, truncated [ 1291.252528] loop3: p12 start 2400178403 is beyond EOD, truncated [ 1291.324797] IPVS: ftp: loaded support on port[0] = 21 08:56:43 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_read_part_table(0x0, 0x2, &(0x7f0000002640)=[{0x0, 0x1000000, 0xfffffffffffffff7}, {&(0x7f0000001540)="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", 0x1e0}]) [ 1291.496673] loop3: [POWERTEC] p1 p2 p3 p4 p5 p6 p7 p8 p9 p10 p11 p12 [ 1291.510531] loop3: p1 start 233194046 is beyond EOD, truncated [ 1291.532554] loop3: p2 start 3569653895 is beyond EOD, truncated [ 1291.557217] loop3: p3 start 926682669 is beyond EOD, truncated [ 1291.588261] loop3: p4 start 1263303888 is beyond EOD, truncated [ 1291.608162] loop3: p5 start 1281279881 is beyond EOD, truncated [ 1291.630401] loop3: p6 start 3452787639 is beyond EOD, truncated [ 1291.653309] loop3: p7 start 2263908108 is beyond EOD, truncated 08:56:43 executing program 2: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)) dup(0xffffffffffffffff) r0 = socket(0x1e, 0x80002, 0x0) sendmmsg$alg(r0, &(0x7f0000000200), 0x10efe10675dec16, 0x0) ioctl$sock_inet_tcp_SIOCINQ(r0, 0x541b, &(0x7f0000000040)) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000000)=0x3) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) ioctl$EVIOCGPROP(0xffffffffffffffff, 0x40047438, &(0x7f0000000180)=""/246) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$KDADDIO(r3, 0x4b34, 0x6) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpuacct.usage_percpu_user\x00', 0x275a, 0x0) write$binfmt_script(r4, &(0x7f0000000040)=ANY=[], 0xfea7) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r4, 0x0) ioctl$PPPIOCSFLAGS1(0xffffffffffffffff, 0x40047457, &(0x7f00000000c0)) [ 1291.688815] loop3: p8 start 1970859340 is beyond EOD, truncated [ 1291.735294] loop3: p9 start 1782333214 is beyond EOD, truncated [ 1291.760864] loop3: p10 start 1751982490 is beyond EOD, truncated [ 1291.790155] loop3: p11 start 3605249017 is beyond EOD, truncated [ 1291.798154] IPVS: ftp: loaded support on port[0] = 21 [ 1291.818093] loop3: p12 start 2400178403 is beyond EOD, truncated 08:56:44 executing program 5: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000000)=0x3) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r3 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r3, 0x40047438, &(0x7f0000000180)=""/246) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x10012, 0xffffffffffffffff, 0x0) ioctl$PPPIOCSFLAGS1(r3, 0x80047453, &(0x7f00000000c0)) 08:56:44 executing program 4: unshare(0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000000)=0x3) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r3 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r3, 0x40047438, &(0x7f0000000180)=""/246) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r4, &(0x7f0000000040)=ANY=[], 0xfea7) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r4, 0x0) ioctl$PPPIOCSFLAGS1(r3, 0x40047459, &(0x7f00000000c0)) 08:56:44 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_read_part_table(0x0, 0x2, &(0x7f0000002640)=[{0x0, 0x2000000, 0xfffffffffffffff7}, {&(0x7f0000001540)="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", 0x1e0}]) [ 1292.016725] IPVS: ftp: loaded support on port[0] = 21 08:56:44 executing program 0: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000000)=0x3) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r2, 0x40047438, &(0x7f0000000180)=""/246) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r3, &(0x7f0000000040)=ANY=[], 0xfea7) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r3, 0x0) ioctl$PPPIOCSFLAGS1(r2, 0x4020744f, &(0x7f00000000c0)) [ 1292.194906] loop3: [POWERTEC] p1 p2 p3 p4 p5 p6 p7 p8 p9 p10 p11 p12 [ 1292.210803] loop3: p1 start 233194046 is beyond EOD, truncated [ 1292.245697] loop3: p2 start 3569653895 is beyond EOD, truncated [ 1292.260282] loop3: p3 start 926682669 is beyond EOD, truncated [ 1292.267904] loop3: p4 start 1263303888 is beyond EOD, truncated [ 1292.274110] loop3: p5 start 1281279881 is beyond EOD, truncated [ 1292.274122] IPVS: ftp: loaded support on port[0] = 21 [ 1292.351335] loop3: p6 start 3452787639 is beyond EOD, truncated [ 1292.377004] loop3: p7 start 2263908108 is beyond EOD, truncated [ 1292.398449] loop3: p8 start 1970859340 is beyond EOD, truncated [ 1292.419964] loop3: p9 start 1782333214 is beyond EOD, truncated [ 1292.442031] loop3: p10 start 1751982490 is beyond EOD, truncated [ 1292.451310] loop3: p11 start 3605249017 is beyond EOD, truncated [ 1292.460796] loop3: p12 start 2400178403 is beyond EOD, truncated [ 1292.569016] IPVS: ftp: loaded support on port[0] = 21 08:56:46 executing program 1: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000000)=0x3) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r1, 0x40047438, &(0x7f0000000180)=""/246) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r2, &(0x7f0000000040)=ANY=[], 0xfea7) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r2, 0x0) ioctl$PPPIOCSFLAGS1(r1, 0x40047457, &(0x7f00000000c0)) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000140)={&(0x7f0000000100)='./file0\x00', r2}, 0x10) 08:56:46 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_read_part_table(0x0, 0x2, &(0x7f0000002640)=[{0x0, 0x3000000, 0xfffffffffffffff7}, {&(0x7f0000001540)="c2ec123b097b69be3e42e60d3f03ff5b20b3406e8d7eebd2456f5388ad7135b73efb98088798c4d4506cd2295e60b5e9f9f2399833ad179a03e098e07644033f2d0e3c37a84095cdde0312f1d81191a92ccbe761424e7d3033a056d7d07c4c4bc2dbbb00079ae5158b76bed5cdd1d93054fff6874b43ef1289c75e4c9b911d69313cbc4e0abcab496b4ce2c83f238a2b30fc8210b75bcdcd0b774ac467962cc4389843f92f418b0718a87f17ae20f1790c7ff086746847e2217207cede6d2af2a58d7148128b2f86806b3be24ced787543219ae633ab66b7828c5bfd87571ee33ab89138401439491e3f3c6a4a56b4bf8a7d532ee9144977f6ac8fae105ab358e231f2cd9a216d68b0877161e158b14837fb1426f4a629f17ddd7bbf9019941ff9bbe3d6fd30d68dbd9e3b3cfb282bc08db959b660ed8f7ebc67714be3d00f8f1e2cbc9404069335265ce12996f7cb48c1f3221f7f892493e4711a6dbd79a0298e0e0b9936b06a3d08821f558f5738b05e2ead126157186dac58de8a7098291efacb6666b2dca73d422fbf6a09b30f3c30cc9e34faa453ef1d770f7008b7c54d644be9716b27aa40b67126130b61c29a254a578365216655e8a5c6955e72fb67e6f1796e499edcaa33e0b43bd172d9977deff713978907e12189743913c7c847", 0x1e0}]) 08:56:46 executing program 4: unshare(0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000000)=0x3) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r3 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r3, 0x40047438, &(0x7f0000000180)=""/246) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r4, &(0x7f0000000040)=ANY=[], 0xfea7) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r4, 0x0) ioctl$PPPIOCSFLAGS1(r3, 0x40047459, &(0x7f00000000c0)) 08:56:46 executing program 5: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000000)=0x3) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r3 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r3, 0x40047438, &(0x7f0000000180)=""/246) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x10012, r4, 0x0) ioctl$PPPIOCSFLAGS1(0xffffffffffffffff, 0x80047453, &(0x7f00000000c0)) 08:56:46 executing program 0: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000000)=0x3) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r2, 0x40047438, &(0x7f0000000180)=""/246) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r3, &(0x7f0000000040)=ANY=[], 0xfea7) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r3, 0x0) ioctl$PPPIOCSFLAGS1(r2, 0x4020744f, &(0x7f00000000c0)) 08:56:46 executing program 2: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000000)=0x3) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r4 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r4, 0x40047438, &(0x7f0000000180)=""/246) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) ioctl$VIDIOC_SUBDEV_ENUM_FRAME_INTERVAL(r1, 0xc040564b, &(0x7f0000000140)={0xffffffff, 0x0, 0x100a, 0x8, 0x2, {0x855, 0x7}, 0x1}) write$binfmt_script(r5, &(0x7f0000000040)=ANY=[], 0xfea7) r6 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r6, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000340)=ANY=[@ANYBLOB="3c000000000109040000000000eda776dffdbc5746b8e6f9c8ef08000100ffffffff08000200ac1414000c00028004000100000000000400108000000093000000080000000000"], 0x3c}, 0x1, 0x0, 0x0, 0x4000000}, 0x0) fcntl$F_SET_RW_HINT(r6, 0x40c, &(0x7f0000000100)=0x7) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r5, 0x0) r7 = dup2(r5, r3) ioctl$sock_inet_tcp_SIOCOUTQNSD(r7, 0x894b, &(0x7f00000003c0)) ioctl$PPPIOCSFLAGS1(r4, 0x40047457, &(0x7f00000000c0)) [ 1294.349658] IPVS: ftp: loaded support on port[0] = 21 [ 1294.367926] IPVS: ftp: loaded support on port[0] = 21 [ 1294.381259] IPVS: ftp: loaded support on port[0] = 21 [ 1294.414898] loop3: [POWERTEC] p1 p2 p3 p4 p5 p6 p7 p8 p9 p10 p11 p12 [ 1294.424668] loop3: p1 start 233194046 is beyond EOD, truncated [ 1294.428145] IPVS: ftp: loaded support on port[0] = 21 [ 1294.464924] loop3: p2 start 3569653895 is beyond EOD, truncated [ 1294.512383] loop3: p3 start 926682669 is beyond EOD, truncated [ 1294.536140] loop3: p4 start 1263303888 is beyond EOD, truncated [ 1294.567784] loop3: p5 start 1281279881 is beyond EOD, truncated [ 1294.587500] loop3: p6 start 3452787639 is beyond EOD, truncated [ 1294.617130] loop3: p7 start 2263908108 is beyond EOD, truncated [ 1294.666889] loop3: p8 start 1970859340 is beyond EOD, truncated [ 1294.723440] loop3: p9 start 1782333214 is beyond EOD, truncated [ 1294.787007] loop3: p10 start 1751982490 is beyond EOD, truncated [ 1294.830546] loop3: p11 start 3605249017 is beyond EOD, truncated [ 1294.860416] loop3: p12 start 2400178403 is beyond EOD, truncated 08:56:47 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_read_part_table(0x0, 0x2, &(0x7f0000002640)=[{0x0, 0x4000000, 0xfffffffffffffff7}, {&(0x7f0000001540)="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", 0x1e0}]) [ 1295.069044] netlink: 40 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1295.105042] loop3: [POWERTEC] p1 p2 p3 p4 p5 p6 p7 p8 p9 p10 p11 p12 [ 1295.118421] loop3: p1 start 233194046 is beyond EOD, truncated [ 1295.152642] IPVS: ftp: loaded support on port[0] = 21 [ 1295.162369] loop3: p2 start 3569653895 is beyond EOD, truncated 08:56:47 executing program 5: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000000)=0x3) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r3 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r3, 0x40047438, &(0x7f0000000180)=""/246) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x10012, r4, 0x0) ioctl$PPPIOCSFLAGS1(0xffffffffffffffff, 0x80047453, &(0x7f00000000c0)) [ 1295.202205] IPVS: ftp: loaded support on port[0] = 21 [ 1295.206527] loop3: p3 start 926682669 is beyond EOD, truncated [ 1295.222314] netlink: 40 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1295.270434] loop3: p4 start 1263303888 is beyond EOD, truncated 08:56:47 executing program 0: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000000)=0x3) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r2, 0x40047438, &(0x7f0000000180)=""/246) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r3, &(0x7f0000000040)=ANY=[], 0xfea7) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r3, 0x0) ioctl$PPPIOCSFLAGS1(r2, 0x4020744f, &(0x7f00000000c0)) [ 1295.312251] loop3: p5 start 1281279881 is beyond EOD, truncated 08:56:47 executing program 4: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000000)=0x3) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r3 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r3, 0x40047438, &(0x7f0000000180)=""/246) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r4, &(0x7f0000000040)=ANY=[], 0xfea7) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r4, 0x0) ioctl$PPPIOCSFLAGS1(r3, 0x40047459, &(0x7f00000000c0)) [ 1295.355655] IPVS: ftp: loaded support on port[0] = 21 [ 1295.384029] loop3: p6 start 3452787639 is beyond EOD, truncated [ 1295.427372] loop3: p7 start 2263908108 is beyond EOD, truncated [ 1295.461328] IPVS: ftp: loaded support on port[0] = 21 [ 1295.475559] loop3: p8 start 1970859340 is beyond EOD, truncated [ 1295.484289] IPVS: ftp: loaded support on port[0] = 21 [ 1295.527385] loop3: p9 start 1782333214 is beyond EOD, truncated [ 1295.593021] loop3: p10 start 1751982490 is beyond EOD, truncated [ 1295.618457] loop3: p11 start 3605249017 is beyond EOD, truncated [ 1295.673637] loop3: p12 start 2400178403 is beyond EOD, truncated 08:56:47 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_read_part_table(0x0, 0x2, &(0x7f0000002640)=[{0x0, 0x5000000, 0xfffffffffffffff7}, {&(0x7f0000001540)="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", 0x1e0}]) 08:56:48 executing program 4: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000000)=0x3) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r3 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r3, 0x40047438, &(0x7f0000000180)=""/246) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r4, &(0x7f0000000040)=ANY=[], 0xfea7) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r4, 0x0) ioctl$PPPIOCSFLAGS1(r3, 0x40047459, &(0x7f00000000c0)) [ 1295.947960] loop3: [POWERTEC] p1 p2 p3 p4 p5 p6 p7 p8 p9 p10 p11 p12 [ 1295.965772] loop3: p1 start 233194046 is beyond EOD, truncated [ 1296.000640] loop3: p2 start 3569653895 is beyond EOD, truncated [ 1296.030266] IPVS: ftp: loaded support on port[0] = 21 [ 1296.042781] loop3: p3 start 926682669 is beyond EOD, truncated [ 1296.082261] loop3: p4 start 1263303888 is beyond EOD, truncated [ 1296.113328] loop3: p5 start 1281279881 is beyond EOD, truncated [ 1296.142111] loop3: p6 start 3452787639 is beyond EOD, truncated [ 1296.170495] loop3: p7 start 2263908108 is beyond EOD, truncated [ 1296.191921] loop3: p8 start 1970859340 is beyond EOD, truncated [ 1296.226933] loop3: p9 start 1782333214 is beyond EOD, truncated [ 1296.261068] loop3: p10 start 1751982490 is beyond EOD, truncated [ 1296.291295] loop3: p11 start 3605249017 is beyond EOD, truncated [ 1296.321272] loop3: p12 start 2400178403 is beyond EOD, truncated 08:56:48 executing program 2: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) fchdir(r0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$VHOST_SET_LOG_BASE(r2, 0x4008af04, &(0x7f0000000140)=&(0x7f0000000100)) r3 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r4, 0x5423, &(0x7f0000000000)=0x3) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r5 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(r3, 0x84, 0x15, &(0x7f00000000c0)={0x9}, 0x1) ioctl$EVIOCGPROP(r5, 0x40047438, &(0x7f0000000180)=""/246) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r6, &(0x7f0000000040)=ANY=[], 0xfea7) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r6, 0x0) ioctl$PPPIOCSFLAGS1(r5, 0x40047457, &(0x7f00000002c0)=0x7680184) 08:56:48 executing program 5: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000000)=0x3) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r3 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r3, 0x40047438, &(0x7f0000000180)=""/246) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x10012, r4, 0x0) ioctl$PPPIOCSFLAGS1(0xffffffffffffffff, 0x80047453, &(0x7f00000000c0)) 08:56:48 executing program 4: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000000)=0x3) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r3 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r3, 0x40047438, &(0x7f0000000180)=""/246) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r4, &(0x7f0000000040)=ANY=[], 0xfea7) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r4, 0x0) ioctl$PPPIOCSFLAGS1(r3, 0x40047459, &(0x7f00000000c0)) 08:56:48 executing program 1: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0xb0b91cd27f490782, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000000)=0x3) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r1, 0x40047438, &(0x7f0000000180)=""/246) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r2, &(0x7f0000000040)=ANY=[], 0xfea7) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r2, 0x0) ioctl$PPPIOCSFLAGS1(r1, 0x40047457, &(0x7f00000000c0)) 08:56:48 executing program 0: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000000)=0x3) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r2, 0x40047438, &(0x7f0000000180)=""/246) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r3, &(0x7f0000000040)=ANY=[], 0xfea7) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r3, 0x0) ioctl$PPPIOCSFLAGS1(r2, 0x4020744f, &(0x7f00000000c0)) 08:56:48 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_read_part_table(0x0, 0x2, &(0x7f0000002640)=[{0x0, 0x6000000, 0xfffffffffffffff7}, {&(0x7f0000001540)="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", 0x1e0}]) [ 1296.510796] IPVS: ftp: loaded support on port[0] = 21 [ 1296.516821] IPVS: ftp: loaded support on port[0] = 21 [ 1296.531690] IPVS: ftp: loaded support on port[0] = 21 [ 1296.531698] IPVS: ftp: loaded support on port[0] = 21 [ 1296.545683] IPVS: ftp: loaded support on port[0] = 21 [ 1296.604995] loop3: [POWERTEC] p1 p2 p3 p4 p5 p6 p7 p8 p9 p10 p11 p12 [ 1296.629743] loop3: p1 start 233194046 is beyond EOD, truncated [ 1296.671787] loop3: p2 start 3569653895 is beyond EOD, truncated [ 1296.733625] loop3: p3 start 926682669 is beyond EOD, truncated [ 1296.780156] loop3: p4 start 1263303888 is beyond EOD, truncated [ 1296.851695] loop3: p5 start 1281279881 is beyond EOD, truncated [ 1296.915721] loop3: p6 start 3452787639 is beyond EOD, truncated 08:56:49 executing program 4: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x10, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000000)=0x3) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r3 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r3, 0x40047438, &(0x7f0000000180)=""/246) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r4, &(0x7f0000000040)=ANY=[], 0xfea7) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r4, 0x0) ioctl$PPPIOCSFLAGS1(r3, 0x40047459, &(0x7f00000000c0)) [ 1296.978352] loop3: p7 start 2263908108 is beyond EOD, truncated [ 1297.014326] loop3: p8 start 1970859340 is beyond EOD, truncated [ 1297.056262] loop3: p9 start 1782333214 is beyond EOD, truncated [ 1297.083693] loop3: p10 start 1751982490 is beyond EOD, truncated [ 1297.112352] IPVS: ftp: loaded support on port[0] = 21 [ 1297.121990] loop3: p11 start 3605249017 is beyond EOD, truncated [ 1297.147589] loop3: p12 start 2400178403 is beyond EOD, truncated 08:56:49 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_read_part_table(0x0, 0x2, &(0x7f0000002640)=[{0x0, 0x7000000, 0xfffffffffffffff7}, {&(0x7f0000001540)="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", 0x1e0}]) [ 1297.313701] IPVS: ftp: loaded support on port[0] = 21 [ 1297.324898] IPVS: ftp: loaded support on port[0] = 21 [ 1297.435833] loop3: [POWERTEC] p1 p2 p3 p4 p5 p6 p7 p8 p9 p10 p11 p12 [ 1297.461247] loop3: p1 start 233194046 is beyond EOD, truncated [ 1297.472753] loop3: p2 start 3569653895 is beyond EOD, truncated [ 1297.480086] loop3: p3 start 926682669 is beyond EOD, truncated 08:56:49 executing program 0: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000000)=0x3) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r2, 0x40047438, &(0x7f0000000180)=""/246) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r3, &(0x7f0000000040)=ANY=[], 0xfea7) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r3, 0x0) ioctl$PPPIOCSFLAGS1(r2, 0x4020744f, &(0x7f00000000c0)) [ 1297.487232] loop3: p4 start 1263303888 is beyond EOD, truncated [ 1297.493607] loop3: p5 start 1281279881 is beyond EOD, truncated [ 1297.501442] loop3: p6 start 3452787639 is beyond EOD, truncated [ 1297.509093] loop3: p7 start 2263908108 is beyond EOD, truncated [ 1297.518525] loop3: p8 start 1970859340 is beyond EOD, truncated [ 1297.537418] loop3: p9 start 1782333214 is beyond EOD, truncated [ 1297.549538] loop3: p10 start 1751982490 is beyond EOD, truncated [ 1297.562667] loop3: p11 start 3605249017 is beyond EOD, truncated [ 1297.573148] IPVS: ftp: loaded support on port[0] = 21 [ 1297.578607] loop3: p12 start 2400178403 is beyond EOD, truncated 08:56:49 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_read_part_table(0x0, 0x2, &(0x7f0000002640)=[{0x0, 0x9000000, 0xfffffffffffffff7}, {&(0x7f0000001540)="c2ec123b097b69be3e42e60d3f03ff5b20b3406e8d7eebd2456f5388ad7135b73efb98088798c4d4506cd2295e60b5e9f9f2399833ad179a03e098e07644033f2d0e3c37a84095cdde0312f1d81191a92ccbe761424e7d3033a056d7d07c4c4bc2dbbb00079ae5158b76bed5cdd1d93054fff6874b43ef1289c75e4c9b911d69313cbc4e0abcab496b4ce2c83f238a2b30fc8210b75bcdcd0b774ac467962cc4389843f92f418b0718a87f17ae20f1790c7ff086746847e2217207cede6d2af2a58d7148128b2f86806b3be24ced787543219ae633ab66b7828c5bfd87571ee33ab89138401439491e3f3c6a4a56b4bf8a7d532ee9144977f6ac8fae105ab358e231f2cd9a216d68b0877161e158b14837fb1426f4a629f17ddd7bbf9019941ff9bbe3d6fd30d68dbd9e3b3cfb282bc08db959b660ed8f7ebc67714be3d00f8f1e2cbc9404069335265ce12996f7cb48c1f3221f7f892493e4711a6dbd79a0298e0e0b9936b06a3d08821f558f5738b05e2ead126157186dac58de8a7098291efacb6666b2dca73d422fbf6a09b30f3c30cc9e34faa453ef1d770f7008b7c54d644be9716b27aa40b67126130b61c29a254a578365216655e8a5c6955e72fb67e6f1796e499edcaa33e0b43bd172d9977deff713978907e12189743913c7c847", 0x1e0}]) 08:56:50 executing program 4: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x10, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000000)=0x3) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r3 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r3, 0x40047438, &(0x7f0000000180)=""/246) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r4, &(0x7f0000000040)=ANY=[], 0xfea7) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r4, 0x0) ioctl$PPPIOCSFLAGS1(r3, 0x40047459, &(0x7f00000000c0)) 08:56:50 executing program 5: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000000)=0x3) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r3 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r3, 0x40047438, &(0x7f0000000180)=""/246) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x10012, r4, 0x0) ioctl$PPPIOCSFLAGS1(r3, 0x80047453, 0x0) [ 1298.035250] IPVS: ftp: loaded support on port[0] = 21 [ 1298.060487] IPVS: ftp: loaded support on port[0] = 21 08:56:52 executing program 0: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000000)=0x3) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r2, 0x40047438, &(0x7f0000000180)=""/246) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r3, &(0x7f0000000040)=ANY=[], 0xfea7) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r3, 0x0) ioctl$PPPIOCSFLAGS1(r2, 0x4020744f, &(0x7f00000000c0)) 08:56:52 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_read_part_table(0x0, 0x2, &(0x7f0000002640)=[{0x0, 0xd000000, 0xfffffffffffffff7}, {&(0x7f0000001540)="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", 0x1e0}]) 08:56:52 executing program 4: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x10, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000000)=0x3) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r3 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r3, 0x40047438, &(0x7f0000000180)=""/246) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r4, &(0x7f0000000040)=ANY=[], 0xfea7) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r4, 0x0) ioctl$PPPIOCSFLAGS1(r3, 0x40047459, &(0x7f00000000c0)) 08:56:52 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_CPUID2(r2, 0xc008ae88, &(0x7f0000000080)={0x1, 0x0, [{0xc0010010}]}) 08:56:52 executing program 1: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000000)=0x3) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r1, 0x40047438, &(0x7f00000003c0)=""/231) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$vhost_msg(r2, &(0x7f0000000340)={0x1, {&(0x7f0000000100)=""/37, 0x25, &(0x7f00000002c0)=""/96, 0x2, 0x5}}, 0x48) write$binfmt_script(r2, &(0x7f0000000040)=ANY=[], 0xfea7) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r2, 0x0) ioctl$PPPIOCSFLAGS1(r1, 0x40047457, &(0x7f00000000c0)) 08:56:52 executing program 2: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000000)=0x3) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r3 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r3, 0x40047438, &(0x7f0000000180)=""/246) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r4, &(0x7f0000000040)=ANY=[], 0xfea7) getsockopt$bt_rfcomm_RFCOMM_CONNINFO(r4, 0x12, 0x2, &(0x7f00000002c0)=""/255, &(0x7f0000000100)=0xff) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r4, 0x0) ioctl$PPPIOCSFLAGS1(r3, 0x40047457, &(0x7f00000000c0)) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$can_bcm(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000080)={0x1d, r6}, 0x10, &(0x7f0000000140)={&(0x7f00000000c0)={0x0, 0x0, 0x0, {0x0, 0x2710}, {0x77359400}, {}, 0x1, @can={{}, 0x0, 0x0, 0x0, 0x0, "a4ef08f666c5d148"}}, 0x48}}, 0x0) setsockopt$inet_pktinfo(r4, 0x0, 0x8, &(0x7f0000000140)={r6, @remote, @broadcast}, 0xc) [ 1300.429873] IPVS: ftp: loaded support on port[0] = 21 [ 1300.439213] IPVS: ftp: loaded support on port[0] = 21 [ 1300.441247] IPVS: ftp: loaded support on port[0] = 21 [ 1300.453072] IPVS: ftp: loaded support on port[0] = 21 08:56:52 executing program 5: madvise(&(0x7f0000000000/0x400000)=nil, 0x400000, 0xe) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x1) close(0xffffffffffffffff) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) move_pages(0x0, 0x1, &(0x7f00000000c0)=[&(0x7f0000075000/0x4000)=nil], &(0x7f000026bfec), 0x0, 0x0) 08:56:52 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_read_part_table(0x0, 0x2, &(0x7f0000002640)=[{0x0, 0x10000000, 0xfffffffffffffff7}, {&(0x7f0000001540)="c2ec123b097b69be3e42e60d3f03ff5b20b3406e8d7eebd2456f5388ad7135b73efb98088798c4d4506cd2295e60b5e9f9f2399833ad179a03e098e07644033f2d0e3c37a84095cdde0312f1d81191a92ccbe761424e7d3033a056d7d07c4c4bc2dbbb00079ae5158b76bed5cdd1d93054fff6874b43ef1289c75e4c9b911d69313cbc4e0abcab496b4ce2c83f238a2b30fc8210b75bcdcd0b774ac467962cc4389843f92f418b0718a87f17ae20f1790c7ff086746847e2217207cede6d2af2a58d7148128b2f86806b3be24ced787543219ae633ab66b7828c5bfd87571ee33ab89138401439491e3f3c6a4a56b4bf8a7d532ee9144977f6ac8fae105ab358e231f2cd9a216d68b0877161e158b14837fb1426f4a629f17ddd7bbf9019941ff9bbe3d6fd30d68dbd9e3b3cfb282bc08db959b660ed8f7ebc67714be3d00f8f1e2cbc9404069335265ce12996f7cb48c1f3221f7f892493e4711a6dbd79a0298e0e0b9936b06a3d08821f558f5738b05e2ead126157186dac58de8a7098291efacb6666b2dca73d422fbf6a09b30f3c30cc9e34faa453ef1d770f7008b7c54d644be9716b27aa40b67126130b61c29a254a578365216655e8a5c6955e72fb67e6f1796e499edcaa33e0b43bd172d9977deff713978907e12189743913c7c847", 0x1e0}]) 08:56:52 executing program 5: r0 = socket(0x10, 0x3, 0x0) r1 = socket(0x200000000000011, 0x3, 0x0) getsockname$packet(r1, &(0x7f0000000000), &(0x7f0000000040)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000780)=ANY=[@ANYBLOB="4c0000001800010900000000000000000a00000000002100000000001400050000000000000000000000000000000001"], 0x4c}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000140), 0x4924b68, 0x0) 08:56:53 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_read_part_table(0x0, 0x2, &(0x7f0000002640)=[{0x0, 0x19030000, 0xfffffffffffffff7}, {&(0x7f0000001540)="c2ec123b097b69be3e42e60d3f03ff5b20b3406e8d7eebd2456f5388ad7135b73efb98088798c4d4506cd2295e60b5e9f9f2399833ad179a03e098e07644033f2d0e3c37a84095cdde0312f1d81191a92ccbe761424e7d3033a056d7d07c4c4bc2dbbb00079ae5158b76bed5cdd1d93054fff6874b43ef1289c75e4c9b911d69313cbc4e0abcab496b4ce2c83f238a2b30fc8210b75bcdcd0b774ac467962cc4389843f92f418b0718a87f17ae20f1790c7ff086746847e2217207cede6d2af2a58d7148128b2f86806b3be24ced787543219ae633ab66b7828c5bfd87571ee33ab89138401439491e3f3c6a4a56b4bf8a7d532ee9144977f6ac8fae105ab358e231f2cd9a216d68b0877161e158b14837fb1426f4a629f17ddd7bbf9019941ff9bbe3d6fd30d68dbd9e3b3cfb282bc08db959b660ed8f7ebc67714be3d00f8f1e2cbc9404069335265ce12996f7cb48c1f3221f7f892493e4711a6dbd79a0298e0e0b9936b06a3d08821f558f5738b05e2ead126157186dac58de8a7098291efacb6666b2dca73d422fbf6a09b30f3c30cc9e34faa453ef1d770f7008b7c54d644be9716b27aa40b67126130b61c29a254a578365216655e8a5c6955e72fb67e6f1796e499edcaa33e0b43bd172d9977deff713978907e12189743913c7c847", 0x1e0}]) 08:56:53 executing program 4: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000000)=0x3) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r3 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r3, 0x40047438, &(0x7f0000000180)=""/246) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r4, &(0x7f0000000040)=ANY=[], 0xfea7) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r4, 0x0) ioctl$PPPIOCSFLAGS1(r3, 0x40047459, &(0x7f00000000c0)) [ 1300.943846] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.5'. [ 1301.022670] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.5'. 08:56:53 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'\x00', 0x1}) close(r0) [ 1301.165902] IPVS: ftp: loaded support on port[0] = 21 [ 1301.191330] IPVS: ftp: loaded support on port[0] = 21 [ 1301.252940] IPVS: ftp: loaded support on port[0] = 21 08:56:53 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_read_part_table(0x0, 0x2, &(0x7f0000002640)=[{0x0, 0x1f000000, 0xfffffffffffffff7}, {&(0x7f0000001540)="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", 0x1e0}]) 08:56:53 executing program 0: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000000)=0x3) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r2, 0x40047438, &(0x7f0000000180)=""/246) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r3, &(0x7f0000000040)=ANY=[], 0xfea7) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r3, 0x0) ioctl$PPPIOCSFLAGS1(r2, 0x4020744f, &(0x7f00000000c0)) 08:56:53 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000007c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) [ 1301.553044] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.5'. [ 1301.574694] IPVS: ftp: loaded support on port[0] = 21 08:56:53 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_read_part_table(0x0, 0x2, &(0x7f0000002640)=[{0x0, 0x20000000, 0xfffffffffffffff7}, {&(0x7f0000001540)="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", 0x1e0}]) 08:56:55 executing program 1: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000000)=0x3) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r1, 0x40047438, &(0x7f0000000180)=""/246) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r2, &(0x7f0000000040)=ANY=[], 0xfea7) ioctl$PPPIOCSFLAGS1(r1, 0x40047457, &(0x7f00000000c0)) r3 = openat$cgroup_ro(r2, &(0x7f0000000100)='net_prio.prioidx\x00', 0x0, 0x0) accept$unix(r3, &(0x7f00000002c0)=@abs, &(0x7f0000000140)=0x6e) 08:56:55 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_read_part_table(0x0, 0x2, &(0x7f0000002640)=[{0x0, 0x23000000, 0xfffffffffffffff7}, {&(0x7f0000001540)="c2ec123b097b69be3e42e60d3f03ff5b20b3406e8d7eebd2456f5388ad7135b73efb98088798c4d4506cd2295e60b5e9f9f2399833ad179a03e098e07644033f2d0e3c37a84095cdde0312f1d81191a92ccbe761424e7d3033a056d7d07c4c4bc2dbbb00079ae5158b76bed5cdd1d93054fff6874b43ef1289c75e4c9b911d69313cbc4e0abcab496b4ce2c83f238a2b30fc8210b75bcdcd0b774ac467962cc4389843f92f418b0718a87f17ae20f1790c7ff086746847e2217207cede6d2af2a58d7148128b2f86806b3be24ced787543219ae633ab66b7828c5bfd87571ee33ab89138401439491e3f3c6a4a56b4bf8a7d532ee9144977f6ac8fae105ab358e231f2cd9a216d68b0877161e158b14837fb1426f4a629f17ddd7bbf9019941ff9bbe3d6fd30d68dbd9e3b3cfb282bc08db959b660ed8f7ebc67714be3d00f8f1e2cbc9404069335265ce12996f7cb48c1f3221f7f892493e4711a6dbd79a0298e0e0b9936b06a3d08821f558f5738b05e2ead126157186dac58de8a7098291efacb6666b2dca73d422fbf6a09b30f3c30cc9e34faa453ef1d770f7008b7c54d644be9716b27aa40b67126130b61c29a254a578365216655e8a5c6955e72fb67e6f1796e499edcaa33e0b43bd172d9977deff713978907e12189743913c7c847", 0x1e0}]) 08:56:55 executing program 5: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x10000000013, &(0x7f00000006c0)=0x2000000000000001, 0x4) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f00000001c0)='syz_tun\x00', 0x10) setsockopt$inet_tcp_int(r3, 0x6, 0x2, &(0x7f0000000200)=0x7fff, 0x4) connect$inet(r3, &(0x7f00000000c0)={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r3, 0x6, 0x1d, &(0x7f0000000300)={0x0, 0x1cff, 0x2088}, 0x14) write$binfmt_misc(r1, &(0x7f0000000180)=ANY=[], 0xffffff2b) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x0) 08:56:55 executing program 4: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000000)=0x3) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r3 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r3, 0x40047438, &(0x7f0000000180)=""/246) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r4, &(0x7f0000000040)=ANY=[], 0xfea7) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r4, 0x0) ioctl$PPPIOCSFLAGS1(r3, 0x40047459, &(0x7f00000000c0)) 08:56:55 executing program 2: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000000)=0x3) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(0xffffffffffffffff, 0x6, 0x14, &(0x7f0000000100), 0x4) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r3 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r3, 0x40047438, &(0x7f0000000180)=""/246) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r4, &(0x7f0000000040)=ANY=[], 0xfea7) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r4, 0x0) ioctl$PPPIOCSFLAGS1(r3, 0x40047457, &(0x7f00000000c0)=0x200000) 08:56:55 executing program 0: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000000)=0x3) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r2, 0x40047438, &(0x7f0000000180)=""/246) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r3, &(0x7f0000000040)=ANY=[], 0xfea7) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r3, 0x0) ioctl$PPPIOCSFLAGS1(r2, 0x4020744f, &(0x7f00000000c0)) [ 1303.541529] IPVS: ftp: loaded support on port[0] = 21 [ 1303.549454] IPVS: ftp: loaded support on port[0] = 21 [ 1303.568383] IPVS: ftp: loaded support on port[0] = 21 [ 1303.581171] IPVS: ftp: loaded support on port[0] = 21 08:56:55 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_read_part_table(0x0, 0x2, &(0x7f0000002640)=[{0x0, 0x3f000000, 0xfffffffffffffff7}, {&(0x7f0000001540)="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", 0x1e0}]) 08:56:56 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_read_part_table(0x0, 0x2, &(0x7f0000002640)=[{0x0, 0x40000000, 0xfffffffffffffff7}, {&(0x7f0000001540)="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", 0x1e0}]) [ 1304.146217] IPVS: ftp: loaded support on port[0] = 21 08:56:56 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_read_part_table(0x0, 0x2, &(0x7f0000002640)=[{0x0, 0x48000000, 0xfffffffffffffff7}, {&(0x7f0000001540)="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", 0x1e0}]) [ 1304.262558] IPVS: ftp: loaded support on port[0] = 21 08:56:56 executing program 0: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000000)=0x3) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r2, 0x40047438, &(0x7f0000000180)=""/246) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r3, &(0x7f0000000040)=ANY=[], 0xfea7) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r3, 0x0) ioctl$PPPIOCSFLAGS1(r2, 0x4020744f, &(0x7f00000000c0)) 08:56:56 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x25b, &(0x7f0000000080)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb9040a4465ef0b007c05e87c55a1bc000900b8000699030000000500150004008178a8000500140003c00200001203ac040000d67f6f94007134cf6efb8013a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 08:56:56 executing program 4: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000000)=0x3) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r3 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r3, 0x40047438, &(0x7f0000000180)=""/246) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r4, &(0x7f0000000040)=ANY=[], 0xfea7) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r4, 0x0) ioctl$PPPIOCSFLAGS1(r3, 0x40047459, &(0x7f00000000c0)) [ 1304.468476] IPv6: NLM_F_CREATE should be specified when creating new route [ 1304.491792] IPVS: ftp: loaded support on port[0] = 21 [ 1304.500814] IPv6: RTM_NEWROUTE with no NLM_F_CREATE or NLM_F_REPLACE [ 1304.507606] IPv6: NLM_F_CREATE should be set when creating new route [ 1304.514141] IPv6: NLM_F_CREATE should be set when creating new route [ 1304.520726] IPv6: NLM_F_CREATE should be set when creating new route [ 1304.526887] IPVS: ftp: loaded support on port[0] = 21 08:56:58 executing program 5: socket$can_raw(0x1d, 0x3, 0x1) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ioctl$KVM_CREATE_DEVICE(0xffffffffffffffff, 0xc00caee0, &(0x7f0000000140)={0x4, 0xffffffffffffffff, 0x1}) setsockopt$inet6_IPV6_RTHDR(0xffffffffffffffff, 0x29, 0x39, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"], 0x18) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x1, 0x0, 0x0, 0x6, 0x0, 0x8, 0xfffffffffffffffc, 0x0, 0xfffffffc}, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4, 0x0, 0x36}, 0x0, 0xfffffffbffffffff, 0xffffffffffffffff, 0x0) ioctl$VIDIOC_QBUF(r0, 0xc058560f, &(0x7f0000000000)={0x0, 0x7, 0x4, 0x1, 0x7, {0x0, 0x2710}, {0x0, 0x0, 0x23, 0xf9, 0x0, 0xff, "39650236"}, 0x800, 0x1, @fd, 0x5f}) setsockopt$inet6_MRT6_ADD_MIF(r0, 0x29, 0xca, &(0x7f0000000100)={0x8000, 0x0, 0x4, 0x1f, 0x8000}, 0xc) unshare(0x40000000) shmget(0x3, 0x4000, 0x800, &(0x7f0000ffa000/0x4000)=nil) openat$dlm_monitor(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/dlm-monitor\x00', 0x0, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x20000000) ioctl$KVM_SET_MSRS(0xffffffffffffffff, 0xc008ae88, &(0x7f0000000500)=ANY=[@ANYBLOB="726ff4ec8aca12b22e6200df5973de23daf2d79459d39942b62c80a1446fc45f509cef94e2b265f36b143c648720b9003a8a1f017024bb864d84b58e3a29d1c2720963ad28d4c736944ef7fa22bd64a844c012fda4a5e6ffdd9560829aeda7b55e883cc00f"]) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$TIOCNOTTY(0xffffffffffffffff, 0x5422) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) 08:56:58 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_read_part_table(0x0, 0x2, &(0x7f0000002640)=[{0x0, 0x4a576250, 0xfffffffffffffff7}, {&(0x7f0000001540)="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", 0x1e0}]) 08:56:58 executing program 2: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r1) syz_open_dev$mouse(&(0x7f00000002c0)='/dev/input/mouse#\x00', 0x100, 0x400) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x7) r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r4, 0x5423, &(0x7f0000000000)=0x3) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r5 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r5, 0x40047438, &(0x7f0000000180)=""/246) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r6, &(0x7f0000000040)=ANY=[], 0xfea7) bind(r0, &(0x7f0000000100)=@pppoe={0x18, 0x0, {0x1, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, 'erspan0\x00'}}, 0x80) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r6, 0x0) ioctl$PPPIOCSFLAGS1(r5, 0x40047457, &(0x7f00000000c0)) sendmsg$NL80211_CMD_GET_MPATH(r6, &(0x7f00000003c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x1c, 0x0, 0x200, 0x70bd29, 0x25dfdbfd, {}, [@NL80211_ATTR_WIPHY={0x8, 0x1, 0xffffffffffffffff}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4048004}, 0x1) 08:56:58 executing program 4: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000000)=0x3) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r2, 0x40047438, &(0x7f0000000180)=""/246) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r3, &(0x7f0000000040)=ANY=[], 0xfea7) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r3, 0x0) ioctl$PPPIOCSFLAGS1(r2, 0x40047459, &(0x7f00000000c0)) 08:56:58 executing program 0: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000000)=0x3) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r3 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r3, 0x40047438, &(0x7f0000000180)=""/246) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r4, &(0x7f0000000040)=ANY=[], 0xfea7) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r4, 0x0) ioctl$PPPIOCSFLAGS1(r3, 0x4020744f, &(0x7f00000000c0)) [ 1306.102107] IPVS: ftp: loaded support on port[0] = 21 [ 1306.103177] IPVS: ftp: loaded support on port[0] = 21 [ 1306.113165] IPVS: ftp: loaded support on port[0] = 21 08:56:58 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_read_part_table(0x0, 0x2, &(0x7f0000002640)=[{0x0, 0x4c000000, 0xfffffffffffffff7}, {&(0x7f0000001540)="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", 0x1e0}]) 08:56:58 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_read_part_table(0x0, 0x2, &(0x7f0000002640)=[{0x0, 0x5062574a, 0xfffffffffffffff7}, {&(0x7f0000001540)="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", 0x1e0}]) 08:56:58 executing program 0: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000000)=0x3) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r3 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r3, 0x40047438, &(0x7f0000000180)=""/246) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r4, &(0x7f0000000040)=ANY=[], 0xfea7) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r4, 0x0) ioctl$PPPIOCSFLAGS1(r3, 0x4020744f, &(0x7f00000000c0)) 08:56:58 executing program 4: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000000)=0x3) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r2, 0x40047438, &(0x7f0000000180)=""/246) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r3, &(0x7f0000000040)=ANY=[], 0xfea7) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r3, 0x0) ioctl$PPPIOCSFLAGS1(r2, 0x40047459, &(0x7f00000000c0)) 08:56:59 executing program 1: sendmmsg$alg(0xffffffffffffffff, &(0x7f0000000200), 0x10efe10675dec16, 0x0) r0 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000200)='ethtool\x00') sendmsg$ETHTOOL_MSG_STRSET_GET(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x52000800}, 0xc, &(0x7f0000000200)={&(0x7f0000000180)={0x2c, r0, 0x20, 0x0, 0x25dfdbfe, {}, [@ETHTOOL_A_STRSET_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syzkaller0\x00'}]}]}, 0x2c}}, 0x0) sendmsg$ETHTOOL_MSG_FEATURES_SET(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000002c0)={&(0x7f0000001d80)={0x1410, r0, 0x209, 0x70bd27, 0x25dfdbff, {}, [@ETHTOOL_A_FEATURES_WANTED={0xf8, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_VALUE={0xf4, 0x4, "50570a36ad28be83901addf344f71fd8d719dce481dcab553fbc8285b9cb9e4be2cece455e9db3339e99422509f0c04e4c241ff206bf825ada957bc32c0b815bc2140ae173e869c241fb5eeff0901b600f673bdbc2ef5cbffc01479960cf745bacfdc4a689379d5ca05d92fb55a87f624c19960f3efb2581e69344c6958b782ed8d4a18cda76546babc05388e7da81fc29684d4fae492c32d16cf1b4ff616cf44dce1f7000c02eed924dfb3abc7b08103838072e6aaea1284a0b7563b1da7d4b7f1127e73f2c21b9b13e10f8cda64f8ed7633208614f23d923af3df5c655205b064e3966aa5bb44b7abbf8e93a1326ea"}]}, @ETHTOOL_A_FEATURES_HEADER={0x54, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x4}, @ETHTOOL_A_HEADER_DEV_NAME={0x14}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_to_bond\x00'}]}, @ETHTOOL_A_FEATURES_HEADER={0x4}, @ETHTOOL_A_FEATURES_WANTED={0x134, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_MASK={0xc3, 0x5, "ea2129253a2dcd838e1abf7988c2e536346f0d69ef14a690b5d999b91e033739d2793efd03e26555aae77eee2c04502af4b91490bb9b9a9e19a110e18914e2eea8be7e0b23117f6a36e54d17e4910d75e9a98eb017236ae9ecec372ccaa8fd392a525173709e28b7ba4ceec7780a62f56ae1cfe1a4664f50539a30c2ad086a78c2051bbfe9aacbecc4bfb57e1243b8a78cab91a1dda523c3ddfdf76ca59aca8fb2194301924f1a0c778b99e30ab0ad5c4216f4c16af390e8cc8e6e19298dfc"}, @ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_MASK={0x62, 0x5, "86a68068a652ccbdf931e2a39ea47d1af7d4d242e8abde393d74224ac215836b535eba2e40893911dc66035ea406e0fe672b4d0b38e034c1ce3eb82d65ec950f4712946d940221b6caeb77d41ea27c7a4b20c18f679b9228d8744a3f7850"}]}, @ETHTOOL_A_FEATURES_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'macsec0\x00'}]}, @ETHTOOL_A_FEATURES_WANTED={0x130, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_BITS={0x128, 0x3, 0x0, 0x1, [{0x34, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x87d}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x11, 0x2, 'security.evm\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x8}]}, {0x4c, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0xf, 0x2, '/dev/vim2m\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x3}, @ETHTOOL_A_BITSET_BIT_NAME={0x11, 0x2, 'security.evm\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x6}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x6, 0x2, '}\x00'}]}, {0x10, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x58, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x6, 0x2, ',\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x1}, @ETHTOOL_A_BITSET_BIT_NAME={0x11, 0x2, 'security.evm\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x11, 0x2, 'security.evm\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x5}, @ETHTOOL_A_BITSET_BIT_NAME={0x9, 0x2, '/.+[\x00'}]}, {0x24, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0xa, 0x2, '{-:!$\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x11, 0x2, 'security.evm\x00'}]}, {0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x6, 0x2, '-\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}]}]}, @ETHTOOL_A_FEATURES_WANTED={0xc, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x3}]}, @ETHTOOL_A_FEATURES_WANTED={0x1024, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_MASK={0x4}, @ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_MASK={0xff4, 0x5, "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"}, @ETHTOOL_A_BITSET_VALUE={0x1a, 0x4, "81cd58953cc72b264c457f14d61ea3898289b8d18422"}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x9}]}]}, 0x1410}, 0x1, 0x0, 0x0, 0x40000}, 0x810) r1 = socket$inet6_udp(0xa, 0x2, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000040)=0xa) ioctl$sock_inet6_SIOCADDRT(r1, 0x890b, &(0x7f0000000240)={@empty, @ipv4={[0x0, 0x0, 0x8], [], @multicast1}, @initdev={0xfe, 0x88, [0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x7], 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x7, 0x24c20082, r2}) sendmsg$ETHTOOL_MSG_DEBUG_SET(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000080)={&(0x7f00000031c0)={0x1348, r0, 0x10, 0x8000, 0x25dfdbfc, {}, [@ETHTOOL_A_DEBUG_MSGMASK={0x4}, @ETHTOOL_A_DEBUG_HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}]}, @ETHTOOL_A_DEBUG_MSGMASK={0xb0, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0xffffffff}, @ETHTOOL_A_BITSET_MASK={0x99, 0x5, "a0513f5bf4d7e737beea853ef6074d9aff7b0c52a1b2b6be20b7422373726caaea679f17462662c68e6774e5c06fc04bf0c887f9d011993b0c293f4b153b06035f3b8df066d7862752d296c6ce5b6dba2fb7e9a27b40b4db594cabfb97a3d0087fab8dc6f4338d2bfa4253320ad3a19012029f6daa37cb8d749bed8c96f285b4354484d794bb54d3299d251fe81f389eabbe247b7b"}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x80000001}]}, @ETHTOOL_A_DEBUG_HEADER={0x50, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_to_team\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'sit0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'xfrm0\x00'}]}, @ETHTOOL_A_DEBUG_MSGMASK={0xf4, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_VALUE={0xf0, 0x4, "ff5ee51d6cfdf27a3a3bd4ab1c2fe5ddcd292112e171a97149c50e72d772144d5b9937eb2464289c6dace0efebde7019ffa146245aee9551b7d90b54d0b02686692501667508af8c6449de036e9b043a90fba16e445af26857e2c3fa6435aa2a93d08d17bde4284bff7672c76ab23718af227fdac9d13cfc96ef5432d168be16651832974f267abecb39d87d558bb63000fb0bf20a65b78ae8c95724de7c80329972228b91d70221794000ddaa814f394fa4b80cc76c47c82612894216c1f28533ecc817ba501422df9ffebfe13859671717c8fda1f8dfede10301f9a3d98e8e81104bd41903ba18d2f92518"}]}, @ETHTOOL_A_DEBUG_MSGMASK={0x4}, @ETHTOOL_A_DEBUG_MSGMASK={0xc, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x3}]}, @ETHTOOL_A_DEBUG_MSGMASK={0x1120, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_MASK={0x1004, 0x5, "c2931919080eb82e7a3fa778a217a6f6174bf1c9da5350618be4450df087a6ec5f2abcc2acbe1c95a9c64f78a6d39538aa3ac1c62f65d9c0a13c40436baa3f506d8fd8956aadca3157c023ee3b1c682e0a767f4be46775ac2e79b52a2410b0f72ba21100f54867391ebab0012c04206f2a78b40cd1bbc0b02aefb70db278dc28ce3a9ebdc80b6a26a3431f7096d1933e7ea15de4ff801eeb7f547ddb93e861a7ea285aa7a5848727ef96e360fa83e01e5da2a71779e852de1c7ab2d1401a0f9848ba63e02783e52aed5e949f4768465774fff8076660fe0fd7df2889f4459bd2c51bed867dbe82dbd6342da5489147649f76d3eaf9bd342e6e746cdc754bb6a682b2ebaa9ca7953bd357abafe96e6c8d89c7dbb2d417e034fe78aca9ea4f2a7851a436f597ede343d120c3ad605dd6daa4d1bf65e1be532ea5c6e7bcbbf2394b35cfff4432e9e8e5b44a1c92ee9dbb33eb53a1a897b62c1587e7cecee286f3aded917a44ad7b66f2fe358f1296c13b6f1be2490c91d8bf3d75992a885da366b0f2cfa5583c8a805806ef69a40d825feacd4af870f25d0f41a5e598d3f9ec7f09d2c6ea7c7078636141560d0c2ca154bf9f04f0d5f53d81205408ef00a0aca64c80b108d180955ffdebf0f83067c063aad09a4e09cc5254741cb5707a4b13f0df11effb3f9bac87cd4317a032f49d2ef03686cb03e733b2d0f04379ffbe1a81fc6f91d33df57d0b5a83ea4818ed6c288dd5967d159d7c15c22b5bdf0c88d04b786f2ade73b608a1a7d9c34125083d094a561f68fb02fe7cdc8439ae98484f3cb5c059d0bdbd474a166f82ec46278bc8047048b5d7a912781bbd2a90124875347ec6056da9b64fe5a6542e5f71e6897c0af8de5a5597fdddf1d744427f993dad9a9ad8a4f6caae6e6803c412d15bf2db11ebb395d5be154b21944732d44f4dd3cc7aa6e0621dbc8e6602c8d3d3f0611a897f5111cfe4e52591dbf781311ddc988062b104e61e5c76a0db04091b05c11cd1c534beda8c414689eca2feaba944e931e46f5817153778f7b73b26064cdf526e806ed4fabfb9980722c1f3331b56441819912e71876f5ba267d4a473829f38de9f16a94d26475b27d436bb8933fc0571483876a59982a60221c0fa2775ce27c077673245d4b5187887024d366aa40fce6543a5e5b985d95211b1dff6298fb4dc2c9343c97af275b98bdb5e6192dd314bb75bf2517e3e4d4c7268da7981b403be46a2b841c19684e31f01d74ac11002ceae2fd3f2427a40ae129af1a3dd7017516b5a3d86b41edd132eea81cdc3953d11e0eaf8c8bea6fbff6cb0d920710b80bf201c4e771949d1164dd196b65ae40e071bfa96be4a4ad823c66a0918f2584cb463abbd96bedd99eb39068d67be6b720ea06a8dfa650d994c7955470b2e082fb77cdcdf4a7424781edc500f20f2cce824346beb4573231bd95d2fce1fd47015e41c0a6624ae0990afab57d4452028ebb990a7e729e385444617cd66234a96a7d50b974243f7edf6c2b8913a463b65ae38b073a7cef25c835b8f273541d49994465531468d196c56ca968bb19d10aa8c236effd13947854cf9a3d4f34cceba6b06e1357190cd930178a75275624acc2c72e925156f49623e5da76026e088ca5b58ed172ad6f1be57c5e7c0333af31a26d7aa3c17fbceff354c951a31a8588c9aae5995c2a2da36c1b82afdc32196a68946c48dc504c7fef02645ad427d3fd7ef07e6764f2dbc273caf6709eaa3559ff3e68c08a288452d459db04bd7e9599a7c5dc2363f4b0fb02f2d93ab2a975801d5a95d5c3ffd06038b7ae6b02300820d556876463acf2a99b4f7d1df60ebfb6df1779521f0848024a96bb4b572d9063cfab0ed4e81746a290f31e915790f6734c78b4463af577a70e5aefedf9886258dd32fa7846e67888a63a51d825b509819b1aed884a2cefc750ebe9e3aff333d49892b39174df780a2ac212f5e5d2649d42bb43f58da0a1374962238a279eb31718ca4da1c6bea2561dac560f49791859799c19b93fce45ccb116976c6b65dcaa7f7526bee0592ed43b8c127f47cc3868ad7510a4be740e127823421057744d69965cfe87dce879b4be20f271df7048d41a59e37b96892a8fdd54e4a59acc7146df15f40c98e56a72240748731199b7e97ab5d48bbfefdf20baf9cdd6dcc9ca2d8c0f5c6acd35847d81ad94c7d667de4911571620d05851903bc7b61dbf753434821542353b8af621a10e372411c3145784b9a1b7b49e681037588863021a71896eb446823ad247cf38fc2fe0eff8a520db2089a92c9e18aa364c1d4eba230c1adfeceb93ea850d88d24ba1572801f5c29021ad32040307cc5e9c4ee9682a7bdf0a9364c819cd2f80a374fb473e8b550dfaa3d1782ea5d46a8bd69ed95366b2b19deeff2e2211650b295a7f42764c70856ca65523c274d173a3d5c951b404b7ef291b9867cdcb5d4e2a02a869667c111030c4ff4feec18e9d9a989704efe7fcee99993b561905a5000c2bd0e7d949fe23b459c9b58c45c56dc6ed68eb8da7127194604f30a5dd834b3c3da99a18f63422b1f85828cb09a5637ff60868efaa654d398fbe7b23bc1ac55b324854c7f4df3372ead5cc5dcfddca7b7c02e492b76cbc2d60dd15bc65996b1310933b1c779a8ee4049a0a721b428086e7573210f8198a876294fd461f47a3f9b35a035d79d9db22593f0a9c3297582f8d96f874c865c56daf0695595ab598bf6d2da67a6e9db847cee9afbd91643ddb8362e4cfa0e43240e51c186e972e8aa4ddaec48e5ce84dcc8b67395b11e8b5f7034e2f35ba2109182037c9f33a8efc45b6dbaf242891fa9a7d0116087ef296b05d9cc008298339ea7e76b60e81179c39e097e08e0831768aa3526b145ec2561693884c4db5e47d98db08aa1eab2a00f9d96ca0b7c61fcff6b5150da4b3e00b6e8e4df11e565fda7fb070251134be63947277d7e9288e7fa71d0b45044e4bf82a4fd7e321493bae4966f77eb1c831f1d1b3ff247e4a90d771f1fc9d058b864464d0e77004d695268e406f674ff688c42e1baf2d99ff412ad1ad83655597bf737bafc1098881be6bf0648e7a859254386656a1b8bb991ffa7f1f56bb33c16aecf137d02fb0ebe80c7c8e4124820560ad2a0b7442dd74d1bf52da8e48a6773164c6c21c68e79a77c82ab81f51ce689abb01985a76213b7cb13ac5624bdcfb06ed9894a033c9aff7ac8e0f352ad337ff961bab94cb4b6d278dddbbf6955bd2fba372d8b9eb4730b9df6589d1848c8969eba095e60e98be3b5113fdfedb2ee02ecde6b32b20b56fa538db8f1cd2c8f2021a0e06f7b47d3f66909f7f005ef69fc248fc3b7757cfe6171818d263145aa95e48140b27b12d2f6ce008031c73b47735f8ef3aaf7cdb90cc3547b122a26a88d6c2721e7af06638f9571ed6792a70f569f8ca26849ec80f4c8aba8018b711706d1aa5c40498fe57b52146c630ec3a536cdfb4793b446018453d6b4c351320cd3c7dfd9472eca75b7adc011698b33fc485f794713d954af6ff6921f7c7d457ee2b2b1810d579d2c1759a1169c2bb9455c0ca489880df3e96f0ea50416abb969293b64ab63b2aa267684f6b77aef2cc4765db297e80547c2f9f6862f9c4552c8a5da071219d48483f8e866adcc33c96654f50fefeb52bb8b9c753814bc7f205adec6484b2625f49575a3fa5dca52541bb98b2679ad6ffde0069411f16250ee01e3bfc39941bf56ff15ca1bb6b4d87731cff74ebac476567119d05cb10bd3b2ede882fd25bdb5732eb50c2ea5cced7665a944540c00f8956c61379179f0b8a5f2f58fe6b320e7dc7467ee397b5d51d056d68975a8db725d239f60e884e34e2b46c553e93a3adb99f00ffc73f57d93a9ea701915ee50487b34c81f91c707dd8a9b888a41333aed7848c21c106b56d1d7c1761a6dae92a5dfb812d65feafe4485df89e2710ea514c685e816009b6fc9e7d017f84fe2ae5fc168a63d4cdac9c20f82cf48fd69dc16dc94deee242f1327adc6def24629d9a84d2b007b94e7a2e8195311040f95964d657356b0218e397a4fd1c8b74f934f63bff3103e84eeaf7885d4151a46e0c66126d058e46fd15bb80e1ebb1aed4e38f633619d0b22b9cefca10dd08a00ad1aae0239262a0f3c9ebdc1b4dac6ed2fd7c90b6d8142c51f73f87c96864925c38848cb8bd56b2e817fdf21a21785539e289de53de6e97c60ada2fc653a57ca2723ee4554f2a0e11a4b1f969ea6544693320795a5b363778620a43b3757983bfc9e57ac0bc93a0df85aaeede13a142da97d266d6d106dc412f6c8e8de922177aef7228a5a0a2743c3f9c2eabcac842905c3eb164bd9bfcbc3eca2d5bb97f7d2971179d47816674fb665fcbf57e2488f104230c64c8a700ea0ac59a690789073538076d46485a19230135c2d755fb58e97a38937d482fcb43839f3e3780c2d63b345f989357806f5ffdddc3dfb32c7b22fe60d241fc7df130c17ae80b3f8c22d0723bc792c4a03b9eeec9863f503e079ecffd6399faf5e3fccbbbf18a07b23121355cc5f81117ca08f72c7143622adc3d2338528d120e65c91d26ee00562db1f945e7f9cfa08029f303925d3cb5d89118f9e7a5f5e254e51ecedfe0d7f20a3790448a6354ab2e10843739609e57baba43bf434c30d425bb3fdb000a1e37121c84e90599bd55c4ae92263c61ebe6808c9522055452abbf3ab27122408af1096bf63e05cdc25474cb44956968c46d5ade622df8cad9c97a72f5694f09848e2237cc9febb7988689bdc6472841a1cabe63e06f85f2fe73be48c9174993bb757d0c433ac690e1feb8297240121c3fb715c10121206623073c4e0bfc2ec5e0c4330308e45c2a1030eeb0e2733c4745fa53eec06af70e879a8deeb5bd605eb75f912750f3a64498f4fd1ec79460b90e057cbb6617615bf6fbf966a5008f89c2950688d8934595681b690b7b749e08c9b204f2a578a92e139062abb6e2ddb32a4555e362c3da1b48589358befa9afb2e7450ed350ce5414b78d77017b3cf02d902ea06f2d84bfc0987871dc33dcd2a2b969c4c0f0eb759782bed8ab96c4602c5816322fed4066aa38ca9c0ef746a9c3af035629f16b76028f88bfd2d5ed92cde4de10a9857a8c9877d7a4a0890581d2d25d10ccfaf06b2889f62dadd22c5b62ad3e2294362883ba3a0e7ea885535e55e83b81d5871fc2b5e8dfb64583c6d7dc5bf243f4218be77e7897c27b46bb81444155d34172bf0c0e2c741c8bbb81da55edf019926d7d84d56d1b3b0efeb7047b4a2b88aa18997139cc8b0309266c29839d0ebb7efc5a004b3875b595472c45f3cef00297739659791d60c99dce65ca94845e4d564d1404bf2b3cbf18a80791d03684cf4a3502764063e4c90147afc14f2e0b5721291c2dd625342d07744350264f3df172a3b3ac91e07fd502afa1bdd7049488581e7088709f845e09e5bb982b8ae227c1ce689fc5cf871b88fcf55328e3527c5b7297a0c1b4719103466bf777488f834b9db93d99dbd28aa25089a76443f4255e5d538c4084d4df4f11994a1acbb50874b58c6ead762eb9a5baaa5c0e657efbe5b6e4fbe7fd3493ff9c1a531eb208d966d4ad3884161fc6190f3754c92664d29d3f2d389477c85080fe3f9bf700d32f208bcdad6b1052a8cc8398f3bbd31befbc5682a891244e23280b482f24f4fa1ecd9003bd30befd567457348b5137fe2191dd36385c87086ff1d193da2a3ac34b5405befd7e6709281befaef206ca48f9de849a4c068f34d1424752"}, @ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_BITS={0x8, 0x3, 0x0, 0x1, [{0x4}]}, @ETHTOOL_A_BITSET_MASK={0x102, 0x5, "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"}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x100}]}]}, 0x1348}, 0x1, 0x0, 0x0, 0x24048000}, 0xc0) sendmsg$ETHTOOL_MSG_PAUSE_SET(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000140)={&(0x7f00000002c0)=ANY=[@ANYBLOB='d\x00\x00', @ANYRES16=r0, @ANYBLOB="000028bd7000fcdbdf2516000000140001800800030003000000080003000200000005000200000000000c000180080003000300000005000400010000000500020001000000050004000000000005000200000000000500020000000000"], 0x64}, 0x1, 0x0, 0x0, 0x4000}, 0x44) unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r3, 0x5423, &(0x7f0000000000)=0x3) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r4 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r4, 0x40047438, &(0x7f0000000180)=""/246) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r5, &(0x7f0000000040)=ANY=[], 0xfea7) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r5, 0x0) ioctl$PPPIOCSFLAGS1(r4, 0x40047457, &(0x7f00000000c0)) 08:56:59 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_read_part_table(0x0, 0x2, &(0x7f0000002640)=[{0x0, 0x55000000, 0xfffffffffffffff7}, {&(0x7f0000001540)="c2ec123b097b69be3e42e60d3f03ff5b20b3406e8d7eebd2456f5388ad7135b73efb98088798c4d4506cd2295e60b5e9f9f2399833ad179a03e098e07644033f2d0e3c37a84095cdde0312f1d81191a92ccbe761424e7d3033a056d7d07c4c4bc2dbbb00079ae5158b76bed5cdd1d93054fff6874b43ef1289c75e4c9b911d69313cbc4e0abcab496b4ce2c83f238a2b30fc8210b75bcdcd0b774ac467962cc4389843f92f418b0718a87f17ae20f1790c7ff086746847e2217207cede6d2af2a58d7148128b2f86806b3be24ced787543219ae633ab66b7828c5bfd87571ee33ab89138401439491e3f3c6a4a56b4bf8a7d532ee9144977f6ac8fae105ab358e231f2cd9a216d68b0877161e158b14837fb1426f4a629f17ddd7bbf9019941ff9bbe3d6fd30d68dbd9e3b3cfb282bc08db959b660ed8f7ebc67714be3d00f8f1e2cbc9404069335265ce12996f7cb48c1f3221f7f892493e4711a6dbd79a0298e0e0b9936b06a3d08821f558f5738b05e2ead126157186dac58de8a7098291efacb6666b2dca73d422fbf6a09b30f3c30cc9e34faa453ef1d770f7008b7c54d644be9716b27aa40b67126130b61c29a254a578365216655e8a5c6955e72fb67e6f1796e499edcaa33e0b43bd172d9977deff713978907e12189743913c7c847", 0x1e0}]) 08:56:59 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_read_part_table(0x0, 0x2, &(0x7f0000002640)=[{0x0, 0x60000000, 0xfffffffffffffff7}, {&(0x7f0000001540)="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", 0x1e0}]) 08:57:03 executing program 5: r0 = memfd_create(&(0x7f0000000140)='\x00\x04\x00\x00', 0x0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) 08:57:03 executing program 2: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0xc0600, 0x0) bind$l2tp(r1, &(0x7f0000000100)={0x2, 0x0, @broadcast}, 0x10) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000000)=0x3) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r3 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r3, 0x40047438, &(0x7f0000000180)=""/246) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r4, &(0x7f0000000040)=ANY=[], 0xfea7) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r4, 0x0) ioctl$PPPIOCSFLAGS1(r3, 0x40047457, &(0x7f00000000c0)) 08:57:03 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_read_part_table(0x0, 0x2, &(0x7f0000002640)=[{0x0, 0x68000000, 0xfffffffffffffff7}, {&(0x7f0000001540)="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", 0x1e0}]) 08:57:03 executing program 0: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000000)=0x3) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r3 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r3, 0x40047438, &(0x7f0000000180)=""/246) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r4, &(0x7f0000000040)=ANY=[], 0xfea7) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r4, 0x0) ioctl$PPPIOCSFLAGS1(r3, 0x4020744f, &(0x7f00000000c0)) 08:57:03 executing program 4: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000000)=0x3) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r2, 0x40047438, &(0x7f0000000180)=""/246) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r3, &(0x7f0000000040)=ANY=[], 0xfea7) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r3, 0x0) ioctl$PPPIOCSFLAGS1(r2, 0x40047459, &(0x7f00000000c0)) 08:57:03 executing program 1: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000000)=0x3) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setresuid(0x0, r2, 0x0) getresgid(&(0x7f0000000440), &(0x7f0000000480)=0x0, &(0x7f00000004c0)) write$P9_RGETATTR(0xffffffffffffffff, &(0x7f0000000500)={0xa0, 0x19, 0x2, {0x1000, {0x10, 0x3, 0x4}, 0x1, r2, r3, 0x3, 0x8, 0x1c6f, 0x3ff, 0xfffffffffffffe01, 0x6d, 0x1, 0x1, 0x4, 0x3fa, 0x8, 0x2, 0x1ff, 0x1ce, 0x3}}, 0xa0) ioctl$EVIOCGPROP(r1, 0x40047438, &(0x7f0000000180)=""/246) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r4, &(0x7f0000000040)=ANY=[], 0xfea7) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r4, 0x0) r5 = socket(0x1000000010, 0x80002, 0x0) sendmmsg$alg(r5, &(0x7f00000003c0)=[{0x0, 0x0, &(0x7f0000000400)=[{&(0x7f00000003c0)}], 0x1, &(0x7f0000000440), 0x0, 0x20000000}], 0x1, 0x0) bind$rose(r5, &(0x7f0000000100)=@full={0xb, @dev={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, 0x1, [@default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null, @null, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}, 0x40) ioctl$PPPIOCSFLAGS1(r1, 0x40047457, &(0x7f00000000c0)) r6 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x260900, 0x80) sendto$phonet(r6, &(0x7f00000002c0)="b33f9e395e8deebcdd3cb1f6f0be8d5789a062cc23fcb10e29a87675f2b63f908db34f8b88d6832610f1bb4694c7ecca193b3daca9872852834f9a1abce738e4b702728784695078ffd66461a84c0f744911f866875adab2c3a5b6126fc8bd5775358cd6db1e68bc816617207eed64e8f666c5030e00096dee1621e19d978c92baf8a9f91c31af756221e53cc8276521b51ea719fe9cfde8843a04731c6f5c7ce1d14814b57d9f5bc865503f05ab9e8b1f47c9aa178907400c612447c0dddc6ce4fc2d518090d09b33d2aec31fc89635f01cc90ae30a1ea9157345e6a1d09e0db6c01c8478", 0xe5, 0x4, 0x0, 0x0) [ 1311.377545] IPVS: ftp: loaded support on port[0] = 21 [ 1311.390498] IPVS: ftp: loaded support on port[0] = 21 [ 1311.397562] IPVS: ftp: loaded support on port[0] = 21 [ 1311.415338] IPVS: ftp: loaded support on port[0] = 21 08:57:03 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_read_part_table(0x0, 0x2, &(0x7f0000002640)=[{0x0, 0x6c000000, 0xfffffffffffffff7}, {&(0x7f0000001540)="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", 0x1e0}]) 08:57:03 executing program 5: r0 = openat$vim2m(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vim2m\x00', 0x2, 0x0) ioctl$vim2m_VIDIOC_TRY_FMT(r0, 0xc0d05640, &(0x7f0000000280)={0x2, @win={{0x7fffffff}, 0x0, 0x0, 0x0, 0x0, 0x0}}) 08:57:03 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000040)='dctcp\x00', 0x6) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e20, @multicast2}, 0x10) sendto$inet(r0, &(0x7f0000000200), 0xfffffffffffffdc0, 0x20001732, &(0x7f00000003c0)={0x2, 0x4e20, @local}, 0x4a) recvfrom(r0, &(0x7f0000000100)=""/90, 0xffffffffffffff5e, 0x1010c, 0x0, 0xfffffe59) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) [ 1311.695400] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. 08:57:03 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_read_part_table(0x0, 0x2, &(0x7f0000002640)=[{0x0, 0x74000000, 0xfffffffffffffff7}, {&(0x7f0000001540)="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", 0x1e0}]) 08:57:04 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_read_part_table(0x0, 0x2, &(0x7f0000002640)=[{0x0, 0x7a000000, 0xfffffffffffffff7}, {&(0x7f0000001540)="c2ec123b097b69be3e42e60d3f03ff5b20b3406e8d7eebd2456f5388ad7135b73efb98088798c4d4506cd2295e60b5e9f9f2399833ad179a03e098e07644033f2d0e3c37a84095cdde0312f1d81191a92ccbe761424e7d3033a056d7d07c4c4bc2dbbb00079ae5158b76bed5cdd1d93054fff6874b43ef1289c75e4c9b911d69313cbc4e0abcab496b4ce2c83f238a2b30fc8210b75bcdcd0b774ac467962cc4389843f92f418b0718a87f17ae20f1790c7ff086746847e2217207cede6d2af2a58d7148128b2f86806b3be24ced787543219ae633ab66b7828c5bfd87571ee33ab89138401439491e3f3c6a4a56b4bf8a7d532ee9144977f6ac8fae105ab358e231f2cd9a216d68b0877161e158b14837fb1426f4a629f17ddd7bbf9019941ff9bbe3d6fd30d68dbd9e3b3cfb282bc08db959b660ed8f7ebc67714be3d00f8f1e2cbc9404069335265ce12996f7cb48c1f3221f7f892493e4711a6dbd79a0298e0e0b9936b06a3d08821f558f5738b05e2ead126157186dac58de8a7098291efacb6666b2dca73d422fbf6a09b30f3c30cc9e34faa453ef1d770f7008b7c54d644be9716b27aa40b67126130b61c29a254a578365216655e8a5c6955e72fb67e6f1796e499edcaa33e0b43bd172d9977deff713978907e12189743913c7c847", 0x1e0}]) [ 1312.189433] IPVS: ftp: loaded support on port[0] = 21 [ 1312.192233] IPVS: ftp: loaded support on port[0] = 21 08:57:04 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_read_part_table(0x0, 0x2, &(0x7f0000002640)=[{0x0, 0x97ffffff, 0xfffffffffffffff7}, {&(0x7f0000001540)="c2ec123b097b69be3e42e60d3f03ff5b20b3406e8d7eebd2456f5388ad7135b73efb98088798c4d4506cd2295e60b5e9f9f2399833ad179a03e098e07644033f2d0e3c37a84095cdde0312f1d81191a92ccbe761424e7d3033a056d7d07c4c4bc2dbbb00079ae5158b76bed5cdd1d93054fff6874b43ef1289c75e4c9b911d69313cbc4e0abcab496b4ce2c83f238a2b30fc8210b75bcdcd0b774ac467962cc4389843f92f418b0718a87f17ae20f1790c7ff086746847e2217207cede6d2af2a58d7148128b2f86806b3be24ced787543219ae633ab66b7828c5bfd87571ee33ab89138401439491e3f3c6a4a56b4bf8a7d532ee9144977f6ac8fae105ab358e231f2cd9a216d68b0877161e158b14837fb1426f4a629f17ddd7bbf9019941ff9bbe3d6fd30d68dbd9e3b3cfb282bc08db959b660ed8f7ebc67714be3d00f8f1e2cbc9404069335265ce12996f7cb48c1f3221f7f892493e4711a6dbd79a0298e0e0b9936b06a3d08821f558f5738b05e2ead126157186dac58de8a7098291efacb6666b2dca73d422fbf6a09b30f3c30cc9e34faa453ef1d770f7008b7c54d644be9716b27aa40b67126130b61c29a254a578365216655e8a5c6955e72fb67e6f1796e499edcaa33e0b43bd172d9977deff713978907e12189743913c7c847", 0x1e0}]) 08:57:04 executing program 4: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000000)=0x3) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r2, 0x40047438, &(0x7f0000000180)=""/246) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r3, &(0x7f0000000040)=ANY=[], 0xfea7) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r3, 0x0) ioctl$PPPIOCSFLAGS1(r2, 0x40047459, &(0x7f00000000c0)) [ 1312.376047] IPVS: ftp: loaded support on port[0] = 21 08:57:06 executing program 2: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) r3 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000100)='/sys/kernel/debug/binder/transaction_log\x00', 0x0, 0x0) sendmsg$inet_sctp(r3, &(0x7f00000019c0)={&(0x7f0000000140)=@in6={0xa, 0x4e22, 0x7294, @mcast2, 0x10001}, 0x1c, &(0x7f00000018c0)=[{&(0x7f00000002c0)="b9912894a6ccce9187a3501c8725d28430c8310290a6add2ba793d26776d46a5b0c6e39187830cdc4f8251c977215072f81641532a40fd335a8daf5207dc60c058fd3dd128d0f9b392a82af7d65cd4eeae7b7bf66d03f0d1fddf25a1276fdb15833c66397342c636acbd2f8593dc6211c7033e45379e32efd7484c89efb4425d8daa8e22e113c2821f339a26ad749d173dd7b5edb388648871bb272f4cf2937af02c8d7e83341e86a8fe0c63513677d763cd69becb54304e38c28b", 0xbb}, {&(0x7f0000000380)="5d498dc75a1d2bcc32b82491a4c7e625ccd4101c71a28fb7a8fde4d63dc69a5c726e6e17757b1216a6b4bc507f67e3b55ff8705e1e11cda67c4c4eefa5a0b2b9a27f22f35c4ed430e2f7dec010b4725a6c6d0137cbb4e36837b54bfb469e8c294d2c25460be598a86116efdbd84d373d9739d73531821f842e79f338cc0695a76dfcdb44072fd6b1631ed99666318abfd4283b4da0072950a98853e198c3561aa3166833fe5243bfd5357a86ed5d991cecc6772d48a241c7dfd989", 0xbb}, {&(0x7f0000000440)="bc5e0112564dc991e0de82f6455d474065f598b7a14c3d8bf56265760356bf5d2fbcbd4840522047fab8732df034803650c93f02a41fd32b17c322576d474083adf0812cbd681cf96e717bdd6579271b994a025342bfb63da38a11ec85f96edbc602885c457f8d35f00cdda0c73b8d83d8e422aea40a098a1e1d01d207a5cdfc50958bc39f2157a128ebaed19df673659af2477cdfea0dd087baae232088e5cbceacec2987a125a517b15c010ae174826af5cd5d6dce919826b8a01c577fd2d2b0c080d435b71fc95a7fe909cf52c4cd68c8b4fc7d21", 0xd6}, {&(0x7f0000000540)="1516a39bc95b579f627a8db964e246d3f7e2312ca4fe20e8299ed4df99368ff9f0918fafb8ad64cbdfc19c8c5abfcf264da32f5cdb15e6f70cd0f92997a0f4d2dd12dc83f4b04e1cc6b5f1b4df1d655bef16f71e2d4e96ba04aa6bc4bb498e4beb8a700d16d5a8a52bdec23f0b59476edeface149cccd45f0f024930fcae5398a0615225b10217cfdca78ffdd0e19850660d311f1f201b506419c633fb6d41be55954f5bef6bda756b5e13da31898dbe3da4aad013091f32c76dee9009e022f55839e79428f92820f73bd4443a07399db973d2b5c44fccf19b80fc45f843b45dbfaf40d847a70f", 0xe7}, {&(0x7f0000000640)="3b74e349a4aecd6c5d6cd7e7b5870fb8f13254c8ed6fd6cc38f975f376860a48d6efd96fa9c9c90df463ab7dceb20cd07cc58518c5ae0bad2d2c73438a493655c31aea7ece375a06806b8806e4a1621899d2beddde5454c7976728e1aa8e6408ac3e31", 0x63}, {&(0x7f00000006c0)="36fceb73ea253a0ef1eef13f55e646b6057869d9b6f0a5b05e1b129ec20d8c4d202005f6fa736ec492f255f087ad9a0e4db8831a8472893260225896fa8d8e321b96a6b06cf2680c689448db3a5bd7fab6dc1088df7d50d80dac5a19544268f931838683db25bba3b46d0332ae5da150e19411f11196b60fb4f42b57ac034e9471369e60bc439372224a7d93fb77aac3aea6f8cc23a016cf7af7c67cd32e33c13a60777c66ca", 0xa6}, {&(0x7f0000000780)="8a07", 0x2}, {&(0x7f00000007c0)="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", 0x1000}, {&(0x7f00000017c0)="11b3b6472ab9242073cfda48ad3d56fa47a237f643a4889a21e40f4fae176a9151803aa5cbbf1414c3f1f4a2a7039c71567af863dadd98dd2d4d65f26e230ed5382bd18efba67f5bbb6f6de2e4c39eb81823583d7ab121cdb0445a355c2a324b338c547fdb56e9cb928c525e0da613c8e0b404da782b00b7c558c6e61b7dd5a4c08944e19d69171c20af68d8150987210c9a9d823fb38cb4c11e9ac35d437c2b34922f3729763069aa67ebbb97aa67eaeee183a6c82ea32413277a0db4d60dac187a", 0xc2}], 0x9, &(0x7f0000001980)=[@init={0x18, 0x84, 0x0, {0x3, 0x5f1, 0x40, 0x8}}], 0x18, 0x40000}, 0x20000000) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000000)=0x3) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r4 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r4, 0x40047438, &(0x7f0000000180)=""/246) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r5, &(0x7f0000000040)=ANY=[], 0xfea7) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r5, 0x0) ioctl$PPPIOCSFLAGS1(r4, 0x40047457, &(0x7f00000000c0)) 08:57:06 executing program 0: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000000)=0x3) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r3 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r3, 0x40047438, &(0x7f0000000180)=""/246) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r4, &(0x7f0000000040)=ANY=[], 0xfea7) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r4, 0x0) ioctl$PPPIOCSFLAGS1(r3, 0x4020744f, &(0x7f00000000c0)) 08:57:06 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_read_part_table(0x0, 0x2, &(0x7f0000002640)=[{0x0, 0x98a61fad, 0xfffffffffffffff7}, {&(0x7f0000001540)="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", 0x1e0}]) 08:57:06 executing program 1: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000000)=0x3) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r1, 0x40047438, &(0x7f0000000180)=""/246) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r2, &(0x7f0000000040)=ANY=[], 0xfea7) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r2, 0x0) ioctl$PPPIOCSFLAGS1(r1, 0x40047457, &(0x7f00000000c0)) 08:57:06 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x10, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000300)='.\x00', 0x0, 0x0) symlinkat(&(0x7f0000000040)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', r0, &(0x7f00000000c0)='./file0\x00') 08:57:06 executing program 4: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000000)=0x3) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r2, 0x40047438, &(0x7f0000000180)=""/246) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r3, &(0x7f0000000040)=ANY=[], 0xfea7) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r3, 0x0) ioctl$PPPIOCSFLAGS1(r2, 0x40047459, &(0x7f00000000c0)) [ 1314.500799] IPVS: ftp: loaded support on port[0] = 21 [ 1314.507873] IPVS: ftp: loaded support on port[0] = 21 [ 1314.523305] IPVS: ftp: loaded support on port[0] = 21 [ 1314.565493] IPVS: ftp: loaded support on port[0] = 21 08:57:06 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_read_part_table(0x0, 0x2, &(0x7f0000002640)=[{0x0, 0xad1fa698, 0xfffffffffffffff7}, {&(0x7f0000001540)="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", 0x1e0}]) 08:57:06 executing program 5: pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) socket$nl_netfilter(0x10, 0x3, 0xc) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000000)=ANY=[@ANYBLOB="700000000001190503000000004000000200000024000100140001"], 0x1}}, 0x0) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x0) 08:57:07 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_read_part_table(0x0, 0x2, &(0x7f0000002640)=[{0x0, 0xf5ffffff, 0xfffffffffffffff7}, {&(0x7f0000001540)="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", 0x1e0}]) [ 1314.930972] netlink: 56 bytes leftover after parsing attributes in process `syz-executor.5'. [ 1315.018324] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.5'. [ 1315.048647] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.5'. 08:57:07 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_read_part_table(0x0, 0x2, &(0x7f0000002640)=[{0x0, 0xf73f0000, 0xfffffffffffffff7}, {&(0x7f0000001540)="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", 0x1e0}]) [ 1315.261182] IPVS: ftp: loaded support on port[0] = 21 [ 1315.270268] IPVS: ftp: loaded support on port[0] = 21 08:57:07 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_read_part_table(0x0, 0x2, &(0x7f0000002640)=[{0x0, 0xfdffffff, 0xfffffffffffffff7}, {&(0x7f0000001540)="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", 0x1e0}]) 08:57:07 executing program 0: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000000)=0x3) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r3 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r3, 0x40047438, &(0x7f0000000180)=""/246) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r4, &(0x7f0000000040)=ANY=[], 0xfea7) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r4, 0x0) ioctl$PPPIOCSFLAGS1(r3, 0x4020744f, &(0x7f00000000c0)) [ 1315.596032] IPVS: ftp: loaded support on port[0] = 21 08:57:09 executing program 5: 08:57:09 executing program 4: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000000)=0x3) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r2, 0x40047438, &(0x7f0000000180)=""/246) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r3, &(0x7f0000000040)=ANY=[], 0xfea7) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r3, 0x0) ioctl$PPPIOCSFLAGS1(r2, 0x40047459, &(0x7f00000000c0)) 08:57:09 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_read_part_table(0x0, 0x2, &(0x7f0000002640)=[{0x0, 0xff0f0000, 0xfffffffffffffff7}, {&(0x7f0000001540)="c2ec123b097b69be3e42e60d3f03ff5b20b3406e8d7eebd2456f5388ad7135b73efb98088798c4d4506cd2295e60b5e9f9f2399833ad179a03e098e07644033f2d0e3c37a84095cdde0312f1d81191a92ccbe761424e7d3033a056d7d07c4c4bc2dbbb00079ae5158b76bed5cdd1d93054fff6874b43ef1289c75e4c9b911d69313cbc4e0abcab496b4ce2c83f238a2b30fc8210b75bcdcd0b774ac467962cc4389843f92f418b0718a87f17ae20f1790c7ff086746847e2217207cede6d2af2a58d7148128b2f86806b3be24ced787543219ae633ab66b7828c5bfd87571ee33ab89138401439491e3f3c6a4a56b4bf8a7d532ee9144977f6ac8fae105ab358e231f2cd9a216d68b0877161e158b14837fb1426f4a629f17ddd7bbf9019941ff9bbe3d6fd30d68dbd9e3b3cfb282bc08db959b660ed8f7ebc67714be3d00f8f1e2cbc9404069335265ce12996f7cb48c1f3221f7f892493e4711a6dbd79a0298e0e0b9936b06a3d08821f558f5738b05e2ead126157186dac58de8a7098291efacb6666b2dca73d422fbf6a09b30f3c30cc9e34faa453ef1d770f7008b7c54d644be9716b27aa40b67126130b61c29a254a578365216655e8a5c6955e72fb67e6f1796e499edcaa33e0b43bd172d9977deff713978907e12189743913c7c847", 0x1e0}]) 08:57:09 executing program 0: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000000)=0x3) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r3 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r3, 0x40047438, &(0x7f0000000180)=""/246) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r4, &(0x7f0000000040)=ANY=[], 0xfea7) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r4, 0x0) ioctl$PPPIOCSFLAGS1(r3, 0x4020744f, &(0x7f00000000c0)) 08:57:09 executing program 2: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000000)=0x3) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) write$binfmt_aout(r1, &(0x7f00000002c0)={{0x108, 0x1, 0x80, 0x173, 0xf3, 0x7f, 0x359, 0x6}, "58f2af63ffde0df07de65109e7a42e2324c231428473d8fb970533dd9645dcdca69f0f1ad2e327d854ced259fba90982758d4eba044d", [[], [], [], [], [], [], [], [], []]}, 0x956) r3 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r3, 0x40047438, &(0x7f0000000180)=""/246) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r4, &(0x7f0000000040)=ANY=[], 0xfea7) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r4, 0x0) ioctl$PPPIOCSFLAGS1(r3, 0x40047457, &(0x7f00000000c0)) 08:57:09 executing program 1: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000000)=0x3) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r1, 0x40047438, &(0x7f0000000180)=""/246) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r2, &(0x7f0000000040)=ANY=[], 0xfea7) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r2, 0x0) ioctl$PPPIOCSFLAGS1(r1, 0x40047457, &(0x7f00000000c0)) getsockopt$inet_sctp_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, &(0x7f0000000100), &(0x7f0000000140)=0xe) 08:57:09 executing program 5: [ 1317.357624] IPVS: ftp: loaded support on port[0] = 21 [ 1317.390454] IPVS: ftp: loaded support on port[0] = 21 [ 1317.396913] IPVS: ftp: loaded support on port[0] = 21 [ 1317.397855] IPVS: ftp: loaded support on port[0] = 21 08:57:09 executing program 5: 08:57:09 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_read_part_table(0x0, 0x2, &(0x7f0000002640)=[{0x0, 0xff3f0000, 0xfffffffffffffff7}, {&(0x7f0000001540)="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", 0x1e0}]) 08:57:09 executing program 5: 08:57:10 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_read_part_table(0x0, 0x2, &(0x7f0000002640)=[{0x0, 0xffffff7f, 0xfffffffffffffff7}, {&(0x7f0000001540)="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", 0x1e0}]) 08:57:10 executing program 5: 08:57:10 executing program 5: [ 1318.102774] IPVS: ftp: loaded support on port[0] = 21 [ 1318.231091] IPVS: ftp: loaded support on port[0] = 21 08:57:10 executing program 4: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000000)=0x3) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r2, 0x40047438, &(0x7f0000000180)=""/246) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r3, &(0x7f0000000040)=ANY=[], 0xfea7) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r3, 0x0) ioctl$PPPIOCSFLAGS1(r2, 0x40047459, &(0x7f00000000c0)) 08:57:10 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x200000000000011, 0x3, 0x0) write(r0, 0x0, 0x0) 08:57:10 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_read_part_table(0x0, 0x2, &(0x7f0000002640)=[{0x0, 0xffffff97, 0xfffffffffffffff7}, {&(0x7f0000001540)="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", 0x1e0}]) [ 1318.390913] IPVS: ftp: loaded support on port[0] = 21 08:57:10 executing program 0: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f0000000000)=0x3) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r2, 0x40047438, &(0x7f0000000180)=""/246) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r3, &(0x7f0000000040)=ANY=[], 0xfea7) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r3, 0x0) ioctl$PPPIOCSFLAGS1(r2, 0x4020744f, &(0x7f00000000c0)) [ 1318.842202] IPVS: ftp: loaded support on port[0] = 21 08:57:12 executing program 5: r0 = openat$adsp1(0xffffffffffffff9c, &(0x7f0000000180)='/dev/adsp1\x00', 0x0, 0x0) ioctl$SNDCTL_DSP_SPEED(r0, 0x80045005, &(0x7f0000000240)) 08:57:12 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_read_part_table(0x0, 0x2, &(0x7f0000002640)=[{0x0, 0xfffffff5, 0xfffffffffffffff7}, {&(0x7f0000001540)="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", 0x1e0}]) 08:57:12 executing program 2: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000000)=0x3) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r3 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) r4 = socket(0x1000000010, 0x80002, 0x0) sendmmsg$alg(r4, &(0x7f0000000200), 0x10efe10675dec16, 0x0) getsockopt$CAN_RAW_JOIN_FILTERS(r4, 0x65, 0x6, &(0x7f0000000100), &(0x7f0000000140)=0x4) ioctl$EVIOCGPROP(r3, 0x40047438, &(0x7f0000000180)=""/246) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r5, &(0x7f0000000040)=ANY=[], 0xfea7) r6 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ttyS3\x00', 0x0, 0x0) ioctl$TCSETS(r6, 0x5402, &(0x7f00000000c0)={0x0, 0x0, 0xf843, 0x0, 0x0, "79e9de3d80a657aa9481d73875106c5eba1ada"}) ioctl$KDENABIO(r6, 0x4b36) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r5, 0x0) ioctl$PPPIOCSFLAGS1(r3, 0x40047457, &(0x7f00000000c0)) 08:57:12 executing program 4: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000000)=0x3) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r2, 0x40047438, &(0x7f0000000180)=""/246) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r3, &(0x7f0000000040)=ANY=[], 0xfea7) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r3, 0x0) ioctl$PPPIOCSFLAGS1(r2, 0x40047459, &(0x7f00000000c0)) 08:57:12 executing program 0: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f0000000000)=0x3) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r2, 0x40047438, &(0x7f0000000180)=""/246) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r3, &(0x7f0000000040)=ANY=[], 0xfea7) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r3, 0x0) ioctl$PPPIOCSFLAGS1(r2, 0x4020744f, &(0x7f00000000c0)) 08:57:12 executing program 1: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000000)=0x3) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r1, 0x40047438, &(0x7f0000000180)=""/246) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r3, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000340)={0x6c, 0x0, 0x1, 0x409, 0x0, 0x0, {}, [@CTA_TUPLE_ORIG={0x24, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @broadcast}, {0x8, 0x2, @dev}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_SEQ_ADJ_REPLY={0x34, 0x10, 0x0, 0x1, [@CTA_SEQADJ_OFFSET_AFTER={0x8, 0x3, 0x1, 0x0, 0x6e22}, @CTA_SEQADJ_CORRECTION_POS={0x8, 0x1, 0x1, 0x0, 0x2}, @CTA_SEQADJ_OFFSET_BEFORE={0x8, 0x2, 0x1, 0x0, 0x2}, @CTA_SEQADJ_OFFSET_BEFORE={0x8, 0x2, 0x1, 0x0, 0x8}, @CTA_SEQADJ_CORRECTION_POS={0x8, 0x1, 0x1, 0x0, 0x5}, @CTA_SEQADJ_OFFSET_AFTER={0x8, 0x3, 0x1, 0x0, 0x4}]}]}, 0x6c}}, 0x0) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f0000000100)='veth1_to_batadv\x00', 0x10) write$binfmt_script(r2, &(0x7f0000000040)=ANY=[], 0xfea7) r4 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ttyS3\x00', 0x0, 0x0) ioctl$TCSETS(r4, 0x5402, &(0x7f00000000c0)={0x0, 0x0, 0xf843, 0x0, 0x0, "79e9de3d80a657aa9481d73875106c5eba1ada"}) ioctl$TIOCPKT(r4, 0x5420, &(0x7f00000002c0)=0x3) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r2, 0x0) ioctl$PPPIOCSFLAGS1(r1, 0x40047457, &(0x7f00000000c0)) [ 1320.396681] IPVS: ftp: loaded support on port[0] = 21 [ 1320.399123] IPVS: ftp: loaded support on port[0] = 21 [ 1320.403400] IPVS: ftp: loaded support on port[0] = 21 08:57:12 executing program 5: r0 = syz_open_dev$sndpcmc(&(0x7f0000000080)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) ioctl$SNDRV_PCM_IOCTL_HW_PARAMS(r0, 0xc2604111, 0x0) [ 1320.442773] IPVS: ftp: loaded support on port[0] = 21 08:57:12 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_read_part_table(0x0, 0x2, &(0x7f0000002640)=[{0x0, 0xfffffffd, 0xfffffffffffffff7}, {&(0x7f0000001540)="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", 0x1e0}]) 08:57:12 executing program 5: r0 = socket$nl_rdma(0x10, 0x3, 0x14) sendmsg$RDMA_NLDEV_CMD_DELLINK(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f00000004c0)={0x10, 0x1404, 0xc886c9300fee7475}, 0x10}}, 0x0) 08:57:13 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_read_part_table(0x0, 0x2, &(0x7f0000002640)=[{0x0, 0x1000000000, 0xfffffffffffffff7}, {&(0x7f0000001540)="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", 0x1e0}]) 08:57:13 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_CPUID2(r2, 0xc008ae88, &(0x7f0000000080)={0x1, 0x0, [{0xc001102c}]}) 08:57:13 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_read_part_table(0x0, 0x2, &(0x7f0000002640)=[{0x0, 0x1000000000000, 0xfffffffffffffff7}, {&(0x7f0000001540)="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", 0x1e0}]) 08:57:13 executing program 5: r0 = mq_open(&(0x7f0000000000)='eth0\x00', 0x42, 0x0, 0x0) r1 = epoll_create(0x20) openat$zero(0xffffffffffffff9c, &(0x7f0000000200)='/dev/zero\x00', 0x420746, 0x0) prctl$PR_TASK_PERF_EVENTS_DISABLE(0x1f) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000080)) r2 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, 0xffffffffffffffff, &(0x7f0000b82000)) sendmmsg$unix(0xffffffffffffffff, &(0x7f00000bd000), 0x80, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r4, 0x1, r3, &(0x7f0000b82000)) clock_gettime(0x0, &(0x7f0000000240)) mq_timedsend(r0, 0x0, 0x0, 0x0, 0x0) [ 1321.248581] IPVS: ftp: loaded support on port[0] = 21 08:57:13 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_read_part_table(0x0, 0x2, &(0x7f0000002640)=[{0x0, 0x2000000000000, 0xfffffffffffffff7}, {&(0x7f0000001540)="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", 0x1e0}]) [ 1321.288152] IPVS: ftp: loaded support on port[0] = 21 08:57:13 executing program 2: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000000)=0x3) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r3 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r3, 0x40047438, &(0x7f0000000180)=""/246) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r4, &(0x7f0000000040)=ANY=[], 0xfea7) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r5, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000000)={0x3c, 0x0, 0x1, 0x409, 0x0, 0x0, {}, [@CTA_TUPLE_ORIG={0x24, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @broadcast}, {0x8, 0x2, @dev}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_SEQ_ADJ_REPLY={0x4}]}, 0x3c}}, 0x0) ioctl$FS_IOC_RESVSP(r5, 0x40305828, &(0x7f0000000100)={0x0, 0x3, 0x7fffffff, 0x80000001}) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r4, 0x0) ioctl$PPPIOCSFLAGS1(r3, 0x40047457, &(0x7f00000000c0)) 08:57:13 executing program 5: syz_read_part_table(0x0, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a100000ff45ac0000000000200008004c0000000000024000ffffff82000000e100000088770072003007004200000000000000008000da55aa", 0x40, 0x1c0}]) 08:57:13 executing program 4: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000000)=0x3) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r2, 0x40047438, &(0x7f0000000180)=""/246) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r3, &(0x7f0000000040)=ANY=[], 0xfea7) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r3, 0x0) ioctl$PPPIOCSFLAGS1(r2, 0x40047459, &(0x7f00000000c0)) [ 1321.795775] IPVS: ftp: loaded support on port[0] = 21 [ 1321.807799] IPVS: ftp: loaded support on port[0] = 21 [ 1321.845489] ldm_validate_privheads(): Disk read failed. [ 1321.862345] loop5: p2 p3 p4 [ 1321.879303] loop5: partition table partially beyond EOD, truncated [ 1321.914370] loop5: p2 start 76 is beyond EOD, truncated [ 1321.948013] loop5: p3 start 225 is beyond EOD, truncated [ 1321.980212] loop5: p4 size 3657465856 extends beyond EOD, truncated [ 1322.306634] IPVS: ftp: loaded support on port[0] = 21 08:57:15 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_read_part_table(0x0, 0x2, &(0x7f0000002640)=[{0x0, 0x8000000000000, 0xfffffffffffffff7}, {&(0x7f0000001540)="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", 0x1e0}]) 08:57:15 executing program 0: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f0000000000)=0x3) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r2, 0x40047438, &(0x7f0000000180)=""/246) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r3, &(0x7f0000000040)=ANY=[], 0xfea7) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r3, 0x0) ioctl$PPPIOCSFLAGS1(r2, 0x4020744f, &(0x7f00000000c0)) 08:57:15 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$fou(&(0x7f0000000080)='fou\x00') r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$FOU_CMD_ADD(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000400)={0x38, r3, 0x209, 0x0, 0x0, {}, [@FOU_ATTR_AF={0x5, 0x2, 0xa}, @FOU_ATTR_LOCAL_V6={0x14, 0x7, @loopback}, @FOU_ATTR_IFINDEX={0x8, 0xb, r5}]}, 0x38}}, 0x0) 08:57:15 executing program 4: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000000)=0x3) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r3 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r3, 0x40047438, &(0x7f0000000180)=""/246) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r4, &(0x7f0000000040)=ANY=[], 0xfea7) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r4, 0x0) ioctl$PPPIOCSFLAGS1(r3, 0x40047459, &(0x7f00000000c0)) 08:57:15 executing program 2: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000000)=0x3) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r3 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r3, 0x40047438, &(0x7f0000000180)=""/246) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r4, &(0x7f0000000040)=ANY=[], 0xfea7) mmap(&(0x7f0000261000/0x3000)=nil, 0x3000, 0x1, 0x12, r4, 0x0) ioctl$PPPIOCSFLAGS1(r3, 0x40047457, &(0x7f00000000c0)=0x406080) [ 1323.766180] IPVS: ftp: loaded support on port[0] = 21 [ 1323.775947] IPVS: ftp: loaded support on port[0] = 21 [ 1323.778382] IPVS: ftp: loaded support on port[0] = 21 08:57:15 executing program 5: openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x0, 0x0) openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cachefiles\x00', 0x0, 0x0) setsockopt$netlink_NETLINK_CAP_ACK(0xffffffffffffffff, 0x10e, 0xa, 0x0, 0x0) socket(0x1, 0x1, 0x0) syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00') r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clock_gettime(0x0, &(0x7f0000000080)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff}, &(0x7f0000000200)={0x0, r2+30000000}, 0x0) 08:57:16 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_read_part_table(0x0, 0x2, &(0x7f0000002640)=[{0x0, 0x10000000000000, 0xfffffffffffffff7}, {&(0x7f0000001540)="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", 0x1e0}]) 08:57:16 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$TIOCL_UNBLANKSCREEN(r1, 0x541c, 0x0) r2 = socket$inet(0x2, 0x2000080001, 0x84) socketpair$unix(0x1, 0x2, 0x0, 0x0) socket$inet(0x2, 0x0, 0x0) setsockopt$inet_sctp_SCTP_MAXSEG(r2, 0x84, 0xd, &(0x7f00000000c0), 0x4) 08:57:16 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_read_part_table(0x0, 0x2, &(0x7f0000002640)=[{0x0, 0x100000000000000, 0xfffffffffffffff7}, {&(0x7f0000001540)="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", 0x1e0}]) [ 1324.373229] sctp: [Deprecated]: syz-executor.5 (pid 21726) Use of int in maxseg socket option. [ 1324.373229] Use struct sctp_assoc_value instead 08:57:16 executing program 4: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000000)=0x3) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r3 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r3, 0x40047438, &(0x7f0000000180)=""/246) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r4, &(0x7f0000000040)=ANY=[], 0xfea7) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r4, 0x0) ioctl$PPPIOCSFLAGS1(r3, 0x40047459, &(0x7f00000000c0)) 08:57:16 executing program 0: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r2, 0x5423, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r3 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r3, 0x40047438, &(0x7f0000000180)=""/246) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r4, &(0x7f0000000040)=ANY=[], 0xfea7) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r4, 0x0) ioctl$PPPIOCSFLAGS1(r3, 0x4020744f, &(0x7f00000000c0)) [ 1324.570637] IPVS: ftp: loaded support on port[0] = 21 08:57:16 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_VAPIC_ADDR(r5, 0x4008ae93, &(0x7f0000000000)=0x2) ioctl$KVM_SET_REGS(r5, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x62160555]}) ioctl$KVM_RUN(r5, 0xae80, 0x0) ioctl$KVM_SET_LAPIC(r5, 0x4400ae8f, &(0x7f0000000780)={"54abec7338595f275a2292c45ff078f1cbbf04241d1c3421ec9bf61b2221bc18246e74f0001e36735c2ad340bf94ad2a35cfc5d0953a3b2bfd41050051c6765447395415a9b05dffc9957e300168dc46f8377130fd28e50a805a6005ab6167da65430e3fcc214d7893c6d91026b5f5192f346a367dbc8ae5df0fd099b4e7a6dadd7f555b203f504eda86e0e8d8c5f319604db5a686750d03bf3a67210063e9a17ca0a1ccd80a7d57cb034b828b784b14c9e5dd70ca358c6819c3df7f4443dced6d9a56bb54eac6538cc61c5e9ef3bda9feeb62cbe4f0e1d1c7f6cbbcada85dbb247b0551773f0734e6f4733db49c22e497557c2f74bfa0e4af9b6228643f180d9f9e1e2bcdf0c35a5b8c388e728b574a066e190800db7b42573f534b8f60e8f756dc4d8dec7ad58b0474fc002851b265cc72099d43115828ac723e73009150fcf7196b4133e2988d4b0fc459e57293afef8837fa0d5d24b984a95cb4bdc48fc9c6e73ebee6b1a3239b2c0eef7c751ccb9f2dcdc3c69173db48df6b5d6e59e6465283de675a8d053e7f3abf86f43006a5a0c6225a589c12583e767b9d817f17bf690444a18e6f8a35b2cb4b60c191efbb16393560b568ee6c82bed918aa4a34b575ac9966b395aafa7fc3b7f467b484eb7d2617e0a240e8acbc2a7e02b650f7d1be52f462be20faa32dd88eb041e2c46b24ed7ab79c10f05296f5461f4ebda25dd7b9908da4be62e31c7ba45e5b30b7556a062999f43d2dbb9995d2ffff000000000000ce45caa470933c0906807da75cd38533d8f16d875452c543b259e78215011d2be638eab023513cfe0693d3107e17cfc87e038fc7d1db232d15307fe1d2a818d0a4bde2c53d221111ffa646514dd1fbd3c011b058f79c6fb0a31857ea309018bf72180a434611195c975cf5e285777231b6f158ecaf212183600379fe9762277c13cb6cde9cc0178b883fd1f210180e599f8eb33d33a9ff0f70db1de485b2f2434f2707bf9a54bb6aff687c060000005087f4d53a57adf7c97a06dcc61d7733a83dc505d57d8d5c83bf83e345a979307d708756c3f0f1c53a28883b665fda239019f32fc6f07d700d05023e9ef5b66d4b6be57ffd6fe39703fd4eed61535568f47ee51eff8290618e8387d0ba0d00c5bc4585d2d85688af46bb1da08bf42901634cb10e6b03ee276c16980090b59f3c57b428ae0a7ede758c781e2a5a8585e903adde0a0a281a7779a59067d82985655d9138b75042970e11aee4b95b8bcf232473767cca0139b2c2fb40045c6e031950c314015db2524c3f2fe941f249d158a44aa14774e61b2ee185bdfea8f317e440a39533c6db7ffd3c2b626c1e1eab05cebc59526b016cc6a0e4b766c3f00f619d366e5a4378bc15f805a6fb8c94002000"}) ioctl$KVM_RUN(r5, 0xae80, 0x0) 08:57:16 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_read_part_table(0x0, 0x2, &(0x7f0000002640)=[{0x0, 0x200000000000000, 0xfffffffffffffff7}, {&(0x7f0000001540)="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", 0x1e0}]) [ 1324.711993] IPVS: ftp: loaded support on port[0] = 21 [ 1324.744370] IPVS: ftp: loaded support on port[0] = 21 08:57:17 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_read_part_table(0x0, 0x2, &(0x7f0000002640)=[{0x0, 0x300000000000000, 0xfffffffffffffff7}, {&(0x7f0000001540)="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", 0x1e0}]) 08:57:17 executing program 5: epoll_create1(0x0) pipe(0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) pipe(0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) 08:57:17 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_read_part_table(0x0, 0x2, &(0x7f0000002640)=[{0x0, 0x400000000000000, 0xfffffffffffffff7}, {&(0x7f0000001540)="c2ec123b097b69be3e42e60d3f03ff5b20b3406e8d7eebd2456f5388ad7135b73efb98088798c4d4506cd2295e60b5e9f9f2399833ad179a03e098e07644033f2d0e3c37a84095cdde0312f1d81191a92ccbe761424e7d3033a056d7d07c4c4bc2dbbb00079ae5158b76bed5cdd1d93054fff6874b43ef1289c75e4c9b911d69313cbc4e0abcab496b4ce2c83f238a2b30fc8210b75bcdcd0b774ac467962cc4389843f92f418b0718a87f17ae20f1790c7ff086746847e2217207cede6d2af2a58d7148128b2f86806b3be24ced787543219ae633ab66b7828c5bfd87571ee33ab89138401439491e3f3c6a4a56b4bf8a7d532ee9144977f6ac8fae105ab358e231f2cd9a216d68b0877161e158b14837fb1426f4a629f17ddd7bbf9019941ff9bbe3d6fd30d68dbd9e3b3cfb282bc08db959b660ed8f7ebc67714be3d00f8f1e2cbc9404069335265ce12996f7cb48c1f3221f7f892493e4711a6dbd79a0298e0e0b9936b06a3d08821f558f5738b05e2ead126157186dac58de8a7098291efacb6666b2dca73d422fbf6a09b30f3c30cc9e34faa453ef1d770f7008b7c54d644be9716b27aa40b67126130b61c29a254a578365216655e8a5c6955e72fb67e6f1796e499edcaa33e0b43bd172d9977deff713978907e12189743913c7c847", 0x1e0}]) 08:57:19 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_read_part_table(0x0, 0x2, &(0x7f0000002640)=[{0x0, 0x500000000000000, 0xfffffffffffffff7}, {&(0x7f0000001540)="c2ec123b097b69be3e42e60d3f03ff5b20b3406e8d7eebd2456f5388ad7135b73efb98088798c4d4506cd2295e60b5e9f9f2399833ad179a03e098e07644033f2d0e3c37a84095cdde0312f1d81191a92ccbe761424e7d3033a056d7d07c4c4bc2dbbb00079ae5158b76bed5cdd1d93054fff6874b43ef1289c75e4c9b911d69313cbc4e0abcab496b4ce2c83f238a2b30fc8210b75bcdcd0b774ac467962cc4389843f92f418b0718a87f17ae20f1790c7ff086746847e2217207cede6d2af2a58d7148128b2f86806b3be24ced787543219ae633ab66b7828c5bfd87571ee33ab89138401439491e3f3c6a4a56b4bf8a7d532ee9144977f6ac8fae105ab358e231f2cd9a216d68b0877161e158b14837fb1426f4a629f17ddd7bbf9019941ff9bbe3d6fd30d68dbd9e3b3cfb282bc08db959b660ed8f7ebc67714be3d00f8f1e2cbc9404069335265ce12996f7cb48c1f3221f7f892493e4711a6dbd79a0298e0e0b9936b06a3d08821f558f5738b05e2ead126157186dac58de8a7098291efacb6666b2dca73d422fbf6a09b30f3c30cc9e34faa453ef1d770f7008b7c54d644be9716b27aa40b67126130b61c29a254a578365216655e8a5c6955e72fb67e6f1796e499edcaa33e0b43bd172d9977deff713978907e12189743913c7c847", 0x1e0}]) 08:57:19 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000014c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x222}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xe80, 0x3f00, &(0x7f00000000c0)="b9ff03c6630d698cb89e0bf088ca1fffffff0e000000638877fbac141429e6", 0x0, 0x2f, 0x0, 0x0, 0xfffffffffffffe2a}, 0x28) 08:57:19 executing program 0: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r2, 0x5423, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r3 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r3, 0x40047438, &(0x7f0000000180)=""/246) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r4, &(0x7f0000000040)=ANY=[], 0xfea7) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r4, 0x0) ioctl$PPPIOCSFLAGS1(r3, 0x4020744f, &(0x7f00000000c0)) 08:57:19 executing program 4: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000000)=0x3) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r3 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r3, 0x40047438, &(0x7f0000000180)=""/246) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r4, &(0x7f0000000040)=ANY=[], 0xfea7) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r4, 0x0) ioctl$PPPIOCSFLAGS1(r3, 0x40047459, &(0x7f00000000c0)) 08:57:19 executing program 1: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000000)=0x3) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) r2 = socket(0x1000000010, 0x80002, 0x0) sendmmsg$alg(r2, &(0x7f0000000200), 0x10efe10675dec16, 0x0) r3 = socket$can_bcm(0x1d, 0x2, 0x2) connect(r3, &(0x7f0000000740)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80) r4 = socket(0x10, 0x80803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$can_bcm(r3, &(0x7f0000000180)={&(0x7f0000000080)={0x1d, r5}, 0x10, &(0x7f0000000140)={&(0x7f00000000c0)={0x0, 0xe0, 0x0, {0x0, 0x2710}, {0x77359400}, {}, 0x1, @can={{}, 0x0, 0x0, 0x0, 0x0, "a4ef08f666c5d148"}}, 0x48}}, 0x0) sendmsg$NL80211_CMD_DEL_MPATH(r2, &(0x7f0000000300)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000340)=ANY=[@ANYBLOB='8\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="04002dbd7000ffdbdf25540000000c0099000300000015000000080001000300000008000300c3ee99390df44b68874bc193dd00ea9ae0e546f8917280b940fc3f0b6e2c0682ba99770f12af492d341386c17d9e98545dfb18fd77dd885f8f8730fb227a44466635682911d687bdde63a303ff50b7c5c2f23f0d19763233b727b54dbd82f8fe2b647f76994e34254f7d90639b0750c877c3", @ANYRES32=r5, @ANYBLOB="0800010003000000"], 0x38}, 0x1, 0x0, 0x0, 0x80}, 0x10) ioctl$EVIOCGPROP(r1, 0x40047438, &(0x7f0000000180)=""/246) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r6, &(0x7f0000000040)=ANY=[], 0xfea7) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r6, 0x0) ioctl$PPPIOCSFLAGS1(r1, 0x40047457, &(0x7f00000000c0)) 08:57:19 executing program 2: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000000)=0x3) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r3 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r3, 0x40047438, &(0x7f0000000180)=""/246) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r4, &(0x7f0000000040)=ANY=[], 0xfea7) fcntl$setflags(r0, 0x2, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r4, 0x0) ioctl$PPPIOCSFLAGS1(r3, 0x40047457, &(0x7f00000000c0)) r5 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r5, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(0xffffffffffffffff, 0x84, 0x71, &(0x7f00000000c0)={r6}, &(0x7f0000000080)=0x18) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000040)={r6, 0xfffffffe}, &(0x7f0000000080)=0x8) setsockopt$inet_sctp_SCTP_AUTH_DEACTIVATE_KEY(0xffffffffffffffff, 0x84, 0x23, &(0x7f0000000100)={r6, 0x8}, 0x8) [ 1327.303621] IPVS: ftp: loaded support on port[0] = 21 [ 1327.327746] IPVS: ftp: loaded support on port[0] = 21 [ 1327.360870] IPVS: ftp: loaded support on port[0] = 21 [ 1327.433575] IPVS: ftp: loaded support on port[0] = 21 08:57:19 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_CPUID2(r2, 0xc008ae88, &(0x7f0000000080)={0x1, 0x0, [{0xc0010000}]}) 08:57:19 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_read_part_table(0x0, 0x2, &(0x7f0000002640)=[{0x0, 0x600000000000000, 0xfffffffffffffff7}, {&(0x7f0000001540)="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", 0x1e0}]) 08:57:20 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_read_part_table(0x0, 0x2, &(0x7f0000002640)=[{0x0, 0x700000000000000, 0xfffffffffffffff7}, {&(0x7f0000001540)="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", 0x1e0}]) 08:57:20 executing program 5: syz_read_part_table(0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0b1000000045ac00000000a6895200000000000000024000ffffff820000ebbeb725008877", 0x2b, 0x1c0}]) 08:57:20 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_read_part_table(0x0, 0x2, &(0x7f0000002640)=[{0x0, 0x900000000000000, 0xfffffffffffffff7}, {&(0x7f0000001540)="c2ec123b097b69be3e42e60d3f03ff5b20b3406e8d7eebd2456f5388ad7135b73efb98088798c4d4506cd2295e60b5e9f9f2399833ad179a03e098e07644033f2d0e3c37a84095cdde0312f1d81191a92ccbe761424e7d3033a056d7d07c4c4bc2dbbb00079ae5158b76bed5cdd1d93054fff6874b43ef1289c75e4c9b911d69313cbc4e0abcab496b4ce2c83f238a2b30fc8210b75bcdcd0b774ac467962cc4389843f92f418b0718a87f17ae20f1790c7ff086746847e2217207cede6d2af2a58d7148128b2f86806b3be24ced787543219ae633ab66b7828c5bfd87571ee33ab89138401439491e3f3c6a4a56b4bf8a7d532ee9144977f6ac8fae105ab358e231f2cd9a216d68b0877161e158b14837fb1426f4a629f17ddd7bbf9019941ff9bbe3d6fd30d68dbd9e3b3cfb282bc08db959b660ed8f7ebc67714be3d00f8f1e2cbc9404069335265ce12996f7cb48c1f3221f7f892493e4711a6dbd79a0298e0e0b9936b06a3d08821f558f5738b05e2ead126157186dac58de8a7098291efacb6666b2dca73d422fbf6a09b30f3c30cc9e34faa453ef1d770f7008b7c54d644be9716b27aa40b67126130b61c29a254a578365216655e8a5c6955e72fb67e6f1796e499edcaa33e0b43bd172d9977deff713978907e12189743913c7c847", 0x1e0}]) [ 1328.114898] Dev loop5: unable to read RDB block 1 [ 1328.133258] loop5: unable to read partition table [ 1328.159374] loop5: partition table beyond EOD, truncated [ 1328.172269] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=21868 comm=syz-executor.1 [ 1328.181312] loop_reread_partitions: partition scan of loop5 () failed (rc=-5) 08:57:20 executing program 0: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r2, 0x5423, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r3 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r3, 0x40047438, &(0x7f0000000180)=""/246) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r4, &(0x7f0000000040)=ANY=[], 0xfea7) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r4, 0x0) ioctl$PPPIOCSFLAGS1(r3, 0x4020744f, &(0x7f00000000c0)) 08:57:20 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_read_part_table(0x0, 0x2, &(0x7f0000002640)=[{0x0, 0xd00000000000000, 0xfffffffffffffff7}, {&(0x7f0000001540)="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", 0x1e0}]) [ 1328.318767] Dev loop5: unable to read RDB block 1 [ 1328.329907] loop5: unable to read partition table [ 1328.349884] loop5: partition table beyond EOD, truncated 08:57:20 executing program 4: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000000)=0x3) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r3 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r3, 0x40047438, &(0x7f0000000180)=""/246) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r4, &(0x7f0000000040)=ANY=[], 0xfea7) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r4, 0x0) ioctl$PPPIOCSFLAGS1(r3, 0x40047459, &(0x7f00000000c0)) [ 1328.387938] loop_reread_partitions: partition scan of loop5 () failed (rc=-5) 08:57:20 executing program 5: request_key(&(0x7f0000000000)='user\x00', &(0x7f00000000c0)={'syz', 0x2}, 0x0, 0xfffffffffffffffd) 08:57:20 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_read_part_table(0x0, 0x2, &(0x7f0000002640)=[{0x0, 0x1903000000000000, 0xfffffffffffffff7}, {&(0x7f0000001540)="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", 0x1e0}]) [ 1328.940203] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=22029 comm=syz-executor.1 08:57:22 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_read_part_table(0x0, 0x2, &(0x7f0000002640)=[{0x0, 0x1f00000000000000, 0xfffffffffffffff7}, {&(0x7f0000001540)="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", 0x1e0}]) 08:57:22 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={0x0, 0x50}}, 0x0) r3 = socket(0x10, 0x8000000000000003, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x2, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r7, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000540)=ANY=[@ANYBLOB="4800000024000705fcffffffffffffff00001f00", @ANYRES32=r7, @ANYBLOB="00000400f1ffffff0000000008000100687462001c0002001800020003"], 0x48}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000680)=@delchain={0x30, 0x28, 0xd39, 0x0, 0x0, {0x0, 0x0, 0x0, r7, {}, {0x0, 0xffff}}, [@filter_kind_options=@f_bpf={{0x8, 0x1, 'bpf\x00'}, {0x4}}]}, 0x30}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000080), 0xc, 0x0}, 0x0) sendmmsg(r3, &(0x7f0000000000), 0x40000000000024a, 0x0) 08:57:22 executing program 2: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000000)=0x3) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r3 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r3, 0x40047438, &(0x7f0000000180)=""/246) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r5 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r5, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(0xffffffffffffffff, 0x84, 0x71, &(0x7f00000000c0)={r6}, &(0x7f0000000080)=0x18) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000040)={r6, 0xfffffffe}, &(0x7f0000000080)=0x8) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f0000000100)={r6, 0x7}, 0x8) write$binfmt_script(r4, &(0x7f0000000040)=ANY=[], 0xfea7) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r4, 0x0) ioctl$PPPIOCSFLAGS1(r3, 0x40047457, &(0x7f00000000c0)) 08:57:22 executing program 0: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000000)) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r3 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r3, 0x40047438, &(0x7f0000000180)=""/246) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r4, &(0x7f0000000040)=ANY=[], 0xfea7) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r4, 0x0) ioctl$PPPIOCSFLAGS1(r3, 0x4020744f, &(0x7f00000000c0)) 08:57:22 executing program 4: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000000)=0x3) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r3 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r3, 0x40047438, &(0x7f0000000180)=""/246) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r4, &(0x7f0000000040)=ANY=[], 0xfea7) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r4, 0x0) ioctl$PPPIOCSFLAGS1(r3, 0x40047459, &(0x7f00000000c0)) 08:57:22 executing program 1: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000000)=0x3) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r1, 0x40047438, &(0x7f0000000180)=""/246) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(0xffffffffffffffff, 0x6, 0x14, &(0x7f0000000100)=0x1, 0x4) write$binfmt_script(r2, &(0x7f0000000040)=ANY=[], 0xfea7) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r2, 0x0) ioctl$PPPIOCSFLAGS1(r1, 0x40047457, &(0x7f00000000c0)) [ 1330.025733] IPVS: ftp: loaded support on port[0] = 21 [ 1330.041769] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.5'. [ 1330.046245] IPVS: ftp: loaded support on port[0] = 21 [ 1330.056521] IPVS: ftp: loaded support on port[0] = 21 [ 1330.104018] IPVS: ftp: loaded support on port[0] = 21 08:57:22 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_read_part_table(0x0, 0x2, &(0x7f0000002640)=[{0x0, 0x2000000000000000, 0xfffffffffffffff7}, {&(0x7f0000001540)="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", 0x1e0}]) [ 1330.254168] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=22061 comm=syz-executor.5 08:57:22 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$netlink(0x10, 0x3, 0xf) r3 = syz_genetlink_get_family_id$devlink(&(0x7f0000000140)='devlink\x00') sendmsg$DEVLINK_CMD_PORT_GET(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)={0x14, r3, 0x5ab668bdb99ca645}, 0x14}}, 0x0) 08:57:22 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_read_part_table(0x0, 0x2, &(0x7f0000002640)=[{0x0, 0x2300000000000000, 0xfffffffffffffff7}, {&(0x7f0000001540)="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", 0x1e0}]) 08:57:22 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_CPUID2(r2, 0xc008ae88, &(0x7f0000000080)={0x1, 0x0, [{0xc001102a}]}) [ 1330.671206] IPVS: ftp: loaded support on port[0] = 21 [ 1330.738397] IPVS: ftp: loaded support on port[0] = 21 08:57:23 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_read_part_table(0x0, 0x2, &(0x7f0000002640)=[{0x0, 0x3f00000000000000, 0xfffffffffffffff7}, {&(0x7f0000001540)="c2ec123b097b69be3e42e60d3f03ff5b20b3406e8d7eebd2456f5388ad7135b73efb98088798c4d4506cd2295e60b5e9f9f2399833ad179a03e098e07644033f2d0e3c37a84095cdde0312f1d81191a92ccbe761424e7d3033a056d7d07c4c4bc2dbbb00079ae5158b76bed5cdd1d93054fff6874b43ef1289c75e4c9b911d69313cbc4e0abcab496b4ce2c83f238a2b30fc8210b75bcdcd0b774ac467962cc4389843f92f418b0718a87f17ae20f1790c7ff086746847e2217207cede6d2af2a58d7148128b2f86806b3be24ced787543219ae633ab66b7828c5bfd87571ee33ab89138401439491e3f3c6a4a56b4bf8a7d532ee9144977f6ac8fae105ab358e231f2cd9a216d68b0877161e158b14837fb1426f4a629f17ddd7bbf9019941ff9bbe3d6fd30d68dbd9e3b3cfb282bc08db959b660ed8f7ebc67714be3d00f8f1e2cbc9404069335265ce12996f7cb48c1f3221f7f892493e4711a6dbd79a0298e0e0b9936b06a3d08821f558f5738b05e2ead126157186dac58de8a7098291efacb6666b2dca73d422fbf6a09b30f3c30cc9e34faa453ef1d770f7008b7c54d644be9716b27aa40b67126130b61c29a254a578365216655e8a5c6955e72fb67e6f1796e499edcaa33e0b43bd172d9977deff713978907e12189743913c7c847", 0x1e0}]) 08:57:23 executing program 5: syz_read_part_table(0x0, 0x3, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201630000000a100000ff45ac0000ffffff810008004c0000000000024000ffffff82000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) 08:57:23 executing program 4: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000000)=0x3) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r3 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r3, 0x40047438, &(0x7f0000000180)=""/246) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r4, &(0x7f0000000040)=ANY=[], 0xfea7) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r4, 0x0) ioctl$PPPIOCSFLAGS1(r3, 0x40047459, &(0x7f00000000c0)) [ 1331.124543] loop5: p1 p2 p3 p4 [ 1331.134631] loop5: partition table partially beyond EOD, truncated [ 1331.172233] IPVS: ftp: loaded support on port[0] = 21 [ 1331.178352] loop5: p1 start 4106 is beyond EOD, truncated [ 1331.192176] loop5: p2 start 76 is beyond EOD, truncated 08:57:23 executing program 0: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000000)) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r3 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r3, 0x40047438, &(0x7f0000000180)=""/246) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r4, &(0x7f0000000040)=ANY=[], 0xfea7) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r4, 0x0) ioctl$PPPIOCSFLAGS1(r3, 0x4020744f, &(0x7f00000000c0)) [ 1331.257808] loop5: p3 start 225 is beyond EOD, truncated [ 1331.314652] loop5: p4 size 3657465856 extends beyond EOD, truncated [ 1331.404333] IPVS: ftp: loaded support on port[0] = 21 08:57:23 executing program 2: unshare(0x40000000) r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vsock\x00', 0x8000, 0x0) mmap(&(0x7f0000a4e000/0x2000)=nil, 0x2000, 0x0, 0x4000010, r0, 0x2e587000) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r3, 0x5423, &(0x7f0000000000)=0x3) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41100, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r4 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r4, 0x40047438, &(0x7f0000000180)=""/246) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r5, &(0x7f0000000040)=ANY=[], 0xfea7) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r5, 0x0) ioctl$PPPIOCSFLAGS1(r4, 0x40047457, &(0x7f00000000c0)) 08:57:23 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_read_part_table(0x0, 0x2, &(0x7f0000002640)=[{0x0, 0x4000000000000000, 0xfffffffffffffff7}, {&(0x7f0000001540)="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", 0x1e0}]) 08:57:23 executing program 5: openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) request_key(0x0, 0x0, 0x0, 0xfffffffffffffffd) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) dup2(0xffffffffffffffff, 0xffffffffffffffff) open(0x0, 0x0, 0x0) r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000000)={@remote, 0x0, 0x0, 0xff, 0x1}, 0x20) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000180)={@loopback, 0x0, 0x0, 0xff, 0x9}, 0x20) setsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) [ 1331.703069] IPVS: ftp: loaded support on port[0] = 21 08:57:23 executing program 5: r0 = syz_open_dev$binderN(&(0x7f0000000040)='/dev/binder#\x00', 0x0, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000001180)={0x44, 0x0, &(0x7f0000000100)=[@transaction={0x40406300, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}], 0x1, 0x11000000, &(0x7f0000000180)='U'}) 08:57:24 executing program 1: unshare(0x20020080) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000000)=0x3) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f00000002c0)={[0x5, 0x0, 0x8000, 0x4, 0x1, 0x1000, 0x7, 0x4, 0x6, 0x4, 0x0, 0x1, 0x7fffffff, 0xfffffffffffffc01, 0xd5, 0xffffffff], 0x2000, 0x20000}) ioctl$EVIOCGPROP(r1, 0x40047438, &(0x7f0000000180)=""/246) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) sendmsg$AUDIT_TRIM(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x10, 0x3f6, 0x100, 0x0, 0x25dfdbfe, "", ["", "", "", "", "", "", "", "", ""]}, 0x10}}, 0x2000c030) write$binfmt_script(r4, &(0x7f0000000040)=ANY=[], 0xfea7) r5 = socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') sendmsg$TIPC_CMD_ENABLE_BEARER(r5, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000000c0)={0x38, r6, 0x1, 0x0, 0x0, {{}, {}, {0x1c, 0x17, {0x4800, 0x0, @l2={'eth', 0x3a, 'syzkaller1\x00'}}}}}, 0x38}}, 0x0) sendmsg$TIPC_CMD_GET_REMOTE_MNG(r3, &(0x7f00000003c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000380)={&(0x7f0000000500)={0x1c, 0x0, 0x10, 0x70bd2c, 0x25dfdbfc, {}, ["", ""]}, 0x1c}}, 0x800) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r4, 0x0) ioctl$PPPIOCSFLAGS1(r1, 0x40047457, &(0x7f00000000c0)) 08:57:24 executing program 4: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f0000000000)=0x3) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r2, 0x40047438, &(0x7f0000000180)=""/246) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r3, &(0x7f0000000040)=ANY=[], 0xfea7) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r3, 0x0) ioctl$PPPIOCSFLAGS1(r2, 0x40047459, &(0x7f00000000c0)) [ 1331.928030] binder: 22306:22311 ioctl c0306201 20001180 returned -14 08:57:24 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_read_part_table(0x0, 0x2, &(0x7f0000002640)=[{0x0, 0x4800000000000000, 0xfffffffffffffff7}, {&(0x7f0000001540)="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", 0x1e0}]) 08:57:24 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000400)=@can_delroute={0x2c, 0x19, 0x1, 0x0, 0x0, {}, [@CGW_MOD_AND={0x15, 0x1, {{{}, 0x0, 0x0, 0x0, 0x0, "5f9f11b37f6d480b"}}}]}, 0x2c}}, 0x0) [ 1332.076153] IPVS: ftp: loaded support on port[0] = 21 08:57:24 executing program 0: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000000)) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r3 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r3, 0x40047438, &(0x7f0000000180)=""/246) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r4, &(0x7f0000000040)=ANY=[], 0xfea7) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r4, 0x0) ioctl$PPPIOCSFLAGS1(r3, 0x4020744f, &(0x7f00000000c0)) 08:57:24 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000014c0)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000008009500f10100000000487591731cba12c07d57d995b61e89a4530f92304f242b416ae9eeefc0e9c60ebab1c176bf9bb4dde984510c82dc2b9381b72b100d0682fd0a0c4ac106b29e220dc28dac7259945654c4e6f3fe2d1dee18f638ac947b5e026a3287c84ccc72876ef3834293812e927c01c7daffffffdfc7f2ed1084a12f56d1cb398dff1db3df9858837458a4ca037605000000b6be484e4c9507af216bd8ed42f7dd5adb8e49f4a94615e49c08c9a20819e02cc22e6be45574d4ed88b37ab8d7674c644dca2f1b4d745fd95c41f9dfc1adafd1e5a3e7f2e898961cb43e438c4e41ae43ea118e14ffffffffe4b8b99bffffb1ac006c67767b03b95151aeb89e6d4a43c625aa2285b6e4afd8c1cc3eb215ba22f43115f4d39dc7a0edb130d9f2be90133a4500000058b8c9370634060105baa664950dadbc5a09631156bc8715b985a8a63d4c9fc570de6e9cfa9d9e57033815717b4fdbe55b37cb8d7f41aacfbd4089ea1bd22440f64909a09b5a759a703e71f358e11ac8e13db15d792e604a4f279b3bd6621bdf2c17bc0400000000000000ff8dc4006200607a9a76e5d9656a7154c75773902a1bdf399df3925130312d095e9c1f973d091c198c1a11edb695cc425fe203d0f2655a76865c2c34e2470fcfb1248c0add5431a7fbcb0ef4f66a09af93a09fab1daae4b518d7a5d95a017864487367d6d7ee7bb0749cacf56cf27409c60fca2e0004000000000000a9cb6fca7844f9dab530388eb1f43d4abbfc59d6d1b18fe380df4bf033f120bd715d82033f2fb7d8fc9e0d77b294e097e293db58992c0024ab2fd8e5e7fb178f047ba32548b4d32972cba6f49051cec1bf6f16231bbb90a2d201e5a47811a2278a03bf7700b06fa191ebd3bec2ef0058ffebd7ccde2480ae40d6156edc4ef81f74a7cdac01d998c24f34a5ba9a4a2039d0416e3f81074192c48c63384f52b8eeb70571e5bbb3e6d2b5eba51aff0f00008981811f832d064048c0674053d0e160e525536edf56a93d0a7a6f0889f4ee8964875fea6ff57ba6ae46c5e8ca4f78d5a01308243b08f1caa46be5244d64f8e875858e083144c642f71cdc8e5634c1360c056430f677ee7ed7ac1f9743786b2fb8d0fcfcc3d36c93230b7b059bc295aa0e38b1c3edc3492b96e73d2060acfd8145e4a5851bc4d6fdc5ad939d7795f3879baa88bd0c84892c97c80987e5c7954e9f3694d116b01ce0b8ef953de70e7ce0311c8b018956f8a42ca26ab295f1ecf607a8dc38ff25f415a1bd46b38845ebca04061bacbf627f798c7f520078fee48f83b5989543729e36a9e1d686bc86cd51704f309130f5347413776a7b7bea3c46c0c4c4b7c27c45057d95ac85ac1cdcee8e6fa31fc02137ed1fb4b21c13b9a2c5e3f7c9ef9c45a314a6f0b9352be92986d63263b1aa5264cb4a82cf080d7632624c9c3a3c88c915e1f87808d0711dd76f2977ca7f2684bfa5c14a0cd6f1f561d34e4e9851e81d4a355abf43d917c16a2bb0cfb284fcfde901576954ef59e4a658ca431be123b9ee2c8ff10e934847604d930f62924d0562ce17f6dadf5053ed8f33092a41bb463c407f87dafd6199f9ddd1f62da58ca7d3297d6a1bfc5a9aa38a05e70591d5cdab1c268ef3c1984c7c51566cfc2ab6e6fbc99ec206a54fb49056a555414178ef00d8b873c59f01eb5d83415994efcc6ec4b3c275cd6b1b5ff82ef7d7abb1d218e7a1d0afa285706841aac9ccc89df41c39dd58403f8972e8049c681d1185f6a01fdd70569dde45f8ad62edc65828fbb6e279f745d2872f0c08635e465ca443a6a64c7803760880af23fb3f438a5d11fffc96dd1cb951642f14f0d17289c43d4aee2127f7a343899434594cc23e1c864164e130754b337e520f285dc670a31241bfb43ac62fc7f985586168483427072a535f2cac81ec261c8aa9df6dbc47aefe821b43e38cd1480372a66effcde93715922ba8ae8979adf43629162f4f55faee515b6793e9e6799fc207058072cf29ddf4b91b4ae0396b9ffed2acce2a7b6a00000000000000007557a6aadfaa0500000040526d6e200bb94d7a77bf5d5abdc14090210efdafd1dfcaba6cf1cd00d3f3b0b0601d7c7eb57a42c210cc06ccf7f31028f5810f0fd249c6fefd139cdbe0044b877ab0a84011fe7ffe9e11f76052654df20929980e7e46beafdea6467a70a3dce7f078c9005546af5d1fe687a61da9fa0de04df717526c528fff0c81c6e9dcc9c4c039d0f997cc0f205b094cb4271a0074"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x222}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xe80, 0x3f00, &(0x7f00000000c0)="b9ff03c6630d698cb89e0bf088ca1fffffff0e000000638877fbac141429e6", 0x0, 0x2f, 0x0, 0x0, 0xfffffffffffffe2a}, 0x28) [ 1332.166500] IPVS: ftp: loaded support on port[0] = 21 [ 1332.181271] audit: type=1804 audit(1594717044.312:5397): pid=22281 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir968128286/syzkaller.PF5Zls/776/cgroup.controllers" dev="sda1" ino=17073 res=1 08:57:24 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_read_part_table(0x0, 0x2, &(0x7f0000002640)=[{0x0, 0x4a57625000000000, 0xfffffffffffffff7}, {&(0x7f0000001540)="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", 0x1e0}]) [ 1332.332359] IPVS: ftp: loaded support on port[0] = 21 08:57:24 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_read_part_table(0x0, 0x2, &(0x7f0000002640)=[{0x0, 0x4c00000000000000, 0xfffffffffffffff7}, {&(0x7f0000001540)="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", 0x1e0}]) [ 1332.720182] Enabling of bearer rejected, failed to enable media [ 1332.832447] Enabling of bearer rejected, failed to enable media 08:57:26 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_read_part_table(0x0, 0x2, &(0x7f0000002640)=[{0x0, 0x5500000000000000, 0xfffffffffffffff7}, {&(0x7f0000001540)="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", 0x1e0}]) 08:57:26 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) ioctl$KVM_SET_GSI_ROUTING(r1, 0x4008ae6a, &(0x7f0000000240)) 08:57:26 executing program 4: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f0000000000)=0x3) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r2, 0x40047438, &(0x7f0000000180)=""/246) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r3, &(0x7f0000000040)=ANY=[], 0xfea7) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r3, 0x0) ioctl$PPPIOCSFLAGS1(r2, 0x40047459, &(0x7f00000000c0)) 08:57:26 executing program 1: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x810, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000000)=0x3) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r1, 0x40047438, &(0x7f0000000180)=""/246) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r2, &(0x7f0000000040)=ANY=[], 0xfea7) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r2, 0x0) ioctl$PPPIOCSFLAGS1(r1, 0x40047457, &(0x7f00000000c0)) 08:57:26 executing program 0: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000000)=0x3) bpf$PROG_LOAD(0x5, 0x0, 0x0) r3 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r3, 0x40047438, &(0x7f0000000180)=""/246) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r4, &(0x7f0000000040)=ANY=[], 0xfea7) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r4, 0x0) ioctl$PPPIOCSFLAGS1(r3, 0x4020744f, &(0x7f00000000c0)) 08:57:26 executing program 2: unshare(0x40000000) r0 = openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000100)='cgroup.subtree_control\x00', 0x2, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, r0, 0xffffd000) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r3, 0x5423, &(0x7f0000000000)=0x3) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r4 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r4, 0x40047438, &(0x7f0000000180)=""/246) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r5, &(0x7f0000000040)=ANY=[], 0xfea7) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r5, 0x0) ioctl$PPPIOCSFLAGS1(r4, 0x40047457, &(0x7f00000000c0)) [ 1334.307988] IPVS: ftp: loaded support on port[0] = 21 [ 1334.322697] IPVS: ftp: loaded support on port[0] = 21 [ 1334.331812] IPVS: ftp: loaded support on port[0] = 21 [ 1334.364909] IPVS: ftp: loaded support on port[0] = 21 08:57:26 executing program 5: r0 = openat$adsp1(0xffffffffffffff9c, &(0x7f0000000180)='/dev/adsp1\x00', 0x0, 0x0) ioctl$SNDCTL_DSP_SPEED(r0, 0x5008, 0x0) 08:57:26 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_read_part_table(0x0, 0x2, &(0x7f0000002640)=[{0x0, 0x6000000000000000, 0xfffffffffffffff7}, {&(0x7f0000001540)="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", 0x1e0}]) 08:57:26 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000180)='cdg\x00', 0x4) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x983a}, 0x1c) 08:57:26 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_read_part_table(0x0, 0x2, &(0x7f0000002640)=[{0x0, 0x6800000000000000, 0xfffffffffffffff7}, {&(0x7f0000001540)="c2ec123b097b69be3e42e60d3f03ff5b20b3406e8d7eebd2456f5388ad7135b73efb98088798c4d4506cd2295e60b5e9f9f2399833ad179a03e098e07644033f2d0e3c37a84095cdde0312f1d81191a92ccbe761424e7d3033a056d7d07c4c4bc2dbbb00079ae5158b76bed5cdd1d93054fff6874b43ef1289c75e4c9b911d69313cbc4e0abcab496b4ce2c83f238a2b30fc8210b75bcdcd0b774ac467962cc4389843f92f418b0718a87f17ae20f1790c7ff086746847e2217207cede6d2af2a58d7148128b2f86806b3be24ced787543219ae633ab66b7828c5bfd87571ee33ab89138401439491e3f3c6a4a56b4bf8a7d532ee9144977f6ac8fae105ab358e231f2cd9a216d68b0877161e158b14837fb1426f4a629f17ddd7bbf9019941ff9bbe3d6fd30d68dbd9e3b3cfb282bc08db959b660ed8f7ebc67714be3d00f8f1e2cbc9404069335265ce12996f7cb48c1f3221f7f892493e4711a6dbd79a0298e0e0b9936b06a3d08821f558f5738b05e2ead126157186dac58de8a7098291efacb6666b2dca73d422fbf6a09b30f3c30cc9e34faa453ef1d770f7008b7c54d644be9716b27aa40b67126130b61c29a254a578365216655e8a5c6955e72fb67e6f1796e499edcaa33e0b43bd172d9977deff713978907e12189743913c7c847", 0x1e0}]) [ 1334.902838] IPVS: ftp: loaded support on port[0] = 21 [ 1334.922916] audit: type=1804 audit(1594717047.052:5398): pid=22437 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir167466058/syzkaller.fubub5/693/cgroup.controllers" dev="sda1" ino=17158 res=1 08:57:27 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_CPUID2(r2, 0xc008ae88, &(0x7f0000000080)={0x1, 0x0, [{0x400000b1}]}) 08:57:27 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_read_part_table(0x0, 0x2, &(0x7f0000002640)=[{0x0, 0x6c00000000000000, 0xfffffffffffffff7}, {&(0x7f0000001540)="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", 0x1e0}]) [ 1335.163795] IPVS: ftp: loaded support on port[0] = 21 08:57:27 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_CPUID2(r2, 0xc008ae88, &(0x7f0000000080)={0x1, 0x0, [{0xc0010117}]}) 08:57:27 executing program 0: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000000)=0x3) bpf$PROG_LOAD(0x5, 0x0, 0x0) r3 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r3, 0x40047438, &(0x7f0000000180)=""/246) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r4, &(0x7f0000000040)=ANY=[], 0xfea7) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r4, 0x0) ioctl$PPPIOCSFLAGS1(r3, 0x4020744f, &(0x7f00000000c0)) 08:57:27 executing program 1: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0xf4327000) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000000)=0x3) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r1, 0x40047438, &(0x7f0000000180)=""/246) socket$rds(0x15, 0x5, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r2, &(0x7f0000000040)=ANY=[], 0xfea7) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x20010, r2, 0x4000) ioctl$PPPIOCSFLAGS1(r1, 0x40047457, &(0x7f00000000c0)) 08:57:27 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_read_part_table(0x0, 0x2, &(0x7f0000002640)=[{0x0, 0x7400000000000000, 0xfffffffffffffff7}, {&(0x7f0000001540)="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", 0x1e0}]) 08:57:27 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) [ 1335.477371] IPVS: ftp: loaded support on port[0] = 21 [ 1335.481349] IPVS: ftp: loaded support on port[0] = 21 [ 1336.016356] IPVS: ftp: loaded support on port[0] = 21 08:57:28 executing program 2: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000000)=0x3) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r3 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_INFO(0xffffffffffffffff, 0xc0bc5310, &(0x7f0000000340)) ioctl$EVIOCGPROP(r3, 0x40047438, &(0x7f0000000180)=""/246) getsockopt$inet_sctp_SCTP_INITMSG(r2, 0x84, 0x2, &(0x7f0000000100), &(0x7f0000000140)=0x8) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r4, &(0x7f0000000040)=ANY=[], 0xfea7) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r4, 0x0) r5 = socket$inet6(0xa, 0x2, 0x0) r6 = dup(r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) ioctl$USBDEVFS_REAPURB(r6, 0x4008550c, &(0x7f00000002c0)) ioctl$PPPIOCSFLAGS1(r3, 0x40047457, &(0x7f00000000c0)) 08:57:28 executing program 4: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f0000000000)=0x3) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r2, 0x40047438, &(0x7f0000000180)=""/246) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r3, &(0x7f0000000040)=ANY=[], 0xfea7) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r3, 0x0) ioctl$PPPIOCSFLAGS1(r2, 0x40047459, &(0x7f00000000c0)) 08:57:28 executing program 5: 08:57:28 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_read_part_table(0x0, 0x2, &(0x7f0000002640)=[{0x0, 0x7a00000000000000, 0xfffffffffffffff7}, {&(0x7f0000001540)="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", 0x1e0}]) 08:57:28 executing program 5: [ 1336.151100] IPVS: ftp: loaded support on port[0] = 21 [ 1336.195412] IPVS: ftp: loaded support on port[0] = 21 08:57:28 executing program 0: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000000)=0x3) bpf$PROG_LOAD(0x5, 0x0, 0x0) r3 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r3, 0x40047438, &(0x7f0000000180)=""/246) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r4, &(0x7f0000000040)=ANY=[], 0xfea7) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r4, 0x0) ioctl$PPPIOCSFLAGS1(r3, 0x4020744f, &(0x7f00000000c0)) 08:57:28 executing program 5: 08:57:28 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_read_part_table(0x0, 0x2, &(0x7f0000002640)=[{0x0, 0x8000000000000000, 0xfffffffffffffff7}, {&(0x7f0000001540)="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", 0x1e0}]) [ 1336.343619] IPVS: ftp: loaded support on port[0] = 21 08:57:28 executing program 5: [ 1336.867600] IPVS: ftp: loaded support on port[0] = 21 08:57:29 executing program 1: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) write$9p(0xffffffffffffffff, &(0x7f00000002c0)="5cfa1e013e97268cbf0d6572266354bd1769d30f4c68c9ee9bcb1b698bae9820e1438a062aa16a41cd791af136839fa5f900ece9810ad69684e4611c2c01a2d38cac6cc166b74776d94eb5c62e3a7b50faba843ce0faaf45dfd081615dd68728bec2855d1c7edcf5e8edcb4258a71a59315405842f0190e55c023065655187eb6df471fc8695479a683439a70cf9f6b9ce156e3700159546b9429d29f6f0af52bae7429fcb39ddb23eb4ff0f4bcbd581c34afcbaba1769224ead8d92a209f7675927a6d71af1bf7957d95f60ae1843fd0ebf53", 0xd3) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000000)=0x3) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r1, 0x40047438, &(0x7f0000000180)=""/246) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r2, &(0x7f0000000040)=ANY=[], 0xfea7) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r2, 0x0) ioctl$PPPIOCSFLAGS1(r1, 0x40047457, &(0x7f00000000c0)) 08:57:29 executing program 5: 08:57:29 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_read_part_table(0x0, 0x2, &(0x7f0000002640)=[{0x0, 0x97ffffff00000000, 0xfffffffffffffff7}, {&(0x7f0000001540)="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", 0x1e0}]) [ 1337.163563] IPVS: ftp: loaded support on port[0] = 21 08:57:29 executing program 0: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000000)=0x3) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r3 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r3, 0x40047438, &(0x7f0000000180)=""/246) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r4, &(0x7f0000000040)=ANY=[], 0xfea7) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r4, 0x0) ioctl$PPPIOCSFLAGS1(r3, 0x4020744f, &(0x7f00000000c0)) 08:57:29 executing program 4: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r2, 0x5423, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r3 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r3, 0x40047438, &(0x7f0000000180)=""/246) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r4, &(0x7f0000000040)=ANY=[], 0xfea7) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r4, 0x0) ioctl$PPPIOCSFLAGS1(r3, 0x40047459, &(0x7f00000000c0)) 08:57:29 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000001c0)={0x68, 0x0, 0x1, 0x401, 0x0, 0x0, {0x2}, [@CTA_TUPLE_ORIG={0x24, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8}, {0x8, 0x2, @dev}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_NAT_SRC={0x4}, @CTA_TUPLE_REPLY={0x24, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @dev}, {0x8, 0x2, @broadcast}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TIMEOUT={0x8}]}, 0x68}}, 0x0) 08:57:29 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_read_part_table(0x0, 0x2, &(0x7f0000002640)=[{0x0, 0xad1fa69800000000, 0xfffffffffffffff7}, {&(0x7f0000001540)="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", 0x1e0}]) 08:57:29 executing program 2: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000000)=0x3) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r3 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) r4 = socket$inet6(0xa, 0x2, 0x0) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$EVIOCGPROP(r5, 0x40047438, &(0x7f0000000180)=""/246) syz_mount_image$ceph(&(0x7f0000000100)='ceph\x00', &(0x7f0000000140)='./file0\x00', 0xec, 0xa, &(0x7f00000009c0)=[{&(0x7f00000002c0)="42ecca14571307000ba30ae91d6cc4eae1168a9784fd9a11dbbbcfda7e630a4ff80e6a3b2110a88d3bfbe0676fbe4796ab727d0473d04728858dabe69fa861f9623a4a371909a652fba2ef91838205840890616fdf0cf287744afbeaedca17c398db32e85e71fa5bb9b2e17a99d53d835dfddb2a8385bed781a14cae27cc046ed42120c48a3c2d113a81b545530d30c4665ef5ad1f84280f07ca1b3d7ea2f8e1acd7d35bf03b01512580d02727bcca6cc0e599b974c58d2aa9e22cd5696ba7abcd1851828a0b552d586ecdb7429fb90cdbab760a12d700f5db2c895dd3f01f5e", 0xe0, 0x9}, {&(0x7f00000003c0)="ca85a0b2b32858be8ccd2919b2404b6090ee1c54d87abbc1c52f3ad3e39a9e4db1d6b7415ed8ad2747aff3ce88d8f633c0330b1d373d33aa1dab78e2bd963231b5227458c0d883cee5849f4c45169f9e28eefbadcff353c0bec5c8082106ae5e6466e0bca71066e89accb970ccee039204e7ad9d5048e843f635f38db2e9d23a7d3c0b854db5fb2ffcb1c53b3ae5bf42b40f72bc41ffa02d7327bf0a7e2ba422c60637dd04c23fbd898748efafc081ac5207796fb3d1b4dc13971e5187472f15ff0d7f119e37d8", 0xc7, 0x4a5b}, {&(0x7f00000004c0)="bb30ae20980a8ce3d169377527736427565f1096d3ba87170e183d528837268cdc3ea5569ac97e46c35bd4ed37d746f4674d5f4a488e335beedc1b1ac4396fa929dd7a1a7b00cff5d28b9d338491d304c11d9e550a3822b2037ea0b9759499ee6eb9525e011518949536518f41b3089e7fe7f193081c8ea869c750c16ad74f8dff0361cd3cb0c8d022fb96704602efed50c018bfa75177553c7f66a81988078e8acbc468cb462a8796cec8dff6039ea7f197bbbd0cd2240dc08a12b084e416390ce503b1bf4b270a1c005c4a8e4c7dafefda2cff4736d8e6a5c47e4f", 0xdc, 0xd57e}, {&(0x7f00000005c0)="c3d27f09b866d4a8f4f70af335d738e4a3f98e309339b78a4a086afe694e9b2c", 0x20, 0x9}, {&(0x7f0000000600)="6a11be36ca835e1b6889befbedbd33fff505740587dc9a418ea837d3a2797f9a72a7412292b3865f30dc3c717a591547de100fa5cc02422a3b0b2f4acc561b165ff07a510437e5e8c0b48f8c0063c0ae3bb631978609fdb6063a048509ac0ea2ed08bc25fbf2180df1c30aa049288f378f3428ddbae1b367a669e806500388345def40b22bb98bc97df2e9d43be2d1d6f10c41293bd3806c81b1291f1905f5cb5ebfcfe9a4718f12f51d551fa7be13b737aac428d4", 0xb5, 0x4}, {&(0x7f00000006c0)="2145e139068a91ccbe877fa5d0c7576117fce8b73b785cbfce7fc006fca1eec6ca2cadd7338810592ee495be04da349e6e0c4b6abb55924853db78ce6ed730ac7802ceb6f395cf561ffa984b4df26e34069353d7c5dccdff366ab0d24327943c2792dffa052de379c7c69a24c9d798e6932426d2a2eb17f4f447909af7", 0x7d, 0x1}, {&(0x7f0000000740)="545e21addca4979af17381cf7327067af21a212872", 0x15}, {&(0x7f0000000780)="0127d724d69115412d5ac384cd155241d891e3352eca47627c96bc9753b51edf8d8000d62bf68288270370e7c295450320143df8de86cdbacda7b95bbf507d8707bf74a5dbb329df7f460ca31f8430c9d98f998fbacc782247a587a7a68b54a6aee8721b55b792b6bcdd0bf6d2e763403f8b1c31c7058ef299fb374775f2c2eed25dffd8a48c39757e75d0385b3820546ee4b4b565bd53d4c1f92abf469ba9fc7d6510ea12aded4d055fae9ddb2f62435cfce6e4f0007bd307df45c05669f2cb7f94e0d086b5", 0xc6, 0x36}, {&(0x7f0000000880)="128c995f874eb74b6026ebffbae89b57a19efaf9cec699f60a2acb7f753df0de5e58f261f95f5dc820162b3fc4ceeb9455e095dd718bb151ebacd0b8aafb8a8d0b843527cd2a4b979d1dc89b522d04e8f5bb572b55dd70ecd91503f5ec7490269939a3c8dfe63a9b4e8a6a2dabf2f2e0125a3c2a9ce958d7d2f1b28f7a104edc7deac86eaf5c0c4ab0e87cfc12de230a3976e832879776f1741460b2786bb12c9dcf3e1f014f7e944d976f44b25fbaeeb444c8c0792107b7baab25c4b43a5fc7fdd1a334f0e4e5b67448ffe252e985583a5964af127535a6f846510c20dd9bba50bb901c4794d6d5c23b6d8a", 0xec, 0x2}, {&(0x7f0000000980)="35ec6f81cc395a86851687aeca09c7684c1c49e3748579bf849d2aa6afb63e3971920f5f107945bbaa03951c39c5aee965b52458e149e6a399ee4d6e9c56", 0x3e, 0x7fffffff}], 0x800008, &(0x7f0000000ac0)='\x00') r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r6, &(0x7f0000000040)=ANY=[], 0xfea7) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r6, 0x0) ioctl$PPPIOCSFLAGS1(r3, 0x40047457, &(0x7f00000000c0)) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000000)={0x3c, 0x0, 0x1, 0x409, 0x0, 0x0, {}, [@CTA_TUPLE_ORIG={0x24, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @broadcast}, {0x8, 0x2, @dev}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_SEQ_ADJ_REPLY={0x4}]}, 0x3c}}, 0x0) sendmmsg$inet(0xffffffffffffffff, &(0x7f0000000ec0)=[{{&(0x7f0000000b00)={0x2, 0x4e22, @broadcast}, 0x10, &(0x7f0000000e00)=[{&(0x7f0000000b40)='j', 0x1}, {&(0x7f0000000b80)="426d018f528fb94d99b52d343149c70e37f93a7a8a25d7be5d152e89af79212610ced3b71085350116f0878133efcf4a69", 0x31}, {&(0x7f0000000bc0)="62219066d1699085f750fe4d7d95a7c1765aa9e2", 0x14}, {&(0x7f0000000c00)="878f90d44f52bafc2110b2e77fa675e997af0039181e2ef239f095700fa1430445cba878622359a981c34827f1f4697d923c1b7ff94928d73e2c3482713b12ae44c1f8f98c14260acf21a828dadf93ebf283160cc0451c356cacc341efb8d89d5293684c67ed0e3cd3ca0d1dde88437f2063fed73e6003beaa5b8238220b5b1213f1e0283b1d593867e4999331ead9e77c25a6f3c190747b552ab0ad8221e5115502974bf3b061d5580e145e7e00942888a7bd7f9c21651b4fd929296736856a23b7dd5adb865f175929bff3dc63f8b592fd99620532d56bfff387697fd0cc48b026d74e01174505d7c550f4e1a91f49b9", 0xf1}, {&(0x7f0000000d00)="25efc3e334368f8c793296a9d40083df9a8fdec1de253ae6a85c16d6ac388c072084bae5683e962a7c488e66600a20d0149869f8b010ac32461f3360ddde42aeff2b59141976e77b18d0d524e2", 0x4d}, {&(0x7f0000000d80)="8c8d241b6937b7cb8d52ff00b4485d4fe57ad8d5d9", 0x15}, {&(0x7f0000000dc0)="07e877d0e07566072386640a44ad35abc2b727dc0e98f851698983c1d38c4f52c3", 0x21}], 0x7, &(0x7f0000000e80)=[@ip_ttl={{0x14, 0x0, 0x2, 0x8bb}}, @ip_ttl={{0x14, 0x0, 0x2, 0xffff}}], 0x30}}], 0x1, 0x4048045) [ 1337.513012] IPVS: ftp: loaded support on port[0] = 21 [ 1337.559342] IPVS: ftp: loaded support on port[0] = 21 [ 1337.588538] IPVS: ftp: loaded support on port[0] = 21 08:57:29 executing program 5: [ 1337.646850] IPVS: ftp: loaded support on port[0] = 21 08:57:29 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_read_part_table(0x0, 0x2, &(0x7f0000002640)=[{0x0, 0xf5ffffff00000000, 0xfffffffffffffff7}, {&(0x7f0000001540)="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", 0x1e0}]) 08:57:29 executing program 5: 08:57:30 executing program 5: [ 1338.315987] ceph: device name is missing path (no : separator in /dev/loop2) [ 1338.379863] IPVS: ftp: loaded support on port[0] = 21 [ 1338.483981] ceph: device name is missing path (no : separator in /dev/loop2) 08:57:30 executing program 5: 08:57:30 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_read_part_table(0x0, 0x2, &(0x7f0000002640)=[{0x0, 0xf73f000000000000, 0xfffffffffffffff7}, {&(0x7f0000001540)="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", 0x1e0}]) 08:57:30 executing program 0: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000000)=0x3) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r3 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r3, 0x40047438, &(0x7f0000000180)=""/246) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r4, &(0x7f0000000040)=ANY=[], 0xfea7) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r4, 0x0) ioctl$PPPIOCSFLAGS1(r3, 0x4020744f, &(0x7f00000000c0)) 08:57:30 executing program 4: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r2, 0x5423, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r3 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r3, 0x40047438, &(0x7f0000000180)=""/246) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r4, &(0x7f0000000040)=ANY=[], 0xfea7) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r4, 0x0) ioctl$PPPIOCSFLAGS1(r3, 0x40047459, &(0x7f00000000c0)) 08:57:30 executing program 1: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000000)=0x3) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$SOUND_MIXER_INFO(r2, 0x805c4d65, &(0x7f0000000100)) r3 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r3, 0x40047438, &(0x7f0000000180)=""/246) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r4, &(0x7f0000000040)=ANY=[], 0xfea7) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r4, 0x0) ioctl$PPPIOCSFLAGS1(r3, 0x40047457, &(0x7f00000000c0)) 08:57:30 executing program 5: [ 1338.693246] IPVS: ftp: loaded support on port[0] = 21 [ 1338.703239] IPVS: ftp: loaded support on port[0] = 21 [ 1338.707432] IPVS: ftp: loaded support on port[0] = 21 08:57:31 executing program 5: 08:57:31 executing program 2: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000000)=0x3) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r3 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r3, 0x40047438, &(0x7f0000000180)=""/246) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r4, &(0x7f0000000040)=ANY=[], 0xfea7) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r4, 0x0) ioctl$PPPIOCSFLAGS1(r3, 0x40047457, &(0x7f00000000c0)) 08:57:31 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_read_part_table(0x0, 0x2, &(0x7f0000002640)=[{0x0, 0xfdffffff00000000, 0xfffffffffffffff7}, {&(0x7f0000001540)="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", 0x1e0}]) 08:57:31 executing program 5: [ 1339.311423] IPVS: ftp: loaded support on port[0] = 21 08:57:31 executing program 5: 08:57:31 executing program 0: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000000)=0x3) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r3 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r3, 0x40047438, &(0x7f0000000180)=""/246) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r4, &(0x7f0000000040)=ANY=[], 0xfea7) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r4, 0x0) ioctl$PPPIOCSFLAGS1(r3, 0x4020744f, &(0x7f00000000c0)) [ 1339.416069] IPVS: ftp: loaded support on port[0] = 21 08:57:31 executing program 4: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r2, 0x5423, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r3 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r3, 0x40047438, &(0x7f0000000180)=""/246) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r4, &(0x7f0000000040)=ANY=[], 0xfea7) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r4, 0x0) ioctl$PPPIOCSFLAGS1(r3, 0x40047459, &(0x7f00000000c0)) 08:57:31 executing program 5: [ 1339.509696] IPVS: ftp: loaded support on port[0] = 21 [ 1339.589260] IPVS: ftp: loaded support on port[0] = 21 08:57:31 executing program 5: 08:57:31 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_read_part_table(0x0, 0x2, &(0x7f0000002640)=[{0x0, 0xff0f000000000000, 0xfffffffffffffff7}, {&(0x7f0000001540)="c2ec123b097b69be3e42e60d3f03ff5b20b3406e8d7eebd2456f5388ad7135b73efb98088798c4d4506cd2295e60b5e9f9f2399833ad179a03e098e07644033f2d0e3c37a84095cdde0312f1d81191a92ccbe761424e7d3033a056d7d07c4c4bc2dbbb00079ae5158b76bed5cdd1d93054fff6874b43ef1289c75e4c9b911d69313cbc4e0abcab496b4ce2c83f238a2b30fc8210b75bcdcd0b774ac467962cc4389843f92f418b0718a87f17ae20f1790c7ff086746847e2217207cede6d2af2a58d7148128b2f86806b3be24ced787543219ae633ab66b7828c5bfd87571ee33ab89138401439491e3f3c6a4a56b4bf8a7d532ee9144977f6ac8fae105ab358e231f2cd9a216d68b0877161e158b14837fb1426f4a629f17ddd7bbf9019941ff9bbe3d6fd30d68dbd9e3b3cfb282bc08db959b660ed8f7ebc67714be3d00f8f1e2cbc9404069335265ce12996f7cb48c1f3221f7f892493e4711a6dbd79a0298e0e0b9936b06a3d08821f558f5738b05e2ead126157186dac58de8a7098291efacb6666b2dca73d422fbf6a09b30f3c30cc9e34faa453ef1d770f7008b7c54d644be9716b27aa40b67126130b61c29a254a578365216655e8a5c6955e72fb67e6f1796e499edcaa33e0b43bd172d9977deff713978907e12189743913c7c847", 0x1e0}]) [ 1340.180898] IPVS: ftp: loaded support on port[0] = 21 08:57:34 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_read_part_table(0x0, 0x2, &(0x7f0000002640)=[{0x0, 0xff3f000000000000, 0xfffffffffffffff7}, {&(0x7f0000001540)="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", 0x1e0}]) 08:57:34 executing program 5: 08:57:34 executing program 4: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000000)) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r3 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r3, 0x40047438, &(0x7f0000000180)=""/246) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r4, &(0x7f0000000040)=ANY=[], 0xfea7) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r4, 0x0) ioctl$PPPIOCSFLAGS1(r3, 0x40047459, &(0x7f00000000c0)) 08:57:34 executing program 2: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) getpeername$tipc(r1, &(0x7f0000000100), &(0x7f0000000140)=0x10) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000000)=0x3) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r3 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r3, 0x40047438, &(0x7f0000000180)=""/246) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r4, &(0x7f0000000040)=ANY=[], 0xfea7) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r4, 0x0) ioctl$PPPIOCSFLAGS1(r3, 0x40047457, &(0x7f00000000c0)) 08:57:34 executing program 1: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000000)=0x3) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r1, 0x40047438, &(0x7f0000000180)=""/246) r2 = socket(0x1000000010, 0x80002, 0x0) sendmmsg$alg(r2, &(0x7f0000000200), 0x10efe10675dec16, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000140)={&(0x7f0000000580)=ANY=[@ANYBLOB="9c000000140020002bbd7000070000000001000096ca66baa47bab2d14e9a0c516cecdec36168a47f877eb112df092d85d3a1be68292432694ae1fabd39c00"/76, @ANYBLOB="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", @ANYBLOB="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", @ANYRES16, @ANYRESOCT=r2], 0x9c}, 0x1, 0x0, 0x0, 0x48080}, 0x4046010) r3 = socket$inet6(0xa, 0x2, 0x0) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmmsg$alg(0xffffffffffffffff, &(0x7f0000000200), 0x10efe10675dec16, 0x0) setsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0xe, &(0x7f0000000480)="97e465736353c6340360", 0xa) ioctl$KVM_SET_FPU(r4, 0x41a0ae8d, &(0x7f00000002c0)={[], 0x2920, 0x8, 0x1, 0x0, 0x200, 0x2000, 0x5000, [], 0x2}) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r5, &(0x7f0000000040)=ANY=[], 0xfea7) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r5, 0x0) ioctl$PPPIOCSFLAGS1(r1, 0x40047457, &(0x7f00000000c0)) 08:57:34 executing program 5: [ 1342.188148] IPVS: ftp: loaded support on port[0] = 21 [ 1342.196084] IPVS: ftp: loaded support on port[0] = 21 [ 1342.243104] IPVS: ftp: loaded support on port[0] = 21 08:57:34 executing program 5: [ 1342.732370] IPVS: ftp: loaded support on port[0] = 21 [ 1342.747165] IPVS: ftp: loaded support on port[0] = 21 08:57:35 executing program 0: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000000)=0x3) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r3 = openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$EVIOCGPROP(r3, 0x40047438, &(0x7f0000000180)=""/246) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r4, &(0x7f0000000040)=ANY=[], 0xfea7) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r4, 0x0) ioctl$PPPIOCSFLAGS1(r3, 0x4020744f, &(0x7f00000000c0)) 08:57:35 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_read_part_table(0x0, 0x2, &(0x7f0000002640)=[{0x0, 0xffffff7f00000000, 0xfffffffffffffff7}, {&(0x7f0000001540)="c2ec123b097b69be3e42e60d3f03ff5b20b3406e8d7eebd2456f5388ad7135b73efb98088798c4d4506cd2295e60b5e9f9f2399833ad179a03e098e07644033f2d0e3c37a84095cdde0312f1d81191a92ccbe761424e7d3033a056d7d07c4c4bc2dbbb00079ae5158b76bed5cdd1d93054fff6874b43ef1289c75e4c9b911d69313cbc4e0abcab496b4ce2c83f238a2b30fc8210b75bcdcd0b774ac467962cc4389843f92f418b0718a87f17ae20f1790c7ff086746847e2217207cede6d2af2a58d7148128b2f86806b3be24ced787543219ae633ab66b7828c5bfd87571ee33ab89138401439491e3f3c6a4a56b4bf8a7d532ee9144977f6ac8fae105ab358e231f2cd9a216d68b0877161e158b14837fb1426f4a629f17ddd7bbf9019941ff9bbe3d6fd30d68dbd9e3b3cfb282bc08db959b660ed8f7ebc67714be3d00f8f1e2cbc9404069335265ce12996f7cb48c1f3221f7f892493e4711a6dbd79a0298e0e0b9936b06a3d08821f558f5738b05e2ead126157186dac58de8a7098291efacb6666b2dca73d422fbf6a09b30f3c30cc9e34faa453ef1d770f7008b7c54d644be9716b27aa40b67126130b61c29a254a578365216655e8a5c6955e72fb67e6f1796e499edcaa33e0b43bd172d9977deff713978907e12189743913c7c847", 0x1e0}]) 08:57:35 executing program 5: 08:57:35 executing program 4: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000000)) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r3 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r3, 0x40047438, &(0x7f0000000180)=""/246) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r4, &(0x7f0000000040)=ANY=[], 0xfea7) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r4, 0x0) ioctl$PPPIOCSFLAGS1(r3, 0x40047459, &(0x7f00000000c0)) 08:57:35 executing program 5: [ 1343.152350] IPVS: ftp: loaded support on port[0] = 21 [ 1343.188893] IPVS: ftp: loaded support on port[0] = 21 08:57:35 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_read_part_table(0x0, 0x2, &(0x7f0000002640)=[{0x0, 0xffffffff00000000, 0xfffffffffffffff7}, {&(0x7f0000001540)="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", 0x1e0}]) 08:57:35 executing program 5: 08:57:35 executing program 5: 08:57:37 executing program 2: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ttyS3\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x5402, &(0x7f00000000c0)={0x0, 0x0, 0xf843, 0x0, 0x0, "79e9de3d80a657aa9481d73875106c5eba1ada"}) ioctl$TIOCMGET(r0, 0x5415, &(0x7f0000000100)) unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r3, 0x5423, &(0x7f0000000000)=0x3) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r4 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r4, 0x40047438, &(0x7f0000000180)=""/246) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r5, &(0x7f0000000040)=ANY=[], 0xfea7) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r5, 0x0) ioctl$PPPIOCSFLAGS1(r4, 0x40047457, &(0x7f00000000c0)) 08:57:37 executing program 5: 08:57:37 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_read_part_table(0x0, 0x2, &(0x7f0000002640)=[{0x0, 0x0, 0xfffffffffffffff7}, {&(0x7f0000001540)="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", 0x1e0}]) 08:57:37 executing program 1: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000000)=0x3) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, [], 0x0, 0x0, r2, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r3 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r3, 0x40047438, &(0x7f0000000180)=""/246) r4 = socket$inet6(0xa, 0x2, 0x0) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) r6 = openat$cgroup_ro(r5, 0xfffffffffffffffe, 0x275a, 0x0) write$binfmt_script(r6, &(0x7f0000000040)=ANY=[], 0xfea7) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r6, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$PPPIOCSFLAGS1(r3, 0x40047457, &(0x7f00000000c0)) 08:57:37 executing program 0: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000000)=0x3) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r3 = openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$EVIOCGPROP(r3, 0x40047438, &(0x7f0000000180)=""/246) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r4, &(0x7f0000000040)=ANY=[], 0xfea7) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r4, 0x0) ioctl$PPPIOCSFLAGS1(r3, 0x4020744f, &(0x7f00000000c0)) 08:57:37 executing program 4: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000000)) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r3 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r3, 0x40047438, &(0x7f0000000180)=""/246) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r4, &(0x7f0000000040)=ANY=[], 0xfea7) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r4, 0x0) ioctl$PPPIOCSFLAGS1(r3, 0x40047459, &(0x7f00000000c0)) 08:57:37 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet(0x2, 0x1, 0x0) setsockopt$inet_opts(r0, 0x0, 0x4, 0x0, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000100)='syz_tun\x00', 0x10) connect$inet(r0, &(0x7f0000000080)={0x2, 0x0, @private}, 0x10) [ 1345.171559] IPVS: ftp: loaded support on port[0] = 21 [ 1345.179764] IPVS: ftp: loaded support on port[0] = 21 [ 1345.180591] IPVS: ftp: loaded support on port[0] = 21 [ 1345.247283] IPVS: ftp: loaded support on port[0] = 21 08:57:37 executing program 5: r0 = socket$inet(0x2, 0x802, 0x0) setsockopt$inet_int(r0, 0x0, 0xb, 0x0, 0x0) 08:57:37 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_read_part_table(0x0, 0x2, &(0x7f0000002640)=[{0x0, 0x0, 0xfffffffffffffff7}, {&(0x7f0000001540)="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", 0x1e0}]) 08:57:37 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r2, 0x0, r0, 0x0, 0x420000a75, 0x0) write$binfmt_elf64(r3, &(0x7f0000000000)=ANY=[], 0xfffffd88) close(r1) 08:57:37 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_read_part_table(0x0, 0x2, &(0x7f0000002640)=[{0x0, 0x0, 0xfffffffffffffff7}, {&(0x7f0000001540)="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", 0x1e0}]) 08:57:37 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_read_part_table(0x0, 0x2, &(0x7f0000002640)=[{0x0, 0x0, 0xfffffffffffffff7}, {&(0x7f0000001540)="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", 0x1e0}]) [ 1345.909960] IPVS: ftp: loaded support on port[0] = 21 [ 1346.021800] IPVS: ftp: loaded support on port[0] = 21 08:57:38 executing program 2: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000000)=0x3) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r3 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r3, 0x40047438, &(0x7f0000000180)=""/246) r4 = openat(r1, &(0x7f0000000140)='./file0\x00', 0x0, 0x0) getsockopt$MISDN_TIME_STAMP(r4, 0x0, 0x1, &(0x7f00000002c0), &(0x7f0000000300)=0x4) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r5, &(0x7f0000000040)=ANY=[], 0xfea7) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r5, 0x0) r6 = socket(0x1000000010, 0x80002, 0x0) sendmmsg$alg(r6, &(0x7f0000000200), 0x10efe10675dec16, 0x0) ioctl$IMCLEAR_L2(r6, 0x80044946, &(0x7f0000000100)=0x3) ioctl$PPPIOCSFLAGS1(r3, 0x40047457, &(0x7f00000000c0)) 08:57:38 executing program 4: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000000)=0x3) bpf$PROG_LOAD(0x5, 0x0, 0x0) r3 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r3, 0x40047438, &(0x7f0000000180)=""/246) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r4, &(0x7f0000000040)=ANY=[], 0xfea7) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r4, 0x0) ioctl$PPPIOCSFLAGS1(r3, 0x40047459, &(0x7f00000000c0)) 08:57:38 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_read_part_table(0x0, 0x2, &(0x7f0000002640)=[{0x0, 0x0, 0xfffffffffffffff7}, {&(0x7f0000001540)="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", 0x1e0}]) [ 1346.599769] IPVS: ftp: loaded support on port[0] = 21 [ 1346.602454] IPVS: ftp: loaded support on port[0] = 21 [ 1347.121159] IPVS: ftp: loaded support on port[0] = 21 08:57:40 executing program 1: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000000)=0x3) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r1, 0x40047438, &(0x7f0000000180)=""/246) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r2, &(0x7f0000000040)=ANY=[], 0xfea7) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r3, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000000)={0x3c, 0x0, 0x1, 0x409, 0x0, 0x0, {}, [@CTA_TUPLE_ORIG={0x24, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @broadcast}, {0x8, 0x2, @dev}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_SEQ_ADJ_REPLY={0x4}]}, 0x3c}}, 0x0) getsockopt$IP_SET_OP_GET_FNAME(r3, 0x1, 0x53, &(0x7f0000000100)={0x8, 0x7, 0x0, 'syz0\x00'}, &(0x7f0000000140)=0x2c) keyctl$read(0xb, 0x0, 0x0, 0x0) r4 = add_key(&(0x7f0000000540)='big_key\x00', &(0x7f0000000580)={'syz', 0x0}, 0x0, 0x0, 0x0) keyctl$KEYCTL_PKEY_QUERY(0x18, r4, 0x0, &(0x7f00000005c0)='system_u:object_r:dpkg_var_lib_t:s0\x00', &(0x7f0000000600)) r5 = syz_open_dev$mouse(&(0x7f0000000340)='/dev/input/mouse#\x00', 0x1a7b015c, 0x478001) r6 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f00000003c0)='NLBL_UNLBL\x00') sendmsg$NLBL_UNLABEL_C_STATICREMOVE(r5, &(0x7f0000000500)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f00000004c0)={&(0x7f0000000640)={0x9c, r6, 0x0, 0x70bd27, 0x25dfdbfd, {}, [@NLBL_UNLABEL_A_ACPTFLG={0x5, 0x1, 0x1}, @NLBL_UNLABEL_A_SECCTX={0x28, 0x7, 'system_u:object_r:dpkg_var_lib_t:s0\x00'}, @NLBL_UNLABEL_A_IFACE={0x14, 0x6, 'ipvlan0\x00'}, @NLBL_UNLABEL_A_SECCTX={0x28, 0x7, 'system_u:object_r:anacron_exec_t:s0\x00'}, @NLBL_UNLABEL_A_ACPTFLG={0x5}, @NLBL_UNLABEL_A_IPV6ADDR={0x14, 0x2, @loopback}]}, 0x9c}, 0x1, 0x0, 0x0, 0x20040040}, 0x20005000) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r2, 0x0) ioctl$PPPIOCSFLAGS1(r1, 0x40047457, &(0x7f00000000c0)) 08:57:40 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x2a7) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c) socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x200000000204a100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f00000000c0)={@empty}, 0x20) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x1e) wait4(0x0, 0x0, 0x0, 0x0) 08:57:40 executing program 0: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000000)=0x3) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r3 = openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$EVIOCGPROP(r3, 0x40047438, &(0x7f0000000180)=""/246) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r4, &(0x7f0000000040)=ANY=[], 0xfea7) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r4, 0x0) ioctl$PPPIOCSFLAGS1(r3, 0x4020744f, &(0x7f00000000c0)) 08:57:40 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_read_part_table(0x0, 0x2, &(0x7f0000002640)=[{0x0, 0x0, 0xfffffffffffffff7}, {&(0x7f0000001540)="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", 0x1e0}]) 08:57:40 executing program 4: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000000)=0x3) bpf$PROG_LOAD(0x5, 0x0, 0x0) r3 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r3, 0x40047438, &(0x7f0000000180)=""/246) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r4, &(0x7f0000000040)=ANY=[], 0xfea7) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r4, 0x0) ioctl$PPPIOCSFLAGS1(r3, 0x40047459, &(0x7f00000000c0)) 08:57:40 executing program 2: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000100)='/dev/bsg\x00', 0x101000, 0x0) ioctl$TIOCSSOFTCAR(r1, 0x541a, &(0x7f0000000140)=0x80000001) r2 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r3, 0x5423, &(0x7f0000000000)=0x3) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r4 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r4, 0x40047438, &(0x7f0000000180)=""/246) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r5, &(0x7f0000000040)=ANY=[], 0xfea7) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r5, 0x0) ioctl$PPPIOCSFLAGS1(r4, 0x40047457, &(0x7f00000000c0)) [ 1348.677964] IPVS: ftp: loaded support on port[0] = 21 [ 1348.688187] IPVS: ftp: loaded support on port[0] = 21 [ 1348.693228] IPVS: ftp: loaded support on port[0] = 21 [ 1348.700998] IPVS: ftp: loaded support on port[0] = 21 08:57:40 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_read_part_table(0x0, 0x2, &(0x7f0000002640)=[{0x0, 0x0, 0xfffffffffffffff7}, {&(0x7f0000001540)="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", 0x1e0}]) 08:57:41 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_read_part_table(0x0, 0x2, &(0x7f0000002640)=[{0x0, 0x0, 0xfffffffffffffff7}, {&(0x7f0000001540)="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", 0x1e0}]) 08:57:41 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_read_part_table(0x0, 0x2, &(0x7f0000002640)=[{0x0, 0x0, 0xfffffffffffffff7}, {&(0x7f0000001540)="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", 0x1e0}]) [ 1349.367852] ptrace attach of ""[23773] was attempted by "/root/syz-executor.5"[23763] 08:57:41 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_CTHELPER_NEW(r3, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f00000002c0)=ANY=[@ANYBLOB="d0000000000901030000000000000000000700000900010073797a3000000000b00002"], 0xd0}}, 0x0) [ 1349.462011] IPVS: ftp: loaded support on port[0] = 21 [ 1349.467561] IPVS: ftp: loaded support on port[0] = 21 08:57:41 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_read_part_table(0x0, 0x2, &(0x7f0000002640)=[{0x0, 0x0, 0xfffffffffffffff7}, {&(0x7f0000001540)="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", 0x1e0}]) [ 1349.572860] netlink: 172 bytes leftover after parsing attributes in process `syz-executor.5'. 08:57:41 executing program 4: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000000)=0x3) bpf$PROG_LOAD(0x5, 0x0, 0x0) r3 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r3, 0x40047438, &(0x7f0000000180)=""/246) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r4, &(0x7f0000000040)=ANY=[], 0xfea7) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r4, 0x0) ioctl$PPPIOCSFLAGS1(r3, 0x40047459, &(0x7f00000000c0)) [ 1349.670902] netlink: 172 bytes leftover after parsing attributes in process `syz-executor.5'. [ 1349.807922] IPVS: ftp: loaded support on port[0] = 21 08:57:42 executing program 5: syz_emit_ethernet(0x4a, &(0x7f0000000080)={@local, @multicast, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "209000", 0x14, 0x2f, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60, 0x0, 0x0, 0x0, 0x7]}, @local, {[], {{0x3c00, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 08:57:42 executing program 0: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000000)=0x3) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r3 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(0xffffffffffffffff, 0x40047438, &(0x7f0000000180)=""/246) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r4, &(0x7f0000000040)=ANY=[], 0xfea7) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r4, 0x0) ioctl$PPPIOCSFLAGS1(r3, 0x4020744f, &(0x7f00000000c0)) 08:57:42 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_read_part_table(0x0, 0x2, &(0x7f0000002640)=[{0x0, 0x0, 0xfffffffffffffff7}, {&(0x7f0000001540)="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", 0x1e0}]) 08:57:42 executing program 1: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000000)=0x3) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r2, 0x40047438, &(0x7f0000000180)=""/246) r3 = syz_open_dev$mouse(&(0x7f0000000400)='/dev/input/mouse#\x00', 0x50b6, 0x200) r4 = socket$inet6(0xa, 0x1, 0x8) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) r6 = eventfd2(0x400, 0x80800) io_submit(0x0, 0x4, &(0x7f0000000600)=[&(0x7f0000000380)={0x0, 0x0, 0x0, 0x3, 0x8000, r2, &(0x7f00000002c0)="a272d64af1f6e30a9085458792eed9a280b10ba6c2c5c8b400480e24d3605567dbcf30ac76dca1bb8babc036d1d55dc3c3464c9589d9f544c27307a9e59158b644866bd7cd5dac36e5ab62b17ac6dca302f513a9ddb3425b13fd3d204d76dd7f6940c49f802f8782c0d872da57cda66e818a9847eb2c838007634256202256fa09e5f4a2", 0x84, 0x3, 0x0, 0x2}, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x7, 0x6, 0xffffffffffffffff, &(0x7f00000003c0)="b8a8d670e8d4921527890fcac06972cc6e951a03", 0x14, 0xd3a3, 0x0, 0xd284da2edcda186d, r3}, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x5, 0x7f, r1, &(0x7f0000000480)="d0054b27f71b9482eeedc3c3604f5adf69ddc02faa14576033615dab96657ffa798e097b0deef6e78f95931ec5ecfbd5df1dd5e0171399e03ab2545e9e363d12a185391f4069eebea03c7f0c701acbbb9d83108df07442a4b8479aa82858bd07b2c1abb83debf668320916fbb63aaad28a704af6d82139", 0x77, 0x81a, 0x0, 0x2, r5}, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x1, 0x8, r2, &(0x7f0000000540)="b8bb621853f5f71ccc7aaae042bff2fef747afdd7ca2dc8e89ab04f33f14c248580c7cf19356a58466d086c03a64dea1412895ce9b3b8e6af1b1940007f6c09e04bc9ebf37e1035249e5684bcbfa76d7fedbd4886f3d5c531a3f0eb265c0e5a496e12dc28f85ce251d", 0x69, 0x2, 0x0, 0x2, r6}]) socket$inet6(0xa, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x2000008) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r7, &(0x7f0000000040)=ANY=[], 0xfea7) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r7, 0x0) ioctl$PPPIOCSFLAGS1(r2, 0x40047457, &(0x7f00000000c0)) [ 1350.202165] IPVS: ftp: loaded support on port[0] = 21 08:57:42 executing program 5: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.controllers\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r0) close(r1) socket$kcm(0x29, 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000300)) write$cgroup_type(r1, &(0x7f0000000080)='threaded\x00', 0x11ffffce1) recvmsg(r0, &(0x7f0000000140)={0x0, 0x1d, &(0x7f0000000000)=[{&(0x7f00000000c0)=""/110, 0x7ffff000}], 0x1}, 0x3f00) [ 1350.300860] IPVS: ftp: loaded support on port[0] = 21 [ 1350.963904] IPVS: ftp: loaded support on port[0] = 21 08:57:44 executing program 4: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000000)=0x3) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r3 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r3, 0x40047438, &(0x7f0000000180)=""/246) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r4, &(0x7f0000000040)=ANY=[], 0xfea7) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r4, 0x0) ioctl$PPPIOCSFLAGS1(r3, 0x40047459, &(0x7f00000000c0)) 08:57:44 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_read_part_table(0x0, 0x2, &(0x7f0000002640)=[{0x0, 0x0, 0xfffffffffffffff7}, {&(0x7f0000001540)="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", 0x1e0}]) 08:57:44 executing program 0: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000000)=0x3) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r3 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(0xffffffffffffffff, 0x40047438, &(0x7f0000000180)=""/246) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r4, &(0x7f0000000040)=ANY=[], 0xfea7) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r4, 0x0) ioctl$PPPIOCSFLAGS1(r3, 0x4020744f, &(0x7f00000000c0)) 08:57:44 executing program 5: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.controllers\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r0) close(r1) socket$kcm(0x29, 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000300)) write$cgroup_type(r1, &(0x7f0000000080)='threaded\x00', 0x11ffffce1) recvmsg(r0, &(0x7f0000000140)={0x0, 0x1d, &(0x7f0000000000)=[{&(0x7f00000000c0)=""/110, 0x7ffff000}], 0x1}, 0x3f00) 08:57:44 executing program 1: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000000)=0x3) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r1, 0x40047438, &(0x7f0000000180)=""/246) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r2, &(0x7f0000000040)=ANY=[], 0xfea7) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r2, 0x0) r3 = socket(0x1000000010, 0x80002, 0x0) sendmmsg$alg(r3, &(0x7f0000000200), 0x10efe10675dec16, 0x0) getsockopt$inet6_buf(r3, 0x29, 0xd3, &(0x7f00000002c0)=""/4096, &(0x7f0000000140)=0x1000) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ttyS3\x00', 0x90040, 0x0) ioctl$PPPIOCSFLAGS1(r1, 0x40047457, &(0x7f00000000c0)) [ 1352.814979] IPVS: ftp: loaded support on port[0] = 21 [ 1352.829754] IPVS: ftp: loaded support on port[0] = 21 [ 1352.831452] IPVS: ftp: loaded support on port[0] = 21 08:57:45 executing program 2: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)) dup(0xffffffffffffffff) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000000)=0x3) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x15, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r1, 0x40047438, &(0x7f0000000180)=""/246) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r2, &(0x7f0000000040)=ANY=[], 0xfea7) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r2, 0x0) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, 0x0, 0x0, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setresuid(0x0, r4, 0x0) ioctl$DRM_IOCTL_GET_CLIENT(0xffffffffffffffff, 0xc0286405, &(0x7f0000000100)={0x101, 0x7, {}, {r4}, 0xffffffff, 0x9}) ioctl$PPPIOCSFLAGS1(0xffffffffffffffff, 0x40047457, &(0x7f0000000140)=0x1220) ioctl$USBDEVFS_GET_SPEED(0xffffffffffffffff, 0x551f) 08:57:45 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_read_part_table(0x0, 0x2, &(0x7f0000002640)=[{0x0, 0x0, 0xfffffffffffffff7}, {&(0x7f0000001540)="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", 0x1e0}]) [ 1353.115101] IPVS: ftp: loaded support on port[0] = 21 08:57:45 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_read_part_table(0x0, 0x2, &(0x7f0000002640)=[{0x0, 0x0, 0xfffffffffffffff7}, {&(0x7f0000001540)="c2ec123b0a7b69be3e42e60d3f03ff5b20b3406e8d7eebd2456f5388ad7135b73efb98088798c4d4506cd2295e60b5e9f9f2399833ad179a03e098e07644033f2d0e3c37a84095cdde0312f1d81191a92ccbe761424e7d3033a056d7d07c4c4bc2dbbb00079ae5158b76bed5cdd1d93054fff6874b43ef1289c75e4c9b911d69313cbc4e0abcab496b4ce2c83f238a2b30fc8210b75bcdcd0b774ac467962cc4389843f92f418b0718a87f17ae20f1790c7ff086746847e2217207cede6d2af2a58d7148128b2f86806b3be24ced787543219ae633ab66b7828c5bfd87571ee33ab89138401439491e3f3c6a4a56b4bf8a7d532ee9144977f6ac8fae105ab358e231f2cd9a216d68b0877161e158b14837fb1426f4a629f17ddd7bbf9019941ff9bbe3d6fd30d68dbd9e3b3cfb282bc08db959b660ed8f7ebc67714be3d00f8f1e2cbc9404069335265ce12996f7cb48c1f3221f7f892493e4711a6dbd79a0298e0e0b9936b06a3d08821f558f5738b05e2ead126157186dac58de8a7098291efacb6666b2dca73d422fbf6a09b30f3c30cc9e34faa453ef1d770f7008b7c54d644be9716b27aa40b67126130b61c29a254a578365216655e8a5c6955e72fb67e6f1796e499edcaa33e0b43bd172d9977deff713978907e12189743913c7c847", 0x1e0}]) 08:57:45 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_read_part_table(0x0, 0x2, &(0x7f0000002640)=[{0x0, 0x0, 0xfffffffffffffff7}, {&(0x7f0000001540)="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", 0x1e0}]) [ 1353.735327] IPVS: ftp: loaded support on port[0] = 21 08:57:45 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_read_part_table(0x0, 0x2, &(0x7f0000002640)=[{0x0, 0x0, 0xfffffffffffffff7}, {&(0x7f0000001540)="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", 0x1e0}]) 08:57:46 executing program 5: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.controllers\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r0) close(r1) socket$kcm(0x29, 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000300)) write$cgroup_type(r1, &(0x7f0000000080)='threaded\x00', 0x11ffffce1) recvmsg(r0, &(0x7f0000000140)={0x0, 0x1d, &(0x7f0000000000)=[{&(0x7f00000000c0)=""/110, 0x7ffff000}], 0x1}, 0x3f00) 08:57:46 executing program 4: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000000)=0x3) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r3 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r3, 0x40047438, &(0x7f0000000180)=""/246) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r4, &(0x7f0000000040)=ANY=[], 0xfea7) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r4, 0x0) ioctl$PPPIOCSFLAGS1(r3, 0x40047459, &(0x7f00000000c0)) [ 1354.019472] IPVS: ftp: loaded support on port[0] = 21 08:57:46 executing program 0: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000000)=0x3) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r3 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(0xffffffffffffffff, 0x40047438, &(0x7f0000000180)=""/246) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r4, &(0x7f0000000040)=ANY=[], 0xfea7) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r4, 0x0) ioctl$PPPIOCSFLAGS1(r3, 0x4020744f, &(0x7f00000000c0)) 08:57:46 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_read_part_table(0x0, 0x2, &(0x7f0000002640)=[{0x0, 0x0, 0xfffffffffffffff7}, {&(0x7f0000001540)="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", 0x1e0}]) [ 1354.142920] IPVS: ftp: loaded support on port[0] = 21 [ 1354.209638] IPVS: ftp: loaded support on port[0] = 21 08:57:46 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_read_part_table(0x0, 0x2, &(0x7f0000002640)=[{0x0, 0x0, 0xfffffffffffffff7}, {&(0x7f0000001540)="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", 0x1e0}]) 08:57:46 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_read_part_table(0x0, 0x2, &(0x7f0000002640)=[{0x0, 0x0, 0xfffffffffffffff7}, {&(0x7f0000001540)="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", 0x1e0}]) 08:57:47 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_read_part_table(0x0, 0x2, &(0x7f0000002640)=[{0x0, 0x0, 0xfffffffffffffff7}, {&(0x7f0000001540)="c2ec123b117b69be3e42e60d3f03ff5b20b3406e8d7eebd2456f5388ad7135b73efb98088798c4d4506cd2295e60b5e9f9f2399833ad179a03e098e07644033f2d0e3c37a84095cdde0312f1d81191a92ccbe761424e7d3033a056d7d07c4c4bc2dbbb00079ae5158b76bed5cdd1d93054fff6874b43ef1289c75e4c9b911d69313cbc4e0abcab496b4ce2c83f238a2b30fc8210b75bcdcd0b774ac467962cc4389843f92f418b0718a87f17ae20f1790c7ff086746847e2217207cede6d2af2a58d7148128b2f86806b3be24ced787543219ae633ab66b7828c5bfd87571ee33ab89138401439491e3f3c6a4a56b4bf8a7d532ee9144977f6ac8fae105ab358e231f2cd9a216d68b0877161e158b14837fb1426f4a629f17ddd7bbf9019941ff9bbe3d6fd30d68dbd9e3b3cfb282bc08db959b660ed8f7ebc67714be3d00f8f1e2cbc9404069335265ce12996f7cb48c1f3221f7f892493e4711a6dbd79a0298e0e0b9936b06a3d08821f558f5738b05e2ead126157186dac58de8a7098291efacb6666b2dca73d422fbf6a09b30f3c30cc9e34faa453ef1d770f7008b7c54d644be9716b27aa40b67126130b61c29a254a578365216655e8a5c6955e72fb67e6f1796e499edcaa33e0b43bd172d9977deff713978907e12189743913c7c847", 0x1e0}]) 08:57:47 executing program 2: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$BLKPBSZGET(r1, 0x127b, &(0x7f00000002c0)) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) fanotify_mark(r1, 0xfbcb0c8f7c5fd091, 0x0, r1, &(0x7f0000000300)='./file0\x00') ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000140)={'rose0\x00', &(0x7f0000000100)=@ethtool_wolinfo={0x6, 0x9, 0x4, "427193ee5d22"}}) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000000)=0x3) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r3 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r3, 0x40047438, &(0x7f0000000180)=""/246) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r4, &(0x7f0000000040)=ANY=[], 0xfea7) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r4, 0x0) ioctl$PPPIOCSFLAGS1(r3, 0x40047457, &(0x7f00000000c0)) 08:57:47 executing program 1: unshare(0x6a030480) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000000)=0x3) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r1, 0x40047438, &(0x7f0000000180)=""/246) r2 = socket$inet6(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)) r3 = dup(r2) r4 = socket$inet6(0xa, 0x2, 0x0) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$TUNSETVNETBE(r5, 0x400454de, &(0x7f0000000140)) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r6 = openat$cgroup_ro(r3, &(0x7f0000000100)='memory.current\x00', 0x275a, 0x0) write$binfmt_script(r6, &(0x7f0000000040)=ANY=[], 0xfea7) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r6, 0x0) ioctl$PPPIOCSFLAGS1(r1, 0x40047457, &(0x7f00000000c0)) 08:57:47 executing program 5: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.controllers\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r0) close(r1) socket$kcm(0x29, 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000300)) write$cgroup_type(r1, &(0x7f0000000080)='threaded\x00', 0x11ffffce1) recvmsg(r0, &(0x7f0000000140)={0x0, 0x1d, &(0x7f0000000000)=[{&(0x7f00000000c0)=""/110, 0x7ffff000}], 0x1}, 0x3f00) 08:57:47 executing program 4: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000000)=0x3) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r3 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r3, 0x40047438, &(0x7f0000000180)=""/246) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r4, &(0x7f0000000040)=ANY=[], 0xfea7) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r4, 0x0) ioctl$PPPIOCSFLAGS1(r3, 0x40047459, &(0x7f00000000c0)) 08:57:47 executing program 0: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000000)=0x3) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r3 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r3, 0x40047438, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r4, &(0x7f0000000040)=ANY=[], 0xfea7) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r4, 0x0) ioctl$PPPIOCSFLAGS1(r3, 0x4020744f, &(0x7f00000000c0)) 08:57:47 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_read_part_table(0x0, 0x2, &(0x7f0000002640)=[{0x0, 0x0, 0xfffffffffffffff7}, {&(0x7f0000001540)="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", 0x1e0}]) [ 1355.297481] IPVS: ftp: loaded support on port[0] = 21 [ 1355.312698] IPVS: ftp: loaded support on port[0] = 21 [ 1355.320651] IPVS: ftp: loaded support on port[0] = 21 08:57:47 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_read_part_table(0x0, 0x2, &(0x7f0000002640)=[{0x0, 0x0, 0xfffffffffffffff7}, {&(0x7f0000001540)="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", 0x1e0}]) 08:57:48 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_read_part_table(0x0, 0x2, &(0x7f0000002640)=[{0x0, 0x0, 0xfffffffffffffff7}, {&(0x7f0000001540)="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", 0x1e0}]) 08:57:48 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_read_part_table(0x0, 0x2, &(0x7f0000002640)=[{0x0, 0x0, 0xfffffffffffffff7}, {&(0x7f0000001540)="c2ec123b497b69be3e42e60d3f03ff5b20b3406e8d7eebd2456f5388ad7135b73efb98088798c4d4506cd2295e60b5e9f9f2399833ad179a03e098e07644033f2d0e3c37a84095cdde0312f1d81191a92ccbe761424e7d3033a056d7d07c4c4bc2dbbb00079ae5158b76bed5cdd1d93054fff6874b43ef1289c75e4c9b911d69313cbc4e0abcab496b4ce2c83f238a2b30fc8210b75bcdcd0b774ac467962cc4389843f92f418b0718a87f17ae20f1790c7ff086746847e2217207cede6d2af2a58d7148128b2f86806b3be24ced787543219ae633ab66b7828c5bfd87571ee33ab89138401439491e3f3c6a4a56b4bf8a7d532ee9144977f6ac8fae105ab358e231f2cd9a216d68b0877161e158b14837fb1426f4a629f17ddd7bbf9019941ff9bbe3d6fd30d68dbd9e3b3cfb282bc08db959b660ed8f7ebc67714be3d00f8f1e2cbc9404069335265ce12996f7cb48c1f3221f7f892493e4711a6dbd79a0298e0e0b9936b06a3d08821f558f5738b05e2ead126157186dac58de8a7098291efacb6666b2dca73d422fbf6a09b30f3c30cc9e34faa453ef1d770f7008b7c54d644be9716b27aa40b67126130b61c29a254a578365216655e8a5c6955e72fb67e6f1796e499edcaa33e0b43bd172d9977deff713978907e12189743913c7c847", 0x1e0}]) [ 1356.251179] IPVS: ftp: loaded support on port[0] = 21 08:57:48 executing program 5: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000024c0)="2e00000021008102e00f80ecdb4cb902020000fffd000000810040fb12000c000006ca1b40d719a906000500000f", 0x2e}], 0x1, 0x0, 0x0, 0x10}, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'\x00', 0x7132}) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000340)='/dev/net/tun\x00', 0x50000, 0x0) ioctl$TUNSETTXFILTER(r2, 0x400454d1, &(0x7f0000000380)={0x0, 0x5, [@dev={[], 0xd}, @multicast, @remote, @multicast, @random="8bf7d8c90dc1"]}) sendmsg(0xffffffffffffffff, 0x0, 0x0) r3 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3, 0x0, 0x0, 0x3f, 0x0, 0x7, 0x92, 0xd, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000040), 0x4}, 0x0, 0xfffffffffffffd5b, 0x4, 0x2, 0x4, 0x8001, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000500)=ANY=[@ANYBLOB], 0x24) openat$cgroup_ro(r4, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, r4) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f0000000200)={0x2, &(0x7f0000000000)=[{0x9c, 0xfc}, {0x6}]}) 08:57:48 executing program 1: unshare(0x40000000) r0 = socket(0x1000000010, 0x80002, 0x0) sendmmsg$alg(r0, &(0x7f0000000200), 0x10efe10675dec16, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f0000000100)=[@in={0x2, 0x4e22, @private=0xa010102}, @in6={0xa, 0x4e24, 0x1, @ipv4={[], [], @broadcast}, 0x3f}, @in6={0xa, 0x4e21, 0x0, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0xc8f}, @in={0x2, 0x4e24, @empty}], 0x58) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000000)=0x3) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r2, 0x40047438, &(0x7f0000000180)=""/246) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r3, &(0x7f0000000040)=ANY=[], 0xfea7) mmap(&(0x7f0000966000/0x1000)=nil, 0x1000, 0x1, 0x110, r3, 0x0) ioctl$PPPIOCSFLAGS1(r2, 0x40047457, &(0x7f00000000c0)) 08:57:48 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_read_part_table(0x0, 0x2, &(0x7f0000002640)=[{0x0, 0x0, 0xfffffffffffffff7}, {&(0x7f0000001540)="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", 0x1e0}]) [ 1356.471056] netlink: 'syz-executor.5': attribute type 12 has an invalid length. [ 1356.497530] IPVS: ftp: loaded support on port[0] = 21 [ 1357.161809] IPVS: ftp: loaded support on port[0] = 21 08:57:51 executing program 4: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000000)=0x3) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r3 = openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$EVIOCGPROP(r3, 0x40047438, &(0x7f0000000180)=""/246) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r4, &(0x7f0000000040)=ANY=[], 0xfea7) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r4, 0x0) ioctl$PPPIOCSFLAGS1(r3, 0x40047459, &(0x7f00000000c0)) 08:57:51 executing program 0: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000000)=0x3) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r3 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r3, 0x40047438, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r4, &(0x7f0000000040)=ANY=[], 0xfea7) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r4, 0x0) ioctl$PPPIOCSFLAGS1(r3, 0x4020744f, &(0x7f00000000c0)) 08:57:51 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_read_part_table(0x0, 0x2, &(0x7f0000002640)=[{0x0, 0x0, 0xfffffffffffffff7}, {&(0x7f0000001540)="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", 0x1e0}]) 08:57:51 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.swap.current\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x400007) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='\x00', r0}, 0x10) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x9, 0x10001}, 0x0, 0x0, 0x2, 0xd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_RESET(r1, 0x2403, 0x0) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x80000000) perf_event_open(&(0x7f00000004c0)={0x5, 0xffffffffffffffcf, 0x7b, 0x9, 0x5, 0x9, 0x0, 0x39, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x4, 0x1, @perf_bp={&(0x7f0000000540), 0x8}, 0x12, 0x8, 0x6, 0x2, 0x6, 0x1000000, 0x7}, 0x0, 0xe, 0xffffffffffffffff, 0x9) r2 = socket$kcm(0x2, 0x3, 0x2) ioctl$SIOCSIFHWADDR(r2, 0x8914, &(0x7f0000000700)={'ipvlan1\x00', @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}}) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='rdma.current\x00', 0x0, 0x0) r3 = socket$kcm(0xa, 0x2, 0x11) r4 = socket$kcm(0x11, 0x200000000000002, 0x300) r5 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000001740)='pids.current\x00', 0x0, 0x0) recvmsg$kcm(r4, &(0x7f0000001cc0)={&(0x7f0000004e00)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x80, 0x0}, 0x0) sendmsg$inet(r3, &(0x7f0000000780)={&(0x7f0000000240)={0x2, 0x4e23, @multicast1}, 0x10, 0x0, 0x0, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r6, @empty, @multicast1}}}], 0x20}, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x400007) perf_event_open(&(0x7f0000000940)={0x2, 0x70, 0x40, 0x1, 0x9, 0x4, 0x0, 0x401, 0xe48d0, 0xe, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, @perf_bp={&(0x7f0000000000), 0xa}, 0x26000, 0x0, 0xb43, 0x7, 0x1ff, 0x3f}, 0x0, 0x5, r5, 0xa) bpf$BPF_PROG_ATTACH(0x8, &(0x7f00000016c0)={@cgroup, r0, 0x18, 0x6e6ce4a4042eef59, r0}, 0x14) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000280)=@in={0x2, 0x4e22, @broadcast}, 0x80, &(0x7f0000000a80)=[{&(0x7f0000000d80)="571f078e599dadbcfd8d23b714d87194bf853fb029983e08505515bbd88a88e99c581422372ce91aad629ef3177eba5990ce5b1ab69fde5acc7d2b61a3f3728175f75b6ae7587fed3077b6a95f5324274320fffbfd4a53b0561e7eed885d70599b4e21f0714484e6469608d46b0efc908bfc9e1e4fe111d87b3cc382d18a9e476c046ca0623819423bba6b44eaaf59e672155ebca976a03348c1ff7337770f4fcd417360b06ed5b94bc3f0c6214f064421dd9e2cac8ac49362a1942c5439ce84f6fd5a145bdb1278573b070000000000006d49b8adfd2e30", 0xd8}, {&(0x7f0000000200)="3c5c45c3e3b8385667fbf98d52b1aa9cd20f1c6ef4a5d05675903845d295000cbc564aec7fb298ab9653f4061833f5", 0x2f}, {&(0x7f0000000440)="9da7ee4ae4193d173becb789a073e995dc2ca790a83bbea28830c442f1c4d0a2f73c84c8f82692cd0d1414f10f61bfd4dc434bff49752ef28f8c2982e4f19915829d33ff7af702ef618f0239ba5c507348f7c74075f7a7e9af63fd72cdc901c56b1d952a4f1ab6d04d7268e048e6a5876da71284", 0x74}, {&(0x7f00000007c0)="7e4a947ba61c127620ddc4a81fbf762888375d7f33145cccbe1098f81e6622ecc4d90cc1f0837fb8a5b1c47e10ec0a8db54bda8dae822818a44dd86e649c376e08963bbf4d53295001a6b3602c9740a73460b01b8357e183542f84d7592c38d26bf9a10259657035f4fecd6d729413d41af980b7a26193985bf98b8505cec1e00ae8b31fdb84b2a3522c0d6475f35d72be59066d61fd7830bdb1089ecb7026d5347e5edb88e95280e6427ccbd8483e3aa8458c7e4f0c22b6af5eb3efd3106eccb8f4763e28fd07fe39f5189e2e961bc84b848478ff272d2ab1424a67daeeaca32c50dd10c7f6eb476bc500"/247, 0xf7}, {&(0x7f0000000c40)="f9d284a28175cd60d8c319d40ea8118bc764c53f484c56c2ab1a470d221132697e03c0dddcd230bee7eaa2b72be0dab3abb114603eec08526aa782c15b089f50064477c646ffe6295dcc5de6a26acc31c3e80d0e388223cf33768746674ce5e807d0c11a403490561f17c56253491ab30b4b432c41e4c6ae17068ecc555aabe1da0f6cc4aede120faec008d599d822d9fa2ef65fec2b55c82dfae77740c7594540df637d79ba5775af131e654310c5f59ccb5837afe33b141c4cb0c90f9550caab6a5291ac50a858d445a2439f25444c71edf87efe086edea217ec4fcdfbe6e04d102416c468d2246fe2f20a0fc1fc343dfd6b5f904cb0d8a6f8755474a27293c04a32e02f8bed011abad271303b51225907297837ed752fd5fa097e493b8448a8f0880442d210f7f8f988a6", 0x12c}, {&(0x7f00000008c0)="9bfefc2d273d6f067c3911ba92f73413d076814299702c97b97699396c08fbfe186c6ab5fdaf2507e969f3b54cc3ed1109267427309d596fd992d3daae5f89281ed9aecc9d4697dc6597e68129081d18d9f24cce2053f107436265529cf7a7a9", 0x60}, {&(0x7f0000000b40)="cdd82a3ddee8d4ccfa01d33165be9884b48becc54b40d653ddfa79a16728c9276f195f35685159ac6d4a54f30c5aca4d22e43fb59c2e502a61fb5e39c0b8d83b874e4da0e43ee8aea5fac686024729e8e7a8d8b9a12dbcf11b43ea6e2b6c8f06ab338bd3cdb840474cbe2c8267ce7ec940cbb4195f096ff70a07a71a877e9b0d14abb23cda1facc2b0aa3cc38eef5fb96982ab4ce15263479d482ad09ea42c21f35e68abe8907c0a3d2db95788810c50fda387a8f38588c62f7004667925e589fae47e", 0xc3}, {0x0}, {&(0x7f0000000a40)="05080030a650377280e27c20b017dc5b84b8bef36c83b4a3b45157e3ba2bd9d0bf461ba0d311eda18f41edb0432d0b23f29245542f16aaf240146638a3ccee90", 0x40}], 0x9}, 0x4000081) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0xd, 0x4, &(0x7f00000005c0)=ANY=[@ANYBLOB="52dc000000000000000089ca57ded6c02488dabb909d95d6a865ec86798552303b49bc0bce4cb374eddb95c2b23d0ca64d47f041abe1a960960edba5093b55c7a743ef28532533e9ea2874398f0ce75dea2e2af2e38b3618042fe537310db59c420736d4cab46d2947eedce852e665bec6a834978412fad02ba091dd750eab0a115cd11fe0036316485ca3a1eeb37c37cc783574a7a102a52452d0f4c3ace740f16a530d7593c13d6eec17d84e82f0851c5d19e824b83814e15cf68f9ad129b9a942740dc18605a5a0715bb8363c05c0a5c6"], &(0x7f00000000c0)='GPL\x00', 0x4, 0xff3, &(0x7f000062b000)=""/4083, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x2b, 0x0, 0x0, 0x10, 0x0}, 0x78) 08:57:51 executing program 1: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000000)=0x3) accept$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000140)=0x14) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000cc0)={0xffffffffffffffff, 0xc0, &(0x7f0000000c00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000b80)=0x8001, 0x0, 0x0, 0x0, &(0x7f0000000b00)={0x4, 0x4}, 0x0, 0x0, &(0x7f0000000ac0)={0x0, 0x0, 0x0, 0x5}, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000bc0)=0x6}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000d00)={0x1a, 0x0, &(0x7f0000000800), &(0x7f0000000840)='syzkaller\x00', 0x7, 0x0, 0x0, 0x40f00, 0x0, [], 0x0, 0x9, 0xffffffffffffffff, 0x8, &(0x7f0000000880)={0x2, 0x1}, 0x8, 0x10, &(0x7f00000008c0)={0x1, 0x7, 0x80000000, 0x2}, 0x10, r2}, 0x78) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], r1, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, r2}, 0x78) r3 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r3, 0x40047438, &(0x7f0000000180)=""/246) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r4, &(0x7f0000000040)=ANY=[], 0xfea7) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r4, 0x0) ioctl$PPPIOCSFLAGS1(r3, 0x40047457, &(0x7f00000000c0)) 08:57:51 executing program 2: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000000)=0x3) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r3 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r3, 0x40047438, &(0x7f0000000180)=""/246) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r4, &(0x7f0000000040)=ANY=[], 0xfea7) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r4, 0x0) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r5, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000000)={0x3c, 0x0, 0x1, 0x409, 0x0, 0x0, {}, [@CTA_TUPLE_ORIG={0x24, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @broadcast}, {0x8, 0x2, @dev}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_SEQ_ADJ_REPLY={0x4}]}, 0x3c}}, 0x0) pwritev(r5, &(0x7f00000004c0)=[{&(0x7f0000000100)="660aeb57a6ab80f01f8db18cfb78977e5edf5574a4c4b033ad", 0x19}, {&(0x7f00000002c0)="fb202fa6b109fea6c698c144143a6da6b4e84f530c3a9f9d4add2279fd8ce278e692f262c6aebd42cee9287453efe5a6d3ecd248919b6d22ed6857ba3ffbcbbc61e0df4c0ee5347c694a2a48c6cb4df33bac8bde7eec4a94ee1a68d5c0dc18546f80ea5c2682f70a42713541827289ec6380682cad0d349efd1f4249b527ba6dbc899505dcf5d00b131d910151a7a3568635febd9248c305ae1c28e66d303c10a0e978d5a69e0cdaaa86d85551fe244ab4e1bbf1558ca09fdaf37ad593371c4ce6348db45a4db85f9871032406417e6bc581f158fd3527da62af6297a8f3", 0xde}, {&(0x7f0000000140)="7fab81a527877760df0008b2b57c50d0cbef77e5d5c5a9", 0x17}, {&(0x7f00000003c0)="b9c26d43c6b492013315d1818717f6f68f9260cc79d90e7383ea77a91288429b6d7bf1fc1bc2157eb8aee3c67c24c769c01807dd1baf8fea81d3a4223b468156d2ef657f4119ebbe2d4763ba1692790eb51673bc084cc82358f799c23fec0d4fe248944f7cad342c8f83121ba19dc733da5d0f8ff05d7998497e172a57d0149bc15195ea9cb4fa1436e3055f40e5dde8cd7f38e88ef2c3aeae404c1c3f2e51a0134a54acfea47f546c0d7b55ceb140eb97bc236bbb22b7588e111d557bbe5ba39305b87b745b0423726a27210104beb4819d06b79e686c6c228d6d6d26ab62edd8c6db18fca48aadd6", 0xe9}], 0x4, 0x7) ioctl$PPPIOCSFLAGS1(r3, 0x40047457, &(0x7f00000000c0)) [ 1359.554082] IPVS: ftp: loaded support on port[0] = 21 [ 1359.569631] IPVS: ftp: loaded support on port[0] = 21 [ 1359.570358] IPVS: ftp: loaded support on port[0] = 21 [ 1359.600574] IPVS: ftp: loaded support on port[0] = 21 08:57:51 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.swap.current\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x400007) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='\x00', r0}, 0x10) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x9, 0x10001}, 0x0, 0x0, 0x2, 0xd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_RESET(r1, 0x2403, 0x0) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x80000000) perf_event_open(&(0x7f00000004c0)={0x5, 0xffffffffffffffcf, 0x7b, 0x9, 0x5, 0x9, 0x0, 0x39, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x4, 0x1, @perf_bp={&(0x7f0000000540), 0x8}, 0x12, 0x8, 0x6, 0x2, 0x6, 0x1000000, 0x7}, 0x0, 0xe, 0xffffffffffffffff, 0x9) r2 = socket$kcm(0x2, 0x3, 0x2) ioctl$SIOCSIFHWADDR(r2, 0x8914, &(0x7f0000000700)={'ipvlan1\x00', @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}}) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='rdma.current\x00', 0x0, 0x0) r3 = socket$kcm(0xa, 0x2, 0x11) r4 = socket$kcm(0x11, 0x200000000000002, 0x300) r5 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000001740)='pids.current\x00', 0x0, 0x0) recvmsg$kcm(r4, &(0x7f0000001cc0)={&(0x7f0000004e00)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x80, 0x0}, 0x0) sendmsg$inet(r3, &(0x7f0000000780)={&(0x7f0000000240)={0x2, 0x4e23, @multicast1}, 0x10, 0x0, 0x0, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r6, @empty, @multicast1}}}], 0x20}, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x400007) perf_event_open(&(0x7f0000000940)={0x2, 0x70, 0x40, 0x1, 0x9, 0x4, 0x0, 0x401, 0xe48d0, 0xe, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, @perf_bp={&(0x7f0000000000), 0xa}, 0x26000, 0x0, 0xb43, 0x7, 0x1ff, 0x3f}, 0x0, 0x5, r5, 0xa) bpf$BPF_PROG_ATTACH(0x8, &(0x7f00000016c0)={@cgroup, r0, 0x18, 0x6e6ce4a4042eef59, r0}, 0x14) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000280)=@in={0x2, 0x4e22, @broadcast}, 0x80, &(0x7f0000000a80)=[{&(0x7f0000000d80)="571f078e599dadbcfd8d23b714d87194bf853fb029983e08505515bbd88a88e99c581422372ce91aad629ef3177eba5990ce5b1ab69fde5acc7d2b61a3f3728175f75b6ae7587fed3077b6a95f5324274320fffbfd4a53b0561e7eed885d70599b4e21f0714484e6469608d46b0efc908bfc9e1e4fe111d87b3cc382d18a9e476c046ca0623819423bba6b44eaaf59e672155ebca976a03348c1ff7337770f4fcd417360b06ed5b94bc3f0c6214f064421dd9e2cac8ac49362a1942c5439ce84f6fd5a145bdb1278573b070000000000006d49b8adfd2e30", 0xd8}, {&(0x7f0000000200)="3c5c45c3e3b8385667fbf98d52b1aa9cd20f1c6ef4a5d05675903845d295000cbc564aec7fb298ab9653f4061833f5", 0x2f}, {&(0x7f0000000440)="9da7ee4ae4193d173becb789a073e995dc2ca790a83bbea28830c442f1c4d0a2f73c84c8f82692cd0d1414f10f61bfd4dc434bff49752ef28f8c2982e4f19915829d33ff7af702ef618f0239ba5c507348f7c74075f7a7e9af63fd72cdc901c56b1d952a4f1ab6d04d7268e048e6a5876da71284", 0x74}, {&(0x7f00000007c0)="7e4a947ba61c127620ddc4a81fbf762888375d7f33145cccbe1098f81e6622ecc4d90cc1f0837fb8a5b1c47e10ec0a8db54bda8dae822818a44dd86e649c376e08963bbf4d53295001a6b3602c9740a73460b01b8357e183542f84d7592c38d26bf9a10259657035f4fecd6d729413d41af980b7a26193985bf98b8505cec1e00ae8b31fdb84b2a3522c0d6475f35d72be59066d61fd7830bdb1089ecb7026d5347e5edb88e95280e6427ccbd8483e3aa8458c7e4f0c22b6af5eb3efd3106eccb8f4763e28fd07fe39f5189e2e961bc84b848478ff272d2ab1424a67daeeaca32c50dd10c7f6eb476bc500"/247, 0xf7}, {&(0x7f0000000c40)="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", 0x12c}, {&(0x7f00000008c0)="9bfefc2d273d6f067c3911ba92f73413d076814299702c97b97699396c08fbfe186c6ab5fdaf2507e969f3b54cc3ed1109267427309d596fd992d3daae5f89281ed9aecc9d4697dc6597e68129081d18d9f24cce2053f107436265529cf7a7a9", 0x60}, {&(0x7f0000000b40)="cdd82a3ddee8d4ccfa01d33165be9884b48becc54b40d653ddfa79a16728c9276f195f35685159ac6d4a54f30c5aca4d22e43fb59c2e502a61fb5e39c0b8d83b874e4da0e43ee8aea5fac686024729e8e7a8d8b9a12dbcf11b43ea6e2b6c8f06ab338bd3cdb840474cbe2c8267ce7ec940cbb4195f096ff70a07a71a877e9b0d14abb23cda1facc2b0aa3cc38eef5fb96982ab4ce15263479d482ad09ea42c21f35e68abe8907c0a3d2db95788810c50fda387a8f38588c62f7004667925e589fae47e", 0xc3}, {0x0}, {&(0x7f0000000a40)="05080030a650377280e27c20b017dc5b84b8bef36c83b4a3b45157e3ba2bd9d0bf461ba0d311eda18f41edb0432d0b23f29245542f16aaf240146638a3ccee90", 0x40}], 0x9}, 0x4000081) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0xd, 0x4, &(0x7f00000005c0)=ANY=[@ANYBLOB="52dc000000000000000089ca57ded6c02488dabb909d95d6a865ec86798552303b49bc0bce4cb374eddb95c2b23d0ca64d47f041abe1a960960edba5093b55c7a743ef28532533e9ea2874398f0ce75dea2e2af2e38b3618042fe537310db59c420736d4cab46d2947eedce852e665bec6a834978412fad02ba091dd750eab0a115cd11fe0036316485ca3a1eeb37c37cc783574a7a102a52452d0f4c3ace740f16a530d7593c13d6eec17d84e82f0851c5d19e824b83814e15cf68f9ad129b9a942740dc18605a5a0715bb8363c05c0a5c6"], &(0x7f00000000c0)='GPL\x00', 0x4, 0xff3, &(0x7f000062b000)=""/4083, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x2b, 0x0, 0x0, 0x10, 0x0}, 0x78) 08:57:51 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_read_part_table(0x0, 0x2, &(0x7f0000002640)=[{0x0, 0x0, 0xfffffffffffffff7}, {&(0x7f0000001540)="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", 0x1e0}]) 08:57:52 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_read_part_table(0x0, 0x2, &(0x7f0000002640)=[{0x0, 0x0, 0xfffffffffffffff7}, {&(0x7f0000001540)="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", 0x1e0}]) 08:57:52 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.swap.current\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x400007) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='\x00', r0}, 0x10) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x9, 0x10001}, 0x0, 0x0, 0x2, 0xd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_RESET(r1, 0x2403, 0x0) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x80000000) perf_event_open(&(0x7f00000004c0)={0x5, 0xffffffffffffffcf, 0x7b, 0x9, 0x5, 0x9, 0x0, 0x39, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x4, 0x1, @perf_bp={&(0x7f0000000540), 0x8}, 0x12, 0x8, 0x6, 0x2, 0x6, 0x1000000, 0x7}, 0x0, 0xe, 0xffffffffffffffff, 0x9) r2 = socket$kcm(0x2, 0x3, 0x2) ioctl$SIOCSIFHWADDR(r2, 0x8914, &(0x7f0000000700)={'ipvlan1\x00', @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}}) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='rdma.current\x00', 0x0, 0x0) r3 = socket$kcm(0xa, 0x2, 0x11) r4 = socket$kcm(0x11, 0x200000000000002, 0x300) r5 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000001740)='pids.current\x00', 0x0, 0x0) recvmsg$kcm(r4, &(0x7f0000001cc0)={&(0x7f0000004e00)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x80, 0x0}, 0x0) sendmsg$inet(r3, &(0x7f0000000780)={&(0x7f0000000240)={0x2, 0x4e23, @multicast1}, 0x10, 0x0, 0x0, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r6, @empty, @multicast1}}}], 0x20}, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x400007) perf_event_open(&(0x7f0000000940)={0x2, 0x70, 0x40, 0x1, 0x9, 0x4, 0x0, 0x401, 0xe48d0, 0xe, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, @perf_bp={&(0x7f0000000000), 0xa}, 0x26000, 0x0, 0xb43, 0x7, 0x1ff, 0x3f}, 0x0, 0x5, r5, 0xa) bpf$BPF_PROG_ATTACH(0x8, &(0x7f00000016c0)={@cgroup, r0, 0x18, 0x6e6ce4a4042eef59, r0}, 0x14) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000280)=@in={0x2, 0x4e22, @broadcast}, 0x80, &(0x7f0000000a80)=[{&(0x7f0000000d80)="571f078e599dadbcfd8d23b714d87194bf853fb029983e08505515bbd88a88e99c581422372ce91aad629ef3177eba5990ce5b1ab69fde5acc7d2b61a3f3728175f75b6ae7587fed3077b6a95f5324274320fffbfd4a53b0561e7eed885d70599b4e21f0714484e6469608d46b0efc908bfc9e1e4fe111d87b3cc382d18a9e476c046ca0623819423bba6b44eaaf59e672155ebca976a03348c1ff7337770f4fcd417360b06ed5b94bc3f0c6214f064421dd9e2cac8ac49362a1942c5439ce84f6fd5a145bdb1278573b070000000000006d49b8adfd2e30", 0xd8}, {&(0x7f0000000200)="3c5c45c3e3b8385667fbf98d52b1aa9cd20f1c6ef4a5d05675903845d295000cbc564aec7fb298ab9653f4061833f5", 0x2f}, {&(0x7f0000000440)="9da7ee4ae4193d173becb789a073e995dc2ca790a83bbea28830c442f1c4d0a2f73c84c8f82692cd0d1414f10f61bfd4dc434bff49752ef28f8c2982e4f19915829d33ff7af702ef618f0239ba5c507348f7c74075f7a7e9af63fd72cdc901c56b1d952a4f1ab6d04d7268e048e6a5876da71284", 0x74}, {&(0x7f00000007c0)="7e4a947ba61c127620ddc4a81fbf762888375d7f33145cccbe1098f81e6622ecc4d90cc1f0837fb8a5b1c47e10ec0a8db54bda8dae822818a44dd86e649c376e08963bbf4d53295001a6b3602c9740a73460b01b8357e183542f84d7592c38d26bf9a10259657035f4fecd6d729413d41af980b7a26193985bf98b8505cec1e00ae8b31fdb84b2a3522c0d6475f35d72be59066d61fd7830bdb1089ecb7026d5347e5edb88e95280e6427ccbd8483e3aa8458c7e4f0c22b6af5eb3efd3106eccb8f4763e28fd07fe39f5189e2e961bc84b848478ff272d2ab1424a67daeeaca32c50dd10c7f6eb476bc500"/247, 0xf7}, {&(0x7f0000000c40)="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", 0x12c}, {&(0x7f00000008c0)="9bfefc2d273d6f067c3911ba92f73413d076814299702c97b97699396c08fbfe186c6ab5fdaf2507e969f3b54cc3ed1109267427309d596fd992d3daae5f89281ed9aecc9d4697dc6597e68129081d18d9f24cce2053f107436265529cf7a7a9", 0x60}, {&(0x7f0000000b40)="cdd82a3ddee8d4ccfa01d33165be9884b48becc54b40d653ddfa79a16728c9276f195f35685159ac6d4a54f30c5aca4d22e43fb59c2e502a61fb5e39c0b8d83b874e4da0e43ee8aea5fac686024729e8e7a8d8b9a12dbcf11b43ea6e2b6c8f06ab338bd3cdb840474cbe2c8267ce7ec940cbb4195f096ff70a07a71a877e9b0d14abb23cda1facc2b0aa3cc38eef5fb96982ab4ce15263479d482ad09ea42c21f35e68abe8907c0a3d2db95788810c50fda387a8f38588c62f7004667925e589fae47e", 0xc3}, {0x0}, {&(0x7f0000000a40)="05080030a650377280e27c20b017dc5b84b8bef36c83b4a3b45157e3ba2bd9d0bf461ba0d311eda18f41edb0432d0b23f29245542f16aaf240146638a3ccee90", 0x40}], 0x9}, 0x4000081) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0xd, 0x4, &(0x7f00000005c0)=ANY=[@ANYBLOB="52dc000000000000000089ca57ded6c02488dabb909d95d6a865ec86798552303b49bc0bce4cb374eddb95c2b23d0ca64d47f041abe1a960960edba5093b55c7a743ef28532533e9ea2874398f0ce75dea2e2af2e38b3618042fe537310db59c420736d4cab46d2947eedce852e665bec6a834978412fad02ba091dd750eab0a115cd11fe0036316485ca3a1eeb37c37cc783574a7a102a52452d0f4c3ace740f16a530d7593c13d6eec17d84e82f0851c5d19e824b83814e15cf68f9ad129b9a942740dc18605a5a0715bb8363c05c0a5c6"], &(0x7f00000000c0)='GPL\x00', 0x4, 0xff3, &(0x7f000062b000)=""/4083, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x2b, 0x0, 0x0, 0x10, 0x0}, 0x78) 08:57:52 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_read_part_table(0x0, 0x2, &(0x7f0000002640)=[{0x0, 0x0, 0xfffffffffffffff7}, {&(0x7f0000001540)="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", 0x1e0}]) [ 1360.352409] IPVS: ftp: loaded support on port[0] = 21 [ 1360.364954] IPVS: ftp: loaded support on port[0] = 21 08:57:52 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.swap.current\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x400007) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='\x00', r0}, 0x10) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x9, 0x10001}, 0x0, 0x0, 0x2, 0xd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_RESET(r1, 0x2403, 0x0) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x80000000) perf_event_open(&(0x7f00000004c0)={0x5, 0xffffffffffffffcf, 0x7b, 0x9, 0x5, 0x9, 0x0, 0x39, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x4, 0x1, @perf_bp={&(0x7f0000000540), 0x8}, 0x12, 0x8, 0x6, 0x2, 0x6, 0x1000000, 0x7}, 0x0, 0xe, 0xffffffffffffffff, 0x9) r2 = socket$kcm(0x2, 0x3, 0x2) ioctl$SIOCSIFHWADDR(r2, 0x8914, &(0x7f0000000700)={'ipvlan1\x00', @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}}) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='rdma.current\x00', 0x0, 0x0) r3 = socket$kcm(0xa, 0x2, 0x11) r4 = socket$kcm(0x11, 0x200000000000002, 0x300) r5 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000001740)='pids.current\x00', 0x0, 0x0) recvmsg$kcm(r4, &(0x7f0000001cc0)={&(0x7f0000004e00)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x80, 0x0}, 0x0) sendmsg$inet(r3, &(0x7f0000000780)={&(0x7f0000000240)={0x2, 0x4e23, @multicast1}, 0x10, 0x0, 0x0, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r6, @empty, @multicast1}}}], 0x20}, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x400007) perf_event_open(&(0x7f0000000940)={0x2, 0x70, 0x40, 0x1, 0x9, 0x4, 0x0, 0x401, 0xe48d0, 0xe, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, @perf_bp={&(0x7f0000000000), 0xa}, 0x26000, 0x0, 0xb43, 0x7, 0x1ff, 0x3f}, 0x0, 0x5, r5, 0xa) bpf$BPF_PROG_ATTACH(0x8, &(0x7f00000016c0)={@cgroup, r0, 0x18, 0x6e6ce4a4042eef59, r0}, 0x14) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000280)=@in={0x2, 0x4e22, @broadcast}, 0x80, &(0x7f0000000a80)=[{&(0x7f0000000d80)="571f078e599dadbcfd8d23b714d87194bf853fb029983e08505515bbd88a88e99c581422372ce91aad629ef3177eba5990ce5b1ab69fde5acc7d2b61a3f3728175f75b6ae7587fed3077b6a95f5324274320fffbfd4a53b0561e7eed885d70599b4e21f0714484e6469608d46b0efc908bfc9e1e4fe111d87b3cc382d18a9e476c046ca0623819423bba6b44eaaf59e672155ebca976a03348c1ff7337770f4fcd417360b06ed5b94bc3f0c6214f064421dd9e2cac8ac49362a1942c5439ce84f6fd5a145bdb1278573b070000000000006d49b8adfd2e30", 0xd8}, {&(0x7f0000000200)="3c5c45c3e3b8385667fbf98d52b1aa9cd20f1c6ef4a5d05675903845d295000cbc564aec7fb298ab9653f4061833f5", 0x2f}, {&(0x7f0000000440)="9da7ee4ae4193d173becb789a073e995dc2ca790a83bbea28830c442f1c4d0a2f73c84c8f82692cd0d1414f10f61bfd4dc434bff49752ef28f8c2982e4f19915829d33ff7af702ef618f0239ba5c507348f7c74075f7a7e9af63fd72cdc901c56b1d952a4f1ab6d04d7268e048e6a5876da71284", 0x74}, {&(0x7f00000007c0)="7e4a947ba61c127620ddc4a81fbf762888375d7f33145cccbe1098f81e6622ecc4d90cc1f0837fb8a5b1c47e10ec0a8db54bda8dae822818a44dd86e649c376e08963bbf4d53295001a6b3602c9740a73460b01b8357e183542f84d7592c38d26bf9a10259657035f4fecd6d729413d41af980b7a26193985bf98b8505cec1e00ae8b31fdb84b2a3522c0d6475f35d72be59066d61fd7830bdb1089ecb7026d5347e5edb88e95280e6427ccbd8483e3aa8458c7e4f0c22b6af5eb3efd3106eccb8f4763e28fd07fe39f5189e2e961bc84b848478ff272d2ab1424a67daeeaca32c50dd10c7f6eb476bc500"/247, 0xf7}, {&(0x7f0000000c40)="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", 0x12c}, {&(0x7f00000008c0)="9bfefc2d273d6f067c3911ba92f73413d076814299702c97b97699396c08fbfe186c6ab5fdaf2507e969f3b54cc3ed1109267427309d596fd992d3daae5f89281ed9aecc9d4697dc6597e68129081d18d9f24cce2053f107436265529cf7a7a9", 0x60}, {&(0x7f0000000b40)="cdd82a3ddee8d4ccfa01d33165be9884b48becc54b40d653ddfa79a16728c9276f195f35685159ac6d4a54f30c5aca4d22e43fb59c2e502a61fb5e39c0b8d83b874e4da0e43ee8aea5fac686024729e8e7a8d8b9a12dbcf11b43ea6e2b6c8f06ab338bd3cdb840474cbe2c8267ce7ec940cbb4195f096ff70a07a71a877e9b0d14abb23cda1facc2b0aa3cc38eef5fb96982ab4ce15263479d482ad09ea42c21f35e68abe8907c0a3d2db95788810c50fda387a8f38588c62f7004667925e589fae47e", 0xc3}, {0x0}, {&(0x7f0000000a40)="05080030a650377280e27c20b017dc5b84b8bef36c83b4a3b45157e3ba2bd9d0bf461ba0d311eda18f41edb0432d0b23f29245542f16aaf240146638a3ccee90", 0x40}], 0x9}, 0x4000081) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0xd, 0x4, &(0x7f00000005c0)=ANY=[@ANYBLOB="52dc000000000000000089ca57ded6c02488dabb909d95d6a865ec86798552303b49bc0bce4cb374eddb95c2b23d0ca64d47f041abe1a960960edba5093b55c7a743ef28532533e9ea2874398f0ce75dea2e2af2e38b3618042fe537310db59c420736d4cab46d2947eedce852e665bec6a834978412fad02ba091dd750eab0a115cd11fe0036316485ca3a1eeb37c37cc783574a7a102a52452d0f4c3ace740f16a530d7593c13d6eec17d84e82f0851c5d19e824b83814e15cf68f9ad129b9a942740dc18605a5a0715bb8363c05c0a5c6"], &(0x7f00000000c0)='GPL\x00', 0x4, 0xff3, &(0x7f000062b000)=""/4083, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x2b, 0x0, 0x0, 0x10, 0x0}, 0x78) 08:57:52 executing program 4: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000000)=0x3) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r3 = openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$EVIOCGPROP(r3, 0x40047438, &(0x7f0000000180)=""/246) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r4, &(0x7f0000000040)=ANY=[], 0xfea7) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r4, 0x0) ioctl$PPPIOCSFLAGS1(r3, 0x40047459, &(0x7f00000000c0)) 08:57:52 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_read_part_table(0x0, 0x2, &(0x7f0000002640)=[{0x0, 0x0, 0xfffffffffffffff7}, {&(0x7f0000001540)="c2ec123b097b69beffe0f5053f03ff5b20b3406e8d7eebd2456f5388ad7135b73efb98088798c4d4506cd2295e60b5e9f9f2399833ad179a03e098e07644033f2d0e3c37a84095cdde0312f1d81191a92ccbe761424e7d3033a056d7d07c4c4bc2dbbb00079ae5158b76bed5cdd1d93054fff6874b43ef1289c75e4c9b911d69313cbc4e0abcab496b4ce2c83f238a2b30fc8210b75bcdcd0b774ac467962cc4389843f92f418b0718a87f17ae20f1790c7ff086746847e2217207cede6d2af2a58d7148128b2f86806b3be24ced787543219ae633ab66b7828c5bfd87571ee33ab89138401439491e3f3c6a4a56b4bf8a7d532ee9144977f6ac8fae105ab358e231f2cd9a216d68b0877161e158b14837fb1426f4a629f17ddd7bbf9019941ff9bbe3d6fd30d68dbd9e3b3cfb282bc08db959b660ed8f7ebc67714be3d00f8f1e2cbc9404069335265ce12996f7cb48c1f3221f7f892493e4711a6dbd79a0298e0e0b9936b06a3d08821f558f5738b05e2ead126157186dac58de8a7098291efacb6666b2dca73d422fbf6a09b30f3c30cc9e34faa453ef1d770f7008b7c54d644be9716b27aa40b67126130b61c29a254a578365216655e8a5c6955e72fb67e6f1796e499edcaa33e0b43bd172d9977deff713978907e12189743913c7c847", 0x1e0}]) 08:57:52 executing program 0: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000000)=0x3) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r3 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r3, 0x40047438, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r4, &(0x7f0000000040)=ANY=[], 0xfea7) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r4, 0x0) ioctl$PPPIOCSFLAGS1(r3, 0x4020744f, &(0x7f00000000c0)) [ 1360.778707] IPVS: ftp: loaded support on port[0] = 21 [ 1360.792861] IPVS: ftp: loaded support on port[0] = 21 08:57:52 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.swap.current\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x400007) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='\x00', r0}, 0x10) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x9, 0x10001}, 0x0, 0x0, 0x2, 0xd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_RESET(r1, 0x2403, 0x0) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x80000000) perf_event_open(&(0x7f00000004c0)={0x5, 0xffffffffffffffcf, 0x7b, 0x9, 0x5, 0x9, 0x0, 0x39, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x4, 0x1, @perf_bp={&(0x7f0000000540), 0x8}, 0x12, 0x8, 0x6, 0x2, 0x6, 0x1000000, 0x7}, 0x0, 0xe, 0xffffffffffffffff, 0x9) r2 = socket$kcm(0x2, 0x3, 0x2) ioctl$SIOCSIFHWADDR(r2, 0x8914, &(0x7f0000000700)={'ipvlan1\x00', @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}}) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='rdma.current\x00', 0x0, 0x0) r3 = socket$kcm(0xa, 0x2, 0x11) r4 = socket$kcm(0x11, 0x200000000000002, 0x300) r5 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000001740)='pids.current\x00', 0x0, 0x0) recvmsg$kcm(r4, &(0x7f0000001cc0)={&(0x7f0000004e00)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x80, 0x0}, 0x0) sendmsg$inet(r3, &(0x7f0000000780)={&(0x7f0000000240)={0x2, 0x4e23, @multicast1}, 0x10, 0x0, 0x0, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r6, @empty, @multicast1}}}], 0x20}, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x400007) perf_event_open(&(0x7f0000000940)={0x2, 0x70, 0x40, 0x1, 0x9, 0x4, 0x0, 0x401, 0xe48d0, 0xe, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, @perf_bp={&(0x7f0000000000), 0xa}, 0x26000, 0x0, 0xb43, 0x7, 0x1ff, 0x3f}, 0x0, 0x5, r5, 0xa) bpf$BPF_PROG_ATTACH(0x8, &(0x7f00000016c0)={@cgroup, r0, 0x18, 0x6e6ce4a4042eef59, r0}, 0x14) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000280)=@in={0x2, 0x4e22, @broadcast}, 0x80, &(0x7f0000000a80)=[{&(0x7f0000000d80)="571f078e599dadbcfd8d23b714d87194bf853fb029983e08505515bbd88a88e99c581422372ce91aad629ef3177eba5990ce5b1ab69fde5acc7d2b61a3f3728175f75b6ae7587fed3077b6a95f5324274320fffbfd4a53b0561e7eed885d70599b4e21f0714484e6469608d46b0efc908bfc9e1e4fe111d87b3cc382d18a9e476c046ca0623819423bba6b44eaaf59e672155ebca976a03348c1ff7337770f4fcd417360b06ed5b94bc3f0c6214f064421dd9e2cac8ac49362a1942c5439ce84f6fd5a145bdb1278573b070000000000006d49b8adfd2e30", 0xd8}, {&(0x7f0000000200)="3c5c45c3e3b8385667fbf98d52b1aa9cd20f1c6ef4a5d05675903845d295000cbc564aec7fb298ab9653f4061833f5", 0x2f}, {&(0x7f0000000440)="9da7ee4ae4193d173becb789a073e995dc2ca790a83bbea28830c442f1c4d0a2f73c84c8f82692cd0d1414f10f61bfd4dc434bff49752ef28f8c2982e4f19915829d33ff7af702ef618f0239ba5c507348f7c74075f7a7e9af63fd72cdc901c56b1d952a4f1ab6d04d7268e048e6a5876da71284", 0x74}, {&(0x7f00000007c0)="7e4a947ba61c127620ddc4a81fbf762888375d7f33145cccbe1098f81e6622ecc4d90cc1f0837fb8a5b1c47e10ec0a8db54bda8dae822818a44dd86e649c376e08963bbf4d53295001a6b3602c9740a73460b01b8357e183542f84d7592c38d26bf9a10259657035f4fecd6d729413d41af980b7a26193985bf98b8505cec1e00ae8b31fdb84b2a3522c0d6475f35d72be59066d61fd7830bdb1089ecb7026d5347e5edb88e95280e6427ccbd8483e3aa8458c7e4f0c22b6af5eb3efd3106eccb8f4763e28fd07fe39f5189e2e961bc84b848478ff272d2ab1424a67daeeaca32c50dd10c7f6eb476bc500"/247, 0xf7}, {&(0x7f0000000c40)="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", 0x12c}, {&(0x7f00000008c0)="9bfefc2d273d6f067c3911ba92f73413d076814299702c97b97699396c08fbfe186c6ab5fdaf2507e969f3b54cc3ed1109267427309d596fd992d3daae5f89281ed9aecc9d4697dc6597e68129081d18d9f24cce2053f107436265529cf7a7a9", 0x60}, {&(0x7f0000000b40)="cdd82a3ddee8d4ccfa01d33165be9884b48becc54b40d653ddfa79a16728c9276f195f35685159ac6d4a54f30c5aca4d22e43fb59c2e502a61fb5e39c0b8d83b874e4da0e43ee8aea5fac686024729e8e7a8d8b9a12dbcf11b43ea6e2b6c8f06ab338bd3cdb840474cbe2c8267ce7ec940cbb4195f096ff70a07a71a877e9b0d14abb23cda1facc2b0aa3cc38eef5fb96982ab4ce15263479d482ad09ea42c21f35e68abe8907c0a3d2db95788810c50fda387a8f38588c62f7004667925e589fae47e", 0xc3}, {0x0}, {&(0x7f0000000a40)="05080030a650377280e27c20b017dc5b84b8bef36c83b4a3b45157e3ba2bd9d0bf461ba0d311eda18f41edb0432d0b23f29245542f16aaf240146638a3ccee90", 0x40}], 0x9}, 0x4000081) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0xd, 0x4, &(0x7f00000005c0)=ANY=[@ANYBLOB="52dc000000000000000089ca57ded6c02488dabb909d95d6a865ec86798552303b49bc0bce4cb374eddb95c2b23d0ca64d47f041abe1a960960edba5093b55c7a743ef28532533e9ea2874398f0ce75dea2e2af2e38b3618042fe537310db59c420736d4cab46d2947eedce852e665bec6a834978412fad02ba091dd750eab0a115cd11fe0036316485ca3a1eeb37c37cc783574a7a102a52452d0f4c3ace740f16a530d7593c13d6eec17d84e82f0851c5d19e824b83814e15cf68f9ad129b9a942740dc18605a5a0715bb8363c05c0a5c6"], &(0x7f00000000c0)='GPL\x00', 0x4, 0xff3, &(0x7f000062b000)=""/4083, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x2b, 0x0, 0x0, 0x10, 0x0}, 0x78) 08:57:54 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.swap.current\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x400007) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='\x00', r0}, 0x10) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x9, 0x10001}, 0x0, 0x0, 0x2, 0xd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_RESET(r1, 0x2403, 0x0) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x80000000) perf_event_open(&(0x7f00000004c0)={0x5, 0xffffffffffffffcf, 0x7b, 0x9, 0x5, 0x9, 0x0, 0x39, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x4, 0x1, @perf_bp={&(0x7f0000000540), 0x8}, 0x12, 0x8, 0x6, 0x2, 0x6, 0x1000000, 0x7}, 0x0, 0xe, 0xffffffffffffffff, 0x9) r2 = socket$kcm(0x2, 0x3, 0x2) ioctl$SIOCSIFHWADDR(r2, 0x8914, &(0x7f0000000700)={'ipvlan1\x00', @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}}) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='rdma.current\x00', 0x0, 0x0) r3 = socket$kcm(0xa, 0x2, 0x11) r4 = socket$kcm(0x11, 0x200000000000002, 0x300) r5 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000001740)='pids.current\x00', 0x0, 0x0) recvmsg$kcm(r4, &(0x7f0000001cc0)={&(0x7f0000004e00)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x80, 0x0}, 0x0) sendmsg$inet(r3, &(0x7f0000000780)={&(0x7f0000000240)={0x2, 0x4e23, @multicast1}, 0x10, 0x0, 0x0, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r6, @empty, @multicast1}}}], 0x20}, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x400007) perf_event_open(&(0x7f0000000940)={0x2, 0x70, 0x40, 0x1, 0x9, 0x4, 0x0, 0x401, 0xe48d0, 0xe, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, @perf_bp={&(0x7f0000000000), 0xa}, 0x26000, 0x0, 0xb43, 0x7, 0x1ff, 0x3f}, 0x0, 0x5, r5, 0xa) bpf$BPF_PROG_ATTACH(0x8, &(0x7f00000016c0)={@cgroup, r0, 0x18, 0x6e6ce4a4042eef59, r0}, 0x14) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000280)=@in={0x2, 0x4e22, @broadcast}, 0x80, &(0x7f0000000a80)=[{&(0x7f0000000d80)="571f078e599dadbcfd8d23b714d87194bf853fb029983e08505515bbd88a88e99c581422372ce91aad629ef3177eba5990ce5b1ab69fde5acc7d2b61a3f3728175f75b6ae7587fed3077b6a95f5324274320fffbfd4a53b0561e7eed885d70599b4e21f0714484e6469608d46b0efc908bfc9e1e4fe111d87b3cc382d18a9e476c046ca0623819423bba6b44eaaf59e672155ebca976a03348c1ff7337770f4fcd417360b06ed5b94bc3f0c6214f064421dd9e2cac8ac49362a1942c5439ce84f6fd5a145bdb1278573b070000000000006d49b8adfd2e30", 0xd8}, {&(0x7f0000000200)="3c5c45c3e3b8385667fbf98d52b1aa9cd20f1c6ef4a5d05675903845d295000cbc564aec7fb298ab9653f4061833f5", 0x2f}, {&(0x7f0000000440)="9da7ee4ae4193d173becb789a073e995dc2ca790a83bbea28830c442f1c4d0a2f73c84c8f82692cd0d1414f10f61bfd4dc434bff49752ef28f8c2982e4f19915829d33ff7af702ef618f0239ba5c507348f7c74075f7a7e9af63fd72cdc901c56b1d952a4f1ab6d04d7268e048e6a5876da71284", 0x74}, {&(0x7f00000007c0)="7e4a947ba61c127620ddc4a81fbf762888375d7f33145cccbe1098f81e6622ecc4d90cc1f0837fb8a5b1c47e10ec0a8db54bda8dae822818a44dd86e649c376e08963bbf4d53295001a6b3602c9740a73460b01b8357e183542f84d7592c38d26bf9a10259657035f4fecd6d729413d41af980b7a26193985bf98b8505cec1e00ae8b31fdb84b2a3522c0d6475f35d72be59066d61fd7830bdb1089ecb7026d5347e5edb88e95280e6427ccbd8483e3aa8458c7e4f0c22b6af5eb3efd3106eccb8f4763e28fd07fe39f5189e2e961bc84b848478ff272d2ab1424a67daeeaca32c50dd10c7f6eb476bc500"/247, 0xf7}, {&(0x7f0000000c40)="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", 0x12c}, {&(0x7f00000008c0)="9bfefc2d273d6f067c3911ba92f73413d076814299702c97b97699396c08fbfe186c6ab5fdaf2507e969f3b54cc3ed1109267427309d596fd992d3daae5f89281ed9aecc9d4697dc6597e68129081d18d9f24cce2053f107436265529cf7a7a9", 0x60}, {&(0x7f0000000b40)="cdd82a3ddee8d4ccfa01d33165be9884b48becc54b40d653ddfa79a16728c9276f195f35685159ac6d4a54f30c5aca4d22e43fb59c2e502a61fb5e39c0b8d83b874e4da0e43ee8aea5fac686024729e8e7a8d8b9a12dbcf11b43ea6e2b6c8f06ab338bd3cdb840474cbe2c8267ce7ec940cbb4195f096ff70a07a71a877e9b0d14abb23cda1facc2b0aa3cc38eef5fb96982ab4ce15263479d482ad09ea42c21f35e68abe8907c0a3d2db95788810c50fda387a8f38588c62f7004667925e589fae47e", 0xc3}, {0x0}, {&(0x7f0000000a40)="05080030a650377280e27c20b017dc5b84b8bef36c83b4a3b45157e3ba2bd9d0bf461ba0d311eda18f41edb0432d0b23f29245542f16aaf240146638a3ccee90", 0x40}], 0x9}, 0x4000081) 08:57:54 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_read_part_table(0x0, 0x2, &(0x7f0000002640)=[{0x0, 0x0, 0xfffffffffffffff7}, {&(0x7f0000001540)="c2ec123b097b69be4242e60d3f03ff5b20b3406e8d7eebd2456f5388ad7135b73efb98088798c4d4506cd2295e60b5e9f9f2399833ad179a03e098e07644033f2d0e3c37a84095cdde0312f1d81191a92ccbe761424e7d3033a056d7d07c4c4bc2dbbb00079ae5158b76bed5cdd1d93054fff6874b43ef1289c75e4c9b911d69313cbc4e0abcab496b4ce2c83f238a2b30fc8210b75bcdcd0b774ac467962cc4389843f92f418b0718a87f17ae20f1790c7ff086746847e2217207cede6d2af2a58d7148128b2f86806b3be24ced787543219ae633ab66b7828c5bfd87571ee33ab89138401439491e3f3c6a4a56b4bf8a7d532ee9144977f6ac8fae105ab358e231f2cd9a216d68b0877161e158b14837fb1426f4a629f17ddd7bbf9019941ff9bbe3d6fd30d68dbd9e3b3cfb282bc08db959b660ed8f7ebc67714be3d00f8f1e2cbc9404069335265ce12996f7cb48c1f3221f7f892493e4711a6dbd79a0298e0e0b9936b06a3d08821f558f5738b05e2ead126157186dac58de8a7098291efacb6666b2dca73d422fbf6a09b30f3c30cc9e34faa453ef1d770f7008b7c54d644be9716b27aa40b67126130b61c29a254a578365216655e8a5c6955e72fb67e6f1796e499edcaa33e0b43bd172d9977deff713978907e12189743913c7c847", 0x1e0}]) 08:57:54 executing program 2: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r0) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r3, 0x5423, &(0x7f0000000000)=0x3) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r4 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r4, 0x40047438, &(0x7f0000000180)=""/246) r5 = socket$inet6(0xa, 0x2, 0x0) r6 = dup(r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) r7 = openat$cgroup_ro(r6, &(0x7f0000000080)='memory.events\x00', 0x275a, 0x0) write$binfmt_script(r7, &(0x7f0000000040)=ANY=[], 0xfea7) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r7, 0x0) ioctl$PPPIOCSFLAGS1(r4, 0x40047457, &(0x7f00000000c0)) 08:57:54 executing program 0: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000000)=0x3) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r3 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r3, 0x40047438, &(0x7f0000000180)=""/246) r4 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) write$binfmt_script(r4, &(0x7f0000000040)=ANY=[], 0xfea7) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r4, 0x0) ioctl$PPPIOCSFLAGS1(r3, 0x4020744f, &(0x7f00000000c0)) 08:57:54 executing program 1: unshare(0x40000000) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000000)={0x3c, 0x0, 0x1, 0x409, 0x0, 0x0, {}, [@CTA_TUPLE_ORIG={0x24, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @broadcast}, {0x8, 0x2, @dev}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_SEQ_ADJ_REPLY={0x4}]}, 0x3c}}, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x11, r0, 0xffffe000) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000000)=0x3) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r2, 0x40047438, &(0x7f0000000180)=""/246) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r3, &(0x7f0000000040)=ANY=[], 0xfea7) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r3, 0x0) ioctl$PPPIOCSFLAGS1(r2, 0x40047457, &(0x7f00000000c0)) 08:57:54 executing program 4: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000000)=0x3) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r3 = openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$EVIOCGPROP(r3, 0x40047438, &(0x7f0000000180)=""/246) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r4, &(0x7f0000000040)=ANY=[], 0xfea7) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r4, 0x0) ioctl$PPPIOCSFLAGS1(r3, 0x40047459, &(0x7f00000000c0)) [ 1362.441369] IPVS: ftp: loaded support on port[0] = 21 [ 1362.441396] IPVS: ftp: loaded support on port[0] = 21 [ 1362.464030] IPVS: ftp: loaded support on port[0] = 21 [ 1362.492298] IPVS: ftp: loaded support on port[0] = 21 08:57:54 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.swap.current\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x400007) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='\x00', r0}, 0x10) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x9, 0x10001}, 0x0, 0x0, 0x2, 0xd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_RESET(r1, 0x2403, 0x0) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x80000000) perf_event_open(&(0x7f00000004c0)={0x5, 0xffffffffffffffcf, 0x7b, 0x9, 0x5, 0x9, 0x0, 0x39, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x4, 0x1, @perf_bp={&(0x7f0000000540), 0x8}, 0x12, 0x8, 0x6, 0x2, 0x6, 0x1000000, 0x7}, 0x0, 0xe, 0xffffffffffffffff, 0x9) r2 = socket$kcm(0x2, 0x3, 0x2) ioctl$SIOCSIFHWADDR(r2, 0x8914, &(0x7f0000000700)={'ipvlan1\x00', @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}}) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='rdma.current\x00', 0x0, 0x0) r3 = socket$kcm(0xa, 0x2, 0x11) r4 = socket$kcm(0x11, 0x200000000000002, 0x300) r5 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000001740)='pids.current\x00', 0x0, 0x0) recvmsg$kcm(r4, &(0x7f0000001cc0)={&(0x7f0000004e00)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x80, 0x0}, 0x0) sendmsg$inet(r3, &(0x7f0000000780)={&(0x7f0000000240)={0x2, 0x4e23, @multicast1}, 0x10, 0x0, 0x0, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r6, @empty, @multicast1}}}], 0x20}, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x400007) perf_event_open(&(0x7f0000000940)={0x2, 0x70, 0x40, 0x1, 0x9, 0x4, 0x0, 0x401, 0xe48d0, 0xe, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, @perf_bp={&(0x7f0000000000), 0xa}, 0x26000, 0x0, 0xb43, 0x7, 0x1ff, 0x3f}, 0x0, 0x5, r5, 0xa) bpf$BPF_PROG_ATTACH(0x8, &(0x7f00000016c0)={@cgroup, r0, 0x18, 0x6e6ce4a4042eef59, r0}, 0x14) 08:57:54 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_read_part_table(0x0, 0x2, &(0x7f0000002640)=[{0x0, 0x0, 0xfffffffffffffff7}, {&(0x7f0000001540)="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", 0x1e0}]) 08:57:55 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_read_part_table(0x0, 0x2, &(0x7f0000002640)=[{0x0, 0x0, 0xfffffffffffffff7}, {&(0x7f0000001540)="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", 0x1e0}]) [ 1362.923961] IPVS: ftp: loaded support on port[0] = 21 [ 1363.050414] IPVS: ftp: loaded support on port[0] = 21 08:57:55 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_read_part_table(0x0, 0x2, &(0x7f0000002640)=[{0x0, 0x0, 0xfffffffffffffff7}, {&(0x7f0000001540)="c2ec123b097b69be3e02e60d3f03ff5b20b3406e8d7eebd2456f5388ad7135b73efb98088798c4d4506cd2295e60b5e9f9f2399833ad179a03e098e07644033f2d0e3c37a84095cdde0312f1d81191a92ccbe761424e7d3033a056d7d07c4c4bc2dbbb00079ae5158b76bed5cdd1d93054fff6874b43ef1289c75e4c9b911d69313cbc4e0abcab496b4ce2c83f238a2b30fc8210b75bcdcd0b774ac467962cc4389843f92f418b0718a87f17ae20f1790c7ff086746847e2217207cede6d2af2a58d7148128b2f86806b3be24ced787543219ae633ab66b7828c5bfd87571ee33ab89138401439491e3f3c6a4a56b4bf8a7d532ee9144977f6ac8fae105ab358e231f2cd9a216d68b0877161e158b14837fb1426f4a629f17ddd7bbf9019941ff9bbe3d6fd30d68dbd9e3b3cfb282bc08db959b660ed8f7ebc67714be3d00f8f1e2cbc9404069335265ce12996f7cb48c1f3221f7f892493e4711a6dbd79a0298e0e0b9936b06a3d08821f558f5738b05e2ead126157186dac58de8a7098291efacb6666b2dca73d422fbf6a09b30f3c30cc9e34faa453ef1d770f7008b7c54d644be9716b27aa40b67126130b61c29a254a578365216655e8a5c6955e72fb67e6f1796e499edcaa33e0b43bd172d9977deff713978907e12189743913c7c847", 0x1e0}]) 08:57:55 executing program 1: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) prctl$PR_GET_CHILD_SUBREAPER(0x25) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000000)=0x3) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r1, 0x40047438, &(0x7f0000000180)=""/246) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r2, &(0x7f0000000040)=ANY=[], 0xfea7) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r2, 0x0) ioctl$PPPIOCSFLAGS1(r1, 0x40047457, &(0x7f00000000c0)) 08:57:55 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_read_part_table(0x0, 0x2, &(0x7f0000002640)=[{0x0, 0x0, 0xfffffffffffffff7}, {&(0x7f0000001540)="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", 0x1e0}]) 08:57:55 executing program 0: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000000)=0x3) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r3 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r3, 0x40047438, &(0x7f0000000180)=""/246) r4 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) write$binfmt_script(r4, &(0x7f0000000040)=ANY=[], 0xfea7) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r4, 0x0) ioctl$PPPIOCSFLAGS1(r3, 0x4020744f, &(0x7f00000000c0)) [ 1363.323613] IPVS: ftp: loaded support on port[0] = 21 08:57:55 executing program 4: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000000)=0x3) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r3 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(0xffffffffffffffff, 0x40047438, &(0x7f0000000180)=""/246) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r4, &(0x7f0000000040)=ANY=[], 0xfea7) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r4, 0x0) ioctl$PPPIOCSFLAGS1(r3, 0x40047459, &(0x7f00000000c0)) [ 1363.454911] kasan: CONFIG_KASAN_INLINE enabled [ 1363.459972] kasan: GPF could be caused by NULL-ptr deref or user memory access [ 1363.474805] IPVS: ftp: loaded support on port[0] = 21 [ 1363.485961] general protection fault: 0000 [#1] PREEMPT SMP KASAN [ 1363.492217] CPU: 1 PID: 24814 Comm: syz-executor.2 Not tainted 4.19.132-syzkaller #0 [ 1363.500098] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1363.509477] RIP: 0010:free_netdev+0x41/0x410 [ 1363.513880] Code: d2 be 0a 24 00 00 48 c7 c7 80 85 2a 88 e8 57 3a 92 fb 48 8d bb 00 04 00 00 48 b8 00 00 00 00 00 fc ff df 48 89 fa 48 c1 ea 03 <80> 3c 02 00 0f 85 86 03 00 00 48 8b bb 00 04 00 00 e8 49 70 d8 fb [ 1363.532784] RSP: 0018:ffff888093e57c28 EFLAGS: 00010202 [ 1363.538147] RAX: dffffc0000000000 RBX: 0000000000000000 RCX: 0000000000000001 [ 1363.545414] RDX: 0000000000000080 RSI: 00000000ffffffff RDI: 0000000000000400 [ 1363.552676] RBP: ffff888052a00540 R08: 0000000000000001 R09: 0000000000000000 [ 1363.559939] R10: 0000000000000005 R11: 0000000000000000 R12: 00000000fffffff4 [ 1363.567204] R13: ffff888052a00950 R14: ffff88808b068dc0 R15: ffff888051976f88 [ 1363.574472] FS: 00007fa2870c0700(0000) GS:ffff8880ae700000(0000) knlGS:0000000000000000 [ 1363.582708] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 1363.588586] CR2: 0000000000517800 CR3: 0000000052c2e000 CR4: 00000000001406e0 [ 1363.595865] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 1363.603139] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 1363.610405] Call Trace: [ 1363.613079] ip6gre_init_net+0x54b/0x620 [ 1363.617145] ? ip6gre_dellink+0x2d0/0x2d0 [ 1363.621296] ops_init+0xb3/0x410 [ 1363.624662] setup_net+0x2c2/0x720 [ 1363.628201] ? rtnl_net_dumpid_one+0x250/0x250 [ 1363.632781] copy_net_ns+0x1f7/0x335 [ 1363.636492] create_new_namespaces+0x3f6/0x7b0 [ 1363.641093] unshare_nsproxy_namespaces+0xbd/0x1f0 [ 1363.646021] ksys_unshare+0x36c/0x9a0 [ 1363.649817] ? walk_process_tree+0x2c0/0x2c0 [ 1363.654221] ? __se_sys_clock_gettime+0x124/0x1e0 [ 1363.659061] ? posix_timer_fn+0x3d0/0x3d0 [ 1363.663204] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1363.667956] ? trace_hardirqs_off_caller+0x69/0x210 [ 1363.672973] __x64_sys_unshare+0x2d/0x40 [ 1363.677046] do_syscall_64+0xf9/0x620 [ 1363.680848] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1363.686031] RIP: 0033:0x45cba9 [ 1363.689216] Code: 8d b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 5b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1363.708133] RSP: 002b:00007fa2870bfc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000110 [ 1363.715840] RAX: ffffffffffffffda RBX: 000000000050cb80 RCX: 000000000045cba9 [ 1363.723103] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000040000000 [ 1363.730366] RBP: 000000000078bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1363.737630] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000ffffffff [ 1363.744893] R13: 0000000000000cba R14: 00000000004cf0a8 R15: 00007fa2870c06d4 [ 1363.752169] Modules linked in: [ 1363.784183] IPVS: ftp: loaded support on port[0] = 21 [ 1363.853306] ---[ end trace d26d057805f5ee61 ]--- [ 1363.919988] RIP: 0010:free_netdev+0x41/0x410 [ 1363.926938] Code: d2 be 0a 24 00 00 48 c7 c7 80 85 2a 88 e8 57 3a 92 fb 48 8d bb 00 04 00 00 48 b8 00 00 00 00 00 fc ff df 48 89 fa 48 c1 ea 03 <80> 3c 02 00 0f 85 86 03 00 00 48 8b bb 00 04 00 00 e8 49 70 d8 fb [ 1363.979134] RSP: 0018:ffff888093e57c28 EFLAGS: 00010202 [ 1363.992412] RAX: dffffc0000000000 RBX: 0000000000000000 RCX: 0000000000000001 [ 1364.008516] RDX: 0000000000000080 RSI: 00000000ffffffff RDI: 0000000000000400 [ 1364.044745] RBP: ffff888052a00540 R08: 0000000000000001 R09: 0000000000000000 [ 1364.051948] IPVS: ftp: loaded support on port[0] = 21 [ 1364.052480] R10: 0000000000000005 R11: 0000000000000000 R12: 00000000fffffff4 [ 1364.067213] R13: ffff888052a00950 R14: ffff88808b068dc0 R15: ffff888051976f88 [ 1364.076891] FS: 00007fa2870c0700(0000) GS:ffff8880ae600000(0000) knlGS:0000000000000000 [ 1364.086764] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 1364.092923] CR2: 00000000004ea610 CR3: 0000000052c2e000 CR4: 00000000001406f0 [ 1364.101700] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 1364.115030] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 1364.134679] Kernel panic - not syncing: Fatal exception [ 1364.141337] Kernel Offset: disabled [ 1364.144983] Rebooting in 86400 seconds..