[ OK ] Listening on Load/Save RF Kill Switch Status /dev/rfkill Watch. [ OK ] Started Serial Getty on ttyS0. [ OK ] Started Getty on tty1. [ OK ] Reached target Login Prompts. [ OK ] Reached target Multi-User System. [ OK ] Reached target Graphical Interface. Starting Update UTMP about System Runlevel Changes... [ OK ] Started Update UTMP about System Runlevel Changes. Starting Load/Save RF Kill Switch Status... [ OK ] Started Load/Save RF Kill Switch Status. Debian GNU/Linux 9 syzkaller ttyS0 Warning: Permanently added '10.128.0.69' (ECDSA) to the list of known hosts. 2020/05/21 06:06:02 fuzzer started 2020/05/21 06:06:02 dialing manager at 10.128.0.26:45145 2020/05/21 06:06:02 syscalls: 3005 2020/05/21 06:06:02 code coverage: enabled 2020/05/21 06:06:02 comparison tracing: enabled 2020/05/21 06:06:02 extra coverage: enabled 2020/05/21 06:06:02 setuid sandbox: enabled 2020/05/21 06:06:02 namespace sandbox: enabled 2020/05/21 06:06:02 Android sandbox: /sys/fs/selinux/policy does not exist 2020/05/21 06:06:02 fault injection: enabled 2020/05/21 06:06:02 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2020/05/21 06:06:02 net packet injection: enabled 2020/05/21 06:06:02 net device setup: enabled 2020/05/21 06:06:02 concurrency sanitizer: /sys/kernel/debug/kcsan does not exist 2020/05/21 06:06:02 devlink PCI setup: PCI device 0000:00:10.0 is not available 2020/05/21 06:06:02 USB emulation: /dev/raw-gadget does not exist 06:08:07 executing program 0: syzkaller login: [ 190.766194][ T7098] IPVS: ftp: loaded support on port[0] = 21 06:08:07 executing program 1: [ 190.912468][ T7098] chnl_net:caif_netlink_parms(): no params data found [ 191.039045][ T7098] bridge0: port 1(bridge_slave_0) entered blocking state [ 191.065192][ T7098] bridge0: port 1(bridge_slave_0) entered disabled state [ 191.073581][ T7098] device bridge_slave_0 entered promiscuous mode [ 191.098680][ T7098] bridge0: port 2(bridge_slave_1) entered blocking state [ 191.115297][ T7098] bridge0: port 2(bridge_slave_1) entered disabled state [ 191.123546][ T7098] device bridge_slave_1 entered promiscuous mode 06:08:08 executing program 2: [ 191.187047][ T7228] IPVS: ftp: loaded support on port[0] = 21 [ 191.187281][ T7098] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 191.208545][ T7098] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 191.320431][ T7098] team0: Port device team_slave_0 added [ 191.346958][ T7098] team0: Port device team_slave_1 added [ 191.423343][ T7098] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 191.430604][ T7098] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 191.457965][ T7098] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 191.478959][ T7270] IPVS: ftp: loaded support on port[0] = 21 [ 191.507922][ T7098] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 191.514904][ T7098] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 191.565145][ T7098] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active 06:08:08 executing program 3: [ 191.710245][ T7098] device hsr_slave_0 entered promiscuous mode [ 191.765584][ T7098] device hsr_slave_1 entered promiscuous mode [ 191.839460][ T7228] chnl_net:caif_netlink_parms(): no params data found [ 191.937266][ T7375] IPVS: ftp: loaded support on port[0] = 21 06:08:08 executing program 4: [ 192.130467][ T7228] bridge0: port 1(bridge_slave_0) entered blocking state [ 192.146631][ T7228] bridge0: port 1(bridge_slave_0) entered disabled state [ 192.154739][ T7228] device bridge_slave_0 entered promiscuous mode [ 192.231390][ T7228] bridge0: port 2(bridge_slave_1) entered blocking state [ 192.240155][ T7228] bridge0: port 2(bridge_slave_1) entered disabled state [ 192.259348][ T7228] device bridge_slave_1 entered promiscuous mode [ 192.312181][ T7270] chnl_net:caif_netlink_parms(): no params data found [ 192.317578][ T7533] IPVS: ftp: loaded support on port[0] = 21 [ 192.340075][ T7228] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 192.372510][ T7228] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 192.508452][ T7228] team0: Port device team_slave_0 added [ 192.549600][ T7228] team0: Port device team_slave_1 added 06:08:09 executing program 5: [ 192.625810][ T7098] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 192.708015][ T7228] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 192.725462][ T7228] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 192.774987][ T7228] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 192.788056][ T7098] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 192.841605][ T7098] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 192.893805][ T7098] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 192.953590][ T7228] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 192.962214][ T7228] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 192.989511][ T7228] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 193.010193][ T7270] bridge0: port 1(bridge_slave_0) entered blocking state [ 193.017959][ T7270] bridge0: port 1(bridge_slave_0) entered disabled state [ 193.026592][ T7270] device bridge_slave_0 entered promiscuous mode [ 193.037814][ T7375] chnl_net:caif_netlink_parms(): no params data found [ 193.074136][ T7708] IPVS: ftp: loaded support on port[0] = 21 [ 193.102683][ T7228] device hsr_slave_0 entered promiscuous mode [ 193.175472][ T7228] device hsr_slave_1 entered promiscuous mode [ 193.235181][ T7228] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 193.243070][ T7228] Cannot create hsr debugfs directory [ 193.253410][ T7270] bridge0: port 2(bridge_slave_1) entered blocking state [ 193.260972][ T7270] bridge0: port 2(bridge_slave_1) entered disabled state [ 193.269467][ T7270] device bridge_slave_1 entered promiscuous mode [ 193.349756][ T7270] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 193.364365][ T7270] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 193.446895][ T7533] chnl_net:caif_netlink_parms(): no params data found [ 193.477206][ T7270] team0: Port device team_slave_0 added [ 193.513547][ T7270] team0: Port device team_slave_1 added [ 193.602140][ T7375] bridge0: port 1(bridge_slave_0) entered blocking state [ 193.614471][ T7375] bridge0: port 1(bridge_slave_0) entered disabled state [ 193.625706][ T7375] device bridge_slave_0 entered promiscuous mode [ 193.634733][ T7375] bridge0: port 2(bridge_slave_1) entered blocking state [ 193.643848][ T7375] bridge0: port 2(bridge_slave_1) entered disabled state [ 193.652447][ T7375] device bridge_slave_1 entered promiscuous mode [ 193.682938][ T7270] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 193.690499][ T7270] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 193.717523][ T7270] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 193.729671][ T7533] bridge0: port 1(bridge_slave_0) entered blocking state [ 193.738355][ T7533] bridge0: port 1(bridge_slave_0) entered disabled state [ 193.746793][ T7533] device bridge_slave_0 entered promiscuous mode [ 193.755387][ T7533] bridge0: port 2(bridge_slave_1) entered blocking state [ 193.762457][ T7533] bridge0: port 2(bridge_slave_1) entered disabled state [ 193.770463][ T7533] device bridge_slave_1 entered promiscuous mode [ 193.800422][ T7375] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 193.810095][ T7270] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 193.820655][ T7270] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 193.846901][ T7270] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 193.874033][ T7533] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 193.886863][ T7533] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 193.909777][ T7375] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 193.954335][ T7533] team0: Port device team_slave_0 added [ 193.967705][ T7533] team0: Port device team_slave_1 added [ 193.990789][ T7533] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 194.001678][ T7533] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 194.030654][ T7533] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 194.048171][ T7375] team0: Port device team_slave_0 added [ 194.085754][ T7533] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 194.092723][ T7533] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 194.127331][ T7533] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 194.145994][ T7375] team0: Port device team_slave_1 added [ 194.277722][ T7270] device hsr_slave_0 entered promiscuous mode [ 194.315624][ T7270] device hsr_slave_1 entered promiscuous mode [ 194.354987][ T7270] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 194.362570][ T7270] Cannot create hsr debugfs directory [ 194.410272][ T7375] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 194.418602][ T7375] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 194.446643][ T7375] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 194.464388][ T7375] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 194.472071][ T7375] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 194.500304][ T7375] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 194.557800][ T7533] device hsr_slave_0 entered promiscuous mode [ 194.608474][ T7533] device hsr_slave_1 entered promiscuous mode [ 194.665094][ T7533] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 194.672845][ T7533] Cannot create hsr debugfs directory [ 194.700785][ T7098] 8021q: adding VLAN 0 to HW filter on device bond0 [ 194.708125][ T7228] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 194.749818][ T7228] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 194.852050][ T7708] chnl_net:caif_netlink_parms(): no params data found [ 194.862253][ T7228] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 194.913329][ T7228] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 194.963558][ T2812] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 194.972553][ T2812] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 194.998616][ T7098] 8021q: adding VLAN 0 to HW filter on device team0 [ 195.060707][ T7375] device hsr_slave_0 entered promiscuous mode [ 195.105247][ T7375] device hsr_slave_1 entered promiscuous mode [ 195.155178][ T7375] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 195.162861][ T7375] Cannot create hsr debugfs directory [ 195.293744][ T3161] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 195.306511][ T3161] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 195.315521][ T3161] bridge0: port 1(bridge_slave_0) entered blocking state [ 195.322788][ T3161] bridge0: port 1(bridge_slave_0) entered forwarding state [ 195.383396][ T2717] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 195.427663][ T3162] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 195.441610][ T3162] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 195.451208][ T3162] bridge0: port 2(bridge_slave_1) entered blocking state [ 195.458346][ T3162] bridge0: port 2(bridge_slave_1) entered forwarding state [ 195.470670][ T3162] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 195.479753][ T3162] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 195.552964][ T7708] bridge0: port 1(bridge_slave_0) entered blocking state [ 195.560862][ T7708] bridge0: port 1(bridge_slave_0) entered disabled state [ 195.569261][ T7708] device bridge_slave_0 entered promiscuous mode [ 195.578436][ T7708] bridge0: port 2(bridge_slave_1) entered blocking state [ 195.585948][ T7708] bridge0: port 2(bridge_slave_1) entered disabled state [ 195.594212][ T7708] device bridge_slave_1 entered promiscuous mode [ 195.616010][ T3161] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 195.627078][ T3161] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 195.635839][ T3161] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 195.691095][ T7708] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 195.707673][ T7708] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 195.720578][ T7270] netdevsim netdevsim2 netdevsim0: renamed from eth0 [ 195.798265][ T3161] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 195.808285][ T3161] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 195.818610][ T3161] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 195.827540][ T3161] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 195.848305][ T7098] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 195.860798][ T7098] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 195.870839][ T7270] netdevsim netdevsim2 netdevsim1: renamed from eth1 [ 195.913384][ T3161] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 195.921921][ T3161] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 195.940554][ T7270] netdevsim netdevsim2 netdevsim2: renamed from eth2 [ 195.969376][ T7708] team0: Port device team_slave_0 added [ 195.978602][ T7708] team0: Port device team_slave_1 added [ 196.007507][ T7270] netdevsim netdevsim2 netdevsim3: renamed from eth3 [ 196.080398][ T7708] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 196.087549][ T7708] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 196.116544][ T7708] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 196.128345][ T7533] netdevsim netdevsim4 netdevsim0: renamed from eth0 [ 196.177195][ T7533] netdevsim netdevsim4 netdevsim1: renamed from eth1 [ 196.234897][ T7533] netdevsim netdevsim4 netdevsim2: renamed from eth2 [ 196.291089][ T7708] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 196.298870][ T7708] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 196.327026][ T7708] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 196.352756][ T7533] netdevsim netdevsim4 netdevsim3: renamed from eth3 [ 196.393087][ T3161] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 196.402101][ T3161] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 196.478085][ T7098] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 196.539200][ T7708] device hsr_slave_0 entered promiscuous mode [ 196.585254][ T7708] device hsr_slave_1 entered promiscuous mode [ 196.634964][ T7708] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 196.635003][ T7708] Cannot create hsr debugfs directory [ 196.636478][ T7375] netdevsim netdevsim3 netdevsim0: renamed from eth0 [ 196.714342][ T7375] netdevsim netdevsim3 netdevsim1: renamed from eth1 [ 196.789610][ T7375] netdevsim netdevsim3 netdevsim2: renamed from eth2 [ 196.851731][ T7228] 8021q: adding VLAN 0 to HW filter on device bond0 [ 196.877341][ T7375] netdevsim netdevsim3 netdevsim3: renamed from eth3 [ 196.956477][ T3161] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 196.968464][ T3161] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 197.020765][ T7228] 8021q: adding VLAN 0 to HW filter on device team0 [ 197.039142][ T2812] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 197.048399][ T2812] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 197.102776][ T7098] device veth0_vlan entered promiscuous mode [ 197.118852][ T2837] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 197.127950][ T2837] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 197.136881][ T2837] bridge0: port 1(bridge_slave_0) entered blocking state [ 197.143948][ T2837] bridge0: port 1(bridge_slave_0) entered forwarding state [ 197.152432][ T2837] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 197.161639][ T2837] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 197.170580][ T2837] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 197.179526][ T2837] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 197.188309][ T2837] bridge0: port 2(bridge_slave_1) entered blocking state [ 197.195478][ T2837] bridge0: port 2(bridge_slave_1) entered forwarding state [ 197.203736][ T2837] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 197.212023][ T2837] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 197.221092][ T2837] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 197.262619][ T7098] device veth1_vlan entered promiscuous mode [ 197.280487][ T7270] 8021q: adding VLAN 0 to HW filter on device bond0 [ 197.305545][ T2800] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 197.313724][ T2800] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 197.323043][ T2800] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 197.332988][ T2800] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 197.342393][ T2800] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 197.393701][ T2800] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 197.403946][ T2800] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 197.412938][ T2800] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 197.422321][ T2800] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 197.431292][ T2800] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 197.440327][ T2800] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 197.507949][ T2812] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 197.517383][ T2812] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 197.526330][ T2812] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 197.534643][ T2812] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 197.548106][ T7270] 8021q: adding VLAN 0 to HW filter on device team0 [ 197.585777][ T7708] netdevsim netdevsim5 netdevsim0: renamed from eth0 [ 197.617941][ T2717] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 197.627396][ T2717] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 197.636726][ T2717] bridge0: port 1(bridge_slave_0) entered blocking state [ 197.643804][ T2717] bridge0: port 1(bridge_slave_0) entered forwarding state [ 197.652016][ T2717] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 197.661555][ T2717] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 197.670416][ T2717] bridge0: port 2(bridge_slave_1) entered blocking state [ 197.677744][ T2717] bridge0: port 2(bridge_slave_1) entered forwarding state [ 197.689823][ T7228] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 197.706544][ T7708] netdevsim netdevsim5 netdevsim1: renamed from eth1 [ 197.739006][ T3161] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 197.747340][ T3161] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 197.778591][ T7533] 8021q: adding VLAN 0 to HW filter on device bond0 [ 197.786273][ T7708] netdevsim netdevsim5 netdevsim2: renamed from eth2 [ 197.818855][ T2812] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 197.828009][ T2812] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 197.837264][ T2812] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 197.854420][ T7098] device veth0_macvtap entered promiscuous mode [ 197.867495][ T7375] 8021q: adding VLAN 0 to HW filter on device bond0 [ 197.882291][ T7708] netdevsim netdevsim5 netdevsim3: renamed from eth3 [ 197.947644][ T2800] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 197.956875][ T2800] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 197.969194][ T2800] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 197.980485][ T2800] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 197.992337][ T7098] device veth1_macvtap entered promiscuous mode [ 198.026503][ T2717] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 198.037717][ T2717] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 198.045407][ T2717] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 198.052875][ T2717] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 198.061941][ T2717] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 198.070302][ T2717] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 198.079897][ T2717] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 198.095088][ T7228] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 198.110952][ T2812] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 198.122177][ T2812] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 198.138471][ T7533] 8021q: adding VLAN 0 to HW filter on device team0 [ 198.156108][ T7098] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 198.170451][ T7270] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 198.183065][ T7270] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 198.195479][ T7375] 8021q: adding VLAN 0 to HW filter on device team0 [ 198.202684][ T2812] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 198.212398][ T2812] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 198.220935][ T2812] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 198.230401][ T2812] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 198.239654][ T2812] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 198.248666][ T2812] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 198.280339][ T3161] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 198.293223][ T3161] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 198.302881][ T3161] bridge0: port 1(bridge_slave_0) entered blocking state [ 198.310039][ T3161] bridge0: port 1(bridge_slave_0) entered forwarding state [ 198.320467][ T3161] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 198.338288][ T7098] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 198.355655][ T2800] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 198.356299][ T2800] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 198.373931][ T2800] bridge0: port 1(bridge_slave_0) entered blocking state [ 198.381126][ T2800] bridge0: port 1(bridge_slave_0) entered forwarding state [ 198.389460][ T2800] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 198.398775][ T2800] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 198.430902][ T7270] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 198.453958][ T2800] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 198.467956][ T2800] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 198.479770][ T2800] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 198.489278][ T2800] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 198.498434][ T2800] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 198.507223][ T2800] bridge0: port 2(bridge_slave_1) entered blocking state [ 198.514294][ T2800] bridge0: port 2(bridge_slave_1) entered forwarding state [ 198.522406][ T2800] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 198.531602][ T2800] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 198.541474][ T2800] bridge0: port 2(bridge_slave_1) entered blocking state [ 198.548796][ T2800] bridge0: port 2(bridge_slave_1) entered forwarding state [ 198.556645][ T2800] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 198.564280][ T2800] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 198.619070][ T2837] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 198.628346][ T2837] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 198.637330][ T2837] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 198.647012][ T2837] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 198.660308][ T2837] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 198.669555][ T2837] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 198.741366][ T2837] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 198.749706][ T2837] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 198.759252][ T2837] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 198.768378][ T2837] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 198.777549][ T2837] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 198.786858][ T2837] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 198.796164][ T2837] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 198.804542][ T2837] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 198.813868][ T2837] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 198.827775][ T2837] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 198.838011][ T2837] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 198.850639][ T2837] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 198.859416][ T2837] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 198.868962][ T2837] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 198.879137][ T2837] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 198.887559][ T2837] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 198.919107][ T7533] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 198.929755][ T7228] device veth0_vlan entered promiscuous mode [ 198.947650][ T2837] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 198.957167][ T2837] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 198.966487][ T2837] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 198.975399][ T2837] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 198.986692][ T7375] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 199.012646][ T2717] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 199.021642][ T2717] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 199.117106][ T3162] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 199.127973][ T3162] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 199.137943][ T3162] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 199.146410][ T3162] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 199.157656][ T7228] device veth1_vlan entered promiscuous mode [ 199.167106][ T3162] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 199.181268][ T3162] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 199.189401][ T3162] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 199.258887][ T7270] device veth0_vlan entered promiscuous mode [ 199.277952][ T7708] 8021q: adding VLAN 0 to HW filter on device bond0 [ 199.341585][ T7375] 8021q: adding VLAN 0 to HW filter on device batadv0 06:08:16 executing program 0: r0 = perf_event_open(&(0x7f0000000640)={0x3, 0x70, 0x3e7, 0x0, 0x4, 0x0, 0x0, 0x0, 0x91dd7106ca8fd33b, 0xdb3fedb3c3734f95, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x40000000000, 0x0, 0x1, 0x0, @perf_config_ext={0x18, 0x3}, 0x21, 0x10000000000000, 0x0, 0x0, 0x0, 0x20000007, 0x2}, 0x0, 0xc, 0xffffffffffffffff, 0xa) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='cpuacct.stat\x00', 0x0, 0x0) r2 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r2, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f00000003c0)='syz1\x00', 0x200002, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0xfffffffffffffffc) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000300)='./cgroup/syz0\x00', 0x200002, 0x0) gettid() socket$kcm(0x11, 0xb, 0x0) ioctl$TUNSETTXFILTER(r1, 0x400454d1, &(0x7f00000000c0)=ANY=[@ANYBLOB="00000700000000da6500bbc4bbbbbbbb0180c2000016000000004dc23f0c000000000000bb"]) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000040)=@ipx={0x4, 0x1, 0x0, "2bfaec665b4b", 0xff}, 0x80, 0x0}, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={0xffffffffffffffff, 0x1, 0x49c42ca22ab5a9ac, 0x4, 0x0}, 0x20) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x908b7aabaa7d2404) socket$kcm(0xa, 0x6, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x4000011) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000000c0), 0x0}, 0x28) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x89f1, &(0x7f0000000000)='ip6gre0\x00') perf_event_open(&(0x7f00000004c0)={0x0, 0x70, 0x8, 0x6, 0x0, 0x3, 0x0, 0x3, 0x4, 0x0, 0x9, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x1000, 0x0, @perf_config_ext={0x1ff}, 0x40004, 0xfffffffffffffffd, 0x0, 0x8, 0x8, 0x4, 0x80}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0x10, 0x0, 0x10) sendmsg$kcm(r4, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d200040080000048000001000080000000000300f88000f01700d4bd", 0x2e}], 0xf}, 0x40094) r5 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r6 = socket$kcm(0x2, 0x1, 0x2) socketpair(0x25, 0x6, 0x4, &(0x7f0000000480)) setsockopt$sock_attach_bpf(r6, 0x1, 0x3e, &(0x7f00000002c0)=r5, 0x4) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x6d, &(0x7f0000000cc0)=ANY=[@ANYRESHEX, @ANYBLOB="e99f619c950ec8069b69ac05520100000000000000572e83f4fd34a6db69715afdc8ec492fa879a8460bf2c7459f384ec36d6f0d833fccc87dc8f542ca0731ec72c3f6e0857c63572db61a83246496a2f90400569c8af42a5b8b1e3583115dfe3a40a792ffe638fd722afd02131c170175f382a8d78b6626d1d58220f08d98570bad00042a01c00748cf37385e7d66e6c0efddeb730ebd2f1ab4e816cf7493cf236ca5eb6e5d2a65519a7acf475dbd9fb52eb50ddcf9cee74529f59a2d6cfe6c23f6a688719f922099394146621132f866439970571e206ac47123f2d9cdb5cb7c8506122300000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000)={0x0, 0x8}, 0x10}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r7, 0x18000000000002a0, 0x42, 0x0, &(0x7f0000000800)="b9ff0300600d698cb89e14f088a81fffffff00004000630677fbac14140ee934a0a662079f4b4d2f87e5feca6aab845013f2325f1a39010108038da1924425181aa5", 0x0, 0x28000, 0x60000000, 0x113, 0x0, &(0x7f00000006c0)="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"}, 0x40) r8 = bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x17, 0x6, &(0x7f0000000c00)=ANY=[], &(0x7f00000002c0)='GPL\x00', 0x2, 0x0, 0x0, 0x40f00, 0x8, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000340)={0x1, 0x10000003}, 0x8, 0x10, &(0x7f0000000380)={0x0, 0xa, 0x83, 0x2}, 0x10}, 0x78) ioctl$sock_kcm_SIOCKCMATTACH(r4, 0x89e0, &(0x7f0000000500)={0xffffffffffffffff, r8}) [ 199.397522][ T7270] device veth1_vlan entered promiscuous mode [ 199.404920][ T2717] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 199.412930][ T2717] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 199.431327][ T2717] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 199.442454][ T2717] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 199.482725][ T7708] 8021q: adding VLAN 0 to HW filter on device team0 [ 199.498495][ T7533] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 199.519709][ T3162] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 199.528505][ T3162] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 199.539471][ T3162] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 199.566683][ T7228] device veth0_macvtap entered promiscuous mode [ 199.597151][ T2717] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 199.605792][ C1] hrtimer: interrupt took 37567 ns [ 199.614056][ T2717] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 199.624356][ T2717] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 199.642783][ T2717] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 199.652549][ T2717] bridge0: port 1(bridge_slave_0) entered blocking state [ 199.659719][ T2717] bridge0: port 1(bridge_slave_0) entered forwarding state [ 199.674850][ T2717] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 199.683316][ T2717] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 199.782750][ T2837] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 199.793348][ T2837] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 199.810990][ T2837] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 199.823792][ T2837] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 199.833507][ T2837] bridge0: port 2(bridge_slave_1) entered blocking state [ 199.841646][ T2837] bridge0: port 2(bridge_slave_1) entered forwarding state [ 199.851747][ T7228] device veth1_macvtap entered promiscuous mode [ 199.871013][ T7270] device veth0_macvtap entered promiscuous mode 06:08:16 executing program 0: r0 = perf_event_open(&(0x7f0000000640)={0x3, 0x70, 0x3e7, 0x0, 0x4, 0x0, 0x0, 0x0, 0x91dd7106ca8fd33b, 0xdb3fedb3c3734f95, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x40000000000, 0x0, 0x1, 0x0, @perf_config_ext={0x18, 0x3}, 0x21, 0x10000000000000, 0x0, 0x0, 0x0, 0x20000007, 0x2}, 0x0, 0xc, 0xffffffffffffffff, 0xa) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='cpuacct.stat\x00', 0x0, 0x0) r2 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r2, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f00000003c0)='syz1\x00', 0x200002, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0xfffffffffffffffc) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000300)='./cgroup/syz0\x00', 0x200002, 0x0) gettid() socket$kcm(0x11, 0xb, 0x0) ioctl$TUNSETTXFILTER(r1, 0x400454d1, &(0x7f00000000c0)=ANY=[@ANYBLOB="00000700000000da6500bbc4bbbbbbbb0180c2000016000000004dc23f0c000000000000bb"]) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000040)=@ipx={0x4, 0x1, 0x0, "2bfaec665b4b", 0xff}, 0x80, 0x0}, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={0xffffffffffffffff, 0x1, 0x49c42ca22ab5a9ac, 0x4, 0x0}, 0x20) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x908b7aabaa7d2404) socket$kcm(0xa, 0x6, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x4000011) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000000c0), 0x0}, 0x28) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x89f1, &(0x7f0000000000)='ip6gre0\x00') perf_event_open(&(0x7f00000004c0)={0x0, 0x70, 0x8, 0x6, 0x0, 0x3, 0x0, 0x3, 0x4, 0x0, 0x9, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x1000, 0x0, @perf_config_ext={0x1ff}, 0x40004, 0xfffffffffffffffd, 0x0, 0x8, 0x8, 0x4, 0x80}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0x10, 0x0, 0x10) sendmsg$kcm(r4, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d200040080000048000001000080000000000300f88000f01700d4bd", 0x2e}], 0xf}, 0x40094) r5 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r6 = socket$kcm(0x2, 0x1, 0x2) socketpair(0x25, 0x6, 0x4, &(0x7f0000000480)) setsockopt$sock_attach_bpf(r6, 0x1, 0x3e, &(0x7f00000002c0)=r5, 0x4) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x6d, &(0x7f0000000cc0)=ANY=[@ANYRESHEX, @ANYBLOB="e99f619c950ec8069b69ac05520100000000000000572e83f4fd34a6db69715afdc8ec492fa879a8460bf2c7459f384ec36d6f0d833fccc87dc8f542ca0731ec72c3f6e0857c63572db61a83246496a2f90400569c8af42a5b8b1e3583115dfe3a40a792ffe638fd722afd02131c170175f382a8d78b6626d1d58220f08d98570bad00042a01c00748cf37385e7d66e6c0efddeb730ebd2f1ab4e816cf7493cf236ca5eb6e5d2a65519a7acf475dbd9fb52eb50ddcf9cee74529f59a2d6cfe6c23f6a688719f922099394146621132f866439970571e206ac47123f2d9cdb5cb7c8506122300000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000)={0x0, 0x8}, 0x10}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r7, 0x18000000000002a0, 0x42, 0x0, &(0x7f0000000800)="b9ff0300600d698cb89e14f088a81fffffff00004000630677fbac14140ee934a0a662079f4b4d2f87e5feca6aab845013f2325f1a39010108038da1924425181aa5", 0x0, 0x28000, 0x60000000, 0x113, 0x0, &(0x7f00000006c0)="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"}, 0x40) r8 = bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x17, 0x6, &(0x7f0000000c00)=ANY=[], &(0x7f00000002c0)='GPL\x00', 0x2, 0x0, 0x0, 0x40f00, 0x8, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000340)={0x1, 0x10000003}, 0x8, 0x10, &(0x7f0000000380)={0x0, 0xa, 0x83, 0x2}, 0x10}, 0x78) ioctl$sock_kcm_SIOCKCMATTACH(r4, 0x89e0, &(0x7f0000000500)={0xffffffffffffffff, r8}) [ 199.885947][ T7270] device veth1_macvtap entered promiscuous mode [ 199.936820][ T2717] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 199.954521][ T2717] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 199.964377][ T2717] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 199.982884][ T2717] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 199.997087][ T2717] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 200.022900][ T2717] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 200.039472][ T2717] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 200.119727][ T7375] device veth0_vlan entered promiscuous mode [ 200.131467][ T3162] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 200.157090][ T3162] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready 06:08:16 executing program 0: r0 = perf_event_open(&(0x7f0000000640)={0x3, 0x70, 0x3e7, 0x0, 0x4, 0x0, 0x0, 0x0, 0x91dd7106ca8fd33b, 0xdb3fedb3c3734f95, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x40000000000, 0x0, 0x1, 0x0, @perf_config_ext={0x18, 0x3}, 0x21, 0x10000000000000, 0x0, 0x0, 0x0, 0x20000007, 0x2}, 0x0, 0xc, 0xffffffffffffffff, 0xa) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='cpuacct.stat\x00', 0x0, 0x0) r2 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r2, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f00000003c0)='syz1\x00', 0x200002, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0xfffffffffffffffc) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000300)='./cgroup/syz0\x00', 0x200002, 0x0) gettid() socket$kcm(0x11, 0xb, 0x0) ioctl$TUNSETTXFILTER(r1, 0x400454d1, &(0x7f00000000c0)=ANY=[@ANYBLOB="00000700000000da6500bbc4bbbbbbbb0180c2000016000000004dc23f0c000000000000bb"]) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000040)=@ipx={0x4, 0x1, 0x0, "2bfaec665b4b", 0xff}, 0x80, 0x0}, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={0xffffffffffffffff, 0x1, 0x49c42ca22ab5a9ac, 0x4, 0x0}, 0x20) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x908b7aabaa7d2404) socket$kcm(0xa, 0x6, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x4000011) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000000c0), 0x0}, 0x28) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x89f1, &(0x7f0000000000)='ip6gre0\x00') perf_event_open(&(0x7f00000004c0)={0x0, 0x70, 0x8, 0x6, 0x0, 0x3, 0x0, 0x3, 0x4, 0x0, 0x9, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x1000, 0x0, @perf_config_ext={0x1ff}, 0x40004, 0xfffffffffffffffd, 0x0, 0x8, 0x8, 0x4, 0x80}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0x10, 0x0, 0x10) sendmsg$kcm(r4, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d200040080000048000001000080000000000300f88000f01700d4bd", 0x2e}], 0xf}, 0x40094) r5 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r6 = socket$kcm(0x2, 0x1, 0x2) socketpair(0x25, 0x6, 0x4, &(0x7f0000000480)) setsockopt$sock_attach_bpf(r6, 0x1, 0x3e, &(0x7f00000002c0)=r5, 0x4) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x6d, &(0x7f0000000cc0)=ANY=[@ANYRESHEX, @ANYBLOB="e99f619c950ec8069b69ac05520100000000000000572e83f4fd34a6db69715afdc8ec492fa879a8460bf2c7459f384ec36d6f0d833fccc87dc8f542ca0731ec72c3f6e0857c63572db61a83246496a2f90400569c8af42a5b8b1e3583115dfe3a40a792ffe638fd722afd02131c170175f382a8d78b6626d1d58220f08d98570bad00042a01c00748cf37385e7d66e6c0efddeb730ebd2f1ab4e816cf7493cf236ca5eb6e5d2a65519a7acf475dbd9fb52eb50ddcf9cee74529f59a2d6cfe6c23f6a688719f922099394146621132f866439970571e206ac47123f2d9cdb5cb7c8506122300000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000)={0x0, 0x8}, 0x10}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r7, 0x18000000000002a0, 0x42, 0x0, &(0x7f0000000800)="b9ff0300600d698cb89e14f088a81fffffff00004000630677fbac14140ee934a0a662079f4b4d2f87e5feca6aab845013f2325f1a39010108038da1924425181aa5", 0x0, 0x28000, 0x60000000, 0x113, 0x0, &(0x7f00000006c0)="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"}, 0x40) r8 = bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x17, 0x6, &(0x7f0000000c00)=ANY=[], &(0x7f00000002c0)='GPL\x00', 0x2, 0x0, 0x0, 0x40f00, 0x8, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000340)={0x1, 0x10000003}, 0x8, 0x10, &(0x7f0000000380)={0x0, 0xa, 0x83, 0x2}, 0x10}, 0x78) ioctl$sock_kcm_SIOCKCMATTACH(r4, 0x89e0, &(0x7f0000000500)={0xffffffffffffffff, r8}) [ 200.171081][ T3162] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 200.183506][ T3162] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 200.201508][ T3163] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 200.212542][ T3163] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 200.231698][ T3163] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 200.253087][ T7228] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 200.264950][ T7228] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 200.282139][ T7228] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 200.298717][ T7270] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 200.314102][ T7270] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 200.328249][ T7270] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 200.348143][ T7270] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 200.364809][ T7270] batman_adv: batadv0: Interface activated: batadv_slave_0 06:08:17 executing program 0: r0 = perf_event_open(&(0x7f0000000640)={0x3, 0x70, 0x3e7, 0x0, 0x4, 0x0, 0x0, 0x0, 0x91dd7106ca8fd33b, 0xdb3fedb3c3734f95, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x40000000000, 0x0, 0x1, 0x0, @perf_config_ext={0x18, 0x3}, 0x21, 0x10000000000000, 0x0, 0x0, 0x0, 0x20000007, 0x2}, 0x0, 0xc, 0xffffffffffffffff, 0xa) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='cpuacct.stat\x00', 0x0, 0x0) r2 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r2, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f00000003c0)='syz1\x00', 0x200002, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0xfffffffffffffffc) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000300)='./cgroup/syz0\x00', 0x200002, 0x0) gettid() socket$kcm(0x11, 0xb, 0x0) ioctl$TUNSETTXFILTER(r1, 0x400454d1, &(0x7f00000000c0)=ANY=[@ANYBLOB="00000700000000da6500bbc4bbbbbbbb0180c2000016000000004dc23f0c000000000000bb"]) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000040)=@ipx={0x4, 0x1, 0x0, "2bfaec665b4b", 0xff}, 0x80, 0x0}, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={0xffffffffffffffff, 0x1, 0x49c42ca22ab5a9ac, 0x4, 0x0}, 0x20) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x908b7aabaa7d2404) socket$kcm(0xa, 0x6, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x4000011) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000000c0), 0x0}, 0x28) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x89f1, &(0x7f0000000000)='ip6gre0\x00') perf_event_open(&(0x7f00000004c0)={0x0, 0x70, 0x8, 0x6, 0x0, 0x3, 0x0, 0x3, 0x4, 0x0, 0x9, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x1000, 0x0, @perf_config_ext={0x1ff}, 0x40004, 0xfffffffffffffffd, 0x0, 0x8, 0x8, 0x4, 0x80}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0x10, 0x0, 0x10) sendmsg$kcm(r4, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d200040080000048000001000080000000000300f88000f01700d4bd", 0x2e}], 0xf}, 0x40094) r5 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r6 = socket$kcm(0x2, 0x1, 0x2) socketpair(0x25, 0x6, 0x4, &(0x7f0000000480)) setsockopt$sock_attach_bpf(r6, 0x1, 0x3e, &(0x7f00000002c0)=r5, 0x4) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x6d, &(0x7f0000000cc0)=ANY=[@ANYRESHEX, @ANYBLOB="e99f619c950ec8069b69ac05520100000000000000572e83f4fd34a6db69715afdc8ec492fa879a8460bf2c7459f384ec36d6f0d833fccc87dc8f542ca0731ec72c3f6e0857c63572db61a83246496a2f90400569c8af42a5b8b1e3583115dfe3a40a792ffe638fd722afd02131c170175f382a8d78b6626d1d58220f08d98570bad00042a01c00748cf37385e7d66e6c0efddeb730ebd2f1ab4e816cf7493cf236ca5eb6e5d2a65519a7acf475dbd9fb52eb50ddcf9cee74529f59a2d6cfe6c23f6a688719f922099394146621132f866439970571e206ac47123f2d9cdb5cb7c8506122300000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000)={0x0, 0x8}, 0x10}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r7, 0x18000000000002a0, 0x42, 0x0, &(0x7f0000000800)="b9ff0300600d698cb89e14f088a81fffffff00004000630677fbac14140ee934a0a662079f4b4d2f87e5feca6aab845013f2325f1a39010108038da1924425181aa5", 0x0, 0x28000, 0x60000000, 0x113, 0x0, &(0x7f00000006c0)="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"}, 0x40) r8 = bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x17, 0x6, &(0x7f0000000c00)=ANY=[], &(0x7f00000002c0)='GPL\x00', 0x2, 0x0, 0x0, 0x40f00, 0x8, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000340)={0x1, 0x10000003}, 0x8, 0x10, &(0x7f0000000380)={0x0, 0xa, 0x83, 0x2}, 0x10}, 0x78) ioctl$sock_kcm_SIOCKCMATTACH(r4, 0x89e0, &(0x7f0000000500)={0xffffffffffffffff, r8}) [ 200.404968][ T2800] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 200.416645][ T2800] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 200.430019][ T2800] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 200.457078][ T2800] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 200.466033][ T2800] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 200.475365][ T2800] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 200.484399][ T2800] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 200.495549][ T2800] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 200.522278][ T7228] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 200.536079][ T7228] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 200.548136][ T7228] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 200.571672][ T7270] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 200.590316][ T7270] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 200.614141][ T7270] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 200.633986][ T7270] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 200.653892][ T7270] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 200.663253][ T7375] device veth1_vlan entered promiscuous mode 06:08:17 executing program 0: r0 = perf_event_open(&(0x7f0000000640)={0x3, 0x70, 0x3e7, 0x0, 0x4, 0x0, 0x0, 0x0, 0x91dd7106ca8fd33b, 0xdb3fedb3c3734f95, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x40000000000, 0x0, 0x1, 0x0, @perf_config_ext={0x18, 0x3}, 0x21, 0x10000000000000, 0x0, 0x0, 0x0, 0x20000007, 0x2}, 0x0, 0xc, 0xffffffffffffffff, 0xa) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='cpuacct.stat\x00', 0x0, 0x0) r2 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r2, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f00000003c0)='syz1\x00', 0x200002, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0xfffffffffffffffc) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000300)='./cgroup/syz0\x00', 0x200002, 0x0) gettid() socket$kcm(0x11, 0xb, 0x0) ioctl$TUNSETTXFILTER(r1, 0x400454d1, &(0x7f00000000c0)=ANY=[@ANYBLOB="00000700000000da6500bbc4bbbbbbbb0180c2000016000000004dc23f0c000000000000bb"]) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000040)=@ipx={0x4, 0x1, 0x0, "2bfaec665b4b", 0xff}, 0x80, 0x0}, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={0xffffffffffffffff, 0x1, 0x49c42ca22ab5a9ac, 0x4, 0x0}, 0x20) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x908b7aabaa7d2404) socket$kcm(0xa, 0x6, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x4000011) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000000c0), 0x0}, 0x28) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x89f1, &(0x7f0000000000)='ip6gre0\x00') perf_event_open(&(0x7f00000004c0)={0x0, 0x70, 0x8, 0x6, 0x0, 0x3, 0x0, 0x3, 0x4, 0x0, 0x9, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x1000, 0x0, @perf_config_ext={0x1ff}, 0x40004, 0xfffffffffffffffd, 0x0, 0x8, 0x8, 0x4, 0x80}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0x10, 0x0, 0x10) sendmsg$kcm(r4, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d200040080000048000001000080000000000300f88000f01700d4bd", 0x2e}], 0xf}, 0x40094) r5 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r6 = socket$kcm(0x2, 0x1, 0x2) socketpair(0x25, 0x6, 0x4, &(0x7f0000000480)) setsockopt$sock_attach_bpf(r6, 0x1, 0x3e, &(0x7f00000002c0)=r5, 0x4) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x6d, &(0x7f0000000cc0)=ANY=[@ANYRESHEX, @ANYBLOB="e99f619c950ec8069b69ac05520100000000000000572e83f4fd34a6db69715afdc8ec492fa879a8460bf2c7459f384ec36d6f0d833fccc87dc8f542ca0731ec72c3f6e0857c63572db61a83246496a2f90400569c8af42a5b8b1e3583115dfe3a40a792ffe638fd722afd02131c170175f382a8d78b6626d1d58220f08d98570bad00042a01c00748cf37385e7d66e6c0efddeb730ebd2f1ab4e816cf7493cf236ca5eb6e5d2a65519a7acf475dbd9fb52eb50ddcf9cee74529f59a2d6cfe6c23f6a688719f922099394146621132f866439970571e206ac47123f2d9cdb5cb7c8506122300000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000)={0x0, 0x8}, 0x10}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r7, 0x18000000000002a0, 0x42, 0x0, &(0x7f0000000800)="b9ff0300600d698cb89e14f088a81fffffff00004000630677fbac14140ee934a0a662079f4b4d2f87e5feca6aab845013f2325f1a39010108038da1924425181aa5", 0x0, 0x28000, 0x60000000, 0x113, 0x0, &(0x7f00000006c0)="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"}, 0x40) bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x17, 0x6, &(0x7f0000000c00)=ANY=[], &(0x7f00000002c0)='GPL\x00', 0x2, 0x0, 0x0, 0x40f00, 0x8, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000340)={0x1, 0x10000003}, 0x8, 0x10, &(0x7f0000000380)={0x0, 0xa, 0x83, 0x2}, 0x10}, 0x78) [ 200.705216][ T2837] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 200.713706][ T2837] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 200.731551][ T2837] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 200.742250][ T2837] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 200.764382][ T2837] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 200.787351][ T2837] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 200.802319][ T2837] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 200.813891][ T2837] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 200.830663][ T2837] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 200.873760][ T7708] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 200.892539][ T2800] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 200.906084][ T2800] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready 06:08:17 executing program 0: r0 = perf_event_open(&(0x7f0000000640)={0x3, 0x70, 0x3e7, 0x0, 0x4, 0x0, 0x0, 0x0, 0x91dd7106ca8fd33b, 0xdb3fedb3c3734f95, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x40000000000, 0x0, 0x1, 0x0, @perf_config_ext={0x18, 0x3}, 0x21, 0x10000000000000, 0x0, 0x0, 0x0, 0x20000007, 0x2}, 0x0, 0xc, 0xffffffffffffffff, 0xa) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='cpuacct.stat\x00', 0x0, 0x0) r2 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r2, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f00000003c0)='syz1\x00', 0x200002, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0xfffffffffffffffc) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000300)='./cgroup/syz0\x00', 0x200002, 0x0) gettid() socket$kcm(0x11, 0xb, 0x0) ioctl$TUNSETTXFILTER(r1, 0x400454d1, &(0x7f00000000c0)=ANY=[@ANYBLOB="00000700000000da6500bbc4bbbbbbbb0180c2000016000000004dc23f0c000000000000bb"]) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000040)=@ipx={0x4, 0x1, 0x0, "2bfaec665b4b", 0xff}, 0x80, 0x0}, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={0xffffffffffffffff, 0x1, 0x49c42ca22ab5a9ac, 0x4, 0x0}, 0x20) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x908b7aabaa7d2404) socket$kcm(0xa, 0x6, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x4000011) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000000c0), 0x0}, 0x28) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x89f1, &(0x7f0000000000)='ip6gre0\x00') perf_event_open(&(0x7f00000004c0)={0x0, 0x70, 0x8, 0x6, 0x0, 0x3, 0x0, 0x3, 0x4, 0x0, 0x9, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x1000, 0x0, @perf_config_ext={0x1ff}, 0x40004, 0xfffffffffffffffd, 0x0, 0x8, 0x8, 0x4, 0x80}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0x10, 0x0, 0x10) sendmsg$kcm(r4, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d200040080000048000001000080000000000300f88000f01700d4bd", 0x2e}], 0xf}, 0x40094) r5 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r6 = socket$kcm(0x2, 0x1, 0x2) socketpair(0x25, 0x6, 0x4, &(0x7f0000000480)) setsockopt$sock_attach_bpf(r6, 0x1, 0x3e, &(0x7f00000002c0)=r5, 0x4) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x6d, &(0x7f0000000cc0)=ANY=[@ANYRESHEX, @ANYBLOB="e99f619c950ec8069b69ac05520100000000000000572e83f4fd34a6db69715afdc8ec492fa879a8460bf2c7459f384ec36d6f0d833fccc87dc8f542ca0731ec72c3f6e0857c63572db61a83246496a2f90400569c8af42a5b8b1e3583115dfe3a40a792ffe638fd722afd02131c170175f382a8d78b6626d1d58220f08d98570bad00042a01c00748cf37385e7d66e6c0efddeb730ebd2f1ab4e816cf7493cf236ca5eb6e5d2a65519a7acf475dbd9fb52eb50ddcf9cee74529f59a2d6cfe6c23f6a688719f922099394146621132f866439970571e206ac47123f2d9cdb5cb7c8506122300000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000)={0x0, 0x8}, 0x10}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r7, 0x18000000000002a0, 0x42, 0x0, &(0x7f0000000800)="b9ff0300600d698cb89e14f088a81fffffff00004000630677fbac14140ee934a0a662079f4b4d2f87e5feca6aab845013f2325f1a39010108038da1924425181aa5", 0x0, 0x28000, 0x60000000, 0x113, 0x0, &(0x7f00000006c0)="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"}, 0x40) bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x17, 0x6, &(0x7f0000000c00)=ANY=[], &(0x7f00000002c0)='GPL\x00', 0x2, 0x0, 0x0, 0x40f00, 0x8, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000340)={0x1, 0x10000003}, 0x8, 0x10, &(0x7f0000000380)={0x0, 0xa, 0x83, 0x2}, 0x10}, 0x78) [ 201.006091][ T7533] device veth0_vlan entered promiscuous mode [ 201.016045][ T2800] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 201.025978][ T2800] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 201.180633][ T7533] device veth1_vlan entered promiscuous mode 06:08:18 executing program 0: r0 = perf_event_open(&(0x7f0000000640)={0x3, 0x70, 0x3e7, 0x0, 0x4, 0x0, 0x0, 0x0, 0x91dd7106ca8fd33b, 0xdb3fedb3c3734f95, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x40000000000, 0x0, 0x1, 0x0, @perf_config_ext={0x18, 0x3}, 0x21, 0x10000000000000, 0x0, 0x0, 0x0, 0x20000007, 0x2}, 0x0, 0xc, 0xffffffffffffffff, 0xa) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='cpuacct.stat\x00', 0x0, 0x0) r2 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r2, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f00000003c0)='syz1\x00', 0x200002, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0xfffffffffffffffc) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000300)='./cgroup/syz0\x00', 0x200002, 0x0) gettid() socket$kcm(0x11, 0xb, 0x0) ioctl$TUNSETTXFILTER(r1, 0x400454d1, &(0x7f00000000c0)=ANY=[@ANYBLOB="00000700000000da6500bbc4bbbbbbbb0180c2000016000000004dc23f0c000000000000bb"]) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000040)=@ipx={0x4, 0x1, 0x0, "2bfaec665b4b", 0xff}, 0x80, 0x0}, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={0xffffffffffffffff, 0x1, 0x49c42ca22ab5a9ac, 0x4, 0x0}, 0x20) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x908b7aabaa7d2404) socket$kcm(0xa, 0x6, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x4000011) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000000c0), 0x0}, 0x28) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x89f1, &(0x7f0000000000)='ip6gre0\x00') perf_event_open(&(0x7f00000004c0)={0x0, 0x70, 0x8, 0x6, 0x0, 0x3, 0x0, 0x3, 0x4, 0x0, 0x9, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x1000, 0x0, @perf_config_ext={0x1ff}, 0x40004, 0xfffffffffffffffd, 0x0, 0x8, 0x8, 0x4, 0x80}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0x10, 0x0, 0x10) sendmsg$kcm(r4, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d200040080000048000001000080000000000300f88000f01700d4bd", 0x2e}], 0xf}, 0x40094) r5 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r6 = socket$kcm(0x2, 0x1, 0x2) socketpair(0x25, 0x6, 0x4, &(0x7f0000000480)) setsockopt$sock_attach_bpf(r6, 0x1, 0x3e, &(0x7f00000002c0)=r5, 0x4) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x6d, &(0x7f0000000cc0)=ANY=[@ANYRESHEX, @ANYBLOB="e99f619c950ec8069b69ac05520100000000000000572e83f4fd34a6db69715afdc8ec492fa879a8460bf2c7459f384ec36d6f0d833fccc87dc8f542ca0731ec72c3f6e0857c63572db61a83246496a2f90400569c8af42a5b8b1e3583115dfe3a40a792ffe638fd722afd02131c170175f382a8d78b6626d1d58220f08d98570bad00042a01c00748cf37385e7d66e6c0efddeb730ebd2f1ab4e816cf7493cf236ca5eb6e5d2a65519a7acf475dbd9fb52eb50ddcf9cee74529f59a2d6cfe6c23f6a688719f922099394146621132f866439970571e206ac47123f2d9cdb5cb7c8506122300000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000)={0x0, 0x8}, 0x10}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r7, 0x18000000000002a0, 0x42, 0x0, &(0x7f0000000800)="b9ff0300600d698cb89e14f088a81fffffff00004000630677fbac14140ee934a0a662079f4b4d2f87e5feca6aab845013f2325f1a39010108038da1924425181aa5", 0x0, 0x28000, 0x60000000, 0x113, 0x0, &(0x7f00000006c0)="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"}, 0x40) bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x17, 0x6, &(0x7f0000000c00)=ANY=[], &(0x7f00000002c0)='GPL\x00', 0x2, 0x0, 0x0, 0x40f00, 0x8, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000340)={0x1, 0x10000003}, 0x8, 0x10, &(0x7f0000000380)={0x0, 0xa, 0x83, 0x2}, 0x10}, 0x78) 06:08:18 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x222}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0xe80, 0x0, &(0x7f00000000c0)="b9ff03c6630d698cb89e0bf088ca1fffffff0e090000633a77fbac14143fee", 0x0, 0x2f, 0x0, 0x0, 0xfffffffffffffe2a}, 0x28) [ 201.365322][ T2810] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 201.381405][ T2810] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready 06:08:18 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={0xffffffffffffffff, 0x18000000000002a0, 0x30, 0x0, &(0x7f00000000c0)="b9ff030000ffffff7f9e14f005051fffffff00004000630677fbac141433e000000162079f4b4d2f87e5feca6aab8402", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) sendmsg$sock(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000000c0)="f0651851beb51bad02776ca3eba5b70a32dd39d188a663ba894b860af91666184961", 0x22}], 0x1}, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000002400)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x222}, 0x48) bpf$MAP_UPDATE_ELEM(0x2, 0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f0000000000), &(0x7f0000000240)=""/4096}, 0x20) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xe80, 0x0, &(0x7f00000000c0)="b9ff03c6630d698cb89e0bf088ca1fffffff0e000000630677fbac14140ce0", 0x0, 0x2f, 0x0, 0x0, 0xfffffffffffffe2a}, 0x28) [ 201.439700][ T2810] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 201.466688][ T2810] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 201.525859][ T7708] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 201.559360][ T2810] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 201.589512][ T2810] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 201.620673][ T7375] device veth0_macvtap entered promiscuous mode [ 201.676882][ T2800] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 201.715512][ T2800] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 201.747651][ T2800] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 201.768171][ T7375] device veth1_macvtap entered promiscuous mode [ 201.783889][ T7533] device veth0_macvtap entered promiscuous mode [ 201.816456][ T2810] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 201.826067][ T2810] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 201.858710][ T7533] device veth1_macvtap entered promiscuous mode [ 201.871408][ T7375] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 201.893453][ T7375] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 201.906879][ T7375] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 201.918164][ T7375] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 201.936999][ T7375] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 201.948452][ T7375] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 201.962787][ T7375] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 201.986562][ T3163] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 202.005807][ T3163] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 202.023442][ T7375] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 202.049306][ T7375] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 202.071398][ T7375] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 202.083119][ T7375] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 202.095666][ T7375] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 202.106685][ T7375] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 202.119174][ T7375] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 202.136851][ T3163] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 202.146292][ T3163] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 202.163063][ T7533] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 202.174365][ T7533] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 202.186027][ T7533] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 202.196786][ T7533] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 202.206685][ T7533] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 202.218155][ T7533] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 202.228991][ T7533] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 202.239519][ T7533] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 202.251144][ T7533] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 202.265190][ T3162] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 202.274114][ T3162] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 202.303878][ T7533] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 202.321981][ T7533] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 202.332230][ T7533] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 202.347277][ T7533] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 202.359574][ T7533] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 202.373101][ T7533] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 202.387418][ T7533] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 202.398883][ T7533] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 202.410799][ T7533] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 202.420394][ T3163] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 202.432867][ T3163] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 202.442040][ T3163] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 202.451649][ T3163] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 202.474855][ T2810] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 202.483156][ T2810] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 202.567218][ T2810] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 202.576371][ T2810] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 202.586638][ T7708] device veth0_vlan entered promiscuous mode 06:08:19 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000100)="1400000052008102a00f80854a36b8ab959916fb", 0x14}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000008440)={0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffe49}, 0x0) recvmsg$kcm(r0, &(0x7f0000000340)={0x0, 0x0, 0x0}, 0x0) [ 202.829539][ T7708] device veth1_vlan entered promiscuous mode 06:08:19 executing program 4: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000000c0)=0xe) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r1, 0x40047438, &(0x7f0000000180)=""/246) ioctl$PPPIOCSFLAGS1(r1, 0x40047457, &(0x7f0000000000)) fdatasync(0xffffffffffffffff) ioctl$PPPIOCSMRRU(0xffffffffffffffff, 0x4004743b, 0x0) [ 203.001442][ T3162] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 203.020285][ T3162] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 203.042656][ T7708] device veth0_macvtap entered promiscuous mode [ 203.075316][ T7708] device veth1_macvtap entered promiscuous mode [ 203.109731][ T7708] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 203.121654][ T7708] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 203.138768][ T8441] IPVS: ftp: loaded support on port[0] = 21 [ 203.144822][ T7708] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 203.164056][ T7708] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 203.174065][ T7708] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 203.186360][ T7708] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 203.206263][ T7708] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 203.247131][ T7708] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 203.280099][ T7708] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 203.301780][ T7708] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 203.317752][ T7708] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 203.339609][ T2717] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 203.359819][ T2717] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 203.378548][ T2717] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 203.388935][ T2717] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 203.437708][ T7708] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 203.454765][ T7708] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 203.477384][ T7708] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 203.506439][ T7708] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 203.520172][ T7708] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 203.532624][ T7708] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 203.543218][ T7708] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 203.554285][ T7708] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 203.566131][ T7708] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 203.577456][ T7708] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 203.588991][ T7708] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 203.604551][ T2800] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 203.616013][ T2800] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 203.707569][ T8441] IPVS: ftp: loaded support on port[0] = 21 06:08:20 executing program 5: openat$sequencer(0xffffffffffffff9c, 0x0, 0x0, 0x0) getpid() ioctl$DRM_IOCTL_MODE_CREATE_DUMB(0xffffffffffffffff, 0xc02064b2, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$invalidate(0x15, 0x0) unshare(0x40000000) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='net/ip_mr_vif\x00') sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) setsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000180)={{{@in6=@empty, @in=@dev, 0x0, 0x1}, {0x0, 0x0, 0x0, 0x87bb, 0x9, 0xffff, 0x7, 0x800}, {0x0, 0x0, 0x0, 0x400}}, {{@in6=@mcast2}, 0x0, @in6=@mcast2}}, 0xe8) ioctl$DRM_IOCTL_GET_CLIENT(0xffffffffffffffff, 0xc0286405, 0x0) accept$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @multicast1}, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x4004510d, 0x0) 06:08:20 executing program 0: r0 = perf_event_open(&(0x7f0000000640)={0x3, 0x70, 0x3e7, 0x0, 0x4, 0x0, 0x0, 0x0, 0x91dd7106ca8fd33b, 0xdb3fedb3c3734f95, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x40000000000, 0x0, 0x1, 0x0, @perf_config_ext={0x18, 0x3}, 0x21, 0x10000000000000, 0x0, 0x0, 0x0, 0x20000007, 0x2}, 0x0, 0xc, 0xffffffffffffffff, 0xa) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='cpuacct.stat\x00', 0x0, 0x0) r2 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r2, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f00000003c0)='syz1\x00', 0x200002, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0xfffffffffffffffc) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000300)='./cgroup/syz0\x00', 0x200002, 0x0) gettid() socket$kcm(0x11, 0xb, 0x0) ioctl$TUNSETTXFILTER(r1, 0x400454d1, &(0x7f00000000c0)=ANY=[@ANYBLOB="00000700000000da6500bbc4bbbbbbbb0180c2000016000000004dc23f0c000000000000bb"]) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000040)=@ipx={0x4, 0x1, 0x0, "2bfaec665b4b", 0xff}, 0x80, 0x0}, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={0xffffffffffffffff, 0x1, 0x49c42ca22ab5a9ac, 0x4, 0x0}, 0x20) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x908b7aabaa7d2404) socket$kcm(0xa, 0x6, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x4000011) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000000c0), 0x0}, 0x28) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x89f1, &(0x7f0000000000)='ip6gre0\x00') perf_event_open(&(0x7f00000004c0)={0x0, 0x70, 0x8, 0x6, 0x0, 0x3, 0x0, 0x3, 0x4, 0x0, 0x9, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x1000, 0x0, @perf_config_ext={0x1ff}, 0x40004, 0xfffffffffffffffd, 0x0, 0x8, 0x8, 0x4, 0x80}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0x10, 0x0, 0x10) sendmsg$kcm(r4, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d200040080000048000001000080000000000300f88000f01700d4bd", 0x2e}], 0xf}, 0x40094) r5 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r6 = socket$kcm(0x2, 0x1, 0x2) socketpair(0x25, 0x6, 0x4, &(0x7f0000000480)) setsockopt$sock_attach_bpf(r6, 0x1, 0x3e, &(0x7f00000002c0)=r5, 0x4) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x6d, &(0x7f0000000cc0)=ANY=[@ANYRESHEX, @ANYBLOB="e99f619c950ec8069b69ac05520100000000000000572e83f4fd34a6db69715afdc8ec492fa879a8460bf2c7459f384ec36d6f0d833fccc87dc8f542ca0731ec72c3f6e0857c63572db61a83246496a2f90400569c8af42a5b8b1e3583115dfe3a40a792ffe638fd722afd02131c170175f382a8d78b6626d1d58220f08d98570bad00042a01c00748cf37385e7d66e6c0efddeb730ebd2f1ab4e816cf7493cf236ca5eb6e5d2a65519a7acf475dbd9fb52eb50ddcf9cee74529f59a2d6cfe6c23f6a688719f922099394146621132f866439970571e206ac47123f2d9cdb5cb7c8506122300000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000)={0x0, 0x8}, 0x10}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r7, 0x18000000000002a0, 0x42, 0x0, &(0x7f0000000800)="b9ff0300600d698cb89e14f088a81fffffff00004000630677fbac14140ee934a0a662079f4b4d2f87e5feca6aab845013f2325f1a39010108038da1924425181aa5", 0x0, 0x28000, 0x60000000, 0x113, 0x0, &(0x7f00000006c0)="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"}, 0x40) ioctl$sock_kcm_SIOCKCMATTACH(r4, 0x89e0, &(0x7f0000000500)) 06:08:20 executing program 2: sendmsg$sock(0xffffffffffffffff, &(0x7f0000001400)={0x0, 0x0, &(0x7f0000001380)=[{&(0x7f00000000c0)="f0651851beb51bad02776ca3eba5b70a32dd39d188a663ba894b860af91666184961d6937030a33e31d7acfb5262eff8", 0x30}], 0x1}, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x222}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xe80, 0x0, &(0x7f00000000c0)="b9ff03c6632f698cb89e0bf088ca1fffffff0e000000630677fbac14140ce0", 0x0, 0x2f, 0x0, 0x0, 0xfffffffffffffe2a}, 0x28) 06:08:20 executing program 1: r0 = socket$kcm(0x11, 0xa, 0x300) sendmsg(r0, &(0x7f0000001040)={&(0x7f0000000a80)=@hci={0x1f, 0x3}, 0x80, 0x0}, 0x0) 06:08:20 executing program 3: request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x3}, &(0x7f0000001fee)='\x02\trust\xe3cusgrVid:De', 0x0) 06:08:20 executing program 3: perf_event_open(&(0x7f00000012c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r0, &(0x7f0000000140)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x4e23, @multicast2}}, 0x24) sendmmsg(r0, &(0x7f0000003e80)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000a00)=ANY=[@ANYBLOB="18000000000000001001000001"], 0x18}}], 0x1, 0x0) r1 = perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup2(r1, r0) 06:08:20 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet_udp_int(r0, 0x11, 0x67, &(0x7f0000000140)=0x6, 0x4) sendmmsg(r0, &(0x7f0000006f00)=[{{&(0x7f0000000040)=@in={0x2, 0x4e23, @remote}, 0x80, &(0x7f0000000100)=[{&(0x7f00000000c0)="e04013b497936ecafdd12c496f522cc2830fd358bc8f890e410223906070a39cc6e2f84a8622c5f86cad52bba1560397737a6cce189d7db27e", 0x39}], 0x1}}, {{0x0, 0x0, &(0x7f0000000440)=[{&(0x7f0000000200)="9544939c01e602e8fc696947591d4c6fb3cb9a7cf9e53555dac91c09bbd33a6e85981e045d", 0x25}, {&(0x7f0000000240)="b995a5bf327c6f291a70af1527c6eb87af6b40c22e784c7d81102b1d2c4f5434d0142b1efa49361c7fa370cde02cbad1cdf556d5ebe84042e5b1eee75566d3c3bd4e54fb80c6258eb985131872c446ae99febe93703f66f4e0e10392c8a0d30f35710c7490190fef84833442ab74de59e4c9ebbc7cfe3f26750c16970d537ab353640e9e46e706cd200383135bfbf29b19c2fe729da592a9fb74eca37cb46775eb6db0118a3c59ac107fcf691822488d67f90e891045cb2ea35a79b6cd27c9fa5f37c9f6d6e4e2ca9267b2a8aa34f9727b0f539f", 0xd4}, {&(0x7f0000000340)="529cd4456bccdb80c030fe01e5cd61704126c8d4e7ec", 0x16}, {&(0x7f0000000380)="c2597979197f75ed6b82c8bcbf2c6b92a9a53fdd74646d60f9941ca27e", 0x1d}], 0x4}}], 0x2, 0x4c004) sendmmsg(r0, &(0x7f0000007fc0), 0x800001d, 0x0) [ 204.082244][ T8500] IPVS: ftp: loaded support on port[0] = 21 06:08:21 executing program 2: perf_event_open(&(0x7f00000012c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$misdntimer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/mISDNtimer\x00', 0x0, 0x0) openat$misdntimer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mISDNtimer\x00', 0x0, 0x0) dup2(0xffffffffffffffff, r0) r1 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r1, &(0x7f0000000140)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x4e23, @multicast2}}, 0x24) sendmmsg(r1, &(0x7f0000003e80)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000a00)=ANY=[@ANYBLOB="18000000000000001001000001"], 0x18}}], 0x1, 0x0) r2 = perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup2(r2, r1) [ 204.244878][ T46] tipc: TX() has been purged, node left! 06:08:21 executing program 0: r0 = perf_event_open(&(0x7f0000000640)={0x3, 0x70, 0x3e7, 0x0, 0x4, 0x0, 0x0, 0x0, 0x91dd7106ca8fd33b, 0xdb3fedb3c3734f95, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x40000000000, 0x0, 0x1, 0x0, @perf_config_ext={0x18, 0x3}, 0x21, 0x10000000000000, 0x0, 0x0, 0x0, 0x20000007, 0x2}, 0x0, 0xc, 0xffffffffffffffff, 0xa) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='cpuacct.stat\x00', 0x0, 0x0) r2 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r2, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f00000003c0)='syz1\x00', 0x200002, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0xfffffffffffffffc) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000300)='./cgroup/syz0\x00', 0x200002, 0x0) gettid() socket$kcm(0x11, 0xb, 0x0) ioctl$TUNSETTXFILTER(r1, 0x400454d1, &(0x7f00000000c0)=ANY=[@ANYBLOB="00000700000000da6500bbc4bbbbbbbb0180c2000016000000004dc23f0c000000000000bb"]) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000040)=@ipx={0x4, 0x1, 0x0, "2bfaec665b4b", 0xff}, 0x80, 0x0}, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={0xffffffffffffffff, 0x1, 0x49c42ca22ab5a9ac, 0x4, 0x0}, 0x20) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x908b7aabaa7d2404) socket$kcm(0xa, 0x6, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x4000011) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000000c0), 0x0}, 0x28) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x89f1, &(0x7f0000000000)='ip6gre0\x00') perf_event_open(&(0x7f00000004c0)={0x0, 0x70, 0x8, 0x6, 0x0, 0x3, 0x0, 0x3, 0x4, 0x0, 0x9, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x1000, 0x0, @perf_config_ext={0x1ff}, 0x40004, 0xfffffffffffffffd, 0x0, 0x8, 0x8, 0x4, 0x80}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0x10, 0x0, 0x10) sendmsg$kcm(r4, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d200040080000048000001000080000000000300f88000f01700d4bd", 0x2e}], 0xf}, 0x40094) r5 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r6 = socket$kcm(0x2, 0x1, 0x2) socketpair(0x25, 0x6, 0x4, &(0x7f0000000480)) setsockopt$sock_attach_bpf(r6, 0x1, 0x3e, &(0x7f00000002c0)=r5, 0x4) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x6d, &(0x7f0000000cc0)=ANY=[@ANYRESHEX, @ANYBLOB="e99f619c950ec8069b69ac05520100000000000000572e83f4fd34a6db69715afdc8ec492fa879a8460bf2c7459f384ec36d6f0d833fccc87dc8f542ca0731ec72c3f6e0857c63572db61a83246496a2f90400569c8af42a5b8b1e3583115dfe3a40a792ffe638fd722afd02131c170175f382a8d78b6626d1d58220f08d98570bad00042a01c00748cf37385e7d66e6c0efddeb730ebd2f1ab4e816cf7493cf236ca5eb6e5d2a65519a7acf475dbd9fb52eb50ddcf9cee74529f59a2d6cfe6c23f6a688719f922099394146621132f866439970571e206ac47123f2d9cdb5cb7c8506122300000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000)={0x0, 0x8}, 0x10}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r7, 0x18000000000002a0, 0x42, 0x0, &(0x7f0000000800)="b9ff0300600d698cb89e14f088a81fffffff00004000630677fbac14140ee934a0a662079f4b4d2f87e5feca6aab845013f2325f1a39010108038da1924425181aa5", 0x0, 0x28000, 0x60000000, 0x113, 0x0, &(0x7f00000006c0)="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"}, 0x40) ioctl$sock_kcm_SIOCKCMATTACH(r4, 0x89e0, &(0x7f0000000500)) 06:08:21 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet_udp_int(r0, 0x11, 0x67, &(0x7f0000000140)=0x6, 0x4) sendmmsg(r0, &(0x7f0000006f00)=[{{&(0x7f0000000040)=@in={0x2, 0x4e23, @remote}, 0x80, &(0x7f0000000100)=[{&(0x7f00000000c0)="e04013b497936ecafdd12c496f522cc2830fd358bc8f890e410223906070a39cc6e2f84a8622c5f86cad52bba1560397737a6cce189d7db27e", 0x39}], 0x1}}, {{0x0, 0x0, &(0x7f0000000440)=[{&(0x7f0000000200)="9544939c01e602e8fc696947591d4c6fb3cb9a7cf9e53555dac91c09bbd33a6e85981e045d", 0x25}, {&(0x7f0000000240)="b995a5bf327c6f291a70af1527c6eb87af6b40c22e784c7d81102b1d2c4f5434d0142b1efa49361c7fa370cde02cbad1cdf556d5ebe84042e5b1eee75566d3c3bd4e54fb80c6258eb985131872c446ae99febe93703f66f4e0e10392c8a0d30f35710c7490190fef84833442ab74de59e4c9ebbc7cfe3f26750c16970d537ab353640e9e46e706cd200383135bfbf29b19c2fe729da592a9fb74eca37cb46775eb6db0118a3c59ac107fcf691822488d67f90e891045cb2ea35a79b6cd27c9fa5f37c9f6d6e4e2ca9267b2a8aa34f9727b0f539f", 0xd4}, {&(0x7f0000000340)="529cd4456bccdb80c030fe01e5cd61704126c8d4e7ec", 0x16}, {&(0x7f0000000380)="c2597979197f75ed6b82c8bcbf2c6b92a9a53fdd74646d60f9941ca27e", 0x1d}], 0x4}}], 0x2, 0x4c004) sendmmsg(r0, &(0x7f0000007fc0), 0x800001d, 0x0) 06:08:21 executing program 3: perf_event_open(&(0x7f00000012c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r0, &(0x7f0000000140)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x4e23, @multicast2}}, 0x24) sendmmsg(r0, &(0x7f0000003e80)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000a00)=ANY=[@ANYBLOB="18000000000000001001000001"], 0x18}}], 0x1, 0x0) r1 = perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup2(r1, r0) [ 204.472439][ T8514] syz-executor.3 (8514) used greatest stack depth: 23104 bytes left [ 204.532729][ T8502] IPVS: ftp: loaded support on port[0] = 21 06:08:21 executing program 4: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000000c0)=0xe) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r1, 0x40047438, &(0x7f0000000180)=""/246) ioctl$PPPIOCSFLAGS1(r1, 0x40047457, &(0x7f0000000000)) fdatasync(0xffffffffffffffff) ioctl$PPPIOCSMRRU(0xffffffffffffffff, 0x4004743b, 0x0) 06:08:21 executing program 5: openat$sequencer(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$invalidate(0x15, 0x0) unshare(0x40000000) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='net/ip_mr_vif\x00') preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) sendto$inet(r0, &(0x7f0000fa3fff), 0x0, 0x0, 0x0, 0x0) ioctl$DRM_IOCTL_GET_CLIENT(0xffffffffffffffff, 0xc0286405, 0x0) accept$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @multicast1}, &(0x7f0000000040)=0x10) r1 = openat$sequencer(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$DRM_IOCTL_RES_CTX(0xffffffffffffffff, 0xc0106426, 0x0) ioctl$DRM_IOCTL_UNLOCK(0xffffffffffffffff, 0x4008642b, 0x0) ftruncate(r1, 0x100000001) 06:08:21 executing program 0: r0 = perf_event_open(&(0x7f0000000640)={0x3, 0x70, 0x3e7, 0x0, 0x4, 0x0, 0x0, 0x0, 0x91dd7106ca8fd33b, 0xdb3fedb3c3734f95, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x40000000000, 0x0, 0x1, 0x0, @perf_config_ext={0x18, 0x3}, 0x21, 0x10000000000000, 0x0, 0x0, 0x0, 0x20000007, 0x2}, 0x0, 0xc, 0xffffffffffffffff, 0xa) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='cpuacct.stat\x00', 0x0, 0x0) r2 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r2, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f00000003c0)='syz1\x00', 0x200002, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0xfffffffffffffffc) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000300)='./cgroup/syz0\x00', 0x200002, 0x0) gettid() socket$kcm(0x11, 0xb, 0x0) ioctl$TUNSETTXFILTER(r1, 0x400454d1, &(0x7f00000000c0)=ANY=[@ANYBLOB="00000700000000da6500bbc4bbbbbbbb0180c2000016000000004dc23f0c000000000000bb"]) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000040)=@ipx={0x4, 0x1, 0x0, "2bfaec665b4b", 0xff}, 0x80, 0x0}, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={0xffffffffffffffff, 0x1, 0x49c42ca22ab5a9ac, 0x4, 0x0}, 0x20) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x908b7aabaa7d2404) socket$kcm(0xa, 0x6, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x4000011) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000000c0), 0x0}, 0x28) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x89f1, &(0x7f0000000000)='ip6gre0\x00') perf_event_open(&(0x7f00000004c0)={0x0, 0x70, 0x8, 0x6, 0x0, 0x3, 0x0, 0x3, 0x4, 0x0, 0x9, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x1000, 0x0, @perf_config_ext={0x1ff}, 0x40004, 0xfffffffffffffffd, 0x0, 0x8, 0x8, 0x4, 0x80}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0x10, 0x0, 0x10) sendmsg$kcm(r4, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d200040080000048000001000080000000000300f88000f01700d4bd", 0x2e}], 0xf}, 0x40094) r5 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r6 = socket$kcm(0x2, 0x1, 0x2) socketpair(0x25, 0x6, 0x4, &(0x7f0000000480)) setsockopt$sock_attach_bpf(r6, 0x1, 0x3e, &(0x7f00000002c0)=r5, 0x4) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x6d, &(0x7f0000000cc0)=ANY=[@ANYRESHEX, @ANYBLOB="e99f619c950ec8069b69ac05520100000000000000572e83f4fd34a6db69715afdc8ec492fa879a8460bf2c7459f384ec36d6f0d833fccc87dc8f542ca0731ec72c3f6e0857c63572db61a83246496a2f90400569c8af42a5b8b1e3583115dfe3a40a792ffe638fd722afd02131c170175f382a8d78b6626d1d58220f08d98570bad00042a01c00748cf37385e7d66e6c0efddeb730ebd2f1ab4e816cf7493cf236ca5eb6e5d2a65519a7acf475dbd9fb52eb50ddcf9cee74529f59a2d6cfe6c23f6a688719f922099394146621132f866439970571e206ac47123f2d9cdb5cb7c8506122300000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000)={0x0, 0x8}, 0x10}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r7, 0x18000000000002a0, 0x42, 0x0, &(0x7f0000000800)="b9ff0300600d698cb89e14f088a81fffffff00004000630677fbac14140ee934a0a662079f4b4d2f87e5feca6aab845013f2325f1a39010108038da1924425181aa5", 0x0, 0x28000, 0x60000000, 0x113, 0x0, &(0x7f00000006c0)="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"}, 0x40) ioctl$sock_kcm_SIOCKCMATTACH(r4, 0x89e0, &(0x7f0000000500)) 06:08:21 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet_udp_int(r0, 0x11, 0x67, &(0x7f0000000140)=0x6, 0x4) sendmmsg(r0, &(0x7f0000006f00)=[{{&(0x7f0000000040)=@in={0x2, 0x4e23, @remote}, 0x80, &(0x7f0000000100)=[{&(0x7f00000000c0)="e04013b497936ecafdd12c496f522cc2830fd358bc8f890e410223906070a39cc6e2f84a8622c5f86cad52bba1560397737a6cce189d7db27e", 0x39}], 0x1}}, {{0x0, 0x0, &(0x7f0000000440)=[{&(0x7f0000000200)="9544939c01e602e8fc696947591d4c6fb3cb9a7cf9e53555dac91c09bbd33a6e85981e045d", 0x25}, {&(0x7f0000000240)="b995a5bf327c6f291a70af1527c6eb87af6b40c22e784c7d81102b1d2c4f5434d0142b1efa49361c7fa370cde02cbad1cdf556d5ebe84042e5b1eee75566d3c3bd4e54fb80c6258eb985131872c446ae99febe93703f66f4e0e10392c8a0d30f35710c7490190fef84833442ab74de59e4c9ebbc7cfe3f26750c16970d537ab353640e9e46e706cd200383135bfbf29b19c2fe729da592a9fb74eca37cb46775eb6db0118a3c59ac107fcf691822488d67f90e891045cb2ea35a79b6cd27c9fa5f37c9f6d6e4e2ca9267b2a8aa34f9727b0f539f", 0xd4}, {&(0x7f0000000340)="529cd4456bccdb80c030fe01e5cd61704126c8d4e7ec", 0x16}, {&(0x7f0000000380)="c2597979197f75ed6b82c8bcbf2c6b92a9a53fdd74646d60f9941ca27e", 0x1d}], 0x4}}], 0x2, 0x4c004) sendmmsg(r0, &(0x7f0000007fc0), 0x800001d, 0x0) 06:08:21 executing program 2: perf_event_open(&(0x7f00000012c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$misdntimer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/mISDNtimer\x00', 0x0, 0x0) openat$misdntimer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mISDNtimer\x00', 0x0, 0x0) dup2(0xffffffffffffffff, r0) r1 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r1, &(0x7f0000000140)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x4e23, @multicast2}}, 0x24) sendmmsg(r1, &(0x7f0000003e80)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000a00)=ANY=[@ANYBLOB="18000000000000001001000001"], 0x18}}], 0x1, 0x0) r2 = perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup2(r2, r1) 06:08:21 executing program 3: perf_event_open(&(0x7f00000012c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r0, &(0x7f0000000140)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x4e23, @multicast2}}, 0x24) sendmmsg(r0, &(0x7f0000003e80)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000a00)=ANY=[@ANYBLOB="18000000000000001001000001"], 0x18}}], 0x1, 0x0) r1 = perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup2(r1, r0) 06:08:21 executing program 3: ftruncate(0xffffffffffffffff, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f00000004c0)='./file0\x00', 0x0, 0x7a04, 0x0) chdir(&(0x7f0000000240)='./file0\x00') sendmsg$IPCTNL_MSG_CT_DELETE(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x1000000}, 0xc, 0x0}, 0x2404c8d4) r0 = openat(0xffffffffffffffff, &(0x7f0000000300)='./bus\x00', 0x0, 0xd8) r1 = socket$inet6(0xa, 0x400000000001, 0x0) socket$packet(0x11, 0x0, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000040)={0x1, 0x3}, 0x4) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) close(r1) r2 = open(&(0x7f0000000080)='./bus\x00', 0x105002, 0x0) ftruncate(r2, 0x200004) sendfile(r1, r2, 0x0, 0x80001d00c0d0) open(&(0x7f00000000c0)='./bus\x00', 0x416040000000000, 0x0) [ 204.923355][ T8579] IPVS: ftp: loaded support on port[0] = 21 06:08:21 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet_udp_int(r0, 0x11, 0x67, &(0x7f0000000140)=0x6, 0x4) sendmmsg(r0, &(0x7f0000006f00)=[{{&(0x7f0000000040)=@in={0x2, 0x4e23, @remote}, 0x80, &(0x7f0000000100)=[{&(0x7f00000000c0)="e04013b497936ecafdd12c496f522cc2830fd358bc8f890e410223906070a39cc6e2f84a8622c5f86cad52bba1560397737a6cce189d7db27e", 0x39}], 0x1}}, {{0x0, 0x0, &(0x7f0000000440)=[{&(0x7f0000000200)="9544939c01e602e8fc696947591d4c6fb3cb9a7cf9e53555dac91c09bbd33a6e85981e045d", 0x25}, {&(0x7f0000000240)="b995a5bf327c6f291a70af1527c6eb87af6b40c22e784c7d81102b1d2c4f5434d0142b1efa49361c7fa370cde02cbad1cdf556d5ebe84042e5b1eee75566d3c3bd4e54fb80c6258eb985131872c446ae99febe93703f66f4e0e10392c8a0d30f35710c7490190fef84833442ab74de59e4c9ebbc7cfe3f26750c16970d537ab353640e9e46e706cd200383135bfbf29b19c2fe729da592a9fb74eca37cb46775eb6db0118a3c59ac107fcf691822488d67f90e891045cb2ea35a79b6cd27c9fa5f37c9f6d6e4e2ca9267b2a8aa34f9727b0f539f", 0xd4}, {&(0x7f0000000340)="529cd4456bccdb80c030fe01e5cd61704126c8d4e7ec", 0x16}, {&(0x7f0000000380)="c2597979197f75ed6b82c8bcbf2c6b92a9a53fdd74646d60f9941ca27e", 0x1d}], 0x4}}], 0x2, 0x4c004) sendmmsg(r0, &(0x7f0000007fc0), 0x800001d, 0x0) 06:08:21 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f00000004c0)='./file0\x00', 0x0, 0x7a04, 0x0) chdir(&(0x7f0000000240)='./file0\x00') sendmsg$IPCTNL_MSG_CT_DELETE(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, 0x0}, 0x0) openat(0xffffffffffffffff, 0x0, 0x0, 0xd8) r0 = socket$inet6(0xa, 0x400000000001, 0x0) socket$packet(0x11, 0x0, 0x300) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000040), 0x4) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$RTC_PLL_SET(0xffffffffffffffff, 0x40207012, 0x0) close(r0) r1 = open(0x0, 0x105002, 0x0) ftruncate(r1, 0x200004) sendfile(r0, r1, 0x0, 0x80001d00c0d0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f00000000c0)='./bus\x00', 0x416040000000000, 0x0) 06:08:21 executing program 0: r0 = perf_event_open(&(0x7f0000000640)={0x3, 0x70, 0x3e7, 0x0, 0x4, 0x0, 0x0, 0x0, 0x91dd7106ca8fd33b, 0xdb3fedb3c3734f95, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x40000000000, 0x0, 0x1, 0x0, @perf_config_ext={0x18, 0x3}, 0x21, 0x10000000000000, 0x0, 0x0, 0x0, 0x20000007, 0x2}, 0x0, 0xc, 0xffffffffffffffff, 0xa) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='cpuacct.stat\x00', 0x0, 0x0) r2 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r2, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f00000003c0)='syz1\x00', 0x200002, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0xfffffffffffffffc) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000300)='./cgroup/syz0\x00', 0x200002, 0x0) gettid() socket$kcm(0x11, 0xb, 0x0) ioctl$TUNSETTXFILTER(r1, 0x400454d1, &(0x7f00000000c0)=ANY=[@ANYBLOB="00000700000000da6500bbc4bbbbbbbb0180c2000016000000004dc23f0c000000000000bb"]) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000040)=@ipx={0x4, 0x1, 0x0, "2bfaec665b4b", 0xff}, 0x80, 0x0}, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={0xffffffffffffffff, 0x1, 0x49c42ca22ab5a9ac, 0x4, 0x0}, 0x20) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x908b7aabaa7d2404) socket$kcm(0xa, 0x6, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x4000011) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000000c0), 0x0}, 0x28) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x89f1, &(0x7f0000000000)='ip6gre0\x00') perf_event_open(&(0x7f00000004c0)={0x0, 0x70, 0x8, 0x6, 0x0, 0x3, 0x0, 0x3, 0x4, 0x0, 0x9, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x1000, 0x0, @perf_config_ext={0x1ff}, 0x40004, 0xfffffffffffffffd, 0x0, 0x8, 0x8, 0x4, 0x80}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0x10, 0x0, 0x10) sendmsg$kcm(r4, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d200040080000048000001000080000000000300f88000f01700d4bd", 0x2e}], 0xf}, 0x40094) r5 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r6 = socket$kcm(0x2, 0x1, 0x2) socketpair(0x25, 0x6, 0x4, &(0x7f0000000480)) setsockopt$sock_attach_bpf(r6, 0x1, 0x3e, &(0x7f00000002c0)=r5, 0x4) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x6d, &(0x7f0000000cc0)=ANY=[@ANYRESHEX, @ANYBLOB="e99f619c950ec8069b69ac05520100000000000000572e83f4fd34a6db69715afdc8ec492fa879a8460bf2c7459f384ec36d6f0d833fccc87dc8f542ca0731ec72c3f6e0857c63572db61a83246496a2f90400569c8af42a5b8b1e3583115dfe3a40a792ffe638fd722afd02131c170175f382a8d78b6626d1d58220f08d98570bad00042a01c00748cf37385e7d66e6c0efddeb730ebd2f1ab4e816cf7493cf236ca5eb6e5d2a65519a7acf475dbd9fb52eb50ddcf9cee74529f59a2d6cfe6c23f6a688719f922099394146621132f866439970571e206ac47123f2d9cdb5cb7c8506122300000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000)={0x0, 0x8}, 0x10}, 0x78) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x17, 0x6, &(0x7f0000000c00)=ANY=[], &(0x7f00000002c0)='GPL\x00', 0x2, 0x0, 0x0, 0x40f00, 0x8, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000340)={0x1, 0x10000003}, 0x8, 0x10, &(0x7f0000000380)={0x0, 0xa, 0x83, 0x2}, 0x10}, 0x78) ioctl$sock_kcm_SIOCKCMATTACH(r4, 0x89e0, &(0x7f0000000500)={0xffffffffffffffff, r7}) [ 205.054727][ T8587] IPVS: ftp: loaded support on port[0] = 21 06:08:22 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000300)=ANY=[@ANYBLOB="0205000002"], 0x10}}, 0x0) 06:08:22 executing program 2: r0 = openat$sequencer(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TCSETS(r0, 0x4004510d, 0x0) write$P9_RXATTRWALK(r0, 0x0, 0x0) getpid() ioctl$DRM_IOCTL_MODE_CREATE_DUMB(0xffffffffffffffff, 0xc02064b2, &(0x7f0000000100)={0xfffffff8, 0x3, 0x0, 0x3}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x61c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$invalidate(0x15, 0x0) unshare(0x40000000) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='net/ip_mr_vif\x00') preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x19d, 0x0) sendto$inet(r1, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) setsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000180)={{{@in6=@empty, @in=@dev={0xac, 0x14, 0x14, 0x1d}, 0x4e22, 0x1}, {0x4000000ffff, 0x0, 0x0, 0x87bb, 0x9, 0xffff, 0x7, 0x800}, {0x0, 0x0, 0x0, 0x400}, 0x0, 0x6e6bb4, 0x1, 0x1, 0x2, 0x1}, {{@in6=@mcast2, 0x0, 0x33}, 0x0, @in6=@mcast2, 0x0, 0x0, 0x0, 0x20, 0x2, 0x2000000, 0x4000000}}, 0xe8) ioctl$DRM_IOCTL_GET_CLIENT(0xffffffffffffffff, 0xc0286405, 0x0) accept$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @multicast1}, &(0x7f0000000040)=0x10) r2 = openat$sequencer(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TCSETS(r2, 0x4004510d, 0x0) ioctl$DRM_IOCTL_RES_CTX(0xffffffffffffffff, 0xc0106426, 0x0) ioctl$DRM_IOCTL_UNLOCK(0xffffffffffffffff, 0x4008642b, &(0x7f0000000180)) ioctl$DRM_IOCTL_LOCK(0xffffffffffffffff, 0x4008642a, 0x0) ftruncate(r2, 0x0) [ 205.383356][ T8589] IPVS: ftp: loaded support on port[0] = 21 [ 205.618958][ T8654] IPVS: ftp: loaded support on port[0] = 21 06:08:22 executing program 4: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000000c0)=0xe) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r1, 0x40047438, &(0x7f0000000180)=""/246) ioctl$PPPIOCSFLAGS1(r1, 0x40047457, &(0x7f0000000000)) fdatasync(0xffffffffffffffff) ioctl$PPPIOCSMRRU(0xffffffffffffffff, 0x4004743b, 0x0) 06:08:22 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet_udp_int(r0, 0x11, 0x67, &(0x7f0000000140)=0x6, 0x4) sendmmsg(r0, &(0x7f0000007fc0), 0x800001d, 0x0) 06:08:22 executing program 3: r0 = openat$sequencer(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$P9_RXATTRWALK(r0, &(0x7f00000000c0)={0xf}, 0xf) getpid() unshare(0x40000000) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) sendto$inet(0xffffffffffffffff, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) setsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) ioctl$DRM_IOCTL_GET_CLIENT(0xffffffffffffffff, 0xc0286405, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x4004510d, 0x0) 06:08:22 executing program 0: r0 = perf_event_open(&(0x7f0000000640)={0x3, 0x70, 0x3e7, 0x0, 0x4, 0x0, 0x0, 0x0, 0x91dd7106ca8fd33b, 0xdb3fedb3c3734f95, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x40000000000, 0x0, 0x1, 0x0, @perf_config_ext={0x18, 0x3}, 0x21, 0x10000000000000, 0x0, 0x0, 0x0, 0x20000007, 0x2}, 0x0, 0xc, 0xffffffffffffffff, 0xa) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='cpuacct.stat\x00', 0x0, 0x0) r2 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r2, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f00000003c0)='syz1\x00', 0x200002, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0xfffffffffffffffc) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000300)='./cgroup/syz0\x00', 0x200002, 0x0) gettid() socket$kcm(0x11, 0xb, 0x0) ioctl$TUNSETTXFILTER(r1, 0x400454d1, &(0x7f00000000c0)=ANY=[@ANYBLOB="00000700000000da6500bbc4bbbbbbbb0180c2000016000000004dc23f0c000000000000bb"]) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000040)=@ipx={0x4, 0x1, 0x0, "2bfaec665b4b", 0xff}, 0x80, 0x0}, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={0xffffffffffffffff, 0x1, 0x49c42ca22ab5a9ac, 0x4, 0x0}, 0x20) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x908b7aabaa7d2404) socket$kcm(0xa, 0x6, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x4000011) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000000c0), 0x0}, 0x28) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x89f1, &(0x7f0000000000)='ip6gre0\x00') perf_event_open(&(0x7f00000004c0)={0x0, 0x70, 0x8, 0x6, 0x0, 0x3, 0x0, 0x3, 0x4, 0x0, 0x9, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x1000, 0x0, @perf_config_ext={0x1ff}, 0x40004, 0xfffffffffffffffd, 0x0, 0x8, 0x8, 0x4, 0x80}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0x10, 0x0, 0x10) sendmsg$kcm(r4, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d200040080000048000001000080000000000300f88000f01700d4bd", 0x2e}], 0xf}, 0x40094) r5 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r6 = socket$kcm(0x2, 0x1, 0x2) socketpair(0x25, 0x6, 0x4, &(0x7f0000000480)) setsockopt$sock_attach_bpf(r6, 0x1, 0x3e, &(0x7f00000002c0)=r5, 0x4) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x6d, &(0x7f0000000cc0)=ANY=[@ANYRESHEX, @ANYBLOB="e99f619c950ec8069b69ac05520100000000000000572e83f4fd34a6db69715afdc8ec492fa879a8460bf2c7459f384ec36d6f0d833fccc87dc8f542ca0731ec72c3f6e0857c63572db61a83246496a2f90400569c8af42a5b8b1e3583115dfe3a40a792ffe638fd722afd02131c170175f382a8d78b6626d1d58220f08d98570bad00042a01c00748cf37385e7d66e6c0efddeb730ebd2f1ab4e816cf7493cf236ca5eb6e5d2a65519a7acf475dbd9fb52eb50ddcf9cee74529f59a2d6cfe6c23f6a688719f922099394146621132f866439970571e206ac47123f2d9cdb5cb7c8506122300000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000)={0x0, 0x8}, 0x10}, 0x78) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x17, 0x6, &(0x7f0000000c00)=ANY=[], &(0x7f00000002c0)='GPL\x00', 0x2, 0x0, 0x0, 0x40f00, 0x8, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000340)={0x1, 0x10000003}, 0x8, 0x10, &(0x7f0000000380)={0x0, 0xa, 0x83, 0x2}, 0x10}, 0x78) ioctl$sock_kcm_SIOCKCMATTACH(r4, 0x89e0, &(0x7f0000000500)={0xffffffffffffffff, r7}) 06:08:22 executing program 5: perf_event_open(&(0x7f00000012c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$misdntimer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/mISDNtimer\x00', 0x0, 0x0) r1 = openat$misdntimer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mISDNtimer\x00', 0x0, 0x0) r2 = dup2(r1, r0) ioctl$IMADDTIMER(r2, 0x80044940, &(0x7f00000000c0)=0x14) [ 206.120883][ T8702] IPVS: ftp: loaded support on port[0] = 21 [ 206.128413][ T8663] IPVS: ftp: loaded support on port[0] = 21 06:08:23 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet_udp_int(r0, 0x11, 0x67, &(0x7f0000000140)=0x6, 0x4) sendmmsg(r0, &(0x7f0000007fc0), 0x800001d, 0x0) 06:08:23 executing program 5: syz_open_dev$binderN(&(0x7f0000000000)='/dev/binder#\x00', 0x0, 0x0) clone(0x41be, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() r1 = getpid() r2 = gettid() tkill(r2, 0x1000000000016) ptrace(0x10, r1) ptrace$setregs(0xe, r0, 0x0, &(0x7f0000000000)) [ 206.175675][ T8709] IPVS: ftp: loaded support on port[0] = 21 06:08:23 executing program 0: r0 = perf_event_open(&(0x7f0000000640)={0x3, 0x70, 0x3e7, 0x0, 0x4, 0x0, 0x0, 0x0, 0x91dd7106ca8fd33b, 0xdb3fedb3c3734f95, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x40000000000, 0x0, 0x1, 0x0, @perf_config_ext={0x18, 0x3}, 0x21, 0x10000000000000, 0x0, 0x0, 0x0, 0x20000007, 0x2}, 0x0, 0xc, 0xffffffffffffffff, 0xa) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='cpuacct.stat\x00', 0x0, 0x0) r2 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r2, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f00000003c0)='syz1\x00', 0x200002, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0xfffffffffffffffc) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000300)='./cgroup/syz0\x00', 0x200002, 0x0) gettid() socket$kcm(0x11, 0xb, 0x0) ioctl$TUNSETTXFILTER(r1, 0x400454d1, &(0x7f00000000c0)=ANY=[@ANYBLOB="00000700000000da6500bbc4bbbbbbbb0180c2000016000000004dc23f0c000000000000bb"]) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000040)=@ipx={0x4, 0x1, 0x0, "2bfaec665b4b", 0xff}, 0x80, 0x0}, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={0xffffffffffffffff, 0x1, 0x49c42ca22ab5a9ac, 0x4, 0x0}, 0x20) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x908b7aabaa7d2404) socket$kcm(0xa, 0x6, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x4000011) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000000c0), 0x0}, 0x28) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x89f1, &(0x7f0000000000)='ip6gre0\x00') perf_event_open(&(0x7f00000004c0)={0x0, 0x70, 0x8, 0x6, 0x0, 0x3, 0x0, 0x3, 0x4, 0x0, 0x9, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x1000, 0x0, @perf_config_ext={0x1ff}, 0x40004, 0xfffffffffffffffd, 0x0, 0x8, 0x8, 0x4, 0x80}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0x10, 0x0, 0x10) sendmsg$kcm(r4, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d200040080000048000001000080000000000300f88000f01700d4bd", 0x2e}], 0xf}, 0x40094) r5 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r6 = socket$kcm(0x2, 0x1, 0x2) socketpair(0x25, 0x6, 0x4, &(0x7f0000000480)) setsockopt$sock_attach_bpf(r6, 0x1, 0x3e, &(0x7f00000002c0)=r5, 0x4) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x6d, &(0x7f0000000cc0)=ANY=[@ANYRESHEX, @ANYBLOB="e99f619c950ec8069b69ac05520100000000000000572e83f4fd34a6db69715afdc8ec492fa879a8460bf2c7459f384ec36d6f0d833fccc87dc8f542ca0731ec72c3f6e0857c63572db61a83246496a2f90400569c8af42a5b8b1e3583115dfe3a40a792ffe638fd722afd02131c170175f382a8d78b6626d1d58220f08d98570bad00042a01c00748cf37385e7d66e6c0efddeb730ebd2f1ab4e816cf7493cf236ca5eb6e5d2a65519a7acf475dbd9fb52eb50ddcf9cee74529f59a2d6cfe6c23f6a688719f922099394146621132f866439970571e206ac47123f2d9cdb5cb7c8506122300000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000)={0x0, 0x8}, 0x10}, 0x78) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x17, 0x6, &(0x7f0000000c00)=ANY=[], &(0x7f00000002c0)='GPL\x00', 0x2, 0x0, 0x0, 0x40f00, 0x8, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000340)={0x1, 0x10000003}, 0x8, 0x10, &(0x7f0000000380)={0x0, 0xa, 0x83, 0x2}, 0x10}, 0x78) ioctl$sock_kcm_SIOCKCMATTACH(r4, 0x89e0, &(0x7f0000000500)={0xffffffffffffffff, r7}) 06:08:23 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet_udp_int(r0, 0x11, 0x67, &(0x7f0000000140)=0x6, 0x4) sendmmsg(r0, &(0x7f0000007fc0), 0x800001d, 0x0) [ 206.469797][ T8707] IPVS: ftp: loaded support on port[0] = 21 06:08:23 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmmsg(r0, &(0x7f0000006f00)=[{{&(0x7f0000000040)=@in={0x2, 0x4e23, @remote}, 0x80, &(0x7f0000000100)=[{&(0x7f00000000c0)="e04013b497936ecafdd12c496f522cc2830fd358bc8f890e410223906070a39cc6e2f84a8622c5f86cad52bba1560397737a6cce189d7db27e", 0x39}], 0x1}}, {{0x0, 0x0, &(0x7f0000000440)=[{&(0x7f0000000200)="9544939c01e602e8fc696947591d4c6fb3cb9a7cf9e53555dac91c09bbd33a6e85981e045d", 0x25}, {&(0x7f0000000240)="b995a5bf327c6f291a70af1527c6eb87af6b40c22e784c7d81102b1d2c4f5434d0142b1efa49361c7fa370cde02cbad1cdf556d5ebe84042e5b1eee75566d3c3bd4e54fb80c6258eb985131872c446ae99febe93703f66f4e0e10392c8a0d30f35710c7490190fef84833442ab74de59e4c9ebbc7cfe3f26750c16970d537ab353640e9e46e706cd200383135bfbf29b19c2fe729da592a9fb74eca37cb46775eb6db0118a3c59ac107fcf691822488d67f90e891045cb2ea35a79b6cd27c9fa5f37c9f6d6e4e2ca9267b2a8aa34f9727b0f539f", 0xd4}, {&(0x7f0000000340)="529cd4456bccdb80c030fe01e5cd61704126c8d4e7ec", 0x16}, {&(0x7f0000000380)="c2597979197f75ed6b82c8bcbf2c6b92a9a53fdd74646d60f9941ca27e", 0x1d}], 0x4}}], 0x2, 0x4c004) sendmmsg(r0, &(0x7f0000007fc0), 0x800001d, 0x0) 06:08:23 executing program 0: r0 = perf_event_open(&(0x7f0000000640)={0x3, 0x70, 0x3e7, 0x0, 0x4, 0x0, 0x0, 0x0, 0x91dd7106ca8fd33b, 0xdb3fedb3c3734f95, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x40000000000, 0x0, 0x1, 0x0, @perf_config_ext={0x18, 0x3}, 0x21, 0x10000000000000, 0x0, 0x0, 0x0, 0x20000007, 0x2}, 0x0, 0xc, 0xffffffffffffffff, 0xa) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='cpuacct.stat\x00', 0x0, 0x0) r2 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r2, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f00000003c0)='syz1\x00', 0x200002, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0xfffffffffffffffc) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000300)='./cgroup/syz0\x00', 0x200002, 0x0) gettid() socket$kcm(0x11, 0xb, 0x0) ioctl$TUNSETTXFILTER(r1, 0x400454d1, &(0x7f00000000c0)=ANY=[@ANYBLOB="00000700000000da6500bbc4bbbbbbbb0180c2000016000000004dc23f0c000000000000bb"]) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000040)=@ipx={0x4, 0x1, 0x0, "2bfaec665b4b", 0xff}, 0x80, 0x0}, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={0xffffffffffffffff, 0x1, 0x49c42ca22ab5a9ac, 0x4, 0x0}, 0x20) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x908b7aabaa7d2404) socket$kcm(0xa, 0x6, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x4000011) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000000c0), 0x0}, 0x28) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x89f1, &(0x7f0000000000)='ip6gre0\x00') perf_event_open(&(0x7f00000004c0)={0x0, 0x70, 0x8, 0x6, 0x0, 0x3, 0x0, 0x3, 0x4, 0x0, 0x9, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x1000, 0x0, @perf_config_ext={0x1ff}, 0x40004, 0xfffffffffffffffd, 0x0, 0x8, 0x8, 0x4, 0x80}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0x10, 0x0, 0x10) sendmsg$kcm(r4, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d200040080000048000001000080000000000300f88000f01700d4bd", 0x2e}], 0xf}, 0x40094) r5 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r6 = socket$kcm(0x2, 0x1, 0x2) socketpair(0x25, 0x6, 0x4, &(0x7f0000000480)) setsockopt$sock_attach_bpf(r6, 0x1, 0x3e, &(0x7f00000002c0)=r5, 0x4) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={0xffffffffffffffff, 0x18000000000002a0, 0x42, 0x0, &(0x7f0000000800)="b9ff0300600d698cb89e14f088a81fffffff00004000630677fbac14140ee934a0a662079f4b4d2f87e5feca6aab845013f2325f1a39010108038da1924425181aa5", 0x0, 0x28000, 0x60000000, 0x113, 0x0, &(0x7f00000006c0)="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"}, 0x40) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x17, 0x6, &(0x7f0000000c00)=ANY=[], &(0x7f00000002c0)='GPL\x00', 0x2, 0x0, 0x0, 0x40f00, 0x8, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000340)={0x1, 0x10000003}, 0x8, 0x10, &(0x7f0000000380)={0x0, 0xa, 0x83, 0x2}, 0x10}, 0x78) ioctl$sock_kcm_SIOCKCMATTACH(r4, 0x89e0, &(0x7f0000000500)={0xffffffffffffffff, r7}) [ 208.904258][ T46] tipc: TX() has been purged, node left! [ 209.065725][ T46] tipc: TX() has been purged, node left! [ 209.254302][ T46] tipc: TX() has been purged, node left! [ 209.444263][ T46] tipc: TX() has been purged, node left! [ 209.604256][ T46] tipc: TX() has been purged, node left! [ 209.794210][ T46] tipc: TX() has been purged, node left! [ 209.994205][ T46] tipc: TX() has been purged, node left! [ 210.154173][ T46] tipc: TX() has been purged, node left! 06:08:27 executing program 2: r0 = openat$sequencer(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TCSETS(r0, 0x4004510d, 0x0) write$P9_RXATTRWALK(r0, 0x0, 0x0) getpid() ioctl$DRM_IOCTL_MODE_CREATE_DUMB(0xffffffffffffffff, 0xc02064b2, &(0x7f0000000100)={0xfffffff8, 0x3, 0x0, 0x3}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x61c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$invalidate(0x15, 0x0) unshare(0x40000000) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='net/ip_mr_vif\x00') preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x19d, 0x0) sendto$inet(r1, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) setsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000180)={{{@in6=@empty, @in=@dev={0xac, 0x14, 0x14, 0x1d}, 0x4e22, 0x1}, {0x4000000ffff, 0x0, 0x0, 0x87bb, 0x9, 0xffff, 0x7, 0x800}, {0x0, 0x0, 0x0, 0x400}, 0x0, 0x6e6bb4, 0x1, 0x1, 0x2, 0x1}, {{@in6=@mcast2, 0x0, 0x33}, 0x0, @in6=@mcast2, 0x0, 0x0, 0x0, 0x20, 0x2, 0x2000000, 0x4000000}}, 0xe8) ioctl$DRM_IOCTL_GET_CLIENT(0xffffffffffffffff, 0xc0286405, 0x0) accept$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @multicast1}, &(0x7f0000000040)=0x10) r2 = openat$sequencer(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TCSETS(r2, 0x4004510d, 0x0) ioctl$DRM_IOCTL_RES_CTX(0xffffffffffffffff, 0xc0106426, 0x0) ioctl$DRM_IOCTL_UNLOCK(0xffffffffffffffff, 0x4008642b, &(0x7f0000000180)) ioctl$DRM_IOCTL_LOCK(0xffffffffffffffff, 0x4008642a, 0x0) ftruncate(r2, 0x0) 06:08:27 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmmsg(r0, &(0x7f0000006f00)=[{{&(0x7f0000000040)=@in={0x2, 0x4e23, @remote}, 0x80, &(0x7f0000000100)=[{&(0x7f00000000c0)="e04013b497936ecafdd12c496f522cc2830fd358bc8f890e410223906070a39cc6e2f84a8622c5f86cad52bba1560397737a6cce189d7db27e", 0x39}], 0x1}}, {{0x0, 0x0, &(0x7f0000000440)=[{&(0x7f0000000200)="9544939c01e602e8fc696947591d4c6fb3cb9a7cf9e53555dac91c09bbd33a6e85981e045d", 0x25}, {&(0x7f0000000240)="b995a5bf327c6f291a70af1527c6eb87af6b40c22e784c7d81102b1d2c4f5434d0142b1efa49361c7fa370cde02cbad1cdf556d5ebe84042e5b1eee75566d3c3bd4e54fb80c6258eb985131872c446ae99febe93703f66f4e0e10392c8a0d30f35710c7490190fef84833442ab74de59e4c9ebbc7cfe3f26750c16970d537ab353640e9e46e706cd200383135bfbf29b19c2fe729da592a9fb74eca37cb46775eb6db0118a3c59ac107fcf691822488d67f90e891045cb2ea35a79b6cd27c9fa5f37c9f6d6e4e2ca9267b2a8aa34f9727b0f539f", 0xd4}, {&(0x7f0000000340)="529cd4456bccdb80c030fe01e5cd61704126c8d4e7ec", 0x16}, {&(0x7f0000000380)="c2597979197f75ed6b82c8bcbf2c6b92a9a53fdd74646d60f9941ca27e", 0x1d}], 0x4}}], 0x2, 0x4c004) sendmmsg(r0, &(0x7f0000007fc0), 0x800001d, 0x0) 06:08:27 executing program 4: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000000c0)=0xe) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r1, 0x40047438, &(0x7f0000000180)=""/246) ioctl$PPPIOCSFLAGS1(r1, 0x40047457, &(0x7f0000000000)) fdatasync(0xffffffffffffffff) ioctl$PPPIOCSMRRU(0xffffffffffffffff, 0x4004743b, 0x0) [ 210.301074][ T8856] IPVS: ftp: loaded support on port[0] = 21 [ 210.324359][ T46] tipc: TX() has been purged, node left! [ 210.458974][ T8866] IPVS: ftp: loaded support on port[0] = 21 06:08:27 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000002c0)={0x50, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_TYPENAME={0x16, 0x3, 'hash:net,port,net\x00'}]}, 0x50}}, 0x0) 06:08:27 executing program 0: r0 = perf_event_open(&(0x7f0000000640)={0x3, 0x70, 0x3e7, 0x0, 0x4, 0x0, 0x0, 0x0, 0x91dd7106ca8fd33b, 0xdb3fedb3c3734f95, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x40000000000, 0x0, 0x1, 0x0, @perf_config_ext={0x18, 0x3}, 0x21, 0x10000000000000, 0x0, 0x0, 0x0, 0x20000007, 0x2}, 0x0, 0xc, 0xffffffffffffffff, 0xa) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='cpuacct.stat\x00', 0x0, 0x0) r2 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r2, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f00000003c0)='syz1\x00', 0x200002, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0xfffffffffffffffc) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000300)='./cgroup/syz0\x00', 0x200002, 0x0) gettid() socket$kcm(0x11, 0xb, 0x0) ioctl$TUNSETTXFILTER(r1, 0x400454d1, &(0x7f00000000c0)=ANY=[@ANYBLOB="00000700000000da6500bbc4bbbbbbbb0180c2000016000000004dc23f0c000000000000bb"]) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000040)=@ipx={0x4, 0x1, 0x0, "2bfaec665b4b", 0xff}, 0x80, 0x0}, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={0xffffffffffffffff, 0x1, 0x49c42ca22ab5a9ac, 0x4, 0x0}, 0x20) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x908b7aabaa7d2404) socket$kcm(0xa, 0x6, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x4000011) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000000c0), 0x0}, 0x28) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x89f1, &(0x7f0000000000)='ip6gre0\x00') perf_event_open(&(0x7f00000004c0)={0x0, 0x70, 0x8, 0x6, 0x0, 0x3, 0x0, 0x3, 0x4, 0x0, 0x9, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x1000, 0x0, @perf_config_ext={0x1ff}, 0x40004, 0xfffffffffffffffd, 0x0, 0x8, 0x8, 0x4, 0x80}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0x10, 0x0, 0x10) sendmsg$kcm(r4, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d200040080000048000001000080000000000300f88000f01700d4bd", 0x2e}], 0xf}, 0x40094) r5 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r6 = socket$kcm(0x2, 0x1, 0x2) socketpair(0x25, 0x6, 0x4, &(0x7f0000000480)) setsockopt$sock_attach_bpf(r6, 0x1, 0x3e, &(0x7f00000002c0)=r5, 0x4) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={0xffffffffffffffff, 0x18000000000002a0, 0x42, 0x0, &(0x7f0000000800)="b9ff0300600d698cb89e14f088a81fffffff00004000630677fbac14140ee934a0a662079f4b4d2f87e5feca6aab845013f2325f1a39010108038da1924425181aa5", 0x0, 0x28000, 0x60000000, 0x113, 0x0, &(0x7f00000006c0)="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"}, 0x40) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x17, 0x6, &(0x7f0000000c00)=ANY=[], &(0x7f00000002c0)='GPL\x00', 0x2, 0x0, 0x0, 0x40f00, 0x8, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000340)={0x1, 0x10000003}, 0x8, 0x10, &(0x7f0000000380)={0x0, 0xa, 0x83, 0x2}, 0x10}, 0x78) ioctl$sock_kcm_SIOCKCMATTACH(r4, 0x89e0, &(0x7f0000000500)={0xffffffffffffffff, r7}) 06:08:27 executing program 5: clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x16, &(0x7f00000000c0)) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace(0x10, r0) ptrace$peeksig(0x11, r0, 0x0, 0x0) 06:08:27 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmmsg(r0, &(0x7f0000006f00)=[{{&(0x7f0000000040)=@in={0x2, 0x4e23, @remote}, 0x80, &(0x7f0000000100)=[{&(0x7f00000000c0)="e04013b497936ecafdd12c496f522cc2830fd358bc8f890e410223906070a39cc6e2f84a8622c5f86cad52bba1560397737a6cce189d7db27e", 0x39}], 0x1}}, {{0x0, 0x0, &(0x7f0000000440)=[{&(0x7f0000000200)="9544939c01e602e8fc696947591d4c6fb3cb9a7cf9e53555dac91c09bbd33a6e85981e045d", 0x25}, {&(0x7f0000000240)="b995a5bf327c6f291a70af1527c6eb87af6b40c22e784c7d81102b1d2c4f5434d0142b1efa49361c7fa370cde02cbad1cdf556d5ebe84042e5b1eee75566d3c3bd4e54fb80c6258eb985131872c446ae99febe93703f66f4e0e10392c8a0d30f35710c7490190fef84833442ab74de59e4c9ebbc7cfe3f26750c16970d537ab353640e9e46e706cd200383135bfbf29b19c2fe729da592a9fb74eca37cb46775eb6db0118a3c59ac107fcf691822488d67f90e891045cb2ea35a79b6cd27c9fa5f37c9f6d6e4e2ca9267b2a8aa34f9727b0f539f", 0xd4}, {&(0x7f0000000340)="529cd4456bccdb80c030fe01e5cd61704126c8d4e7ec", 0x16}, {&(0x7f0000000380)="c2597979197f75ed6b82c8bcbf2c6b92a9a53fdd74646d60f9941ca27e", 0x1d}], 0x4}}], 0x2, 0x4c004) sendmmsg(r0, &(0x7f0000007fc0), 0x800001d, 0x0) 06:08:27 executing program 4: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000000c0)=0xe) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r1, 0x40047438, &(0x7f0000000180)=""/246) ioctl$PPPIOCSFLAGS1(r1, 0x40047457, &(0x7f0000000000)) fdatasync(0xffffffffffffffff) 06:08:27 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000002c0)={0x50, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_TYPENAME={0x16, 0x3, 'hash:net,port,net\x00'}]}, 0x50}}, 0x0) 06:08:27 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f00000004c0)='./file0\x00', 0x0, 0x7a04, 0x0) chdir(&(0x7f0000000240)='./file0\x00') sendmsg$IPCTNL_MSG_CT_DELETE(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, 0x0}, 0x0) openat(0xffffffffffffffff, 0x0, 0x0, 0xd8) r0 = socket$inet6(0xa, 0x400000000001, 0x0) socket$packet(0x11, 0x0, 0x300) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x3}, 0x4) ioctl$RTC_PLL_SET(0xffffffffffffffff, 0x40207012, &(0x7f0000000140)={0x0, 0x0, 0x4, 0x0, 0x4, 0x5}) close(r0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x105002, 0x0) ftruncate(r1, 0x200004) sendfile(r0, r1, 0x0, 0x80001d00c0d0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f00000000c0)='./bus\x00', 0x416040000000000, 0x0) 06:08:27 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) dup(r1) setsockopt$inet_udp_int(r0, 0x11, 0x67, &(0x7f0000000140)=0x6, 0x4) sendmmsg(r0, &(0x7f0000006f00)=[{{&(0x7f0000000040)=@in={0x2, 0x4e23, @remote}, 0x80, &(0x7f0000000100)=[{&(0x7f00000000c0)="e04013b497936ecafdd12c496f522cc2830fd358bc8f890e410223906070a39cc6e2f84a8622c5f86cad52bba1560397737a6cce189d7db27e", 0x39}], 0x1}}, {{0x0, 0x0, &(0x7f0000000440)=[{&(0x7f0000000200)="9544939c01e602e8fc696947591d4c6fb3cb9a7cf9e53555dac91c09bbd33a6e85981e045d", 0x25}, {&(0x7f0000000240)="b995a5bf327c6f291a70af1527c6eb87af6b40c22e784c7d81102b1d2c4f5434d0142b1efa49361c7fa370cde02cbad1cdf556d5ebe84042e5b1eee75566d3c3bd4e54fb80c6258eb985131872c446ae99febe93703f66f4e0e10392c8a0d30f35710c7490190fef84833442ab74de59e4c9ebbc7cfe3f26750c16970d537ab353640e9e46e706cd200383135bfbf29b19c2fe729da592a9fb74eca37cb46775eb6db0118a3c59ac107fcf691822488d67f90e891045cb2ea35a79b6cd27c9fa5f37c9f6d6e4e2ca9267b2a8aa34f9727b0f539f", 0xd4}, {&(0x7f0000000340)="529cd4456bccdb80c030fe01e5cd61704126c8d4e7ec", 0x16}, {&(0x7f0000000380)="c2597979197f75ed6b82c8bcbf2c6b92a9a53fdd74646d60f9941ca27e", 0x1d}], 0x4}}], 0x2, 0x4c004) sendmmsg(r0, &(0x7f0000007fc0), 0x800001d, 0x0) 06:08:27 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) fsopen(&(0x7f0000000200)='squashfs\x00', 0x0) 06:08:28 executing program 2: [ 211.204569][ T8923] IPVS: ftp: loaded support on port[0] = 21 06:08:28 executing program 0: r0 = perf_event_open(&(0x7f0000000640)={0x3, 0x70, 0x3e7, 0x0, 0x4, 0x0, 0x0, 0x0, 0x91dd7106ca8fd33b, 0xdb3fedb3c3734f95, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x40000000000, 0x0, 0x1, 0x0, @perf_config_ext={0x18, 0x3}, 0x21, 0x10000000000000, 0x0, 0x0, 0x0, 0x20000007, 0x2}, 0x0, 0xc, 0xffffffffffffffff, 0xa) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='cpuacct.stat\x00', 0x0, 0x0) r2 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r2, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f00000003c0)='syz1\x00', 0x200002, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0xfffffffffffffffc) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000300)='./cgroup/syz0\x00', 0x200002, 0x0) gettid() socket$kcm(0x11, 0xb, 0x0) ioctl$TUNSETTXFILTER(r1, 0x400454d1, &(0x7f00000000c0)=ANY=[@ANYBLOB="00000700000000da6500bbc4bbbbbbbb0180c2000016000000004dc23f0c000000000000bb"]) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000040)=@ipx={0x4, 0x1, 0x0, "2bfaec665b4b", 0xff}, 0x80, 0x0}, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={0xffffffffffffffff, 0x1, 0x49c42ca22ab5a9ac, 0x4, 0x0}, 0x20) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x908b7aabaa7d2404) socket$kcm(0xa, 0x6, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x4000011) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000000c0), 0x0}, 0x28) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x89f1, &(0x7f0000000000)='ip6gre0\x00') perf_event_open(&(0x7f00000004c0)={0x0, 0x70, 0x8, 0x6, 0x0, 0x3, 0x0, 0x3, 0x4, 0x0, 0x9, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x1000, 0x0, @perf_config_ext={0x1ff}, 0x40004, 0xfffffffffffffffd, 0x0, 0x8, 0x8, 0x4, 0x80}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0x10, 0x0, 0x10) sendmsg$kcm(r4, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d200040080000048000001000080000000000300f88000f01700d4bd", 0x2e}], 0xf}, 0x40094) r5 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r6 = socket$kcm(0x2, 0x1, 0x2) socketpair(0x25, 0x6, 0x4, &(0x7f0000000480)) setsockopt$sock_attach_bpf(r6, 0x1, 0x3e, &(0x7f00000002c0)=r5, 0x4) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={0xffffffffffffffff, 0x18000000000002a0, 0x42, 0x0, &(0x7f0000000800)="b9ff0300600d698cb89e14f088a81fffffff00004000630677fbac14140ee934a0a662079f4b4d2f87e5feca6aab845013f2325f1a39010108038da1924425181aa5", 0x0, 0x28000, 0x60000000, 0x113, 0x0, &(0x7f00000006c0)="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"}, 0x40) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x17, 0x6, &(0x7f0000000c00)=ANY=[], &(0x7f00000002c0)='GPL\x00', 0x2, 0x0, 0x0, 0x40f00, 0x8, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000340)={0x1, 0x10000003}, 0x8, 0x10, &(0x7f0000000380)={0x0, 0xa, 0x83, 0x2}, 0x10}, 0x78) ioctl$sock_kcm_SIOCKCMATTACH(r4, 0x89e0, &(0x7f0000000500)={0xffffffffffffffff, r7}) 06:08:28 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) dup(r1) setsockopt$inet_udp_int(r0, 0x11, 0x67, &(0x7f0000000140)=0x6, 0x4) sendmmsg(r0, &(0x7f0000006f00)=[{{&(0x7f0000000040)=@in={0x2, 0x4e23, @remote}, 0x80, &(0x7f0000000100)=[{&(0x7f00000000c0)="e04013b497936ecafdd12c496f522cc2830fd358bc8f890e410223906070a39cc6e2f84a8622c5f86cad52bba1560397737a6cce189d7db27e", 0x39}], 0x1}}, {{0x0, 0x0, &(0x7f0000000440)=[{&(0x7f0000000200)="9544939c01e602e8fc696947591d4c6fb3cb9a7cf9e53555dac91c09bbd33a6e85981e045d", 0x25}, {&(0x7f0000000240)="b995a5bf327c6f291a70af1527c6eb87af6b40c22e784c7d81102b1d2c4f5434d0142b1efa49361c7fa370cde02cbad1cdf556d5ebe84042e5b1eee75566d3c3bd4e54fb80c6258eb985131872c446ae99febe93703f66f4e0e10392c8a0d30f35710c7490190fef84833442ab74de59e4c9ebbc7cfe3f26750c16970d537ab353640e9e46e706cd200383135bfbf29b19c2fe729da592a9fb74eca37cb46775eb6db0118a3c59ac107fcf691822488d67f90e891045cb2ea35a79b6cd27c9fa5f37c9f6d6e4e2ca9267b2a8aa34f9727b0f539f", 0xd4}, {&(0x7f0000000340)="529cd4456bccdb80c030fe01e5cd61704126c8d4e7ec", 0x16}, {&(0x7f0000000380)="c2597979197f75ed6b82c8bcbf2c6b92a9a53fdd74646d60f9941ca27e", 0x1d}], 0x4}}], 0x2, 0x4c004) sendmmsg(r0, &(0x7f0000007fc0), 0x800001d, 0x0) 06:08:28 executing program 5: 06:08:28 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) fsopen(&(0x7f0000000200)='squashfs\x00', 0x0) 06:08:28 executing program 2: 06:08:28 executing program 5: 06:08:28 executing program 4: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000000c0)=0xe) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r1, 0x40047438, &(0x7f0000000180)=""/246) ioctl$PPPIOCSFLAGS1(r1, 0x40047457, &(0x7f0000000000)) 06:08:28 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) dup(r1) setsockopt$inet_udp_int(r0, 0x11, 0x67, &(0x7f0000000140)=0x6, 0x4) sendmmsg(r0, &(0x7f0000006f00)=[{{&(0x7f0000000040)=@in={0x2, 0x4e23, @remote}, 0x80, &(0x7f0000000100)=[{&(0x7f00000000c0)="e04013b497936ecafdd12c496f522cc2830fd358bc8f890e410223906070a39cc6e2f84a8622c5f86cad52bba1560397737a6cce189d7db27e", 0x39}], 0x1}}, {{0x0, 0x0, &(0x7f0000000440)=[{&(0x7f0000000200)="9544939c01e602e8fc696947591d4c6fb3cb9a7cf9e53555dac91c09bbd33a6e85981e045d", 0x25}, {&(0x7f0000000240)="b995a5bf327c6f291a70af1527c6eb87af6b40c22e784c7d81102b1d2c4f5434d0142b1efa49361c7fa370cde02cbad1cdf556d5ebe84042e5b1eee75566d3c3bd4e54fb80c6258eb985131872c446ae99febe93703f66f4e0e10392c8a0d30f35710c7490190fef84833442ab74de59e4c9ebbc7cfe3f26750c16970d537ab353640e9e46e706cd200383135bfbf29b19c2fe729da592a9fb74eca37cb46775eb6db0118a3c59ac107fcf691822488d67f90e891045cb2ea35a79b6cd27c9fa5f37c9f6d6e4e2ca9267b2a8aa34f9727b0f539f", 0xd4}, {&(0x7f0000000340)="529cd4456bccdb80c030fe01e5cd61704126c8d4e7ec", 0x16}, {&(0x7f0000000380)="c2597979197f75ed6b82c8bcbf2c6b92a9a53fdd74646d60f9941ca27e", 0x1d}], 0x4}}], 0x2, 0x4c004) sendmmsg(r0, &(0x7f0000007fc0), 0x800001d, 0x0) 06:08:28 executing program 2: 06:08:28 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) fsopen(&(0x7f0000000200)='squashfs\x00', 0x0) 06:08:28 executing program 0: r0 = perf_event_open(&(0x7f0000000640)={0x3, 0x70, 0x3e7, 0x0, 0x4, 0x0, 0x0, 0x0, 0x91dd7106ca8fd33b, 0xdb3fedb3c3734f95, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x40000000000, 0x0, 0x1, 0x0, @perf_config_ext={0x18, 0x3}, 0x21, 0x10000000000000, 0x0, 0x0, 0x0, 0x20000007, 0x2}, 0x0, 0xc, 0xffffffffffffffff, 0xa) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='cpuacct.stat\x00', 0x0, 0x0) r2 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r2, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f00000003c0)='syz1\x00', 0x200002, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0xfffffffffffffffc) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000300)='./cgroup/syz0\x00', 0x200002, 0x0) gettid() socket$kcm(0x11, 0xb, 0x0) ioctl$TUNSETTXFILTER(r1, 0x400454d1, &(0x7f00000000c0)=ANY=[@ANYBLOB="00000700000000da6500bbc4bbbbbbbb0180c2000016000000004dc23f0c000000000000bb"]) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000040)=@ipx={0x4, 0x1, 0x0, "2bfaec665b4b", 0xff}, 0x80, 0x0}, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={0xffffffffffffffff, 0x1, 0x49c42ca22ab5a9ac, 0x4, 0x0}, 0x20) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x908b7aabaa7d2404) socket$kcm(0xa, 0x6, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x4000011) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000000c0), 0x0}, 0x28) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x89f1, &(0x7f0000000000)='ip6gre0\x00') perf_event_open(&(0x7f00000004c0)={0x0, 0x70, 0x8, 0x6, 0x0, 0x3, 0x0, 0x3, 0x4, 0x0, 0x9, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x1000, 0x0, @perf_config_ext={0x1ff}, 0x40004, 0xfffffffffffffffd, 0x0, 0x8, 0x8, 0x4, 0x80}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0x10, 0x0, 0x10) sendmsg$kcm(r4, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d200040080000048000001000080000000000300f88000f01700d4bd", 0x2e}], 0xf}, 0x40094) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) socket$kcm(0x2, 0x1, 0x2) socketpair(0x25, 0x6, 0x4, &(0x7f0000000480)) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x6d, &(0x7f0000000cc0)=ANY=[@ANYRESHEX, @ANYBLOB="e99f619c950ec8069b69ac05520100000000000000572e83f4fd34a6db69715afdc8ec492fa879a8460bf2c7459f384ec36d6f0d833fccc87dc8f542ca0731ec72c3f6e0857c63572db61a83246496a2f90400569c8af42a5b8b1e3583115dfe3a40a792ffe638fd722afd02131c170175f382a8d78b6626d1d58220f08d98570bad00042a01c00748cf37385e7d66e6c0efddeb730ebd2f1ab4e816cf7493cf236ca5eb6e5d2a65519a7acf475dbd9fb52eb50ddcf9cee74529f59a2d6cfe6c23f6a688719f922099394146621132f866439970571e206ac47123f2d9cdb5cb7c8506122300000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000)={0x0, 0x8}, 0x10}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r5, 0x18000000000002a0, 0x42, 0x0, &(0x7f0000000800)="b9ff0300600d698cb89e14f088a81fffffff00004000630677fbac14140ee934a0a662079f4b4d2f87e5feca6aab845013f2325f1a39010108038da1924425181aa5", 0x0, 0x28000, 0x60000000, 0x113, 0x0, &(0x7f00000006c0)="097baacf569909ebb78a19b4d4f607feb3072ad9474026c7c148d184a2647de87a8fd14ad5d15cadabd6c7545b05000000ad90e0d4000000000f3f750d2a75f6fa77d3fa4e023987f7a54b04eb238604aa90cab7b44f95ae6ce9b5f877439af64cb6573e5bc85c5e766604ff55b7a234246bd2ee44c9e99d69190bbe089603846d17b8678d05a0bda6ae300ca8c43271b65bb62b0af61bf4da3891f5bcf900ed368b36e2db9957b0dfa5cf084db8cb2b2c54661f9eac8a58a72fc9e768405eb33bce450dd088d2e16d757eeb1239a2389330535afb4944b7b27c4b26d812ab58864f3ffa3ce8cf739275492a0c90b425a792a19b9abf846b926e9f93f4b57ab77c0db63fb7d5a1e04ef52157f14f1dedcc4437"}, 0x40) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x17, 0x6, &(0x7f0000000c00)=ANY=[], &(0x7f00000002c0)='GPL\x00', 0x2, 0x0, 0x0, 0x40f00, 0x8, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000340)={0x1, 0x10000003}, 0x8, 0x10, &(0x7f0000000380)={0x0, 0xa, 0x83, 0x2}, 0x10}, 0x78) ioctl$sock_kcm_SIOCKCMATTACH(r4, 0x89e0, &(0x7f0000000500)={0xffffffffffffffff, r6}) 06:08:28 executing program 5: 06:08:28 executing program 2: 06:08:28 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) fsopen(&(0x7f0000000200)='squashfs\x00', 0x0) 06:08:28 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) setsockopt$inet_udp_int(r0, 0x11, 0x67, &(0x7f0000000140)=0x6, 0x4) sendmmsg(r0, &(0x7f0000006f00)=[{{&(0x7f0000000040)=@in={0x2, 0x4e23, @remote}, 0x80, &(0x7f0000000100)=[{&(0x7f00000000c0)="e04013b497936ecafdd12c496f522cc2830fd358bc8f890e410223906070a39cc6e2f84a8622c5f86cad52bba1560397737a6cce189d7db27e", 0x39}], 0x1}}, {{0x0, 0x0, &(0x7f0000000440)=[{&(0x7f0000000200)="9544939c01e602e8fc696947591d4c6fb3cb9a7cf9e53555dac91c09bbd33a6e85981e045d", 0x25}, {&(0x7f0000000240)="b995a5bf327c6f291a70af1527c6eb87af6b40c22e784c7d81102b1d2c4f5434d0142b1efa49361c7fa370cde02cbad1cdf556d5ebe84042e5b1eee75566d3c3bd4e54fb80c6258eb985131872c446ae99febe93703f66f4e0e10392c8a0d30f35710c7490190fef84833442ab74de59e4c9ebbc7cfe3f26750c16970d537ab353640e9e46e706cd200383135bfbf29b19c2fe729da592a9fb74eca37cb46775eb6db0118a3c59ac107fcf691822488d67f90e891045cb2ea35a79b6cd27c9fa5f37c9f6d6e4e2ca9267b2a8aa34f9727b0f539f", 0xd4}, {&(0x7f0000000340)="529cd4456bccdb80c030fe01e5cd61704126c8d4e7ec", 0x16}, {&(0x7f0000000380)="c2597979197f75ed6b82c8bcbf2c6b92a9a53fdd74646d60f9941ca27e", 0x1d}], 0x4}}], 0x2, 0x4c004) sendmmsg(r0, &(0x7f0000007fc0), 0x800001d, 0x0) 06:08:28 executing program 5: [ 212.020303][ T8985] IPVS: ftp: loaded support on port[0] = 21 06:08:28 executing program 2: 06:08:29 executing program 0: r0 = perf_event_open(&(0x7f0000000640)={0x3, 0x70, 0x3e7, 0x0, 0x4, 0x0, 0x0, 0x0, 0x91dd7106ca8fd33b, 0xdb3fedb3c3734f95, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x40000000000, 0x0, 0x1, 0x0, @perf_config_ext={0x18, 0x3}, 0x21, 0x10000000000000, 0x0, 0x0, 0x0, 0x20000007, 0x2}, 0x0, 0xc, 0xffffffffffffffff, 0xa) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='cpuacct.stat\x00', 0x0, 0x0) r2 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r2, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f00000003c0)='syz1\x00', 0x200002, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0xfffffffffffffffc) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000300)='./cgroup/syz0\x00', 0x200002, 0x0) gettid() socket$kcm(0x11, 0xb, 0x0) ioctl$TUNSETTXFILTER(r1, 0x400454d1, &(0x7f00000000c0)=ANY=[@ANYBLOB="00000700000000da6500bbc4bbbbbbbb0180c2000016000000004dc23f0c000000000000bb"]) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000040)=@ipx={0x4, 0x1, 0x0, "2bfaec665b4b", 0xff}, 0x80, 0x0}, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={0xffffffffffffffff, 0x1, 0x49c42ca22ab5a9ac, 0x4, 0x0}, 0x20) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x908b7aabaa7d2404) socket$kcm(0xa, 0x6, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x4000011) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000000c0), 0x0}, 0x28) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x89f1, &(0x7f0000000000)='ip6gre0\x00') perf_event_open(&(0x7f00000004c0)={0x0, 0x70, 0x8, 0x6, 0x0, 0x3, 0x0, 0x3, 0x4, 0x0, 0x9, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x1000, 0x0, @perf_config_ext={0x1ff}, 0x40004, 0xfffffffffffffffd, 0x0, 0x8, 0x8, 0x4, 0x80}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0x10, 0x0, 0x10) sendmsg$kcm(r4, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d200040080000048000001000080000000000300f88000f01700d4bd", 0x2e}], 0xf}, 0x40094) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) socket$kcm(0x2, 0x1, 0x2) socketpair(0x25, 0x6, 0x4, &(0x7f0000000480)) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x6d, &(0x7f0000000cc0)=ANY=[@ANYRESHEX, @ANYBLOB="e99f619c950ec8069b69ac05520100000000000000572e83f4fd34a6db69715afdc8ec492fa879a8460bf2c7459f384ec36d6f0d833fccc87dc8f542ca0731ec72c3f6e0857c63572db61a83246496a2f90400569c8af42a5b8b1e3583115dfe3a40a792ffe638fd722afd02131c170175f382a8d78b6626d1d58220f08d98570bad00042a01c00748cf37385e7d66e6c0efddeb730ebd2f1ab4e816cf7493cf236ca5eb6e5d2a65519a7acf475dbd9fb52eb50ddcf9cee74529f59a2d6cfe6c23f6a688719f922099394146621132f866439970571e206ac47123f2d9cdb5cb7c8506122300000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000)={0x0, 0x8}, 0x10}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r5, 0x18000000000002a0, 0x42, 0x0, &(0x7f0000000800)="b9ff0300600d698cb89e14f088a81fffffff00004000630677fbac14140ee934a0a662079f4b4d2f87e5feca6aab845013f2325f1a39010108038da1924425181aa5", 0x0, 0x28000, 0x60000000, 0x113, 0x0, &(0x7f00000006c0)="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"}, 0x40) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x17, 0x6, &(0x7f0000000c00)=ANY=[], &(0x7f00000002c0)='GPL\x00', 0x2, 0x0, 0x0, 0x40f00, 0x8, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000340)={0x1, 0x10000003}, 0x8, 0x10, &(0x7f0000000380)={0x0, 0xa, 0x83, 0x2}, 0x10}, 0x78) ioctl$sock_kcm_SIOCKCMATTACH(r4, 0x89e0, &(0x7f0000000500)={0xffffffffffffffff, r6}) 06:08:29 executing program 4: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000000c0)=0xe) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$PPPIOCSFLAGS1(r1, 0x40047457, &(0x7f0000000000)) 06:08:29 executing program 0: r0 = perf_event_open(&(0x7f0000000640)={0x3, 0x70, 0x3e7, 0x0, 0x4, 0x0, 0x0, 0x0, 0x91dd7106ca8fd33b, 0xdb3fedb3c3734f95, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x40000000000, 0x0, 0x1, 0x0, @perf_config_ext={0x18, 0x3}, 0x21, 0x10000000000000, 0x0, 0x0, 0x0, 0x20000007, 0x2}, 0x0, 0xc, 0xffffffffffffffff, 0xa) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='cpuacct.stat\x00', 0x0, 0x0) r2 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r2, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f00000003c0)='syz1\x00', 0x200002, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0xfffffffffffffffc) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000300)='./cgroup/syz0\x00', 0x200002, 0x0) gettid() socket$kcm(0x11, 0xb, 0x0) ioctl$TUNSETTXFILTER(r1, 0x400454d1, &(0x7f00000000c0)=ANY=[@ANYBLOB="00000700000000da6500bbc4bbbbbbbb0180c2000016000000004dc23f0c000000000000bb"]) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000040)=@ipx={0x4, 0x1, 0x0, "2bfaec665b4b", 0xff}, 0x80, 0x0}, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={0xffffffffffffffff, 0x1, 0x49c42ca22ab5a9ac, 0x4, 0x0}, 0x20) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x908b7aabaa7d2404) socket$kcm(0xa, 0x6, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x4000011) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000000c0), 0x0}, 0x28) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x89f1, &(0x7f0000000000)='ip6gre0\x00') perf_event_open(&(0x7f00000004c0)={0x0, 0x70, 0x8, 0x6, 0x0, 0x3, 0x0, 0x3, 0x4, 0x0, 0x9, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x1000, 0x0, @perf_config_ext={0x1ff}, 0x40004, 0xfffffffffffffffd, 0x0, 0x8, 0x8, 0x4, 0x80}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0x10, 0x0, 0x10) sendmsg$kcm(r4, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d200040080000048000001000080000000000300f88000f01700d4bd", 0x2e}], 0xf}, 0x40094) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) socket$kcm(0x2, 0x1, 0x2) socketpair(0x25, 0x6, 0x4, &(0x7f0000000480)) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x6d, &(0x7f0000000cc0)=ANY=[@ANYRESHEX, @ANYBLOB="e99f619c950ec8069b69ac05520100000000000000572e83f4fd34a6db69715afdc8ec492fa879a8460bf2c7459f384ec36d6f0d833fccc87dc8f542ca0731ec72c3f6e0857c63572db61a83246496a2f90400569c8af42a5b8b1e3583115dfe3a40a792ffe638fd722afd02131c170175f382a8d78b6626d1d58220f08d98570bad00042a01c00748cf37385e7d66e6c0efddeb730ebd2f1ab4e816cf7493cf236ca5eb6e5d2a65519a7acf475dbd9fb52eb50ddcf9cee74529f59a2d6cfe6c23f6a688719f922099394146621132f866439970571e206ac47123f2d9cdb5cb7c8506122300000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000)={0x0, 0x8}, 0x10}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r5, 0x18000000000002a0, 0x42, 0x0, &(0x7f0000000800)="b9ff0300600d698cb89e14f088a81fffffff00004000630677fbac14140ee934a0a662079f4b4d2f87e5feca6aab845013f2325f1a39010108038da1924425181aa5", 0x0, 0x28000, 0x60000000, 0x113, 0x0, &(0x7f00000006c0)="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"}, 0x40) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x17, 0x6, &(0x7f0000000c00)=ANY=[], &(0x7f00000002c0)='GPL\x00', 0x2, 0x0, 0x0, 0x40f00, 0x8, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000340)={0x1, 0x10000003}, 0x8, 0x10, &(0x7f0000000380)={0x0, 0xa, 0x83, 0x2}, 0x10}, 0x78) ioctl$sock_kcm_SIOCKCMATTACH(r4, 0x89e0, &(0x7f0000000500)={0xffffffffffffffff, r6}) 06:08:29 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) setsockopt$inet_udp_int(r0, 0x11, 0x67, &(0x7f0000000140)=0x6, 0x4) sendmmsg(r0, &(0x7f0000006f00)=[{{&(0x7f0000000040)=@in={0x2, 0x4e23, @remote}, 0x80, &(0x7f0000000100)=[{&(0x7f00000000c0)="e04013b497936ecafdd12c496f522cc2830fd358bc8f890e410223906070a39cc6e2f84a8622c5f86cad52bba1560397737a6cce189d7db27e", 0x39}], 0x1}}, {{0x0, 0x0, &(0x7f0000000440)=[{&(0x7f0000000200)="9544939c01e602e8fc696947591d4c6fb3cb9a7cf9e53555dac91c09bbd33a6e85981e045d", 0x25}, {&(0x7f0000000240)="b995a5bf327c6f291a70af1527c6eb87af6b40c22e784c7d81102b1d2c4f5434d0142b1efa49361c7fa370cde02cbad1cdf556d5ebe84042e5b1eee75566d3c3bd4e54fb80c6258eb985131872c446ae99febe93703f66f4e0e10392c8a0d30f35710c7490190fef84833442ab74de59e4c9ebbc7cfe3f26750c16970d537ab353640e9e46e706cd200383135bfbf29b19c2fe729da592a9fb74eca37cb46775eb6db0118a3c59ac107fcf691822488d67f90e891045cb2ea35a79b6cd27c9fa5f37c9f6d6e4e2ca9267b2a8aa34f9727b0f539f", 0xd4}, {&(0x7f0000000340)="529cd4456bccdb80c030fe01e5cd61704126c8d4e7ec", 0x16}, {&(0x7f0000000380)="c2597979197f75ed6b82c8bcbf2c6b92a9a53fdd74646d60f9941ca27e", 0x1d}], 0x4}}], 0x2, 0x4c004) sendmmsg(r0, &(0x7f0000007fc0), 0x800001d, 0x0) 06:08:29 executing program 2: 06:08:29 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r0, r0) fsopen(&(0x7f0000000200)='squashfs\x00', 0x0) 06:08:29 executing program 5: 06:08:29 executing program 2: 06:08:29 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r0, r0) fsopen(&(0x7f0000000200)='squashfs\x00', 0x0) 06:08:29 executing program 5: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000180)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup(r0, &(0x7f0000000000)='syz0\x00', 0x200002, 0x0) r2 = openat$cgroup_procs(r1, &(0x7f00000001c0)='cgroup.procs\x00', 0x2, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendfile(r3, r2, 0x0, 0x3ff) [ 212.813471][ T9038] IPVS: ftp: loaded support on port[0] = 21 06:08:29 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) setsockopt$inet_udp_int(r0, 0x11, 0x67, &(0x7f0000000140)=0x6, 0x4) sendmmsg(r0, &(0x7f0000006f00)=[{{&(0x7f0000000040)=@in={0x2, 0x4e23, @remote}, 0x80, &(0x7f0000000100)=[{&(0x7f00000000c0)="e04013b497936ecafdd12c496f522cc2830fd358bc8f890e410223906070a39cc6e2f84a8622c5f86cad52bba1560397737a6cce189d7db27e", 0x39}], 0x1}}, {{0x0, 0x0, &(0x7f0000000440)=[{&(0x7f0000000200)="9544939c01e602e8fc696947591d4c6fb3cb9a7cf9e53555dac91c09bbd33a6e85981e045d", 0x25}, {&(0x7f0000000240)="b995a5bf327c6f291a70af1527c6eb87af6b40c22e784c7d81102b1d2c4f5434d0142b1efa49361c7fa370cde02cbad1cdf556d5ebe84042e5b1eee75566d3c3bd4e54fb80c6258eb985131872c446ae99febe93703f66f4e0e10392c8a0d30f35710c7490190fef84833442ab74de59e4c9ebbc7cfe3f26750c16970d537ab353640e9e46e706cd200383135bfbf29b19c2fe729da592a9fb74eca37cb46775eb6db0118a3c59ac107fcf691822488d67f90e891045cb2ea35a79b6cd27c9fa5f37c9f6d6e4e2ca9267b2a8aa34f9727b0f539f", 0xd4}, {&(0x7f0000000340)="529cd4456bccdb80c030fe01e5cd61704126c8d4e7ec", 0x16}, {&(0x7f0000000380)="c2597979197f75ed6b82c8bcbf2c6b92a9a53fdd74646d60f9941ca27e", 0x1d}], 0x4}}], 0x2, 0x4c004) sendmmsg(r0, &(0x7f0000007fc0), 0x800001d, 0x0) 06:08:29 executing program 0: r0 = perf_event_open(&(0x7f0000000640)={0x3, 0x70, 0x3e7, 0x0, 0x4, 0x0, 0x0, 0x0, 0x91dd7106ca8fd33b, 0xdb3fedb3c3734f95, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x40000000000, 0x0, 0x1, 0x0, @perf_config_ext={0x18, 0x3}, 0x21, 0x10000000000000, 0x0, 0x0, 0x0, 0x20000007, 0x2}, 0x0, 0xc, 0xffffffffffffffff, 0xa) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='cpuacct.stat\x00', 0x0, 0x0) r2 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r2, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f00000003c0)='syz1\x00', 0x200002, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0xfffffffffffffffc) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000300)='./cgroup/syz0\x00', 0x200002, 0x0) gettid() socket$kcm(0x11, 0xb, 0x0) ioctl$TUNSETTXFILTER(r1, 0x400454d1, &(0x7f00000000c0)=ANY=[@ANYBLOB="00000700000000da6500bbc4bbbbbbbb0180c2000016000000004dc23f0c000000000000bb"]) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000040)=@ipx={0x4, 0x1, 0x0, "2bfaec665b4b", 0xff}, 0x80, 0x0}, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={0xffffffffffffffff, 0x1, 0x49c42ca22ab5a9ac, 0x4, 0x0}, 0x20) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x908b7aabaa7d2404) socket$kcm(0xa, 0x6, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x4000011) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000000c0), 0x0}, 0x28) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x89f1, &(0x7f0000000000)='ip6gre0\x00') perf_event_open(&(0x7f00000004c0)={0x0, 0x70, 0x8, 0x6, 0x0, 0x3, 0x0, 0x3, 0x4, 0x0, 0x9, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x1000, 0x0, @perf_config_ext={0x1ff}, 0x40004, 0xfffffffffffffffd, 0x0, 0x8, 0x8, 0x4, 0x80}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0x10, 0x0, 0x10) sendmsg$kcm(r4, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d200040080000048000001000080000000000300f88000f01700d4bd", 0x2e}], 0xf}, 0x40094) r5 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r6 = socket$kcm(0x2, 0x1, 0x2) setsockopt$sock_attach_bpf(r6, 0x1, 0x3e, &(0x7f00000002c0)=r5, 0x4) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x6d, &(0x7f0000000cc0)=ANY=[@ANYRESHEX, @ANYBLOB="e99f619c950ec8069b69ac05520100000000000000572e83f4fd34a6db69715afdc8ec492fa879a8460bf2c7459f384ec36d6f0d833fccc87dc8f542ca0731ec72c3f6e0857c63572db61a83246496a2f90400569c8af42a5b8b1e3583115dfe3a40a792ffe638fd722afd02131c170175f382a8d78b6626d1d58220f08d98570bad00042a01c00748cf37385e7d66e6c0efddeb730ebd2f1ab4e816cf7493cf236ca5eb6e5d2a65519a7acf475dbd9fb52eb50ddcf9cee74529f59a2d6cfe6c23f6a688719f922099394146621132f866439970571e206ac47123f2d9cdb5cb7c8506122300000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000)={0x0, 0x8}, 0x10}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r7, 0x18000000000002a0, 0x42, 0x0, &(0x7f0000000800)="b9ff0300600d698cb89e14f088a81fffffff00004000630677fbac14140ee934a0a662079f4b4d2f87e5feca6aab845013f2325f1a39010108038da1924425181aa5", 0x0, 0x28000, 0x60000000, 0x113, 0x0, &(0x7f00000006c0)="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"}, 0x40) r8 = bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x17, 0x6, &(0x7f0000000c00)=ANY=[], &(0x7f00000002c0)='GPL\x00', 0x2, 0x0, 0x0, 0x40f00, 0x8, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000340)={0x1, 0x10000003}, 0x8, 0x10, &(0x7f0000000380)={0x0, 0xa, 0x83, 0x2}, 0x10}, 0x78) ioctl$sock_kcm_SIOCKCMATTACH(r4, 0x89e0, &(0x7f0000000500)={0xffffffffffffffff, r8}) 06:08:29 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) close(r0) r1 = socket(0x200000100000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'veth0_to_bond\x00', 0x0}) bind$packet(r1, &(0x7f0000000200)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @remote}, 0x14) io_setup(0x1, &(0x7f0000000280)=0x0) io_submit(r3, 0x1, &(0x7f0000000080)=[&(0x7f0000000540)={0x0, 0x0, 0x0, 0x800000000001, 0x0, r0, 0x0}]) 06:08:30 executing program 4: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000000c0)=0xe) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$PPPIOCSFLAGS1(r1, 0x40047457, &(0x7f0000000000)) 06:08:30 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r0, r0) fsopen(&(0x7f0000000200)='squashfs\x00', 0x0) 06:08:30 executing program 5: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000180)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup(r0, &(0x7f0000000000)='syz0\x00', 0x200002, 0x0) r2 = openat$cgroup_procs(r1, &(0x7f00000001c0)='cgroup.procs\x00', 0x2, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendfile(r3, r2, 0x0, 0x3ff) 06:08:30 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$inet_udp_int(r0, 0x11, 0x67, &(0x7f0000000140)=0x6, 0x4) sendmmsg(r0, &(0x7f0000006f00)=[{{&(0x7f0000000040)=@in={0x2, 0x4e23, @remote}, 0x80, &(0x7f0000000100)=[{&(0x7f00000000c0)="e04013b497936ecafdd12c496f522cc2830fd358bc8f890e410223906070a39cc6e2f84a8622c5f86cad52bba1560397737a6cce189d7db27e", 0x39}], 0x1}}, {{0x0, 0x0, &(0x7f0000000440)=[{&(0x7f0000000200)="9544939c01e602e8fc696947591d4c6fb3cb9a7cf9e53555dac91c09bbd33a6e85981e045d", 0x25}, {&(0x7f0000000240)="b995a5bf327c6f291a70af1527c6eb87af6b40c22e784c7d81102b1d2c4f5434d0142b1efa49361c7fa370cde02cbad1cdf556d5ebe84042e5b1eee75566d3c3bd4e54fb80c6258eb985131872c446ae99febe93703f66f4e0e10392c8a0d30f35710c7490190fef84833442ab74de59e4c9ebbc7cfe3f26750c16970d537ab353640e9e46e706cd200383135bfbf29b19c2fe729da592a9fb74eca37cb46775eb6db0118a3c59ac107fcf691822488d67f90e891045cb2ea35a79b6cd27c9fa5f37c9f6d6e4e2ca9267b2a8aa34f9727b0f539f", 0xd4}, {&(0x7f0000000340)="529cd4456bccdb80c030fe01e5cd61704126c8d4e7ec", 0x16}, {&(0x7f0000000380)="c2597979197f75ed6b82c8bcbf2c6b92a9a53fdd74646d60f9941ca27e", 0x1d}], 0x4}}], 0x2, 0x4c004) sendmmsg(r0, &(0x7f0000007fc0), 0x800001d, 0x0) 06:08:30 executing program 0: r0 = perf_event_open(&(0x7f0000000640)={0x3, 0x70, 0x3e7, 0x0, 0x4, 0x0, 0x0, 0x0, 0x91dd7106ca8fd33b, 0xdb3fedb3c3734f95, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x40000000000, 0x0, 0x1, 0x0, @perf_config_ext={0x18, 0x3}, 0x21, 0x10000000000000, 0x0, 0x0, 0x0, 0x20000007, 0x2}, 0x0, 0xc, 0xffffffffffffffff, 0xa) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='cpuacct.stat\x00', 0x0, 0x0) r2 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r2, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f00000003c0)='syz1\x00', 0x200002, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0xfffffffffffffffc) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000300)='./cgroup/syz0\x00', 0x200002, 0x0) gettid() socket$kcm(0x11, 0xb, 0x0) ioctl$TUNSETTXFILTER(r1, 0x400454d1, &(0x7f00000000c0)=ANY=[@ANYBLOB="00000700000000da6500bbc4bbbbbbbb0180c2000016000000004dc23f0c000000000000bb"]) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000040)=@ipx={0x4, 0x1, 0x0, "2bfaec665b4b", 0xff}, 0x80, 0x0}, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={0xffffffffffffffff, 0x1, 0x49c42ca22ab5a9ac, 0x4, 0x0}, 0x20) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x908b7aabaa7d2404) socket$kcm(0xa, 0x6, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x4000011) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000000c0), 0x0}, 0x28) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x89f1, &(0x7f0000000000)='ip6gre0\x00') perf_event_open(&(0x7f00000004c0)={0x0, 0x70, 0x8, 0x6, 0x0, 0x3, 0x0, 0x3, 0x4, 0x0, 0x9, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x1000, 0x0, @perf_config_ext={0x1ff}, 0x40004, 0xfffffffffffffffd, 0x0, 0x8, 0x8, 0x4, 0x80}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0x10, 0x0, 0x10) sendmsg$kcm(r4, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d200040080000048000001000080000000000300f88000f01700d4bd", 0x2e}], 0xf}, 0x40094) r5 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r6 = socket$kcm(0x2, 0x1, 0x2) setsockopt$sock_attach_bpf(r6, 0x1, 0x3e, &(0x7f00000002c0)=r5, 0x4) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x6d, &(0x7f0000000cc0)=ANY=[@ANYRESHEX, @ANYBLOB="e99f619c950ec8069b69ac05520100000000000000572e83f4fd34a6db69715afdc8ec492fa879a8460bf2c7459f384ec36d6f0d833fccc87dc8f542ca0731ec72c3f6e0857c63572db61a83246496a2f90400569c8af42a5b8b1e3583115dfe3a40a792ffe638fd722afd02131c170175f382a8d78b6626d1d58220f08d98570bad00042a01c00748cf37385e7d66e6c0efddeb730ebd2f1ab4e816cf7493cf236ca5eb6e5d2a65519a7acf475dbd9fb52eb50ddcf9cee74529f59a2d6cfe6c23f6a688719f922099394146621132f866439970571e206ac47123f2d9cdb5cb7c8506122300000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000)={0x0, 0x8}, 0x10}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r7, 0x18000000000002a0, 0x42, 0x0, &(0x7f0000000800)="b9ff0300600d698cb89e14f088a81fffffff00004000630677fbac14140ee934a0a662079f4b4d2f87e5feca6aab845013f2325f1a39010108038da1924425181aa5", 0x0, 0x28000, 0x60000000, 0x113, 0x0, &(0x7f00000006c0)="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"}, 0x40) r8 = bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x17, 0x6, &(0x7f0000000c00)=ANY=[], &(0x7f00000002c0)='GPL\x00', 0x2, 0x0, 0x0, 0x40f00, 0x8, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000340)={0x1, 0x10000003}, 0x8, 0x10, &(0x7f0000000380)={0x0, 0xa, 0x83, 0x2}, 0x10}, 0x78) ioctl$sock_kcm_SIOCKCMATTACH(r4, 0x89e0, &(0x7f0000000500)={0xffffffffffffffff, r8}) 06:08:30 executing program 2: syz_emit_ethernet(0x5e, &(0x7f0000000200)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, '\x00', 0x28, 0x29, 0x0, @remote, @local, {[], {{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, {[@md5sig={0x22, 0x12, "6fee72039d001f92debf1ec2bde09608"}]}}}}}}}}, 0x0) 06:08:30 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$inet_udp_int(r0, 0x11, 0x67, &(0x7f0000000140)=0x6, 0x4) sendmmsg(r0, &(0x7f0000006f00)=[{{&(0x7f0000000040)=@in={0x2, 0x4e23, @remote}, 0x80, &(0x7f0000000100)=[{&(0x7f00000000c0)="e04013b497936ecafdd12c496f522cc2830fd358bc8f890e410223906070a39cc6e2f84a8622c5f86cad52bba1560397737a6cce189d7db27e", 0x39}], 0x1}}, {{0x0, 0x0, &(0x7f0000000440)=[{&(0x7f0000000200)="9544939c01e602e8fc696947591d4c6fb3cb9a7cf9e53555dac91c09bbd33a6e85981e045d", 0x25}, {&(0x7f0000000240)="b995a5bf327c6f291a70af1527c6eb87af6b40c22e784c7d81102b1d2c4f5434d0142b1efa49361c7fa370cde02cbad1cdf556d5ebe84042e5b1eee75566d3c3bd4e54fb80c6258eb985131872c446ae99febe93703f66f4e0e10392c8a0d30f35710c7490190fef84833442ab74de59e4c9ebbc7cfe3f26750c16970d537ab353640e9e46e706cd200383135bfbf29b19c2fe729da592a9fb74eca37cb46775eb6db0118a3c59ac107fcf691822488d67f90e891045cb2ea35a79b6cd27c9fa5f37c9f6d6e4e2ca9267b2a8aa34f9727b0f539f", 0xd4}, {&(0x7f0000000340)="529cd4456bccdb80c030fe01e5cd61704126c8d4e7ec", 0x16}, {&(0x7f0000000380)="c2597979197f75ed6b82c8bcbf2c6b92a9a53fdd74646d60f9941ca27e", 0x1d}], 0x4}}], 0x2, 0x4c004) sendmmsg(r0, &(0x7f0000007fc0), 0x800001d, 0x0) [ 213.617791][ T9095] IPVS: ftp: loaded support on port[0] = 21 06:08:30 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_TIMEOUT_NEW(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)={0x34, 0x0, 0x8, 0x5, 0x0, 0x0, {}, [@CTA_TIMEOUT_NAME={0x9, 0x1, 'syz1\x00'}, @CTA_TIMEOUT_L4PROTO={0x5}, @CTA_TIMEOUT_DATA={0x4, 0x4, 0x0, 0x1, @fccp}, @CTA_TIMEOUT_L3PROTO={0x6}]}, 0x34}}, 0x0) sendfile(r2, r1, 0x0, 0x100000001) 06:08:30 executing program 3: socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) fsopen(&(0x7f0000000200)='squashfs\x00', 0x0) 06:08:30 executing program 0: r0 = perf_event_open(&(0x7f0000000640)={0x3, 0x70, 0x3e7, 0x0, 0x4, 0x0, 0x0, 0x0, 0x91dd7106ca8fd33b, 0xdb3fedb3c3734f95, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x40000000000, 0x0, 0x1, 0x0, @perf_config_ext={0x18, 0x3}, 0x21, 0x10000000000000, 0x0, 0x0, 0x0, 0x20000007, 0x2}, 0x0, 0xc, 0xffffffffffffffff, 0xa) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='cpuacct.stat\x00', 0x0, 0x0) r2 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r2, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f00000003c0)='syz1\x00', 0x200002, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0xfffffffffffffffc) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000300)='./cgroup/syz0\x00', 0x200002, 0x0) gettid() socket$kcm(0x11, 0xb, 0x0) ioctl$TUNSETTXFILTER(r1, 0x400454d1, &(0x7f00000000c0)=ANY=[@ANYBLOB="00000700000000da6500bbc4bbbbbbbb0180c2000016000000004dc23f0c000000000000bb"]) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000040)=@ipx={0x4, 0x1, 0x0, "2bfaec665b4b", 0xff}, 0x80, 0x0}, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={0xffffffffffffffff, 0x1, 0x49c42ca22ab5a9ac, 0x4, 0x0}, 0x20) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x908b7aabaa7d2404) socket$kcm(0xa, 0x6, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x4000011) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000000c0), 0x0}, 0x28) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x89f1, &(0x7f0000000000)='ip6gre0\x00') perf_event_open(&(0x7f00000004c0)={0x0, 0x70, 0x8, 0x6, 0x0, 0x3, 0x0, 0x3, 0x4, 0x0, 0x9, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x1000, 0x0, @perf_config_ext={0x1ff}, 0x40004, 0xfffffffffffffffd, 0x0, 0x8, 0x8, 0x4, 0x80}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0x10, 0x0, 0x10) sendmsg$kcm(r4, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d200040080000048000001000080000000000300f88000f01700d4bd", 0x2e}], 0xf}, 0x40094) r5 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r6 = socket$kcm(0x2, 0x1, 0x2) setsockopt$sock_attach_bpf(r6, 0x1, 0x3e, &(0x7f00000002c0)=r5, 0x4) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x6d, &(0x7f0000000cc0)=ANY=[@ANYRESHEX, @ANYBLOB="e99f619c950ec8069b69ac05520100000000000000572e83f4fd34a6db69715afdc8ec492fa879a8460bf2c7459f384ec36d6f0d833fccc87dc8f542ca0731ec72c3f6e0857c63572db61a83246496a2f90400569c8af42a5b8b1e3583115dfe3a40a792ffe638fd722afd02131c170175f382a8d78b6626d1d58220f08d98570bad00042a01c00748cf37385e7d66e6c0efddeb730ebd2f1ab4e816cf7493cf236ca5eb6e5d2a65519a7acf475dbd9fb52eb50ddcf9cee74529f59a2d6cfe6c23f6a688719f922099394146621132f866439970571e206ac47123f2d9cdb5cb7c8506122300000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000)={0x0, 0x8}, 0x10}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r7, 0x18000000000002a0, 0x42, 0x0, &(0x7f0000000800)="b9ff0300600d698cb89e14f088a81fffffff00004000630677fbac14140ee934a0a662079f4b4d2f87e5feca6aab845013f2325f1a39010108038da1924425181aa5", 0x0, 0x28000, 0x60000000, 0x113, 0x0, &(0x7f00000006c0)="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"}, 0x40) r8 = bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x17, 0x6, &(0x7f0000000c00)=ANY=[], &(0x7f00000002c0)='GPL\x00', 0x2, 0x0, 0x0, 0x40f00, 0x8, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000340)={0x1, 0x10000003}, 0x8, 0x10, &(0x7f0000000380)={0x0, 0xa, 0x83, 0x2}, 0x10}, 0x78) ioctl$sock_kcm_SIOCKCMATTACH(r4, 0x89e0, &(0x7f0000000500)={0xffffffffffffffff, r8}) 06:08:30 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x4601, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}) 06:08:30 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$inet_udp_int(r0, 0x11, 0x67, &(0x7f0000000140)=0x6, 0x4) sendmmsg(r0, &(0x7f0000006f00)=[{{&(0x7f0000000040)=@in={0x2, 0x4e23, @remote}, 0x80, &(0x7f0000000100)=[{&(0x7f00000000c0)="e04013b497936ecafdd12c496f522cc2830fd358bc8f890e410223906070a39cc6e2f84a8622c5f86cad52bba1560397737a6cce189d7db27e", 0x39}], 0x1}}, {{0x0, 0x0, &(0x7f0000000440)=[{&(0x7f0000000200)="9544939c01e602e8fc696947591d4c6fb3cb9a7cf9e53555dac91c09bbd33a6e85981e045d", 0x25}, {&(0x7f0000000240)="b995a5bf327c6f291a70af1527c6eb87af6b40c22e784c7d81102b1d2c4f5434d0142b1efa49361c7fa370cde02cbad1cdf556d5ebe84042e5b1eee75566d3c3bd4e54fb80c6258eb985131872c446ae99febe93703f66f4e0e10392c8a0d30f35710c7490190fef84833442ab74de59e4c9ebbc7cfe3f26750c16970d537ab353640e9e46e706cd200383135bfbf29b19c2fe729da592a9fb74eca37cb46775eb6db0118a3c59ac107fcf691822488d67f90e891045cb2ea35a79b6cd27c9fa5f37c9f6d6e4e2ca9267b2a8aa34f9727b0f539f", 0xd4}, {&(0x7f0000000340)="529cd4456bccdb80c030fe01e5cd61704126c8d4e7ec", 0x16}, {&(0x7f0000000380)="c2597979197f75ed6b82c8bcbf2c6b92a9a53fdd74646d60f9941ca27e", 0x1d}], 0x4}}], 0x2, 0x4c004) sendmmsg(r0, &(0x7f0000007fc0), 0x800001d, 0x0) [ 213.934073][ T27] audit: type=1804 audit(1590041310.736:2): pid=9120 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir416829794/syzkaller.agJBoa/18/cgroup.controllers" dev="sda1" ino=15809 res=1 06:08:31 executing program 4: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000000c0)=0xe) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$PPPIOCSFLAGS1(r1, 0x40047457, &(0x7f0000000000)) 06:08:31 executing program 3: socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) fsopen(&(0x7f0000000200)='squashfs\x00', 0x0) 06:08:31 executing program 0: r0 = perf_event_open(&(0x7f0000000640)={0x3, 0x70, 0x3e7, 0x0, 0x4, 0x0, 0x0, 0x0, 0x91dd7106ca8fd33b, 0xdb3fedb3c3734f95, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x40000000000, 0x0, 0x1, 0x0, @perf_config_ext={0x18, 0x3}, 0x21, 0x10000000000000, 0x0, 0x0, 0x0, 0x20000007, 0x2}, 0x0, 0xc, 0xffffffffffffffff, 0xa) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='cpuacct.stat\x00', 0x0, 0x0) r2 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r2, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f00000003c0)='syz1\x00', 0x200002, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0xfffffffffffffffc) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000300)='./cgroup/syz0\x00', 0x200002, 0x0) gettid() socket$kcm(0x11, 0xb, 0x0) ioctl$TUNSETTXFILTER(r1, 0x400454d1, &(0x7f00000000c0)=ANY=[@ANYBLOB="00000700000000da6500bbc4bbbbbbbb0180c2000016000000004dc23f0c000000000000bb"]) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000040)=@ipx={0x4, 0x1, 0x0, "2bfaec665b4b", 0xff}, 0x80, 0x0}, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={0xffffffffffffffff, 0x1, 0x49c42ca22ab5a9ac, 0x4, 0x0}, 0x20) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x908b7aabaa7d2404) socket$kcm(0xa, 0x6, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x4000011) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000000c0), 0x0}, 0x28) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x89f1, &(0x7f0000000000)='ip6gre0\x00') perf_event_open(&(0x7f00000004c0)={0x0, 0x70, 0x8, 0x6, 0x0, 0x3, 0x0, 0x3, 0x4, 0x0, 0x9, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x1000, 0x0, @perf_config_ext={0x1ff}, 0x40004, 0xfffffffffffffffd, 0x0, 0x8, 0x8, 0x4, 0x80}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0x10, 0x0, 0x10) sendmsg$kcm(r4, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d200040080000048000001000080000000000300f88000f01700d4bd", 0x2e}], 0xf}, 0x40094) r5 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) socketpair(0x25, 0x6, 0x4, &(0x7f0000000480)) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f00000002c0)=r5, 0x4) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x6d, &(0x7f0000000cc0)=ANY=[@ANYRESHEX, @ANYBLOB="e99f619c950ec8069b69ac05520100000000000000572e83f4fd34a6db69715afdc8ec492fa879a8460bf2c7459f384ec36d6f0d833fccc87dc8f542ca0731ec72c3f6e0857c63572db61a83246496a2f90400569c8af42a5b8b1e3583115dfe3a40a792ffe638fd722afd02131c170175f382a8d78b6626d1d58220f08d98570bad00042a01c00748cf37385e7d66e6c0efddeb730ebd2f1ab4e816cf7493cf236ca5eb6e5d2a65519a7acf475dbd9fb52eb50ddcf9cee74529f59a2d6cfe6c23f6a688719f922099394146621132f866439970571e206ac47123f2d9cdb5cb7c8506122300000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000)={0x0, 0x8}, 0x10}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r6, 0x18000000000002a0, 0x42, 0x0, &(0x7f0000000800)="b9ff0300600d698cb89e14f088a81fffffff00004000630677fbac14140ee934a0a662079f4b4d2f87e5feca6aab845013f2325f1a39010108038da1924425181aa5", 0x0, 0x28000, 0x60000000, 0x113, 0x0, &(0x7f00000006c0)="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"}, 0x40) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x17, 0x6, &(0x7f0000000c00)=ANY=[], &(0x7f00000002c0)='GPL\x00', 0x2, 0x0, 0x0, 0x40f00, 0x8, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000340)={0x1, 0x10000003}, 0x8, 0x10, &(0x7f0000000380)={0x0, 0xa, 0x83, 0x2}, 0x10}, 0x78) ioctl$sock_kcm_SIOCKCMATTACH(r4, 0x89e0, &(0x7f0000000500)={0xffffffffffffffff, r7}) 06:08:31 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x67, &(0x7f0000000140)=0x6, 0x4) sendmmsg(0xffffffffffffffff, &(0x7f0000006f00)=[{{&(0x7f0000000040)=@in={0x2, 0x4e23, @remote}, 0x80, &(0x7f0000000100)=[{&(0x7f00000000c0)="e04013b497936ecafdd12c496f522cc2830fd358bc8f890e410223906070a39cc6e2f84a8622c5f86cad52bba1560397737a6cce189d7db27e", 0x39}], 0x1}}, {{0x0, 0x0, &(0x7f0000000440)=[{&(0x7f0000000200)="9544939c01e602e8fc696947591d4c6fb3cb9a7cf9e53555dac91c09bbd33a6e85981e045d", 0x25}, {&(0x7f0000000240)="b995a5bf327c6f291a70af1527c6eb87af6b40c22e784c7d81102b1d2c4f5434d0142b1efa49361c7fa370cde02cbad1cdf556d5ebe84042e5b1eee75566d3c3bd4e54fb80c6258eb985131872c446ae99febe93703f66f4e0e10392c8a0d30f35710c7490190fef84833442ab74de59e4c9ebbc7cfe3f26750c16970d537ab353640e9e46e706cd200383135bfbf29b19c2fe729da592a9fb74eca37cb46775eb6db0118a3c59ac107fcf691822488d67f90e891045cb2ea35a79b6cd27c9fa5f37c9f6d6e4e2ca9267b2a8aa34f9727b0f539f", 0xd4}, {&(0x7f0000000340)="529cd4456bccdb80c030fe01e5cd61704126c8d4e7ec", 0x16}, {&(0x7f0000000380)="c2597979197f75ed6b82c8bcbf2c6b92a9a53fdd74646d60f9941ca27e", 0x1d}], 0x4}}], 0x2, 0x4c004) sendmmsg(0xffffffffffffffff, &(0x7f0000007fc0), 0x800001d, 0x0) 06:08:31 executing program 2: mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x2, 0x6031, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000a01000/0x4000)=nil, 0x4000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) munlockall() add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) 06:08:31 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x4601, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}) 06:08:31 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x67, &(0x7f0000000140)=0x6, 0x4) sendmmsg(0xffffffffffffffff, &(0x7f0000006f00)=[{{&(0x7f0000000040)=@in={0x2, 0x4e23, @remote}, 0x80, &(0x7f0000000100)=[{&(0x7f00000000c0)="e04013b497936ecafdd12c496f522cc2830fd358bc8f890e410223906070a39cc6e2f84a8622c5f86cad52bba1560397737a6cce189d7db27e", 0x39}], 0x1}}, {{0x0, 0x0, &(0x7f0000000440)=[{&(0x7f0000000200)="9544939c01e602e8fc696947591d4c6fb3cb9a7cf9e53555dac91c09bbd33a6e85981e045d", 0x25}, {&(0x7f0000000240)="b995a5bf327c6f291a70af1527c6eb87af6b40c22e784c7d81102b1d2c4f5434d0142b1efa49361c7fa370cde02cbad1cdf556d5ebe84042e5b1eee75566d3c3bd4e54fb80c6258eb985131872c446ae99febe93703f66f4e0e10392c8a0d30f35710c7490190fef84833442ab74de59e4c9ebbc7cfe3f26750c16970d537ab353640e9e46e706cd200383135bfbf29b19c2fe729da592a9fb74eca37cb46775eb6db0118a3c59ac107fcf691822488d67f90e891045cb2ea35a79b6cd27c9fa5f37c9f6d6e4e2ca9267b2a8aa34f9727b0f539f", 0xd4}, {&(0x7f0000000340)="529cd4456bccdb80c030fe01e5cd61704126c8d4e7ec", 0x16}, {&(0x7f0000000380)="c2597979197f75ed6b82c8bcbf2c6b92a9a53fdd74646d60f9941ca27e", 0x1d}], 0x4}}], 0x2, 0x4c004) sendmmsg(0xffffffffffffffff, &(0x7f0000007fc0), 0x800001d, 0x0) 06:08:31 executing program 3: socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) fsopen(&(0x7f0000000200)='squashfs\x00', 0x0) 06:08:31 executing program 0: r0 = perf_event_open(&(0x7f0000000640)={0x3, 0x70, 0x3e7, 0x0, 0x4, 0x0, 0x0, 0x0, 0x91dd7106ca8fd33b, 0xdb3fedb3c3734f95, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x40000000000, 0x0, 0x1, 0x0, @perf_config_ext={0x18, 0x3}, 0x21, 0x10000000000000, 0x0, 0x0, 0x0, 0x20000007, 0x2}, 0x0, 0xc, 0xffffffffffffffff, 0xa) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='cpuacct.stat\x00', 0x0, 0x0) r2 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r2, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f00000003c0)='syz1\x00', 0x200002, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0xfffffffffffffffc) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000300)='./cgroup/syz0\x00', 0x200002, 0x0) gettid() socket$kcm(0x11, 0xb, 0x0) ioctl$TUNSETTXFILTER(r1, 0x400454d1, &(0x7f00000000c0)=ANY=[@ANYBLOB="00000700000000da6500bbc4bbbbbbbb0180c2000016000000004dc23f0c000000000000bb"]) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000040)=@ipx={0x4, 0x1, 0x0, "2bfaec665b4b", 0xff}, 0x80, 0x0}, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={0xffffffffffffffff, 0x1, 0x49c42ca22ab5a9ac, 0x4, 0x0}, 0x20) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x908b7aabaa7d2404) socket$kcm(0xa, 0x6, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x4000011) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000000c0), 0x0}, 0x28) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x89f1, &(0x7f0000000000)='ip6gre0\x00') perf_event_open(&(0x7f00000004c0)={0x0, 0x70, 0x8, 0x6, 0x0, 0x3, 0x0, 0x3, 0x4, 0x0, 0x9, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x1000, 0x0, @perf_config_ext={0x1ff}, 0x40004, 0xfffffffffffffffd, 0x0, 0x8, 0x8, 0x4, 0x80}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0x10, 0x0, 0x10) sendmsg$kcm(r4, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d200040080000048000001000080000000000300f88000f01700d4bd", 0x2e}], 0xf}, 0x40094) r5 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) socketpair(0x25, 0x6, 0x4, &(0x7f0000000480)) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f00000002c0)=r5, 0x4) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x6d, &(0x7f0000000cc0)=ANY=[@ANYRESHEX, @ANYBLOB="e99f619c950ec8069b69ac05520100000000000000572e83f4fd34a6db69715afdc8ec492fa879a8460bf2c7459f384ec36d6f0d833fccc87dc8f542ca0731ec72c3f6e0857c63572db61a83246496a2f90400569c8af42a5b8b1e3583115dfe3a40a792ffe638fd722afd02131c170175f382a8d78b6626d1d58220f08d98570bad00042a01c00748cf37385e7d66e6c0efddeb730ebd2f1ab4e816cf7493cf236ca5eb6e5d2a65519a7acf475dbd9fb52eb50ddcf9cee74529f59a2d6cfe6c23f6a688719f922099394146621132f866439970571e206ac47123f2d9cdb5cb7c8506122300000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000)={0x0, 0x8}, 0x10}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r6, 0x18000000000002a0, 0x42, 0x0, &(0x7f0000000800)="b9ff0300600d698cb89e14f088a81fffffff00004000630677fbac14140ee934a0a662079f4b4d2f87e5feca6aab845013f2325f1a39010108038da1924425181aa5", 0x0, 0x28000, 0x60000000, 0x113, 0x0, &(0x7f00000006c0)="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"}, 0x40) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x17, 0x6, &(0x7f0000000c00)=ANY=[], &(0x7f00000002c0)='GPL\x00', 0x2, 0x0, 0x0, 0x40f00, 0x8, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000340)={0x1, 0x10000003}, 0x8, 0x10, &(0x7f0000000380)={0x0, 0xa, 0x83, 0x2}, 0x10}, 0x78) ioctl$sock_kcm_SIOCKCMATTACH(r4, 0x89e0, &(0x7f0000000500)={0xffffffffffffffff, r7}) [ 214.566207][ T9150] IPVS: ftp: loaded support on port[0] = 21 06:08:31 executing program 3: r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) fsopen(&(0x7f0000000200)='squashfs\x00', 0x0) 06:08:31 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x67, &(0x7f0000000140)=0x6, 0x4) sendmmsg(0xffffffffffffffff, &(0x7f0000006f00)=[{{&(0x7f0000000040)=@in={0x2, 0x4e23, @remote}, 0x80, &(0x7f0000000100)=[{&(0x7f00000000c0)="e04013b497936ecafdd12c496f522cc2830fd358bc8f890e410223906070a39cc6e2f84a8622c5f86cad52bba1560397737a6cce189d7db27e", 0x39}], 0x1}}, {{0x0, 0x0, &(0x7f0000000440)=[{&(0x7f0000000200)="9544939c01e602e8fc696947591d4c6fb3cb9a7cf9e53555dac91c09bbd33a6e85981e045d", 0x25}, {&(0x7f0000000240)="b995a5bf327c6f291a70af1527c6eb87af6b40c22e784c7d81102b1d2c4f5434d0142b1efa49361c7fa370cde02cbad1cdf556d5ebe84042e5b1eee75566d3c3bd4e54fb80c6258eb985131872c446ae99febe93703f66f4e0e10392c8a0d30f35710c7490190fef84833442ab74de59e4c9ebbc7cfe3f26750c16970d537ab353640e9e46e706cd200383135bfbf29b19c2fe729da592a9fb74eca37cb46775eb6db0118a3c59ac107fcf691822488d67f90e891045cb2ea35a79b6cd27c9fa5f37c9f6d6e4e2ca9267b2a8aa34f9727b0f539f", 0xd4}, {&(0x7f0000000340)="529cd4456bccdb80c030fe01e5cd61704126c8d4e7ec", 0x16}, {&(0x7f0000000380)="c2597979197f75ed6b82c8bcbf2c6b92a9a53fdd74646d60f9941ca27e", 0x1d}], 0x4}}], 0x2, 0x4c004) sendmmsg(0xffffffffffffffff, &(0x7f0000007fc0), 0x800001d, 0x0) 06:08:31 executing program 5: clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f00000000c0)='systemem0md5sum$\x00', 0x0) r1 = memfd_create(&(0x7f0000000380)='\x00\x00\x00\x00\x00\x00z\x9b\xb0\t\xe9AV\xaf\x1d\xdc\xbdt\xc0\xa3i\xe9Pmd\x12{H\x86*N9k\x9a&<\b\xc8#\xe0\x88\xb6\xf9\r\xb6 e\xd6\xbc\x9e\xc1\xe8oY\xfb\xe5\xfeS%\x94\b\xbcb%\xf8\xf8\xd49_\xdc\v\xea\xdc\x97\xd1o\x17\xbf\xdbUq\xd6\x06c\xc80 \xb0\xbe\x8a\xb8\xc6\x9a\xb2A\x88\xb3\xa5\xd4\x86\xc4|\xf1\xd0\x8d\x1a\x11\xcf\xb5\xf2\xbb\x0f\x04\x19\xa2\xa8\xa0\x1cy\xd2\x97\x7f\xbc\x11l!|\x970 \x8f]\x10\a\xfc+\b\xc4D\x0eoR\xcc\x9d\xf9\x9a\x183[\xb2\xdbGs=\x93 \x1dlW\xc73\xc9\x90\xc2\xccZ\xa4!\xd1\xdd\x96\xd2c\xc6\xb8\xe1\x03\b\xa7\x14\x1d\xfe`\x98\xaaj\x00&\xc2D\x82U\b\xb9\xa7C\xb0\x94\xd8DR.\x05\x0f\xaa\xaa\x1c\rH|@v\xb6\xb5\x97\xc05\x9bU8\xad^\x9fG\xa1\xf8Ld\x15`{\x1b\xfb\xdb\xb6S\xba\x99\xdc\x98E\xb9%*\xc9\xd6\x11<\xc9\xaa\xc4xASQF\xcf\x15qz\x7ff\xf1\xb6\xf6t\xac\xa9\x1a\xc0)\x8ef\x106j\xe2\x8c\x1e<\\\xcc\xd4s\xae\xb1\xe4\xff^s\'\xe9\xda\xde\xd6\x04{\x93~B\\\xf9*\xc1\xef\xe2\xa2>\xb59\x10?\xba\x9c[\x81\x89,Y\xe7?)\xa0\x04he /sbin/init /usr/sbin/sshd /usr/sbin/sshd /bin/bash /root/syz-fuzzer /root/syz-executor.5 proc:/self/fd/4' not defined. 06:08:32 executing program 4: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000000c0)=0xe) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) ioctl$EVIOCGPROP(0xffffffffffffffff, 0x40047438, &(0x7f0000000180)=""/246) ioctl$PPPIOCSFLAGS1(0xffffffffffffffff, 0x40047457, &(0x7f0000000000)) 06:08:32 executing program 3: r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) fsopen(&(0x7f0000000200)='squashfs\x00', 0x0) 06:08:32 executing program 0: r0 = perf_event_open(&(0x7f0000000640)={0x3, 0x70, 0x3e7, 0x0, 0x4, 0x0, 0x0, 0x0, 0x91dd7106ca8fd33b, 0xdb3fedb3c3734f95, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x40000000000, 0x0, 0x1, 0x0, @perf_config_ext={0x18, 0x3}, 0x21, 0x10000000000000, 0x0, 0x0, 0x0, 0x20000007, 0x2}, 0x0, 0xc, 0xffffffffffffffff, 0xa) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='cpuacct.stat\x00', 0x0, 0x0) r2 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r2, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f00000003c0)='syz1\x00', 0x200002, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0xfffffffffffffffc) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000300)='./cgroup/syz0\x00', 0x200002, 0x0) gettid() socket$kcm(0x11, 0xb, 0x0) ioctl$TUNSETTXFILTER(r1, 0x400454d1, &(0x7f00000000c0)=ANY=[@ANYBLOB="00000700000000da6500bbc4bbbbbbbb0180c2000016000000004dc23f0c000000000000bb"]) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000040)=@ipx={0x4, 0x1, 0x0, "2bfaec665b4b", 0xff}, 0x80, 0x0}, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={0xffffffffffffffff, 0x1, 0x49c42ca22ab5a9ac, 0x4, 0x0}, 0x20) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x908b7aabaa7d2404) socket$kcm(0xa, 0x6, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x4000011) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000000c0), 0x0}, 0x28) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x89f1, &(0x7f0000000000)='ip6gre0\x00') perf_event_open(&(0x7f00000004c0)={0x0, 0x70, 0x8, 0x6, 0x0, 0x3, 0x0, 0x3, 0x4, 0x0, 0x9, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x1000, 0x0, @perf_config_ext={0x1ff}, 0x40004, 0xfffffffffffffffd, 0x0, 0x8, 0x8, 0x4, 0x80}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0x10, 0x0, 0x10) sendmsg$kcm(r4, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d200040080000048000001000080000000000300f88000f01700d4bd", 0x2e}], 0xf}, 0x40094) r5 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) socketpair(0x25, 0x6, 0x4, &(0x7f0000000480)) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f00000002c0)=r5, 0x4) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x6d, &(0x7f0000000cc0)=ANY=[@ANYRESHEX, @ANYBLOB="e99f619c950ec8069b69ac05520100000000000000572e83f4fd34a6db69715afdc8ec492fa879a8460bf2c7459f384ec36d6f0d833fccc87dc8f542ca0731ec72c3f6e0857c63572db61a83246496a2f90400569c8af42a5b8b1e3583115dfe3a40a792ffe638fd722afd02131c170175f382a8d78b6626d1d58220f08d98570bad00042a01c00748cf37385e7d66e6c0efddeb730ebd2f1ab4e816cf7493cf236ca5eb6e5d2a65519a7acf475dbd9fb52eb50ddcf9cee74529f59a2d6cfe6c23f6a688719f922099394146621132f866439970571e206ac47123f2d9cdb5cb7c8506122300000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000)={0x0, 0x8}, 0x10}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r6, 0x18000000000002a0, 0x42, 0x0, &(0x7f0000000800)="b9ff0300600d698cb89e14f088a81fffffff00004000630677fbac14140ee934a0a662079f4b4d2f87e5feca6aab845013f2325f1a39010108038da1924425181aa5", 0x0, 0x28000, 0x60000000, 0x113, 0x0, &(0x7f00000006c0)="097baacf569909ebb78a19b4d4f607feb3072ad9474026c7c148d184a2647de87a8fd14ad5d15cadabd6c7545b05000000ad90e0d4000000000f3f750d2a75f6fa77d3fa4e023987f7a54b04eb238604aa90cab7b44f95ae6ce9b5f877439af64cb6573e5bc85c5e766604ff55b7a234246bd2ee44c9e99d69190bbe089603846d17b8678d05a0bda6ae300ca8c43271b65bb62b0af61bf4da3891f5bcf900ed368b36e2db9957b0dfa5cf084db8cb2b2c54661f9eac8a58a72fc9e768405eb33bce450dd088d2e16d757eeb1239a2389330535afb4944b7b27c4b26d812ab58864f3ffa3ce8cf739275492a0c90b425a792a19b9abf846b926e9f93f4b57ab77c0db63fb7d5a1e04ef52157f14f1dedcc4437"}, 0x40) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x17, 0x6, &(0x7f0000000c00)=ANY=[], &(0x7f00000002c0)='GPL\x00', 0x2, 0x0, 0x0, 0x40f00, 0x8, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000340)={0x1, 0x10000003}, 0x8, 0x10, &(0x7f0000000380)={0x0, 0xa, 0x83, 0x2}, 0x10}, 0x78) ioctl$sock_kcm_SIOCKCMATTACH(r4, 0x89e0, &(0x7f0000000500)={0xffffffffffffffff, r7}) 06:08:32 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$inet_udp_int(r0, 0x11, 0x67, &(0x7f0000000140)=0x6, 0x4) sendmmsg(r0, &(0x7f0000006f00)=[{{&(0x7f0000000040)=@in={0x2, 0x4e23, @remote}, 0x80, &(0x7f0000000100)=[{&(0x7f00000000c0)="e04013b497936ecafdd12c496f522cc2830fd358bc8f890e410223906070a39cc6e2f84a8622c5f86cad52bba1560397737a6cce189d7db27e", 0x39}], 0x1}}, {{0x0, 0x0, &(0x7f0000000440)=[{&(0x7f0000000200)="9544939c01e602e8fc696947591d4c6fb3cb9a7cf9e53555dac91c09bbd33a6e85981e045d", 0x25}, {&(0x7f0000000240)="b995a5bf327c6f291a70af1527c6eb87af6b40c22e784c7d81102b1d2c4f5434d0142b1efa49361c7fa370cde02cbad1cdf556d5ebe84042e5b1eee75566d3c3bd4e54fb80c6258eb985131872c446ae99febe93703f66f4e0e10392c8a0d30f35710c7490190fef84833442ab74de59e4c9ebbc7cfe3f26750c16970d537ab353640e9e46e706cd200383135bfbf29b19c2fe729da592a9fb74eca37cb46775eb6db0118a3c59ac107fcf691822488d67f90e891045cb2ea35a79b6cd27c9fa5f37c9f6d6e4e2ca9267b2a8aa34f9727b0f539f", 0xd4}, {&(0x7f0000000340)="529cd4456bccdb80c030fe01e5cd61704126c8d4e7ec", 0x16}, {&(0x7f0000000380)="c2597979197f75ed6b82c8bcbf2c6b92a9a53fdd74646d60f9941ca27e", 0x1d}], 0x4}}], 0x2, 0x4c004) sendmmsg(r0, &(0x7f0000007fc0), 0x800001d, 0x0) [ 215.510767][ T9200] IPVS: ftp: loaded support on port[0] = 21 06:08:32 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000001b00)={0xa, 0x1d, 0x400, 0xc}, 0x3c) bpf$MAP_UPDATE_ELEM(0x2, 0x0, 0x0) bpf$MAP_UPDATE_ELEM(0x2, 0x0, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={r0, &(0x7f0000000240)='K', &(0x7f0000000100)}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000000c0)={r0, &(0x7f0000000180), &(0x7f0000000180)}, 0x20) bpf$MAP_UPDATE_ELEM(0x4, &(0x7f0000000040)={r0, &(0x7f00000001c0), &(0x7f0000000440)}, 0x20) 06:08:32 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'syzkaller1\x00', 0x300704cdda2b62d6}) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8916, &(0x7f0000000180)={'syzkaller1\x00', {0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x10}}}) r2 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r2, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @private}}) dup3(r1, r0, 0x0) 06:08:32 executing program 3: r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) fsopen(&(0x7f0000000200)='squashfs\x00', 0x0) 06:08:32 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$inet_udp_int(r0, 0x11, 0x67, &(0x7f0000000140)=0x6, 0x4) sendmmsg(r0, &(0x7f0000006f00)=[{{&(0x7f0000000040)=@in={0x2, 0x4e23, @remote}, 0x80, &(0x7f0000000100)=[{&(0x7f00000000c0)="e04013b497936ecafdd12c496f522cc2830fd358bc8f890e410223906070a39cc6e2f84a8622c5f86cad52bba1560397737a6cce189d7db27e", 0x39}], 0x1}}, {{0x0, 0x0, &(0x7f0000000440)=[{&(0x7f0000000200)="9544939c01e602e8fc696947591d4c6fb3cb9a7cf9e53555dac91c09bbd33a6e85981e045d", 0x25}, {&(0x7f0000000240)="b995a5bf327c6f291a70af1527c6eb87af6b40c22e784c7d81102b1d2c4f5434d0142b1efa49361c7fa370cde02cbad1cdf556d5ebe84042e5b1eee75566d3c3bd4e54fb80c6258eb985131872c446ae99febe93703f66f4e0e10392c8a0d30f35710c7490190fef84833442ab74de59e4c9ebbc7cfe3f26750c16970d537ab353640e9e46e706cd200383135bfbf29b19c2fe729da592a9fb74eca37cb46775eb6db0118a3c59ac107fcf691822488d67f90e891045cb2ea35a79b6cd27c9fa5f37c9f6d6e4e2ca9267b2a8aa34f9727b0f539f", 0xd4}, {&(0x7f0000000340)="529cd4456bccdb80c030fe01e5cd61704126c8d4e7ec", 0x16}, {&(0x7f0000000380)="c2597979197f75ed6b82c8bcbf2c6b92a9a53fdd74646d60f9941ca27e", 0x1d}], 0x4}}], 0x2, 0x4c004) sendmmsg(r0, &(0x7f0000007fc0), 0x800001d, 0x0) 06:08:32 executing program 0: r0 = perf_event_open(&(0x7f0000000640)={0x3, 0x70, 0x3e7, 0x0, 0x4, 0x0, 0x0, 0x0, 0x91dd7106ca8fd33b, 0xdb3fedb3c3734f95, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x40000000000, 0x0, 0x1, 0x0, @perf_config_ext={0x18, 0x3}, 0x21, 0x10000000000000, 0x0, 0x0, 0x0, 0x20000007, 0x2}, 0x0, 0xc, 0xffffffffffffffff, 0xa) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='cpuacct.stat\x00', 0x0, 0x0) r2 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r2, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f00000003c0)='syz1\x00', 0x200002, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0xfffffffffffffffc) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000300)='./cgroup/syz0\x00', 0x200002, 0x0) gettid() socket$kcm(0x11, 0xb, 0x0) ioctl$TUNSETTXFILTER(r1, 0x400454d1, &(0x7f00000000c0)=ANY=[@ANYBLOB="00000700000000da6500bbc4bbbbbbbb0180c2000016000000004dc23f0c000000000000bb"]) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000040)=@ipx={0x4, 0x1, 0x0, "2bfaec665b4b", 0xff}, 0x80, 0x0}, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={0xffffffffffffffff, 0x1, 0x49c42ca22ab5a9ac, 0x4, 0x0}, 0x20) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x908b7aabaa7d2404) socket$kcm(0xa, 0x6, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x4000011) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000000c0), 0x0}, 0x28) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x89f1, &(0x7f0000000000)='ip6gre0\x00') perf_event_open(&(0x7f00000004c0)={0x0, 0x70, 0x8, 0x6, 0x0, 0x3, 0x0, 0x3, 0x4, 0x0, 0x9, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x1000, 0x0, @perf_config_ext={0x1ff}, 0x40004, 0xfffffffffffffffd, 0x0, 0x8, 0x8, 0x4, 0x80}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0x10, 0x0, 0x10) sendmsg$kcm(r4, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d200040080000048000001000080000000000300f88000f01700d4bd", 0x2e}], 0xf}, 0x40094) r5 = socket$kcm(0x2, 0x1, 0x2) socketpair(0x25, 0x6, 0x4, &(0x7f0000000480)) setsockopt$sock_attach_bpf(r5, 0x1, 0x3e, &(0x7f00000002c0), 0x4) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x6d, &(0x7f0000000cc0)=ANY=[@ANYRESHEX, @ANYBLOB="e99f619c950ec8069b69ac05520100000000000000572e83f4fd34a6db69715afdc8ec492fa879a8460bf2c7459f384ec36d6f0d833fccc87dc8f542ca0731ec72c3f6e0857c63572db61a83246496a2f90400569c8af42a5b8b1e3583115dfe3a40a792ffe638fd722afd02131c170175f382a8d78b6626d1d58220f08d98570bad00042a01c00748cf37385e7d66e6c0efddeb730ebd2f1ab4e816cf7493cf236ca5eb6e5d2a65519a7acf475dbd9fb52eb50ddcf9cee74529f59a2d6cfe6c23f6a688719f922099394146621132f866439970571e206ac47123f2d9cdb5cb7c8506122300000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000)={0x0, 0x8}, 0x10}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r6, 0x18000000000002a0, 0x42, 0x0, &(0x7f0000000800)="b9ff0300600d698cb89e14f088a81fffffff00004000630677fbac14140ee934a0a662079f4b4d2f87e5feca6aab845013f2325f1a39010108038da1924425181aa5", 0x0, 0x28000, 0x60000000, 0x113, 0x0, &(0x7f00000006c0)="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"}, 0x40) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x17, 0x6, &(0x7f0000000c00)=ANY=[], &(0x7f00000002c0)='GPL\x00', 0x2, 0x0, 0x0, 0x40f00, 0x8, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000340)={0x1, 0x10000003}, 0x8, 0x10, &(0x7f0000000380)={0x0, 0xa, 0x83, 0x2}, 0x10}, 0x78) ioctl$sock_kcm_SIOCKCMATTACH(r4, 0x89e0, &(0x7f0000000500)={0xffffffffffffffff, r7}) 06:08:32 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$inet_udp_int(r0, 0x11, 0x67, &(0x7f0000000140)=0x6, 0x4) sendmmsg(r0, &(0x7f0000006f00)=[{{&(0x7f0000000040)=@in={0x2, 0x4e23, @remote}, 0x80, &(0x7f0000000100)=[{&(0x7f00000000c0)="e04013b497936ecafdd12c496f522cc2830fd358bc8f890e410223906070a39cc6e2f84a8622c5f86cad52bba1560397737a6cce189d7db27e", 0x39}], 0x1}}, {{0x0, 0x0, &(0x7f0000000440)=[{&(0x7f0000000200)="9544939c01e602e8fc696947591d4c6fb3cb9a7cf9e53555dac91c09bbd33a6e85981e045d", 0x25}, {&(0x7f0000000240)="b995a5bf327c6f291a70af1527c6eb87af6b40c22e784c7d81102b1d2c4f5434d0142b1efa49361c7fa370cde02cbad1cdf556d5ebe84042e5b1eee75566d3c3bd4e54fb80c6258eb985131872c446ae99febe93703f66f4e0e10392c8a0d30f35710c7490190fef84833442ab74de59e4c9ebbc7cfe3f26750c16970d537ab353640e9e46e706cd200383135bfbf29b19c2fe729da592a9fb74eca37cb46775eb6db0118a3c59ac107fcf691822488d67f90e891045cb2ea35a79b6cd27c9fa5f37c9f6d6e4e2ca9267b2a8aa34f9727b0f539f", 0xd4}, {&(0x7f0000000340)="529cd4456bccdb80c030fe01e5cd61704126c8d4e7ec", 0x16}, {&(0x7f0000000380)="c2597979197f75ed6b82c8bcbf2c6b92a9a53fdd74646d60f9941ca27e", 0x1d}], 0x4}}], 0x2, 0x4c004) sendmmsg(r0, &(0x7f0000007fc0), 0x800001d, 0x0) 06:08:33 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(0xffffffffffffffff, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) fsopen(&(0x7f0000000200)='squashfs\x00', 0x0) 06:08:33 executing program 2: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x0, 0x0) pipe(&(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r1, 0x407, 0x0) write(r1, &(0x7f0000000340), 0x41395527) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000100)='mountinfo\x00') preadv(r2, 0x0, 0x0, 0x0) epoll_create(0x8) ioctl$SNDRV_TIMER_IOCTL_INFO(r1, 0x80e85411, &(0x7f0000000040)=""/45) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f0000000300)={0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x2}, 0x0, &(0x7f0000000080)={0x1ff, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x8000000000000002, 0x8, 0x2}, 0x0, 0x0) 06:08:33 executing program 4: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000000c0)=0xe) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) ioctl$EVIOCGPROP(0xffffffffffffffff, 0x40047438, &(0x7f0000000180)=""/246) ioctl$PPPIOCSFLAGS1(0xffffffffffffffff, 0x40047457, &(0x7f0000000000)) 06:08:33 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) setsockopt$inet_udp_int(r0, 0x11, 0x67, &(0x7f0000000140)=0x6, 0x4) sendmmsg(r0, &(0x7f0000006f00)=[{{&(0x7f0000000040)=@in={0x2, 0x4e23, @remote}, 0x80, &(0x7f0000000100)=[{&(0x7f00000000c0)="e04013b497936ecafdd12c496f522cc2830fd358bc8f890e410223906070a39cc6e2f84a8622c5f86cad52bba1560397737a6cce189d7db27e", 0x39}], 0x1}}, {{0x0, 0x0, &(0x7f0000000440)=[{&(0x7f0000000200)="9544939c01e602e8fc696947591d4c6fb3cb9a7cf9e53555dac91c09bbd33a6e85981e045d", 0x25}, {&(0x7f0000000240)="b995a5bf327c6f291a70af1527c6eb87af6b40c22e784c7d81102b1d2c4f5434d0142b1efa49361c7fa370cde02cbad1cdf556d5ebe84042e5b1eee75566d3c3bd4e54fb80c6258eb985131872c446ae99febe93703f66f4e0e10392c8a0d30f35710c7490190fef84833442ab74de59e4c9ebbc7cfe3f26750c16970d537ab353640e9e46e706cd200383135bfbf29b19c2fe729da592a9fb74eca37cb46775eb6db0118a3c59ac107fcf691822488d67f90e891045cb2ea35a79b6cd27c9fa5f37c9f6d6e4e2ca9267b2a8aa34f9727b0f539f", 0xd4}, {&(0x7f0000000340)="529cd4456bccdb80c030fe01e5cd61704126c8d4e7ec", 0x16}, {&(0x7f0000000380)="c2597979197f75ed6b82c8bcbf2c6b92a9a53fdd74646d60f9941ca27e", 0x1d}], 0x4}}], 0x2, 0x4c004) sendmmsg(r0, &(0x7f0000007fc0), 0x800001d, 0x0) 06:08:33 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(0xffffffffffffffff, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) fsopen(&(0x7f0000000200)='squashfs\x00', 0x0) 06:08:33 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(0xffffffffffffffff, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) fsopen(&(0x7f0000000200)='squashfs\x00', 0x0) 06:08:33 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) setsockopt$inet_udp_int(r0, 0x11, 0x67, &(0x7f0000000140)=0x6, 0x4) sendmmsg(r0, &(0x7f0000006f00)=[{{&(0x7f0000000040)=@in={0x2, 0x4e23, @remote}, 0x80, &(0x7f0000000100)=[{&(0x7f00000000c0)="e04013b497936ecafdd12c496f522cc2830fd358bc8f890e410223906070a39cc6e2f84a8622c5f86cad52bba1560397737a6cce189d7db27e", 0x39}], 0x1}}, {{0x0, 0x0, &(0x7f0000000440)=[{&(0x7f0000000200)="9544939c01e602e8fc696947591d4c6fb3cb9a7cf9e53555dac91c09bbd33a6e85981e045d", 0x25}, {&(0x7f0000000240)="b995a5bf327c6f291a70af1527c6eb87af6b40c22e784c7d81102b1d2c4f5434d0142b1efa49361c7fa370cde02cbad1cdf556d5ebe84042e5b1eee75566d3c3bd4e54fb80c6258eb985131872c446ae99febe93703f66f4e0e10392c8a0d30f35710c7490190fef84833442ab74de59e4c9ebbc7cfe3f26750c16970d537ab353640e9e46e706cd200383135bfbf29b19c2fe729da592a9fb74eca37cb46775eb6db0118a3c59ac107fcf691822488d67f90e891045cb2ea35a79b6cd27c9fa5f37c9f6d6e4e2ca9267b2a8aa34f9727b0f539f", 0xd4}, {&(0x7f0000000340)="529cd4456bccdb80c030fe01e5cd61704126c8d4e7ec", 0x16}, {&(0x7f0000000380)="c2597979197f75ed6b82c8bcbf2c6b92a9a53fdd74646d60f9941ca27e", 0x1d}], 0x4}}], 0x2, 0x4c004) sendmmsg(r0, &(0x7f0000007fc0), 0x800001d, 0x0) [ 216.517576][ T9258] IPVS: ftp: loaded support on port[0] = 21 06:08:34 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) exit_group(0x0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$IPT_SO_SET_REPLACE(r2, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0x3, 0x290, 0xf0, 0x0, 0x0, 0xf0, 0x0, 0x1f8, 0x1f8, 0x1f8, 0x1f8, 0x1f8, 0x3, 0x0, {[{{@ip={@multicast1, @local, 0x0, 0x0, 'ip6gretap0\x00'}, 0x0, 0xd0, 0xf0, 0x0, {}, [@common=@inet=@l2tp={{0x30, 'l2tp\x00'}, {0x0, 0x0, 0x2, 0x0, 0x7}}, @common=@ah={{0x30, 'ah\x00'}}]}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}, {{@uncond, 0x0, 0xa0, 0x108, 0x0, {}, [@common=@ah={{0x30, 'ah\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'netbios-ns\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x2f0) 06:08:34 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) setsockopt$inet_udp_int(r0, 0x11, 0x67, &(0x7f0000000140)=0x6, 0x4) sendmmsg(r0, &(0x7f0000006f00)=[{{&(0x7f0000000040)=@in={0x2, 0x4e23, @remote}, 0x80, &(0x7f0000000100)=[{&(0x7f00000000c0)="e04013b497936ecafdd12c496f522cc2830fd358bc8f890e410223906070a39cc6e2f84a8622c5f86cad52bba1560397737a6cce189d7db27e", 0x39}], 0x1}}, {{0x0, 0x0, &(0x7f0000000440)=[{&(0x7f0000000200)="9544939c01e602e8fc696947591d4c6fb3cb9a7cf9e53555dac91c09bbd33a6e85981e045d", 0x25}, {&(0x7f0000000240)="b995a5bf327c6f291a70af1527c6eb87af6b40c22e784c7d81102b1d2c4f5434d0142b1efa49361c7fa370cde02cbad1cdf556d5ebe84042e5b1eee75566d3c3bd4e54fb80c6258eb985131872c446ae99febe93703f66f4e0e10392c8a0d30f35710c7490190fef84833442ab74de59e4c9ebbc7cfe3f26750c16970d537ab353640e9e46e706cd200383135bfbf29b19c2fe729da592a9fb74eca37cb46775eb6db0118a3c59ac107fcf691822488d67f90e891045cb2ea35a79b6cd27c9fa5f37c9f6d6e4e2ca9267b2a8aa34f9727b0f539f", 0xd4}, {&(0x7f0000000340)="529cd4456bccdb80c030fe01e5cd61704126c8d4e7ec", 0x16}, {&(0x7f0000000380)="c2597979197f75ed6b82c8bcbf2c6b92a9a53fdd74646d60f9941ca27e", 0x1d}], 0x4}}], 0x2, 0x4c004) sendmmsg(r0, &(0x7f0000007fc0), 0x800001d, 0x0) 06:08:34 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) fsopen(&(0x7f0000000200)='squashfs\x00', 0x0) 06:08:34 executing program 0: r0 = perf_event_open(&(0x7f0000000640)={0x3, 0x70, 0x3e7, 0x0, 0x4, 0x0, 0x0, 0x0, 0x91dd7106ca8fd33b, 0xdb3fedb3c3734f95, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x40000000000, 0x0, 0x1, 0x0, @perf_config_ext={0x18, 0x3}, 0x21, 0x10000000000000, 0x0, 0x0, 0x0, 0x20000007, 0x2}, 0x0, 0xc, 0xffffffffffffffff, 0xa) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='cpuacct.stat\x00', 0x0, 0x0) r2 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r2, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f00000003c0)='syz1\x00', 0x200002, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0xfffffffffffffffc) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000300)='./cgroup/syz0\x00', 0x200002, 0x0) gettid() socket$kcm(0x11, 0xb, 0x0) ioctl$TUNSETTXFILTER(r1, 0x400454d1, &(0x7f00000000c0)=ANY=[@ANYBLOB="00000700000000da6500bbc4bbbbbbbb0180c2000016000000004dc23f0c000000000000bb"]) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000040)=@ipx={0x4, 0x1, 0x0, "2bfaec665b4b", 0xff}, 0x80, 0x0}, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={0xffffffffffffffff, 0x1, 0x49c42ca22ab5a9ac, 0x4, 0x0}, 0x20) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x908b7aabaa7d2404) socket$kcm(0xa, 0x6, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x4000011) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000000c0), 0x0}, 0x28) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x89f1, &(0x7f0000000000)='ip6gre0\x00') perf_event_open(&(0x7f00000004c0)={0x0, 0x70, 0x8, 0x6, 0x0, 0x3, 0x0, 0x3, 0x4, 0x0, 0x9, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x1000, 0x0, @perf_config_ext={0x1ff}, 0x40004, 0xfffffffffffffffd, 0x0, 0x8, 0x8, 0x4, 0x80}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0x10, 0x0, 0x10) sendmsg$kcm(r4, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d200040080000048000001000080000000000300f88000f01700d4bd", 0x2e}], 0xf}, 0x40094) r5 = socket$kcm(0x2, 0x1, 0x2) socketpair(0x25, 0x6, 0x4, &(0x7f0000000480)) setsockopt$sock_attach_bpf(r5, 0x1, 0x3e, &(0x7f00000002c0), 0x4) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x6d, &(0x7f0000000cc0)=ANY=[@ANYRESHEX, @ANYBLOB="e99f619c950ec8069b69ac05520100000000000000572e83f4fd34a6db69715afdc8ec492fa879a8460bf2c7459f384ec36d6f0d833fccc87dc8f542ca0731ec72c3f6e0857c63572db61a83246496a2f90400569c8af42a5b8b1e3583115dfe3a40a792ffe638fd722afd02131c170175f382a8d78b6626d1d58220f08d98570bad00042a01c00748cf37385e7d66e6c0efddeb730ebd2f1ab4e816cf7493cf236ca5eb6e5d2a65519a7acf475dbd9fb52eb50ddcf9cee74529f59a2d6cfe6c23f6a688719f922099394146621132f866439970571e206ac47123f2d9cdb5cb7c8506122300000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000)={0x0, 0x8}, 0x10}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r6, 0x18000000000002a0, 0x42, 0x0, &(0x7f0000000800)="b9ff0300600d698cb89e14f088a81fffffff00004000630677fbac14140ee934a0a662079f4b4d2f87e5feca6aab845013f2325f1a39010108038da1924425181aa5", 0x0, 0x28000, 0x60000000, 0x113, 0x0, &(0x7f00000006c0)="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"}, 0x40) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x17, 0x6, &(0x7f0000000c00)=ANY=[], &(0x7f00000002c0)='GPL\x00', 0x2, 0x0, 0x0, 0x40f00, 0x8, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000340)={0x1, 0x10000003}, 0x8, 0x10, &(0x7f0000000380)={0x0, 0xa, 0x83, 0x2}, 0x10}, 0x78) ioctl$sock_kcm_SIOCKCMATTACH(r4, 0x89e0, &(0x7f0000000500)={0xffffffffffffffff, r7}) 06:08:34 executing program 4: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000000c0)=0xe) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) ioctl$EVIOCGPROP(0xffffffffffffffff, 0x40047438, &(0x7f0000000180)=""/246) ioctl$PPPIOCSFLAGS1(0xffffffffffffffff, 0x40047457, &(0x7f0000000000)) 06:08:34 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) fsopen(&(0x7f0000000200)='squashfs\x00', 0x0) 06:08:34 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$BATADV_CMD_GET_MESH(r2, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) getsockname$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x28a) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000500)={&(0x7f00000000c0)=ANY=[@ANYBLOB="480000001000390400"/20, @ANYRES32=r4, @ANYBLOB="03000000000000002000128008000100736974001400028008000100", @ANYRES32=r3], 0x48}}, 0x0) setsockopt$inet_mreqn(r0, 0x0, 0x20, &(0x7f0000000080)={@loopback, @empty, r3}, 0xc) connect$inet(r0, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) 06:08:34 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x0) setsockopt$inet_udp_int(r0, 0x11, 0x67, &(0x7f0000000140)=0x6, 0x4) sendmmsg(r0, &(0x7f0000006f00)=[{{&(0x7f0000000040)=@in={0x2, 0x4e23, @remote}, 0x80, &(0x7f0000000100)=[{&(0x7f00000000c0)="e04013b497936ecafdd12c496f522cc2830fd358bc8f890e410223906070a39cc6e2f84a8622c5f86cad52bba1560397737a6cce189d7db27e", 0x39}], 0x1}}, {{0x0, 0x0, &(0x7f0000000440)=[{&(0x7f0000000200)="9544939c01e602e8fc696947591d4c6fb3cb9a7cf9e53555dac91c09bbd33a6e85981e045d", 0x25}, {&(0x7f0000000240)="b995a5bf327c6f291a70af1527c6eb87af6b40c22e784c7d81102b1d2c4f5434d0142b1efa49361c7fa370cde02cbad1cdf556d5ebe84042e5b1eee75566d3c3bd4e54fb80c6258eb985131872c446ae99febe93703f66f4e0e10392c8a0d30f35710c7490190fef84833442ab74de59e4c9ebbc7cfe3f26750c16970d537ab353640e9e46e706cd200383135bfbf29b19c2fe729da592a9fb74eca37cb46775eb6db0118a3c59ac107fcf691822488d67f90e891045cb2ea35a79b6cd27c9fa5f37c9f6d6e4e2ca9267b2a8aa34f9727b0f539f", 0xd4}, {&(0x7f0000000340)="529cd4456bccdb80c030fe01e5cd61704126c8d4e7ec", 0x16}, {&(0x7f0000000380)="c2597979197f75ed6b82c8bcbf2c6b92a9a53fdd74646d60f9941ca27e", 0x1d}], 0x4}}], 0x2, 0x4c004) sendmmsg(r0, &(0x7f0000007fc0), 0x800001d, 0x0) [ 217.329319][ T9314] IPVS: ftp: loaded support on port[0] = 21 [ 217.367258][ T9316] xt_l2tp: missing protocol rule (udp|l2tpip) 06:08:34 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) gettid() tkill(0x0, 0x0) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000180)={0x48, 0x2, 0x6, 0x5, 0x6c000000, 0x0, {}, [@IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_TYPENAME={0xd, 0x3, 'hash:mac\x00'}]}, 0x48}}, 0x0) 06:08:34 executing program 0: r0 = perf_event_open(&(0x7f0000000640)={0x3, 0x70, 0x3e7, 0x0, 0x4, 0x0, 0x0, 0x0, 0x91dd7106ca8fd33b, 0xdb3fedb3c3734f95, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x40000000000, 0x0, 0x1, 0x0, @perf_config_ext={0x18, 0x3}, 0x21, 0x10000000000000, 0x0, 0x0, 0x0, 0x20000007, 0x2}, 0x0, 0xc, 0xffffffffffffffff, 0xa) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='cpuacct.stat\x00', 0x0, 0x0) r2 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r2, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f00000003c0)='syz1\x00', 0x200002, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0xfffffffffffffffc) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000300)='./cgroup/syz0\x00', 0x200002, 0x0) gettid() socket$kcm(0x11, 0xb, 0x0) ioctl$TUNSETTXFILTER(r1, 0x400454d1, &(0x7f00000000c0)=ANY=[@ANYBLOB="00000700000000da6500bbc4bbbbbbbb0180c2000016000000004dc23f0c000000000000bb"]) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000040)=@ipx={0x4, 0x1, 0x0, "2bfaec665b4b", 0xff}, 0x80, 0x0}, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={0xffffffffffffffff, 0x1, 0x49c42ca22ab5a9ac, 0x4, 0x0}, 0x20) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x908b7aabaa7d2404) socket$kcm(0xa, 0x6, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x4000011) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000000c0), 0x0}, 0x28) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x89f1, &(0x7f0000000000)='ip6gre0\x00') perf_event_open(&(0x7f00000004c0)={0x0, 0x70, 0x8, 0x6, 0x0, 0x3, 0x0, 0x3, 0x4, 0x0, 0x9, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x1000, 0x0, @perf_config_ext={0x1ff}, 0x40004, 0xfffffffffffffffd, 0x0, 0x8, 0x8, 0x4, 0x80}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0x10, 0x0, 0x10) sendmsg$kcm(r4, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d200040080000048000001000080000000000300f88000f01700d4bd", 0x2e}], 0xf}, 0x40094) r5 = socket$kcm(0x2, 0x1, 0x2) socketpair(0x25, 0x6, 0x4, &(0x7f0000000480)) setsockopt$sock_attach_bpf(r5, 0x1, 0x3e, &(0x7f00000002c0), 0x4) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x6d, &(0x7f0000000cc0)=ANY=[@ANYRESHEX, @ANYBLOB="e99f619c950ec8069b69ac05520100000000000000572e83f4fd34a6db69715afdc8ec492fa879a8460bf2c7459f384ec36d6f0d833fccc87dc8f542ca0731ec72c3f6e0857c63572db61a83246496a2f90400569c8af42a5b8b1e3583115dfe3a40a792ffe638fd722afd02131c170175f382a8d78b6626d1d58220f08d98570bad00042a01c00748cf37385e7d66e6c0efddeb730ebd2f1ab4e816cf7493cf236ca5eb6e5d2a65519a7acf475dbd9fb52eb50ddcf9cee74529f59a2d6cfe6c23f6a688719f922099394146621132f866439970571e206ac47123f2d9cdb5cb7c8506122300000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000)={0x0, 0x8}, 0x10}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r6, 0x18000000000002a0, 0x42, 0x0, &(0x7f0000000800)="b9ff0300600d698cb89e14f088a81fffffff00004000630677fbac14140ee934a0a662079f4b4d2f87e5feca6aab845013f2325f1a39010108038da1924425181aa5", 0x0, 0x28000, 0x60000000, 0x113, 0x0, &(0x7f00000006c0)="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"}, 0x40) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x17, 0x6, &(0x7f0000000c00)=ANY=[], &(0x7f00000002c0)='GPL\x00', 0x2, 0x0, 0x0, 0x40f00, 0x8, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000340)={0x1, 0x10000003}, 0x8, 0x10, &(0x7f0000000380)={0x0, 0xa, 0x83, 0x2}, 0x10}, 0x78) ioctl$sock_kcm_SIOCKCMATTACH(r4, 0x89e0, &(0x7f0000000500)={0xffffffffffffffff, r7}) [ 217.482083][ T9330] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.2'. 06:08:34 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) fsopen(&(0x7f0000000200)='squashfs\x00', 0x0) 06:08:34 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x0) setsockopt$inet_udp_int(r0, 0x11, 0x67, &(0x7f0000000140)=0x6, 0x4) sendmmsg(r0, &(0x7f0000006f00)=[{{&(0x7f0000000040)=@in={0x2, 0x4e23, @remote}, 0x80, &(0x7f0000000100)=[{&(0x7f00000000c0)="e04013b497936ecafdd12c496f522cc2830fd358bc8f890e410223906070a39cc6e2f84a8622c5f86cad52bba1560397737a6cce189d7db27e", 0x39}], 0x1}}, {{0x0, 0x0, &(0x7f0000000440)=[{&(0x7f0000000200)="9544939c01e602e8fc696947591d4c6fb3cb9a7cf9e53555dac91c09bbd33a6e85981e045d", 0x25}, {&(0x7f0000000240)="b995a5bf327c6f291a70af1527c6eb87af6b40c22e784c7d81102b1d2c4f5434d0142b1efa49361c7fa370cde02cbad1cdf556d5ebe84042e5b1eee75566d3c3bd4e54fb80c6258eb985131872c446ae99febe93703f66f4e0e10392c8a0d30f35710c7490190fef84833442ab74de59e4c9ebbc7cfe3f26750c16970d537ab353640e9e46e706cd200383135bfbf29b19c2fe729da592a9fb74eca37cb46775eb6db0118a3c59ac107fcf691822488d67f90e891045cb2ea35a79b6cd27c9fa5f37c9f6d6e4e2ca9267b2a8aa34f9727b0f539f", 0xd4}, {&(0x7f0000000340)="529cd4456bccdb80c030fe01e5cd61704126c8d4e7ec", 0x16}, {&(0x7f0000000380)="c2597979197f75ed6b82c8bcbf2c6b92a9a53fdd74646d60f9941ca27e", 0x1d}], 0x4}}], 0x2, 0x4c004) sendmmsg(r0, &(0x7f0000007fc0), 0x800001d, 0x0) [ 217.531243][ T9330] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.2'. 06:08:34 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(r4, &(0x7f0000000100)={0x26, 'hash\x00', 0x0, 0x0, 'crct10dif-generic\x00'}, 0x58) r5 = accept$alg(r4, 0x0, 0x0) r6 = accept4(r5, 0x0, 0x0, 0x0) splice(r0, 0x0, r6, 0x0, 0x30007, 0x0) 06:08:34 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) fsopen(&(0x7f0000000200)='squashfs\x00', 0x0) [ 217.643307][ T9338] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.2'. [ 217.667257][ T9338] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.2'. 06:08:34 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x0) setsockopt$inet_udp_int(r0, 0x11, 0x67, &(0x7f0000000140)=0x6, 0x4) sendmmsg(r0, &(0x7f0000006f00)=[{{&(0x7f0000000040)=@in={0x2, 0x4e23, @remote}, 0x80, &(0x7f0000000100)=[{&(0x7f00000000c0)="e04013b497936ecafdd12c496f522cc2830fd358bc8f890e410223906070a39cc6e2f84a8622c5f86cad52bba1560397737a6cce189d7db27e", 0x39}], 0x1}}, {{0x0, 0x0, &(0x7f0000000440)=[{&(0x7f0000000200)="9544939c01e602e8fc696947591d4c6fb3cb9a7cf9e53555dac91c09bbd33a6e85981e045d", 0x25}, {&(0x7f0000000240)="b995a5bf327c6f291a70af1527c6eb87af6b40c22e784c7d81102b1d2c4f5434d0142b1efa49361c7fa370cde02cbad1cdf556d5ebe84042e5b1eee75566d3c3bd4e54fb80c6258eb985131872c446ae99febe93703f66f4e0e10392c8a0d30f35710c7490190fef84833442ab74de59e4c9ebbc7cfe3f26750c16970d537ab353640e9e46e706cd200383135bfbf29b19c2fe729da592a9fb74eca37cb46775eb6db0118a3c59ac107fcf691822488d67f90e891045cb2ea35a79b6cd27c9fa5f37c9f6d6e4e2ca9267b2a8aa34f9727b0f539f", 0xd4}, {&(0x7f0000000340)="529cd4456bccdb80c030fe01e5cd61704126c8d4e7ec", 0x16}, {&(0x7f0000000380)="c2597979197f75ed6b82c8bcbf2c6b92a9a53fdd74646d60f9941ca27e", 0x1d}], 0x4}}], 0x2, 0x4c004) sendmmsg(r0, &(0x7f0000007fc0), 0x800001d, 0x0) 06:08:34 executing program 2: clone(0x2102005ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() tkill(r0, 0x38) r1 = socket$nl_generic(0x10, 0x3, 0x10) bind$netlink(r1, &(0x7f0000000040)={0x10, 0x0, 0x0, 0x4008000}, 0xc) 06:08:34 executing program 4: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000000c0)=0xe) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r1, 0x40047438, &(0x7f0000000180)=""/246) ioctl$PPPIOCSFLAGS1(r1, 0x40047457, &(0x7f0000000000)) 06:08:34 executing program 0: r0 = perf_event_open(&(0x7f0000000640)={0x3, 0x70, 0x3e7, 0x0, 0x4, 0x0, 0x0, 0x0, 0x91dd7106ca8fd33b, 0xdb3fedb3c3734f95, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x40000000000, 0x0, 0x1, 0x0, @perf_config_ext={0x18, 0x3}, 0x21, 0x10000000000000, 0x0, 0x0, 0x0, 0x20000007, 0x2}, 0x0, 0xc, 0xffffffffffffffff, 0xa) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='cpuacct.stat\x00', 0x0, 0x0) r2 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r2, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f00000003c0)='syz1\x00', 0x200002, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0xfffffffffffffffc) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000300)='./cgroup/syz0\x00', 0x200002, 0x0) gettid() socket$kcm(0x11, 0xb, 0x0) ioctl$TUNSETTXFILTER(r1, 0x400454d1, &(0x7f00000000c0)=ANY=[@ANYBLOB="00000700000000da6500bbc4bbbbbbbb0180c2000016000000004dc23f0c000000000000bb"]) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000040)=@ipx={0x4, 0x1, 0x0, "2bfaec665b4b", 0xff}, 0x80, 0x0}, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={0xffffffffffffffff, 0x1, 0x49c42ca22ab5a9ac, 0x4, 0x0}, 0x20) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x908b7aabaa7d2404) socket$kcm(0xa, 0x6, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x4000011) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000000c0), 0x0}, 0x28) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x89f1, &(0x7f0000000000)='ip6gre0\x00') perf_event_open(&(0x7f00000004c0)={0x0, 0x70, 0x8, 0x6, 0x0, 0x3, 0x0, 0x3, 0x4, 0x0, 0x9, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x1000, 0x0, @perf_config_ext={0x1ff}, 0x40004, 0xfffffffffffffffd, 0x0, 0x8, 0x8, 0x4, 0x80}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0x10, 0x0, 0x10) r5 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r6 = socket$kcm(0x2, 0x1, 0x2) socketpair(0x25, 0x6, 0x4, &(0x7f0000000480)) setsockopt$sock_attach_bpf(r6, 0x1, 0x3e, &(0x7f00000002c0)=r5, 0x4) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x6d, &(0x7f0000000cc0)=ANY=[@ANYRESHEX, @ANYBLOB="e99f619c950ec8069b69ac05520100000000000000572e83f4fd34a6db69715afdc8ec492fa879a8460bf2c7459f384ec36d6f0d833fccc87dc8f542ca0731ec72c3f6e0857c63572db61a83246496a2f90400569c8af42a5b8b1e3583115dfe3a40a792ffe638fd722afd02131c170175f382a8d78b6626d1d58220f08d98570bad00042a01c00748cf37385e7d66e6c0efddeb730ebd2f1ab4e816cf7493cf236ca5eb6e5d2a65519a7acf475dbd9fb52eb50ddcf9cee74529f59a2d6cfe6c23f6a688719f922099394146621132f866439970571e206ac47123f2d9cdb5cb7c8506122300000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000)={0x0, 0x8}, 0x10}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r7, 0x18000000000002a0, 0x42, 0x0, &(0x7f0000000800)="b9ff0300600d698cb89e14f088a81fffffff00004000630677fbac14140ee934a0a662079f4b4d2f87e5feca6aab845013f2325f1a39010108038da1924425181aa5", 0x0, 0x28000, 0x60000000, 0x113, 0x0, &(0x7f00000006c0)="097baacf569909ebb78a19b4d4f607feb3072ad9474026c7c148d184a2647de87a8fd14ad5d15cadabd6c7545b05000000ad90e0d4000000000f3f750d2a75f6fa77d3fa4e023987f7a54b04eb238604aa90cab7b44f95ae6ce9b5f877439af64cb6573e5bc85c5e766604ff55b7a234246bd2ee44c9e99d69190bbe089603846d17b8678d05a0bda6ae300ca8c43271b65bb62b0af61bf4da3891f5bcf900ed368b36e2db9957b0dfa5cf084db8cb2b2c54661f9eac8a58a72fc9e768405eb33bce450dd088d2e16d757eeb1239a2389330535afb4944b7b27c4b26d812ab58864f3ffa3ce8cf739275492a0c90b425a792a19b9abf846b926e9f93f4b57ab77c0db63fb7d5a1e04ef52157f14f1dedcc4437"}, 0x40) r8 = bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x17, 0x6, &(0x7f0000000c00)=ANY=[], &(0x7f00000002c0)='GPL\x00', 0x2, 0x0, 0x0, 0x40f00, 0x8, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000340)={0x1, 0x10000003}, 0x8, 0x10, &(0x7f0000000380)={0x0, 0xa, 0x83, 0x2}, 0x10}, 0x78) ioctl$sock_kcm_SIOCKCMATTACH(r4, 0x89e0, &(0x7f0000000500)={0xffffffffffffffff, r8}) 06:08:34 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) fsopen(&(0x7f0000000200)='squashfs\x00', 0x0) 06:08:34 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x67, &(0x7f0000000140)=0x6, 0x4) sendmmsg(r0, &(0x7f0000006f00)=[{{&(0x7f0000000040)=@in={0x2, 0x4e23, @remote}, 0x80, &(0x7f0000000100)=[{&(0x7f00000000c0)="e04013b497936ecafdd12c496f522cc2830fd358bc8f890e410223906070a39cc6e2f84a8622c5f86cad52bba1560397737a6cce189d7db27e", 0x39}], 0x1}}, {{0x0, 0x0, &(0x7f0000000440)=[{&(0x7f0000000200)="9544939c01e602e8fc696947591d4c6fb3cb9a7cf9e53555dac91c09bbd33a6e85981e045d", 0x25}, {&(0x7f0000000240)="b995a5bf327c6f291a70af1527c6eb87af6b40c22e784c7d81102b1d2c4f5434d0142b1efa49361c7fa370cde02cbad1cdf556d5ebe84042e5b1eee75566d3c3bd4e54fb80c6258eb985131872c446ae99febe93703f66f4e0e10392c8a0d30f35710c7490190fef84833442ab74de59e4c9ebbc7cfe3f26750c16970d537ab353640e9e46e706cd200383135bfbf29b19c2fe729da592a9fb74eca37cb46775eb6db0118a3c59ac107fcf691822488d67f90e891045cb2ea35a79b6cd27c9fa5f37c9f6d6e4e2ca9267b2a8aa34f9727b0f539f", 0xd4}, {&(0x7f0000000340)="529cd4456bccdb80c030fe01e5cd61704126c8d4e7ec", 0x16}, {&(0x7f0000000380)="c2597979197f75ed6b82c8bcbf2c6b92a9a53fdd74646d60f9941ca27e", 0x1d}], 0x4}}], 0x2, 0x4c004) sendmmsg(r0, &(0x7f0000007fc0), 0x800001d, 0x0) 06:08:34 executing program 2: r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) ioctl$FS_IOC_SETFLAGS(r0, 0x6609, 0x0) 06:08:35 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) fsopen(&(0x7f0000000200)='squashfs\x00', 0x0) [ 218.255428][ T9390] IPVS: ftp: loaded support on port[0] = 21 06:08:35 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x67, &(0x7f0000000140)=0x6, 0x4) sendmmsg(r0, &(0x7f0000006f00)=[{{&(0x7f0000000040)=@in={0x2, 0x4e23, @remote}, 0x80, &(0x7f0000000100)=[{&(0x7f00000000c0)="e04013b497936ecafdd12c496f522cc2830fd358bc8f890e410223906070a39cc6e2f84a8622c5f86cad52bba1560397737a6cce189d7db27e", 0x39}], 0x1}}, {{0x0, 0x0, &(0x7f0000000440)=[{&(0x7f0000000200)="9544939c01e602e8fc696947591d4c6fb3cb9a7cf9e53555dac91c09bbd33a6e85981e045d", 0x25}, {&(0x7f0000000240)="b995a5bf327c6f291a70af1527c6eb87af6b40c22e784c7d81102b1d2c4f5434d0142b1efa49361c7fa370cde02cbad1cdf556d5ebe84042e5b1eee75566d3c3bd4e54fb80c6258eb985131872c446ae99febe93703f66f4e0e10392c8a0d30f35710c7490190fef84833442ab74de59e4c9ebbc7cfe3f26750c16970d537ab353640e9e46e706cd200383135bfbf29b19c2fe729da592a9fb74eca37cb46775eb6db0118a3c59ac107fcf691822488d67f90e891045cb2ea35a79b6cd27c9fa5f37c9f6d6e4e2ca9267b2a8aa34f9727b0f539f", 0xd4}, {&(0x7f0000000340)="529cd4456bccdb80c030fe01e5cd61704126c8d4e7ec", 0x16}, {&(0x7f0000000380)="c2597979197f75ed6b82c8bcbf2c6b92a9a53fdd74646d60f9941ca27e", 0x1d}], 0x4}}], 0x2, 0x4c004) sendmmsg(r0, &(0x7f0000007fc0), 0x800001d, 0x0) 06:08:35 executing program 0: r0 = perf_event_open(&(0x7f0000000640)={0x3, 0x70, 0x3e7, 0x0, 0x4, 0x0, 0x0, 0x0, 0x91dd7106ca8fd33b, 0xdb3fedb3c3734f95, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x40000000000, 0x0, 0x1, 0x0, @perf_config_ext={0x18, 0x3}, 0x21, 0x10000000000000, 0x0, 0x0, 0x0, 0x20000007, 0x2}, 0x0, 0xc, 0xffffffffffffffff, 0xa) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='cpuacct.stat\x00', 0x0, 0x0) r2 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r2, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f00000003c0)='syz1\x00', 0x200002, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0xfffffffffffffffc) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000300)='./cgroup/syz0\x00', 0x200002, 0x0) gettid() socket$kcm(0x11, 0xb, 0x0) ioctl$TUNSETTXFILTER(r1, 0x400454d1, &(0x7f00000000c0)=ANY=[@ANYBLOB="00000700000000da6500bbc4bbbbbbbb0180c2000016000000004dc23f0c000000000000bb"]) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000040)=@ipx={0x4, 0x1, 0x0, "2bfaec665b4b", 0xff}, 0x80, 0x0}, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={0xffffffffffffffff, 0x1, 0x49c42ca22ab5a9ac, 0x4, 0x0}, 0x20) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x908b7aabaa7d2404) socket$kcm(0xa, 0x6, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x4000011) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000000c0), 0x0}, 0x28) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x89f1, &(0x7f0000000000)='ip6gre0\x00') perf_event_open(&(0x7f00000004c0)={0x0, 0x70, 0x8, 0x6, 0x0, 0x3, 0x0, 0x3, 0x4, 0x0, 0x9, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x1000, 0x0, @perf_config_ext={0x1ff}, 0x40004, 0xfffffffffffffffd, 0x0, 0x8, 0x8, 0x4, 0x80}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0x10, 0x0, 0x10) r5 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r6 = socket$kcm(0x2, 0x1, 0x2) socketpair(0x25, 0x6, 0x4, &(0x7f0000000480)) setsockopt$sock_attach_bpf(r6, 0x1, 0x3e, &(0x7f00000002c0)=r5, 0x4) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x6d, &(0x7f0000000cc0)=ANY=[@ANYRESHEX, @ANYBLOB="e99f619c950ec8069b69ac05520100000000000000572e83f4fd34a6db69715afdc8ec492fa879a8460bf2c7459f384ec36d6f0d833fccc87dc8f542ca0731ec72c3f6e0857c63572db61a83246496a2f90400569c8af42a5b8b1e3583115dfe3a40a792ffe638fd722afd02131c170175f382a8d78b6626d1d58220f08d98570bad00042a01c00748cf37385e7d66e6c0efddeb730ebd2f1ab4e816cf7493cf236ca5eb6e5d2a65519a7acf475dbd9fb52eb50ddcf9cee74529f59a2d6cfe6c23f6a688719f922099394146621132f866439970571e206ac47123f2d9cdb5cb7c8506122300000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000)={0x0, 0x8}, 0x10}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r7, 0x18000000000002a0, 0x42, 0x0, &(0x7f0000000800)="b9ff0300600d698cb89e14f088a81fffffff00004000630677fbac14140ee934a0a662079f4b4d2f87e5feca6aab845013f2325f1a39010108038da1924425181aa5", 0x0, 0x28000, 0x60000000, 0x113, 0x0, &(0x7f00000006c0)="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"}, 0x40) r8 = bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x17, 0x6, &(0x7f0000000c00)=ANY=[], &(0x7f00000002c0)='GPL\x00', 0x2, 0x0, 0x0, 0x40f00, 0x8, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000340)={0x1, 0x10000003}, 0x8, 0x10, &(0x7f0000000380)={0x0, 0xa, 0x83, 0x2}, 0x10}, 0x78) ioctl$sock_kcm_SIOCKCMATTACH(r4, 0x89e0, &(0x7f0000000500)={0xffffffffffffffff, r8}) 06:08:35 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(r4, &(0x7f0000000100)={0x26, 'hash\x00', 0x0, 0x0, 'crct10dif-generic\x00'}, 0x58) r5 = accept$alg(r4, 0x0, 0x0) r6 = accept4(r5, 0x0, 0x0, 0x0) splice(r0, 0x0, r6, 0x0, 0x30007, 0x0) 06:08:35 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) fsopen(&(0x7f0000000200)='squashfs\x00', 0x0) 06:08:35 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x67, &(0x7f0000000140)=0x6, 0x4) sendmmsg(r0, &(0x7f0000006f00)=[{{&(0x7f0000000040)=@in={0x2, 0x4e23, @remote}, 0x80, &(0x7f0000000100)=[{&(0x7f00000000c0)="e04013b497936ecafdd12c496f522cc2830fd358bc8f890e410223906070a39cc6e2f84a8622c5f86cad52bba1560397737a6cce189d7db27e", 0x39}], 0x1}}, {{0x0, 0x0, &(0x7f0000000440)=[{&(0x7f0000000200)="9544939c01e602e8fc696947591d4c6fb3cb9a7cf9e53555dac91c09bbd33a6e85981e045d", 0x25}, {&(0x7f0000000240)="b995a5bf327c6f291a70af1527c6eb87af6b40c22e784c7d81102b1d2c4f5434d0142b1efa49361c7fa370cde02cbad1cdf556d5ebe84042e5b1eee75566d3c3bd4e54fb80c6258eb985131872c446ae99febe93703f66f4e0e10392c8a0d30f35710c7490190fef84833442ab74de59e4c9ebbc7cfe3f26750c16970d537ab353640e9e46e706cd200383135bfbf29b19c2fe729da592a9fb74eca37cb46775eb6db0118a3c59ac107fcf691822488d67f90e891045cb2ea35a79b6cd27c9fa5f37c9f6d6e4e2ca9267b2a8aa34f9727b0f539f", 0xd4}, {&(0x7f0000000340)="529cd4456bccdb80c030fe01e5cd61704126c8d4e7ec", 0x16}, {&(0x7f0000000380)="c2597979197f75ed6b82c8bcbf2c6b92a9a53fdd74646d60f9941ca27e", 0x1d}], 0x4}}], 0x2, 0x4c004) sendmmsg(r0, &(0x7f0000007fc0), 0x800001d, 0x0) 06:08:35 executing program 0: r0 = perf_event_open(&(0x7f0000000640)={0x3, 0x70, 0x3e7, 0x0, 0x4, 0x0, 0x0, 0x0, 0x91dd7106ca8fd33b, 0xdb3fedb3c3734f95, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x40000000000, 0x0, 0x1, 0x0, @perf_config_ext={0x18, 0x3}, 0x21, 0x10000000000000, 0x0, 0x0, 0x0, 0x20000007, 0x2}, 0x0, 0xc, 0xffffffffffffffff, 0xa) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='cpuacct.stat\x00', 0x0, 0x0) r2 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r2, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f00000003c0)='syz1\x00', 0x200002, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0xfffffffffffffffc) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000300)='./cgroup/syz0\x00', 0x200002, 0x0) gettid() socket$kcm(0x11, 0xb, 0x0) ioctl$TUNSETTXFILTER(r1, 0x400454d1, &(0x7f00000000c0)=ANY=[@ANYBLOB="00000700000000da6500bbc4bbbbbbbb0180c2000016000000004dc23f0c000000000000bb"]) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000040)=@ipx={0x4, 0x1, 0x0, "2bfaec665b4b", 0xff}, 0x80, 0x0}, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={0xffffffffffffffff, 0x1, 0x49c42ca22ab5a9ac, 0x4, 0x0}, 0x20) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x908b7aabaa7d2404) socket$kcm(0xa, 0x6, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x4000011) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000000c0), 0x0}, 0x28) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x89f1, &(0x7f0000000000)='ip6gre0\x00') perf_event_open(&(0x7f00000004c0)={0x0, 0x70, 0x8, 0x6, 0x0, 0x3, 0x0, 0x3, 0x4, 0x0, 0x9, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x1000, 0x0, @perf_config_ext={0x1ff}, 0x40004, 0xfffffffffffffffd, 0x0, 0x8, 0x8, 0x4, 0x80}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0x10, 0x0, 0x10) r5 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r6 = socket$kcm(0x2, 0x1, 0x2) socketpair(0x25, 0x6, 0x4, &(0x7f0000000480)) setsockopt$sock_attach_bpf(r6, 0x1, 0x3e, &(0x7f00000002c0)=r5, 0x4) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x6d, &(0x7f0000000cc0)=ANY=[@ANYRESHEX, @ANYBLOB="e99f619c950ec8069b69ac05520100000000000000572e83f4fd34a6db69715afdc8ec492fa879a8460bf2c7459f384ec36d6f0d833fccc87dc8f542ca0731ec72c3f6e0857c63572db61a83246496a2f90400569c8af42a5b8b1e3583115dfe3a40a792ffe638fd722afd02131c170175f382a8d78b6626d1d58220f08d98570bad00042a01c00748cf37385e7d66e6c0efddeb730ebd2f1ab4e816cf7493cf236ca5eb6e5d2a65519a7acf475dbd9fb52eb50ddcf9cee74529f59a2d6cfe6c23f6a688719f922099394146621132f866439970571e206ac47123f2d9cdb5cb7c8506122300000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000)={0x0, 0x8}, 0x10}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r7, 0x18000000000002a0, 0x42, 0x0, &(0x7f0000000800)="b9ff0300600d698cb89e14f088a81fffffff00004000630677fbac14140ee934a0a662079f4b4d2f87e5feca6aab845013f2325f1a39010108038da1924425181aa5", 0x0, 0x28000, 0x60000000, 0x113, 0x0, &(0x7f00000006c0)="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"}, 0x40) r8 = bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x17, 0x6, &(0x7f0000000c00)=ANY=[], &(0x7f00000002c0)='GPL\x00', 0x2, 0x0, 0x0, 0x40f00, 0x8, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000340)={0x1, 0x10000003}, 0x8, 0x10, &(0x7f0000000380)={0x0, 0xa, 0x83, 0x2}, 0x10}, 0x78) ioctl$sock_kcm_SIOCKCMATTACH(r4, 0x89e0, &(0x7f0000000500)={0xffffffffffffffff, r8}) 06:08:36 executing program 4: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000000c0)=0xe) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r1, 0x40047438, &(0x7f0000000180)=""/246) ioctl$PPPIOCSFLAGS1(r1, 0x40047457, &(0x7f0000000000)) 06:08:36 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) fsopen(&(0x7f0000000200)='squashfs\x00', 0x0) 06:08:36 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet_udp_int(r0, 0x11, 0x0, &(0x7f0000000140)=0x6, 0x4) sendmmsg(r0, &(0x7f0000006f00)=[{{&(0x7f0000000040)=@in={0x2, 0x4e23, @remote}, 0x80, &(0x7f0000000100)=[{&(0x7f00000000c0)="e04013b497936ecafdd12c496f522cc2830fd358bc8f890e410223906070a39cc6e2f84a8622c5f86cad52bba1560397737a6cce189d7db27e", 0x39}], 0x1}}, {{0x0, 0x0, &(0x7f0000000440)=[{&(0x7f0000000200)="9544939c01e602e8fc696947591d4c6fb3cb9a7cf9e53555dac91c09bbd33a6e85981e045d", 0x25}, {&(0x7f0000000240)="b995a5bf327c6f291a70af1527c6eb87af6b40c22e784c7d81102b1d2c4f5434d0142b1efa49361c7fa370cde02cbad1cdf556d5ebe84042e5b1eee75566d3c3bd4e54fb80c6258eb985131872c446ae99febe93703f66f4e0e10392c8a0d30f35710c7490190fef84833442ab74de59e4c9ebbc7cfe3f26750c16970d537ab353640e9e46e706cd200383135bfbf29b19c2fe729da592a9fb74eca37cb46775eb6db0118a3c59ac107fcf691822488d67f90e891045cb2ea35a79b6cd27c9fa5f37c9f6d6e4e2ca9267b2a8aa34f9727b0f539f", 0xd4}, {&(0x7f0000000340)="529cd4456bccdb80c030fe01e5cd61704126c8d4e7ec", 0x16}, {&(0x7f0000000380)="c2597979197f75ed6b82c8bcbf2c6b92a9a53fdd74646d60f9941ca27e", 0x1d}], 0x4}}], 0x2, 0x4c004) sendmmsg(r0, &(0x7f0000007fc0), 0x800001d, 0x0) 06:08:36 executing program 0: r0 = perf_event_open(&(0x7f0000000640)={0x3, 0x70, 0x3e7, 0x0, 0x4, 0x0, 0x0, 0x0, 0x91dd7106ca8fd33b, 0xdb3fedb3c3734f95, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x40000000000, 0x0, 0x1, 0x0, @perf_config_ext={0x18, 0x3}, 0x21, 0x10000000000000, 0x0, 0x0, 0x0, 0x20000007, 0x2}, 0x0, 0xc, 0xffffffffffffffff, 0xa) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='cpuacct.stat\x00', 0x0, 0x0) r2 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r2, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f00000003c0)='syz1\x00', 0x200002, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0xfffffffffffffffc) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000300)='./cgroup/syz0\x00', 0x200002, 0x0) gettid() socket$kcm(0x11, 0xb, 0x0) ioctl$TUNSETTXFILTER(r1, 0x400454d1, &(0x7f00000000c0)=ANY=[@ANYBLOB="00000700000000da6500bbc4bbbbbbbb0180c2000016000000004dc23f0c000000000000bb"]) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000040)=@ipx={0x4, 0x1, 0x0, "2bfaec665b4b", 0xff}, 0x80, 0x0}, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={0xffffffffffffffff, 0x1, 0x49c42ca22ab5a9ac, 0x4, 0x0}, 0x20) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x908b7aabaa7d2404) socket$kcm(0xa, 0x6, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x4000011) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000000c0), 0x0}, 0x28) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x89f1, &(0x7f0000000000)='ip6gre0\x00') perf_event_open(&(0x7f00000004c0)={0x0, 0x70, 0x8, 0x6, 0x0, 0x3, 0x0, 0x3, 0x4, 0x0, 0x9, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x1000, 0x0, @perf_config_ext={0x1ff}, 0x40004, 0xfffffffffffffffd, 0x0, 0x8, 0x8, 0x4, 0x80}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(r4, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d200040080000048000001000080000000000300f88000f01700d4bd", 0x2e}], 0xf}, 0x40094) r5 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r6 = socket$kcm(0x2, 0x1, 0x2) socketpair(0x25, 0x6, 0x4, &(0x7f0000000480)) setsockopt$sock_attach_bpf(r6, 0x1, 0x3e, &(0x7f00000002c0)=r5, 0x4) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x6d, &(0x7f0000000cc0)=ANY=[@ANYRESHEX, @ANYBLOB="e99f619c950ec8069b69ac05520100000000000000572e83f4fd34a6db69715afdc8ec492fa879a8460bf2c7459f384ec36d6f0d833fccc87dc8f542ca0731ec72c3f6e0857c63572db61a83246496a2f90400569c8af42a5b8b1e3583115dfe3a40a792ffe638fd722afd02131c170175f382a8d78b6626d1d58220f08d98570bad00042a01c00748cf37385e7d66e6c0efddeb730ebd2f1ab4e816cf7493cf236ca5eb6e5d2a65519a7acf475dbd9fb52eb50ddcf9cee74529f59a2d6cfe6c23f6a688719f922099394146621132f866439970571e206ac47123f2d9cdb5cb7c8506122300000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000)={0x0, 0x8}, 0x10}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r7, 0x18000000000002a0, 0x42, 0x0, &(0x7f0000000800)="b9ff0300600d698cb89e14f088a81fffffff00004000630677fbac14140ee934a0a662079f4b4d2f87e5feca6aab845013f2325f1a39010108038da1924425181aa5", 0x0, 0x28000, 0x60000000, 0x113, 0x0, &(0x7f00000006c0)="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"}, 0x40) r8 = bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x17, 0x6, &(0x7f0000000c00)=ANY=[], &(0x7f00000002c0)='GPL\x00', 0x2, 0x0, 0x0, 0x40f00, 0x8, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000340)={0x1, 0x10000003}, 0x8, 0x10, &(0x7f0000000380)={0x0, 0xa, 0x83, 0x2}, 0x10}, 0x78) ioctl$sock_kcm_SIOCKCMATTACH(r4, 0x89e0, &(0x7f0000000500)={0xffffffffffffffff, r8}) [ 219.438020][ T9454] IPVS: ftp: loaded support on port[0] = 21 06:08:36 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet_udp_int(r0, 0x11, 0x0, &(0x7f0000000140)=0x6, 0x4) sendmmsg(r0, &(0x7f0000006f00)=[{{&(0x7f0000000040)=@in={0x2, 0x4e23, @remote}, 0x80, &(0x7f0000000100)=[{&(0x7f00000000c0)="e04013b497936ecafdd12c496f522cc2830fd358bc8f890e410223906070a39cc6e2f84a8622c5f86cad52bba1560397737a6cce189d7db27e", 0x39}], 0x1}}, {{0x0, 0x0, &(0x7f0000000440)=[{&(0x7f0000000200)="9544939c01e602e8fc696947591d4c6fb3cb9a7cf9e53555dac91c09bbd33a6e85981e045d", 0x25}, {&(0x7f0000000240)="b995a5bf327c6f291a70af1527c6eb87af6b40c22e784c7d81102b1d2c4f5434d0142b1efa49361c7fa370cde02cbad1cdf556d5ebe84042e5b1eee75566d3c3bd4e54fb80c6258eb985131872c446ae99febe93703f66f4e0e10392c8a0d30f35710c7490190fef84833442ab74de59e4c9ebbc7cfe3f26750c16970d537ab353640e9e46e706cd200383135bfbf29b19c2fe729da592a9fb74eca37cb46775eb6db0118a3c59ac107fcf691822488d67f90e891045cb2ea35a79b6cd27c9fa5f37c9f6d6e4e2ca9267b2a8aa34f9727b0f539f", 0xd4}, {&(0x7f0000000340)="529cd4456bccdb80c030fe01e5cd61704126c8d4e7ec", 0x16}, {&(0x7f0000000380)="c2597979197f75ed6b82c8bcbf2c6b92a9a53fdd74646d60f9941ca27e", 0x1d}], 0x4}}], 0x2, 0x4c004) sendmmsg(r0, &(0x7f0000007fc0), 0x800001d, 0x0) 06:08:36 executing program 2: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000180)='sysfs\x00', 0x2808001, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0xa1021, 0x0) 06:08:36 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) fsopen(&(0x7f0000000200)='squashfs\x00', 0x0) 06:08:36 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(r4, &(0x7f0000000100)={0x26, 'hash\x00', 0x0, 0x0, 'crct10dif-generic\x00'}, 0x58) r5 = accept$alg(r4, 0x0, 0x0) r6 = accept4(r5, 0x0, 0x0, 0x0) splice(r0, 0x0, r6, 0x0, 0x30007, 0x0) 06:08:36 executing program 0: r0 = perf_event_open(&(0x7f0000000640)={0x3, 0x70, 0x3e7, 0x0, 0x4, 0x0, 0x0, 0x0, 0x91dd7106ca8fd33b, 0xdb3fedb3c3734f95, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x40000000000, 0x0, 0x1, 0x0, @perf_config_ext={0x18, 0x3}, 0x21, 0x10000000000000, 0x0, 0x0, 0x0, 0x20000007, 0x2}, 0x0, 0xc, 0xffffffffffffffff, 0xa) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='cpuacct.stat\x00', 0x0, 0x0) r2 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r2, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f00000003c0)='syz1\x00', 0x200002, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0xfffffffffffffffc) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000300)='./cgroup/syz0\x00', 0x200002, 0x0) gettid() socket$kcm(0x11, 0xb, 0x0) ioctl$TUNSETTXFILTER(r1, 0x400454d1, &(0x7f00000000c0)=ANY=[@ANYBLOB="00000700000000da6500bbc4bbbbbbbb0180c2000016000000004dc23f0c000000000000bb"]) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000040)=@ipx={0x4, 0x1, 0x0, "2bfaec665b4b", 0xff}, 0x80, 0x0}, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={0xffffffffffffffff, 0x1, 0x49c42ca22ab5a9ac, 0x4, 0x0}, 0x20) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x908b7aabaa7d2404) socket$kcm(0xa, 0x6, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x4000011) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000000c0), 0x0}, 0x28) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x89f1, &(0x7f0000000000)='ip6gre0\x00') perf_event_open(&(0x7f00000004c0)={0x0, 0x70, 0x8, 0x6, 0x0, 0x3, 0x0, 0x3, 0x4, 0x0, 0x9, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x1000, 0x0, @perf_config_ext={0x1ff}, 0x40004, 0xfffffffffffffffd, 0x0, 0x8, 0x8, 0x4, 0x80}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(r4, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d200040080000048000001000080000000000300f88000f01700d4bd", 0x2e}], 0xf}, 0x40094) r5 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r6 = socket$kcm(0x2, 0x1, 0x2) socketpair(0x25, 0x6, 0x4, &(0x7f0000000480)) setsockopt$sock_attach_bpf(r6, 0x1, 0x3e, &(0x7f00000002c0)=r5, 0x4) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x6d, &(0x7f0000000cc0)=ANY=[@ANYRESHEX, @ANYBLOB="e99f619c950ec8069b69ac05520100000000000000572e83f4fd34a6db69715afdc8ec492fa879a8460bf2c7459f384ec36d6f0d833fccc87dc8f542ca0731ec72c3f6e0857c63572db61a83246496a2f90400569c8af42a5b8b1e3583115dfe3a40a792ffe638fd722afd02131c170175f382a8d78b6626d1d58220f08d98570bad00042a01c00748cf37385e7d66e6c0efddeb730ebd2f1ab4e816cf7493cf236ca5eb6e5d2a65519a7acf475dbd9fb52eb50ddcf9cee74529f59a2d6cfe6c23f6a688719f922099394146621132f866439970571e206ac47123f2d9cdb5cb7c8506122300000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000)={0x0, 0x8}, 0x10}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r7, 0x18000000000002a0, 0x42, 0x0, &(0x7f0000000800)="b9ff0300600d698cb89e14f088a81fffffff00004000630677fbac14140ee934a0a662079f4b4d2f87e5feca6aab845013f2325f1a39010108038da1924425181aa5", 0x0, 0x28000, 0x60000000, 0x113, 0x0, &(0x7f00000006c0)="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"}, 0x40) r8 = bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x17, 0x6, &(0x7f0000000c00)=ANY=[], &(0x7f00000002c0)='GPL\x00', 0x2, 0x0, 0x0, 0x40f00, 0x8, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000340)={0x1, 0x10000003}, 0x8, 0x10, &(0x7f0000000380)={0x0, 0xa, 0x83, 0x2}, 0x10}, 0x78) ioctl$sock_kcm_SIOCKCMATTACH(r4, 0x89e0, &(0x7f0000000500)={0xffffffffffffffff, r8}) 06:08:36 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet_udp_int(r0, 0x11, 0x0, &(0x7f0000000140)=0x6, 0x4) sendmmsg(r0, &(0x7f0000006f00)=[{{&(0x7f0000000040)=@in={0x2, 0x4e23, @remote}, 0x80, &(0x7f0000000100)=[{&(0x7f00000000c0)="e04013b497936ecafdd12c496f522cc2830fd358bc8f890e410223906070a39cc6e2f84a8622c5f86cad52bba1560397737a6cce189d7db27e", 0x39}], 0x1}}, {{0x0, 0x0, &(0x7f0000000440)=[{&(0x7f0000000200)="9544939c01e602e8fc696947591d4c6fb3cb9a7cf9e53555dac91c09bbd33a6e85981e045d", 0x25}, {&(0x7f0000000240)="b995a5bf327c6f291a70af1527c6eb87af6b40c22e784c7d81102b1d2c4f5434d0142b1efa49361c7fa370cde02cbad1cdf556d5ebe84042e5b1eee75566d3c3bd4e54fb80c6258eb985131872c446ae99febe93703f66f4e0e10392c8a0d30f35710c7490190fef84833442ab74de59e4c9ebbc7cfe3f26750c16970d537ab353640e9e46e706cd200383135bfbf29b19c2fe729da592a9fb74eca37cb46775eb6db0118a3c59ac107fcf691822488d67f90e891045cb2ea35a79b6cd27c9fa5f37c9f6d6e4e2ca9267b2a8aa34f9727b0f539f", 0xd4}, {&(0x7f0000000340)="529cd4456bccdb80c030fe01e5cd61704126c8d4e7ec", 0x16}, {&(0x7f0000000380)="c2597979197f75ed6b82c8bcbf2c6b92a9a53fdd74646d60f9941ca27e", 0x1d}], 0x4}}], 0x2, 0x4c004) sendmmsg(r0, &(0x7f0000007fc0), 0x800001d, 0x0) 06:08:36 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) fsopen(0x0, 0x0) 06:08:36 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet_udp_int(r0, 0x11, 0x67, 0x0, 0x0) sendmmsg(r0, &(0x7f0000006f00)=[{{&(0x7f0000000040)=@in={0x2, 0x4e23, @remote}, 0x80, &(0x7f0000000100)=[{&(0x7f00000000c0)="e04013b497936ecafdd12c496f522cc2830fd358bc8f890e410223906070a39cc6e2f84a8622c5f86cad52bba1560397737a6cce189d7db27e", 0x39}], 0x1}}, {{0x0, 0x0, &(0x7f0000000440)=[{&(0x7f0000000200)="9544939c01e602e8fc696947591d4c6fb3cb9a7cf9e53555dac91c09bbd33a6e85981e045d", 0x25}, {&(0x7f0000000240)="b995a5bf327c6f291a70af1527c6eb87af6b40c22e784c7d81102b1d2c4f5434d0142b1efa49361c7fa370cde02cbad1cdf556d5ebe84042e5b1eee75566d3c3bd4e54fb80c6258eb985131872c446ae99febe93703f66f4e0e10392c8a0d30f35710c7490190fef84833442ab74de59e4c9ebbc7cfe3f26750c16970d537ab353640e9e46e706cd200383135bfbf29b19c2fe729da592a9fb74eca37cb46775eb6db0118a3c59ac107fcf691822488d67f90e891045cb2ea35a79b6cd27c9fa5f37c9f6d6e4e2ca9267b2a8aa34f9727b0f539f", 0xd4}, {&(0x7f0000000340)="529cd4456bccdb80c030fe01e5cd61704126c8d4e7ec", 0x16}, {&(0x7f0000000380)="c2597979197f75ed6b82c8bcbf2c6b92a9a53fdd74646d60f9941ca27e", 0x1d}], 0x4}}], 0x2, 0x4c004) sendmmsg(r0, &(0x7f0000007fc0), 0x800001d, 0x0) 06:08:37 executing program 4: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000000c0)=0xe) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r1, 0x40047438, &(0x7f0000000180)=""/246) ioctl$PPPIOCSFLAGS1(r1, 0x40047457, &(0x7f0000000000)) 06:08:37 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000001b00)={0xa, 0x1d, 0x400, 0xc, 0x42}, 0x3c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={r0, &(0x7f0000000000), &(0x7f0000000680)}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000002540)={r0, &(0x7f0000000400)="ef", &(0x7f0000000100)}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000800)={r0, &(0x7f00000004c0)="dc", &(0x7f0000000100)}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r0, &(0x7f00000002c0)="ce", &(0x7f0000000340)}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r0, &(0x7f0000000540)='Y', &(0x7f0000000300)}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={r0, &(0x7f0000000240)='K', &(0x7f0000000100)}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000000c0)={r0, &(0x7f0000000180), &(0x7f0000000180)}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={r0, &(0x7f00000001c0), &(0x7f0000000440)}, 0x20) 06:08:37 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) fsopen(0x0, 0x0) 06:08:37 executing program 0: r0 = perf_event_open(&(0x7f0000000640)={0x3, 0x70, 0x3e7, 0x0, 0x4, 0x0, 0x0, 0x0, 0x91dd7106ca8fd33b, 0xdb3fedb3c3734f95, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x40000000000, 0x0, 0x1, 0x0, @perf_config_ext={0x18, 0x3}, 0x21, 0x10000000000000, 0x0, 0x0, 0x0, 0x20000007, 0x2}, 0x0, 0xc, 0xffffffffffffffff, 0xa) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='cpuacct.stat\x00', 0x0, 0x0) r2 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r2, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f00000003c0)='syz1\x00', 0x200002, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0xfffffffffffffffc) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000300)='./cgroup/syz0\x00', 0x200002, 0x0) gettid() socket$kcm(0x11, 0xb, 0x0) ioctl$TUNSETTXFILTER(r1, 0x400454d1, &(0x7f00000000c0)=ANY=[@ANYBLOB="00000700000000da6500bbc4bbbbbbbb0180c2000016000000004dc23f0c000000000000bb"]) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000040)=@ipx={0x4, 0x1, 0x0, "2bfaec665b4b", 0xff}, 0x80, 0x0}, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={0xffffffffffffffff, 0x1, 0x49c42ca22ab5a9ac, 0x4, 0x0}, 0x20) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x908b7aabaa7d2404) socket$kcm(0xa, 0x6, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x4000011) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000000c0), 0x0}, 0x28) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x89f1, &(0x7f0000000000)='ip6gre0\x00') perf_event_open(&(0x7f00000004c0)={0x0, 0x70, 0x8, 0x6, 0x0, 0x3, 0x0, 0x3, 0x4, 0x0, 0x9, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x1000, 0x0, @perf_config_ext={0x1ff}, 0x40004, 0xfffffffffffffffd, 0x0, 0x8, 0x8, 0x4, 0x80}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(r4, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d200040080000048000001000080000000000300f88000f01700d4bd", 0x2e}], 0xf}, 0x40094) r5 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r6 = socket$kcm(0x2, 0x1, 0x2) socketpair(0x25, 0x6, 0x4, &(0x7f0000000480)) setsockopt$sock_attach_bpf(r6, 0x1, 0x3e, &(0x7f00000002c0)=r5, 0x4) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x6d, &(0x7f0000000cc0)=ANY=[@ANYRESHEX, @ANYBLOB="e99f619c950ec8069b69ac05520100000000000000572e83f4fd34a6db69715afdc8ec492fa879a8460bf2c7459f384ec36d6f0d833fccc87dc8f542ca0731ec72c3f6e0857c63572db61a83246496a2f90400569c8af42a5b8b1e3583115dfe3a40a792ffe638fd722afd02131c170175f382a8d78b6626d1d58220f08d98570bad00042a01c00748cf37385e7d66e6c0efddeb730ebd2f1ab4e816cf7493cf236ca5eb6e5d2a65519a7acf475dbd9fb52eb50ddcf9cee74529f59a2d6cfe6c23f6a688719f922099394146621132f866439970571e206ac47123f2d9cdb5cb7c8506122300000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000)={0x0, 0x8}, 0x10}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r7, 0x18000000000002a0, 0x42, 0x0, &(0x7f0000000800)="b9ff0300600d698cb89e14f088a81fffffff00004000630677fbac14140ee934a0a662079f4b4d2f87e5feca6aab845013f2325f1a39010108038da1924425181aa5", 0x0, 0x28000, 0x60000000, 0x113, 0x0, &(0x7f00000006c0)="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"}, 0x40) r8 = bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x17, 0x6, &(0x7f0000000c00)=ANY=[], &(0x7f00000002c0)='GPL\x00', 0x2, 0x0, 0x0, 0x40f00, 0x8, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000340)={0x1, 0x10000003}, 0x8, 0x10, &(0x7f0000000380)={0x0, 0xa, 0x83, 0x2}, 0x10}, 0x78) ioctl$sock_kcm_SIOCKCMATTACH(r4, 0x89e0, &(0x7f0000000500)={0xffffffffffffffff, r8}) 06:08:37 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet_udp_int(r0, 0x11, 0x67, 0x0, 0x0) sendmmsg(r0, &(0x7f0000006f00)=[{{&(0x7f0000000040)=@in={0x2, 0x4e23, @remote}, 0x80, &(0x7f0000000100)=[{&(0x7f00000000c0)="e04013b497936ecafdd12c496f522cc2830fd358bc8f890e410223906070a39cc6e2f84a8622c5f86cad52bba1560397737a6cce189d7db27e", 0x39}], 0x1}}, {{0x0, 0x0, &(0x7f0000000440)=[{&(0x7f0000000200)="9544939c01e602e8fc696947591d4c6fb3cb9a7cf9e53555dac91c09bbd33a6e85981e045d", 0x25}, {&(0x7f0000000240)="b995a5bf327c6f291a70af1527c6eb87af6b40c22e784c7d81102b1d2c4f5434d0142b1efa49361c7fa370cde02cbad1cdf556d5ebe84042e5b1eee75566d3c3bd4e54fb80c6258eb985131872c446ae99febe93703f66f4e0e10392c8a0d30f35710c7490190fef84833442ab74de59e4c9ebbc7cfe3f26750c16970d537ab353640e9e46e706cd200383135bfbf29b19c2fe729da592a9fb74eca37cb46775eb6db0118a3c59ac107fcf691822488d67f90e891045cb2ea35a79b6cd27c9fa5f37c9f6d6e4e2ca9267b2a8aa34f9727b0f539f", 0xd4}, {&(0x7f0000000340)="529cd4456bccdb80c030fe01e5cd61704126c8d4e7ec", 0x16}, {&(0x7f0000000380)="c2597979197f75ed6b82c8bcbf2c6b92a9a53fdd74646d60f9941ca27e", 0x1d}], 0x4}}], 0x2, 0x4c004) sendmmsg(r0, &(0x7f0000007fc0), 0x800001d, 0x0) 06:08:37 executing program 2: 06:08:37 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) fsopen(0x0, 0x0) [ 220.453333][ T9516] IPVS: ftp: loaded support on port[0] = 21 06:08:37 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(r4, &(0x7f0000000100)={0x26, 'hash\x00', 0x0, 0x0, 'crct10dif-generic\x00'}, 0x58) r5 = accept$alg(r4, 0x0, 0x0) r6 = accept4(r5, 0x0, 0x0, 0x0) splice(r0, 0x0, r6, 0x0, 0x30007, 0x0) 06:08:37 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet_udp_int(r0, 0x11, 0x67, 0x0, 0x0) sendmmsg(r0, &(0x7f0000006f00)=[{{&(0x7f0000000040)=@in={0x2, 0x4e23, @remote}, 0x80, &(0x7f0000000100)=[{&(0x7f00000000c0)="e04013b497936ecafdd12c496f522cc2830fd358bc8f890e410223906070a39cc6e2f84a8622c5f86cad52bba1560397737a6cce189d7db27e", 0x39}], 0x1}}, {{0x0, 0x0, &(0x7f0000000440)=[{&(0x7f0000000200)="9544939c01e602e8fc696947591d4c6fb3cb9a7cf9e53555dac91c09bbd33a6e85981e045d", 0x25}, {&(0x7f0000000240)="b995a5bf327c6f291a70af1527c6eb87af6b40c22e784c7d81102b1d2c4f5434d0142b1efa49361c7fa370cde02cbad1cdf556d5ebe84042e5b1eee75566d3c3bd4e54fb80c6258eb985131872c446ae99febe93703f66f4e0e10392c8a0d30f35710c7490190fef84833442ab74de59e4c9ebbc7cfe3f26750c16970d537ab353640e9e46e706cd200383135bfbf29b19c2fe729da592a9fb74eca37cb46775eb6db0118a3c59ac107fcf691822488d67f90e891045cb2ea35a79b6cd27c9fa5f37c9f6d6e4e2ca9267b2a8aa34f9727b0f539f", 0xd4}, {&(0x7f0000000340)="529cd4456bccdb80c030fe01e5cd61704126c8d4e7ec", 0x16}, {&(0x7f0000000380)="c2597979197f75ed6b82c8bcbf2c6b92a9a53fdd74646d60f9941ca27e", 0x1d}], 0x4}}], 0x2, 0x4c004) sendmmsg(r0, &(0x7f0000007fc0), 0x800001d, 0x0) 06:08:37 executing program 2: 06:08:37 executing program 0: r0 = perf_event_open(&(0x7f0000000640)={0x3, 0x70, 0x3e7, 0x0, 0x4, 0x0, 0x0, 0x0, 0x91dd7106ca8fd33b, 0xdb3fedb3c3734f95, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x40000000000, 0x0, 0x1, 0x0, @perf_config_ext={0x18, 0x3}, 0x21, 0x10000000000000, 0x0, 0x0, 0x0, 0x20000007, 0x2}, 0x0, 0xc, 0xffffffffffffffff, 0xa) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='cpuacct.stat\x00', 0x0, 0x0) r2 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r2, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f00000003c0)='syz1\x00', 0x200002, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0xfffffffffffffffc) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000300)='./cgroup/syz0\x00', 0x200002, 0x0) gettid() socket$kcm(0x11, 0xb, 0x0) ioctl$TUNSETTXFILTER(r1, 0x400454d1, &(0x7f00000000c0)=ANY=[@ANYBLOB="00000700000000da6500bbc4bbbbbbbb0180c2000016000000004dc23f0c000000000000bb"]) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000040)=@ipx={0x4, 0x1, 0x0, "2bfaec665b4b", 0xff}, 0x80, 0x0}, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={0xffffffffffffffff, 0x1, 0x49c42ca22ab5a9ac, 0x4, 0x0}, 0x20) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x908b7aabaa7d2404) socket$kcm(0xa, 0x6, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x4000011) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000000c0), 0x0}, 0x28) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x89f1, &(0x7f0000000000)='ip6gre0\x00') socket$kcm(0x10, 0x0, 0x10) sendmsg$kcm(r4, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d200040080000048000001000080000000000300f88000f01700d4bd", 0x2e}], 0xf}, 0x40094) r5 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r6 = socket$kcm(0x2, 0x1, 0x2) socketpair(0x25, 0x6, 0x4, &(0x7f0000000480)) setsockopt$sock_attach_bpf(r6, 0x1, 0x3e, &(0x7f00000002c0)=r5, 0x4) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x6d, &(0x7f0000000cc0)=ANY=[@ANYRESHEX, @ANYBLOB="e99f619c950ec8069b69ac05520100000000000000572e83f4fd34a6db69715afdc8ec492fa879a8460bf2c7459f384ec36d6f0d833fccc87dc8f542ca0731ec72c3f6e0857c63572db61a83246496a2f90400569c8af42a5b8b1e3583115dfe3a40a792ffe638fd722afd02131c170175f382a8d78b6626d1d58220f08d98570bad00042a01c00748cf37385e7d66e6c0efddeb730ebd2f1ab4e816cf7493cf236ca5eb6e5d2a65519a7acf475dbd9fb52eb50ddcf9cee74529f59a2d6cfe6c23f6a688719f922099394146621132f866439970571e206ac47123f2d9cdb5cb7c8506122300000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000)={0x0, 0x8}, 0x10}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r7, 0x18000000000002a0, 0x42, 0x0, &(0x7f0000000800)="b9ff0300600d698cb89e14f088a81fffffff00004000630677fbac14140ee934a0a662079f4b4d2f87e5feca6aab845013f2325f1a39010108038da1924425181aa5", 0x0, 0x28000, 0x60000000, 0x113, 0x0, &(0x7f00000006c0)="097baacf569909ebb78a19b4d4f607feb3072ad9474026c7c148d184a2647de87a8fd14ad5d15cadabd6c7545b05000000ad90e0d4000000000f3f750d2a75f6fa77d3fa4e023987f7a54b04eb238604aa90cab7b44f95ae6ce9b5f877439af64cb6573e5bc85c5e766604ff55b7a234246bd2ee44c9e99d69190bbe089603846d17b8678d05a0bda6ae300ca8c43271b65bb62b0af61bf4da3891f5bcf900ed368b36e2db9957b0dfa5cf084db8cb2b2c54661f9eac8a58a72fc9e768405eb33bce450dd088d2e16d757eeb1239a2389330535afb4944b7b27c4b26d812ab58864f3ffa3ce8cf739275492a0c90b425a792a19b9abf846b926e9f93f4b57ab77c0db63fb7d5a1e04ef52157f14f1dedcc4437"}, 0x40) r8 = bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x17, 0x6, &(0x7f0000000c00)=ANY=[], &(0x7f00000002c0)='GPL\x00', 0x2, 0x0, 0x0, 0x40f00, 0x8, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000340)={0x1, 0x10000003}, 0x8, 0x10, &(0x7f0000000380)={0x0, 0xa, 0x83, 0x2}, 0x10}, 0x78) ioctl$sock_kcm_SIOCKCMATTACH(r4, 0x89e0, &(0x7f0000000500)={0xffffffffffffffff, r8}) 06:08:37 executing program 3: 06:08:37 executing program 4: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0x40047438, &(0x7f0000000180)=""/246) ioctl$PPPIOCSFLAGS1(r0, 0x40047457, &(0x7f0000000000)) 06:08:37 executing program 3: 06:08:37 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet_udp_int(r0, 0x11, 0x67, &(0x7f0000000140), 0x4) sendmmsg(r0, &(0x7f0000006f00)=[{{&(0x7f0000000040)=@in={0x2, 0x4e23, @remote}, 0x80, &(0x7f0000000100)=[{&(0x7f00000000c0)="e04013b497936ecafdd12c496f522cc2830fd358bc8f890e410223906070a39cc6e2f84a8622c5f86cad52bba1560397737a6cce189d7db27e", 0x39}], 0x1}}, {{0x0, 0x0, &(0x7f0000000440)=[{&(0x7f0000000200)="9544939c01e602e8fc696947591d4c6fb3cb9a7cf9e53555dac91c09bbd33a6e85981e045d", 0x25}, {&(0x7f0000000240)="b995a5bf327c6f291a70af1527c6eb87af6b40c22e784c7d81102b1d2c4f5434d0142b1efa49361c7fa370cde02cbad1cdf556d5ebe84042e5b1eee75566d3c3bd4e54fb80c6258eb985131872c446ae99febe93703f66f4e0e10392c8a0d30f35710c7490190fef84833442ab74de59e4c9ebbc7cfe3f26750c16970d537ab353640e9e46e706cd200383135bfbf29b19c2fe729da592a9fb74eca37cb46775eb6db0118a3c59ac107fcf691822488d67f90e891045cb2ea35a79b6cd27c9fa5f37c9f6d6e4e2ca9267b2a8aa34f9727b0f539f", 0xd4}, {&(0x7f0000000340)="529cd4456bccdb80c030fe01e5cd61704126c8d4e7ec", 0x16}, {&(0x7f0000000380)="c2597979197f75ed6b82c8bcbf2c6b92a9a53fdd74646d60f9941ca27e", 0x1d}], 0x4}}], 0x2, 0x4c004) sendmmsg(r0, &(0x7f0000007fc0), 0x800001d, 0x0) 06:08:37 executing program 2: 06:08:37 executing program 0: r0 = perf_event_open(&(0x7f0000000640)={0x3, 0x70, 0x3e7, 0x0, 0x4, 0x0, 0x0, 0x0, 0x91dd7106ca8fd33b, 0xdb3fedb3c3734f95, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x40000000000, 0x0, 0x1, 0x0, @perf_config_ext={0x18, 0x3}, 0x21, 0x10000000000000, 0x0, 0x0, 0x0, 0x20000007, 0x2}, 0x0, 0xc, 0xffffffffffffffff, 0xa) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='cpuacct.stat\x00', 0x0, 0x0) r2 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r2, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f00000003c0)='syz1\x00', 0x200002, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0xfffffffffffffffc) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000300)='./cgroup/syz0\x00', 0x200002, 0x0) gettid() socket$kcm(0x11, 0xb, 0x0) ioctl$TUNSETTXFILTER(r1, 0x400454d1, &(0x7f00000000c0)=ANY=[@ANYBLOB="00000700000000da6500bbc4bbbbbbbb0180c2000016000000004dc23f0c000000000000bb"]) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000040)=@ipx={0x4, 0x1, 0x0, "2bfaec665b4b", 0xff}, 0x80, 0x0}, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={0xffffffffffffffff, 0x1, 0x49c42ca22ab5a9ac, 0x4, 0x0}, 0x20) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x908b7aabaa7d2404) socket$kcm(0xa, 0x6, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x4000011) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000000c0), 0x0}, 0x28) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x89f1, &(0x7f0000000000)='ip6gre0\x00') socket$kcm(0x10, 0x0, 0x10) sendmsg$kcm(r4, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d200040080000048000001000080000000000300f88000f01700d4bd", 0x2e}], 0xf}, 0x40094) r5 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r6 = socket$kcm(0x2, 0x1, 0x2) socketpair(0x25, 0x6, 0x4, &(0x7f0000000480)) setsockopt$sock_attach_bpf(r6, 0x1, 0x3e, &(0x7f00000002c0)=r5, 0x4) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x6d, &(0x7f0000000cc0)=ANY=[@ANYRESHEX, @ANYBLOB="e99f619c950ec8069b69ac05520100000000000000572e83f4fd34a6db69715afdc8ec492fa879a8460bf2c7459f384ec36d6f0d833fccc87dc8f542ca0731ec72c3f6e0857c63572db61a83246496a2f90400569c8af42a5b8b1e3583115dfe3a40a792ffe638fd722afd02131c170175f382a8d78b6626d1d58220f08d98570bad00042a01c00748cf37385e7d66e6c0efddeb730ebd2f1ab4e816cf7493cf236ca5eb6e5d2a65519a7acf475dbd9fb52eb50ddcf9cee74529f59a2d6cfe6c23f6a688719f922099394146621132f866439970571e206ac47123f2d9cdb5cb7c8506122300000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000)={0x0, 0x8}, 0x10}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r7, 0x18000000000002a0, 0x42, 0x0, &(0x7f0000000800)="b9ff0300600d698cb89e14f088a81fffffff00004000630677fbac14140ee934a0a662079f4b4d2f87e5feca6aab845013f2325f1a39010108038da1924425181aa5", 0x0, 0x28000, 0x60000000, 0x113, 0x0, &(0x7f00000006c0)="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"}, 0x40) r8 = bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x17, 0x6, &(0x7f0000000c00)=ANY=[], &(0x7f00000002c0)='GPL\x00', 0x2, 0x0, 0x0, 0x40f00, 0x8, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000340)={0x1, 0x10000003}, 0x8, 0x10, &(0x7f0000000380)={0x0, 0xa, 0x83, 0x2}, 0x10}, 0x78) ioctl$sock_kcm_SIOCKCMATTACH(r4, 0x89e0, &(0x7f0000000500)={0xffffffffffffffff, r8}) 06:08:38 executing program 2: 06:08:38 executing program 3: [ 221.321563][ T9568] IPVS: ftp: loaded support on port[0] = 21 06:08:38 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(r4, &(0x7f0000000100)={0x26, 'hash\x00', 0x0, 0x0, 'crct10dif-generic\x00'}, 0x58) accept$alg(r4, 0x0, 0x0) splice(r0, 0x0, 0xffffffffffffffff, 0x0, 0x30007, 0x0) 06:08:38 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet_udp_int(r0, 0x11, 0x67, &(0x7f0000000140), 0x4) sendmmsg(r0, &(0x7f0000006f00)=[{{&(0x7f0000000040)=@in={0x2, 0x4e23, @remote}, 0x80, &(0x7f0000000100)=[{&(0x7f00000000c0)="e04013b497936ecafdd12c496f522cc2830fd358bc8f890e410223906070a39cc6e2f84a8622c5f86cad52bba1560397737a6cce189d7db27e", 0x39}], 0x1}}, {{0x0, 0x0, &(0x7f0000000440)=[{&(0x7f0000000200)="9544939c01e602e8fc696947591d4c6fb3cb9a7cf9e53555dac91c09bbd33a6e85981e045d", 0x25}, {&(0x7f0000000240)="b995a5bf327c6f291a70af1527c6eb87af6b40c22e784c7d81102b1d2c4f5434d0142b1efa49361c7fa370cde02cbad1cdf556d5ebe84042e5b1eee75566d3c3bd4e54fb80c6258eb985131872c446ae99febe93703f66f4e0e10392c8a0d30f35710c7490190fef84833442ab74de59e4c9ebbc7cfe3f26750c16970d537ab353640e9e46e706cd200383135bfbf29b19c2fe729da592a9fb74eca37cb46775eb6db0118a3c59ac107fcf691822488d67f90e891045cb2ea35a79b6cd27c9fa5f37c9f6d6e4e2ca9267b2a8aa34f9727b0f539f", 0xd4}, {&(0x7f0000000340)="529cd4456bccdb80c030fe01e5cd61704126c8d4e7ec", 0x16}, {&(0x7f0000000380)="c2597979197f75ed6b82c8bcbf2c6b92a9a53fdd74646d60f9941ca27e", 0x1d}], 0x4}}], 0x2, 0x4c004) sendmmsg(r0, &(0x7f0000007fc0), 0x800001d, 0x0) 06:08:38 executing program 2: 06:08:38 executing program 0: r0 = perf_event_open(&(0x7f0000000640)={0x3, 0x70, 0x3e7, 0x0, 0x4, 0x0, 0x0, 0x0, 0x91dd7106ca8fd33b, 0xdb3fedb3c3734f95, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x40000000000, 0x0, 0x1, 0x0, @perf_config_ext={0x18, 0x3}, 0x21, 0x10000000000000, 0x0, 0x0, 0x0, 0x20000007, 0x2}, 0x0, 0xc, 0xffffffffffffffff, 0xa) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='cpuacct.stat\x00', 0x0, 0x0) r2 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r2, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f00000003c0)='syz1\x00', 0x200002, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0xfffffffffffffffc) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000300)='./cgroup/syz0\x00', 0x200002, 0x0) gettid() socket$kcm(0x11, 0xb, 0x0) ioctl$TUNSETTXFILTER(r1, 0x400454d1, &(0x7f00000000c0)=ANY=[@ANYBLOB="00000700000000da6500bbc4bbbbbbbb0180c2000016000000004dc23f0c000000000000bb"]) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000040)=@ipx={0x4, 0x1, 0x0, "2bfaec665b4b", 0xff}, 0x80, 0x0}, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={0xffffffffffffffff, 0x1, 0x49c42ca22ab5a9ac, 0x4, 0x0}, 0x20) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x908b7aabaa7d2404) socket$kcm(0xa, 0x6, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x4000011) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000000c0), 0x0}, 0x28) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x89f1, &(0x7f0000000000)='ip6gre0\x00') socket$kcm(0x10, 0x0, 0x10) sendmsg$kcm(r4, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d200040080000048000001000080000000000300f88000f01700d4bd", 0x2e}], 0xf}, 0x40094) r5 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r6 = socket$kcm(0x2, 0x1, 0x2) socketpair(0x25, 0x6, 0x4, &(0x7f0000000480)) setsockopt$sock_attach_bpf(r6, 0x1, 0x3e, &(0x7f00000002c0)=r5, 0x4) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x6d, &(0x7f0000000cc0)=ANY=[@ANYRESHEX, @ANYBLOB="e99f619c950ec8069b69ac05520100000000000000572e83f4fd34a6db69715afdc8ec492fa879a8460bf2c7459f384ec36d6f0d833fccc87dc8f542ca0731ec72c3f6e0857c63572db61a83246496a2f90400569c8af42a5b8b1e3583115dfe3a40a792ffe638fd722afd02131c170175f382a8d78b6626d1d58220f08d98570bad00042a01c00748cf37385e7d66e6c0efddeb730ebd2f1ab4e816cf7493cf236ca5eb6e5d2a65519a7acf475dbd9fb52eb50ddcf9cee74529f59a2d6cfe6c23f6a688719f922099394146621132f866439970571e206ac47123f2d9cdb5cb7c8506122300000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000)={0x0, 0x8}, 0x10}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r7, 0x18000000000002a0, 0x42, 0x0, &(0x7f0000000800)="b9ff0300600d698cb89e14f088a81fffffff00004000630677fbac14140ee934a0a662079f4b4d2f87e5feca6aab845013f2325f1a39010108038da1924425181aa5", 0x0, 0x28000, 0x60000000, 0x113, 0x0, &(0x7f00000006c0)="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"}, 0x40) r8 = bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x17, 0x6, &(0x7f0000000c00)=ANY=[], &(0x7f00000002c0)='GPL\x00', 0x2, 0x0, 0x0, 0x40f00, 0x8, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000340)={0x1, 0x10000003}, 0x8, 0x10, &(0x7f0000000380)={0x0, 0xa, 0x83, 0x2}, 0x10}, 0x78) ioctl$sock_kcm_SIOCKCMATTACH(r4, 0x89e0, &(0x7f0000000500)={0xffffffffffffffff, r8}) 06:08:38 executing program 3: 06:08:38 executing program 4: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0x40047438, &(0x7f0000000180)=""/246) ioctl$PPPIOCSFLAGS1(r0, 0x40047457, &(0x7f0000000000)) 06:08:38 executing program 2: 06:08:38 executing program 3: 06:08:38 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet_udp_int(r0, 0x11, 0x67, &(0x7f0000000140), 0x4) sendmmsg(r0, &(0x7f0000006f00)=[{{&(0x7f0000000040)=@in={0x2, 0x4e23, @remote}, 0x80, &(0x7f0000000100)=[{&(0x7f00000000c0)="e04013b497936ecafdd12c496f522cc2830fd358bc8f890e410223906070a39cc6e2f84a8622c5f86cad52bba1560397737a6cce189d7db27e", 0x39}], 0x1}}, {{0x0, 0x0, &(0x7f0000000440)=[{&(0x7f0000000200)="9544939c01e602e8fc696947591d4c6fb3cb9a7cf9e53555dac91c09bbd33a6e85981e045d", 0x25}, {&(0x7f0000000240)="b995a5bf327c6f291a70af1527c6eb87af6b40c22e784c7d81102b1d2c4f5434d0142b1efa49361c7fa370cde02cbad1cdf556d5ebe84042e5b1eee75566d3c3bd4e54fb80c6258eb985131872c446ae99febe93703f66f4e0e10392c8a0d30f35710c7490190fef84833442ab74de59e4c9ebbc7cfe3f26750c16970d537ab353640e9e46e706cd200383135bfbf29b19c2fe729da592a9fb74eca37cb46775eb6db0118a3c59ac107fcf691822488d67f90e891045cb2ea35a79b6cd27c9fa5f37c9f6d6e4e2ca9267b2a8aa34f9727b0f539f", 0xd4}, {&(0x7f0000000340)="529cd4456bccdb80c030fe01e5cd61704126c8d4e7ec", 0x16}, {&(0x7f0000000380)="c2597979197f75ed6b82c8bcbf2c6b92a9a53fdd74646d60f9941ca27e", 0x1d}], 0x4}}], 0x2, 0x4c004) sendmmsg(r0, &(0x7f0000007fc0), 0x800001d, 0x0) 06:08:38 executing program 0: r0 = perf_event_open(&(0x7f0000000640)={0x3, 0x70, 0x3e7, 0x0, 0x4, 0x0, 0x0, 0x0, 0x91dd7106ca8fd33b, 0xdb3fedb3c3734f95, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x40000000000, 0x0, 0x1, 0x0, @perf_config_ext={0x18, 0x3}, 0x21, 0x10000000000000, 0x0, 0x0, 0x0, 0x20000007, 0x2}, 0x0, 0xc, 0xffffffffffffffff, 0xa) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='cpuacct.stat\x00', 0x0, 0x0) r2 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r2, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f00000003c0)='syz1\x00', 0x200002, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0xfffffffffffffffc) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000300)='./cgroup/syz0\x00', 0x200002, 0x0) gettid() socket$kcm(0x11, 0xb, 0x0) ioctl$TUNSETTXFILTER(r1, 0x400454d1, &(0x7f00000000c0)=ANY=[@ANYBLOB="00000700000000da6500bbc4bbbbbbbb0180c2000016000000004dc23f0c000000000000bb"]) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000040)=@ipx={0x4, 0x1, 0x0, "2bfaec665b4b", 0xff}, 0x80, 0x0}, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={0xffffffffffffffff, 0x1, 0x49c42ca22ab5a9ac, 0x4, 0x0}, 0x20) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x908b7aabaa7d2404) socket$kcm(0xa, 0x6, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x4000011) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x89f1, &(0x7f0000000000)='ip6gre0\x00') perf_event_open(&(0x7f00000004c0)={0x0, 0x70, 0x8, 0x6, 0x0, 0x3, 0x0, 0x3, 0x4, 0x0, 0x9, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x1000, 0x0, @perf_config_ext={0x1ff}, 0x40004, 0xfffffffffffffffd, 0x0, 0x8, 0x8, 0x4, 0x80}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0x10, 0x0, 0x10) sendmsg$kcm(r4, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d200040080000048000001000080000000000300f88000f01700d4bd", 0x2e}], 0xf}, 0x40094) r5 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r6 = socket$kcm(0x2, 0x1, 0x2) socketpair(0x25, 0x6, 0x4, &(0x7f0000000480)) setsockopt$sock_attach_bpf(r6, 0x1, 0x3e, &(0x7f00000002c0)=r5, 0x4) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x6d, &(0x7f0000000cc0)=ANY=[@ANYRESHEX, @ANYBLOB="e99f619c950ec8069b69ac05520100000000000000572e83f4fd34a6db69715afdc8ec492fa879a8460bf2c7459f384ec36d6f0d833fccc87dc8f542ca0731ec72c3f6e0857c63572db61a83246496a2f90400569c8af42a5b8b1e3583115dfe3a40a792ffe638fd722afd02131c170175f382a8d78b6626d1d58220f08d98570bad00042a01c00748cf37385e7d66e6c0efddeb730ebd2f1ab4e816cf7493cf236ca5eb6e5d2a65519a7acf475dbd9fb52eb50ddcf9cee74529f59a2d6cfe6c23f6a688719f922099394146621132f866439970571e206ac47123f2d9cdb5cb7c8506122300000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000)={0x0, 0x8}, 0x10}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r7, 0x18000000000002a0, 0x42, 0x0, &(0x7f0000000800)="b9ff0300600d698cb89e14f088a81fffffff00004000630677fbac14140ee934a0a662079f4b4d2f87e5feca6aab845013f2325f1a39010108038da1924425181aa5", 0x0, 0x28000, 0x60000000, 0x113, 0x0, &(0x7f00000006c0)="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"}, 0x40) r8 = bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x17, 0x6, &(0x7f0000000c00)=ANY=[], &(0x7f00000002c0)='GPL\x00', 0x2, 0x0, 0x0, 0x40f00, 0x8, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000340)={0x1, 0x10000003}, 0x8, 0x10, &(0x7f0000000380)={0x0, 0xa, 0x83, 0x2}, 0x10}, 0x78) ioctl$sock_kcm_SIOCKCMATTACH(r4, 0x89e0, &(0x7f0000000500)={0xffffffffffffffff, r8}) 06:08:39 executing program 2: 06:08:39 executing program 3: [ 222.269861][ T9621] IPVS: ftp: loaded support on port[0] = 21 06:08:39 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(r4, &(0x7f0000000100)={0x26, 'hash\x00', 0x0, 0x0, 'crct10dif-generic\x00'}, 0x58) accept$alg(r4, 0x0, 0x0) splice(r0, 0x0, 0xffffffffffffffff, 0x0, 0x30007, 0x0) 06:08:39 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet_udp_int(r0, 0x11, 0x67, &(0x7f0000000140)=0x6, 0x4) sendmmsg(0xffffffffffffffff, &(0x7f0000006f00)=[{{&(0x7f0000000040)=@in={0x2, 0x4e23, @remote}, 0x80, &(0x7f0000000100)=[{&(0x7f00000000c0)="e04013b497936ecafdd12c496f522cc2830fd358bc8f890e410223906070a39cc6e2f84a8622c5f86cad52bba1560397737a6cce189d7db27e", 0x39}], 0x1}}, {{0x0, 0x0, &(0x7f0000000440)=[{&(0x7f0000000200)="9544939c01e602e8fc696947591d4c6fb3cb9a7cf9e53555dac91c09bbd33a6e85981e045d", 0x25}, {&(0x7f0000000240)="b995a5bf327c6f291a70af1527c6eb87af6b40c22e784c7d81102b1d2c4f5434d0142b1efa49361c7fa370cde02cbad1cdf556d5ebe84042e5b1eee75566d3c3bd4e54fb80c6258eb985131872c446ae99febe93703f66f4e0e10392c8a0d30f35710c7490190fef84833442ab74de59e4c9ebbc7cfe3f26750c16970d537ab353640e9e46e706cd200383135bfbf29b19c2fe729da592a9fb74eca37cb46775eb6db0118a3c59ac107fcf691822488d67f90e891045cb2ea35a79b6cd27c9fa5f37c9f6d6e4e2ca9267b2a8aa34f9727b0f539f", 0xd4}, {&(0x7f0000000340)="529cd4456bccdb80c030fe01e5cd61704126c8d4e7ec", 0x16}, {&(0x7f0000000380)="c2597979197f75ed6b82c8bcbf2c6b92a9a53fdd74646d60f9941ca27e", 0x1d}], 0x4}}], 0x2, 0x4c004) sendmmsg(r0, &(0x7f0000007fc0), 0x800001d, 0x0) 06:08:39 executing program 3: 06:08:39 executing program 2: 06:08:39 executing program 0: r0 = perf_event_open(&(0x7f0000000640)={0x3, 0x70, 0x3e7, 0x0, 0x4, 0x0, 0x0, 0x0, 0x91dd7106ca8fd33b, 0xdb3fedb3c3734f95, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x40000000000, 0x0, 0x1, 0x0, @perf_config_ext={0x18, 0x3}, 0x21, 0x10000000000000, 0x0, 0x0, 0x0, 0x20000007, 0x2}, 0x0, 0xc, 0xffffffffffffffff, 0xa) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='cpuacct.stat\x00', 0x0, 0x0) r2 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r2, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f00000003c0)='syz1\x00', 0x200002, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0xfffffffffffffffc) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000300)='./cgroup/syz0\x00', 0x200002, 0x0) gettid() socket$kcm(0x11, 0xb, 0x0) ioctl$TUNSETTXFILTER(r1, 0x400454d1, &(0x7f00000000c0)=ANY=[@ANYBLOB="00000700000000da6500bbc4bbbbbbbb0180c2000016000000004dc23f0c000000000000bb"]) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000040)=@ipx={0x4, 0x1, 0x0, "2bfaec665b4b", 0xff}, 0x80, 0x0}, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={0xffffffffffffffff, 0x1, 0x49c42ca22ab5a9ac, 0x4, 0x0}, 0x20) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x908b7aabaa7d2404) socket$kcm(0xa, 0x6, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x4000011) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x89f1, &(0x7f0000000000)='ip6gre0\x00') perf_event_open(&(0x7f00000004c0)={0x0, 0x70, 0x8, 0x6, 0x0, 0x3, 0x0, 0x3, 0x4, 0x0, 0x9, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x1000, 0x0, @perf_config_ext={0x1ff}, 0x40004, 0xfffffffffffffffd, 0x0, 0x8, 0x8, 0x4, 0x80}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0x10, 0x0, 0x10) sendmsg$kcm(r4, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d200040080000048000001000080000000000300f88000f01700d4bd", 0x2e}], 0xf}, 0x40094) r5 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r6 = socket$kcm(0x2, 0x1, 0x2) socketpair(0x25, 0x6, 0x4, &(0x7f0000000480)) setsockopt$sock_attach_bpf(r6, 0x1, 0x3e, &(0x7f00000002c0)=r5, 0x4) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x6d, &(0x7f0000000cc0)=ANY=[@ANYRESHEX, @ANYBLOB="e99f619c950ec8069b69ac05520100000000000000572e83f4fd34a6db69715afdc8ec492fa879a8460bf2c7459f384ec36d6f0d833fccc87dc8f542ca0731ec72c3f6e0857c63572db61a83246496a2f90400569c8af42a5b8b1e3583115dfe3a40a792ffe638fd722afd02131c170175f382a8d78b6626d1d58220f08d98570bad00042a01c00748cf37385e7d66e6c0efddeb730ebd2f1ab4e816cf7493cf236ca5eb6e5d2a65519a7acf475dbd9fb52eb50ddcf9cee74529f59a2d6cfe6c23f6a688719f922099394146621132f866439970571e206ac47123f2d9cdb5cb7c8506122300000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000)={0x0, 0x8}, 0x10}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r7, 0x18000000000002a0, 0x42, 0x0, &(0x7f0000000800)="b9ff0300600d698cb89e14f088a81fffffff00004000630677fbac14140ee934a0a662079f4b4d2f87e5feca6aab845013f2325f1a39010108038da1924425181aa5", 0x0, 0x28000, 0x60000000, 0x113, 0x0, &(0x7f00000006c0)="097baacf569909ebb78a19b4d4f607feb3072ad9474026c7c148d184a2647de87a8fd14ad5d15cadabd6c7545b05000000ad90e0d4000000000f3f750d2a75f6fa77d3fa4e023987f7a54b04eb238604aa90cab7b44f95ae6ce9b5f877439af64cb6573e5bc85c5e766604ff55b7a234246bd2ee44c9e99d69190bbe089603846d17b8678d05a0bda6ae300ca8c43271b65bb62b0af61bf4da3891f5bcf900ed368b36e2db9957b0dfa5cf084db8cb2b2c54661f9eac8a58a72fc9e768405eb33bce450dd088d2e16d757eeb1239a2389330535afb4944b7b27c4b26d812ab58864f3ffa3ce8cf739275492a0c90b425a792a19b9abf846b926e9f93f4b57ab77c0db63fb7d5a1e04ef52157f14f1dedcc4437"}, 0x40) r8 = bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x17, 0x6, &(0x7f0000000c00)=ANY=[], &(0x7f00000002c0)='GPL\x00', 0x2, 0x0, 0x0, 0x40f00, 0x8, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000340)={0x1, 0x10000003}, 0x8, 0x10, &(0x7f0000000380)={0x0, 0xa, 0x83, 0x2}, 0x10}, 0x78) ioctl$sock_kcm_SIOCKCMATTACH(r4, 0x89e0, &(0x7f0000000500)={0xffffffffffffffff, r8}) 06:08:39 executing program 4: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0x40047438, &(0x7f0000000180)=""/246) ioctl$PPPIOCSFLAGS1(r0, 0x40047457, &(0x7f0000000000)) 06:08:39 executing program 3: 06:08:39 executing program 2: 06:08:39 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet_udp_int(r0, 0x11, 0x67, &(0x7f0000000140)=0x6, 0x4) sendmmsg(0xffffffffffffffff, &(0x7f0000006f00)=[{{&(0x7f0000000040)=@in={0x2, 0x4e23, @remote}, 0x80, &(0x7f0000000100)=[{&(0x7f00000000c0)="e04013b497936ecafdd12c496f522cc2830fd358bc8f890e410223906070a39cc6e2f84a8622c5f86cad52bba1560397737a6cce189d7db27e", 0x39}], 0x1}}, {{0x0, 0x0, &(0x7f0000000440)=[{&(0x7f0000000200)="9544939c01e602e8fc696947591d4c6fb3cb9a7cf9e53555dac91c09bbd33a6e85981e045d", 0x25}, {&(0x7f0000000240)="b995a5bf327c6f291a70af1527c6eb87af6b40c22e784c7d81102b1d2c4f5434d0142b1efa49361c7fa370cde02cbad1cdf556d5ebe84042e5b1eee75566d3c3bd4e54fb80c6258eb985131872c446ae99febe93703f66f4e0e10392c8a0d30f35710c7490190fef84833442ab74de59e4c9ebbc7cfe3f26750c16970d537ab353640e9e46e706cd200383135bfbf29b19c2fe729da592a9fb74eca37cb46775eb6db0118a3c59ac107fcf691822488d67f90e891045cb2ea35a79b6cd27c9fa5f37c9f6d6e4e2ca9267b2a8aa34f9727b0f539f", 0xd4}, {&(0x7f0000000340)="529cd4456bccdb80c030fe01e5cd61704126c8d4e7ec", 0x16}, {&(0x7f0000000380)="c2597979197f75ed6b82c8bcbf2c6b92a9a53fdd74646d60f9941ca27e", 0x1d}], 0x4}}], 0x2, 0x4c004) sendmmsg(r0, &(0x7f0000007fc0), 0x800001d, 0x0) 06:08:39 executing program 0: r0 = perf_event_open(&(0x7f0000000640)={0x3, 0x70, 0x3e7, 0x0, 0x4, 0x0, 0x0, 0x0, 0x91dd7106ca8fd33b, 0xdb3fedb3c3734f95, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x40000000000, 0x0, 0x1, 0x0, @perf_config_ext={0x18, 0x3}, 0x21, 0x10000000000000, 0x0, 0x0, 0x0, 0x20000007, 0x2}, 0x0, 0xc, 0xffffffffffffffff, 0xa) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='cpuacct.stat\x00', 0x0, 0x0) r2 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r2, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f00000003c0)='syz1\x00', 0x200002, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0xfffffffffffffffc) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000300)='./cgroup/syz0\x00', 0x200002, 0x0) gettid() socket$kcm(0x11, 0xb, 0x0) ioctl$TUNSETTXFILTER(r1, 0x400454d1, &(0x7f00000000c0)=ANY=[@ANYBLOB="00000700000000da6500bbc4bbbbbbbb0180c2000016000000004dc23f0c000000000000bb"]) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000040)=@ipx={0x4, 0x1, 0x0, "2bfaec665b4b", 0xff}, 0x80, 0x0}, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={0xffffffffffffffff, 0x1, 0x49c42ca22ab5a9ac, 0x4, 0x0}, 0x20) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x908b7aabaa7d2404) socket$kcm(0xa, 0x6, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x4000011) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x89f1, &(0x7f0000000000)='ip6gre0\x00') perf_event_open(&(0x7f00000004c0)={0x0, 0x70, 0x8, 0x6, 0x0, 0x3, 0x0, 0x3, 0x4, 0x0, 0x9, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x1000, 0x0, @perf_config_ext={0x1ff}, 0x40004, 0xfffffffffffffffd, 0x0, 0x8, 0x8, 0x4, 0x80}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0x10, 0x0, 0x10) sendmsg$kcm(r4, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d200040080000048000001000080000000000300f88000f01700d4bd", 0x2e}], 0xf}, 0x40094) r5 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r6 = socket$kcm(0x2, 0x1, 0x2) socketpair(0x25, 0x6, 0x4, &(0x7f0000000480)) setsockopt$sock_attach_bpf(r6, 0x1, 0x3e, &(0x7f00000002c0)=r5, 0x4) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x6d, &(0x7f0000000cc0)=ANY=[@ANYRESHEX, @ANYBLOB="e99f619c950ec8069b69ac05520100000000000000572e83f4fd34a6db69715afdc8ec492fa879a8460bf2c7459f384ec36d6f0d833fccc87dc8f542ca0731ec72c3f6e0857c63572db61a83246496a2f90400569c8af42a5b8b1e3583115dfe3a40a792ffe638fd722afd02131c170175f382a8d78b6626d1d58220f08d98570bad00042a01c00748cf37385e7d66e6c0efddeb730ebd2f1ab4e816cf7493cf236ca5eb6e5d2a65519a7acf475dbd9fb52eb50ddcf9cee74529f59a2d6cfe6c23f6a688719f922099394146621132f866439970571e206ac47123f2d9cdb5cb7c8506122300000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000)={0x0, 0x8}, 0x10}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r7, 0x18000000000002a0, 0x42, 0x0, &(0x7f0000000800)="b9ff0300600d698cb89e14f088a81fffffff00004000630677fbac14140ee934a0a662079f4b4d2f87e5feca6aab845013f2325f1a39010108038da1924425181aa5", 0x0, 0x28000, 0x60000000, 0x113, 0x0, &(0x7f00000006c0)="097baacf569909ebb78a19b4d4f607feb3072ad9474026c7c148d184a2647de87a8fd14ad5d15cadabd6c7545b05000000ad90e0d4000000000f3f750d2a75f6fa77d3fa4e023987f7a54b04eb238604aa90cab7b44f95ae6ce9b5f877439af64cb6573e5bc85c5e766604ff55b7a234246bd2ee44c9e99d69190bbe089603846d17b8678d05a0bda6ae300ca8c43271b65bb62b0af61bf4da3891f5bcf900ed368b36e2db9957b0dfa5cf084db8cb2b2c54661f9eac8a58a72fc9e768405eb33bce450dd088d2e16d757eeb1239a2389330535afb4944b7b27c4b26d812ab58864f3ffa3ce8cf739275492a0c90b425a792a19b9abf846b926e9f93f4b57ab77c0db63fb7d5a1e04ef52157f14f1dedcc4437"}, 0x40) r8 = bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x17, 0x6, &(0x7f0000000c00)=ANY=[], &(0x7f00000002c0)='GPL\x00', 0x2, 0x0, 0x0, 0x40f00, 0x8, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000340)={0x1, 0x10000003}, 0x8, 0x10, &(0x7f0000000380)={0x0, 0xa, 0x83, 0x2}, 0x10}, 0x78) ioctl$sock_kcm_SIOCKCMATTACH(r4, 0x89e0, &(0x7f0000000500)={0xffffffffffffffff, r8}) 06:08:39 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet_udp_int(r0, 0x11, 0x67, &(0x7f0000000140)=0x6, 0x4) sendmmsg(0xffffffffffffffff, &(0x7f0000006f00)=[{{&(0x7f0000000040)=@in={0x2, 0x4e23, @remote}, 0x80, &(0x7f0000000100)=[{&(0x7f00000000c0)="e04013b497936ecafdd12c496f522cc2830fd358bc8f890e410223906070a39cc6e2f84a8622c5f86cad52bba1560397737a6cce189d7db27e", 0x39}], 0x1}}, {{0x0, 0x0, &(0x7f0000000440)=[{&(0x7f0000000200)="9544939c01e602e8fc696947591d4c6fb3cb9a7cf9e53555dac91c09bbd33a6e85981e045d", 0x25}, {&(0x7f0000000240)="b995a5bf327c6f291a70af1527c6eb87af6b40c22e784c7d81102b1d2c4f5434d0142b1efa49361c7fa370cde02cbad1cdf556d5ebe84042e5b1eee75566d3c3bd4e54fb80c6258eb985131872c446ae99febe93703f66f4e0e10392c8a0d30f35710c7490190fef84833442ab74de59e4c9ebbc7cfe3f26750c16970d537ab353640e9e46e706cd200383135bfbf29b19c2fe729da592a9fb74eca37cb46775eb6db0118a3c59ac107fcf691822488d67f90e891045cb2ea35a79b6cd27c9fa5f37c9f6d6e4e2ca9267b2a8aa34f9727b0f539f", 0xd4}, {&(0x7f0000000340)="529cd4456bccdb80c030fe01e5cd61704126c8d4e7ec", 0x16}, {&(0x7f0000000380)="c2597979197f75ed6b82c8bcbf2c6b92a9a53fdd74646d60f9941ca27e", 0x1d}], 0x4}}], 0x2, 0x4c004) sendmmsg(r0, &(0x7f0000007fc0), 0x800001d, 0x0) 06:08:39 executing program 2: [ 223.162960][ T9673] IPVS: ftp: loaded support on port[0] = 21 06:08:40 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(r4, &(0x7f0000000100)={0x26, 'hash\x00', 0x0, 0x0, 'crct10dif-generic\x00'}, 0x58) accept$alg(r4, 0x0, 0x0) splice(r0, 0x0, 0xffffffffffffffff, 0x0, 0x30007, 0x0) 06:08:40 executing program 3: 06:08:40 executing program 2: 06:08:40 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet_udp_int(r0, 0x11, 0x67, &(0x7f0000000140)=0x6, 0x4) sendmmsg(r0, 0x0, 0x0, 0x4c004) sendmmsg(r0, &(0x7f0000007fc0), 0x800001d, 0x0) 06:08:40 executing program 0: r0 = perf_event_open(&(0x7f0000000640)={0x3, 0x70, 0x3e7, 0x0, 0x4, 0x0, 0x0, 0x0, 0x91dd7106ca8fd33b, 0xdb3fedb3c3734f95, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x40000000000, 0x0, 0x1, 0x0, @perf_config_ext={0x18, 0x3}, 0x21, 0x10000000000000, 0x0, 0x0, 0x0, 0x20000007, 0x2}, 0x0, 0xc, 0xffffffffffffffff, 0xa) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='cpuacct.stat\x00', 0x0, 0x0) r2 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r2, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f00000003c0)='syz1\x00', 0x200002, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0xfffffffffffffffc) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000300)='./cgroup/syz0\x00', 0x200002, 0x0) gettid() socket$kcm(0x11, 0xb, 0x0) ioctl$TUNSETTXFILTER(r1, 0x400454d1, &(0x7f00000000c0)=ANY=[@ANYBLOB="00000700000000da6500bbc4bbbbbbbb0180c2000016000000004dc23f0c000000000000bb"]) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000040)=@ipx={0x4, 0x1, 0x0, "2bfaec665b4b", 0xff}, 0x80, 0x0}, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={0xffffffffffffffff, 0x1, 0x49c42ca22ab5a9ac, 0x4, 0x0}, 0x20) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x908b7aabaa7d2404) socket$kcm(0xa, 0x6, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x4000011) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000000c0), 0x0}, 0x28) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, &(0x7f0000000000)='ip6gre0\x00') perf_event_open(&(0x7f00000004c0)={0x0, 0x70, 0x8, 0x6, 0x0, 0x3, 0x0, 0x3, 0x4, 0x0, 0x9, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x1000, 0x0, @perf_config_ext={0x1ff}, 0x40004, 0xfffffffffffffffd, 0x0, 0x8, 0x8, 0x4, 0x80}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0x10, 0x0, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d200040080000048000001000080000000000300f88000f01700d4bd", 0x2e}], 0xf}, 0x40094) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r4 = socket$kcm(0x2, 0x1, 0x2) socketpair(0x25, 0x6, 0x4, &(0x7f0000000480)) setsockopt$sock_attach_bpf(r4, 0x1, 0x3e, &(0x7f00000002c0)=r3, 0x4) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x6d, &(0x7f0000000cc0)=ANY=[@ANYRESHEX, @ANYBLOB="e99f619c950ec8069b69ac05520100000000000000572e83f4fd34a6db69715afdc8ec492fa879a8460bf2c7459f384ec36d6f0d833fccc87dc8f542ca0731ec72c3f6e0857c63572db61a83246496a2f90400569c8af42a5b8b1e3583115dfe3a40a792ffe638fd722afd02131c170175f382a8d78b6626d1d58220f08d98570bad00042a01c00748cf37385e7d66e6c0efddeb730ebd2f1ab4e816cf7493cf236ca5eb6e5d2a65519a7acf475dbd9fb52eb50ddcf9cee74529f59a2d6cfe6c23f6a688719f922099394146621132f866439970571e206ac47123f2d9cdb5cb7c8506122300000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000)={0x0, 0x8}, 0x10}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r5, 0x18000000000002a0, 0x42, 0x0, &(0x7f0000000800)="b9ff0300600d698cb89e14f088a81fffffff00004000630677fbac14140ee934a0a662079f4b4d2f87e5feca6aab845013f2325f1a39010108038da1924425181aa5", 0x0, 0x28000, 0x60000000, 0x113, 0x0, &(0x7f00000006c0)="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"}, 0x40) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x17, 0x6, &(0x7f0000000c00)=ANY=[], &(0x7f00000002c0)='GPL\x00', 0x2, 0x0, 0x0, 0x40f00, 0x8, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000340)={0x1, 0x10000003}, 0x8, 0x10, &(0x7f0000000380)={0x0, 0xa, 0x83, 0x2}, 0x10}, 0x78) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, &(0x7f0000000500)={0xffffffffffffffff, r6}) 06:08:40 executing program 4: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f00000000c0)=0xe) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0x40047438, &(0x7f0000000180)=""/246) ioctl$PPPIOCSFLAGS1(r0, 0x40047457, &(0x7f0000000000)) 06:08:40 executing program 3: 06:08:40 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet_udp_int(r0, 0x11, 0x67, &(0x7f0000000140)=0x6, 0x4) sendmmsg(r0, 0x0, 0x0, 0x4c004) sendmmsg(r0, &(0x7f0000007fc0), 0x800001d, 0x0) 06:08:40 executing program 2: 06:08:40 executing program 0: r0 = perf_event_open(&(0x7f0000000640)={0x3, 0x70, 0x3e7, 0x0, 0x4, 0x0, 0x0, 0x0, 0x91dd7106ca8fd33b, 0xdb3fedb3c3734f95, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x40000000000, 0x0, 0x1, 0x0, @perf_config_ext={0x18, 0x3}, 0x21, 0x10000000000000, 0x0, 0x0, 0x0, 0x20000007, 0x2}, 0x0, 0xc, 0xffffffffffffffff, 0xa) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='cpuacct.stat\x00', 0x0, 0x0) r2 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r2, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f00000003c0)='syz1\x00', 0x200002, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0xfffffffffffffffc) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000300)='./cgroup/syz0\x00', 0x200002, 0x0) gettid() socket$kcm(0x11, 0xb, 0x0) ioctl$TUNSETTXFILTER(r1, 0x400454d1, &(0x7f00000000c0)=ANY=[@ANYBLOB="00000700000000da6500bbc4bbbbbbbb0180c2000016000000004dc23f0c000000000000bb"]) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000040)=@ipx={0x4, 0x1, 0x0, "2bfaec665b4b", 0xff}, 0x80, 0x0}, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={0xffffffffffffffff, 0x1, 0x49c42ca22ab5a9ac, 0x4, 0x0}, 0x20) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x908b7aabaa7d2404) socket$kcm(0xa, 0x6, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x4000011) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000000c0), 0x0}, 0x28) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, &(0x7f0000000000)='ip6gre0\x00') perf_event_open(&(0x7f00000004c0)={0x0, 0x70, 0x8, 0x6, 0x0, 0x3, 0x0, 0x3, 0x4, 0x0, 0x9, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x1000, 0x0, @perf_config_ext={0x1ff}, 0x40004, 0xfffffffffffffffd, 0x0, 0x8, 0x8, 0x4, 0x80}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0x10, 0x0, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d200040080000048000001000080000000000300f88000f01700d4bd", 0x2e}], 0xf}, 0x40094) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r4 = socket$kcm(0x2, 0x1, 0x2) socketpair(0x25, 0x6, 0x4, &(0x7f0000000480)) setsockopt$sock_attach_bpf(r4, 0x1, 0x3e, &(0x7f00000002c0)=r3, 0x4) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x6d, &(0x7f0000000cc0)=ANY=[@ANYRESHEX, @ANYBLOB="e99f619c950ec8069b69ac05520100000000000000572e83f4fd34a6db69715afdc8ec492fa879a8460bf2c7459f384ec36d6f0d833fccc87dc8f542ca0731ec72c3f6e0857c63572db61a83246496a2f90400569c8af42a5b8b1e3583115dfe3a40a792ffe638fd722afd02131c170175f382a8d78b6626d1d58220f08d98570bad00042a01c00748cf37385e7d66e6c0efddeb730ebd2f1ab4e816cf7493cf236ca5eb6e5d2a65519a7acf475dbd9fb52eb50ddcf9cee74529f59a2d6cfe6c23f6a688719f922099394146621132f866439970571e206ac47123f2d9cdb5cb7c8506122300000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000)={0x0, 0x8}, 0x10}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r5, 0x18000000000002a0, 0x42, 0x0, &(0x7f0000000800)="b9ff0300600d698cb89e14f088a81fffffff00004000630677fbac14140ee934a0a662079f4b4d2f87e5feca6aab845013f2325f1a39010108038da1924425181aa5", 0x0, 0x28000, 0x60000000, 0x113, 0x0, &(0x7f00000006c0)="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"}, 0x40) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x17, 0x6, &(0x7f0000000c00)=ANY=[], &(0x7f00000002c0)='GPL\x00', 0x2, 0x0, 0x0, 0x40f00, 0x8, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000340)={0x1, 0x10000003}, 0x8, 0x10, &(0x7f0000000380)={0x0, 0xa, 0x83, 0x2}, 0x10}, 0x78) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, &(0x7f0000000500)={0xffffffffffffffff, r6}) 06:08:40 executing program 2: 06:08:40 executing program 3: [ 224.078390][ T9726] IPVS: ftp: loaded support on port[0] = 21 06:08:41 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(r4, &(0x7f0000000100)={0x26, 'hash\x00', 0x0, 0x0, 'crct10dif-generic\x00'}, 0x58) r5 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) splice(r0, 0x0, r5, 0x0, 0x30007, 0x0) 06:08:41 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet_udp_int(r0, 0x11, 0x67, &(0x7f0000000140)=0x6, 0x4) sendmmsg(r0, 0x0, 0x0, 0x4c004) sendmmsg(r0, &(0x7f0000007fc0), 0x800001d, 0x0) 06:08:41 executing program 0: r0 = perf_event_open(&(0x7f0000000640)={0x3, 0x70, 0x3e7, 0x0, 0x4, 0x0, 0x0, 0x0, 0x91dd7106ca8fd33b, 0xdb3fedb3c3734f95, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x40000000000, 0x0, 0x1, 0x0, @perf_config_ext={0x18, 0x3}, 0x21, 0x10000000000000, 0x0, 0x0, 0x0, 0x20000007, 0x2}, 0x0, 0xc, 0xffffffffffffffff, 0xa) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='cpuacct.stat\x00', 0x0, 0x0) r2 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r2, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f00000003c0)='syz1\x00', 0x200002, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0xfffffffffffffffc) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000300)='./cgroup/syz0\x00', 0x200002, 0x0) gettid() socket$kcm(0x11, 0xb, 0x0) ioctl$TUNSETTXFILTER(r1, 0x400454d1, &(0x7f00000000c0)=ANY=[@ANYBLOB="00000700000000da6500bbc4bbbbbbbb0180c2000016000000004dc23f0c000000000000bb"]) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000040)=@ipx={0x4, 0x1, 0x0, "2bfaec665b4b", 0xff}, 0x80, 0x0}, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={0xffffffffffffffff, 0x1, 0x49c42ca22ab5a9ac, 0x4, 0x0}, 0x20) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x908b7aabaa7d2404) socket$kcm(0xa, 0x6, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x4000011) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000000c0), 0x0}, 0x28) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, &(0x7f0000000000)='ip6gre0\x00') perf_event_open(&(0x7f00000004c0)={0x0, 0x70, 0x8, 0x6, 0x0, 0x3, 0x0, 0x3, 0x4, 0x0, 0x9, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x1000, 0x0, @perf_config_ext={0x1ff}, 0x40004, 0xfffffffffffffffd, 0x0, 0x8, 0x8, 0x4, 0x80}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0x10, 0x0, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d200040080000048000001000080000000000300f88000f01700d4bd", 0x2e}], 0xf}, 0x40094) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r4 = socket$kcm(0x2, 0x1, 0x2) socketpair(0x25, 0x6, 0x4, &(0x7f0000000480)) setsockopt$sock_attach_bpf(r4, 0x1, 0x3e, &(0x7f00000002c0)=r3, 0x4) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x6d, &(0x7f0000000cc0)=ANY=[@ANYRESHEX, @ANYBLOB="e99f619c950ec8069b69ac05520100000000000000572e83f4fd34a6db69715afdc8ec492fa879a8460bf2c7459f384ec36d6f0d833fccc87dc8f542ca0731ec72c3f6e0857c63572db61a83246496a2f90400569c8af42a5b8b1e3583115dfe3a40a792ffe638fd722afd02131c170175f382a8d78b6626d1d58220f08d98570bad00042a01c00748cf37385e7d66e6c0efddeb730ebd2f1ab4e816cf7493cf236ca5eb6e5d2a65519a7acf475dbd9fb52eb50ddcf9cee74529f59a2d6cfe6c23f6a688719f922099394146621132f866439970571e206ac47123f2d9cdb5cb7c8506122300000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000)={0x0, 0x8}, 0x10}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r5, 0x18000000000002a0, 0x42, 0x0, &(0x7f0000000800)="b9ff0300600d698cb89e14f088a81fffffff00004000630677fbac14140ee934a0a662079f4b4d2f87e5feca6aab845013f2325f1a39010108038da1924425181aa5", 0x0, 0x28000, 0x60000000, 0x113, 0x0, &(0x7f00000006c0)="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"}, 0x40) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x17, 0x6, &(0x7f0000000c00)=ANY=[], &(0x7f00000002c0)='GPL\x00', 0x2, 0x0, 0x0, 0x40f00, 0x8, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000340)={0x1, 0x10000003}, 0x8, 0x10, &(0x7f0000000380)={0x0, 0xa, 0x83, 0x2}, 0x10}, 0x78) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, &(0x7f0000000500)={0xffffffffffffffff, r6}) 06:08:41 executing program 2: 06:08:41 executing program 3: 06:08:41 executing program 4: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f00000000c0)=0xe) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0x40047438, &(0x7f0000000180)=""/246) ioctl$PPPIOCSFLAGS1(r0, 0x40047457, &(0x7f0000000000)) 06:08:41 executing program 2: 06:08:41 executing program 3: 06:08:41 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet_udp_int(r0, 0x11, 0x67, &(0x7f0000000140)=0x6, 0x4) sendmmsg(r0, &(0x7f0000006f00)=[{{&(0x7f0000000040)=@in={0x2, 0x4e23, @remote}, 0x80, &(0x7f0000000100)=[{&(0x7f00000000c0)="e04013b497936ecafdd12c496f522cc2830fd358bc8f890e410223906070a39cc6e2f84a8622c5f86cad52bba1560397737a6cce189d7db27e", 0x39}], 0x1}}], 0x1, 0x4c004) sendmmsg(r0, &(0x7f0000007fc0), 0x800001d, 0x0) 06:08:41 executing program 2: 06:08:41 executing program 3: 06:08:41 executing program 0: r0 = perf_event_open(&(0x7f0000000640)={0x3, 0x70, 0x3e7, 0x0, 0x4, 0x0, 0x0, 0x0, 0x91dd7106ca8fd33b, 0xdb3fedb3c3734f95, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x40000000000, 0x0, 0x1, 0x0, @perf_config_ext={0x18, 0x3}, 0x21, 0x10000000000000, 0x0, 0x0, 0x0, 0x20000007, 0x2}, 0x0, 0xc, 0xffffffffffffffff, 0xa) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='cpuacct.stat\x00', 0x0, 0x0) r2 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r2, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f00000003c0)='syz1\x00', 0x200002, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0xfffffffffffffffc) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000300)='./cgroup/syz0\x00', 0x200002, 0x0) gettid() socket$kcm(0x11, 0xb, 0x0) ioctl$TUNSETTXFILTER(r1, 0x400454d1, &(0x7f00000000c0)=ANY=[@ANYBLOB="00000700000000da6500bbc4bbbbbbbb0180c2000016000000004dc23f0c000000000000bb"]) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000040)=@ipx={0x4, 0x1, 0x0, "2bfaec665b4b", 0xff}, 0x80, 0x0}, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={0xffffffffffffffff, 0x1, 0x49c42ca22ab5a9ac, 0x4, 0x0}, 0x20) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x908b7aabaa7d2404) socket$kcm(0xa, 0x6, 0x0) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000000c0), 0x0}, 0x28) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x89f1, &(0x7f0000000000)='ip6gre0\x00') perf_event_open(&(0x7f00000004c0)={0x0, 0x70, 0x8, 0x6, 0x0, 0x3, 0x0, 0x3, 0x4, 0x0, 0x9, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x1000, 0x0, @perf_config_ext={0x1ff}, 0x40004, 0xfffffffffffffffd, 0x0, 0x8, 0x8, 0x4, 0x80}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0x10, 0x0, 0x10) sendmsg$kcm(r4, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d200040080000048000001000080000000000300f88000f01700d4bd", 0x2e}], 0xf}, 0x40094) r5 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r6 = socket$kcm(0x2, 0x1, 0x2) socketpair(0x25, 0x6, 0x4, &(0x7f0000000480)) setsockopt$sock_attach_bpf(r6, 0x1, 0x3e, &(0x7f00000002c0)=r5, 0x4) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x6d, &(0x7f0000000cc0)=ANY=[@ANYRESHEX, @ANYBLOB="e99f619c950ec8069b69ac05520100000000000000572e83f4fd34a6db69715afdc8ec492fa879a8460bf2c7459f384ec36d6f0d833fccc87dc8f542ca0731ec72c3f6e0857c63572db61a83246496a2f90400569c8af42a5b8b1e3583115dfe3a40a792ffe638fd722afd02131c170175f382a8d78b6626d1d58220f08d98570bad00042a01c00748cf37385e7d66e6c0efddeb730ebd2f1ab4e816cf7493cf236ca5eb6e5d2a65519a7acf475dbd9fb52eb50ddcf9cee74529f59a2d6cfe6c23f6a688719f922099394146621132f866439970571e206ac47123f2d9cdb5cb7c8506122300000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000)={0x0, 0x8}, 0x10}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r7, 0x18000000000002a0, 0x42, 0x0, &(0x7f0000000800)="b9ff0300600d698cb89e14f088a81fffffff00004000630677fbac14140ee934a0a662079f4b4d2f87e5feca6aab845013f2325f1a39010108038da1924425181aa5", 0x0, 0x28000, 0x60000000, 0x113, 0x0, &(0x7f00000006c0)="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"}, 0x40) r8 = bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x17, 0x6, &(0x7f0000000c00)=ANY=[], &(0x7f00000002c0)='GPL\x00', 0x2, 0x0, 0x0, 0x40f00, 0x8, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000340)={0x1, 0x10000003}, 0x8, 0x10, &(0x7f0000000380)={0x0, 0xa, 0x83, 0x2}, 0x10}, 0x78) ioctl$sock_kcm_SIOCKCMATTACH(r4, 0x89e0, &(0x7f0000000500)={0xffffffffffffffff, r8}) [ 224.922602][ T9775] IPVS: ftp: loaded support on port[0] = 21 06:08:42 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(r4, &(0x7f0000000100)={0x26, 'hash\x00', 0x0, 0x0, 'crct10dif-generic\x00'}, 0x58) r5 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) splice(r0, 0x0, r5, 0x0, 0x30007, 0x0) 06:08:42 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet_udp_int(r0, 0x11, 0x67, &(0x7f0000000140)=0x6, 0x4) sendmmsg(r0, &(0x7f0000006f00)=[{{&(0x7f0000000040)=@in={0x2, 0x4e23, @remote}, 0x80, &(0x7f0000000100)=[{&(0x7f00000000c0)="e04013b497936ecafdd12c496f522cc2830fd358bc8f890e410223906070a39cc6e2f84a8622c5f86cad52bba1560397737a6cce189d7db27e", 0x39}], 0x1}}], 0x1, 0x4c004) sendmmsg(r0, &(0x7f0000007fc0), 0x800001d, 0x0) 06:08:42 executing program 3: syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000280)='./file0\x00', 0xe800, 0x1, &(0x7f0000000180)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x800010, 0x0) r0 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r1, 0x1000) lseek(r1, 0x0, 0x2) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xe7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000240)='./bus\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x8000fffffffe) 06:08:42 executing program 2: pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x5, 0x0) splice(r2, 0x0, r1, 0x0, 0x1000000008, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = syz_open_dev$video(0x0, 0x0, 0x0) splice(r4, 0x0, r3, 0x0, 0x1000000008, 0x0) lseek(r0, 0x8, 0x1) 06:08:42 executing program 0: r0 = perf_event_open(&(0x7f0000000640)={0x3, 0x70, 0x3e7, 0x0, 0x4, 0x0, 0x0, 0x0, 0x91dd7106ca8fd33b, 0xdb3fedb3c3734f95, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x40000000000, 0x0, 0x1, 0x0, @perf_config_ext={0x18, 0x3}, 0x21, 0x10000000000000, 0x0, 0x0, 0x0, 0x20000007, 0x2}, 0x0, 0xc, 0xffffffffffffffff, 0xa) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='cpuacct.stat\x00', 0x0, 0x0) r2 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r2, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f00000003c0)='syz1\x00', 0x200002, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0xfffffffffffffffc) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000300)='./cgroup/syz0\x00', 0x200002, 0x0) gettid() socket$kcm(0x11, 0xb, 0x0) ioctl$TUNSETTXFILTER(r1, 0x400454d1, &(0x7f00000000c0)=ANY=[@ANYBLOB="00000700000000da6500bbc4bbbbbbbb0180c2000016000000004dc23f0c000000000000bb"]) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000040)=@ipx={0x4, 0x1, 0x0, "2bfaec665b4b", 0xff}, 0x80, 0x0}, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={0xffffffffffffffff, 0x1, 0x49c42ca22ab5a9ac, 0x4, 0x0}, 0x20) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x908b7aabaa7d2404) socket$kcm(0xa, 0x6, 0x0) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000000c0), 0x0}, 0x28) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x89f1, &(0x7f0000000000)='ip6gre0\x00') perf_event_open(&(0x7f00000004c0)={0x0, 0x70, 0x8, 0x6, 0x0, 0x3, 0x0, 0x3, 0x4, 0x0, 0x9, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x1000, 0x0, @perf_config_ext={0x1ff}, 0x40004, 0xfffffffffffffffd, 0x0, 0x8, 0x8, 0x4, 0x80}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0x10, 0x0, 0x10) sendmsg$kcm(r4, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d200040080000048000001000080000000000300f88000f01700d4bd", 0x2e}], 0xf}, 0x40094) r5 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r6 = socket$kcm(0x2, 0x1, 0x2) socketpair(0x25, 0x6, 0x4, &(0x7f0000000480)) setsockopt$sock_attach_bpf(r6, 0x1, 0x3e, &(0x7f00000002c0)=r5, 0x4) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x6d, &(0x7f0000000cc0)=ANY=[@ANYRESHEX, @ANYBLOB="e99f619c950ec8069b69ac05520100000000000000572e83f4fd34a6db69715afdc8ec492fa879a8460bf2c7459f384ec36d6f0d833fccc87dc8f542ca0731ec72c3f6e0857c63572db61a83246496a2f90400569c8af42a5b8b1e3583115dfe3a40a792ffe638fd722afd02131c170175f382a8d78b6626d1d58220f08d98570bad00042a01c00748cf37385e7d66e6c0efddeb730ebd2f1ab4e816cf7493cf236ca5eb6e5d2a65519a7acf475dbd9fb52eb50ddcf9cee74529f59a2d6cfe6c23f6a688719f922099394146621132f866439970571e206ac47123f2d9cdb5cb7c8506122300000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000)={0x0, 0x8}, 0x10}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r7, 0x18000000000002a0, 0x42, 0x0, &(0x7f0000000800)="b9ff0300600d698cb89e14f088a81fffffff00004000630677fbac14140ee934a0a662079f4b4d2f87e5feca6aab845013f2325f1a39010108038da1924425181aa5", 0x0, 0x28000, 0x60000000, 0x113, 0x0, &(0x7f00000006c0)="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"}, 0x40) r8 = bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x17, 0x6, &(0x7f0000000c00)=ANY=[], &(0x7f00000002c0)='GPL\x00', 0x2, 0x0, 0x0, 0x40f00, 0x8, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000340)={0x1, 0x10000003}, 0x8, 0x10, &(0x7f0000000380)={0x0, 0xa, 0x83, 0x2}, 0x10}, 0x78) ioctl$sock_kcm_SIOCKCMATTACH(r4, 0x89e0, &(0x7f0000000500)={0xffffffffffffffff, r8}) 06:08:42 executing program 4: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f00000000c0)=0xe) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0x40047438, &(0x7f0000000180)=""/246) ioctl$PPPIOCSFLAGS1(r0, 0x40047457, &(0x7f0000000000)) [ 225.721838][ T27] audit: type=1804 audit(1590041322.527:3): pid=9815 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir990104307/syzkaller.qqRmkJ/52/file0/bus" dev="loop3" ino=27 res=1 [ 225.738349][ T9815] FAT-fs (loop3): error, invalid access to FAT (entry 0x00000311) [ 225.753047][ T9815] FAT-fs (loop3): Filesystem has been set read-only [ 225.765423][ T9815] FAT-fs (loop3): error, invalid access to FAT (entry 0x00000311) [ 225.787505][ T9826] IPVS: ftp: loaded support on port[0] = 21 06:08:42 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet_udp_int(r0, 0x11, 0x67, &(0x7f0000000140)=0x6, 0x4) sendmmsg(r0, &(0x7f0000006f00)=[{{&(0x7f0000000040)=@in={0x2, 0x4e23, @remote}, 0x80, &(0x7f0000000100)=[{&(0x7f00000000c0)="e04013b497936ecafdd12c496f522cc2830fd358bc8f890e410223906070a39cc6e2f84a8622c5f86cad52bba1560397737a6cce189d7db27e", 0x39}], 0x1}}], 0x1, 0x4c004) sendmmsg(r0, &(0x7f0000007fc0), 0x800001d, 0x0) 06:08:42 executing program 0: r0 = perf_event_open(&(0x7f0000000640)={0x3, 0x70, 0x3e7, 0x0, 0x4, 0x0, 0x0, 0x0, 0x91dd7106ca8fd33b, 0xdb3fedb3c3734f95, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x40000000000, 0x0, 0x1, 0x0, @perf_config_ext={0x18, 0x3}, 0x21, 0x10000000000000, 0x0, 0x0, 0x0, 0x20000007, 0x2}, 0x0, 0xc, 0xffffffffffffffff, 0xa) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='cpuacct.stat\x00', 0x0, 0x0) r2 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r2, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f00000003c0)='syz1\x00', 0x200002, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0xfffffffffffffffc) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000300)='./cgroup/syz0\x00', 0x200002, 0x0) gettid() socket$kcm(0x11, 0xb, 0x0) ioctl$TUNSETTXFILTER(r1, 0x400454d1, &(0x7f00000000c0)=ANY=[@ANYBLOB="00000700000000da6500bbc4bbbbbbbb0180c2000016000000004dc23f0c000000000000bb"]) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000040)=@ipx={0x4, 0x1, 0x0, "2bfaec665b4b", 0xff}, 0x80, 0x0}, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={0xffffffffffffffff, 0x1, 0x49c42ca22ab5a9ac, 0x4, 0x0}, 0x20) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x908b7aabaa7d2404) socket$kcm(0xa, 0x6, 0x0) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000000c0), 0x0}, 0x28) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x89f1, &(0x7f0000000000)='ip6gre0\x00') perf_event_open(&(0x7f00000004c0)={0x0, 0x70, 0x8, 0x6, 0x0, 0x3, 0x0, 0x3, 0x4, 0x0, 0x9, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x1000, 0x0, @perf_config_ext={0x1ff}, 0x40004, 0xfffffffffffffffd, 0x0, 0x8, 0x8, 0x4, 0x80}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0x10, 0x0, 0x10) sendmsg$kcm(r4, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d200040080000048000001000080000000000300f88000f01700d4bd", 0x2e}], 0xf}, 0x40094) r5 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r6 = socket$kcm(0x2, 0x1, 0x2) socketpair(0x25, 0x6, 0x4, &(0x7f0000000480)) setsockopt$sock_attach_bpf(r6, 0x1, 0x3e, &(0x7f00000002c0)=r5, 0x4) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x6d, &(0x7f0000000cc0)=ANY=[@ANYRESHEX, @ANYBLOB="e99f619c950ec8069b69ac05520100000000000000572e83f4fd34a6db69715afdc8ec492fa879a8460bf2c7459f384ec36d6f0d833fccc87dc8f542ca0731ec72c3f6e0857c63572db61a83246496a2f90400569c8af42a5b8b1e3583115dfe3a40a792ffe638fd722afd02131c170175f382a8d78b6626d1d58220f08d98570bad00042a01c00748cf37385e7d66e6c0efddeb730ebd2f1ab4e816cf7493cf236ca5eb6e5d2a65519a7acf475dbd9fb52eb50ddcf9cee74529f59a2d6cfe6c23f6a688719f922099394146621132f866439970571e206ac47123f2d9cdb5cb7c8506122300000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000)={0x0, 0x8}, 0x10}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r7, 0x18000000000002a0, 0x42, 0x0, &(0x7f0000000800)="b9ff0300600d698cb89e14f088a81fffffff00004000630677fbac14140ee934a0a662079f4b4d2f87e5feca6aab845013f2325f1a39010108038da1924425181aa5", 0x0, 0x28000, 0x60000000, 0x113, 0x0, &(0x7f00000006c0)="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"}, 0x40) r8 = bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x17, 0x6, &(0x7f0000000c00)=ANY=[], &(0x7f00000002c0)='GPL\x00', 0x2, 0x0, 0x0, 0x40f00, 0x8, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000340)={0x1, 0x10000003}, 0x8, 0x10, &(0x7f0000000380)={0x0, 0xa, 0x83, 0x2}, 0x10}, 0x78) ioctl$sock_kcm_SIOCKCMATTACH(r4, 0x89e0, &(0x7f0000000500)={0xffffffffffffffff, r8}) 06:08:42 executing program 3: syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000280)='./file0\x00', 0xe800, 0x1, &(0x7f0000000180)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x800010, 0x0) r0 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r1, 0x1000) lseek(r1, 0x0, 0x2) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xe7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000240)='./bus\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x8000fffffffe) 06:08:42 executing program 2: pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x5, 0x0) splice(r2, 0x0, r1, 0x0, 0x1000000008, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = syz_open_dev$video(0x0, 0x0, 0x0) splice(r4, 0x0, r3, 0x0, 0x1000000008, 0x0) lseek(r0, 0x8, 0x1) 06:08:42 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet_udp_int(r0, 0x11, 0x67, &(0x7f0000000140)=0x6, 0x4) sendmmsg(r0, &(0x7f0000006f00)=[{{&(0x7f0000000040)=@in={0x2, 0x4e23, @remote}, 0x80, &(0x7f0000000100)=[{&(0x7f00000000c0)="e04013b497936ecafdd12c496f522cc2830fd358bc8f890e410223906070a39cc6e2f84a8622c5f86cad52bba1560397737a6cce189d7db27e", 0x39}], 0x1}}, {{0x0, 0x0, 0x0}}], 0x2, 0x4c004) sendmmsg(r0, &(0x7f0000007fc0), 0x800001d, 0x0) 06:08:43 executing program 0: r0 = perf_event_open(&(0x7f0000000640)={0x3, 0x70, 0x3e7, 0x0, 0x4, 0x0, 0x0, 0x0, 0x91dd7106ca8fd33b, 0xdb3fedb3c3734f95, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x40000000000, 0x0, 0x1, 0x0, @perf_config_ext={0x18, 0x3}, 0x21, 0x10000000000000, 0x0, 0x0, 0x0, 0x20000007, 0x2}, 0x0, 0xc, 0xffffffffffffffff, 0xa) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='cpuacct.stat\x00', 0x0, 0x0) r2 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r2, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f00000003c0)='syz1\x00', 0x200002, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0xfffffffffffffffc) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000300)='./cgroup/syz0\x00', 0x200002, 0x0) gettid() socket$kcm(0x11, 0xb, 0x0) ioctl$TUNSETTXFILTER(r1, 0x400454d1, &(0x7f00000000c0)=ANY=[@ANYBLOB="00000700000000da6500bbc4bbbbbbbb0180c2000016000000004dc23f0c000000000000bb"]) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000040)=@ipx={0x4, 0x1, 0x0, "2bfaec665b4b", 0xff}, 0x80, 0x0}, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={0xffffffffffffffff, 0x1, 0x49c42ca22ab5a9ac, 0x4, 0x0}, 0x20) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x908b7aabaa7d2404) sendmsg(0xffffffffffffffff, 0x0, 0x4000011) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000000c0), 0x0}, 0x28) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x89f1, &(0x7f0000000000)='ip6gre0\x00') perf_event_open(&(0x7f00000004c0)={0x0, 0x70, 0x8, 0x6, 0x0, 0x3, 0x0, 0x3, 0x4, 0x0, 0x9, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x1000, 0x0, @perf_config_ext={0x1ff}, 0x40004, 0xfffffffffffffffd, 0x0, 0x8, 0x8, 0x4, 0x80}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0x10, 0x0, 0x10) sendmsg$kcm(r4, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d200040080000048000001000080000000000300f88000f01700d4bd", 0x2e}], 0xf}, 0x40094) r5 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r6 = socket$kcm(0x2, 0x1, 0x2) socketpair(0x25, 0x6, 0x4, &(0x7f0000000480)) setsockopt$sock_attach_bpf(r6, 0x1, 0x3e, &(0x7f00000002c0)=r5, 0x4) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x6d, &(0x7f0000000cc0)=ANY=[@ANYRESHEX, @ANYBLOB="e99f619c950ec8069b69ac05520100000000000000572e83f4fd34a6db69715afdc8ec492fa879a8460bf2c7459f384ec36d6f0d833fccc87dc8f542ca0731ec72c3f6e0857c63572db61a83246496a2f90400569c8af42a5b8b1e3583115dfe3a40a792ffe638fd722afd02131c170175f382a8d78b6626d1d58220f08d98570bad00042a01c00748cf37385e7d66e6c0efddeb730ebd2f1ab4e816cf7493cf236ca5eb6e5d2a65519a7acf475dbd9fb52eb50ddcf9cee74529f59a2d6cfe6c23f6a688719f922099394146621132f866439970571e206ac47123f2d9cdb5cb7c8506122300000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000)={0x0, 0x8}, 0x10}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r7, 0x18000000000002a0, 0x42, 0x0, &(0x7f0000000800)="b9ff0300600d698cb89e14f088a81fffffff00004000630677fbac14140ee934a0a662079f4b4d2f87e5feca6aab845013f2325f1a39010108038da1924425181aa5", 0x0, 0x28000, 0x60000000, 0x113, 0x0, &(0x7f00000006c0)="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"}, 0x40) r8 = bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x17, 0x6, &(0x7f0000000c00)=ANY=[], &(0x7f00000002c0)='GPL\x00', 0x2, 0x0, 0x0, 0x40f00, 0x8, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000340)={0x1, 0x10000003}, 0x8, 0x10, &(0x7f0000000380)={0x0, 0xa, 0x83, 0x2}, 0x10}, 0x78) ioctl$sock_kcm_SIOCKCMATTACH(r4, 0x89e0, &(0x7f0000000500)={0xffffffffffffffff, r8}) [ 226.422516][ T27] audit: type=1804 audit(1590041323.227:4): pid=9858 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir990104307/syzkaller.qqRmkJ/53/file0/bus" dev="loop3" ino=28 res=1 [ 226.480503][ T9858] FAT-fs (loop3): error, invalid access to FAT (entry 0x00000311) [ 226.501204][ T9858] FAT-fs (loop3): Filesystem has been set read-only [ 226.526426][ T9858] FAT-fs (loop3): error, invalid access to FAT (entry 0x00000311) 06:08:43 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(r4, &(0x7f0000000100)={0x26, 'hash\x00', 0x0, 0x0, 'crct10dif-generic\x00'}, 0x58) r5 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) splice(r0, 0x0, r5, 0x0, 0x30007, 0x0) 06:08:43 executing program 2: pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x5, 0x0) splice(r2, 0x0, r1, 0x0, 0x1000000008, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = syz_open_dev$video(0x0, 0x0, 0x0) splice(r4, 0x0, r3, 0x0, 0x1000000008, 0x0) lseek(r0, 0x8, 0x1) 06:08:43 executing program 0: r0 = perf_event_open(&(0x7f0000000640)={0x3, 0x70, 0x3e7, 0x0, 0x4, 0x0, 0x0, 0x0, 0x91dd7106ca8fd33b, 0xdb3fedb3c3734f95, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x40000000000, 0x0, 0x1, 0x0, @perf_config_ext={0x18, 0x3}, 0x21, 0x10000000000000, 0x0, 0x0, 0x0, 0x20000007, 0x2}, 0x0, 0xc, 0xffffffffffffffff, 0xa) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='cpuacct.stat\x00', 0x0, 0x0) r2 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r2, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f00000003c0)='syz1\x00', 0x200002, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0xfffffffffffffffc) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000300)='./cgroup/syz0\x00', 0x200002, 0x0) gettid() socket$kcm(0x11, 0xb, 0x0) ioctl$TUNSETTXFILTER(r1, 0x400454d1, &(0x7f00000000c0)=ANY=[@ANYBLOB="00000700000000da6500bbc4bbbbbbbb0180c2000016000000004dc23f0c000000000000bb"]) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000040)=@ipx={0x4, 0x1, 0x0, "2bfaec665b4b", 0xff}, 0x80, 0x0}, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={0xffffffffffffffff, 0x1, 0x49c42ca22ab5a9ac, 0x4, 0x0}, 0x20) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x908b7aabaa7d2404) sendmsg(0xffffffffffffffff, 0x0, 0x4000011) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000000c0), 0x0}, 0x28) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x89f1, &(0x7f0000000000)='ip6gre0\x00') perf_event_open(&(0x7f00000004c0)={0x0, 0x70, 0x8, 0x6, 0x0, 0x3, 0x0, 0x3, 0x4, 0x0, 0x9, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x1000, 0x0, @perf_config_ext={0x1ff}, 0x40004, 0xfffffffffffffffd, 0x0, 0x8, 0x8, 0x4, 0x80}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0x10, 0x0, 0x10) sendmsg$kcm(r4, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d200040080000048000001000080000000000300f88000f01700d4bd", 0x2e}], 0xf}, 0x40094) r5 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r6 = socket$kcm(0x2, 0x1, 0x2) socketpair(0x25, 0x6, 0x4, &(0x7f0000000480)) setsockopt$sock_attach_bpf(r6, 0x1, 0x3e, &(0x7f00000002c0)=r5, 0x4) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x6d, &(0x7f0000000cc0)=ANY=[@ANYRESHEX, @ANYBLOB="e99f619c950ec8069b69ac05520100000000000000572e83f4fd34a6db69715afdc8ec492fa879a8460bf2c7459f384ec36d6f0d833fccc87dc8f542ca0731ec72c3f6e0857c63572db61a83246496a2f90400569c8af42a5b8b1e3583115dfe3a40a792ffe638fd722afd02131c170175f382a8d78b6626d1d58220f08d98570bad00042a01c00748cf37385e7d66e6c0efddeb730ebd2f1ab4e816cf7493cf236ca5eb6e5d2a65519a7acf475dbd9fb52eb50ddcf9cee74529f59a2d6cfe6c23f6a688719f922099394146621132f866439970571e206ac47123f2d9cdb5cb7c8506122300000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000)={0x0, 0x8}, 0x10}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r7, 0x18000000000002a0, 0x42, 0x0, &(0x7f0000000800)="b9ff0300600d698cb89e14f088a81fffffff00004000630677fbac14140ee934a0a662079f4b4d2f87e5feca6aab845013f2325f1a39010108038da1924425181aa5", 0x0, 0x28000, 0x60000000, 0x113, 0x0, &(0x7f00000006c0)="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"}, 0x40) r8 = bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x17, 0x6, &(0x7f0000000c00)=ANY=[], &(0x7f00000002c0)='GPL\x00', 0x2, 0x0, 0x0, 0x40f00, 0x8, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000340)={0x1, 0x10000003}, 0x8, 0x10, &(0x7f0000000380)={0x0, 0xa, 0x83, 0x2}, 0x10}, 0x78) ioctl$sock_kcm_SIOCKCMATTACH(r4, 0x89e0, &(0x7f0000000500)={0xffffffffffffffff, r8}) 06:08:43 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet_udp_int(r0, 0x11, 0x67, &(0x7f0000000140)=0x6, 0x4) sendmmsg(r0, &(0x7f0000006f00)=[{{&(0x7f0000000040)=@in={0x2, 0x4e23, @remote}, 0x80, &(0x7f0000000100)=[{&(0x7f00000000c0)="e04013b497936ecafdd12c496f522cc2830fd358bc8f890e410223906070a39cc6e2f84a8622c5f86cad52bba1560397737a6cce189d7db27e", 0x39}], 0x1}}, {{0x0, 0x0, 0x0}}], 0x2, 0x4c004) sendmmsg(r0, &(0x7f0000007fc0), 0x800001d, 0x0) 06:08:43 executing program 4: unshare(0x40000000) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000000c0)=0xe) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r1, 0x40047438, &(0x7f0000000180)=""/246) ioctl$PPPIOCSFLAGS1(r1, 0x40047457, &(0x7f0000000000)) 06:08:43 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(twofish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000c18000)="ad56b6c5820fae00"/24, 0x18) r1 = accept(r0, 0x0, 0x0) sendmsg$ETHTOOL_MSG_LINKMODES_SET(r1, &(0x7f0000000800)={0x0, 0x0, &(0x7f00000007c0)={&(0x7f0000000480)=ANY=[@ANYBLOB], 0x14}}, 0x20008040) recvmsg(r1, &(0x7f0000000040)={0x0, 0xfffffffffffffefb, &(0x7f000000b600)=[{&(0x7f0000002e80)=""/167, 0x7a10}], 0x1}, 0x0) 06:08:43 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet_udp_int(r0, 0x11, 0x67, &(0x7f0000000140)=0x6, 0x4) sendmmsg(r0, &(0x7f0000006f00)=[{{&(0x7f0000000040)=@in={0x2, 0x4e23, @remote}, 0x80, &(0x7f0000000100)=[{&(0x7f00000000c0)="e04013b497936ecafdd12c496f522cc2830fd358bc8f890e410223906070a39cc6e2f84a8622c5f86cad52bba1560397737a6cce189d7db27e", 0x39}], 0x1}}, {{0x0, 0x0, 0x0}}], 0x2, 0x4c004) sendmmsg(r0, &(0x7f0000007fc0), 0x800001d, 0x0) [ 226.690028][ T9884] IPVS: ftp: loaded support on port[0] = 21 06:08:43 executing program 2: pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x5, 0x0) splice(r2, 0x0, r1, 0x0, 0x1000000008, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = syz_open_dev$video(0x0, 0x0, 0x0) splice(r4, 0x0, r3, 0x0, 0x1000000008, 0x0) lseek(r0, 0x8, 0x1) 06:08:43 executing program 0: r0 = perf_event_open(&(0x7f0000000640)={0x3, 0x70, 0x3e7, 0x0, 0x4, 0x0, 0x0, 0x0, 0x91dd7106ca8fd33b, 0xdb3fedb3c3734f95, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x40000000000, 0x0, 0x1, 0x0, @perf_config_ext={0x18, 0x3}, 0x21, 0x10000000000000, 0x0, 0x0, 0x0, 0x20000007, 0x2}, 0x0, 0xc, 0xffffffffffffffff, 0xa) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='cpuacct.stat\x00', 0x0, 0x0) r2 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r2, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f00000003c0)='syz1\x00', 0x200002, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0xfffffffffffffffc) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000300)='./cgroup/syz0\x00', 0x200002, 0x0) gettid() socket$kcm(0x11, 0xb, 0x0) ioctl$TUNSETTXFILTER(r1, 0x400454d1, &(0x7f00000000c0)=ANY=[@ANYBLOB="00000700000000da6500bbc4bbbbbbbb0180c2000016000000004dc23f0c000000000000bb"]) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000040)=@ipx={0x4, 0x1, 0x0, "2bfaec665b4b", 0xff}, 0x80, 0x0}, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={0xffffffffffffffff, 0x1, 0x49c42ca22ab5a9ac, 0x4, 0x0}, 0x20) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x908b7aabaa7d2404) sendmsg(0xffffffffffffffff, 0x0, 0x4000011) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000000c0), 0x0}, 0x28) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x89f1, &(0x7f0000000000)='ip6gre0\x00') perf_event_open(&(0x7f00000004c0)={0x0, 0x70, 0x8, 0x6, 0x0, 0x3, 0x0, 0x3, 0x4, 0x0, 0x9, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x1000, 0x0, @perf_config_ext={0x1ff}, 0x40004, 0xfffffffffffffffd, 0x0, 0x8, 0x8, 0x4, 0x80}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0x10, 0x0, 0x10) sendmsg$kcm(r4, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d200040080000048000001000080000000000300f88000f01700d4bd", 0x2e}], 0xf}, 0x40094) r5 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r6 = socket$kcm(0x2, 0x1, 0x2) socketpair(0x25, 0x6, 0x4, &(0x7f0000000480)) setsockopt$sock_attach_bpf(r6, 0x1, 0x3e, &(0x7f00000002c0)=r5, 0x4) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x6d, &(0x7f0000000cc0)=ANY=[@ANYRESHEX, @ANYBLOB="e99f619c950ec8069b69ac05520100000000000000572e83f4fd34a6db69715afdc8ec492fa879a8460bf2c7459f384ec36d6f0d833fccc87dc8f542ca0731ec72c3f6e0857c63572db61a83246496a2f90400569c8af42a5b8b1e3583115dfe3a40a792ffe638fd722afd02131c170175f382a8d78b6626d1d58220f08d98570bad00042a01c00748cf37385e7d66e6c0efddeb730ebd2f1ab4e816cf7493cf236ca5eb6e5d2a65519a7acf475dbd9fb52eb50ddcf9cee74529f59a2d6cfe6c23f6a688719f922099394146621132f866439970571e206ac47123f2d9cdb5cb7c8506122300000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000)={0x0, 0x8}, 0x10}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r7, 0x18000000000002a0, 0x42, 0x0, &(0x7f0000000800)="b9ff0300600d698cb89e14f088a81fffffff00004000630677fbac14140ee934a0a662079f4b4d2f87e5feca6aab845013f2325f1a39010108038da1924425181aa5", 0x0, 0x28000, 0x60000000, 0x113, 0x0, &(0x7f00000006c0)="097baacf569909ebb78a19b4d4f607feb3072ad9474026c7c148d184a2647de87a8fd14ad5d15cadabd6c7545b05000000ad90e0d4000000000f3f750d2a75f6fa77d3fa4e023987f7a54b04eb238604aa90cab7b44f95ae6ce9b5f877439af64cb6573e5bc85c5e766604ff55b7a234246bd2ee44c9e99d69190bbe089603846d17b8678d05a0bda6ae300ca8c43271b65bb62b0af61bf4da3891f5bcf900ed368b36e2db9957b0dfa5cf084db8cb2b2c54661f9eac8a58a72fc9e768405eb33bce450dd088d2e16d757eeb1239a2389330535afb4944b7b27c4b26d812ab58864f3ffa3ce8cf739275492a0c90b425a792a19b9abf846b926e9f93f4b57ab77c0db63fb7d5a1e04ef52157f14f1dedcc4437"}, 0x40) r8 = bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x17, 0x6, &(0x7f0000000c00)=ANY=[], &(0x7f00000002c0)='GPL\x00', 0x2, 0x0, 0x0, 0x40f00, 0x8, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000340)={0x1, 0x10000003}, 0x8, 0x10, &(0x7f0000000380)={0x0, 0xa, 0x83, 0x2}, 0x10}, 0x78) ioctl$sock_kcm_SIOCKCMATTACH(r4, 0x89e0, &(0x7f0000000500)={0xffffffffffffffff, r8}) 06:08:43 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet_udp_int(r0, 0x11, 0x67, &(0x7f0000000140)=0x6, 0x4) sendmmsg(r0, &(0x7f0000006f00)=[{{&(0x7f0000000040)=@in={0x2, 0x4e23, @remote}, 0x80, &(0x7f0000000100)=[{&(0x7f00000000c0)="e04013b497936ecafdd12c496f522cc2830fd358bc8f890e410223906070a39cc6e2f84a8622c5f86cad52bba1560397737a6cce189d7db27e", 0x39}], 0x1}}, {{0x0, 0x0, &(0x7f0000000440)=[{&(0x7f0000000200)="9544939c01e602e8fc696947591d4c6fb3cb9a7cf9e53555dac91c09bbd33a6e85981e045d", 0x25}, {&(0x7f0000000240)="b995a5bf327c6f291a70af1527c6eb87af6b40c22e784c7d81102b1d2c4f5434d0142b1efa49361c7fa370cde02cbad1cdf556d5ebe84042e5b1eee75566d3c3bd4e54fb80c6258eb985131872c446ae99febe93703f66f4e0e10392c8a0d30f35710c7490190fef84833442ab74de59e4c9ebbc7cfe3f26750c16970d537ab353640e9e46e706cd200383135bfbf29b19c2fe729da592a9fb74eca37cb46775eb6db0118a3c59ac107fcf691822488d67f90e891045cb2ea35a79b6cd27c9fa5f37c9f6d6e4e2ca9267b2a8aa34f9727b0f539f", 0xd4}, {&(0x7f0000000340)="529cd4456bccdb80c030fe01e5cd61704126c8d4e7ec", 0x16}], 0x3}}], 0x2, 0x4c004) sendmmsg(r0, &(0x7f0000007fc0), 0x800001d, 0x0) 06:08:43 executing program 2: pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x5, 0x0) splice(r1, 0x0, r0, 0x0, 0x1000000008, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = syz_open_dev$video(0x0, 0x0, 0x0) splice(r3, 0x0, r2, 0x0, 0x1000000008, 0x0) 06:08:43 executing program 4: unshare(0x40000000) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000000c0)=0xe) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r1, 0x40047438, &(0x7f0000000180)=""/246) ioctl$PPPIOCSFLAGS1(r1, 0x40047457, &(0x7f0000000000)) [ 227.209871][ T9944] IPVS: ftp: loaded support on port[0] = 21 06:08:44 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) r4 = socket$alg(0x26, 0x5, 0x0) r5 = accept$alg(r4, 0x0, 0x0) r6 = accept4(r5, 0x0, 0x0, 0x0) splice(r0, 0x0, r6, 0x0, 0x30007, 0x0) 06:08:44 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet_udp_int(r0, 0x11, 0x67, &(0x7f0000000140)=0x6, 0x4) sendmmsg(r0, &(0x7f0000006f00)=[{{&(0x7f0000000040)=@in={0x2, 0x4e23, @remote}, 0x80, &(0x7f0000000100)=[{&(0x7f00000000c0)="e04013b497936ecafdd12c496f522cc2830fd358bc8f890e410223906070a39cc6e2f84a8622c5f86cad52bba1560397737a6cce189d7db27e", 0x39}], 0x1}}, {{0x0, 0x0, &(0x7f0000000440)=[{&(0x7f0000000200)="9544939c01e602e8fc696947591d4c6fb3cb9a7cf9e53555dac91c09bbd33a6e85981e045d", 0x25}, {&(0x7f0000000240)="b995a5bf327c6f291a70af1527c6eb87af6b40c22e784c7d81102b1d2c4f5434d0142b1efa49361c7fa370cde02cbad1cdf556d5ebe84042e5b1eee75566d3c3bd4e54fb80c6258eb985131872c446ae99febe93703f66f4e0e10392c8a0d30f35710c7490190fef84833442ab74de59e4c9ebbc7cfe3f26750c16970d537ab353640e9e46e706cd200383135bfbf29b19c2fe729da592a9fb74eca37cb46775eb6db0118a3c59ac107fcf691822488d67f90e891045cb2ea35a79b6cd27c9fa5f37c9f6d6e4e2ca9267b2a8aa34f9727b0f539f", 0xd4}, {&(0x7f0000000340)="529cd4456bccdb80c030fe01e5cd61704126c8d4e7ec", 0x16}], 0x3}}], 0x2, 0x4c004) sendmmsg(r0, &(0x7f0000007fc0), 0x800001d, 0x0) 06:08:44 executing program 2: pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x5, 0x0) splice(r1, 0x0, r0, 0x0, 0x1000000008, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) splice(0xffffffffffffffff, 0x0, r2, 0x0, 0x1000000008, 0x0) 06:08:44 executing program 0: r0 = perf_event_open(&(0x7f0000000640)={0x3, 0x70, 0x3e7, 0x0, 0x4, 0x0, 0x0, 0x0, 0x91dd7106ca8fd33b, 0xdb3fedb3c3734f95, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x40000000000, 0x0, 0x1, 0x0, @perf_config_ext={0x18, 0x3}, 0x21, 0x10000000000000, 0x0, 0x0, 0x0, 0x20000007, 0x2}, 0x0, 0xc, 0xffffffffffffffff, 0xa) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='cpuacct.stat\x00', 0x0, 0x0) r2 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r2, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f00000003c0)='syz1\x00', 0x200002, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0xfffffffffffffffc) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000300)='./cgroup/syz0\x00', 0x200002, 0x0) gettid() socket$kcm(0x11, 0xb, 0x0) ioctl$TUNSETTXFILTER(r1, 0x400454d1, &(0x7f00000000c0)=ANY=[@ANYBLOB="00000700000000da6500bbc4bbbbbbbb0180c2000016000000004dc23f0c000000000000bb"]) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000040)=@ipx={0x4, 0x1, 0x0, "2bfaec665b4b", 0xff}, 0x80, 0x0}, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={0xffffffffffffffff, 0x1, 0x49c42ca22ab5a9ac, 0x4, 0x0}, 0x20) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) socket$kcm(0xa, 0x6, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x4000011) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000000c0), 0x0}, 0x28) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x89f1, &(0x7f0000000000)='ip6gre0\x00') perf_event_open(&(0x7f00000004c0)={0x0, 0x70, 0x8, 0x6, 0x0, 0x3, 0x0, 0x3, 0x4, 0x0, 0x9, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x1000, 0x0, @perf_config_ext={0x1ff}, 0x40004, 0xfffffffffffffffd, 0x0, 0x8, 0x8, 0x4, 0x80}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0x10, 0x0, 0x10) sendmsg$kcm(r4, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d200040080000048000001000080000000000300f88000f01700d4bd", 0x2e}], 0xf}, 0x40094) r5 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r6 = socket$kcm(0x2, 0x1, 0x2) socketpair(0x25, 0x6, 0x4, &(0x7f0000000480)) setsockopt$sock_attach_bpf(r6, 0x1, 0x3e, &(0x7f00000002c0)=r5, 0x4) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x6d, &(0x7f0000000cc0)=ANY=[@ANYRESHEX, @ANYBLOB="e99f619c950ec8069b69ac05520100000000000000572e83f4fd34a6db69715afdc8ec492fa879a8460bf2c7459f384ec36d6f0d833fccc87dc8f542ca0731ec72c3f6e0857c63572db61a83246496a2f90400569c8af42a5b8b1e3583115dfe3a40a792ffe638fd722afd02131c170175f382a8d78b6626d1d58220f08d98570bad00042a01c00748cf37385e7d66e6c0efddeb730ebd2f1ab4e816cf7493cf236ca5eb6e5d2a65519a7acf475dbd9fb52eb50ddcf9cee74529f59a2d6cfe6c23f6a688719f922099394146621132f866439970571e206ac47123f2d9cdb5cb7c8506122300000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000)={0x0, 0x8}, 0x10}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r7, 0x18000000000002a0, 0x42, 0x0, &(0x7f0000000800)="b9ff0300600d698cb89e14f088a81fffffff00004000630677fbac14140ee934a0a662079f4b4d2f87e5feca6aab845013f2325f1a39010108038da1924425181aa5", 0x0, 0x28000, 0x60000000, 0x113, 0x0, &(0x7f00000006c0)="097baacf569909ebb78a19b4d4f607feb3072ad9474026c7c148d184a2647de87a8fd14ad5d15cadabd6c7545b05000000ad90e0d4000000000f3f750d2a75f6fa77d3fa4e023987f7a54b04eb238604aa90cab7b44f95ae6ce9b5f877439af64cb6573e5bc85c5e766604ff55b7a234246bd2ee44c9e99d69190bbe089603846d17b8678d05a0bda6ae300ca8c43271b65bb62b0af61bf4da3891f5bcf900ed368b36e2db9957b0dfa5cf084db8cb2b2c54661f9eac8a58a72fc9e768405eb33bce450dd088d2e16d757eeb1239a2389330535afb4944b7b27c4b26d812ab58864f3ffa3ce8cf739275492a0c90b425a792a19b9abf846b926e9f93f4b57ab77c0db63fb7d5a1e04ef52157f14f1dedcc4437"}, 0x40) r8 = bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x17, 0x6, &(0x7f0000000c00)=ANY=[], &(0x7f00000002c0)='GPL\x00', 0x2, 0x0, 0x0, 0x40f00, 0x8, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000340)={0x1, 0x10000003}, 0x8, 0x10, &(0x7f0000000380)={0x0, 0xa, 0x83, 0x2}, 0x10}, 0x78) ioctl$sock_kcm_SIOCKCMATTACH(r4, 0x89e0, &(0x7f0000000500)={0xffffffffffffffff, r8}) 06:08:44 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(twofish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000c18000)="ad56b6c5820fae00"/24, 0x18) r1 = accept(r0, 0x0, 0x0) sendmsg$ETHTOOL_MSG_LINKMODES_SET(r1, &(0x7f0000000800)={0x0, 0x0, &(0x7f00000007c0)={&(0x7f0000000480)=ANY=[@ANYBLOB], 0x14}}, 0x20008040) recvmsg(r1, &(0x7f0000000040)={0x0, 0xfffffffffffffefb, &(0x7f000000b600)=[{&(0x7f0000002e80)=""/167, 0x7a10}], 0x1}, 0x0) 06:08:44 executing program 4: unshare(0x40000000) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000000c0)=0xe) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r1, 0x40047438, &(0x7f0000000180)=""/246) ioctl$PPPIOCSFLAGS1(r1, 0x40047457, &(0x7f0000000000)) [ 227.656039][ T9975] IPVS: ftp: loaded support on port[0] = 21 06:08:44 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet_udp_int(r0, 0x11, 0x67, &(0x7f0000000140)=0x6, 0x4) sendmmsg(r0, &(0x7f0000006f00)=[{{&(0x7f0000000040)=@in={0x2, 0x4e23, @remote}, 0x80, &(0x7f0000000100)=[{&(0x7f00000000c0)="e04013b497936ecafdd12c496f522cc2830fd358bc8f890e410223906070a39cc6e2f84a8622c5f86cad52bba1560397737a6cce189d7db27e", 0x39}], 0x1}}, {{0x0, 0x0, &(0x7f0000000440)=[{&(0x7f0000000200)="9544939c01e602e8fc696947591d4c6fb3cb9a7cf9e53555dac91c09bbd33a6e85981e045d", 0x25}, {&(0x7f0000000240)="b995a5bf327c6f291a70af1527c6eb87af6b40c22e784c7d81102b1d2c4f5434d0142b1efa49361c7fa370cde02cbad1cdf556d5ebe84042e5b1eee75566d3c3bd4e54fb80c6258eb985131872c446ae99febe93703f66f4e0e10392c8a0d30f35710c7490190fef84833442ab74de59e4c9ebbc7cfe3f26750c16970d537ab353640e9e46e706cd200383135bfbf29b19c2fe729da592a9fb74eca37cb46775eb6db0118a3c59ac107fcf691822488d67f90e891045cb2ea35a79b6cd27c9fa5f37c9f6d6e4e2ca9267b2a8aa34f9727b0f539f", 0xd4}, {&(0x7f0000000340)="529cd4456bccdb80c030fe01e5cd61704126c8d4e7ec", 0x16}], 0x3}}], 0x2, 0x4c004) sendmmsg(r0, &(0x7f0000007fc0), 0x800001d, 0x0) 06:08:44 executing program 2: pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x5, 0x0) splice(r1, 0x0, r0, 0x0, 0x1000000008, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) splice(0xffffffffffffffff, 0x0, r2, 0x0, 0x1000000008, 0x0) 06:08:44 executing program 3: r0 = socket(0x200000000000011, 0x3, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000003c0)={'netdevsim0\x00', 0x0}) bind$packet(r0, &(0x7f0000000240)={0x11, 0x0, r2}, 0x14) getsockname$packet(r0, &(0x7f0000000500)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x10eef0f1) bpf$MAP_CREATE(0x0, &(0x7f00000004c0)={0x1, 0x5, 0x899, 0x4002, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x4], r3}, 0x40) 06:08:44 executing program 0: r0 = perf_event_open(&(0x7f0000000640)={0x3, 0x70, 0x3e7, 0x0, 0x4, 0x0, 0x0, 0x0, 0x91dd7106ca8fd33b, 0xdb3fedb3c3734f95, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x40000000000, 0x0, 0x1, 0x0, @perf_config_ext={0x18, 0x3}, 0x21, 0x10000000000000, 0x0, 0x0, 0x0, 0x20000007, 0x2}, 0x0, 0xc, 0xffffffffffffffff, 0xa) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='cpuacct.stat\x00', 0x0, 0x0) r2 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r2, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f00000003c0)='syz1\x00', 0x200002, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0xfffffffffffffffc) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000300)='./cgroup/syz0\x00', 0x200002, 0x0) gettid() socket$kcm(0x11, 0xb, 0x0) ioctl$TUNSETTXFILTER(r1, 0x400454d1, &(0x7f00000000c0)=ANY=[@ANYBLOB="00000700000000da6500bbc4bbbbbbbb0180c2000016000000004dc23f0c000000000000bb"]) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000040)=@ipx={0x4, 0x1, 0x0, "2bfaec665b4b", 0xff}, 0x80, 0x0}, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={0xffffffffffffffff, 0x1, 0x49c42ca22ab5a9ac, 0x4, 0x0}, 0x20) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) socket$kcm(0xa, 0x6, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x4000011) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000000c0), 0x0}, 0x28) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x89f1, &(0x7f0000000000)='ip6gre0\x00') perf_event_open(&(0x7f00000004c0)={0x0, 0x70, 0x8, 0x6, 0x0, 0x3, 0x0, 0x3, 0x4, 0x0, 0x9, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x1000, 0x0, @perf_config_ext={0x1ff}, 0x40004, 0xfffffffffffffffd, 0x0, 0x8, 0x8, 0x4, 0x80}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0x10, 0x0, 0x10) sendmsg$kcm(r4, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d200040080000048000001000080000000000300f88000f01700d4bd", 0x2e}], 0xf}, 0x40094) r5 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r6 = socket$kcm(0x2, 0x1, 0x2) socketpair(0x25, 0x6, 0x4, &(0x7f0000000480)) setsockopt$sock_attach_bpf(r6, 0x1, 0x3e, &(0x7f00000002c0)=r5, 0x4) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x6d, &(0x7f0000000cc0)=ANY=[@ANYRESHEX, @ANYBLOB="e99f619c950ec8069b69ac05520100000000000000572e83f4fd34a6db69715afdc8ec492fa879a8460bf2c7459f384ec36d6f0d833fccc87dc8f542ca0731ec72c3f6e0857c63572db61a83246496a2f90400569c8af42a5b8b1e3583115dfe3a40a792ffe638fd722afd02131c170175f382a8d78b6626d1d58220f08d98570bad00042a01c00748cf37385e7d66e6c0efddeb730ebd2f1ab4e816cf7493cf236ca5eb6e5d2a65519a7acf475dbd9fb52eb50ddcf9cee74529f59a2d6cfe6c23f6a688719f922099394146621132f866439970571e206ac47123f2d9cdb5cb7c8506122300000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000)={0x0, 0x8}, 0x10}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r7, 0x18000000000002a0, 0x42, 0x0, &(0x7f0000000800)="b9ff0300600d698cb89e14f088a81fffffff00004000630677fbac14140ee934a0a662079f4b4d2f87e5feca6aab845013f2325f1a39010108038da1924425181aa5", 0x0, 0x28000, 0x60000000, 0x113, 0x0, &(0x7f00000006c0)="097baacf569909ebb78a19b4d4f607feb3072ad9474026c7c148d184a2647de87a8fd14ad5d15cadabd6c7545b05000000ad90e0d4000000000f3f750d2a75f6fa77d3fa4e023987f7a54b04eb238604aa90cab7b44f95ae6ce9b5f877439af64cb6573e5bc85c5e766604ff55b7a234246bd2ee44c9e99d69190bbe089603846d17b8678d05a0bda6ae300ca8c43271b65bb62b0af61bf4da3891f5bcf900ed368b36e2db9957b0dfa5cf084db8cb2b2c54661f9eac8a58a72fc9e768405eb33bce450dd088d2e16d757eeb1239a2389330535afb4944b7b27c4b26d812ab58864f3ffa3ce8cf739275492a0c90b425a792a19b9abf846b926e9f93f4b57ab77c0db63fb7d5a1e04ef52157f14f1dedcc4437"}, 0x40) r8 = bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x17, 0x6, &(0x7f0000000c00)=ANY=[], &(0x7f00000002c0)='GPL\x00', 0x2, 0x0, 0x0, 0x40f00, 0x8, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000340)={0x1, 0x10000003}, 0x8, 0x10, &(0x7f0000000380)={0x0, 0xa, 0x83, 0x2}, 0x10}, 0x78) ioctl$sock_kcm_SIOCKCMATTACH(r4, 0x89e0, &(0x7f0000000500)={0xffffffffffffffff, r8}) 06:08:44 executing program 2: pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x5, 0x0) splice(r1, 0x0, r0, 0x0, 0x1000000008, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) splice(0xffffffffffffffff, 0x0, r2, 0x0, 0x1000000008, 0x0) 06:08:44 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet_udp_int(r0, 0x11, 0x67, &(0x7f0000000140)=0x6, 0x4) sendmmsg(r0, &(0x7f0000006f00)=[{{&(0x7f0000000040)=@in={0x2, 0x4e23, @remote}, 0x80, &(0x7f0000000100)=[{&(0x7f00000000c0)="e04013b497936ecafdd12c496f522cc2830fd358bc8f890e410223906070a39cc6e2f84a8622c5f86cad52bba1560397737a6cce189d7db27e", 0x39}], 0x1}}, {{0x0, 0x0, &(0x7f0000000440)=[{&(0x7f0000000200)="9544939c01e602e8fc696947591d4c6fb3cb9a7cf9e53555dac91c09bbd33a6e85981e045d", 0x25}, {&(0x7f0000000240)="b995a5bf327c6f291a70af1527c6eb87af6b40c22e784c7d81102b1d2c4f5434d0142b1efa49361c7fa370cde02cbad1cdf556d5ebe84042e5b1eee75566d3c3bd4e54fb80c6258eb985131872c446ae99febe93703f66f4e0e10392c8a0d30f35710c7490190fef84833442ab74de59e4c9ebbc7cfe3f26750c16970d537ab353640e9e46e706cd200383135bfbf29b19c2fe729da592a9fb74eca37cb46775eb6db0118a3c59ac107fcf691822488d67f90e891045cb2ea35a79b6cd27c9fa5f37c9f6d6e4e2ca9267b2a8aa34f9727b0f539f", 0xd4}, {&(0x7f0000000340)="529cd4456bccdb80c030fe01e5cd61704126c8d4e7ec", 0x16}, {0x0}], 0x4}}], 0x2, 0x4c004) sendmmsg(r0, &(0x7f0000007fc0), 0x800001d, 0x0) 06:08:45 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) r4 = socket$alg(0x26, 0x5, 0x0) r5 = accept$alg(r4, 0x0, 0x0) r6 = accept4(r5, 0x0, 0x0, 0x0) splice(r0, 0x0, r6, 0x0, 0x30007, 0x0) 06:08:45 executing program 3: keyctl$get_persistent(0x12, 0x0, 0x0) 06:08:45 executing program 4: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000000c0)=0xe) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r1, 0x40047438, &(0x7f0000000180)=""/246) ioctl$PPPIOCSFLAGS1(r1, 0x40047457, &(0x7f0000000000)) 06:08:45 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet_udp_int(r0, 0x11, 0x67, &(0x7f0000000140)=0x6, 0x4) sendmmsg(r0, &(0x7f0000006f00)=[{{&(0x7f0000000040)=@in={0x2, 0x4e23, @remote}, 0x80, &(0x7f0000000100)=[{&(0x7f00000000c0)="e04013b497936ecafdd12c496f522cc2830fd358bc8f890e410223906070a39cc6e2f84a8622c5f86cad52bba1560397737a6cce189d7db27e", 0x39}], 0x1}}, {{0x0, 0x0, &(0x7f0000000440)=[{&(0x7f0000000200)="9544939c01e602e8fc696947591d4c6fb3cb9a7cf9e53555dac91c09bbd33a6e85981e045d", 0x25}, {&(0x7f0000000240)="b995a5bf327c6f291a70af1527c6eb87af6b40c22e784c7d81102b1d2c4f5434d0142b1efa49361c7fa370cde02cbad1cdf556d5ebe84042e5b1eee75566d3c3bd4e54fb80c6258eb985131872c446ae99febe93703f66f4e0e10392c8a0d30f35710c7490190fef84833442ab74de59e4c9ebbc7cfe3f26750c16970d537ab353640e9e46e706cd200383135bfbf29b19c2fe729da592a9fb74eca37cb46775eb6db0118a3c59ac107fcf691822488d67f90e891045cb2ea35a79b6cd27c9fa5f37c9f6d6e4e2ca9267b2a8aa34f9727b0f539f", 0xd4}, {&(0x7f0000000340)="529cd4456bccdb80c030fe01e5cd61704126c8d4e7ec", 0x16}, {0x0}], 0x4}}], 0x2, 0x4c004) sendmmsg(r0, &(0x7f0000007fc0), 0x800001d, 0x0) 06:08:45 executing program 2: pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x5, 0x0) splice(r1, 0x0, r0, 0x0, 0x1000000008, 0x0) r2 = syz_open_dev$video(0x0, 0x0, 0x0) splice(r2, 0x0, 0xffffffffffffffff, 0x0, 0x1000000008, 0x0) 06:08:45 executing program 0: r0 = perf_event_open(&(0x7f0000000640)={0x3, 0x70, 0x3e7, 0x0, 0x4, 0x0, 0x0, 0x0, 0x91dd7106ca8fd33b, 0xdb3fedb3c3734f95, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x40000000000, 0x0, 0x1, 0x0, @perf_config_ext={0x18, 0x3}, 0x21, 0x10000000000000, 0x0, 0x0, 0x0, 0x20000007, 0x2}, 0x0, 0xc, 0xffffffffffffffff, 0xa) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='cpuacct.stat\x00', 0x0, 0x0) r2 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r2, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f00000003c0)='syz1\x00', 0x200002, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0xfffffffffffffffc) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000300)='./cgroup/syz0\x00', 0x200002, 0x0) gettid() socket$kcm(0x11, 0xb, 0x0) ioctl$TUNSETTXFILTER(r1, 0x400454d1, &(0x7f00000000c0)=ANY=[@ANYBLOB="00000700000000da6500bbc4bbbbbbbb0180c2000016000000004dc23f0c000000000000bb"]) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000040)=@ipx={0x4, 0x1, 0x0, "2bfaec665b4b", 0xff}, 0x80, 0x0}, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={0xffffffffffffffff, 0x1, 0x49c42ca22ab5a9ac, 0x4, 0x0}, 0x20) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) socket$kcm(0xa, 0x6, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x4000011) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000000c0), 0x0}, 0x28) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x89f1, &(0x7f0000000000)='ip6gre0\x00') perf_event_open(&(0x7f00000004c0)={0x0, 0x70, 0x8, 0x6, 0x0, 0x3, 0x0, 0x3, 0x4, 0x0, 0x9, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x1000, 0x0, @perf_config_ext={0x1ff}, 0x40004, 0xfffffffffffffffd, 0x0, 0x8, 0x8, 0x4, 0x80}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0x10, 0x0, 0x10) sendmsg$kcm(r4, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d200040080000048000001000080000000000300f88000f01700d4bd", 0x2e}], 0xf}, 0x40094) r5 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r6 = socket$kcm(0x2, 0x1, 0x2) socketpair(0x25, 0x6, 0x4, &(0x7f0000000480)) setsockopt$sock_attach_bpf(r6, 0x1, 0x3e, &(0x7f00000002c0)=r5, 0x4) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x6d, &(0x7f0000000cc0)=ANY=[@ANYRESHEX, @ANYBLOB="e99f619c950ec8069b69ac05520100000000000000572e83f4fd34a6db69715afdc8ec492fa879a8460bf2c7459f384ec36d6f0d833fccc87dc8f542ca0731ec72c3f6e0857c63572db61a83246496a2f90400569c8af42a5b8b1e3583115dfe3a40a792ffe638fd722afd02131c170175f382a8d78b6626d1d58220f08d98570bad00042a01c00748cf37385e7d66e6c0efddeb730ebd2f1ab4e816cf7493cf236ca5eb6e5d2a65519a7acf475dbd9fb52eb50ddcf9cee74529f59a2d6cfe6c23f6a688719f922099394146621132f866439970571e206ac47123f2d9cdb5cb7c8506122300000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000)={0x0, 0x8}, 0x10}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r7, 0x18000000000002a0, 0x42, 0x0, &(0x7f0000000800)="b9ff0300600d698cb89e14f088a81fffffff00004000630677fbac14140ee934a0a662079f4b4d2f87e5feca6aab845013f2325f1a39010108038da1924425181aa5", 0x0, 0x28000, 0x60000000, 0x113, 0x0, &(0x7f00000006c0)="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"}, 0x40) r8 = bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x17, 0x6, &(0x7f0000000c00)=ANY=[], &(0x7f00000002c0)='GPL\x00', 0x2, 0x0, 0x0, 0x40f00, 0x8, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000340)={0x1, 0x10000003}, 0x8, 0x10, &(0x7f0000000380)={0x0, 0xa, 0x83, 0x2}, 0x10}, 0x78) ioctl$sock_kcm_SIOCKCMATTACH(r4, 0x89e0, &(0x7f0000000500)={0xffffffffffffffff, r8}) 06:08:45 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='rpc_pipefs\x00', 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) r0 = open(&(0x7f0000000440)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000340)='cgroup.procs\x00', 0x2, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000001580)={{{@in6=@empty, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@private2}, 0x0, @in6=@dev}}, &(0x7f00000012c0)=0xe8) ioctl$SIOCAX25DELUID(0xffffffffffffffff, 0x89e2, &(0x7f0000000240)={0x3, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, r1}) socket(0x400020000000010, 0x2, 0x0) 06:08:45 executing program 2: pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x5, 0x0) splice(r1, 0x0, r0, 0x0, 0x1000000008, 0x0) r2 = syz_open_dev$video(0x0, 0x0, 0x0) splice(r2, 0x0, 0xffffffffffffffff, 0x0, 0x1000000008, 0x0) 06:08:45 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet_udp_int(r0, 0x11, 0x67, &(0x7f0000000140)=0x6, 0x4) sendmmsg(r0, &(0x7f0000006f00)=[{{&(0x7f0000000040)=@in={0x2, 0x4e23, @remote}, 0x80, &(0x7f0000000100)=[{&(0x7f00000000c0)="e04013b497936ecafdd12c496f522cc2830fd358bc8f890e410223906070a39cc6e2f84a8622c5f86cad52bba1560397737a6cce189d7db27e", 0x39}], 0x1}}, {{0x0, 0x0, &(0x7f0000000440)=[{&(0x7f0000000200)="9544939c01e602e8fc696947591d4c6fb3cb9a7cf9e53555dac91c09bbd33a6e85981e045d", 0x25}, {&(0x7f0000000240)="b995a5bf327c6f291a70af1527c6eb87af6b40c22e784c7d81102b1d2c4f5434d0142b1efa49361c7fa370cde02cbad1cdf556d5ebe84042e5b1eee75566d3c3bd4e54fb80c6258eb985131872c446ae99febe93703f66f4e0e10392c8a0d30f35710c7490190fef84833442ab74de59e4c9ebbc7cfe3f26750c16970d537ab353640e9e46e706cd200383135bfbf29b19c2fe729da592a9fb74eca37cb46775eb6db0118a3c59ac107fcf691822488d67f90e891045cb2ea35a79b6cd27c9fa5f37c9f6d6e4e2ca9267b2a8aa34f9727b0f539f", 0xd4}, {&(0x7f0000000340)="529cd4456bccdb80c030fe01e5cd61704126c8d4e7ec", 0x16}, {0x0}], 0x4}}], 0x2, 0x4c004) sendmmsg(r0, &(0x7f0000007fc0), 0x800001d, 0x0) 06:08:45 executing program 0: r0 = perf_event_open(&(0x7f0000000640)={0x3, 0x70, 0x3e7, 0x0, 0x4, 0x0, 0x0, 0x0, 0x91dd7106ca8fd33b, 0xdb3fedb3c3734f95, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x40000000000, 0x0, 0x1, 0x0, @perf_config_ext={0x18, 0x3}, 0x21, 0x10000000000000, 0x0, 0x0, 0x0, 0x20000007, 0x2}, 0x0, 0xc, 0xffffffffffffffff, 0xa) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='cpuacct.stat\x00', 0x0, 0x0) r2 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r2, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f00000003c0)='syz1\x00', 0x200002, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0xfffffffffffffffc) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000300)='./cgroup/syz0\x00', 0x200002, 0x0) gettid() socket$kcm(0x11, 0xb, 0x0) ioctl$TUNSETTXFILTER(r1, 0x400454d1, &(0x7f00000000c0)=ANY=[@ANYBLOB="00000700000000da6500bbc4bbbbbbbb0180c2000016000000004dc23f0c000000000000bb"]) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000040)=@ipx={0x4, 0x1, 0x0, "2bfaec665b4b", 0xff}, 0x80, 0x0}, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={0xffffffffffffffff, 0x1, 0x49c42ca22ab5a9ac, 0x4, 0x0}, 0x20) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x908b7aabaa7d2404) socket$kcm(0xa, 0x6, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x4000011) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000000c0), 0x0}, 0x28) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x89f1, &(0x7f0000000000)='ip6gre0\x00') perf_event_open(&(0x7f00000004c0)={0x0, 0x70, 0x8, 0x6, 0x0, 0x3, 0x0, 0x3, 0x4, 0x0, 0x9, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x1000, 0x0, @perf_config_ext={0x1ff}, 0x40004, 0xfffffffffffffffd, 0x0, 0x8, 0x8, 0x4, 0x80}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0x10, 0x0, 0x10) sendmsg$kcm(r4, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d200040080000048000001000080000000000300f88000f01700d4bd", 0x2e}], 0xf}, 0x40094) r5 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r6 = socket$kcm(0x2, 0x1, 0x2) socketpair(0x25, 0x6, 0x4, &(0x7f0000000480)) setsockopt$sock_attach_bpf(r6, 0x1, 0x3e, &(0x7f00000002c0)=r5, 0x4) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x6d, &(0x7f0000000cc0)=ANY=[@ANYRESHEX, @ANYBLOB="e99f619c950ec8069b69ac05520100000000000000572e83f4fd34a6db69715afdc8ec492fa879a8460bf2c7459f384ec36d6f0d833fccc87dc8f542ca0731ec72c3f6e0857c63572db61a83246496a2f90400569c8af42a5b8b1e3583115dfe3a40a792ffe638fd722afd02131c170175f382a8d78b6626d1d58220f08d98570bad00042a01c00748cf37385e7d66e6c0efddeb730ebd2f1ab4e816cf7493cf236ca5eb6e5d2a65519a7acf475dbd9fb52eb50ddcf9cee74529f59a2d6cfe6c23f6a688719f922099394146621132f866439970571e206ac47123f2d9cdb5cb7c8506122300000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000)={0x0, 0x8}, 0x10}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r7, 0x18000000000002a0, 0x42, 0x0, &(0x7f0000000800)="b9ff0300600d698cb89e14f088a81fffffff00004000630677fbac14140ee934a0a662079f4b4d2f87e5feca6aab845013f2325f1a39010108038da1924425181aa5", 0x0, 0x28000, 0x60000000, 0x113, 0x0, &(0x7f00000006c0)="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"}, 0x40) r8 = bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x17, 0x6, &(0x7f0000000c00)=ANY=[], &(0x7f00000002c0)='GPL\x00', 0x2, 0x0, 0x0, 0x40f00, 0x8, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000340)={0x1, 0x10000003}, 0x8, 0x10, &(0x7f0000000380)={0x0, 0xa, 0x83, 0x2}, 0x10}, 0x78) ioctl$sock_kcm_SIOCKCMATTACH(r4, 0x89e0, &(0x7f0000000500)={0xffffffffffffffff, r8}) 06:08:45 executing program 2: pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x5, 0x0) splice(r1, 0x0, r0, 0x0, 0x1000000008, 0x0) r2 = syz_open_dev$video(0x0, 0x0, 0x0) splice(r2, 0x0, 0xffffffffffffffff, 0x0, 0x1000000008, 0x0) 06:08:45 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet_udp_int(r0, 0x11, 0x67, &(0x7f0000000140)=0x6, 0x4) sendmmsg(r0, &(0x7f0000006f00)=[{{&(0x7f0000000040)=@in={0x2, 0x4e23, @remote}, 0x80, &(0x7f0000000100)=[{&(0x7f00000000c0)="e04013b497936ecafdd12c496f522cc2830fd358bc8f890e410223906070a39cc6e2f84a8622c5f86cad52bba1560397737a6cce189d7db27e", 0x39}], 0x1}}, {{0x0, 0x0, &(0x7f0000000440)=[{&(0x7f0000000200)="9544939c01e602e8fc696947591d4c6fb3cb9a7cf9e53555dac91c09bbd33a6e85981e045d", 0x25}, {&(0x7f0000000240)="b995a5bf327c6f291a70af1527c6eb87af6b40c22e784c7d81102b1d2c4f5434d0142b1efa49361c7fa370cde02cbad1cdf556d5ebe84042e5b1eee75566d3c3bd4e54fb80c6258eb985131872c446ae99febe93703f66f4e0e10392c8a0d30f35710c7490190fef84833442ab74de59e4c9ebbc7cfe3f26750c16970d537ab353640e9e46e706cd200383135bfbf29b19c2fe729da592a9fb74eca37cb46775eb6db0118a3c59ac107fcf691822488d67f90e891045cb2ea35a79b6cd27c9fa5f37c9f6d6e4e2ca9267b2a8aa34f9727b0f539f", 0xd4}, {&(0x7f0000000340)="529cd4456bccdb80c030fe01e5cd61704126c8d4e7ec", 0x16}, {&(0x7f0000000380)}], 0x4}}], 0x2, 0x4c004) sendmmsg(r0, &(0x7f0000007fc0), 0x800001d, 0x0) 06:08:46 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) r4 = socket$alg(0x26, 0x5, 0x0) r5 = accept$alg(r4, 0x0, 0x0) r6 = accept4(r5, 0x0, 0x0, 0x0) splice(r0, 0x0, r6, 0x0, 0x30007, 0x0) 06:08:46 executing program 3: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setrlimit(0x7, &(0x7f0000000040)) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 06:08:46 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet_udp_int(r0, 0x11, 0x67, &(0x7f0000000140)=0x6, 0x4) sendmmsg(r0, &(0x7f0000006f00)=[{{&(0x7f0000000040)=@in={0x2, 0x4e23, @remote}, 0x80, &(0x7f0000000100)=[{&(0x7f00000000c0)="e04013b497936ecafdd12c496f522cc2830fd358bc8f890e410223906070a39cc6e2f84a8622c5f86cad52bba1560397737a6cce189d7db27e", 0x39}], 0x1}}, {{0x0, 0x0, &(0x7f0000000440)=[{&(0x7f0000000200)="9544939c01e602e8fc696947591d4c6fb3cb9a7cf9e53555dac91c09bbd33a6e85981e045d", 0x25}, {&(0x7f0000000240)="b995a5bf327c6f291a70af1527c6eb87af6b40c22e784c7d81102b1d2c4f5434d0142b1efa49361c7fa370cde02cbad1cdf556d5ebe84042e5b1eee75566d3c3bd4e54fb80c6258eb985131872c446ae99febe93703f66f4e0e10392c8a0d30f35710c7490190fef84833442ab74de59e4c9ebbc7cfe3f26750c16970d537ab353640e9e46e706cd200383135bfbf29b19c2fe729da592a9fb74eca37cb46775eb6db0118a3c59ac107fcf691822488d67f90e891045cb2ea35a79b6cd27c9fa5f37c9f6d6e4e2ca9267b2a8aa34f9727b0f539f", 0xd4}, {&(0x7f0000000340)="529cd4456bccdb80c030fe01e5cd61704126c8d4e7ec", 0x16}, {&(0x7f0000000380)}], 0x4}}], 0x2, 0x4c004) sendmmsg(r0, &(0x7f0000007fc0), 0x800001d, 0x0) 06:08:46 executing program 2: pipe(&(0x7f00000001c0)) syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x5, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = syz_open_dev$video(0x0, 0x0, 0x0) splice(r1, 0x0, r0, 0x0, 0x1000000008, 0x0) 06:08:46 executing program 0: r0 = perf_event_open(&(0x7f0000000640)={0x3, 0x70, 0x3e7, 0x0, 0x4, 0x0, 0x0, 0x0, 0x91dd7106ca8fd33b, 0xdb3fedb3c3734f95, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x40000000000, 0x0, 0x1, 0x0, @perf_config_ext={0x18, 0x3}, 0x21, 0x10000000000000, 0x0, 0x0, 0x0, 0x20000007, 0x2}, 0x0, 0xc, 0xffffffffffffffff, 0xa) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='cpuacct.stat\x00', 0x0, 0x0) r2 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r2, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f00000003c0)='syz1\x00', 0x200002, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0xfffffffffffffffc) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000300)='./cgroup/syz0\x00', 0x200002, 0x0) gettid() socket$kcm(0x11, 0xb, 0x0) ioctl$TUNSETTXFILTER(r1, 0x400454d1, &(0x7f00000000c0)=ANY=[@ANYBLOB="00000700000000da6500bbc4bbbbbbbb0180c2000016000000004dc23f0c000000000000bb"]) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000040)=@ipx={0x4, 0x1, 0x0, "2bfaec665b4b", 0xff}, 0x80, 0x0}, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={0xffffffffffffffff, 0x1, 0x49c42ca22ab5a9ac, 0x4, 0x0}, 0x20) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x908b7aabaa7d2404) socket$kcm(0xa, 0x6, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x4000011) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000000c0), 0x0}, 0x28) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x89f1, &(0x7f0000000000)='ip6gre0\x00') perf_event_open(&(0x7f00000004c0)={0x0, 0x70, 0x8, 0x6, 0x0, 0x3, 0x0, 0x3, 0x4, 0x0, 0x9, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x1000, 0x0, @perf_config_ext={0x1ff}, 0x40004, 0xfffffffffffffffd, 0x0, 0x8, 0x8, 0x4, 0x80}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0x10, 0x0, 0x10) sendmsg$kcm(r4, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d200040080000048000001000080000000000300f88000f01700d4bd", 0x2e}], 0xf}, 0x40094) r5 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r6 = socket$kcm(0x2, 0x1, 0x2) socketpair(0x25, 0x6, 0x4, &(0x7f0000000480)) setsockopt$sock_attach_bpf(r6, 0x1, 0x3e, &(0x7f00000002c0)=r5, 0x4) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x6d, &(0x7f0000000cc0)=ANY=[@ANYRESHEX, @ANYBLOB="e99f619c950ec8069b69ac05520100000000000000572e83f4fd34a6db69715afdc8ec492fa879a8460bf2c7459f384ec36d6f0d833fccc87dc8f542ca0731ec72c3f6e0857c63572db61a83246496a2f90400569c8af42a5b8b1e3583115dfe3a40a792ffe638fd722afd02131c170175f382a8d78b6626d1d58220f08d98570bad00042a01c00748cf37385e7d66e6c0efddeb730ebd2f1ab4e816cf7493cf236ca5eb6e5d2a65519a7acf475dbd9fb52eb50ddcf9cee74529f59a2d6cfe6c23f6a688719f922099394146621132f866439970571e206ac47123f2d9cdb5cb7c8506122300000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000)={0x0, 0x8}, 0x10}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r7, 0x18000000000002a0, 0x42, 0x0, &(0x7f0000000800)="b9ff0300600d698cb89e14f088a81fffffff00004000630677fbac14140ee934a0a662079f4b4d2f87e5feca6aab845013f2325f1a39010108038da1924425181aa5", 0x0, 0x28000, 0x60000000, 0x113, 0x0, &(0x7f00000006c0)="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"}, 0x40) r8 = bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x17, 0x6, &(0x7f0000000c00)=ANY=[], &(0x7f00000002c0)='GPL\x00', 0x2, 0x0, 0x0, 0x40f00, 0x8, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000340)={0x1, 0x10000003}, 0x8, 0x10, &(0x7f0000000380)={0x0, 0xa, 0x83, 0x2}, 0x10}, 0x78) ioctl$sock_kcm_SIOCKCMATTACH(r4, 0x89e0, &(0x7f0000000500)={0xffffffffffffffff, r8}) 06:08:46 executing program 4: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000000c0)=0xe) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r1, 0x40047438, &(0x7f0000000180)=""/246) ioctl$PPPIOCSFLAGS1(r1, 0x40047457, &(0x7f0000000000)) 06:08:46 executing program 2: pipe(&(0x7f00000001c0)) syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x5, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = syz_open_dev$video(0x0, 0x0, 0x0) splice(r1, 0x0, r0, 0x0, 0x1000000008, 0x0) 06:08:46 executing program 3: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setrlimit(0x7, &(0x7f0000000040)) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 06:08:46 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet_udp_int(r0, 0x11, 0x67, &(0x7f0000000140)=0x6, 0x4) sendmmsg(r0, &(0x7f0000006f00)=[{{&(0x7f0000000040)=@in={0x2, 0x4e23, @remote}, 0x80, &(0x7f0000000100)=[{&(0x7f00000000c0)="e04013b497936ecafdd12c496f522cc2830fd358bc8f890e410223906070a39cc6e2f84a8622c5f86cad52bba1560397737a6cce189d7db27e", 0x39}], 0x1}}, {{0x0, 0x0, &(0x7f0000000440)=[{&(0x7f0000000200)="9544939c01e602e8fc696947591d4c6fb3cb9a7cf9e53555dac91c09bbd33a6e85981e045d", 0x25}, {&(0x7f0000000240)="b995a5bf327c6f291a70af1527c6eb87af6b40c22e784c7d81102b1d2c4f5434d0142b1efa49361c7fa370cde02cbad1cdf556d5ebe84042e5b1eee75566d3c3bd4e54fb80c6258eb985131872c446ae99febe93703f66f4e0e10392c8a0d30f35710c7490190fef84833442ab74de59e4c9ebbc7cfe3f26750c16970d537ab353640e9e46e706cd200383135bfbf29b19c2fe729da592a9fb74eca37cb46775eb6db0118a3c59ac107fcf691822488d67f90e891045cb2ea35a79b6cd27c9fa5f37c9f6d6e4e2ca9267b2a8aa34f9727b0f539f", 0xd4}, {&(0x7f0000000340)="529cd4456bccdb80c030fe01e5cd61704126c8d4e7ec", 0x16}, {&(0x7f0000000380)}], 0x4}}], 0x2, 0x4c004) sendmmsg(r0, &(0x7f0000007fc0), 0x800001d, 0x0) 06:08:46 executing program 0: r0 = perf_event_open(&(0x7f0000000640)={0x3, 0x70, 0x3e7, 0x0, 0x4, 0x0, 0x0, 0x0, 0x91dd7106ca8fd33b, 0xdb3fedb3c3734f95, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x40000000000, 0x0, 0x1, 0x0, @perf_config_ext={0x18, 0x3}, 0x21, 0x10000000000000, 0x0, 0x0, 0x0, 0x20000007, 0x2}, 0x0, 0xc, 0xffffffffffffffff, 0xa) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='cpuacct.stat\x00', 0x0, 0x0) r2 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r2, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f00000003c0)='syz1\x00', 0x200002, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0xfffffffffffffffc) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000300)='./cgroup/syz0\x00', 0x200002, 0x0) gettid() socket$kcm(0x11, 0xb, 0x0) ioctl$TUNSETTXFILTER(r1, 0x400454d1, &(0x7f00000000c0)=ANY=[@ANYBLOB="00000700000000da6500bbc4bbbbbbbb0180c2000016000000004dc23f0c000000000000bb"]) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000040)=@ipx={0x4, 0x1, 0x0, "2bfaec665b4b", 0xff}, 0x80, 0x0}, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={0xffffffffffffffff, 0x1, 0x49c42ca22ab5a9ac, 0x4, 0x0}, 0x20) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x908b7aabaa7d2404) socket$kcm(0xa, 0x6, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x4000011) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000000c0), 0x0}, 0x28) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x89f1, &(0x7f0000000000)='ip6gre0\x00') perf_event_open(&(0x7f00000004c0)={0x0, 0x70, 0x8, 0x6, 0x0, 0x3, 0x0, 0x3, 0x4, 0x0, 0x9, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x1000, 0x0, @perf_config_ext={0x1ff}, 0x40004, 0xfffffffffffffffd, 0x0, 0x8, 0x8, 0x4, 0x80}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0x10, 0x0, 0x10) sendmsg$kcm(r4, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d200040080000048000001000080000000000300f88000f01700d4bd", 0x2e}], 0xf}, 0x40094) r5 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r6 = socket$kcm(0x2, 0x1, 0x2) socketpair(0x25, 0x6, 0x4, &(0x7f0000000480)) setsockopt$sock_attach_bpf(r6, 0x1, 0x3e, &(0x7f00000002c0)=r5, 0x4) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x6d, &(0x7f0000000cc0)=ANY=[@ANYRESHEX, @ANYBLOB="e99f619c950ec8069b69ac05520100000000000000572e83f4fd34a6db69715afdc8ec492fa879a8460bf2c7459f384ec36d6f0d833fccc87dc8f542ca0731ec72c3f6e0857c63572db61a83246496a2f90400569c8af42a5b8b1e3583115dfe3a40a792ffe638fd722afd02131c170175f382a8d78b6626d1d58220f08d98570bad00042a01c00748cf37385e7d66e6c0efddeb730ebd2f1ab4e816cf7493cf236ca5eb6e5d2a65519a7acf475dbd9fb52eb50ddcf9cee74529f59a2d6cfe6c23f6a688719f922099394146621132f866439970571e206ac47123f2d9cdb5cb7c8506122300000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000)={0x0, 0x8}, 0x10}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r7, 0x18000000000002a0, 0x42, 0x0, &(0x7f0000000800)="b9ff0300600d698cb89e14f088a81fffffff00004000630677fbac14140ee934a0a662079f4b4d2f87e5feca6aab845013f2325f1a39010108038da1924425181aa5", 0x0, 0x28000, 0x60000000, 0x113, 0x0, &(0x7f00000006c0)="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"}, 0x40) r8 = bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x17, 0x6, &(0x7f0000000c00)=ANY=[], &(0x7f00000002c0)='GPL\x00', 0x2, 0x0, 0x0, 0x40f00, 0x8, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000340)={0x1, 0x10000003}, 0x8, 0x10, &(0x7f0000000380)={0x0, 0xa, 0x83, 0x2}, 0x10}, 0x78) ioctl$sock_kcm_SIOCKCMATTACH(r4, 0x89e0, &(0x7f0000000500)={0xffffffffffffffff, r8}) 06:08:46 executing program 2: pipe(&(0x7f00000001c0)) syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x5, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = syz_open_dev$video(0x0, 0x0, 0x0) splice(r1, 0x0, r0, 0x0, 0x1000000008, 0x0) 06:08:46 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet_udp_int(r0, 0x11, 0x67, &(0x7f0000000140)=0x6, 0x4) sendmmsg(r0, &(0x7f0000006f00)=[{{&(0x7f0000000040)=@in={0x2, 0x4e23, @remote}, 0x80, &(0x7f0000000100)=[{&(0x7f00000000c0)="e04013b497936ecafdd12c496f522cc2830fd358bc8f890e410223906070a39cc6e2f84a8622c5f86cad52bba1560397737a6cce189d7db27e", 0x39}], 0x1}}, {{0x0, 0x0, &(0x7f0000000440)=[{&(0x7f0000000200)="9544939c01e602e8fc696947591d4c6fb3cb9a7cf9e53555dac91c09bbd33a6e85981e045d", 0x25}, {&(0x7f0000000240)="b995a5bf327c6f291a70af1527c6eb87af6b40c22e784c7d81102b1d2c4f5434d0142b1efa49361c7fa370cde02cbad1cdf556d5ebe84042e5b1eee75566d3c3bd4e54fb80c6258eb985131872c446ae99febe93703f66f4e0e10392c8a0d30f35710c7490190fef84833442ab74de59e4c9ebbc7cfe3f26750c16970d537ab353640e9e46e706cd200383135bfbf29b19c2fe729da592a9fb74eca37cb46775eb6db0118a3c59ac107fcf691822488d67f90e891045cb2ea35a79b6cd27c9fa5f37c9f6d6e4e2ca9267b2a8aa34f9727b0f539f", 0xd4}, {&(0x7f0000000340)="529cd4456bccdb80c030fe01e5cd61704126c8d4e7ec", 0x16}, {&(0x7f0000000380)="c2597979197f75ed6b82c8bcbf2c6b", 0xf}], 0x4}}], 0x2, 0x4c004) sendmmsg(r0, &(0x7f0000007fc0), 0x800001d, 0x0) 06:08:47 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) bind$alg(0xffffffffffffffff, &(0x7f0000000100)={0x26, 'hash\x00', 0x0, 0x0, 'crct10dif-generic\x00'}, 0x58) r4 = accept$alg(0xffffffffffffffff, 0x0, 0x0) r5 = accept4(r4, 0x0, 0x0, 0x0) splice(r0, 0x0, r5, 0x0, 0x30007, 0x0) 06:08:47 executing program 3: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setrlimit(0x7, &(0x7f0000000040)) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 06:08:47 executing program 2: pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) splice(0xffffffffffffffff, 0x0, r0, 0x0, 0x1000000008, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = syz_open_dev$video(0x0, 0x0, 0x0) splice(r2, 0x0, r1, 0x0, 0x1000000008, 0x0) 06:08:47 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet_udp_int(r0, 0x11, 0x67, &(0x7f0000000140)=0x6, 0x4) sendmmsg(r0, &(0x7f0000006f00)=[{{&(0x7f0000000040)=@in={0x2, 0x4e23, @remote}, 0x80, &(0x7f0000000100)=[{&(0x7f00000000c0)="e04013b497936ecafdd12c496f522cc2830fd358bc8f890e410223906070a39cc6e2f84a8622c5f86cad52bba1560397737a6cce189d7db27e", 0x39}], 0x1}}, {{0x0, 0x0, &(0x7f0000000440)=[{&(0x7f0000000200)="9544939c01e602e8fc696947591d4c6fb3cb9a7cf9e53555dac91c09bbd33a6e85981e045d", 0x25}, {&(0x7f0000000240)="b995a5bf327c6f291a70af1527c6eb87af6b40c22e784c7d81102b1d2c4f5434d0142b1efa49361c7fa370cde02cbad1cdf556d5ebe84042e5b1eee75566d3c3bd4e54fb80c6258eb985131872c446ae99febe93703f66f4e0e10392c8a0d30f35710c7490190fef84833442ab74de59e4c9ebbc7cfe3f26750c16970d537ab353640e9e46e706cd200383135bfbf29b19c2fe729da592a9fb74eca37cb46775eb6db0118a3c59ac107fcf691822488d67f90e891045cb2ea35a79b6cd27c9fa5f37c9f6d6e4e2ca9267b2a8aa34f9727b0f539f", 0xd4}, {&(0x7f0000000340)="529cd4456bccdb80c030fe01e5cd61704126c8d4e7ec", 0x16}, {&(0x7f0000000380)="c2597979197f75ed6b82c8bcbf2c6b", 0xf}], 0x4}}], 0x2, 0x4c004) sendmmsg(r0, &(0x7f0000007fc0), 0x800001d, 0x0) 06:08:47 executing program 0: r0 = perf_event_open(&(0x7f0000000640)={0x3, 0x70, 0x3e7, 0x0, 0x4, 0x0, 0x0, 0x0, 0x91dd7106ca8fd33b, 0xdb3fedb3c3734f95, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x40000000000, 0x0, 0x1, 0x0, @perf_config_ext={0x18, 0x3}, 0x21, 0x10000000000000, 0x0, 0x0, 0x0, 0x20000007, 0x2}, 0x0, 0xc, 0xffffffffffffffff, 0xa) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='cpuacct.stat\x00', 0x0, 0x0) r2 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r2, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f00000003c0)='syz1\x00', 0x200002, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0xfffffffffffffffc) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000300)='./cgroup/syz0\x00', 0x200002, 0x0) gettid() socket$kcm(0x11, 0xb, 0x0) ioctl$TUNSETTXFILTER(r1, 0x400454d1, &(0x7f00000000c0)=ANY=[@ANYBLOB="00000700000000da6500bbc4bbbbbbbb0180c2000016000000004dc23f0c000000000000bb"]) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000040)=@ipx={0x4, 0x1, 0x0, "2bfaec665b4b", 0xff}, 0x80, 0x0}, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x908b7aabaa7d2404) socket$kcm(0xa, 0x6, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x4000011) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000000c0), 0x0}, 0x28) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x89f1, &(0x7f0000000000)='ip6gre0\x00') perf_event_open(&(0x7f00000004c0)={0x0, 0x70, 0x8, 0x6, 0x0, 0x3, 0x0, 0x3, 0x4, 0x0, 0x9, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x1000, 0x0, @perf_config_ext={0x1ff}, 0x40004, 0xfffffffffffffffd, 0x0, 0x8, 0x8, 0x4, 0x80}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0x10, 0x0, 0x10) sendmsg$kcm(r4, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d200040080000048000001000080000000000300f88000f01700d4bd", 0x2e}], 0xf}, 0x40094) r5 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r6 = socket$kcm(0x2, 0x1, 0x2) socketpair(0x25, 0x6, 0x4, &(0x7f0000000480)) setsockopt$sock_attach_bpf(r6, 0x1, 0x3e, &(0x7f00000002c0)=r5, 0x4) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x6d, &(0x7f0000000cc0)=ANY=[@ANYRESHEX, @ANYBLOB="e99f619c950ec8069b69ac05520100000000000000572e83f4fd34a6db69715afdc8ec492fa879a8460bf2c7459f384ec36d6f0d833fccc87dc8f542ca0731ec72c3f6e0857c63572db61a83246496a2f90400569c8af42a5b8b1e3583115dfe3a40a792ffe638fd722afd02131c170175f382a8d78b6626d1d58220f08d98570bad00042a01c00748cf37385e7d66e6c0efddeb730ebd2f1ab4e816cf7493cf236ca5eb6e5d2a65519a7acf475dbd9fb52eb50ddcf9cee74529f59a2d6cfe6c23f6a688719f922099394146621132f866439970571e206ac47123f2d9cdb5cb7c8506122300000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000)={0x0, 0x8}, 0x10}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r7, 0x18000000000002a0, 0x42, 0x0, &(0x7f0000000800)="b9ff0300600d698cb89e14f088a81fffffff00004000630677fbac14140ee934a0a662079f4b4d2f87e5feca6aab845013f2325f1a39010108038da1924425181aa5", 0x0, 0x28000, 0x60000000, 0x113, 0x0, &(0x7f00000006c0)="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"}, 0x40) r8 = bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x17, 0x6, &(0x7f0000000c00)=ANY=[], &(0x7f00000002c0)='GPL\x00', 0x2, 0x0, 0x0, 0x40f00, 0x8, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000340)={0x1, 0x10000003}, 0x8, 0x10, &(0x7f0000000380)={0x0, 0xa, 0x83, 0x2}, 0x10}, 0x78) ioctl$sock_kcm_SIOCKCMATTACH(r4, 0x89e0, &(0x7f0000000500)={0xffffffffffffffff, r8}) 06:08:47 executing program 4: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000000c0)=0xe) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r1, 0x40047438, &(0x7f0000000180)=""/246) ioctl$PPPIOCSFLAGS1(r1, 0x40047457, &(0x7f0000000000)) 06:08:47 executing program 2: pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) splice(0xffffffffffffffff, 0x0, r0, 0x0, 0x1000000008, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = syz_open_dev$video(0x0, 0x0, 0x0) splice(r2, 0x0, r1, 0x0, 0x1000000008, 0x0) 06:08:47 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet_udp_int(r0, 0x11, 0x67, &(0x7f0000000140)=0x6, 0x4) sendmmsg(r0, &(0x7f0000006f00)=[{{&(0x7f0000000040)=@in={0x2, 0x4e23, @remote}, 0x80, &(0x7f0000000100)=[{&(0x7f00000000c0)="e04013b497936ecafdd12c496f522cc2830fd358bc8f890e410223906070a39cc6e2f84a8622c5f86cad52bba1560397737a6cce189d7db27e", 0x39}], 0x1}}, {{0x0, 0x0, &(0x7f0000000440)=[{&(0x7f0000000200)="9544939c01e602e8fc696947591d4c6fb3cb9a7cf9e53555dac91c09bbd33a6e85981e045d", 0x25}, {&(0x7f0000000240)="b995a5bf327c6f291a70af1527c6eb87af6b40c22e784c7d81102b1d2c4f5434d0142b1efa49361c7fa370cde02cbad1cdf556d5ebe84042e5b1eee75566d3c3bd4e54fb80c6258eb985131872c446ae99febe93703f66f4e0e10392c8a0d30f35710c7490190fef84833442ab74de59e4c9ebbc7cfe3f26750c16970d537ab353640e9e46e706cd200383135bfbf29b19c2fe729da592a9fb74eca37cb46775eb6db0118a3c59ac107fcf691822488d67f90e891045cb2ea35a79b6cd27c9fa5f37c9f6d6e4e2ca9267b2a8aa34f9727b0f539f", 0xd4}, {&(0x7f0000000340)="529cd4456bccdb80c030fe01e5cd61704126c8d4e7ec", 0x16}, {&(0x7f0000000380)="c2597979197f75ed6b82c8bcbf2c6b", 0xf}], 0x4}}], 0x2, 0x4c004) sendmmsg(r0, &(0x7f0000007fc0), 0x800001d, 0x0) 06:08:47 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000540)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0xffaf) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000100)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @mcast2, 0x1}, {0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc]}}, r1}}, 0x48) 06:08:47 executing program 0: r0 = perf_event_open(&(0x7f0000000640)={0x3, 0x70, 0x3e7, 0x0, 0x4, 0x0, 0x0, 0x0, 0x91dd7106ca8fd33b, 0xdb3fedb3c3734f95, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x40000000000, 0x0, 0x1, 0x0, @perf_config_ext={0x18, 0x3}, 0x21, 0x10000000000000, 0x0, 0x0, 0x0, 0x20000007, 0x2}, 0x0, 0xc, 0xffffffffffffffff, 0xa) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='cpuacct.stat\x00', 0x0, 0x0) r2 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r2, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f00000003c0)='syz1\x00', 0x200002, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0xfffffffffffffffc) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000300)='./cgroup/syz0\x00', 0x200002, 0x0) gettid() socket$kcm(0x11, 0xb, 0x0) ioctl$TUNSETTXFILTER(r1, 0x400454d1, &(0x7f00000000c0)=ANY=[@ANYBLOB="00000700000000da6500bbc4bbbbbbbb0180c2000016000000004dc23f0c000000000000bb"]) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000040)=@ipx={0x4, 0x1, 0x0, "2bfaec665b4b", 0xff}, 0x80, 0x0}, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x908b7aabaa7d2404) socket$kcm(0xa, 0x6, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x4000011) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000000c0), 0x0}, 0x28) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x89f1, &(0x7f0000000000)='ip6gre0\x00') perf_event_open(&(0x7f00000004c0)={0x0, 0x70, 0x8, 0x6, 0x0, 0x3, 0x0, 0x3, 0x4, 0x0, 0x9, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x1000, 0x0, @perf_config_ext={0x1ff}, 0x40004, 0xfffffffffffffffd, 0x0, 0x8, 0x8, 0x4, 0x80}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0x10, 0x0, 0x10) sendmsg$kcm(r4, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d200040080000048000001000080000000000300f88000f01700d4bd", 0x2e}], 0xf}, 0x40094) r5 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r6 = socket$kcm(0x2, 0x1, 0x2) socketpair(0x25, 0x6, 0x4, &(0x7f0000000480)) setsockopt$sock_attach_bpf(r6, 0x1, 0x3e, &(0x7f00000002c0)=r5, 0x4) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x6d, &(0x7f0000000cc0)=ANY=[@ANYRESHEX, @ANYBLOB="e99f619c950ec8069b69ac05520100000000000000572e83f4fd34a6db69715afdc8ec492fa879a8460bf2c7459f384ec36d6f0d833fccc87dc8f542ca0731ec72c3f6e0857c63572db61a83246496a2f90400569c8af42a5b8b1e3583115dfe3a40a792ffe638fd722afd02131c170175f382a8d78b6626d1d58220f08d98570bad00042a01c00748cf37385e7d66e6c0efddeb730ebd2f1ab4e816cf7493cf236ca5eb6e5d2a65519a7acf475dbd9fb52eb50ddcf9cee74529f59a2d6cfe6c23f6a688719f922099394146621132f866439970571e206ac47123f2d9cdb5cb7c8506122300000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000)={0x0, 0x8}, 0x10}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r7, 0x18000000000002a0, 0x42, 0x0, &(0x7f0000000800)="b9ff0300600d698cb89e14f088a81fffffff00004000630677fbac14140ee934a0a662079f4b4d2f87e5feca6aab845013f2325f1a39010108038da1924425181aa5", 0x0, 0x28000, 0x60000000, 0x113, 0x0, &(0x7f00000006c0)="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"}, 0x40) r8 = bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x17, 0x6, &(0x7f0000000c00)=ANY=[], &(0x7f00000002c0)='GPL\x00', 0x2, 0x0, 0x0, 0x40f00, 0x8, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000340)={0x1, 0x10000003}, 0x8, 0x10, &(0x7f0000000380)={0x0, 0xa, 0x83, 0x2}, 0x10}, 0x78) ioctl$sock_kcm_SIOCKCMATTACH(r4, 0x89e0, &(0x7f0000000500)={0xffffffffffffffff, r8}) 06:08:47 executing program 2: pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) splice(0xffffffffffffffff, 0x0, r0, 0x0, 0x1000000008, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = syz_open_dev$video(0x0, 0x0, 0x0) splice(r2, 0x0, r1, 0x0, 0x1000000008, 0x0) 06:08:47 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet_udp_int(r0, 0x11, 0x67, &(0x7f0000000140)=0x6, 0x4) sendmmsg(r0, &(0x7f0000006f00)=[{{&(0x7f0000000040)=@in={0x2, 0x4e23, @remote}, 0x80, &(0x7f0000000100)=[{&(0x7f00000000c0)="e04013b497936ecafdd12c496f522cc2830fd358bc8f890e410223906070a39cc6e2f84a8622c5f86cad52bba1560397737a6cce189d7db27e", 0x39}], 0x1}}, {{0x0, 0x0, &(0x7f0000000440)=[{&(0x7f0000000200)="9544939c01e602e8fc696947591d4c6fb3cb9a7cf9e53555dac91c09bbd33a6e85981e045d", 0x25}, {&(0x7f0000000240)="b995a5bf327c6f291a70af1527c6eb87af6b40c22e784c7d81102b1d2c4f5434d0142b1efa49361c7fa370cde02cbad1cdf556d5ebe84042e5b1eee75566d3c3bd4e54fb80c6258eb985131872c446ae99febe93703f66f4e0e10392c8a0d30f35710c7490190fef84833442ab74de59e4c9ebbc7cfe3f26750c16970d537ab353640e9e46e706cd200383135bfbf29b19c2fe729da592a9fb74eca37cb46775eb6db0118a3c59ac107fcf691822488d67f90e891045cb2ea35a79b6cd27c9fa5f37c9f6d6e4e2ca9267b2a8aa34f9727b0f539f", 0xd4}, {&(0x7f0000000340)="529cd4456bccdb80c030fe01e5cd61704126c8d4e7ec", 0x16}, {&(0x7f0000000380)="c2597979197f75ed6b82c8bcbf2c6b92a9a53fdd7464", 0x16}], 0x4}}], 0x2, 0x4c004) sendmmsg(r0, &(0x7f0000007fc0), 0x800001d, 0x0) 06:08:48 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) bind$alg(0xffffffffffffffff, &(0x7f0000000100)={0x26, 'hash\x00', 0x0, 0x0, 'crct10dif-generic\x00'}, 0x58) r4 = accept$alg(0xffffffffffffffff, 0x0, 0x0) r5 = accept4(r4, 0x0, 0x0, 0x0) splice(r0, 0x0, r5, 0x0, 0x30007, 0x0) 06:08:48 executing program 4: unshare(0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000000c0)=0xe) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r1, 0x40047438, &(0x7f0000000180)=""/246) ioctl$PPPIOCSFLAGS1(r1, 0x40047457, &(0x7f0000000000)) 06:08:48 executing program 2: r0 = syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x5, 0x0) splice(r0, 0x0, 0xffffffffffffffff, 0x0, 0x1000000008, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = syz_open_dev$video(0x0, 0x0, 0x0) splice(r2, 0x0, r1, 0x0, 0x1000000008, 0x0) 06:08:48 executing program 3: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setrlimit(0x7, &(0x7f0000000040)) bpf$MAP_CREATE(0x0, &(0x7f0000000500)={0x7, 0x4, 0x8, 0xf1a}, 0x2c) 06:08:48 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet_udp_int(r0, 0x11, 0x67, &(0x7f0000000140)=0x6, 0x4) sendmmsg(r0, &(0x7f0000006f00)=[{{&(0x7f0000000040)=@in={0x2, 0x4e23, @remote}, 0x80, &(0x7f0000000100)=[{&(0x7f00000000c0)="e04013b497936ecafdd12c496f522cc2830fd358bc8f890e410223906070a39cc6e2f84a8622c5f86cad52bba1560397737a6cce189d7db27e", 0x39}], 0x1}}, {{0x0, 0x0, &(0x7f0000000440)=[{&(0x7f0000000200)="9544939c01e602e8fc696947591d4c6fb3cb9a7cf9e53555dac91c09bbd33a6e85981e045d", 0x25}, {&(0x7f0000000240)="b995a5bf327c6f291a70af1527c6eb87af6b40c22e784c7d81102b1d2c4f5434d0142b1efa49361c7fa370cde02cbad1cdf556d5ebe84042e5b1eee75566d3c3bd4e54fb80c6258eb985131872c446ae99febe93703f66f4e0e10392c8a0d30f35710c7490190fef84833442ab74de59e4c9ebbc7cfe3f26750c16970d537ab353640e9e46e706cd200383135bfbf29b19c2fe729da592a9fb74eca37cb46775eb6db0118a3c59ac107fcf691822488d67f90e891045cb2ea35a79b6cd27c9fa5f37c9f6d6e4e2ca9267b2a8aa34f9727b0f539f", 0xd4}, {&(0x7f0000000340)="529cd4456bccdb80c030fe01e5cd61704126c8d4e7ec", 0x16}, {&(0x7f0000000380)="c2597979197f75ed6b82c8bcbf2c6b92a9a53fdd7464", 0x16}], 0x4}}], 0x2, 0x4c004) sendmmsg(r0, &(0x7f0000007fc0), 0x800001d, 0x0) 06:08:48 executing program 0: r0 = perf_event_open(&(0x7f0000000640)={0x3, 0x70, 0x3e7, 0x0, 0x4, 0x0, 0x0, 0x0, 0x91dd7106ca8fd33b, 0xdb3fedb3c3734f95, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x40000000000, 0x0, 0x1, 0x0, @perf_config_ext={0x18, 0x3}, 0x21, 0x10000000000000, 0x0, 0x0, 0x0, 0x20000007, 0x2}, 0x0, 0xc, 0xffffffffffffffff, 0xa) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='cpuacct.stat\x00', 0x0, 0x0) r2 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r2, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f00000003c0)='syz1\x00', 0x200002, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0xfffffffffffffffc) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000300)='./cgroup/syz0\x00', 0x200002, 0x0) gettid() socket$kcm(0x11, 0xb, 0x0) ioctl$TUNSETTXFILTER(r1, 0x400454d1, &(0x7f00000000c0)=ANY=[@ANYBLOB="00000700000000da6500bbc4bbbbbbbb0180c2000016000000004dc23f0c000000000000bb"]) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000040)=@ipx={0x4, 0x1, 0x0, "2bfaec665b4b", 0xff}, 0x80, 0x0}, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x908b7aabaa7d2404) socket$kcm(0xa, 0x6, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x4000011) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000000c0), 0x0}, 0x28) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x89f1, &(0x7f0000000000)='ip6gre0\x00') perf_event_open(&(0x7f00000004c0)={0x0, 0x70, 0x8, 0x6, 0x0, 0x3, 0x0, 0x3, 0x4, 0x0, 0x9, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x1000, 0x0, @perf_config_ext={0x1ff}, 0x40004, 0xfffffffffffffffd, 0x0, 0x8, 0x8, 0x4, 0x80}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0x10, 0x0, 0x10) sendmsg$kcm(r4, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d200040080000048000001000080000000000300f88000f01700d4bd", 0x2e}], 0xf}, 0x40094) r5 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r6 = socket$kcm(0x2, 0x1, 0x2) socketpair(0x25, 0x6, 0x4, &(0x7f0000000480)) setsockopt$sock_attach_bpf(r6, 0x1, 0x3e, &(0x7f00000002c0)=r5, 0x4) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x6d, &(0x7f0000000cc0)=ANY=[@ANYRESHEX, @ANYBLOB="e99f619c950ec8069b69ac05520100000000000000572e83f4fd34a6db69715afdc8ec492fa879a8460bf2c7459f384ec36d6f0d833fccc87dc8f542ca0731ec72c3f6e0857c63572db61a83246496a2f90400569c8af42a5b8b1e3583115dfe3a40a792ffe638fd722afd02131c170175f382a8d78b6626d1d58220f08d98570bad00042a01c00748cf37385e7d66e6c0efddeb730ebd2f1ab4e816cf7493cf236ca5eb6e5d2a65519a7acf475dbd9fb52eb50ddcf9cee74529f59a2d6cfe6c23f6a688719f922099394146621132f866439970571e206ac47123f2d9cdb5cb7c8506122300000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000)={0x0, 0x8}, 0x10}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r7, 0x18000000000002a0, 0x42, 0x0, &(0x7f0000000800)="b9ff0300600d698cb89e14f088a81fffffff00004000630677fbac14140ee934a0a662079f4b4d2f87e5feca6aab845013f2325f1a39010108038da1924425181aa5", 0x0, 0x28000, 0x60000000, 0x113, 0x0, &(0x7f00000006c0)="097baacf569909ebb78a19b4d4f607feb3072ad9474026c7c148d184a2647de87a8fd14ad5d15cadabd6c7545b05000000ad90e0d4000000000f3f750d2a75f6fa77d3fa4e023987f7a54b04eb238604aa90cab7b44f95ae6ce9b5f877439af64cb6573e5bc85c5e766604ff55b7a234246bd2ee44c9e99d69190bbe089603846d17b8678d05a0bda6ae300ca8c43271b65bb62b0af61bf4da3891f5bcf900ed368b36e2db9957b0dfa5cf084db8cb2b2c54661f9eac8a58a72fc9e768405eb33bce450dd088d2e16d757eeb1239a2389330535afb4944b7b27c4b26d812ab58864f3ffa3ce8cf739275492a0c90b425a792a19b9abf846b926e9f93f4b57ab77c0db63fb7d5a1e04ef52157f14f1dedcc4437"}, 0x40) r8 = bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x17, 0x6, &(0x7f0000000c00)=ANY=[], &(0x7f00000002c0)='GPL\x00', 0x2, 0x0, 0x0, 0x40f00, 0x8, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000340)={0x1, 0x10000003}, 0x8, 0x10, &(0x7f0000000380)={0x0, 0xa, 0x83, 0x2}, 0x10}, 0x78) ioctl$sock_kcm_SIOCKCMATTACH(r4, 0x89e0, &(0x7f0000000500)={0xffffffffffffffff, r8}) 06:08:48 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet_udp_int(r0, 0x11, 0x67, &(0x7f0000000140)=0x6, 0x4) sendmmsg(r0, &(0x7f0000006f00)=[{{&(0x7f0000000040)=@in={0x2, 0x4e23, @remote}, 0x80, &(0x7f0000000100)=[{&(0x7f00000000c0)="e04013b497936ecafdd12c496f522cc2830fd358bc8f890e410223906070a39cc6e2f84a8622c5f86cad52bba1560397737a6cce189d7db27e", 0x39}], 0x1}}, {{0x0, 0x0, &(0x7f0000000440)=[{&(0x7f0000000200)="9544939c01e602e8fc696947591d4c6fb3cb9a7cf9e53555dac91c09bbd33a6e85981e045d", 0x25}, {&(0x7f0000000240)="b995a5bf327c6f291a70af1527c6eb87af6b40c22e784c7d81102b1d2c4f5434d0142b1efa49361c7fa370cde02cbad1cdf556d5ebe84042e5b1eee75566d3c3bd4e54fb80c6258eb985131872c446ae99febe93703f66f4e0e10392c8a0d30f35710c7490190fef84833442ab74de59e4c9ebbc7cfe3f26750c16970d537ab353640e9e46e706cd200383135bfbf29b19c2fe729da592a9fb74eca37cb46775eb6db0118a3c59ac107fcf691822488d67f90e891045cb2ea35a79b6cd27c9fa5f37c9f6d6e4e2ca9267b2a8aa34f9727b0f539f", 0xd4}, {&(0x7f0000000340)="529cd4456bccdb80c030fe01e5cd61704126c8d4e7ec", 0x16}, {&(0x7f0000000380)="c2597979197f75ed6b82c8bcbf2c6b92a9a53fdd7464", 0x16}], 0x4}}], 0x2, 0x4c004) sendmmsg(r0, &(0x7f0000007fc0), 0x800001d, 0x0) 06:08:48 executing program 3: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setrlimit(0x7, &(0x7f0000000040)) bpf$MAP_CREATE(0x0, &(0x7f0000000500)={0x7, 0x4, 0x8, 0xf1a}, 0x2c) 06:08:48 executing program 0: r0 = perf_event_open(&(0x7f0000000640)={0x3, 0x70, 0x3e7, 0x0, 0x4, 0x0, 0x0, 0x0, 0x91dd7106ca8fd33b, 0xdb3fedb3c3734f95, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x40000000000, 0x0, 0x1, 0x0, @perf_config_ext={0x18, 0x3}, 0x21, 0x10000000000000, 0x0, 0x0, 0x0, 0x20000007, 0x2}, 0x0, 0xc, 0xffffffffffffffff, 0xa) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='cpuacct.stat\x00', 0x0, 0x0) r2 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r2, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f00000003c0)='syz1\x00', 0x200002, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0xfffffffffffffffc) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000300)='./cgroup/syz0\x00', 0x200002, 0x0) gettid() socket$kcm(0x11, 0xb, 0x0) ioctl$TUNSETTXFILTER(r1, 0x400454d1, &(0x7f00000000c0)=ANY=[@ANYBLOB="00000700000000da6500bbc4bbbbbbbb0180c2000016000000004dc23f0c000000000000bb"]) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000040)=@ipx={0x4, 0x1, 0x0, "2bfaec665b4b", 0xff}, 0x80, 0x0}, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={0xffffffffffffffff, 0x1, 0x49c42ca22ab5a9ac, 0x4, 0x0}, 0x20) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x908b7aabaa7d2404) socket$kcm(0xa, 0x6, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x4000011) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000000c0), 0x0}, 0x28) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x89f1, &(0x7f0000000000)='ip6gre0\x00') perf_event_open(&(0x7f00000004c0)={0x0, 0x70, 0x8, 0x6, 0x0, 0x3, 0x0, 0x3, 0x4, 0x0, 0x9, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x1000, 0x0, @perf_config_ext={0x1ff}, 0x40004, 0xfffffffffffffffd, 0x0, 0x8, 0x8, 0x4, 0x80}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0x10, 0x0, 0x10) sendmsg$kcm(r4, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d200040080000048000001000080000000000300f88000f01700d4bd", 0x2e}], 0xf}, 0x40094) r5 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r6 = socket$kcm(0x2, 0x1, 0x2) socketpair(0x25, 0x6, 0x4, &(0x7f0000000480)) setsockopt$sock_attach_bpf(r6, 0x1, 0x3e, &(0x7f00000002c0)=r5, 0x4) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x6d, &(0x7f0000000cc0)=ANY=[@ANYRESHEX, @ANYBLOB="e99f619c950ec8069b69ac05520100000000000000572e83f4fd34a6db69715afdc8ec492fa879a8460bf2c7459f384ec36d6f0d833fccc87dc8f542ca0731ec72c3f6e0857c63572db61a83246496a2f90400569c8af42a5b8b1e3583115dfe3a40a792ffe638fd722afd02131c170175f382a8d78b6626d1d58220f08d98570bad00042a01c00748cf37385e7d66e6c0efddeb730ebd2f1ab4e816cf7493cf236ca5eb6e5d2a65519a7acf475dbd9fb52eb50ddcf9cee74529f59a2d6cfe6c23f6a688719f922099394146621132f866439970571e206ac47123f2d9cdb5cb7c8506122300000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000)={0x0, 0x8}, 0x10}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r7, 0x18000000000002a0, 0x42, 0x0, &(0x7f0000000800)="b9ff0300600d698cb89e14f088a81fffffff00004000630677fbac14140ee934a0a662079f4b4d2f87e5feca6aab845013f2325f1a39010108038da1924425181aa5", 0x0, 0x28000, 0x60000000, 0x113, 0x0, &(0x7f00000006c0)="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"}, 0x40) r8 = bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x17, 0x6, &(0x7f0000000c00)=ANY=[], &(0x7f00000002c0)='GPL\x00', 0x2, 0x0, 0x0, 0x40f00, 0x8, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000340)={0x1, 0x10000003}, 0x8, 0x10, &(0x7f0000000380)={0x0, 0xa, 0x83, 0x2}, 0x10}, 0x78) ioctl$sock_kcm_SIOCKCMATTACH(r4, 0x89e0, &(0x7f0000000500)={0xffffffffffffffff, r8}) 06:08:48 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet_udp_int(r0, 0x11, 0x67, &(0x7f0000000140)=0x6, 0x4) sendmmsg(r0, &(0x7f0000006f00)=[{{&(0x7f0000000040)=@in={0x2, 0x4e23, @remote}, 0x80, &(0x7f0000000100)=[{&(0x7f00000000c0)="e04013b497936ecafdd12c496f522cc2830fd358bc8f890e410223906070a39cc6e2f84a8622c5f86cad52bba1560397737a6cce189d7db27e", 0x39}], 0x1}}, {{0x0, 0x0, &(0x7f0000000440)=[{&(0x7f0000000200)="9544939c01e602e8fc696947591d4c6fb3cb9a7cf9e53555dac91c09bbd33a6e85981e045d", 0x25}, {&(0x7f0000000240)="b995a5bf327c6f291a70af1527c6eb87af6b40c22e784c7d81102b1d2c4f5434d0142b1efa49361c7fa370cde02cbad1cdf556d5ebe84042e5b1eee75566d3c3bd4e54fb80c6258eb985131872c446ae99febe93703f66f4e0e10392c8a0d30f35710c7490190fef84833442ab74de59e4c9ebbc7cfe3f26750c16970d537ab353640e9e46e706cd200383135bfbf29b19c2fe729da592a9fb74eca37cb46775eb6db0118a3c59ac107fcf691822488d67f90e891045cb2ea35a79b6cd27c9fa5f37c9f6d6e4e2ca9267b2a8aa34f9727b0f539f", 0xd4}, {&(0x7f0000000340)="529cd4456bccdb80c030fe01e5cd61704126c8d4e7ec", 0x16}, {&(0x7f0000000380)="c2597979197f75ed6b82c8bcbf2c6b92a9a53fdd74646d60f994", 0x1a}], 0x4}}], 0x2, 0x4c004) sendmmsg(r0, &(0x7f0000007fc0), 0x800001d, 0x0) 06:08:48 executing program 2: r0 = syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x5, 0x0) splice(r0, 0x0, 0xffffffffffffffff, 0x0, 0x1000000008, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = syz_open_dev$video(0x0, 0x0, 0x0) splice(r2, 0x0, r1, 0x0, 0x1000000008, 0x0) 06:08:48 executing program 3: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setrlimit(0x7, &(0x7f0000000040)) bpf$MAP_CREATE(0x0, &(0x7f0000000500)={0x7, 0x4, 0x8, 0xf1a}, 0x2c) 06:08:49 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) bind$alg(0xffffffffffffffff, &(0x7f0000000100)={0x26, 'hash\x00', 0x0, 0x0, 'crct10dif-generic\x00'}, 0x58) r4 = accept$alg(0xffffffffffffffff, 0x0, 0x0) r5 = accept4(r4, 0x0, 0x0, 0x0) splice(r0, 0x0, r5, 0x0, 0x30007, 0x0) 06:08:49 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet_udp_int(r0, 0x11, 0x67, &(0x7f0000000140)=0x6, 0x4) sendmmsg(r0, &(0x7f0000006f00)=[{{&(0x7f0000000040)=@in={0x2, 0x4e23, @remote}, 0x80, &(0x7f0000000100)=[{&(0x7f00000000c0)="e04013b497936ecafdd12c496f522cc2830fd358bc8f890e410223906070a39cc6e2f84a8622c5f86cad52bba1560397737a6cce189d7db27e", 0x39}], 0x1}}, {{0x0, 0x0, &(0x7f0000000440)=[{&(0x7f0000000200)="9544939c01e602e8fc696947591d4c6fb3cb9a7cf9e53555dac91c09bbd33a6e85981e045d", 0x25}, {&(0x7f0000000240)="b995a5bf327c6f291a70af1527c6eb87af6b40c22e784c7d81102b1d2c4f5434d0142b1efa49361c7fa370cde02cbad1cdf556d5ebe84042e5b1eee75566d3c3bd4e54fb80c6258eb985131872c446ae99febe93703f66f4e0e10392c8a0d30f35710c7490190fef84833442ab74de59e4c9ebbc7cfe3f26750c16970d537ab353640e9e46e706cd200383135bfbf29b19c2fe729da592a9fb74eca37cb46775eb6db0118a3c59ac107fcf691822488d67f90e891045cb2ea35a79b6cd27c9fa5f37c9f6d6e4e2ca9267b2a8aa34f9727b0f539f", 0xd4}, {&(0x7f0000000340)="529cd4456bccdb80c030fe01e5cd61704126c8d4e7ec", 0x16}, {&(0x7f0000000380)="c2597979197f75ed6b82c8bcbf2c6b92a9a53fdd74646d60f994", 0x1a}], 0x4}}], 0x2, 0x4c004) sendmmsg(r0, &(0x7f0000007fc0), 0x800001d, 0x0) 06:08:49 executing program 2: r0 = syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x5, 0x0) splice(r0, 0x0, 0xffffffffffffffff, 0x0, 0x1000000008, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = syz_open_dev$video(0x0, 0x0, 0x0) splice(r2, 0x0, r1, 0x0, 0x1000000008, 0x0) 06:08:49 executing program 0: r0 = perf_event_open(&(0x7f0000000640)={0x3, 0x70, 0x3e7, 0x0, 0x4, 0x0, 0x0, 0x0, 0x91dd7106ca8fd33b, 0xdb3fedb3c3734f95, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x40000000000, 0x0, 0x1, 0x0, @perf_config_ext={0x18, 0x3}, 0x21, 0x10000000000000, 0x0, 0x0, 0x0, 0x20000007, 0x2}, 0x0, 0xc, 0xffffffffffffffff, 0xa) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='cpuacct.stat\x00', 0x0, 0x0) r2 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r2, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f00000003c0)='syz1\x00', 0x200002, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0xfffffffffffffffc) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000300)='./cgroup/syz0\x00', 0x200002, 0x0) gettid() socket$kcm(0x11, 0xb, 0x0) ioctl$TUNSETTXFILTER(r1, 0x400454d1, &(0x7f00000000c0)=ANY=[@ANYBLOB="00000700000000da6500bbc4bbbbbbbb0180c2000016000000004dc23f0c000000000000bb"]) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000040)=@ipx={0x4, 0x1, 0x0, "2bfaec665b4b", 0xff}, 0x80, 0x0}, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={0xffffffffffffffff, 0x1, 0x49c42ca22ab5a9ac, 0x4, 0x0}, 0x20) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x908b7aabaa7d2404) socket$kcm(0xa, 0x6, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x4000011) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000000c0), 0x0}, 0x28) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x89f1, &(0x7f0000000000)='ip6gre0\x00') perf_event_open(&(0x7f00000004c0)={0x0, 0x70, 0x8, 0x6, 0x0, 0x3, 0x0, 0x3, 0x4, 0x0, 0x9, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x1000, 0x0, @perf_config_ext={0x1ff}, 0x40004, 0xfffffffffffffffd, 0x0, 0x8, 0x8, 0x4, 0x80}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0x10, 0x0, 0x10) sendmsg$kcm(r4, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d200040080000048000001000080000000000300f88000f01700d4bd", 0x2e}], 0xf}, 0x40094) r5 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r6 = socket$kcm(0x2, 0x1, 0x2) socketpair(0x25, 0x6, 0x4, &(0x7f0000000480)) setsockopt$sock_attach_bpf(r6, 0x1, 0x3e, &(0x7f00000002c0)=r5, 0x4) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x6d, &(0x7f0000000cc0)=ANY=[@ANYRESHEX, @ANYBLOB="e99f619c950ec8069b69ac05520100000000000000572e83f4fd34a6db69715afdc8ec492fa879a8460bf2c7459f384ec36d6f0d833fccc87dc8f542ca0731ec72c3f6e0857c63572db61a83246496a2f90400569c8af42a5b8b1e3583115dfe3a40a792ffe638fd722afd02131c170175f382a8d78b6626d1d58220f08d98570bad00042a01c00748cf37385e7d66e6c0efddeb730ebd2f1ab4e816cf7493cf236ca5eb6e5d2a65519a7acf475dbd9fb52eb50ddcf9cee74529f59a2d6cfe6c23f6a688719f922099394146621132f866439970571e206ac47123f2d9cdb5cb7c8506122300000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000)={0x0, 0x8}, 0x10}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r7, 0x18000000000002a0, 0x42, 0x0, &(0x7f0000000800)="b9ff0300600d698cb89e14f088a81fffffff00004000630677fbac14140ee934a0a662079f4b4d2f87e5feca6aab845013f2325f1a39010108038da1924425181aa5", 0x0, 0x28000, 0x60000000, 0x113, 0x0, &(0x7f00000006c0)="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"}, 0x40) r8 = bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x17, 0x6, &(0x7f0000000c00)=ANY=[], &(0x7f00000002c0)='GPL\x00', 0x2, 0x0, 0x0, 0x40f00, 0x8, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000340)={0x1, 0x10000003}, 0x8, 0x10, &(0x7f0000000380)={0x0, 0xa, 0x83, 0x2}, 0x10}, 0x78) ioctl$sock_kcm_SIOCKCMATTACH(r4, 0x89e0, &(0x7f0000000500)={0xffffffffffffffff, r8}) 06:08:49 executing program 3: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x80801, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @ipv4}, 0x1c) getsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x3d, &(0x7f0000000300)={@dev}, &(0x7f00000004c0)=0x20) 06:08:49 executing program 4: unshare(0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000000c0)=0xe) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r1, 0x40047438, &(0x7f0000000180)=""/246) ioctl$PPPIOCSFLAGS1(r1, 0x40047457, &(0x7f0000000000)) 06:08:49 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet_udp_int(r0, 0x11, 0x67, &(0x7f0000000140)=0x6, 0x4) sendmmsg(r0, &(0x7f0000006f00)=[{{&(0x7f0000000040)=@in={0x2, 0x4e23, @remote}, 0x80, &(0x7f0000000100)=[{&(0x7f00000000c0)="e04013b497936ecafdd12c496f522cc2830fd358bc8f890e410223906070a39cc6e2f84a8622c5f86cad52bba1560397737a6cce189d7db27e", 0x39}], 0x1}}, {{0x0, 0x0, &(0x7f0000000440)=[{&(0x7f0000000200)="9544939c01e602e8fc696947591d4c6fb3cb9a7cf9e53555dac91c09bbd33a6e85981e045d", 0x25}, {&(0x7f0000000240)="b995a5bf327c6f291a70af1527c6eb87af6b40c22e784c7d81102b1d2c4f5434d0142b1efa49361c7fa370cde02cbad1cdf556d5ebe84042e5b1eee75566d3c3bd4e54fb80c6258eb985131872c446ae99febe93703f66f4e0e10392c8a0d30f35710c7490190fef84833442ab74de59e4c9ebbc7cfe3f26750c16970d537ab353640e9e46e706cd200383135bfbf29b19c2fe729da592a9fb74eca37cb46775eb6db0118a3c59ac107fcf691822488d67f90e891045cb2ea35a79b6cd27c9fa5f37c9f6d6e4e2ca9267b2a8aa34f9727b0f539f", 0xd4}, {&(0x7f0000000340)="529cd4456bccdb80c030fe01e5cd61704126c8d4e7ec", 0x16}, {&(0x7f0000000380)="c2597979197f75ed6b82c8bcbf2c6b92a9a53fdd74646d60f994", 0x1a}], 0x4}}], 0x2, 0x4c004) sendmmsg(r0, &(0x7f0000007fc0), 0x800001d, 0x0) 06:08:49 executing program 2: pipe(0x0) r0 = syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x5, 0x0) splice(r0, 0x0, 0xffffffffffffffff, 0x0, 0x1000000008, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = syz_open_dev$video(0x0, 0x0, 0x0) splice(r2, 0x0, r1, 0x0, 0x1000000008, 0x0) 06:08:49 executing program 3: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x80801, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @ipv4}, 0x1c) getsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x3d, &(0x7f0000000300)={@dev}, &(0x7f00000004c0)=0x20) 06:08:49 executing program 0: r0 = perf_event_open(&(0x7f0000000640)={0x3, 0x70, 0x3e7, 0x0, 0x4, 0x0, 0x0, 0x0, 0x91dd7106ca8fd33b, 0xdb3fedb3c3734f95, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x40000000000, 0x0, 0x1, 0x0, @perf_config_ext={0x18, 0x3}, 0x21, 0x10000000000000, 0x0, 0x0, 0x0, 0x20000007, 0x2}, 0x0, 0xc, 0xffffffffffffffff, 0xa) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='cpuacct.stat\x00', 0x0, 0x0) r2 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r2, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f00000003c0)='syz1\x00', 0x200002, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0xfffffffffffffffc) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000300)='./cgroup/syz0\x00', 0x200002, 0x0) gettid() socket$kcm(0x11, 0xb, 0x0) ioctl$TUNSETTXFILTER(r1, 0x400454d1, &(0x7f00000000c0)=ANY=[@ANYBLOB="00000700000000da6500bbc4bbbbbbbb0180c2000016000000004dc23f0c000000000000bb"]) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000040)=@ipx={0x4, 0x1, 0x0, "2bfaec665b4b", 0xff}, 0x80, 0x0}, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={0xffffffffffffffff, 0x1, 0x49c42ca22ab5a9ac, 0x4, 0x0}, 0x20) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x908b7aabaa7d2404) socket$kcm(0xa, 0x6, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x4000011) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000000c0), 0x0}, 0x28) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x89f1, &(0x7f0000000000)='ip6gre0\x00') perf_event_open(&(0x7f00000004c0)={0x0, 0x70, 0x8, 0x6, 0x0, 0x3, 0x0, 0x3, 0x4, 0x0, 0x9, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x1000, 0x0, @perf_config_ext={0x1ff}, 0x40004, 0xfffffffffffffffd, 0x0, 0x8, 0x8, 0x4, 0x80}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0x10, 0x0, 0x10) sendmsg$kcm(r4, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d200040080000048000001000080000000000300f88000f01700d4bd", 0x2e}], 0xf}, 0x40094) r5 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r6 = socket$kcm(0x2, 0x1, 0x2) socketpair(0x25, 0x6, 0x4, &(0x7f0000000480)) setsockopt$sock_attach_bpf(r6, 0x1, 0x3e, &(0x7f00000002c0)=r5, 0x4) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x6d, &(0x7f0000000cc0)=ANY=[@ANYRESHEX, @ANYBLOB="e99f619c950ec8069b69ac05520100000000000000572e83f4fd34a6db69715afdc8ec492fa879a8460bf2c7459f384ec36d6f0d833fccc87dc8f542ca0731ec72c3f6e0857c63572db61a83246496a2f90400569c8af42a5b8b1e3583115dfe3a40a792ffe638fd722afd02131c170175f382a8d78b6626d1d58220f08d98570bad00042a01c00748cf37385e7d66e6c0efddeb730ebd2f1ab4e816cf7493cf236ca5eb6e5d2a65519a7acf475dbd9fb52eb50ddcf9cee74529f59a2d6cfe6c23f6a688719f922099394146621132f866439970571e206ac47123f2d9cdb5cb7c8506122300000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000)={0x0, 0x8}, 0x10}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r7, 0x18000000000002a0, 0x42, 0x0, &(0x7f0000000800)="b9ff0300600d698cb89e14f088a81fffffff00004000630677fbac14140ee934a0a662079f4b4d2f87e5feca6aab845013f2325f1a39010108038da1924425181aa5", 0x0, 0x28000, 0x60000000, 0x113, 0x0, &(0x7f00000006c0)="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"}, 0x40) r8 = bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x17, 0x6, &(0x7f0000000c00)=ANY=[], &(0x7f00000002c0)='GPL\x00', 0x2, 0x0, 0x0, 0x40f00, 0x8, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000340)={0x1, 0x10000003}, 0x8, 0x10, &(0x7f0000000380)={0x0, 0xa, 0x83, 0x2}, 0x10}, 0x78) ioctl$sock_kcm_SIOCKCMATTACH(r4, 0x89e0, &(0x7f0000000500)={0xffffffffffffffff, r8}) 06:08:49 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet_udp_int(r0, 0x11, 0x67, &(0x7f0000000140)=0x6, 0x4) sendmmsg(r0, &(0x7f0000006f00)=[{{&(0x7f0000000040)=@in={0x2, 0x4e23, @remote}, 0x80, &(0x7f0000000100)=[{&(0x7f00000000c0)="e04013b497936ecafdd12c496f522cc2830fd358bc8f890e410223906070a39cc6e2f84a8622c5f86cad52bba1560397737a6cce189d7db27e", 0x39}], 0x1}}, {{0x0, 0x0, &(0x7f0000000440)=[{&(0x7f0000000200)="9544939c01e602e8fc696947591d4c6fb3cb9a7cf9e53555dac91c09bbd33a6e85981e045d", 0x25}, {&(0x7f0000000240)="b995a5bf327c6f291a70af1527c6eb87af6b40c22e784c7d81102b1d2c4f5434d0142b1efa49361c7fa370cde02cbad1cdf556d5ebe84042e5b1eee75566d3c3bd4e54fb80c6258eb985131872c446ae99febe93703f66f4e0e10392c8a0d30f35710c7490190fef84833442ab74de59e4c9ebbc7cfe3f26750c16970d537ab353640e9e46e706cd200383135bfbf29b19c2fe729da592a9fb74eca37cb46775eb6db0118a3c59ac107fcf691822488d67f90e891045cb2ea35a79b6cd27c9fa5f37c9f6d6e4e2ca9267b2a8aa34f9727b0f539f", 0xd4}, {&(0x7f0000000340)="529cd4456bccdb80c030fe01e5cd61704126c8d4e7ec", 0x16}, {&(0x7f0000000380)="c2597979197f75ed6b82c8bcbf2c6b92a9a53fdd74646d60f9941ca2", 0x1c}], 0x4}}], 0x2, 0x4c004) sendmmsg(r0, &(0x7f0000007fc0), 0x800001d, 0x0) 06:08:49 executing program 2: pipe(0x0) r0 = syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x5, 0x0) splice(r0, 0x0, 0xffffffffffffffff, 0x0, 0x1000000008, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = syz_open_dev$video(0x0, 0x0, 0x0) splice(r2, 0x0, r1, 0x0, 0x1000000008, 0x0) 06:08:50 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000100)={0x26, 'hash\x00', 0x0, 0x0, 'crct10dif-generic\x00'}, 0x58) r4 = accept$alg(r3, 0x0, 0x0) r5 = accept4(r4, 0x0, 0x0, 0x0) splice(r0, 0x0, r5, 0x0, 0x30007, 0x0) 06:08:50 executing program 3: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x80801, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @ipv4}, 0x1c) getsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x3d, &(0x7f0000000300)={@dev}, &(0x7f00000004c0)=0x20) 06:08:50 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet_udp_int(r0, 0x11, 0x67, &(0x7f0000000140)=0x6, 0x4) sendmmsg(r0, &(0x7f0000006f00)=[{{&(0x7f0000000040)=@in={0x2, 0x4e23, @remote}, 0x80, &(0x7f0000000100)=[{&(0x7f00000000c0)="e04013b497936ecafdd12c496f522cc2830fd358bc8f890e410223906070a39cc6e2f84a8622c5f86cad52bba1560397737a6cce189d7db27e", 0x39}], 0x1}}, {{0x0, 0x0, &(0x7f0000000440)=[{&(0x7f0000000200)="9544939c01e602e8fc696947591d4c6fb3cb9a7cf9e53555dac91c09bbd33a6e85981e045d", 0x25}, {&(0x7f0000000240)="b995a5bf327c6f291a70af1527c6eb87af6b40c22e784c7d81102b1d2c4f5434d0142b1efa49361c7fa370cde02cbad1cdf556d5ebe84042e5b1eee75566d3c3bd4e54fb80c6258eb985131872c446ae99febe93703f66f4e0e10392c8a0d30f35710c7490190fef84833442ab74de59e4c9ebbc7cfe3f26750c16970d537ab353640e9e46e706cd200383135bfbf29b19c2fe729da592a9fb74eca37cb46775eb6db0118a3c59ac107fcf691822488d67f90e891045cb2ea35a79b6cd27c9fa5f37c9f6d6e4e2ca9267b2a8aa34f9727b0f539f", 0xd4}, {&(0x7f0000000340)="529cd4456bccdb80c030fe01e5cd61704126c8d4e7ec", 0x16}, {&(0x7f0000000380)="c2597979197f75ed6b82c8bcbf2c6b92a9a53fdd74646d60f9941ca2", 0x1c}], 0x4}}], 0x2, 0x4c004) sendmmsg(r0, &(0x7f0000007fc0), 0x800001d, 0x0) 06:08:50 executing program 2: pipe(0x0) r0 = syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x5, 0x0) splice(r0, 0x0, 0xffffffffffffffff, 0x0, 0x1000000008, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = syz_open_dev$video(0x0, 0x0, 0x0) splice(r2, 0x0, r1, 0x0, 0x1000000008, 0x0) 06:08:50 executing program 0: r0 = perf_event_open(&(0x7f0000000640)={0x3, 0x70, 0x3e7, 0x0, 0x4, 0x0, 0x0, 0x0, 0x91dd7106ca8fd33b, 0xdb3fedb3c3734f95, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x40000000000, 0x0, 0x1, 0x0, @perf_config_ext={0x18, 0x3}, 0x21, 0x10000000000000, 0x0, 0x0, 0x0, 0x20000007, 0x2}, 0x0, 0xc, 0xffffffffffffffff, 0xa) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='cpuacct.stat\x00', 0x0, 0x0) r2 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r2, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f00000003c0)='syz1\x00', 0x200002, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0xfffffffffffffffc) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000300)='./cgroup/syz0\x00', 0x200002, 0x0) gettid() socket$kcm(0x11, 0xb, 0x0) ioctl$TUNSETTXFILTER(r1, 0x400454d1, &(0x7f00000000c0)=ANY=[@ANYBLOB="00000700000000da6500bbc4bbbbbbbb0180c2000016000000004dc23f0c000000000000bb"]) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={0xffffffffffffffff, 0x1, 0x49c42ca22ab5a9ac, 0x4, 0x0}, 0x20) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x908b7aabaa7d2404) socket$kcm(0xa, 0x6, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x4000011) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000000c0), 0x0}, 0x28) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x89f1, &(0x7f0000000000)='ip6gre0\x00') perf_event_open(&(0x7f00000004c0)={0x0, 0x70, 0x8, 0x6, 0x0, 0x3, 0x0, 0x3, 0x4, 0x0, 0x9, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x1000, 0x0, @perf_config_ext={0x1ff}, 0x40004, 0xfffffffffffffffd, 0x0, 0x8, 0x8, 0x4, 0x80}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0x10, 0x0, 0x10) sendmsg$kcm(r4, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d200040080000048000001000080000000000300f88000f01700d4bd", 0x2e}], 0xf}, 0x40094) r5 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r6 = socket$kcm(0x2, 0x1, 0x2) socketpair(0x25, 0x6, 0x4, &(0x7f0000000480)) setsockopt$sock_attach_bpf(r6, 0x1, 0x3e, &(0x7f00000002c0)=r5, 0x4) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x6d, &(0x7f0000000cc0)=ANY=[@ANYRESHEX, @ANYBLOB="e99f619c950ec8069b69ac05520100000000000000572e83f4fd34a6db69715afdc8ec492fa879a8460bf2c7459f384ec36d6f0d833fccc87dc8f542ca0731ec72c3f6e0857c63572db61a83246496a2f90400569c8af42a5b8b1e3583115dfe3a40a792ffe638fd722afd02131c170175f382a8d78b6626d1d58220f08d98570bad00042a01c00748cf37385e7d66e6c0efddeb730ebd2f1ab4e816cf7493cf236ca5eb6e5d2a65519a7acf475dbd9fb52eb50ddcf9cee74529f59a2d6cfe6c23f6a688719f922099394146621132f866439970571e206ac47123f2d9cdb5cb7c8506122300000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000)={0x0, 0x8}, 0x10}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r7, 0x18000000000002a0, 0x42, 0x0, &(0x7f0000000800)="b9ff0300600d698cb89e14f088a81fffffff00004000630677fbac14140ee934a0a662079f4b4d2f87e5feca6aab845013f2325f1a39010108038da1924425181aa5", 0x0, 0x28000, 0x60000000, 0x113, 0x0, &(0x7f00000006c0)="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"}, 0x40) r8 = bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x17, 0x6, &(0x7f0000000c00)=ANY=[], &(0x7f00000002c0)='GPL\x00', 0x2, 0x0, 0x0, 0x40f00, 0x8, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000340)={0x1, 0x10000003}, 0x8, 0x10, &(0x7f0000000380)={0x0, 0xa, 0x83, 0x2}, 0x10}, 0x78) ioctl$sock_kcm_SIOCKCMATTACH(r4, 0x89e0, &(0x7f0000000500)={0xffffffffffffffff, r8}) 06:08:50 executing program 4: unshare(0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000000c0)=0xe) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r1, 0x40047438, &(0x7f0000000180)=""/246) ioctl$PPPIOCSFLAGS1(r1, 0x40047457, &(0x7f0000000000)) 06:08:50 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet_udp_int(r0, 0x11, 0x67, &(0x7f0000000140)=0x6, 0x4) sendmmsg(r0, &(0x7f0000006f00)=[{{&(0x7f0000000040)=@in={0x2, 0x4e23, @remote}, 0x80, &(0x7f0000000100)=[{&(0x7f00000000c0)="e04013b497936ecafdd12c496f522cc2830fd358bc8f890e410223906070a39cc6e2f84a8622c5f86cad52bba1560397737a6cce189d7db27e", 0x39}], 0x1}}, {{0x0, 0x0, &(0x7f0000000440)=[{&(0x7f0000000200)="9544939c01e602e8fc696947591d4c6fb3cb9a7cf9e53555dac91c09bbd33a6e85981e045d", 0x25}, {&(0x7f0000000240)="b995a5bf327c6f291a70af1527c6eb87af6b40c22e784c7d81102b1d2c4f5434d0142b1efa49361c7fa370cde02cbad1cdf556d5ebe84042e5b1eee75566d3c3bd4e54fb80c6258eb985131872c446ae99febe93703f66f4e0e10392c8a0d30f35710c7490190fef84833442ab74de59e4c9ebbc7cfe3f26750c16970d537ab353640e9e46e706cd200383135bfbf29b19c2fe729da592a9fb74eca37cb46775eb6db0118a3c59ac107fcf691822488d67f90e891045cb2ea35a79b6cd27c9fa5f37c9f6d6e4e2ca9267b2a8aa34f9727b0f539f", 0xd4}, {&(0x7f0000000340)="529cd4456bccdb80c030fe01e5cd61704126c8d4e7ec", 0x16}, {&(0x7f0000000380)="c2597979197f75ed6b82c8bcbf2c6b92a9a53fdd74646d60f9941ca2", 0x1c}], 0x4}}], 0x2, 0x4c004) sendmmsg(r0, &(0x7f0000007fc0), 0x800001d, 0x0) 06:08:50 executing program 2: pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = syz_open_dev$video(0x0, 0x5, 0x0) splice(r1, 0x0, r0, 0x0, 0x1000000008, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = syz_open_dev$video(0x0, 0x0, 0x0) splice(r3, 0x0, r2, 0x0, 0x1000000008, 0x0) 06:08:50 executing program 3: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x80801, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @ipv4}, 0x1c) getsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x3d, &(0x7f0000000300)={@dev}, &(0x7f00000004c0)=0x20) 06:08:50 executing program 0: r0 = perf_event_open(&(0x7f0000000640)={0x3, 0x70, 0x3e7, 0x0, 0x4, 0x0, 0x0, 0x0, 0x91dd7106ca8fd33b, 0xdb3fedb3c3734f95, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x40000000000, 0x0, 0x1, 0x0, @perf_config_ext={0x18, 0x3}, 0x21, 0x10000000000000, 0x0, 0x0, 0x0, 0x20000007, 0x2}, 0x0, 0xc, 0xffffffffffffffff, 0xa) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='cpuacct.stat\x00', 0x0, 0x0) r2 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r2, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f00000003c0)='syz1\x00', 0x200002, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0xfffffffffffffffc) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000300)='./cgroup/syz0\x00', 0x200002, 0x0) gettid() socket$kcm(0x11, 0xb, 0x0) ioctl$TUNSETTXFILTER(r1, 0x400454d1, &(0x7f00000000c0)=ANY=[@ANYBLOB="00000700000000da6500bbc4bbbbbbbb0180c2000016000000004dc23f0c000000000000bb"]) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={0xffffffffffffffff, 0x1, 0x49c42ca22ab5a9ac, 0x4, 0x0}, 0x20) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x908b7aabaa7d2404) socket$kcm(0xa, 0x6, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x4000011) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000000c0), 0x0}, 0x28) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x89f1, &(0x7f0000000000)='ip6gre0\x00') perf_event_open(&(0x7f00000004c0)={0x0, 0x70, 0x8, 0x6, 0x0, 0x3, 0x0, 0x3, 0x4, 0x0, 0x9, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x1000, 0x0, @perf_config_ext={0x1ff}, 0x40004, 0xfffffffffffffffd, 0x0, 0x8, 0x8, 0x4, 0x80}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0x10, 0x0, 0x10) sendmsg$kcm(r4, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d200040080000048000001000080000000000300f88000f01700d4bd", 0x2e}], 0xf}, 0x40094) r5 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r6 = socket$kcm(0x2, 0x1, 0x2) socketpair(0x25, 0x6, 0x4, &(0x7f0000000480)) setsockopt$sock_attach_bpf(r6, 0x1, 0x3e, &(0x7f00000002c0)=r5, 0x4) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x6d, &(0x7f0000000cc0)=ANY=[@ANYRESHEX, @ANYBLOB="e99f619c950ec8069b69ac05520100000000000000572e83f4fd34a6db69715afdc8ec492fa879a8460bf2c7459f384ec36d6f0d833fccc87dc8f542ca0731ec72c3f6e0857c63572db61a83246496a2f90400569c8af42a5b8b1e3583115dfe3a40a792ffe638fd722afd02131c170175f382a8d78b6626d1d58220f08d98570bad00042a01c00748cf37385e7d66e6c0efddeb730ebd2f1ab4e816cf7493cf236ca5eb6e5d2a65519a7acf475dbd9fb52eb50ddcf9cee74529f59a2d6cfe6c23f6a688719f922099394146621132f866439970571e206ac47123f2d9cdb5cb7c8506122300000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000)={0x0, 0x8}, 0x10}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r7, 0x18000000000002a0, 0x42, 0x0, &(0x7f0000000800)="b9ff0300600d698cb89e14f088a81fffffff00004000630677fbac14140ee934a0a662079f4b4d2f87e5feca6aab845013f2325f1a39010108038da1924425181aa5", 0x0, 0x28000, 0x60000000, 0x113, 0x0, &(0x7f00000006c0)="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"}, 0x40) r8 = bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x17, 0x6, &(0x7f0000000c00)=ANY=[], &(0x7f00000002c0)='GPL\x00', 0x2, 0x0, 0x0, 0x40f00, 0x8, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000340)={0x1, 0x10000003}, 0x8, 0x10, &(0x7f0000000380)={0x0, 0xa, 0x83, 0x2}, 0x10}, 0x78) ioctl$sock_kcm_SIOCKCMATTACH(r4, 0x89e0, &(0x7f0000000500)={0xffffffffffffffff, r8}) 06:08:50 executing program 2: pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = syz_open_dev$video(0x0, 0x5, 0x0) splice(r1, 0x0, r0, 0x0, 0x1000000008, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = syz_open_dev$video(0x0, 0x0, 0x0) splice(r3, 0x0, r2, 0x0, 0x1000000008, 0x0) 06:08:50 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet_udp_int(r0, 0x11, 0x67, &(0x7f0000000140)=0x6, 0x4) sendmmsg(r0, &(0x7f0000006f00)=[{{&(0x7f0000000040)=@in={0x2, 0x4e23, @remote}, 0x80, &(0x7f0000000100)=[{&(0x7f00000000c0)="e04013b497936ecafdd12c496f522cc2830fd358bc8f890e410223906070a39cc6e2f84a8622c5f86cad52bba1560397737a6cce189d7db27e", 0x39}], 0x1}}, {{0x0, 0x0, &(0x7f0000000440)=[{&(0x7f0000000200)="9544939c01e602e8fc696947591d4c6fb3cb9a7cf9e53555dac91c09bbd33a6e85981e045d", 0x25}, {&(0x7f0000000240)="b995a5bf327c6f291a70af1527c6eb87af6b40c22e784c7d81102b1d2c4f5434d0142b1efa49361c7fa370cde02cbad1cdf556d5ebe84042e5b1eee75566d3c3bd4e54fb80c6258eb985131872c446ae99febe93703f66f4e0e10392c8a0d30f35710c7490190fef84833442ab74de59e4c9ebbc7cfe3f26750c16970d537ab353640e9e46e706cd200383135bfbf29b19c2fe729da592a9fb74eca37cb46775eb6db0118a3c59ac107fcf691822488d67f90e891045cb2ea35a79b6cd27c9fa5f37c9f6d6e4e2ca9267b2a8aa34f9727b0f539f", 0xd4}, {&(0x7f0000000380)="c2597979197f75ed6b82c8bcbf2c6b92a9a53fdd74646d60f9941ca27e", 0x1d}], 0x3}}], 0x2, 0x4c004) sendmmsg(r0, &(0x7f0000007fc0), 0x800001d, 0x0) 06:08:51 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000100)={0x26, 'hash\x00', 0x0, 0x0, 'crct10dif-generic\x00'}, 0x58) r4 = accept$alg(r3, 0x0, 0x0) r5 = accept4(r4, 0x0, 0x0, 0x0) splice(r0, 0x0, r5, 0x0, 0x30007, 0x0) 06:08:51 executing program 3: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x80801, 0x0) getsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x3d, &(0x7f0000000300)={@dev}, &(0x7f00000004c0)=0x20) 06:08:51 executing program 2: pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = syz_open_dev$video(0x0, 0x5, 0x0) splice(r1, 0x0, r0, 0x0, 0x1000000008, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = syz_open_dev$video(0x0, 0x0, 0x0) splice(r3, 0x0, r2, 0x0, 0x1000000008, 0x0) 06:08:51 executing program 0: r0 = perf_event_open(&(0x7f0000000640)={0x3, 0x70, 0x3e7, 0x0, 0x4, 0x0, 0x0, 0x0, 0x91dd7106ca8fd33b, 0xdb3fedb3c3734f95, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x40000000000, 0x0, 0x1, 0x0, @perf_config_ext={0x18, 0x3}, 0x21, 0x10000000000000, 0x0, 0x0, 0x0, 0x20000007, 0x2}, 0x0, 0xc, 0xffffffffffffffff, 0xa) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='cpuacct.stat\x00', 0x0, 0x0) r2 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r2, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f00000003c0)='syz1\x00', 0x200002, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0xfffffffffffffffc) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000300)='./cgroup/syz0\x00', 0x200002, 0x0) gettid() socket$kcm(0x11, 0xb, 0x0) ioctl$TUNSETTXFILTER(r1, 0x400454d1, &(0x7f00000000c0)=ANY=[@ANYBLOB="00000700000000da6500bbc4bbbbbbbb0180c2000016000000004dc23f0c000000000000bb"]) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={0xffffffffffffffff, 0x1, 0x49c42ca22ab5a9ac, 0x4, 0x0}, 0x20) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x908b7aabaa7d2404) socket$kcm(0xa, 0x6, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x4000011) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000000c0), 0x0}, 0x28) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x89f1, &(0x7f0000000000)='ip6gre0\x00') perf_event_open(&(0x7f00000004c0)={0x0, 0x70, 0x8, 0x6, 0x0, 0x3, 0x0, 0x3, 0x4, 0x0, 0x9, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x1000, 0x0, @perf_config_ext={0x1ff}, 0x40004, 0xfffffffffffffffd, 0x0, 0x8, 0x8, 0x4, 0x80}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0x10, 0x0, 0x10) sendmsg$kcm(r4, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d200040080000048000001000080000000000300f88000f01700d4bd", 0x2e}], 0xf}, 0x40094) r5 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r6 = socket$kcm(0x2, 0x1, 0x2) socketpair(0x25, 0x6, 0x4, &(0x7f0000000480)) setsockopt$sock_attach_bpf(r6, 0x1, 0x3e, &(0x7f00000002c0)=r5, 0x4) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x6d, &(0x7f0000000cc0)=ANY=[@ANYRESHEX, @ANYBLOB="e99f619c950ec8069b69ac05520100000000000000572e83f4fd34a6db69715afdc8ec492fa879a8460bf2c7459f384ec36d6f0d833fccc87dc8f542ca0731ec72c3f6e0857c63572db61a83246496a2f90400569c8af42a5b8b1e3583115dfe3a40a792ffe638fd722afd02131c170175f382a8d78b6626d1d58220f08d98570bad00042a01c00748cf37385e7d66e6c0efddeb730ebd2f1ab4e816cf7493cf236ca5eb6e5d2a65519a7acf475dbd9fb52eb50ddcf9cee74529f59a2d6cfe6c23f6a688719f922099394146621132f866439970571e206ac47123f2d9cdb5cb7c8506122300000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000)={0x0, 0x8}, 0x10}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r7, 0x18000000000002a0, 0x42, 0x0, &(0x7f0000000800)="b9ff0300600d698cb89e14f088a81fffffff00004000630677fbac14140ee934a0a662079f4b4d2f87e5feca6aab845013f2325f1a39010108038da1924425181aa5", 0x0, 0x28000, 0x60000000, 0x113, 0x0, &(0x7f00000006c0)="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"}, 0x40) r8 = bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x17, 0x6, &(0x7f0000000c00)=ANY=[], &(0x7f00000002c0)='GPL\x00', 0x2, 0x0, 0x0, 0x40f00, 0x8, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000340)={0x1, 0x10000003}, 0x8, 0x10, &(0x7f0000000380)={0x0, 0xa, 0x83, 0x2}, 0x10}, 0x78) ioctl$sock_kcm_SIOCKCMATTACH(r4, 0x89e0, &(0x7f0000000500)={0xffffffffffffffff, r8}) 06:08:51 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet_udp_int(r0, 0x11, 0x67, &(0x7f0000000140)=0x6, 0x4) sendmmsg(r0, &(0x7f0000006f00)=[{{&(0x7f0000000040)=@in={0x2, 0x4e23, @remote}, 0x80, &(0x7f0000000100)=[{&(0x7f00000000c0)="e04013b497936ecafdd12c496f522cc2830fd358bc8f890e410223906070a39cc6e2f84a8622c5f86cad52bba1560397737a6cce189d7db27e", 0x39}], 0x1}}, {{0x0, 0x0, &(0x7f0000000440)=[{&(0x7f0000000200)="9544939c01e602e8fc696947591d4c6fb3cb9a7cf9e53555dac91c09bbd33a6e85981e045d", 0x25}, {&(0x7f0000000240)="b995a5bf327c6f291a70af1527c6eb87af6b40c22e784c7d81102b1d2c4f5434d0142b1efa49361c7fa370cde02cbad1cdf556d5ebe84042e5b1eee75566d3c3bd4e54fb80c6258eb985131872c446ae99febe93703f66f4e0e10392c8a0d30f35710c7490190fef84833442ab74de59e4c9ebbc7cfe3f26750c16970d537ab353640e9e46e706cd200383135bfbf29b19c2fe729da592a9fb74eca37cb46775eb6db0118a3c59ac107fcf691822488d67f90e891045cb2ea35a79b6cd27c9fa5f37c9f6d6e4e2ca9267b2a8aa34f9727b0f539f", 0xd4}, {&(0x7f0000000380)="c2597979197f75ed6b82c8bcbf2c6b92a9a53fdd74646d60f9941ca27e", 0x1d}], 0x3}}], 0x2, 0x4c004) sendmmsg(r0, &(0x7f0000007fc0), 0x800001d, 0x0) 06:08:51 executing program 4: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000000c0)=0xe) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r1, 0x40047438, &(0x7f0000000180)=""/246) ioctl$PPPIOCSFLAGS1(r1, 0x40047457, &(0x7f0000000000)) [ 234.685973][T10272] IPVS: ftp: loaded support on port[0] = 21 06:08:51 executing program 2: pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x0, 0x0) splice(r1, 0x0, r0, 0x0, 0x1000000008, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = syz_open_dev$video(0x0, 0x0, 0x0) splice(r3, 0x0, r2, 0x0, 0x1000000008, 0x0) 06:08:51 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet_udp_int(r0, 0x11, 0x67, &(0x7f0000000140)=0x6, 0x4) sendmmsg(r0, &(0x7f0000006f00)=[{{&(0x7f0000000040)=@in={0x2, 0x4e23, @remote}, 0x80, &(0x7f0000000100)=[{&(0x7f00000000c0)="e04013b497936ecafdd12c496f522cc2830fd358bc8f890e410223906070a39cc6e2f84a8622c5f86cad52bba1560397737a6cce189d7db27e", 0x39}], 0x1}}, {{0x0, 0x0, &(0x7f0000000440)=[{&(0x7f0000000200)="9544939c01e602e8fc696947591d4c6fb3cb9a7cf9e53555dac91c09bbd33a6e85981e045d", 0x25}, {&(0x7f0000000240)="b995a5bf327c6f291a70af1527c6eb87af6b40c22e784c7d81102b1d2c4f5434d0142b1efa49361c7fa370cde02cbad1cdf556d5ebe84042e5b1eee75566d3c3bd4e54fb80c6258eb985131872c446ae99febe93703f66f4e0e10392c8a0d30f35710c7490190fef84833442ab74de59e4c9ebbc7cfe3f26750c16970d537ab353640e9e46e706cd200383135bfbf29b19c2fe729da592a9fb74eca37cb46775eb6db0118a3c59ac107fcf691822488d67f90e891045cb2ea35a79b6cd27c9fa5f37c9f6d6e4e2ca9267b2a8aa34f9727b0f539f", 0xd4}, {&(0x7f0000000380)="c2597979197f75ed6b82c8bcbf2c6b92a9a53fdd74646d60f9941ca27e", 0x1d}], 0x3}}], 0x2, 0x4c004) sendmmsg(r0, &(0x7f0000007fc0), 0x800001d, 0x0) 06:08:51 executing program 3: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x80801, 0x0) getsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x3d, &(0x7f0000000300)={@dev}, &(0x7f00000004c0)=0x20) 06:08:51 executing program 0: r0 = perf_event_open(&(0x7f0000000640)={0x3, 0x70, 0x3e7, 0x0, 0x4, 0x0, 0x0, 0x0, 0x91dd7106ca8fd33b, 0xdb3fedb3c3734f95, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x40000000000, 0x0, 0x1, 0x0, @perf_config_ext={0x18, 0x3}, 0x21, 0x10000000000000, 0x0, 0x0, 0x0, 0x20000007, 0x2}, 0x0, 0xc, 0xffffffffffffffff, 0xa) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='cpuacct.stat\x00', 0x0, 0x0) r1 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f00000003c0)='syz1\x00', 0x200002, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0xfffffffffffffffc) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000300)='./cgroup/syz0\x00', 0x200002, 0x0) gettid() socket$kcm(0x11, 0xb, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000040)=@ipx={0x4, 0x1, 0x0, "2bfaec665b4b", 0xff}, 0x80, 0x0}, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={0xffffffffffffffff, 0x1, 0x49c42ca22ab5a9ac, 0x4, 0x0}, 0x20) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x908b7aabaa7d2404) socket$kcm(0xa, 0x6, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x4000011) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000000c0), 0x0}, 0x28) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x89f1, &(0x7f0000000000)='ip6gre0\x00') perf_event_open(&(0x7f00000004c0)={0x0, 0x70, 0x8, 0x6, 0x0, 0x3, 0x0, 0x3, 0x4, 0x0, 0x9, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x1000, 0x0, @perf_config_ext={0x1ff}, 0x40004, 0xfffffffffffffffd, 0x0, 0x8, 0x8, 0x4, 0x80}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0x10, 0x0, 0x10) sendmsg$kcm(r3, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d200040080000048000001000080000000000300f88000f01700d4bd", 0x2e}], 0xf}, 0x40094) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r5 = socket$kcm(0x2, 0x1, 0x2) socketpair(0x25, 0x6, 0x4, &(0x7f0000000480)) setsockopt$sock_attach_bpf(r5, 0x1, 0x3e, &(0x7f00000002c0)=r4, 0x4) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x6d, &(0x7f0000000cc0)=ANY=[@ANYRESHEX, @ANYBLOB="e99f619c950ec8069b69ac05520100000000000000572e83f4fd34a6db69715afdc8ec492fa879a8460bf2c7459f384ec36d6f0d833fccc87dc8f542ca0731ec72c3f6e0857c63572db61a83246496a2f90400569c8af42a5b8b1e3583115dfe3a40a792ffe638fd722afd02131c170175f382a8d78b6626d1d58220f08d98570bad00042a01c00748cf37385e7d66e6c0efddeb730ebd2f1ab4e816cf7493cf236ca5eb6e5d2a65519a7acf475dbd9fb52eb50ddcf9cee74529f59a2d6cfe6c23f6a688719f922099394146621132f866439970571e206ac47123f2d9cdb5cb7c8506122300000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000)={0x0, 0x8}, 0x10}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r6, 0x18000000000002a0, 0x42, 0x0, &(0x7f0000000800)="b9ff0300600d698cb89e14f088a81fffffff00004000630677fbac14140ee934a0a662079f4b4d2f87e5feca6aab845013f2325f1a39010108038da1924425181aa5", 0x0, 0x28000, 0x60000000, 0x113, 0x0, &(0x7f00000006c0)="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"}, 0x40) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x17, 0x6, &(0x7f0000000c00)=ANY=[], &(0x7f00000002c0)='GPL\x00', 0x2, 0x0, 0x0, 0x40f00, 0x8, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000340)={0x1, 0x10000003}, 0x8, 0x10, &(0x7f0000000380)={0x0, 0xa, 0x83, 0x2}, 0x10}, 0x78) ioctl$sock_kcm_SIOCKCMATTACH(r3, 0x89e0, &(0x7f0000000500)={0xffffffffffffffff, r7}) 06:08:51 executing program 4: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000000c0)=0xe) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r1, 0x40047438, &(0x7f0000000180)=""/246) ioctl$PPPIOCSFLAGS1(r1, 0x40047457, &(0x7f0000000000)) 06:08:51 executing program 3: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x80801, 0x0) getsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x3d, &(0x7f0000000300)={@dev}, &(0x7f00000004c0)=0x20) [ 235.121042][T10315] IPVS: ftp: loaded support on port[0] = 21 06:08:52 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000100)={0x26, 'hash\x00', 0x0, 0x0, 'crct10dif-generic\x00'}, 0x58) r4 = accept$alg(r3, 0x0, 0x0) r5 = accept4(r4, 0x0, 0x0, 0x0) splice(r0, 0x0, r5, 0x0, 0x30007, 0x0) 06:08:52 executing program 2: pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x0, 0x0) splice(r1, 0x0, r0, 0x0, 0x1000000008, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = syz_open_dev$video(0x0, 0x0, 0x0) splice(r3, 0x0, r2, 0x0, 0x1000000008, 0x0) 06:08:52 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet_udp_int(r0, 0x11, 0x67, &(0x7f0000000140)=0x6, 0x4) sendmmsg(r0, &(0x7f0000006f00)=[{{&(0x7f0000000040)=@in={0x2, 0x4e23, @remote}, 0x80, &(0x7f0000000100)=[{&(0x7f00000000c0)="e04013b497936ecafdd12c496f522cc2830fd358bc8f890e410223906070a39cc6e2f84a8622c5f86cad52bba1560397737a6cce189d7db27e", 0x39}], 0x1}}, {{0x0, 0x0, &(0x7f0000000440)=[{&(0x7f0000000200)="9544939c01e602e8fc696947591d4c6fb3cb9a7cf9e53555dac91c09bbd33a6e85981e045d", 0x25}, {&(0x7f0000000240)="b995a5bf327c6f291a70af1527c6eb87af6b40c22e784c7d81102b1d2c4f5434d0142b1efa49361c7fa370cde02cbad1cdf556d5ebe84042e5b1eee75566d3c3bd4e54fb80c6258eb985131872c446ae99febe93703f66f4e0e10392c8a0d30f35710c7490190fef84833442ab74de59e4c9ebbc7cfe3f26750c16970d537ab353640e9e46e706cd200383135bfbf29b19c2fe729da592a9fb74eca37cb46775eb6db0118a3c59ac107fcf691822488d67f90e891045cb2ea35a79b6cd27c9fa5f37c9f6d6e4e2ca9267b2a8aa34f9727b0f539f", 0xd4}, {0x0}, {&(0x7f0000000380)="c2597979197f75ed6b82c8bcbf2c6b92a9a53fdd74646d60f9941ca27e", 0x1d}], 0x4}}], 0x2, 0x4c004) sendmmsg(r0, &(0x7f0000007fc0), 0x800001d, 0x0) 06:08:52 executing program 3: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x0, 0x0, @ipv4}, 0x1c) getsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x3d, &(0x7f0000000300)={@dev}, &(0x7f00000004c0)=0x20) 06:08:52 executing program 0: r0 = perf_event_open(&(0x7f0000000640)={0x3, 0x70, 0x3e7, 0x0, 0x4, 0x0, 0x0, 0x0, 0x91dd7106ca8fd33b, 0xdb3fedb3c3734f95, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x40000000000, 0x0, 0x1, 0x0, @perf_config_ext={0x18, 0x3}, 0x21, 0x10000000000000, 0x0, 0x0, 0x0, 0x20000007, 0x2}, 0x0, 0xc, 0xffffffffffffffff, 0xa) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='cpuacct.stat\x00', 0x0, 0x0) r1 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f00000003c0)='syz1\x00', 0x200002, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0xfffffffffffffffc) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000300)='./cgroup/syz0\x00', 0x200002, 0x0) gettid() socket$kcm(0x11, 0xb, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000040)=@ipx={0x4, 0x1, 0x0, "2bfaec665b4b", 0xff}, 0x80, 0x0}, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={0xffffffffffffffff, 0x1, 0x49c42ca22ab5a9ac, 0x4, 0x0}, 0x20) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x908b7aabaa7d2404) socket$kcm(0xa, 0x6, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x4000011) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000000c0), 0x0}, 0x28) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x89f1, &(0x7f0000000000)='ip6gre0\x00') perf_event_open(&(0x7f00000004c0)={0x0, 0x70, 0x8, 0x6, 0x0, 0x3, 0x0, 0x3, 0x4, 0x0, 0x9, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x1000, 0x0, @perf_config_ext={0x1ff}, 0x40004, 0xfffffffffffffffd, 0x0, 0x8, 0x8, 0x4, 0x80}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0x10, 0x0, 0x10) sendmsg$kcm(r3, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d200040080000048000001000080000000000300f88000f01700d4bd", 0x2e}], 0xf}, 0x40094) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r5 = socket$kcm(0x2, 0x1, 0x2) socketpair(0x25, 0x6, 0x4, &(0x7f0000000480)) setsockopt$sock_attach_bpf(r5, 0x1, 0x3e, &(0x7f00000002c0)=r4, 0x4) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x6d, &(0x7f0000000cc0)=ANY=[@ANYRESHEX, @ANYBLOB="e99f619c950ec8069b69ac05520100000000000000572e83f4fd34a6db69715afdc8ec492fa879a8460bf2c7459f384ec36d6f0d833fccc87dc8f542ca0731ec72c3f6e0857c63572db61a83246496a2f90400569c8af42a5b8b1e3583115dfe3a40a792ffe638fd722afd02131c170175f382a8d78b6626d1d58220f08d98570bad00042a01c00748cf37385e7d66e6c0efddeb730ebd2f1ab4e816cf7493cf236ca5eb6e5d2a65519a7acf475dbd9fb52eb50ddcf9cee74529f59a2d6cfe6c23f6a688719f922099394146621132f866439970571e206ac47123f2d9cdb5cb7c8506122300000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000)={0x0, 0x8}, 0x10}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r6, 0x18000000000002a0, 0x42, 0x0, &(0x7f0000000800)="b9ff0300600d698cb89e14f088a81fffffff00004000630677fbac14140ee934a0a662079f4b4d2f87e5feca6aab845013f2325f1a39010108038da1924425181aa5", 0x0, 0x28000, 0x60000000, 0x113, 0x0, &(0x7f00000006c0)="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"}, 0x40) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x17, 0x6, &(0x7f0000000c00)=ANY=[], &(0x7f00000002c0)='GPL\x00', 0x2, 0x0, 0x0, 0x40f00, 0x8, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000340)={0x1, 0x10000003}, 0x8, 0x10, &(0x7f0000000380)={0x0, 0xa, 0x83, 0x2}, 0x10}, 0x78) ioctl$sock_kcm_SIOCKCMATTACH(r3, 0x89e0, &(0x7f0000000500)={0xffffffffffffffff, r7}) 06:08:52 executing program 4: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000000c0)=0xe) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r1, 0x40047438, &(0x7f0000000180)=""/246) ioctl$PPPIOCSFLAGS1(r1, 0x40047457, &(0x7f0000000000)) 06:08:52 executing program 2: pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x0, 0x0) splice(r1, 0x0, r0, 0x0, 0x1000000008, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = syz_open_dev$video(0x0, 0x0, 0x0) splice(r3, 0x0, r2, 0x0, 0x1000000008, 0x0) 06:08:52 executing program 3: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x0, 0x0, @ipv4}, 0x1c) getsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x3d, &(0x7f0000000300)={@dev}, &(0x7f00000004c0)=0x20) [ 235.883371][T10356] IPVS: ftp: loaded support on port[0] = 21 [ 235.891791][ T46] tipc: TX() has been purged, node left! [ 235.907991][ T46] tipc: TX() has been purged, node left! 06:08:52 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet_udp_int(r0, 0x11, 0x67, &(0x7f0000000140)=0x6, 0x4) sendmmsg(r0, &(0x7f0000006f00)=[{{&(0x7f0000000040)=@in={0x2, 0x4e23, @remote}, 0x80, &(0x7f0000000100)=[{&(0x7f00000000c0)="e04013b497936ecafdd12c496f522cc2830fd358bc8f890e410223906070a39cc6e2f84a8622c5f86cad52bba1560397737a6cce189d7db27e", 0x39}], 0x1}}, {{0x0, 0x0, &(0x7f0000000440)=[{&(0x7f0000000200)="9544939c01e602e8fc696947591d4c6fb3cb9a7cf9e53555dac91c09bbd33a6e85981e045d", 0x25}, {&(0x7f0000000240)="b995a5bf327c6f291a70af1527c6eb87af6b40c22e784c7d81102b1d2c4f5434d0142b1efa49361c7fa370cde02cbad1cdf556d5ebe84042e5b1eee75566d3c3bd4e54fb80c6258eb985131872c446ae99febe93703f66f4e0e10392c8a0d30f35710c7490190fef84833442ab74de59e4c9ebbc7cfe3f26750c16970d537ab353640e9e46e706cd200383135bfbf29b19c2fe729da592a9fb74eca37cb46775eb6db0118a3c59ac107fcf691822488d67f90e891045cb2ea35a79b6cd27c9fa5f37c9f6d6e4e2ca9267b2a8aa34f9727b0f539f", 0xd4}, {0x0}, {&(0x7f0000000380)="c2597979197f75ed6b82c8bcbf2c6b92a9a53fdd74646d60f9941ca27e", 0x1d}], 0x4}}], 0x2, 0x4c004) sendmmsg(r0, &(0x7f0000007fc0), 0x800001d, 0x0) 06:08:52 executing program 2: pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x5, 0x0) splice(0xffffffffffffffff, 0x0, r0, 0x0, 0x1000000008, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = syz_open_dev$video(0x0, 0x0, 0x0) splice(r2, 0x0, r1, 0x0, 0x1000000008, 0x0) [ 235.947657][ T46] tipc: TX() has been purged, node left! 06:08:52 executing program 0: r0 = perf_event_open(&(0x7f0000000640)={0x3, 0x70, 0x3e7, 0x0, 0x4, 0x0, 0x0, 0x0, 0x91dd7106ca8fd33b, 0xdb3fedb3c3734f95, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x40000000000, 0x0, 0x1, 0x0, @perf_config_ext={0x18, 0x3}, 0x21, 0x10000000000000, 0x0, 0x0, 0x0, 0x20000007, 0x2}, 0x0, 0xc, 0xffffffffffffffff, 0xa) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='cpuacct.stat\x00', 0x0, 0x0) r1 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f00000003c0)='syz1\x00', 0x200002, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0xfffffffffffffffc) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000300)='./cgroup/syz0\x00', 0x200002, 0x0) gettid() socket$kcm(0x11, 0xb, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000040)=@ipx={0x4, 0x1, 0x0, "2bfaec665b4b", 0xff}, 0x80, 0x0}, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={0xffffffffffffffff, 0x1, 0x49c42ca22ab5a9ac, 0x4, 0x0}, 0x20) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x908b7aabaa7d2404) socket$kcm(0xa, 0x6, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x4000011) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000000c0), 0x0}, 0x28) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x89f1, &(0x7f0000000000)='ip6gre0\x00') perf_event_open(&(0x7f00000004c0)={0x0, 0x70, 0x8, 0x6, 0x0, 0x3, 0x0, 0x3, 0x4, 0x0, 0x9, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x1000, 0x0, @perf_config_ext={0x1ff}, 0x40004, 0xfffffffffffffffd, 0x0, 0x8, 0x8, 0x4, 0x80}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0x10, 0x0, 0x10) sendmsg$kcm(r3, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d200040080000048000001000080000000000300f88000f01700d4bd", 0x2e}], 0xf}, 0x40094) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r5 = socket$kcm(0x2, 0x1, 0x2) socketpair(0x25, 0x6, 0x4, &(0x7f0000000480)) setsockopt$sock_attach_bpf(r5, 0x1, 0x3e, &(0x7f00000002c0)=r4, 0x4) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x6d, &(0x7f0000000cc0)=ANY=[@ANYRESHEX, @ANYBLOB="e99f619c950ec8069b69ac05520100000000000000572e83f4fd34a6db69715afdc8ec492fa879a8460bf2c7459f384ec36d6f0d833fccc87dc8f542ca0731ec72c3f6e0857c63572db61a83246496a2f90400569c8af42a5b8b1e3583115dfe3a40a792ffe638fd722afd02131c170175f382a8d78b6626d1d58220f08d98570bad00042a01c00748cf37385e7d66e6c0efddeb730ebd2f1ab4e816cf7493cf236ca5eb6e5d2a65519a7acf475dbd9fb52eb50ddcf9cee74529f59a2d6cfe6c23f6a688719f922099394146621132f866439970571e206ac47123f2d9cdb5cb7c8506122300000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000)={0x0, 0x8}, 0x10}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r6, 0x18000000000002a0, 0x42, 0x0, &(0x7f0000000800)="b9ff0300600d698cb89e14f088a81fffffff00004000630677fbac14140ee934a0a662079f4b4d2f87e5feca6aab845013f2325f1a39010108038da1924425181aa5", 0x0, 0x28000, 0x60000000, 0x113, 0x0, &(0x7f00000006c0)="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"}, 0x40) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x17, 0x6, &(0x7f0000000c00)=ANY=[], &(0x7f00000002c0)='GPL\x00', 0x2, 0x0, 0x0, 0x40f00, 0x8, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000340)={0x1, 0x10000003}, 0x8, 0x10, &(0x7f0000000380)={0x0, 0xa, 0x83, 0x2}, 0x10}, 0x78) ioctl$sock_kcm_SIOCKCMATTACH(r3, 0x89e0, &(0x7f0000000500)={0xffffffffffffffff, r7}) 06:08:52 executing program 3: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x0, 0x0, @ipv4}, 0x1c) getsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x3d, &(0x7f0000000300)={@dev}, &(0x7f00000004c0)=0x20) [ 236.034138][ T46] tipc: TX() has been purged, node left! [ 236.041281][ T46] tipc: TX() has been purged, node left! [ 236.073888][ T46] tipc: TX() has been purged, node left! [ 236.104467][ T46] tipc: TX() has been purged, node left! [ 236.273486][ T46] tipc: TX() has been purged, node left! [ 236.433246][ T46] tipc: TX() has been purged, node left! [ 236.616575][ T46] tipc: TX() has been purged, node left! 06:08:53 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) dup(r2) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000100)={0x26, 'hash\x00', 0x0, 0x0, 'crct10dif-generic\x00'}, 0x58) r4 = accept$alg(r3, 0x0, 0x0) r5 = accept4(r4, 0x0, 0x0, 0x0) splice(r0, 0x0, r5, 0x0, 0x30007, 0x0) 06:08:53 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet_udp_int(r0, 0x11, 0x67, &(0x7f0000000140)=0x6, 0x4) sendmmsg(r0, &(0x7f0000006f00)=[{{&(0x7f0000000040)=@in={0x2, 0x4e23, @remote}, 0x80, &(0x7f0000000100)=[{&(0x7f00000000c0)="e04013b497936ecafdd12c496f522cc2830fd358bc8f890e410223906070a39cc6e2f84a8622c5f86cad52bba1560397737a6cce189d7db27e", 0x39}], 0x1}}, {{0x0, 0x0, &(0x7f0000000440)=[{&(0x7f0000000200)="9544939c01e602e8fc696947591d4c6fb3cb9a7cf9e53555dac91c09bbd33a6e85981e045d", 0x25}, {&(0x7f0000000240)="b995a5bf327c6f291a70af1527c6eb87af6b40c22e784c7d81102b1d2c4f5434d0142b1efa49361c7fa370cde02cbad1cdf556d5ebe84042e5b1eee75566d3c3bd4e54fb80c6258eb985131872c446ae99febe93703f66f4e0e10392c8a0d30f35710c7490190fef84833442ab74de59e4c9ebbc7cfe3f26750c16970d537ab353640e9e46e706cd200383135bfbf29b19c2fe729da592a9fb74eca37cb46775eb6db0118a3c59ac107fcf691822488d67f90e891045cb2ea35a79b6cd27c9fa5f37c9f6d6e4e2ca9267b2a8aa34f9727b0f539f", 0xd4}, {0x0}, {&(0x7f0000000380)="c2597979197f75ed6b82c8bcbf2c6b92a9a53fdd74646d60f9941ca27e", 0x1d}], 0x4}}], 0x2, 0x4c004) sendmmsg(r0, &(0x7f0000007fc0), 0x800001d, 0x0) 06:08:53 executing program 2: pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x5, 0x0) splice(0xffffffffffffffff, 0x0, r0, 0x0, 0x1000000008, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = syz_open_dev$video(0x0, 0x0, 0x0) splice(r2, 0x0, r1, 0x0, 0x1000000008, 0x0) 06:08:53 executing program 4: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x10, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000000c0)=0xe) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r1, 0x40047438, &(0x7f0000000180)=""/246) ioctl$PPPIOCSFLAGS1(r1, 0x40047457, &(0x7f0000000000)) 06:08:53 executing program 3: r0 = socket$inet6(0xa, 0x80801, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @ipv4}, 0x1c) getsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x3d, &(0x7f0000000300)={@dev}, &(0x7f00000004c0)=0x20) 06:08:53 executing program 0: r0 = perf_event_open(&(0x7f0000000640)={0x3, 0x70, 0x3e7, 0x0, 0x4, 0x0, 0x0, 0x0, 0x91dd7106ca8fd33b, 0xdb3fedb3c3734f95, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x40000000000, 0x0, 0x1, 0x0, @perf_config_ext={0x18, 0x3}, 0x21, 0x10000000000000, 0x0, 0x0, 0x0, 0x20000007, 0x2}, 0x0, 0xc, 0xffffffffffffffff, 0xa) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='cpuacct.stat\x00', 0x0, 0x0) r2 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r2, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f00000003c0)='syz1\x00', 0x200002, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0xfffffffffffffffc) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000300)='./cgroup/syz0\x00', 0x200002, 0x0) gettid() ioctl$TUNSETTXFILTER(r1, 0x400454d1, &(0x7f00000000c0)=ANY=[@ANYBLOB="00000700000000da6500bbc4bbbbbbbb0180c2000016000000004dc23f0c000000000000bb"]) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000040)=@ipx={0x4, 0x1, 0x0, "2bfaec665b4b", 0xff}, 0x80, 0x0}, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={0xffffffffffffffff, 0x1, 0x49c42ca22ab5a9ac, 0x4, 0x0}, 0x20) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x908b7aabaa7d2404) socket$kcm(0xa, 0x6, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x4000011) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000000c0), 0x0}, 0x28) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x89f1, &(0x7f0000000000)='ip6gre0\x00') perf_event_open(&(0x7f00000004c0)={0x0, 0x70, 0x8, 0x6, 0x0, 0x3, 0x0, 0x3, 0x4, 0x0, 0x9, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x1000, 0x0, @perf_config_ext={0x1ff}, 0x40004, 0xfffffffffffffffd, 0x0, 0x8, 0x8, 0x4, 0x80}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0x10, 0x0, 0x10) sendmsg$kcm(r4, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d200040080000048000001000080000000000300f88000f01700d4bd", 0x2e}], 0xf}, 0x40094) r5 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r6 = socket$kcm(0x2, 0x1, 0x2) socketpair(0x25, 0x6, 0x4, &(0x7f0000000480)) setsockopt$sock_attach_bpf(r6, 0x1, 0x3e, &(0x7f00000002c0)=r5, 0x4) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x6d, &(0x7f0000000cc0)=ANY=[@ANYRESHEX, @ANYBLOB="e99f619c950ec8069b69ac05520100000000000000572e83f4fd34a6db69715afdc8ec492fa879a8460bf2c7459f384ec36d6f0d833fccc87dc8f542ca0731ec72c3f6e0857c63572db61a83246496a2f90400569c8af42a5b8b1e3583115dfe3a40a792ffe638fd722afd02131c170175f382a8d78b6626d1d58220f08d98570bad00042a01c00748cf37385e7d66e6c0efddeb730ebd2f1ab4e816cf7493cf236ca5eb6e5d2a65519a7acf475dbd9fb52eb50ddcf9cee74529f59a2d6cfe6c23f6a688719f922099394146621132f866439970571e206ac47123f2d9cdb5cb7c8506122300000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000)={0x0, 0x8}, 0x10}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r7, 0x18000000000002a0, 0x42, 0x0, &(0x7f0000000800)="b9ff0300600d698cb89e14f088a81fffffff00004000630677fbac14140ee934a0a662079f4b4d2f87e5feca6aab845013f2325f1a39010108038da1924425181aa5", 0x0, 0x28000, 0x60000000, 0x113, 0x0, &(0x7f00000006c0)="097baacf569909ebb78a19b4d4f607feb3072ad9474026c7c148d184a2647de87a8fd14ad5d15cadabd6c7545b05000000ad90e0d4000000000f3f750d2a75f6fa77d3fa4e023987f7a54b04eb238604aa90cab7b44f95ae6ce9b5f877439af64cb6573e5bc85c5e766604ff55b7a234246bd2ee44c9e99d69190bbe089603846d17b8678d05a0bda6ae300ca8c43271b65bb62b0af61bf4da3891f5bcf900ed368b36e2db9957b0dfa5cf084db8cb2b2c54661f9eac8a58a72fc9e768405eb33bce450dd088d2e16d757eeb1239a2389330535afb4944b7b27c4b26d812ab58864f3ffa3ce8cf739275492a0c90b425a792a19b9abf846b926e9f93f4b57ab77c0db63fb7d5a1e04ef52157f14f1dedcc4437"}, 0x40) r8 = bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x17, 0x6, &(0x7f0000000c00)=ANY=[], &(0x7f00000002c0)='GPL\x00', 0x2, 0x0, 0x0, 0x40f00, 0x8, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000340)={0x1, 0x10000003}, 0x8, 0x10, &(0x7f0000000380)={0x0, 0xa, 0x83, 0x2}, 0x10}, 0x78) ioctl$sock_kcm_SIOCKCMATTACH(r4, 0x89e0, &(0x7f0000000500)={0xffffffffffffffff, r8}) 06:08:53 executing program 3: r0 = socket$inet6(0xa, 0x80801, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @ipv4}, 0x1c) getsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x3d, &(0x7f0000000300)={@dev}, &(0x7f00000004c0)=0x20) 06:08:53 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet_udp_int(r0, 0x11, 0x67, &(0x7f0000000140)=0x6, 0x4) sendmmsg(r0, &(0x7f0000006f00)=[{{&(0x7f0000000040)=@in={0x2, 0x4e23, @remote}, 0x80, &(0x7f0000000100)=[{&(0x7f00000000c0)="e04013b497936ecafdd12c496f522cc2830fd358bc8f890e410223906070a39cc6e2f84a8622c5f86cad52bba1560397737a6cce189d7db27e", 0x39}], 0x1}}, {{0x0, 0x0, &(0x7f0000000440)=[{&(0x7f0000000200)="9544939c01e602e8fc696947591d4c6fb3cb9a7cf9e53555dac91c09bbd33a6e85981e045d", 0x25}, {&(0x7f0000000240)="b995a5bf327c6f291a70af1527c6eb87af6b40c22e784c7d81102b1d2c4f5434d0142b1efa49361c7fa370cde02cbad1cdf556d5ebe84042e5b1eee75566d3c3bd4e54fb80c6258eb985131872c446ae99febe93703f66f4e0e10392c8a0d30f35710c7490190fef84833442ab74de59e4c9ebbc7cfe3f26750c16970d537ab353640e9e46e706cd200383135bfbf29b19c2fe729da592a9fb74eca37cb46775eb6db0118a3c59ac107fcf691822488d67f90e891045cb2ea35a79b6cd27c9fa5f37c9f6d6e4e2ca9267b2a8aa34f9727b0f539f", 0xd4}, {&(0x7f0000000340)}, {&(0x7f0000000380)="c2597979197f75ed6b82c8bcbf2c6b92a9a53fdd74646d60f9941ca27e", 0x1d}], 0x4}}], 0x2, 0x4c004) sendmmsg(r0, &(0x7f0000007fc0), 0x800001d, 0x0) [ 236.773101][ T46] tipc: TX() has been purged, node left! [ 236.776618][T10417] IPVS: ftp: loaded support on port[0] = 21 06:08:53 executing program 2: pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x5, 0x0) splice(0xffffffffffffffff, 0x0, r0, 0x0, 0x1000000008, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = syz_open_dev$video(0x0, 0x0, 0x0) splice(r2, 0x0, r1, 0x0, 0x1000000008, 0x0) [ 236.896855][ T46] tipc: TX() has been purged, node left! [ 236.903889][ T46] tipc: TX() has been purged, node left! 06:08:53 executing program 3: r0 = socket$inet6(0xa, 0x80801, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @ipv4}, 0x1c) getsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x3d, &(0x7f0000000300)={@dev}, &(0x7f00000004c0)=0x20) 06:08:53 executing program 0: r0 = perf_event_open(&(0x7f0000000640)={0x3, 0x70, 0x3e7, 0x0, 0x4, 0x0, 0x0, 0x0, 0x91dd7106ca8fd33b, 0xdb3fedb3c3734f95, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x40000000000, 0x0, 0x1, 0x0, @perf_config_ext={0x18, 0x3}, 0x21, 0x10000000000000, 0x0, 0x0, 0x0, 0x20000007, 0x2}, 0x0, 0xc, 0xffffffffffffffff, 0xa) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='cpuacct.stat\x00', 0x0, 0x0) r2 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r2, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f00000003c0)='syz1\x00', 0x200002, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0xfffffffffffffffc) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000300)='./cgroup/syz0\x00', 0x200002, 0x0) gettid() ioctl$TUNSETTXFILTER(r1, 0x400454d1, &(0x7f00000000c0)=ANY=[@ANYBLOB="00000700000000da6500bbc4bbbbbbbb0180c2000016000000004dc23f0c000000000000bb"]) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000040)=@ipx={0x4, 0x1, 0x0, "2bfaec665b4b", 0xff}, 0x80, 0x0}, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={0xffffffffffffffff, 0x1, 0x49c42ca22ab5a9ac, 0x4, 0x0}, 0x20) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x908b7aabaa7d2404) socket$kcm(0xa, 0x6, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x4000011) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000000c0), 0x0}, 0x28) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x89f1, &(0x7f0000000000)='ip6gre0\x00') perf_event_open(&(0x7f00000004c0)={0x0, 0x70, 0x8, 0x6, 0x0, 0x3, 0x0, 0x3, 0x4, 0x0, 0x9, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x1000, 0x0, @perf_config_ext={0x1ff}, 0x40004, 0xfffffffffffffffd, 0x0, 0x8, 0x8, 0x4, 0x80}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0x10, 0x0, 0x10) sendmsg$kcm(r4, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d200040080000048000001000080000000000300f88000f01700d4bd", 0x2e}], 0xf}, 0x40094) r5 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r6 = socket$kcm(0x2, 0x1, 0x2) socketpair(0x25, 0x6, 0x4, &(0x7f0000000480)) setsockopt$sock_attach_bpf(r6, 0x1, 0x3e, &(0x7f00000002c0)=r5, 0x4) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x6d, &(0x7f0000000cc0)=ANY=[@ANYRESHEX, @ANYBLOB="e99f619c950ec8069b69ac05520100000000000000572e83f4fd34a6db69715afdc8ec492fa879a8460bf2c7459f384ec36d6f0d833fccc87dc8f542ca0731ec72c3f6e0857c63572db61a83246496a2f90400569c8af42a5b8b1e3583115dfe3a40a792ffe638fd722afd02131c170175f382a8d78b6626d1d58220f08d98570bad00042a01c00748cf37385e7d66e6c0efddeb730ebd2f1ab4e816cf7493cf236ca5eb6e5d2a65519a7acf475dbd9fb52eb50ddcf9cee74529f59a2d6cfe6c23f6a688719f922099394146621132f866439970571e206ac47123f2d9cdb5cb7c8506122300000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000)={0x0, 0x8}, 0x10}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r7, 0x18000000000002a0, 0x42, 0x0, &(0x7f0000000800)="b9ff0300600d698cb89e14f088a81fffffff00004000630677fbac14140ee934a0a662079f4b4d2f87e5feca6aab845013f2325f1a39010108038da1924425181aa5", 0x0, 0x28000, 0x60000000, 0x113, 0x0, &(0x7f00000006c0)="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"}, 0x40) r8 = bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x17, 0x6, &(0x7f0000000c00)=ANY=[], &(0x7f00000002c0)='GPL\x00', 0x2, 0x0, 0x0, 0x40f00, 0x8, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000340)={0x1, 0x10000003}, 0x8, 0x10, &(0x7f0000000380)={0x0, 0xa, 0x83, 0x2}, 0x10}, 0x78) ioctl$sock_kcm_SIOCKCMATTACH(r4, 0x89e0, &(0x7f0000000500)={0xffffffffffffffff, r8}) [ 236.965371][ T46] tipc: TX() has been purged, node left! 06:08:53 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet_udp_int(r0, 0x11, 0x67, &(0x7f0000000140)=0x6, 0x4) sendmmsg(r0, &(0x7f0000006f00)=[{{&(0x7f0000000040)=@in={0x2, 0x4e23, @remote}, 0x80, &(0x7f0000000100)=[{&(0x7f00000000c0)="e04013b497936ecafdd12c496f522cc2830fd358bc8f890e410223906070a39cc6e2f84a8622c5f86cad52bba1560397737a6cce189d7db27e", 0x39}], 0x1}}, {{0x0, 0x0, &(0x7f0000000440)=[{&(0x7f0000000200)="9544939c01e602e8fc696947591d4c6fb3cb9a7cf9e53555dac91c09bbd33a6e85981e045d", 0x25}, {&(0x7f0000000240)="b995a5bf327c6f291a70af1527c6eb87af6b40c22e784c7d81102b1d2c4f5434d0142b1efa49361c7fa370cde02cbad1cdf556d5ebe84042e5b1eee75566d3c3bd4e54fb80c6258eb985131872c446ae99febe93703f66f4e0e10392c8a0d30f35710c7490190fef84833442ab74de59e4c9ebbc7cfe3f26750c16970d537ab353640e9e46e706cd200383135bfbf29b19c2fe729da592a9fb74eca37cb46775eb6db0118a3c59ac107fcf691822488d67f90e891045cb2ea35a79b6cd27c9fa5f37c9f6d6e4e2ca9267b2a8aa34f9727b0f539f", 0xd4}, {&(0x7f0000000340)}, {&(0x7f0000000380)="c2597979197f75ed6b82c8bcbf2c6b92a9a53fdd74646d60f9941ca27e", 0x1d}], 0x4}}], 0x2, 0x4c004) sendmmsg(r0, &(0x7f0000007fc0), 0x800001d, 0x0) [ 237.153091][ T46] tipc: TX() has been purged, node left! [ 237.303096][ T46] tipc: TX() has been purged, node left! [ 237.449902][ T46] tipc: TX() has been purged, node left! [ 237.613091][ T46] tipc: TX() has been purged, node left! 06:08:54 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) dup(r2) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000100)={0x26, 'hash\x00', 0x0, 0x0, 'crct10dif-generic\x00'}, 0x58) r4 = accept$alg(r3, 0x0, 0x0) r5 = accept4(r4, 0x0, 0x0, 0x0) splice(r0, 0x0, r5, 0x0, 0x30007, 0x0) 06:08:54 executing program 4: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x10, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000000c0)=0xe) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r1, 0x40047438, &(0x7f0000000180)=""/246) ioctl$PPPIOCSFLAGS1(r1, 0x40047457, &(0x7f0000000000)) 06:08:54 executing program 2: pipe(&(0x7f00000001c0)) r0 = syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x5, 0x0) splice(r0, 0x0, 0xffffffffffffffff, 0x0, 0x1000000008, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = syz_open_dev$video(0x0, 0x0, 0x0) splice(r2, 0x0, r1, 0x0, 0x1000000008, 0x0) 06:08:54 executing program 3: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x80801, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @ipv4}, 0x1c) getsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x3d, &(0x7f0000000300)={@dev}, &(0x7f00000004c0)=0x20) 06:08:54 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet_udp_int(r0, 0x11, 0x67, &(0x7f0000000140)=0x6, 0x4) sendmmsg(r0, &(0x7f0000006f00)=[{{&(0x7f0000000040)=@in={0x2, 0x4e23, @remote}, 0x80, &(0x7f0000000100)=[{&(0x7f00000000c0)="e04013b497936ecafdd12c496f522cc2830fd358bc8f890e410223906070a39cc6e2f84a8622c5f86cad52bba1560397737a6cce189d7db27e", 0x39}], 0x1}}, {{0x0, 0x0, &(0x7f0000000440)=[{&(0x7f0000000200)="9544939c01e602e8fc696947591d4c6fb3cb9a7cf9e53555dac91c09bbd33a6e85981e045d", 0x25}, {&(0x7f0000000240)="b995a5bf327c6f291a70af1527c6eb87af6b40c22e784c7d81102b1d2c4f5434d0142b1efa49361c7fa370cde02cbad1cdf556d5ebe84042e5b1eee75566d3c3bd4e54fb80c6258eb985131872c446ae99febe93703f66f4e0e10392c8a0d30f35710c7490190fef84833442ab74de59e4c9ebbc7cfe3f26750c16970d537ab353640e9e46e706cd200383135bfbf29b19c2fe729da592a9fb74eca37cb46775eb6db0118a3c59ac107fcf691822488d67f90e891045cb2ea35a79b6cd27c9fa5f37c9f6d6e4e2ca9267b2a8aa34f9727b0f539f", 0xd4}, {&(0x7f0000000340)}, {&(0x7f0000000380)="c2597979197f75ed6b82c8bcbf2c6b92a9a53fdd74646d60f9941ca27e", 0x1d}], 0x4}}], 0x2, 0x4c004) sendmmsg(r0, &(0x7f0000007fc0), 0x800001d, 0x0) 06:08:54 executing program 0: r0 = perf_event_open(&(0x7f0000000640)={0x3, 0x70, 0x3e7, 0x0, 0x4, 0x0, 0x0, 0x0, 0x91dd7106ca8fd33b, 0xdb3fedb3c3734f95, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x40000000000, 0x0, 0x1, 0x0, @perf_config_ext={0x18, 0x3}, 0x21, 0x10000000000000, 0x0, 0x0, 0x0, 0x20000007, 0x2}, 0x0, 0xc, 0xffffffffffffffff, 0xa) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='cpuacct.stat\x00', 0x0, 0x0) r2 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r2, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f00000003c0)='syz1\x00', 0x200002, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0xfffffffffffffffc) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000300)='./cgroup/syz0\x00', 0x200002, 0x0) gettid() ioctl$TUNSETTXFILTER(r1, 0x400454d1, &(0x7f00000000c0)=ANY=[@ANYBLOB="00000700000000da6500bbc4bbbbbbbb0180c2000016000000004dc23f0c000000000000bb"]) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000040)=@ipx={0x4, 0x1, 0x0, "2bfaec665b4b", 0xff}, 0x80, 0x0}, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={0xffffffffffffffff, 0x1, 0x49c42ca22ab5a9ac, 0x4, 0x0}, 0x20) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x908b7aabaa7d2404) socket$kcm(0xa, 0x6, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x4000011) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000000c0), 0x0}, 0x28) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x89f1, &(0x7f0000000000)='ip6gre0\x00') perf_event_open(&(0x7f00000004c0)={0x0, 0x70, 0x8, 0x6, 0x0, 0x3, 0x0, 0x3, 0x4, 0x0, 0x9, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x1000, 0x0, @perf_config_ext={0x1ff}, 0x40004, 0xfffffffffffffffd, 0x0, 0x8, 0x8, 0x4, 0x80}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0x10, 0x0, 0x10) sendmsg$kcm(r4, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d200040080000048000001000080000000000300f88000f01700d4bd", 0x2e}], 0xf}, 0x40094) r5 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r6 = socket$kcm(0x2, 0x1, 0x2) socketpair(0x25, 0x6, 0x4, &(0x7f0000000480)) setsockopt$sock_attach_bpf(r6, 0x1, 0x3e, &(0x7f00000002c0)=r5, 0x4) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x6d, &(0x7f0000000cc0)=ANY=[@ANYRESHEX, @ANYBLOB="e99f619c950ec8069b69ac05520100000000000000572e83f4fd34a6db69715afdc8ec492fa879a8460bf2c7459f384ec36d6f0d833fccc87dc8f542ca0731ec72c3f6e0857c63572db61a83246496a2f90400569c8af42a5b8b1e3583115dfe3a40a792ffe638fd722afd02131c170175f382a8d78b6626d1d58220f08d98570bad00042a01c00748cf37385e7d66e6c0efddeb730ebd2f1ab4e816cf7493cf236ca5eb6e5d2a65519a7acf475dbd9fb52eb50ddcf9cee74529f59a2d6cfe6c23f6a688719f922099394146621132f866439970571e206ac47123f2d9cdb5cb7c8506122300000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000)={0x0, 0x8}, 0x10}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r7, 0x18000000000002a0, 0x42, 0x0, &(0x7f0000000800)="b9ff0300600d698cb89e14f088a81fffffff00004000630677fbac14140ee934a0a662079f4b4d2f87e5feca6aab845013f2325f1a39010108038da1924425181aa5", 0x0, 0x28000, 0x60000000, 0x113, 0x0, &(0x7f00000006c0)="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"}, 0x40) r8 = bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x17, 0x6, &(0x7f0000000c00)=ANY=[], &(0x7f00000002c0)='GPL\x00', 0x2, 0x0, 0x0, 0x40f00, 0x8, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000340)={0x1, 0x10000003}, 0x8, 0x10, &(0x7f0000000380)={0x0, 0xa, 0x83, 0x2}, 0x10}, 0x78) ioctl$sock_kcm_SIOCKCMATTACH(r4, 0x89e0, &(0x7f0000000500)={0xffffffffffffffff, r8}) [ 237.743480][T10482] IPVS: ftp: loaded support on port[0] = 21 [ 237.783028][ T46] tipc: TX() has been purged, node left! 06:08:54 executing program 3: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x80801, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @ipv4}, 0x1c) getsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x3d, &(0x7f0000000300)={@dev}, &(0x7f00000004c0)=0x20) 06:08:54 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet_udp_int(r0, 0x11, 0x67, &(0x7f0000000140)=0x6, 0x4) sendmmsg(r0, &(0x7f0000006f00)=[{{&(0x7f0000000040)=@in={0x2, 0x4e23, @remote}, 0x80, &(0x7f0000000100)=[{&(0x7f00000000c0)="e04013b497936ecafdd12c496f522cc2830fd358bc8f890e410223906070a39cc6e2f84a8622c5f86cad52bba1560397737a6cce189d7db27e", 0x39}], 0x1}}, {{0x0, 0x0, &(0x7f0000000440)=[{&(0x7f0000000200)="9544939c01e602e8fc696947591d4c6fb3cb9a7cf9e53555dac91c09bbd33a6e85981e045d", 0x25}, {&(0x7f0000000240)="b995a5bf327c6f291a70af1527c6eb87af6b40c22e784c7d81102b1d2c4f5434d0142b1efa49361c7fa370cde02cbad1cdf556d5ebe84042e5b1eee75566d3c3bd4e54fb80c6258eb985131872c446ae99febe93703f66f4e0e10392c8a0d30f35710c7490190fef84833442ab74de59e4c9ebbc7cfe3f26750c16970d537ab353640e9e46e706cd200383135bfbf29b19c2fe729da592a9fb74eca37cb46775eb6db0118a3c59ac107fcf691822488d67f90e891045cb2ea35a79b6cd27c9fa5f37c9f6d6e4e2ca9267b2a8aa34f9727b0f539f", 0xd4}, {&(0x7f0000000340)="529cd4456bccdb80c030fe", 0xb}, {&(0x7f0000000380)="c2597979197f75ed6b82c8bcbf2c6b92a9a53fdd74646d60f9941ca27e", 0x1d}], 0x4}}], 0x2, 0x4c004) sendmmsg(r0, &(0x7f0000007fc0), 0x800001d, 0x0) [ 237.810730][ T46] tipc: TX() has been purged, node left! 06:08:54 executing program 2: pipe(&(0x7f00000001c0)) r0 = syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x5, 0x0) splice(r0, 0x0, 0xffffffffffffffff, 0x0, 0x1000000008, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = syz_open_dev$video(0x0, 0x0, 0x0) splice(r2, 0x0, r1, 0x0, 0x1000000008, 0x0) [ 237.886125][ T46] tipc: TX() has been purged, node left! [ 237.900210][ T46] tipc: TX() has been purged, node left! 06:08:54 executing program 4: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x10, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000000c0)=0xe) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r1, 0x40047438, &(0x7f0000000180)=""/246) ioctl$PPPIOCSFLAGS1(r1, 0x40047457, &(0x7f0000000000)) 06:08:54 executing program 0: r0 = perf_event_open(&(0x7f0000000640)={0x3, 0x70, 0x3e7, 0x0, 0x4, 0x0, 0x0, 0x0, 0x91dd7106ca8fd33b, 0xdb3fedb3c3734f95, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x40000000000, 0x0, 0x1, 0x0, @perf_config_ext={0x18, 0x3}, 0x21, 0x10000000000000, 0x0, 0x0, 0x0, 0x20000007, 0x2}, 0x0, 0xc, 0xffffffffffffffff, 0xa) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='cpuacct.stat\x00', 0x0, 0x0) r2 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r2, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f00000003c0)='syz1\x00', 0x200002, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0xfffffffffffffffc) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000300)='./cgroup/syz0\x00', 0x200002, 0x0) socket$kcm(0x11, 0xb, 0x0) ioctl$TUNSETTXFILTER(r1, 0x400454d1, &(0x7f00000000c0)=ANY=[@ANYBLOB="00000700000000da6500bbc4bbbbbbbb0180c2000016000000004dc23f0c000000000000bb"]) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000040)=@ipx={0x4, 0x1, 0x0, "2bfaec665b4b", 0xff}, 0x80, 0x0}, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={0xffffffffffffffff, 0x1, 0x49c42ca22ab5a9ac, 0x4, 0x0}, 0x20) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x908b7aabaa7d2404) socket$kcm(0xa, 0x6, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x4000011) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000000c0), 0x0}, 0x28) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x89f1, &(0x7f0000000000)='ip6gre0\x00') perf_event_open(&(0x7f00000004c0)={0x0, 0x70, 0x8, 0x6, 0x0, 0x3, 0x0, 0x3, 0x4, 0x0, 0x9, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x1000, 0x0, @perf_config_ext={0x1ff}, 0x40004, 0xfffffffffffffffd, 0x0, 0x8, 0x8, 0x4, 0x80}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0x10, 0x0, 0x10) sendmsg$kcm(r4, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d200040080000048000001000080000000000300f88000f01700d4bd", 0x2e}], 0xf}, 0x40094) r5 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r6 = socket$kcm(0x2, 0x1, 0x2) socketpair(0x25, 0x6, 0x4, &(0x7f0000000480)) setsockopt$sock_attach_bpf(r6, 0x1, 0x3e, &(0x7f00000002c0)=r5, 0x4) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x6d, &(0x7f0000000cc0)=ANY=[@ANYRESHEX, @ANYBLOB="e99f619c950ec8069b69ac05520100000000000000572e83f4fd34a6db69715afdc8ec492fa879a8460bf2c7459f384ec36d6f0d833fccc87dc8f542ca0731ec72c3f6e0857c63572db61a83246496a2f90400569c8af42a5b8b1e3583115dfe3a40a792ffe638fd722afd02131c170175f382a8d78b6626d1d58220f08d98570bad00042a01c00748cf37385e7d66e6c0efddeb730ebd2f1ab4e816cf7493cf236ca5eb6e5d2a65519a7acf475dbd9fb52eb50ddcf9cee74529f59a2d6cfe6c23f6a688719f922099394146621132f866439970571e206ac47123f2d9cdb5cb7c8506122300000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000)={0x0, 0x8}, 0x10}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r7, 0x18000000000002a0, 0x42, 0x0, &(0x7f0000000800)="b9ff0300600d698cb89e14f088a81fffffff00004000630677fbac14140ee934a0a662079f4b4d2f87e5feca6aab845013f2325f1a39010108038da1924425181aa5", 0x0, 0x28000, 0x60000000, 0x113, 0x0, &(0x7f00000006c0)="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"}, 0x40) r8 = bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x17, 0x6, &(0x7f0000000c00)=ANY=[], &(0x7f00000002c0)='GPL\x00', 0x2, 0x0, 0x0, 0x40f00, 0x8, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000340)={0x1, 0x10000003}, 0x8, 0x10, &(0x7f0000000380)={0x0, 0xa, 0x83, 0x2}, 0x10}, 0x78) ioctl$sock_kcm_SIOCKCMATTACH(r4, 0x89e0, &(0x7f0000000500)={0xffffffffffffffff, r8}) 06:08:54 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet_udp_int(r0, 0x11, 0x67, &(0x7f0000000140)=0x6, 0x4) sendmmsg(r0, &(0x7f0000006f00)=[{{&(0x7f0000000040)=@in={0x2, 0x4e23, @remote}, 0x80, &(0x7f0000000100)=[{&(0x7f00000000c0)="e04013b497936ecafdd12c496f522cc2830fd358bc8f890e410223906070a39cc6e2f84a8622c5f86cad52bba1560397737a6cce189d7db27e", 0x39}], 0x1}}, {{0x0, 0x0, &(0x7f0000000440)=[{&(0x7f0000000200)="9544939c01e602e8fc696947591d4c6fb3cb9a7cf9e53555dac91c09bbd33a6e85981e045d", 0x25}, {&(0x7f0000000240)="b995a5bf327c6f291a70af1527c6eb87af6b40c22e784c7d81102b1d2c4f5434d0142b1efa49361c7fa370cde02cbad1cdf556d5ebe84042e5b1eee75566d3c3bd4e54fb80c6258eb985131872c446ae99febe93703f66f4e0e10392c8a0d30f35710c7490190fef84833442ab74de59e4c9ebbc7cfe3f26750c16970d537ab353640e9e46e706cd200383135bfbf29b19c2fe729da592a9fb74eca37cb46775eb6db0118a3c59ac107fcf691822488d67f90e891045cb2ea35a79b6cd27c9fa5f37c9f6d6e4e2ca9267b2a8aa34f9727b0f539f", 0xd4}, {&(0x7f0000000340)="529cd4456bccdb80c030fe", 0xb}, {&(0x7f0000000380)="c2597979197f75ed6b82c8bcbf2c6b92a9a53fdd74646d60f9941ca27e", 0x1d}], 0x4}}], 0x2, 0x4c004) sendmmsg(r0, &(0x7f0000007fc0), 0x800001d, 0x0) [ 238.043215][ T46] tipc: TX() has been purged, node left! [ 238.119616][T10526] IPVS: ftp: loaded support on port[0] = 21 [ 238.203013][ T46] tipc: TX() has been purged, node left! 06:08:55 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) dup(r2) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000100)={0x26, 'hash\x00', 0x0, 0x0, 'crct10dif-generic\x00'}, 0x58) r4 = accept$alg(r3, 0x0, 0x0) r5 = accept4(r4, 0x0, 0x0, 0x0) splice(r0, 0x0, r5, 0x0, 0x30007, 0x0) 06:08:55 executing program 2: pipe(&(0x7f00000001c0)) r0 = syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x5, 0x0) splice(r0, 0x0, 0xffffffffffffffff, 0x0, 0x1000000008, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = syz_open_dev$video(0x0, 0x0, 0x0) splice(r2, 0x0, r1, 0x0, 0x1000000008, 0x0) 06:08:55 executing program 3: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x80801, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @ipv4}, 0x1c) getsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x3d, &(0x7f0000000300)={@dev}, &(0x7f00000004c0)=0x20) 06:08:55 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet_udp_int(r0, 0x11, 0x67, &(0x7f0000000140)=0x6, 0x4) sendmmsg(r0, &(0x7f0000006f00)=[{{&(0x7f0000000040)=@in={0x2, 0x4e23, @remote}, 0x80, &(0x7f0000000100)=[{&(0x7f00000000c0)="e04013b497936ecafdd12c496f522cc2830fd358bc8f890e410223906070a39cc6e2f84a8622c5f86cad52bba1560397737a6cce189d7db27e", 0x39}], 0x1}}, {{0x0, 0x0, &(0x7f0000000440)=[{&(0x7f0000000200)="9544939c01e602e8fc696947591d4c6fb3cb9a7cf9e53555dac91c09bbd33a6e85981e045d", 0x25}, {&(0x7f0000000240)="b995a5bf327c6f291a70af1527c6eb87af6b40c22e784c7d81102b1d2c4f5434d0142b1efa49361c7fa370cde02cbad1cdf556d5ebe84042e5b1eee75566d3c3bd4e54fb80c6258eb985131872c446ae99febe93703f66f4e0e10392c8a0d30f35710c7490190fef84833442ab74de59e4c9ebbc7cfe3f26750c16970d537ab353640e9e46e706cd200383135bfbf29b19c2fe729da592a9fb74eca37cb46775eb6db0118a3c59ac107fcf691822488d67f90e891045cb2ea35a79b6cd27c9fa5f37c9f6d6e4e2ca9267b2a8aa34f9727b0f539f", 0xd4}, {&(0x7f0000000340)="529cd4456bccdb80c030fe", 0xb}, {&(0x7f0000000380)="c2597979197f75ed6b82c8bcbf2c6b92a9a53fdd74646d60f9941ca27e", 0x1d}], 0x4}}], 0x2, 0x4c004) sendmmsg(r0, &(0x7f0000007fc0), 0x800001d, 0x0) 06:08:55 executing program 0: r0 = perf_event_open(&(0x7f0000000640)={0x3, 0x70, 0x3e7, 0x0, 0x4, 0x0, 0x0, 0x0, 0x91dd7106ca8fd33b, 0xdb3fedb3c3734f95, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x40000000000, 0x0, 0x1, 0x0, @perf_config_ext={0x18, 0x3}, 0x21, 0x10000000000000, 0x0, 0x0, 0x0, 0x20000007, 0x2}, 0x0, 0xc, 0xffffffffffffffff, 0xa) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='cpuacct.stat\x00', 0x0, 0x0) r2 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r2, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f00000003c0)='syz1\x00', 0x200002, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0xfffffffffffffffc) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000300)='./cgroup/syz0\x00', 0x200002, 0x0) socket$kcm(0x11, 0xb, 0x0) ioctl$TUNSETTXFILTER(r1, 0x400454d1, &(0x7f00000000c0)=ANY=[@ANYBLOB="00000700000000da6500bbc4bbbbbbbb0180c2000016000000004dc23f0c000000000000bb"]) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000040)=@ipx={0x4, 0x1, 0x0, "2bfaec665b4b", 0xff}, 0x80, 0x0}, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={0xffffffffffffffff, 0x1, 0x49c42ca22ab5a9ac, 0x4, 0x0}, 0x20) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x908b7aabaa7d2404) socket$kcm(0xa, 0x6, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x4000011) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000000c0), 0x0}, 0x28) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x89f1, &(0x7f0000000000)='ip6gre0\x00') perf_event_open(&(0x7f00000004c0)={0x0, 0x70, 0x8, 0x6, 0x0, 0x3, 0x0, 0x3, 0x4, 0x0, 0x9, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x1000, 0x0, @perf_config_ext={0x1ff}, 0x40004, 0xfffffffffffffffd, 0x0, 0x8, 0x8, 0x4, 0x80}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0x10, 0x0, 0x10) sendmsg$kcm(r4, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d200040080000048000001000080000000000300f88000f01700d4bd", 0x2e}], 0xf}, 0x40094) r5 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r6 = socket$kcm(0x2, 0x1, 0x2) socketpair(0x25, 0x6, 0x4, &(0x7f0000000480)) setsockopt$sock_attach_bpf(r6, 0x1, 0x3e, &(0x7f00000002c0)=r5, 0x4) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x6d, &(0x7f0000000cc0)=ANY=[@ANYRESHEX, @ANYBLOB="e99f619c950ec8069b69ac05520100000000000000572e83f4fd34a6db69715afdc8ec492fa879a8460bf2c7459f384ec36d6f0d833fccc87dc8f542ca0731ec72c3f6e0857c63572db61a83246496a2f90400569c8af42a5b8b1e3583115dfe3a40a792ffe638fd722afd02131c170175f382a8d78b6626d1d58220f08d98570bad00042a01c00748cf37385e7d66e6c0efddeb730ebd2f1ab4e816cf7493cf236ca5eb6e5d2a65519a7acf475dbd9fb52eb50ddcf9cee74529f59a2d6cfe6c23f6a688719f922099394146621132f866439970571e206ac47123f2d9cdb5cb7c8506122300000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000)={0x0, 0x8}, 0x10}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r7, 0x18000000000002a0, 0x42, 0x0, &(0x7f0000000800)="b9ff0300600d698cb89e14f088a81fffffff00004000630677fbac14140ee934a0a662079f4b4d2f87e5feca6aab845013f2325f1a39010108038da1924425181aa5", 0x0, 0x28000, 0x60000000, 0x113, 0x0, &(0x7f00000006c0)="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"}, 0x40) r8 = bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x17, 0x6, &(0x7f0000000c00)=ANY=[], &(0x7f00000002c0)='GPL\x00', 0x2, 0x0, 0x0, 0x40f00, 0x8, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000340)={0x1, 0x10000003}, 0x8, 0x10, &(0x7f0000000380)={0x0, 0xa, 0x83, 0x2}, 0x10}, 0x78) ioctl$sock_kcm_SIOCKCMATTACH(r4, 0x89e0, &(0x7f0000000500)={0xffffffffffffffff, r8}) 06:08:55 executing program 4: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000000c0)=0xe) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r1, 0x40047438, &(0x7f0000000180)=""/246) ioctl$PPPIOCSFLAGS1(r1, 0x40047457, &(0x7f0000000000)) 06:08:55 executing program 3: perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x80801, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @ipv4}, 0x1c) getsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x3d, &(0x7f0000000300)={@dev}, &(0x7f00000004c0)=0x20) [ 238.697227][T10570] IPVS: ftp: loaded support on port[0] = 21 06:08:55 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet_udp_int(r0, 0x11, 0x67, &(0x7f0000000140)=0x6, 0x4) sendmmsg(r0, &(0x7f0000006f00)=[{{&(0x7f0000000040)=@in={0x2, 0x4e23, @remote}, 0x80, &(0x7f0000000100)=[{&(0x7f00000000c0)="e04013b497936ecafdd12c496f522cc2830fd358bc8f890e410223906070a39cc6e2f84a8622c5f86cad52bba1560397737a6cce189d7db27e", 0x39}], 0x1}}, {{0x0, 0x0, &(0x7f0000000440)=[{&(0x7f0000000200)="9544939c01e602e8fc696947591d4c6fb3cb9a7cf9e53555dac91c09bbd33a6e85981e045d", 0x25}, {&(0x7f0000000240)="b995a5bf327c6f291a70af1527c6eb87af6b40c22e784c7d81102b1d2c4f5434d0142b1efa49361c7fa370cde02cbad1cdf556d5ebe84042e5b1eee75566d3c3bd4e54fb80c6258eb985131872c446ae99febe93703f66f4e0e10392c8a0d30f35710c7490190fef84833442ab74de59e4c9ebbc7cfe3f26750c16970d537ab353640e9e46e706cd200383135bfbf29b19c2fe729da592a9fb74eca37cb46775eb6db0118a3c59ac107fcf691822488d67f90e891045cb2ea35a79b6cd27c9fa5f37c9f6d6e4e2ca9267b2a8aa34f9727b0f539f", 0xd4}, {&(0x7f0000000340)="529cd4456bccdb80c030fe01e5cd617041", 0x11}, {&(0x7f0000000380)="c2597979197f75ed6b82c8bcbf2c6b92a9a53fdd74646d60f9941ca27e", 0x1d}], 0x4}}], 0x2, 0x4c004) sendmmsg(r0, &(0x7f0000007fc0), 0x800001d, 0x0) 06:08:55 executing program 0: r0 = perf_event_open(&(0x7f0000000640)={0x3, 0x70, 0x3e7, 0x0, 0x4, 0x0, 0x0, 0x0, 0x91dd7106ca8fd33b, 0xdb3fedb3c3734f95, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x40000000000, 0x0, 0x1, 0x0, @perf_config_ext={0x18, 0x3}, 0x21, 0x10000000000000, 0x0, 0x0, 0x0, 0x20000007, 0x2}, 0x0, 0xc, 0xffffffffffffffff, 0xa) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='cpuacct.stat\x00', 0x0, 0x0) r2 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r2, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f00000003c0)='syz1\x00', 0x200002, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0xfffffffffffffffc) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000300)='./cgroup/syz0\x00', 0x200002, 0x0) socket$kcm(0x11, 0xb, 0x0) ioctl$TUNSETTXFILTER(r1, 0x400454d1, &(0x7f00000000c0)=ANY=[@ANYBLOB="00000700000000da6500bbc4bbbbbbbb0180c2000016000000004dc23f0c000000000000bb"]) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000040)=@ipx={0x4, 0x1, 0x0, "2bfaec665b4b", 0xff}, 0x80, 0x0}, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={0xffffffffffffffff, 0x1, 0x49c42ca22ab5a9ac, 0x4, 0x0}, 0x20) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x908b7aabaa7d2404) socket$kcm(0xa, 0x6, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x4000011) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000000c0), 0x0}, 0x28) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x89f1, &(0x7f0000000000)='ip6gre0\x00') perf_event_open(&(0x7f00000004c0)={0x0, 0x70, 0x8, 0x6, 0x0, 0x3, 0x0, 0x3, 0x4, 0x0, 0x9, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x1000, 0x0, @perf_config_ext={0x1ff}, 0x40004, 0xfffffffffffffffd, 0x0, 0x8, 0x8, 0x4, 0x80}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0x10, 0x0, 0x10) sendmsg$kcm(r4, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d200040080000048000001000080000000000300f88000f01700d4bd", 0x2e}], 0xf}, 0x40094) r5 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r6 = socket$kcm(0x2, 0x1, 0x2) socketpair(0x25, 0x6, 0x4, &(0x7f0000000480)) setsockopt$sock_attach_bpf(r6, 0x1, 0x3e, &(0x7f00000002c0)=r5, 0x4) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x6d, &(0x7f0000000cc0)=ANY=[@ANYRESHEX, @ANYBLOB="e99f619c950ec8069b69ac05520100000000000000572e83f4fd34a6db69715afdc8ec492fa879a8460bf2c7459f384ec36d6f0d833fccc87dc8f542ca0731ec72c3f6e0857c63572db61a83246496a2f90400569c8af42a5b8b1e3583115dfe3a40a792ffe638fd722afd02131c170175f382a8d78b6626d1d58220f08d98570bad00042a01c00748cf37385e7d66e6c0efddeb730ebd2f1ab4e816cf7493cf236ca5eb6e5d2a65519a7acf475dbd9fb52eb50ddcf9cee74529f59a2d6cfe6c23f6a688719f922099394146621132f866439970571e206ac47123f2d9cdb5cb7c8506122300000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000)={0x0, 0x8}, 0x10}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r7, 0x18000000000002a0, 0x42, 0x0, &(0x7f0000000800)="b9ff0300600d698cb89e14f088a81fffffff00004000630677fbac14140ee934a0a662079f4b4d2f87e5feca6aab845013f2325f1a39010108038da1924425181aa5", 0x0, 0x28000, 0x60000000, 0x113, 0x0, &(0x7f00000006c0)="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"}, 0x40) r8 = bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x17, 0x6, &(0x7f0000000c00)=ANY=[], &(0x7f00000002c0)='GPL\x00', 0x2, 0x0, 0x0, 0x40f00, 0x8, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000340)={0x1, 0x10000003}, 0x8, 0x10, &(0x7f0000000380)={0x0, 0xa, 0x83, 0x2}, 0x10}, 0x78) ioctl$sock_kcm_SIOCKCMATTACH(r4, 0x89e0, &(0x7f0000000500)={0xffffffffffffffff, r8}) 06:08:55 executing program 2: pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x5, 0x0) splice(r1, 0x0, r0, 0x0, 0x0, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = syz_open_dev$video(0x0, 0x0, 0x0) splice(r3, 0x0, r2, 0x0, 0x1000000008, 0x0) 06:08:55 executing program 3: perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x80801, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @ipv4}, 0x1c) getsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x3d, &(0x7f0000000300)={@dev}, &(0x7f00000004c0)=0x20) 06:08:55 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet_udp_int(r0, 0x11, 0x67, &(0x7f0000000140)=0x6, 0x4) sendmmsg(r0, &(0x7f0000006f00)=[{{&(0x7f0000000040)=@in={0x2, 0x4e23, @remote}, 0x80, &(0x7f0000000100)=[{&(0x7f00000000c0)="e04013b497936ecafdd12c496f522cc2830fd358bc8f890e410223906070a39cc6e2f84a8622c5f86cad52bba1560397737a6cce189d7db27e", 0x39}], 0x1}}, {{0x0, 0x0, &(0x7f0000000440)=[{&(0x7f0000000200)="9544939c01e602e8fc696947591d4c6fb3cb9a7cf9e53555dac91c09bbd33a6e85981e045d", 0x25}, {&(0x7f0000000240)="b995a5bf327c6f291a70af1527c6eb87af6b40c22e784c7d81102b1d2c4f5434d0142b1efa49361c7fa370cde02cbad1cdf556d5ebe84042e5b1eee75566d3c3bd4e54fb80c6258eb985131872c446ae99febe93703f66f4e0e10392c8a0d30f35710c7490190fef84833442ab74de59e4c9ebbc7cfe3f26750c16970d537ab353640e9e46e706cd200383135bfbf29b19c2fe729da592a9fb74eca37cb46775eb6db0118a3c59ac107fcf691822488d67f90e891045cb2ea35a79b6cd27c9fa5f37c9f6d6e4e2ca9267b2a8aa34f9727b0f539f", 0xd4}, {&(0x7f0000000340)="529cd4456bccdb80c030fe01e5cd617041", 0x11}, {&(0x7f0000000380)="c2597979197f75ed6b82c8bcbf2c6b92a9a53fdd74646d60f9941ca27e", 0x1d}], 0x4}}], 0x2, 0x4c004) sendmmsg(r0, &(0x7f0000007fc0), 0x800001d, 0x0) 06:08:56 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000100)={0x26, 'hash\x00', 0x0, 0x0, 'crct10dif-generic\x00'}, 0x58) r3 = accept$alg(r2, 0x0, 0x0) r4 = accept4(r3, 0x0, 0x0, 0x0) splice(r0, 0x0, r4, 0x0, 0x30007, 0x0) 06:08:56 executing program 3: perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x80801, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @ipv4}, 0x1c) getsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x3d, &(0x7f0000000300)={@dev}, &(0x7f00000004c0)=0x20) 06:08:56 executing program 2: pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x5, 0x0) splice(r1, 0x0, r0, 0x0, 0x0, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = syz_open_dev$video(0x0, 0x0, 0x0) splice(r3, 0x0, r2, 0x0, 0x1000000008, 0x0) 06:08:56 executing program 0: r0 = perf_event_open(&(0x7f0000000640)={0x3, 0x70, 0x3e7, 0x0, 0x4, 0x0, 0x0, 0x0, 0x91dd7106ca8fd33b, 0xdb3fedb3c3734f95, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x40000000000, 0x0, 0x1, 0x0, @perf_config_ext={0x18, 0x3}, 0x21, 0x10000000000000, 0x0, 0x0, 0x0, 0x20000007, 0x2}, 0x0, 0xc, 0xffffffffffffffff, 0xa) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='cpuacct.stat\x00', 0x0, 0x0) r2 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r2, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f00000003c0)='syz1\x00', 0x200002, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0xfffffffffffffffc) gettid() socket$kcm(0x11, 0xb, 0x0) ioctl$TUNSETTXFILTER(r1, 0x400454d1, &(0x7f00000000c0)=ANY=[@ANYBLOB="00000700000000da6500bbc4bbbbbbbb0180c2000016000000004dc23f0c000000000000bb"]) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000040)=@ipx={0x4, 0x1, 0x0, "2bfaec665b4b", 0xff}, 0x80, 0x0}, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={0xffffffffffffffff, 0x1, 0x49c42ca22ab5a9ac, 0x4, 0x0}, 0x20) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x908b7aabaa7d2404) socket$kcm(0xa, 0x6, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x4000011) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000000c0), 0x0}, 0x28) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x89f1, &(0x7f0000000000)='ip6gre0\x00') perf_event_open(&(0x7f00000004c0)={0x0, 0x70, 0x8, 0x6, 0x0, 0x3, 0x0, 0x3, 0x4, 0x0, 0x9, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x1000, 0x0, @perf_config_ext={0x1ff}, 0x40004, 0xfffffffffffffffd, 0x0, 0x8, 0x8, 0x4, 0x80}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0x10, 0x0, 0x10) sendmsg$kcm(r4, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d200040080000048000001000080000000000300f88000f01700d4bd", 0x2e}], 0xf}, 0x40094) r5 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r6 = socket$kcm(0x2, 0x1, 0x2) socketpair(0x25, 0x6, 0x4, &(0x7f0000000480)) setsockopt$sock_attach_bpf(r6, 0x1, 0x3e, &(0x7f00000002c0)=r5, 0x4) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x6d, &(0x7f0000000cc0)=ANY=[@ANYRESHEX, @ANYBLOB="e99f619c950ec8069b69ac05520100000000000000572e83f4fd34a6db69715afdc8ec492fa879a8460bf2c7459f384ec36d6f0d833fccc87dc8f542ca0731ec72c3f6e0857c63572db61a83246496a2f90400569c8af42a5b8b1e3583115dfe3a40a792ffe638fd722afd02131c170175f382a8d78b6626d1d58220f08d98570bad00042a01c00748cf37385e7d66e6c0efddeb730ebd2f1ab4e816cf7493cf236ca5eb6e5d2a65519a7acf475dbd9fb52eb50ddcf9cee74529f59a2d6cfe6c23f6a688719f922099394146621132f866439970571e206ac47123f2d9cdb5cb7c8506122300000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000)={0x0, 0x8}, 0x10}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r7, 0x18000000000002a0, 0x42, 0x0, &(0x7f0000000800)="b9ff0300600d698cb89e14f088a81fffffff00004000630677fbac14140ee934a0a662079f4b4d2f87e5feca6aab845013f2325f1a39010108038da1924425181aa5", 0x0, 0x28000, 0x60000000, 0x113, 0x0, &(0x7f00000006c0)="097baacf569909ebb78a19b4d4f607feb3072ad9474026c7c148d184a2647de87a8fd14ad5d15cadabd6c7545b05000000ad90e0d4000000000f3f750d2a75f6fa77d3fa4e023987f7a54b04eb238604aa90cab7b44f95ae6ce9b5f877439af64cb6573e5bc85c5e766604ff55b7a234246bd2ee44c9e99d69190bbe089603846d17b8678d05a0bda6ae300ca8c43271b65bb62b0af61bf4da3891f5bcf900ed368b36e2db9957b0dfa5cf084db8cb2b2c54661f9eac8a58a72fc9e768405eb33bce450dd088d2e16d757eeb1239a2389330535afb4944b7b27c4b26d812ab58864f3ffa3ce8cf739275492a0c90b425a792a19b9abf846b926e9f93f4b57ab77c0db63fb7d5a1e04ef52157f14f1dedcc4437"}, 0x40) r8 = bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x17, 0x6, &(0x7f0000000c00)=ANY=[], &(0x7f00000002c0)='GPL\x00', 0x2, 0x0, 0x0, 0x40f00, 0x8, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000340)={0x1, 0x10000003}, 0x8, 0x10, &(0x7f0000000380)={0x0, 0xa, 0x83, 0x2}, 0x10}, 0x78) ioctl$sock_kcm_SIOCKCMATTACH(r4, 0x89e0, &(0x7f0000000500)={0xffffffffffffffff, r8}) 06:08:56 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet_udp_int(r0, 0x11, 0x67, &(0x7f0000000140)=0x6, 0x4) sendmmsg(r0, &(0x7f0000006f00)=[{{&(0x7f0000000040)=@in={0x2, 0x4e23, @remote}, 0x80, &(0x7f0000000100)=[{&(0x7f00000000c0)="e04013b497936ecafdd12c496f522cc2830fd358bc8f890e410223906070a39cc6e2f84a8622c5f86cad52bba1560397737a6cce189d7db27e", 0x39}], 0x1}}, {{0x0, 0x0, &(0x7f0000000440)=[{&(0x7f0000000200)="9544939c01e602e8fc696947591d4c6fb3cb9a7cf9e53555dac91c09bbd33a6e85981e045d", 0x25}, {&(0x7f0000000240)="b995a5bf327c6f291a70af1527c6eb87af6b40c22e784c7d81102b1d2c4f5434d0142b1efa49361c7fa370cde02cbad1cdf556d5ebe84042e5b1eee75566d3c3bd4e54fb80c6258eb985131872c446ae99febe93703f66f4e0e10392c8a0d30f35710c7490190fef84833442ab74de59e4c9ebbc7cfe3f26750c16970d537ab353640e9e46e706cd200383135bfbf29b19c2fe729da592a9fb74eca37cb46775eb6db0118a3c59ac107fcf691822488d67f90e891045cb2ea35a79b6cd27c9fa5f37c9f6d6e4e2ca9267b2a8aa34f9727b0f539f", 0xd4}, {&(0x7f0000000340)="529cd4456bccdb80c030fe01e5cd617041", 0x11}, {&(0x7f0000000380)="c2597979197f75ed6b82c8bcbf2c6b92a9a53fdd74646d60f9941ca27e", 0x1d}], 0x4}}], 0x2, 0x4c004) sendmmsg(r0, &(0x7f0000007fc0), 0x800001d, 0x0) 06:08:56 executing program 4: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000000c0)=0xe) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r1, 0x40047438, &(0x7f0000000180)=""/246) ioctl$PPPIOCSFLAGS1(r1, 0x40047457, &(0x7f0000000000)) [ 239.685790][T10629] IPVS: ftp: loaded support on port[0] = 21 06:08:56 executing program 2: pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x5, 0x0) splice(r1, 0x0, r0, 0x0, 0x0, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = syz_open_dev$video(0x0, 0x0, 0x0) splice(r3, 0x0, r2, 0x0, 0x1000000008, 0x0) 06:08:56 executing program 3: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x80801, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @ipv4}, 0x1c) getsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x3d, &(0x7f0000000300)={@dev}, &(0x7f00000004c0)=0x20) 06:08:56 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet_udp_int(r0, 0x11, 0x67, &(0x7f0000000140)=0x6, 0x4) sendmmsg(r0, &(0x7f0000006f00)=[{{&(0x7f0000000040)=@in={0x2, 0x4e23, @remote}, 0x80, &(0x7f0000000100)=[{&(0x7f00000000c0)="e04013b497936ecafdd12c496f522cc2830fd358bc8f890e410223906070a39cc6e2f84a8622c5f86cad52bba1560397737a6cce189d7db27e", 0x39}], 0x1}}, {{0x0, 0x0, &(0x7f0000000440)=[{&(0x7f0000000200)="9544939c01e602e8fc696947591d4c6fb3cb9a7cf9e53555dac91c09bbd33a6e85981e045d", 0x25}, {&(0x7f0000000240)="b995a5bf327c6f291a70af1527c6eb87af6b40c22e784c7d81102b1d2c4f5434d0142b1efa49361c7fa370cde02cbad1cdf556d5ebe84042e5b1eee75566d3c3bd4e54fb80c6258eb985131872c446ae99febe93703f66f4e0e10392c8a0d30f35710c7490190fef84833442ab74de59e4c9ebbc7cfe3f26750c16970d537ab353640e9e46e706cd200383135bfbf29b19c2fe729da592a9fb74eca37cb46775eb6db0118a3c59ac107fcf691822488d67f90e891045cb2ea35a79b6cd27c9fa5f37c9f6d6e4e2ca9267b2a8aa34f9727b0f539f", 0xd4}, {&(0x7f0000000340)="529cd4456bccdb80c030fe01e5cd61704126c8d4", 0x14}, {&(0x7f0000000380)="c2597979197f75ed6b82c8bcbf2c6b92a9a53fdd74646d60f9941ca27e", 0x1d}], 0x4}}], 0x2, 0x4c004) sendmmsg(r0, &(0x7f0000007fc0), 0x800001d, 0x0) 06:08:56 executing program 0: r0 = perf_event_open(&(0x7f0000000640)={0x3, 0x70, 0x3e7, 0x0, 0x4, 0x0, 0x0, 0x0, 0x91dd7106ca8fd33b, 0xdb3fedb3c3734f95, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x40000000000, 0x0, 0x1, 0x0, @perf_config_ext={0x18, 0x3}, 0x21, 0x10000000000000, 0x0, 0x0, 0x0, 0x20000007, 0x2}, 0x0, 0xc, 0xffffffffffffffff, 0xa) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='cpuacct.stat\x00', 0x0, 0x0) r2 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r2, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f00000003c0)='syz1\x00', 0x200002, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0xfffffffffffffffc) gettid() socket$kcm(0x11, 0xb, 0x0) ioctl$TUNSETTXFILTER(r1, 0x400454d1, &(0x7f00000000c0)=ANY=[@ANYBLOB="00000700000000da6500bbc4bbbbbbbb0180c2000016000000004dc23f0c000000000000bb"]) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000040)=@ipx={0x4, 0x1, 0x0, "2bfaec665b4b", 0xff}, 0x80, 0x0}, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={0xffffffffffffffff, 0x1, 0x49c42ca22ab5a9ac, 0x4, 0x0}, 0x20) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x908b7aabaa7d2404) socket$kcm(0xa, 0x6, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x4000011) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000000c0), 0x0}, 0x28) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x89f1, &(0x7f0000000000)='ip6gre0\x00') perf_event_open(&(0x7f00000004c0)={0x0, 0x70, 0x8, 0x6, 0x0, 0x3, 0x0, 0x3, 0x4, 0x0, 0x9, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x1000, 0x0, @perf_config_ext={0x1ff}, 0x40004, 0xfffffffffffffffd, 0x0, 0x8, 0x8, 0x4, 0x80}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0x10, 0x0, 0x10) sendmsg$kcm(r4, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d200040080000048000001000080000000000300f88000f01700d4bd", 0x2e}], 0xf}, 0x40094) r5 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r6 = socket$kcm(0x2, 0x1, 0x2) socketpair(0x25, 0x6, 0x4, &(0x7f0000000480)) setsockopt$sock_attach_bpf(r6, 0x1, 0x3e, &(0x7f00000002c0)=r5, 0x4) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x6d, &(0x7f0000000cc0)=ANY=[@ANYRESHEX, @ANYBLOB="e99f619c950ec8069b69ac05520100000000000000572e83f4fd34a6db69715afdc8ec492fa879a8460bf2c7459f384ec36d6f0d833fccc87dc8f542ca0731ec72c3f6e0857c63572db61a83246496a2f90400569c8af42a5b8b1e3583115dfe3a40a792ffe638fd722afd02131c170175f382a8d78b6626d1d58220f08d98570bad00042a01c00748cf37385e7d66e6c0efddeb730ebd2f1ab4e816cf7493cf236ca5eb6e5d2a65519a7acf475dbd9fb52eb50ddcf9cee74529f59a2d6cfe6c23f6a688719f922099394146621132f866439970571e206ac47123f2d9cdb5cb7c8506122300000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000)={0x0, 0x8}, 0x10}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r7, 0x18000000000002a0, 0x42, 0x0, &(0x7f0000000800)="b9ff0300600d698cb89e14f088a81fffffff00004000630677fbac14140ee934a0a662079f4b4d2f87e5feca6aab845013f2325f1a39010108038da1924425181aa5", 0x0, 0x28000, 0x60000000, 0x113, 0x0, &(0x7f00000006c0)="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"}, 0x40) r8 = bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x17, 0x6, &(0x7f0000000c00)=ANY=[], &(0x7f00000002c0)='GPL\x00', 0x2, 0x0, 0x0, 0x40f00, 0x8, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000340)={0x1, 0x10000003}, 0x8, 0x10, &(0x7f0000000380)={0x0, 0xa, 0x83, 0x2}, 0x10}, 0x78) ioctl$sock_kcm_SIOCKCMATTACH(r4, 0x89e0, &(0x7f0000000500)={0xffffffffffffffff, r8}) 06:08:56 executing program 2: pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x5, 0x0) splice(r1, 0x0, r0, 0x0, 0x1000000008, 0x0) pipe(0x0) r2 = syz_open_dev$video(0x0, 0x0, 0x0) splice(r2, 0x0, 0xffffffffffffffff, 0x0, 0x1000000008, 0x0) 06:08:56 executing program 3: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x80801, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @ipv4}, 0x1c) getsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x3d, &(0x7f0000000300)={@dev}, &(0x7f00000004c0)=0x20) 06:08:57 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000100)={0x26, 'hash\x00', 0x0, 0x0, 'crct10dif-generic\x00'}, 0x58) r3 = accept$alg(r2, 0x0, 0x0) r4 = accept4(r3, 0x0, 0x0, 0x0) splice(r0, 0x0, r4, 0x0, 0x30007, 0x0) 06:08:57 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet_udp_int(r0, 0x11, 0x67, &(0x7f0000000140)=0x6, 0x4) sendmmsg(r0, &(0x7f0000006f00)=[{{&(0x7f0000000040)=@in={0x2, 0x4e23, @remote}, 0x80, &(0x7f0000000100)=[{&(0x7f00000000c0)="e04013b497936ecafdd12c496f522cc2830fd358bc8f890e410223906070a39cc6e2f84a8622c5f86cad52bba1560397737a6cce189d7db27e", 0x39}], 0x1}}, {{0x0, 0x0, &(0x7f0000000440)=[{&(0x7f0000000200)="9544939c01e602e8fc696947591d4c6fb3cb9a7cf9e53555dac91c09bbd33a6e85981e045d", 0x25}, {&(0x7f0000000240)="b995a5bf327c6f291a70af1527c6eb87af6b40c22e784c7d81102b1d2c4f5434d0142b1efa49361c7fa370cde02cbad1cdf556d5ebe84042e5b1eee75566d3c3bd4e54fb80c6258eb985131872c446ae99febe93703f66f4e0e10392c8a0d30f35710c7490190fef84833442ab74de59e4c9ebbc7cfe3f26750c16970d537ab353640e9e46e706cd200383135bfbf29b19c2fe729da592a9fb74eca37cb46775eb6db0118a3c59ac107fcf691822488d67f90e891045cb2ea35a79b6cd27c9fa5f37c9f6d6e4e2ca9267b2a8aa34f9727b0f539f", 0xd4}, {&(0x7f0000000340)="529cd4456bccdb80c030fe01e5cd61704126c8d4", 0x14}, {&(0x7f0000000380)="c2597979197f75ed6b82c8bcbf2c6b92a9a53fdd74646d60f9941ca27e", 0x1d}], 0x4}}], 0x2, 0x4c004) sendmmsg(r0, &(0x7f0000007fc0), 0x800001d, 0x0) 06:08:57 executing program 0: r0 = perf_event_open(&(0x7f0000000640)={0x3, 0x70, 0x3e7, 0x0, 0x4, 0x0, 0x0, 0x0, 0x91dd7106ca8fd33b, 0xdb3fedb3c3734f95, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x40000000000, 0x0, 0x1, 0x0, @perf_config_ext={0x18, 0x3}, 0x21, 0x10000000000000, 0x0, 0x0, 0x0, 0x20000007, 0x2}, 0x0, 0xc, 0xffffffffffffffff, 0xa) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='cpuacct.stat\x00', 0x0, 0x0) r2 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r2, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f00000003c0)='syz1\x00', 0x200002, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0xfffffffffffffffc) gettid() socket$kcm(0x11, 0xb, 0x0) ioctl$TUNSETTXFILTER(r1, 0x400454d1, &(0x7f00000000c0)=ANY=[@ANYBLOB="00000700000000da6500bbc4bbbbbbbb0180c2000016000000004dc23f0c000000000000bb"]) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000040)=@ipx={0x4, 0x1, 0x0, "2bfaec665b4b", 0xff}, 0x80, 0x0}, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={0xffffffffffffffff, 0x1, 0x49c42ca22ab5a9ac, 0x4, 0x0}, 0x20) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x908b7aabaa7d2404) socket$kcm(0xa, 0x6, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x4000011) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000000c0), 0x0}, 0x28) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x89f1, &(0x7f0000000000)='ip6gre0\x00') perf_event_open(&(0x7f00000004c0)={0x0, 0x70, 0x8, 0x6, 0x0, 0x3, 0x0, 0x3, 0x4, 0x0, 0x9, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x1000, 0x0, @perf_config_ext={0x1ff}, 0x40004, 0xfffffffffffffffd, 0x0, 0x8, 0x8, 0x4, 0x80}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0x10, 0x0, 0x10) sendmsg$kcm(r4, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d200040080000048000001000080000000000300f88000f01700d4bd", 0x2e}], 0xf}, 0x40094) r5 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r6 = socket$kcm(0x2, 0x1, 0x2) socketpair(0x25, 0x6, 0x4, &(0x7f0000000480)) setsockopt$sock_attach_bpf(r6, 0x1, 0x3e, &(0x7f00000002c0)=r5, 0x4) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x6d, &(0x7f0000000cc0)=ANY=[@ANYRESHEX, @ANYBLOB="e99f619c950ec8069b69ac05520100000000000000572e83f4fd34a6db69715afdc8ec492fa879a8460bf2c7459f384ec36d6f0d833fccc87dc8f542ca0731ec72c3f6e0857c63572db61a83246496a2f90400569c8af42a5b8b1e3583115dfe3a40a792ffe638fd722afd02131c170175f382a8d78b6626d1d58220f08d98570bad00042a01c00748cf37385e7d66e6c0efddeb730ebd2f1ab4e816cf7493cf236ca5eb6e5d2a65519a7acf475dbd9fb52eb50ddcf9cee74529f59a2d6cfe6c23f6a688719f922099394146621132f866439970571e206ac47123f2d9cdb5cb7c8506122300000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000)={0x0, 0x8}, 0x10}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r7, 0x18000000000002a0, 0x42, 0x0, &(0x7f0000000800)="b9ff0300600d698cb89e14f088a81fffffff00004000630677fbac14140ee934a0a662079f4b4d2f87e5feca6aab845013f2325f1a39010108038da1924425181aa5", 0x0, 0x28000, 0x60000000, 0x113, 0x0, &(0x7f00000006c0)="097baacf569909ebb78a19b4d4f607feb3072ad9474026c7c148d184a2647de87a8fd14ad5d15cadabd6c7545b05000000ad90e0d4000000000f3f750d2a75f6fa77d3fa4e023987f7a54b04eb238604aa90cab7b44f95ae6ce9b5f877439af64cb6573e5bc85c5e766604ff55b7a234246bd2ee44c9e99d69190bbe089603846d17b8678d05a0bda6ae300ca8c43271b65bb62b0af61bf4da3891f5bcf900ed368b36e2db9957b0dfa5cf084db8cb2b2c54661f9eac8a58a72fc9e768405eb33bce450dd088d2e16d757eeb1239a2389330535afb4944b7b27c4b26d812ab58864f3ffa3ce8cf739275492a0c90b425a792a19b9abf846b926e9f93f4b57ab77c0db63fb7d5a1e04ef52157f14f1dedcc4437"}, 0x40) r8 = bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x17, 0x6, &(0x7f0000000c00)=ANY=[], &(0x7f00000002c0)='GPL\x00', 0x2, 0x0, 0x0, 0x40f00, 0x8, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000340)={0x1, 0x10000003}, 0x8, 0x10, &(0x7f0000000380)={0x0, 0xa, 0x83, 0x2}, 0x10}, 0x78) ioctl$sock_kcm_SIOCKCMATTACH(r4, 0x89e0, &(0x7f0000000500)={0xffffffffffffffff, r8}) 06:08:57 executing program 3: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x80801, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @ipv4}, 0x1c) getsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x3d, &(0x7f0000000300)={@dev}, &(0x7f00000004c0)=0x20) 06:08:57 executing program 2: pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x5, 0x0) splice(r1, 0x0, r0, 0x0, 0x1000000008, 0x0) pipe(0x0) r2 = syz_open_dev$video(0x0, 0x0, 0x0) splice(r2, 0x0, 0xffffffffffffffff, 0x0, 0x1000000008, 0x0) 06:08:57 executing program 4: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000000c0)=0xe) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r1, 0x40047438, &(0x7f0000000180)=""/246) ioctl$PPPIOCSFLAGS1(r1, 0x40047457, &(0x7f0000000000)) 06:08:57 executing program 3: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x80801, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @ipv4}, 0x1c) getsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x3d, &(0x7f0000000300)={@dev}, &(0x7f00000004c0)=0x20) 06:08:57 executing program 2: pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x5, 0x0) splice(r1, 0x0, r0, 0x0, 0x1000000008, 0x0) pipe(0x0) r2 = syz_open_dev$video(0x0, 0x0, 0x0) splice(r2, 0x0, 0xffffffffffffffff, 0x0, 0x1000000008, 0x0) [ 240.710033][T10697] IPVS: ftp: loaded support on port[0] = 21 06:08:57 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet_udp_int(r0, 0x11, 0x67, &(0x7f0000000140)=0x6, 0x4) sendmmsg(r0, &(0x7f0000006f00)=[{{&(0x7f0000000040)=@in={0x2, 0x4e23, @remote}, 0x80, &(0x7f0000000100)=[{&(0x7f00000000c0)="e04013b497936ecafdd12c496f522cc2830fd358bc8f890e410223906070a39cc6e2f84a8622c5f86cad52bba1560397737a6cce189d7db27e", 0x39}], 0x1}}, {{0x0, 0x0, &(0x7f0000000440)=[{&(0x7f0000000200)="9544939c01e602e8fc696947591d4c6fb3cb9a7cf9e53555dac91c09bbd33a6e85981e045d", 0x25}, {&(0x7f0000000240)="b995a5bf327c6f291a70af1527c6eb87af6b40c22e784c7d81102b1d2c4f5434d0142b1efa49361c7fa370cde02cbad1cdf556d5ebe84042e5b1eee75566d3c3bd4e54fb80c6258eb985131872c446ae99febe93703f66f4e0e10392c8a0d30f35710c7490190fef84833442ab74de59e4c9ebbc7cfe3f26750c16970d537ab353640e9e46e706cd200383135bfbf29b19c2fe729da592a9fb74eca37cb46775eb6db0118a3c59ac107fcf691822488d67f90e891045cb2ea35a79b6cd27c9fa5f37c9f6d6e4e2ca9267b2a8aa34f9727b0f539f", 0xd4}, {&(0x7f0000000340)="529cd4456bccdb80c030fe01e5cd61704126c8d4", 0x14}, {&(0x7f0000000380)="c2597979197f75ed6b82c8bcbf2c6b92a9a53fdd74646d60f9941ca27e", 0x1d}], 0x4}}], 0x2, 0x4c004) sendmmsg(r0, &(0x7f0000007fc0), 0x800001d, 0x0) 06:08:57 executing program 0: r0 = perf_event_open(&(0x7f0000000640)={0x3, 0x70, 0x3e7, 0x0, 0x4, 0x0, 0x0, 0x0, 0x91dd7106ca8fd33b, 0xdb3fedb3c3734f95, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x40000000000, 0x0, 0x1, 0x0, @perf_config_ext={0x18, 0x3}, 0x21, 0x10000000000000, 0x0, 0x0, 0x0, 0x20000007, 0x2}, 0x0, 0xc, 0xffffffffffffffff, 0xa) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='cpuacct.stat\x00', 0x0, 0x0) r2 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r2, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f00000003c0)='syz1\x00', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000300)='./cgroup/syz0\x00', 0x200002, 0x0) gettid() socket$kcm(0x11, 0xb, 0x0) ioctl$TUNSETTXFILTER(r1, 0x400454d1, &(0x7f00000000c0)=ANY=[@ANYBLOB="00000700000000da6500bbc4bbbbbbbb0180c2000016000000004dc23f0c000000000000bb"]) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000040)=@ipx={0x4, 0x1, 0x0, "2bfaec665b4b", 0xff}, 0x80, 0x0}, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={0xffffffffffffffff, 0x1, 0x49c42ca22ab5a9ac, 0x4, 0x0}, 0x20) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x908b7aabaa7d2404) socket$kcm(0xa, 0x6, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x4000011) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000000c0), 0x0}, 0x28) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x89f1, &(0x7f0000000000)='ip6gre0\x00') perf_event_open(&(0x7f00000004c0)={0x0, 0x70, 0x8, 0x6, 0x0, 0x3, 0x0, 0x3, 0x4, 0x0, 0x9, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x1000, 0x0, @perf_config_ext={0x1ff}, 0x40004, 0xfffffffffffffffd, 0x0, 0x8, 0x8, 0x4, 0x80}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0x10, 0x0, 0x10) sendmsg$kcm(r4, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d200040080000048000001000080000000000300f88000f01700d4bd", 0x2e}], 0xf}, 0x40094) r5 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r6 = socket$kcm(0x2, 0x1, 0x2) socketpair(0x25, 0x6, 0x4, &(0x7f0000000480)) setsockopt$sock_attach_bpf(r6, 0x1, 0x3e, &(0x7f00000002c0)=r5, 0x4) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x6d, &(0x7f0000000cc0)=ANY=[@ANYRESHEX, @ANYBLOB="e99f619c950ec8069b69ac05520100000000000000572e83f4fd34a6db69715afdc8ec492fa879a8460bf2c7459f384ec36d6f0d833fccc87dc8f542ca0731ec72c3f6e0857c63572db61a83246496a2f90400569c8af42a5b8b1e3583115dfe3a40a792ffe638fd722afd02131c170175f382a8d78b6626d1d58220f08d98570bad00042a01c00748cf37385e7d66e6c0efddeb730ebd2f1ab4e816cf7493cf236ca5eb6e5d2a65519a7acf475dbd9fb52eb50ddcf9cee74529f59a2d6cfe6c23f6a688719f922099394146621132f866439970571e206ac47123f2d9cdb5cb7c8506122300000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000)={0x0, 0x8}, 0x10}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r7, 0x18000000000002a0, 0x42, 0x0, &(0x7f0000000800)="b9ff0300600d698cb89e14f088a81fffffff00004000630677fbac14140ee934a0a662079f4b4d2f87e5feca6aab845013f2325f1a39010108038da1924425181aa5", 0x0, 0x28000, 0x60000000, 0x113, 0x0, &(0x7f00000006c0)="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"}, 0x40) r8 = bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x17, 0x6, &(0x7f0000000c00)=ANY=[], &(0x7f00000002c0)='GPL\x00', 0x2, 0x0, 0x0, 0x40f00, 0x8, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000340)={0x1, 0x10000003}, 0x8, 0x10, &(0x7f0000000380)={0x0, 0xa, 0x83, 0x2}, 0x10}, 0x78) ioctl$sock_kcm_SIOCKCMATTACH(r4, 0x89e0, &(0x7f0000000500)={0xffffffffffffffff, r8}) 06:08:57 executing program 2: pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x5, 0x0) splice(r1, 0x0, r0, 0x0, 0x1000000008, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) syz_open_dev$video(0x0, 0x0, 0x0) splice(0xffffffffffffffff, 0x0, r2, 0x0, 0x1000000008, 0x0) 06:08:57 executing program 3: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x80801, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @ipv4}, 0x1c) getsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x3d, &(0x7f0000000300)={@dev}, &(0x7f00000004c0)=0x20) 06:08:58 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000100)={0x26, 'hash\x00', 0x0, 0x0, 'crct10dif-generic\x00'}, 0x58) r3 = accept$alg(r2, 0x0, 0x0) r4 = accept4(r3, 0x0, 0x0, 0x0) splice(r0, 0x0, r4, 0x0, 0x30007, 0x0) 06:08:58 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet_udp_int(r0, 0x11, 0x67, &(0x7f0000000140)=0x6, 0x4) sendmmsg(r0, &(0x7f0000006f00)=[{{&(0x7f0000000040)=@in={0x2, 0x4e23, @remote}, 0x80, &(0x7f0000000100)=[{&(0x7f00000000c0)="e04013b497936ecafdd12c496f522cc2830fd358bc8f890e410223906070a39cc6e2f84a8622c5f86cad52bba1560397737a6cce189d7db27e", 0x39}], 0x1}}, {{0x0, 0x0, &(0x7f0000000440)=[{&(0x7f0000000200)="9544939c01e602e8fc696947591d4c6fb3cb9a7cf9e53555dac91c09bbd33a6e85981e045d", 0x25}, {&(0x7f0000000240)="b995a5bf327c6f291a70af1527c6eb87af6b40c22e784c7d81102b1d2c4f5434d0142b1efa49361c7fa370cde02cbad1cdf556d5ebe84042e5b1eee75566d3c3bd4e54fb80c6258eb985131872c446ae99febe93703f66f4e0e10392c8a0d30f35710c7490190fef84833442ab74de59e4c9ebbc7cfe3f26750c16970d537ab353640e9e46e706cd200383135bfbf29b19c2fe729da592a9fb74eca37cb46775eb6db0118a3c59ac107fcf691822488d67f90e891045cb2ea35a79b6cd27c9fa5f37c9f6d6e4e2ca9267b2a8aa34f9727b0f539f", 0xd4}, {&(0x7f0000000340)="529cd4456bccdb80c030fe01e5cd61704126c8d4e7", 0x15}, {&(0x7f0000000380)="c2597979197f75ed6b82c8bcbf2c6b92a9a53fdd74646d60f9941ca27e", 0x1d}], 0x4}}], 0x2, 0x4c004) sendmmsg(r0, &(0x7f0000007fc0), 0x800001d, 0x0) 06:08:58 executing program 3: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x80801, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @ipv4}, 0x1c) getsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x3d, &(0x7f0000000300)={@dev}, &(0x7f00000004c0)=0x20) 06:08:58 executing program 2: pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x5, 0x0) splice(r1, 0x0, r0, 0x0, 0x1000000008, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) syz_open_dev$video(0x0, 0x0, 0x0) splice(0xffffffffffffffff, 0x0, r2, 0x0, 0x1000000008, 0x0) 06:08:58 executing program 0: r0 = perf_event_open(&(0x7f0000000640)={0x3, 0x70, 0x3e7, 0x0, 0x4, 0x0, 0x0, 0x0, 0x91dd7106ca8fd33b, 0xdb3fedb3c3734f95, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x40000000000, 0x0, 0x1, 0x0, @perf_config_ext={0x18, 0x3}, 0x21, 0x10000000000000, 0x0, 0x0, 0x0, 0x20000007, 0x2}, 0x0, 0xc, 0xffffffffffffffff, 0xa) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='cpuacct.stat\x00', 0x0, 0x0) r2 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r2, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f00000003c0)='syz1\x00', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000300)='./cgroup/syz0\x00', 0x200002, 0x0) gettid() socket$kcm(0x11, 0xb, 0x0) ioctl$TUNSETTXFILTER(r1, 0x400454d1, &(0x7f00000000c0)=ANY=[@ANYBLOB="00000700000000da6500bbc4bbbbbbbb0180c2000016000000004dc23f0c000000000000bb"]) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000040)=@ipx={0x4, 0x1, 0x0, "2bfaec665b4b", 0xff}, 0x80, 0x0}, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={0xffffffffffffffff, 0x1, 0x49c42ca22ab5a9ac, 0x4, 0x0}, 0x20) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x908b7aabaa7d2404) socket$kcm(0xa, 0x6, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x4000011) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000000c0), 0x0}, 0x28) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x89f1, &(0x7f0000000000)='ip6gre0\x00') perf_event_open(&(0x7f00000004c0)={0x0, 0x70, 0x8, 0x6, 0x0, 0x3, 0x0, 0x3, 0x4, 0x0, 0x9, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x1000, 0x0, @perf_config_ext={0x1ff}, 0x40004, 0xfffffffffffffffd, 0x0, 0x8, 0x8, 0x4, 0x80}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0x10, 0x0, 0x10) sendmsg$kcm(r4, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d200040080000048000001000080000000000300f88000f01700d4bd", 0x2e}], 0xf}, 0x40094) r5 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r6 = socket$kcm(0x2, 0x1, 0x2) socketpair(0x25, 0x6, 0x4, &(0x7f0000000480)) setsockopt$sock_attach_bpf(r6, 0x1, 0x3e, &(0x7f00000002c0)=r5, 0x4) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x6d, &(0x7f0000000cc0)=ANY=[@ANYRESHEX, @ANYBLOB="e99f619c950ec8069b69ac05520100000000000000572e83f4fd34a6db69715afdc8ec492fa879a8460bf2c7459f384ec36d6f0d833fccc87dc8f542ca0731ec72c3f6e0857c63572db61a83246496a2f90400569c8af42a5b8b1e3583115dfe3a40a792ffe638fd722afd02131c170175f382a8d78b6626d1d58220f08d98570bad00042a01c00748cf37385e7d66e6c0efddeb730ebd2f1ab4e816cf7493cf236ca5eb6e5d2a65519a7acf475dbd9fb52eb50ddcf9cee74529f59a2d6cfe6c23f6a688719f922099394146621132f866439970571e206ac47123f2d9cdb5cb7c8506122300000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000)={0x0, 0x8}, 0x10}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r7, 0x18000000000002a0, 0x42, 0x0, &(0x7f0000000800)="b9ff0300600d698cb89e14f088a81fffffff00004000630677fbac14140ee934a0a662079f4b4d2f87e5feca6aab845013f2325f1a39010108038da1924425181aa5", 0x0, 0x28000, 0x60000000, 0x113, 0x0, &(0x7f00000006c0)="097baacf569909ebb78a19b4d4f607feb3072ad9474026c7c148d184a2647de87a8fd14ad5d15cadabd6c7545b05000000ad90e0d4000000000f3f750d2a75f6fa77d3fa4e023987f7a54b04eb238604aa90cab7b44f95ae6ce9b5f877439af64cb6573e5bc85c5e766604ff55b7a234246bd2ee44c9e99d69190bbe089603846d17b8678d05a0bda6ae300ca8c43271b65bb62b0af61bf4da3891f5bcf900ed368b36e2db9957b0dfa5cf084db8cb2b2c54661f9eac8a58a72fc9e768405eb33bce450dd088d2e16d757eeb1239a2389330535afb4944b7b27c4b26d812ab58864f3ffa3ce8cf739275492a0c90b425a792a19b9abf846b926e9f93f4b57ab77c0db63fb7d5a1e04ef52157f14f1dedcc4437"}, 0x40) r8 = bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x17, 0x6, &(0x7f0000000c00)=ANY=[], &(0x7f00000002c0)='GPL\x00', 0x2, 0x0, 0x0, 0x40f00, 0x8, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000340)={0x1, 0x10000003}, 0x8, 0x10, &(0x7f0000000380)={0x0, 0xa, 0x83, 0x2}, 0x10}, 0x78) ioctl$sock_kcm_SIOCKCMATTACH(r4, 0x89e0, &(0x7f0000000500)={0xffffffffffffffff, r8}) 06:08:58 executing program 4: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f00000000c0)=0xe) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0x40047438, &(0x7f0000000180)=""/246) ioctl$PPPIOCSFLAGS1(r0, 0x40047457, &(0x7f0000000000)) 06:08:58 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet_udp_int(r0, 0x11, 0x67, &(0x7f0000000140)=0x6, 0x4) sendmmsg(r0, &(0x7f0000006f00)=[{{&(0x7f0000000040)=@in={0x2, 0x4e23, @remote}, 0x80, &(0x7f0000000100)=[{&(0x7f00000000c0)="e04013b497936ecafdd12c496f522cc2830fd358bc8f890e410223906070a39cc6e2f84a8622c5f86cad52bba1560397737a6cce189d7db27e", 0x39}], 0x1}}, {{0x0, 0x0, &(0x7f0000000440)=[{&(0x7f0000000200)="9544939c01e602e8fc696947591d4c6fb3cb9a7cf9e53555dac91c09bbd33a6e85981e045d", 0x25}, {&(0x7f0000000240)="b995a5bf327c6f291a70af1527c6eb87af6b40c22e784c7d81102b1d2c4f5434d0142b1efa49361c7fa370cde02cbad1cdf556d5ebe84042e5b1eee75566d3c3bd4e54fb80c6258eb985131872c446ae99febe93703f66f4e0e10392c8a0d30f35710c7490190fef84833442ab74de59e4c9ebbc7cfe3f26750c16970d537ab353640e9e46e706cd200383135bfbf29b19c2fe729da592a9fb74eca37cb46775eb6db0118a3c59ac107fcf691822488d67f90e891045cb2ea35a79b6cd27c9fa5f37c9f6d6e4e2ca9267b2a8aa34f9727b0f539f", 0xd4}, {&(0x7f0000000340)="529cd4456bccdb80c030fe01e5cd61704126c8d4e7", 0x15}, {&(0x7f0000000380)="c2597979197f75ed6b82c8bcbf2c6b92a9a53fdd74646d60f9941ca27e", 0x1d}], 0x4}}], 0x2, 0x4c004) sendmmsg(r0, &(0x7f0000007fc0), 0x800001d, 0x0) [ 241.682288][T10756] IPVS: ftp: loaded support on port[0] = 21 06:08:58 executing program 2: pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x5, 0x0) splice(r1, 0x0, r0, 0x0, 0x1000000008, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) syz_open_dev$video(0x0, 0x0, 0x0) splice(0xffffffffffffffff, 0x0, r2, 0x0, 0x1000000008, 0x0) 06:08:58 executing program 3: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @ipv4}, 0x1c) getsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x3d, &(0x7f0000000300)={@dev}, &(0x7f00000004c0)=0x20) 06:08:58 executing program 0: r0 = perf_event_open(&(0x7f0000000640)={0x3, 0x70, 0x3e7, 0x0, 0x4, 0x0, 0x0, 0x0, 0x91dd7106ca8fd33b, 0xdb3fedb3c3734f95, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x40000000000, 0x0, 0x1, 0x0, @perf_config_ext={0x18, 0x3}, 0x21, 0x10000000000000, 0x0, 0x0, 0x0, 0x20000007, 0x2}, 0x0, 0xc, 0xffffffffffffffff, 0xa) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='cpuacct.stat\x00', 0x0, 0x0) r2 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r2, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f00000003c0)='syz1\x00', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000300)='./cgroup/syz0\x00', 0x200002, 0x0) gettid() socket$kcm(0x11, 0xb, 0x0) ioctl$TUNSETTXFILTER(r1, 0x400454d1, &(0x7f00000000c0)=ANY=[@ANYBLOB="00000700000000da6500bbc4bbbbbbbb0180c2000016000000004dc23f0c000000000000bb"]) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000040)=@ipx={0x4, 0x1, 0x0, "2bfaec665b4b", 0xff}, 0x80, 0x0}, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={0xffffffffffffffff, 0x1, 0x49c42ca22ab5a9ac, 0x4, 0x0}, 0x20) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x908b7aabaa7d2404) socket$kcm(0xa, 0x6, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x4000011) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000000c0), 0x0}, 0x28) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x89f1, &(0x7f0000000000)='ip6gre0\x00') perf_event_open(&(0x7f00000004c0)={0x0, 0x70, 0x8, 0x6, 0x0, 0x3, 0x0, 0x3, 0x4, 0x0, 0x9, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x1000, 0x0, @perf_config_ext={0x1ff}, 0x40004, 0xfffffffffffffffd, 0x0, 0x8, 0x8, 0x4, 0x80}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0x10, 0x0, 0x10) sendmsg$kcm(r4, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d200040080000048000001000080000000000300f88000f01700d4bd", 0x2e}], 0xf}, 0x40094) r5 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r6 = socket$kcm(0x2, 0x1, 0x2) socketpair(0x25, 0x6, 0x4, &(0x7f0000000480)) setsockopt$sock_attach_bpf(r6, 0x1, 0x3e, &(0x7f00000002c0)=r5, 0x4) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x6d, &(0x7f0000000cc0)=ANY=[@ANYRESHEX, @ANYBLOB="e99f619c950ec8069b69ac05520100000000000000572e83f4fd34a6db69715afdc8ec492fa879a8460bf2c7459f384ec36d6f0d833fccc87dc8f542ca0731ec72c3f6e0857c63572db61a83246496a2f90400569c8af42a5b8b1e3583115dfe3a40a792ffe638fd722afd02131c170175f382a8d78b6626d1d58220f08d98570bad00042a01c00748cf37385e7d66e6c0efddeb730ebd2f1ab4e816cf7493cf236ca5eb6e5d2a65519a7acf475dbd9fb52eb50ddcf9cee74529f59a2d6cfe6c23f6a688719f922099394146621132f866439970571e206ac47123f2d9cdb5cb7c8506122300000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000)={0x0, 0x8}, 0x10}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r7, 0x18000000000002a0, 0x42, 0x0, &(0x7f0000000800)="b9ff0300600d698cb89e14f088a81fffffff00004000630677fbac14140ee934a0a662079f4b4d2f87e5feca6aab845013f2325f1a39010108038da1924425181aa5", 0x0, 0x28000, 0x60000000, 0x113, 0x0, &(0x7f00000006c0)="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"}, 0x40) r8 = bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x17, 0x6, &(0x7f0000000c00)=ANY=[], &(0x7f00000002c0)='GPL\x00', 0x2, 0x0, 0x0, 0x40f00, 0x8, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000340)={0x1, 0x10000003}, 0x8, 0x10, &(0x7f0000000380)={0x0, 0xa, 0x83, 0x2}, 0x10}, 0x78) ioctl$sock_kcm_SIOCKCMATTACH(r4, 0x89e0, &(0x7f0000000500)={0xffffffffffffffff, r8}) 06:08:58 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet_udp_int(r0, 0x11, 0x67, &(0x7f0000000140)=0x6, 0x4) sendmmsg(r0, &(0x7f0000006f00)=[{{&(0x7f0000000040)=@in={0x2, 0x4e23, @remote}, 0x80, &(0x7f0000000100)=[{&(0x7f00000000c0)="e04013b497936ecafdd12c496f522cc2830fd358bc8f890e410223906070a39cc6e2f84a8622c5f86cad52bba1560397737a6cce189d7db27e", 0x39}], 0x1}}, {{0x0, 0x0, &(0x7f0000000440)=[{&(0x7f0000000200)="9544939c01e602e8fc696947591d4c6fb3cb9a7cf9e53555dac91c09bbd33a6e85981e045d", 0x25}, {&(0x7f0000000240)="b995a5bf327c6f291a70af1527c6eb87af6b40c22e784c7d81102b1d2c4f5434d0142b1efa49361c7fa370cde02cbad1cdf556d5ebe84042e5b1eee75566d3c3bd4e54fb80c6258eb985131872c446ae99febe93703f66f4e0e10392c8a0d30f35710c7490190fef84833442ab74de59e4c9ebbc7cfe3f26750c16970d537ab353640e9e46e706cd200383135bfbf29b19c2fe729da592a9fb74eca37cb46775eb6db0118a3c59ac107fcf691822488d67f90e891045cb2ea35a79b6cd27c9fa5f37c9f6d6e4e2ca9267b2a8aa34f9727b0f539f", 0xd4}, {&(0x7f0000000340)="529cd4456bccdb80c030fe01e5cd61704126c8d4e7", 0x15}, {&(0x7f0000000380)="c2597979197f75ed6b82c8bcbf2c6b92a9a53fdd74646d60f9941ca27e", 0x1d}], 0x4}}], 0x2, 0x4c004) sendmmsg(r0, &(0x7f0000007fc0), 0x800001d, 0x0) 06:08:58 executing program 2: pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x5, 0x0) splice(r1, 0x0, r0, 0x0, 0x1000000008, 0x0) pipe(&(0x7f00000001c0)) r2 = syz_open_dev$video(0x0, 0x0, 0x0) splice(r2, 0x0, 0xffffffffffffffff, 0x0, 0x1000000008, 0x0) 06:08:59 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000100)={0x26, 'hash\x00', 0x0, 0x0, 'crct10dif-generic\x00'}, 0x58) r4 = accept$alg(r3, 0x0, 0x0) r5 = accept4(r4, 0x0, 0x0, 0x0) splice(r0, 0x0, r5, 0x0, 0x30007, 0x0) 06:08:59 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet_udp_int(r0, 0x11, 0x67, &(0x7f0000000140)=0x6, 0x4) sendmmsg(r0, &(0x7f0000006f00)=[{{&(0x7f0000000040)=@in={0x2, 0x4e23, @remote}, 0x80, &(0x7f0000000100)=[{&(0x7f00000000c0)="e04013b497936ecafdd12c496f522cc2830fd358bc8f890e410223906070a39cc6e2f84a8622c5f86cad52bba1560397737a6cce189d7db27e", 0x39}], 0x1}}, {{0x0, 0x0, &(0x7f0000000440)=[{&(0x7f0000000200)="9544939c01e602e8fc696947591d4c6fb3cb9a7cf9e53555dac91c09bbd33a6e85981e045d", 0x25}, {&(0x7f0000000340)="529cd4456bccdb80c030fe01e5cd61704126c8d4e7ec", 0x16}, {&(0x7f0000000380)="c2597979197f75ed6b82c8bcbf2c6b92a9a53fdd74646d60f9941ca27e", 0x1d}], 0x3}}], 0x2, 0x4c004) sendmmsg(r0, &(0x7f0000007fc0), 0x800001d, 0x0) 06:08:59 executing program 3: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @ipv4}, 0x1c) getsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x3d, &(0x7f0000000300)={@dev}, &(0x7f00000004c0)=0x20) 06:08:59 executing program 0: r0 = perf_event_open(&(0x7f0000000640)={0x3, 0x70, 0x3e7, 0x0, 0x4, 0x0, 0x0, 0x0, 0x91dd7106ca8fd33b, 0xdb3fedb3c3734f95, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x40000000000, 0x0, 0x1, 0x0, @perf_config_ext={0x18, 0x3}, 0x21, 0x10000000000000, 0x0, 0x0, 0x0, 0x20000007, 0x2}, 0x0, 0xc, 0xffffffffffffffff, 0xa) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='cpuacct.stat\x00', 0x0, 0x0) r2 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r2, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0xfffffffffffffffc) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000300)='./cgroup/syz0\x00', 0x200002, 0x0) gettid() socket$kcm(0x11, 0xb, 0x0) ioctl$TUNSETTXFILTER(r1, 0x400454d1, &(0x7f00000000c0)=ANY=[@ANYBLOB="00000700000000da6500bbc4bbbbbbbb0180c2000016000000004dc23f0c000000000000bb"]) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000040)=@ipx={0x4, 0x1, 0x0, "2bfaec665b4b", 0xff}, 0x80, 0x0}, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={0xffffffffffffffff, 0x1, 0x49c42ca22ab5a9ac, 0x4, 0x0}, 0x20) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x908b7aabaa7d2404) socket$kcm(0xa, 0x6, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x4000011) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000000c0), 0x0}, 0x28) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x89f1, &(0x7f0000000000)='ip6gre0\x00') perf_event_open(&(0x7f00000004c0)={0x0, 0x70, 0x8, 0x6, 0x0, 0x3, 0x0, 0x3, 0x4, 0x0, 0x9, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x1000, 0x0, @perf_config_ext={0x1ff}, 0x40004, 0xfffffffffffffffd, 0x0, 0x8, 0x8, 0x4, 0x80}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0x10, 0x0, 0x10) sendmsg$kcm(r4, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d200040080000048000001000080000000000300f88000f01700d4bd", 0x2e}], 0xf}, 0x40094) r5 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r6 = socket$kcm(0x2, 0x1, 0x2) socketpair(0x25, 0x6, 0x4, &(0x7f0000000480)) setsockopt$sock_attach_bpf(r6, 0x1, 0x3e, &(0x7f00000002c0)=r5, 0x4) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x6d, &(0x7f0000000cc0)=ANY=[@ANYRESHEX, @ANYBLOB="e99f619c950ec8069b69ac05520100000000000000572e83f4fd34a6db69715afdc8ec492fa879a8460bf2c7459f384ec36d6f0d833fccc87dc8f542ca0731ec72c3f6e0857c63572db61a83246496a2f90400569c8af42a5b8b1e3583115dfe3a40a792ffe638fd722afd02131c170175f382a8d78b6626d1d58220f08d98570bad00042a01c00748cf37385e7d66e6c0efddeb730ebd2f1ab4e816cf7493cf236ca5eb6e5d2a65519a7acf475dbd9fb52eb50ddcf9cee74529f59a2d6cfe6c23f6a688719f922099394146621132f866439970571e206ac47123f2d9cdb5cb7c8506122300000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000)={0x0, 0x8}, 0x10}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r7, 0x18000000000002a0, 0x42, 0x0, &(0x7f0000000800)="b9ff0300600d698cb89e14f088a81fffffff00004000630677fbac14140ee934a0a662079f4b4d2f87e5feca6aab845013f2325f1a39010108038da1924425181aa5", 0x0, 0x28000, 0x60000000, 0x113, 0x0, &(0x7f00000006c0)="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"}, 0x40) r8 = bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x17, 0x6, &(0x7f0000000c00)=ANY=[], &(0x7f00000002c0)='GPL\x00', 0x2, 0x0, 0x0, 0x40f00, 0x8, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000340)={0x1, 0x10000003}, 0x8, 0x10, &(0x7f0000000380)={0x0, 0xa, 0x83, 0x2}, 0x10}, 0x78) ioctl$sock_kcm_SIOCKCMATTACH(r4, 0x89e0, &(0x7f0000000500)={0xffffffffffffffff, r8}) 06:08:59 executing program 2: pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x5, 0x0) splice(r1, 0x0, r0, 0x0, 0x1000000008, 0x0) pipe(&(0x7f00000001c0)) r2 = syz_open_dev$video(0x0, 0x0, 0x0) splice(r2, 0x0, 0xffffffffffffffff, 0x0, 0x1000000008, 0x0) 06:08:59 executing program 4: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f00000000c0)=0xe) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0x40047438, &(0x7f0000000180)=""/246) ioctl$PPPIOCSFLAGS1(r0, 0x40047457, &(0x7f0000000000)) 06:08:59 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet_udp_int(r0, 0x11, 0x67, &(0x7f0000000140)=0x6, 0x4) sendmmsg(r0, &(0x7f0000006f00)=[{{&(0x7f0000000040)=@in={0x2, 0x4e23, @remote}, 0x80, &(0x7f0000000100)=[{&(0x7f00000000c0)="e04013b497936ecafdd12c496f522cc2830fd358bc8f890e410223906070a39cc6e2f84a8622c5f86cad52bba1560397737a6cce189d7db27e", 0x39}], 0x1}}, {{0x0, 0x0, &(0x7f0000000440)=[{&(0x7f0000000200)="9544939c01e602e8fc696947591d4c6fb3cb9a7cf9e53555dac91c09bbd33a6e85981e045d", 0x25}, {&(0x7f0000000340)="529cd4456bccdb80c030fe01e5cd61704126c8d4e7ec", 0x16}, {&(0x7f0000000380)="c2597979197f75ed6b82c8bcbf2c6b92a9a53fdd74646d60f9941ca27e", 0x1d}], 0x3}}], 0x2, 0x4c004) sendmmsg(r0, &(0x7f0000007fc0), 0x800001d, 0x0) [ 242.714976][T10826] IPVS: ftp: loaded support on port[0] = 21 06:08:59 executing program 0: r0 = perf_event_open(&(0x7f0000000640)={0x3, 0x70, 0x3e7, 0x0, 0x4, 0x0, 0x0, 0x0, 0x91dd7106ca8fd33b, 0xdb3fedb3c3734f95, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x40000000000, 0x0, 0x1, 0x0, @perf_config_ext={0x18, 0x3}, 0x21, 0x10000000000000, 0x0, 0x0, 0x0, 0x20000007, 0x2}, 0x0, 0xc, 0xffffffffffffffff, 0xa) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='cpuacct.stat\x00', 0x0, 0x0) r2 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r2, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0xfffffffffffffffc) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000300)='./cgroup/syz0\x00', 0x200002, 0x0) gettid() socket$kcm(0x11, 0xb, 0x0) ioctl$TUNSETTXFILTER(r1, 0x400454d1, &(0x7f00000000c0)=ANY=[@ANYBLOB="00000700000000da6500bbc4bbbbbbbb0180c2000016000000004dc23f0c000000000000bb"]) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000040)=@ipx={0x4, 0x1, 0x0, "2bfaec665b4b", 0xff}, 0x80, 0x0}, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={0xffffffffffffffff, 0x1, 0x49c42ca22ab5a9ac, 0x4, 0x0}, 0x20) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x908b7aabaa7d2404) socket$kcm(0xa, 0x6, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x4000011) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000000c0), 0x0}, 0x28) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x89f1, &(0x7f0000000000)='ip6gre0\x00') perf_event_open(&(0x7f00000004c0)={0x0, 0x70, 0x8, 0x6, 0x0, 0x3, 0x0, 0x3, 0x4, 0x0, 0x9, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x1000, 0x0, @perf_config_ext={0x1ff}, 0x40004, 0xfffffffffffffffd, 0x0, 0x8, 0x8, 0x4, 0x80}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0x10, 0x0, 0x10) sendmsg$kcm(r4, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d200040080000048000001000080000000000300f88000f01700d4bd", 0x2e}], 0xf}, 0x40094) r5 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r6 = socket$kcm(0x2, 0x1, 0x2) socketpair(0x25, 0x6, 0x4, &(0x7f0000000480)) setsockopt$sock_attach_bpf(r6, 0x1, 0x3e, &(0x7f00000002c0)=r5, 0x4) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x6d, &(0x7f0000000cc0)=ANY=[@ANYRESHEX, @ANYBLOB="e99f619c950ec8069b69ac05520100000000000000572e83f4fd34a6db69715afdc8ec492fa879a8460bf2c7459f384ec36d6f0d833fccc87dc8f542ca0731ec72c3f6e0857c63572db61a83246496a2f90400569c8af42a5b8b1e3583115dfe3a40a792ffe638fd722afd02131c170175f382a8d78b6626d1d58220f08d98570bad00042a01c00748cf37385e7d66e6c0efddeb730ebd2f1ab4e816cf7493cf236ca5eb6e5d2a65519a7acf475dbd9fb52eb50ddcf9cee74529f59a2d6cfe6c23f6a688719f922099394146621132f866439970571e206ac47123f2d9cdb5cb7c8506122300000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000)={0x0, 0x8}, 0x10}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r7, 0x18000000000002a0, 0x42, 0x0, &(0x7f0000000800)="b9ff0300600d698cb89e14f088a81fffffff00004000630677fbac14140ee934a0a662079f4b4d2f87e5feca6aab845013f2325f1a39010108038da1924425181aa5", 0x0, 0x28000, 0x60000000, 0x113, 0x0, &(0x7f00000006c0)="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"}, 0x40) r8 = bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x17, 0x6, &(0x7f0000000c00)=ANY=[], &(0x7f00000002c0)='GPL\x00', 0x2, 0x0, 0x0, 0x40f00, 0x8, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000340)={0x1, 0x10000003}, 0x8, 0x10, &(0x7f0000000380)={0x0, 0xa, 0x83, 0x2}, 0x10}, 0x78) ioctl$sock_kcm_SIOCKCMATTACH(r4, 0x89e0, &(0x7f0000000500)={0xffffffffffffffff, r8}) 06:08:59 executing program 3: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @ipv4}, 0x1c) getsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x3d, &(0x7f0000000300)={@dev}, &(0x7f00000004c0)=0x20) 06:08:59 executing program 2: pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x5, 0x0) splice(r1, 0x0, r0, 0x0, 0x1000000008, 0x0) pipe(&(0x7f00000001c0)) r2 = syz_open_dev$video(0x0, 0x0, 0x0) splice(r2, 0x0, 0xffffffffffffffff, 0x0, 0x1000000008, 0x0) 06:08:59 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet_udp_int(r0, 0x11, 0x67, &(0x7f0000000140)=0x6, 0x4) sendmmsg(r0, &(0x7f0000006f00)=[{{&(0x7f0000000040)=@in={0x2, 0x4e23, @remote}, 0x80, &(0x7f0000000100)=[{&(0x7f00000000c0)="e04013b497936ecafdd12c496f522cc2830fd358bc8f890e410223906070a39cc6e2f84a8622c5f86cad52bba1560397737a6cce189d7db27e", 0x39}], 0x1}}, {{0x0, 0x0, &(0x7f0000000440)=[{&(0x7f0000000200)="9544939c01e602e8fc696947591d4c6fb3cb9a7cf9e53555dac91c09bbd33a6e85981e045d", 0x25}, {&(0x7f0000000340)="529cd4456bccdb80c030fe01e5cd61704126c8d4e7ec", 0x16}, {&(0x7f0000000380)="c2597979197f75ed6b82c8bcbf2c6b92a9a53fdd74646d60f9941ca27e", 0x1d}], 0x3}}], 0x2, 0x4c004) sendmmsg(r0, &(0x7f0000007fc0), 0x800001d, 0x0) 06:08:59 executing program 2: pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x5, 0x0) splice(r1, 0x0, r0, 0x0, 0x1000000008, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = syz_open_dev$video(0x0, 0x0, 0x0) splice(r3, 0x0, r2, 0x0, 0x0, 0x0) 06:09:00 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000100)={0x26, 'hash\x00', 0x0, 0x0, 'crct10dif-generic\x00'}, 0x58) r4 = accept$alg(r3, 0x0, 0x0) r5 = accept4(r4, 0x0, 0x0, 0x0) splice(r0, 0x0, r5, 0x0, 0x30007, 0x0) 06:09:00 executing program 3: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x80801, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x0, 0x0, @ipv4}, 0x1c) getsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x3d, &(0x7f0000000300)={@dev}, &(0x7f00000004c0)=0x20) 06:09:00 executing program 4: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f00000000c0)=0xe) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0x40047438, &(0x7f0000000180)=""/246) ioctl$PPPIOCSFLAGS1(r0, 0x40047457, &(0x7f0000000000)) 06:09:00 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet_udp_int(r0, 0x11, 0x67, &(0x7f0000000140)=0x6, 0x4) sendmmsg(r0, &(0x7f0000006f00)=[{{&(0x7f0000000040)=@in={0x2, 0x4e23, @remote}, 0x80, &(0x7f0000000100)=[{&(0x7f00000000c0)="e04013b497936ecafdd12c496f522cc2830fd358bc8f890e410223906070a39cc6e2f84a8622c5f86cad52bba1560397737a6cce189d7db27e", 0x39}], 0x1}}, {{0x0, 0x0, &(0x7f0000000440)=[{&(0x7f0000000200)="9544939c01e602e8fc696947591d4c6fb3cb9a7cf9e53555dac91c09bbd33a6e85981e045d", 0x25}, {0x0}, {&(0x7f0000000340)="529cd4456bccdb80c030fe01e5cd61704126c8d4e7ec", 0x16}, {&(0x7f0000000380)="c2597979197f75ed6b82c8bcbf2c6b92a9a53fdd74646d60f9941ca27e", 0x1d}], 0x4}}], 0x2, 0x4c004) sendmmsg(r0, &(0x7f0000007fc0), 0x800001d, 0x0) 06:09:00 executing program 0: r0 = perf_event_open(&(0x7f0000000640)={0x3, 0x70, 0x3e7, 0x0, 0x4, 0x0, 0x0, 0x0, 0x91dd7106ca8fd33b, 0xdb3fedb3c3734f95, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x40000000000, 0x0, 0x1, 0x0, @perf_config_ext={0x18, 0x3}, 0x21, 0x10000000000000, 0x0, 0x0, 0x0, 0x20000007, 0x2}, 0x0, 0xc, 0xffffffffffffffff, 0xa) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='cpuacct.stat\x00', 0x0, 0x0) r2 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r2, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0xfffffffffffffffc) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000300)='./cgroup/syz0\x00', 0x200002, 0x0) gettid() socket$kcm(0x11, 0xb, 0x0) ioctl$TUNSETTXFILTER(r1, 0x400454d1, &(0x7f00000000c0)=ANY=[@ANYBLOB="00000700000000da6500bbc4bbbbbbbb0180c2000016000000004dc23f0c000000000000bb"]) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000040)=@ipx={0x4, 0x1, 0x0, "2bfaec665b4b", 0xff}, 0x80, 0x0}, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={0xffffffffffffffff, 0x1, 0x49c42ca22ab5a9ac, 0x4, 0x0}, 0x20) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x908b7aabaa7d2404) socket$kcm(0xa, 0x6, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x4000011) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000000c0), 0x0}, 0x28) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x89f1, &(0x7f0000000000)='ip6gre0\x00') perf_event_open(&(0x7f00000004c0)={0x0, 0x70, 0x8, 0x6, 0x0, 0x3, 0x0, 0x3, 0x4, 0x0, 0x9, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x1000, 0x0, @perf_config_ext={0x1ff}, 0x40004, 0xfffffffffffffffd, 0x0, 0x8, 0x8, 0x4, 0x80}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0x10, 0x0, 0x10) sendmsg$kcm(r4, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d200040080000048000001000080000000000300f88000f01700d4bd", 0x2e}], 0xf}, 0x40094) r5 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r6 = socket$kcm(0x2, 0x1, 0x2) socketpair(0x25, 0x6, 0x4, &(0x7f0000000480)) setsockopt$sock_attach_bpf(r6, 0x1, 0x3e, &(0x7f00000002c0)=r5, 0x4) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x6d, &(0x7f0000000cc0)=ANY=[@ANYRESHEX, @ANYBLOB="e99f619c950ec8069b69ac05520100000000000000572e83f4fd34a6db69715afdc8ec492fa879a8460bf2c7459f384ec36d6f0d833fccc87dc8f542ca0731ec72c3f6e0857c63572db61a83246496a2f90400569c8af42a5b8b1e3583115dfe3a40a792ffe638fd722afd02131c170175f382a8d78b6626d1d58220f08d98570bad00042a01c00748cf37385e7d66e6c0efddeb730ebd2f1ab4e816cf7493cf236ca5eb6e5d2a65519a7acf475dbd9fb52eb50ddcf9cee74529f59a2d6cfe6c23f6a688719f922099394146621132f866439970571e206ac47123f2d9cdb5cb7c8506122300000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000)={0x0, 0x8}, 0x10}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r7, 0x18000000000002a0, 0x42, 0x0, &(0x7f0000000800)="b9ff0300600d698cb89e14f088a81fffffff00004000630677fbac14140ee934a0a662079f4b4d2f87e5feca6aab845013f2325f1a39010108038da1924425181aa5", 0x0, 0x28000, 0x60000000, 0x113, 0x0, &(0x7f00000006c0)="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"}, 0x40) r8 = bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x17, 0x6, &(0x7f0000000c00)=ANY=[], &(0x7f00000002c0)='GPL\x00', 0x2, 0x0, 0x0, 0x40f00, 0x8, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000340)={0x1, 0x10000003}, 0x8, 0x10, &(0x7f0000000380)={0x0, 0xa, 0x83, 0x2}, 0x10}, 0x78) ioctl$sock_kcm_SIOCKCMATTACH(r4, 0x89e0, &(0x7f0000000500)={0xffffffffffffffff, r8}) 06:09:00 executing program 2: pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x5, 0x0) splice(r1, 0x0, r0, 0x0, 0x1000000008, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = syz_open_dev$video(0x0, 0x0, 0x0) splice(r3, 0x0, r2, 0x0, 0x0, 0x0) 06:09:00 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet_udp_int(r0, 0x11, 0x67, &(0x7f0000000140)=0x6, 0x4) sendmmsg(r0, &(0x7f0000006f00)=[{{&(0x7f0000000040)=@in={0x2, 0x4e23, @remote}, 0x80, &(0x7f0000000100)=[{&(0x7f00000000c0)="e04013b497936ecafdd12c496f522cc2830fd358bc8f890e410223906070a39cc6e2f84a8622c5f86cad52bba1560397737a6cce189d7db27e", 0x39}], 0x1}}, {{0x0, 0x0, &(0x7f0000000440)=[{&(0x7f0000000200)="9544939c01e602e8fc696947591d4c6fb3cb9a7cf9e53555dac91c09bbd33a6e85981e045d", 0x25}, {0x0}, {&(0x7f0000000340)="529cd4456bccdb80c030fe01e5cd61704126c8d4e7ec", 0x16}, {&(0x7f0000000380)="c2597979197f75ed6b82c8bcbf2c6b92a9a53fdd74646d60f9941ca27e", 0x1d}], 0x4}}], 0x2, 0x4c004) sendmmsg(r0, &(0x7f0000007fc0), 0x800001d, 0x0) [ 243.609704][T10887] IPVS: ftp: loaded support on port[0] = 21 06:09:00 executing program 2: pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x5, 0x0) splice(r1, 0x0, r0, 0x0, 0x1000000008, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = syz_open_dev$video(0x0, 0x0, 0x0) splice(r3, 0x0, r2, 0x0, 0x0, 0x0) 06:09:00 executing program 3: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x80801, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x0, 0x0, @ipv4}, 0x1c) getsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x3d, &(0x7f0000000300)={@dev}, &(0x7f00000004c0)=0x20) 06:09:00 executing program 0: r0 = perf_event_open(&(0x7f0000000640)={0x3, 0x70, 0x3e7, 0x0, 0x4, 0x0, 0x0, 0x0, 0x91dd7106ca8fd33b, 0xdb3fedb3c3734f95, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x40000000000, 0x0, 0x1, 0x0, @perf_config_ext={0x18, 0x3}, 0x21, 0x10000000000000, 0x0, 0x0, 0x0, 0x20000007, 0x2}, 0x0, 0xc, 0xffffffffffffffff, 0xa) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='cpuacct.stat\x00', 0x0, 0x0) r2 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r2, 0xc008240a, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f00000003c0)='syz1\x00', 0x200002, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0xfffffffffffffffc) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000300)='./cgroup/syz0\x00', 0x200002, 0x0) gettid() socket$kcm(0x11, 0xb, 0x0) ioctl$TUNSETTXFILTER(r1, 0x400454d1, &(0x7f00000000c0)=ANY=[@ANYBLOB="00000700000000da6500bbc4bbbbbbbb0180c2000016000000004dc23f0c000000000000bb"]) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000040)=@ipx={0x4, 0x1, 0x0, "2bfaec665b4b", 0xff}, 0x80, 0x0}, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={0xffffffffffffffff, 0x1, 0x49c42ca22ab5a9ac, 0x4, 0x0}, 0x20) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x908b7aabaa7d2404) socket$kcm(0xa, 0x6, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x4000011) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000000c0), 0x0}, 0x28) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x89f1, &(0x7f0000000000)='ip6gre0\x00') perf_event_open(&(0x7f00000004c0)={0x0, 0x70, 0x8, 0x6, 0x0, 0x3, 0x0, 0x3, 0x4, 0x0, 0x9, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x1000, 0x0, @perf_config_ext={0x1ff}, 0x40004, 0xfffffffffffffffd, 0x0, 0x8, 0x8, 0x4, 0x80}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0x10, 0x0, 0x10) sendmsg$kcm(r4, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d200040080000048000001000080000000000300f88000f01700d4bd", 0x2e}], 0xf}, 0x40094) r5 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r6 = socket$kcm(0x2, 0x1, 0x2) socketpair(0x25, 0x6, 0x4, &(0x7f0000000480)) setsockopt$sock_attach_bpf(r6, 0x1, 0x3e, &(0x7f00000002c0)=r5, 0x4) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x6d, &(0x7f0000000cc0)=ANY=[@ANYRESHEX, @ANYBLOB="e99f619c950ec8069b69ac05520100000000000000572e83f4fd34a6db69715afdc8ec492fa879a8460bf2c7459f384ec36d6f0d833fccc87dc8f542ca0731ec72c3f6e0857c63572db61a83246496a2f90400569c8af42a5b8b1e3583115dfe3a40a792ffe638fd722afd02131c170175f382a8d78b6626d1d58220f08d98570bad00042a01c00748cf37385e7d66e6c0efddeb730ebd2f1ab4e816cf7493cf236ca5eb6e5d2a65519a7acf475dbd9fb52eb50ddcf9cee74529f59a2d6cfe6c23f6a688719f922099394146621132f866439970571e206ac47123f2d9cdb5cb7c8506122300000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000)={0x0, 0x8}, 0x10}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r7, 0x18000000000002a0, 0x42, 0x0, &(0x7f0000000800)="b9ff0300600d698cb89e14f088a81fffffff00004000630677fbac14140ee934a0a662079f4b4d2f87e5feca6aab845013f2325f1a39010108038da1924425181aa5", 0x0, 0x28000, 0x60000000, 0x113, 0x0, &(0x7f00000006c0)="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"}, 0x40) r8 = bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x17, 0x6, &(0x7f0000000c00)=ANY=[], &(0x7f00000002c0)='GPL\x00', 0x2, 0x0, 0x0, 0x40f00, 0x8, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000340)={0x1, 0x10000003}, 0x8, 0x10, &(0x7f0000000380)={0x0, 0xa, 0x83, 0x2}, 0x10}, 0x78) ioctl$sock_kcm_SIOCKCMATTACH(r4, 0x89e0, &(0x7f0000000500)={0xffffffffffffffff, r8}) 06:09:00 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet_udp_int(r0, 0x11, 0x67, &(0x7f0000000140)=0x6, 0x4) sendmmsg(r0, &(0x7f0000006f00)=[{{&(0x7f0000000040)=@in={0x2, 0x4e23, @remote}, 0x80, &(0x7f0000000100)=[{&(0x7f00000000c0)="e04013b497936ecafdd12c496f522cc2830fd358bc8f890e410223906070a39cc6e2f84a8622c5f86cad52bba1560397737a6cce189d7db27e", 0x39}], 0x1}}, {{0x0, 0x0, &(0x7f0000000440)=[{&(0x7f0000000200)="9544939c01e602e8fc696947591d4c6fb3cb9a7cf9e53555dac91c09bbd33a6e85981e045d", 0x25}, {0x0}, {&(0x7f0000000340)="529cd4456bccdb80c030fe01e5cd61704126c8d4e7ec", 0x16}, {&(0x7f0000000380)="c2597979197f75ed6b82c8bcbf2c6b92a9a53fdd74646d60f9941ca27e", 0x1d}], 0x4}}], 0x2, 0x4c004) sendmmsg(r0, &(0x7f0000007fc0), 0x800001d, 0x0) 06:09:00 executing program 2: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x3, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$sock_int(r0, 0x1, 0x6, &(0x7f0000000140)=0x31, 0x4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x32}}, 0x10) connect$inet(r0, &(0x7f0000000500)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r0, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) 06:09:01 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000100)={0x26, 'hash\x00', 0x0, 0x0, 'crct10dif-generic\x00'}, 0x58) r4 = accept$alg(r3, 0x0, 0x0) r5 = accept4(r4, 0x0, 0x0, 0x0) splice(r0, 0x0, r5, 0x0, 0x30007, 0x0) 06:09:01 executing program 3: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x80801, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x0, 0x0, @ipv4}, 0x1c) getsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x3d, &(0x7f0000000300)={@dev}, &(0x7f00000004c0)=0x20) 06:09:01 executing program 4: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r1, 0x40047438, &(0x7f0000000180)=""/246) ioctl$PPPIOCSFLAGS1(r1, 0x40047457, &(0x7f0000000000)) 06:09:01 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet_udp_int(r0, 0x11, 0x67, &(0x7f0000000140)=0x6, 0x4) sendmmsg(r0, &(0x7f0000006f00)=[{{&(0x7f0000000040)=@in={0x2, 0x4e23, @remote}, 0x80, &(0x7f0000000100)=[{&(0x7f00000000c0)="e04013b497936ecafdd12c496f522cc2830fd358bc8f890e410223906070a39cc6e2f84a8622c5f86cad52bba1560397737a6cce189d7db27e", 0x39}], 0x1}}, {{0x0, 0x0, &(0x7f0000000440)=[{&(0x7f0000000200)="9544939c01e602e8fc696947591d4c6fb3cb9a7cf9e53555dac91c09bbd33a6e85981e045d", 0x25}, {&(0x7f0000000240)}, {&(0x7f0000000340)="529cd4456bccdb80c030fe01e5cd61704126c8d4e7ec", 0x16}, {&(0x7f0000000380)="c2597979197f75ed6b82c8bcbf2c6b92a9a53fdd74646d60f9941ca27e", 0x1d}], 0x4}}], 0x2, 0x4c004) sendmmsg(r0, &(0x7f0000007fc0), 0x800001d, 0x0) 06:09:01 executing program 0: r0 = perf_event_open(&(0x7f0000000640)={0x3, 0x70, 0x3e7, 0x0, 0x4, 0x0, 0x0, 0x0, 0x91dd7106ca8fd33b, 0xdb3fedb3c3734f95, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x40000000000, 0x0, 0x1, 0x0, @perf_config_ext={0x18, 0x3}, 0x21, 0x10000000000000, 0x0, 0x0, 0x0, 0x20000007, 0x2}, 0x0, 0xc, 0xffffffffffffffff, 0xa) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='cpuacct.stat\x00', 0x0, 0x0) r2 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r2, 0xc008240a, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f00000003c0)='syz1\x00', 0x200002, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0xfffffffffffffffc) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000300)='./cgroup/syz0\x00', 0x200002, 0x0) gettid() socket$kcm(0x11, 0xb, 0x0) ioctl$TUNSETTXFILTER(r1, 0x400454d1, &(0x7f00000000c0)=ANY=[@ANYBLOB="00000700000000da6500bbc4bbbbbbbb0180c2000016000000004dc23f0c000000000000bb"]) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000040)=@ipx={0x4, 0x1, 0x0, "2bfaec665b4b", 0xff}, 0x80, 0x0}, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={0xffffffffffffffff, 0x1, 0x49c42ca22ab5a9ac, 0x4, 0x0}, 0x20) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x908b7aabaa7d2404) socket$kcm(0xa, 0x6, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x4000011) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000000c0), 0x0}, 0x28) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x89f1, &(0x7f0000000000)='ip6gre0\x00') perf_event_open(&(0x7f00000004c0)={0x0, 0x70, 0x8, 0x6, 0x0, 0x3, 0x0, 0x3, 0x4, 0x0, 0x9, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x1000, 0x0, @perf_config_ext={0x1ff}, 0x40004, 0xfffffffffffffffd, 0x0, 0x8, 0x8, 0x4, 0x80}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0x10, 0x0, 0x10) sendmsg$kcm(r4, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d200040080000048000001000080000000000300f88000f01700d4bd", 0x2e}], 0xf}, 0x40094) r5 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r6 = socket$kcm(0x2, 0x1, 0x2) socketpair(0x25, 0x6, 0x4, &(0x7f0000000480)) setsockopt$sock_attach_bpf(r6, 0x1, 0x3e, &(0x7f00000002c0)=r5, 0x4) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x6d, &(0x7f0000000cc0)=ANY=[@ANYRESHEX, @ANYBLOB="e99f619c950ec8069b69ac05520100000000000000572e83f4fd34a6db69715afdc8ec492fa879a8460bf2c7459f384ec36d6f0d833fccc87dc8f542ca0731ec72c3f6e0857c63572db61a83246496a2f90400569c8af42a5b8b1e3583115dfe3a40a792ffe638fd722afd02131c170175f382a8d78b6626d1d58220f08d98570bad00042a01c00748cf37385e7d66e6c0efddeb730ebd2f1ab4e816cf7493cf236ca5eb6e5d2a65519a7acf475dbd9fb52eb50ddcf9cee74529f59a2d6cfe6c23f6a688719f922099394146621132f866439970571e206ac47123f2d9cdb5cb7c8506122300000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000)={0x0, 0x8}, 0x10}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r7, 0x18000000000002a0, 0x42, 0x0, &(0x7f0000000800)="b9ff0300600d698cb89e14f088a81fffffff00004000630677fbac14140ee934a0a662079f4b4d2f87e5feca6aab845013f2325f1a39010108038da1924425181aa5", 0x0, 0x28000, 0x60000000, 0x113, 0x0, &(0x7f00000006c0)="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"}, 0x40) r8 = bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x17, 0x6, &(0x7f0000000c00)=ANY=[], &(0x7f00000002c0)='GPL\x00', 0x2, 0x0, 0x0, 0x40f00, 0x8, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000340)={0x1, 0x10000003}, 0x8, 0x10, &(0x7f0000000380)={0x0, 0xa, 0x83, 0x2}, 0x10}, 0x78) ioctl$sock_kcm_SIOCKCMATTACH(r4, 0x89e0, &(0x7f0000000500)={0xffffffffffffffff, r8}) 06:09:01 executing program 2: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x3, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$sock_int(r0, 0x1, 0x6, &(0x7f0000000140)=0x31, 0x4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x32}}, 0x10) connect$inet(r0, &(0x7f0000000500)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r0, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) 06:09:01 executing program 3: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x80801, 0x0) connect$inet6(r0, 0x0, 0x0) getsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x3d, &(0x7f0000000300)={@dev}, &(0x7f00000004c0)=0x20) 06:09:01 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet_udp_int(r0, 0x11, 0x67, &(0x7f0000000140)=0x6, 0x4) sendmmsg(r0, &(0x7f0000006f00)=[{{&(0x7f0000000040)=@in={0x2, 0x4e23, @remote}, 0x80, &(0x7f0000000100)=[{&(0x7f00000000c0)="e04013b497936ecafdd12c496f522cc2830fd358bc8f890e410223906070a39cc6e2f84a8622c5f86cad52bba1560397737a6cce189d7db27e", 0x39}], 0x1}}, {{0x0, 0x0, &(0x7f0000000440)=[{&(0x7f0000000200)="9544939c01e602e8fc696947591d4c6fb3cb9a7cf9e53555dac91c09bbd33a6e85981e045d", 0x25}, {&(0x7f0000000240)}, {&(0x7f0000000340)="529cd4456bccdb80c030fe01e5cd61704126c8d4e7ec", 0x16}, {&(0x7f0000000380)="c2597979197f75ed6b82c8bcbf2c6b92a9a53fdd74646d60f9941ca27e", 0x1d}], 0x4}}], 0x2, 0x4c004) sendmmsg(r0, &(0x7f0000007fc0), 0x800001d, 0x0) [ 244.637075][T10953] IPVS: ftp: loaded support on port[0] = 21 06:09:01 executing program 0: r0 = perf_event_open(&(0x7f0000000640)={0x3, 0x70, 0x3e7, 0x0, 0x4, 0x0, 0x0, 0x0, 0x91dd7106ca8fd33b, 0xdb3fedb3c3734f95, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x40000000000, 0x0, 0x1, 0x0, @perf_config_ext={0x18, 0x3}, 0x21, 0x10000000000000, 0x0, 0x0, 0x0, 0x20000007, 0x2}, 0x0, 0xc, 0xffffffffffffffff, 0xa) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='cpuacct.stat\x00', 0x0, 0x0) r2 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r2, 0xc008240a, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f00000003c0)='syz1\x00', 0x200002, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0xfffffffffffffffc) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000300)='./cgroup/syz0\x00', 0x200002, 0x0) gettid() socket$kcm(0x11, 0xb, 0x0) ioctl$TUNSETTXFILTER(r1, 0x400454d1, &(0x7f00000000c0)=ANY=[@ANYBLOB="00000700000000da6500bbc4bbbbbbbb0180c2000016000000004dc23f0c000000000000bb"]) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000040)=@ipx={0x4, 0x1, 0x0, "2bfaec665b4b", 0xff}, 0x80, 0x0}, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={0xffffffffffffffff, 0x1, 0x49c42ca22ab5a9ac, 0x4, 0x0}, 0x20) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x908b7aabaa7d2404) socket$kcm(0xa, 0x6, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x4000011) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000000c0), 0x0}, 0x28) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x89f1, &(0x7f0000000000)='ip6gre0\x00') perf_event_open(&(0x7f00000004c0)={0x0, 0x70, 0x8, 0x6, 0x0, 0x3, 0x0, 0x3, 0x4, 0x0, 0x9, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x1000, 0x0, @perf_config_ext={0x1ff}, 0x40004, 0xfffffffffffffffd, 0x0, 0x8, 0x8, 0x4, 0x80}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0x10, 0x0, 0x10) sendmsg$kcm(r4, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d200040080000048000001000080000000000300f88000f01700d4bd", 0x2e}], 0xf}, 0x40094) r5 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r6 = socket$kcm(0x2, 0x1, 0x2) socketpair(0x25, 0x6, 0x4, &(0x7f0000000480)) setsockopt$sock_attach_bpf(r6, 0x1, 0x3e, &(0x7f00000002c0)=r5, 0x4) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x6d, &(0x7f0000000cc0)=ANY=[@ANYRESHEX, @ANYBLOB="e99f619c950ec8069b69ac05520100000000000000572e83f4fd34a6db69715afdc8ec492fa879a8460bf2c7459f384ec36d6f0d833fccc87dc8f542ca0731ec72c3f6e0857c63572db61a83246496a2f90400569c8af42a5b8b1e3583115dfe3a40a792ffe638fd722afd02131c170175f382a8d78b6626d1d58220f08d98570bad00042a01c00748cf37385e7d66e6c0efddeb730ebd2f1ab4e816cf7493cf236ca5eb6e5d2a65519a7acf475dbd9fb52eb50ddcf9cee74529f59a2d6cfe6c23f6a688719f922099394146621132f866439970571e206ac47123f2d9cdb5cb7c8506122300000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000)={0x0, 0x8}, 0x10}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r7, 0x18000000000002a0, 0x42, 0x0, &(0x7f0000000800)="b9ff0300600d698cb89e14f088a81fffffff00004000630677fbac14140ee934a0a662079f4b4d2f87e5feca6aab845013f2325f1a39010108038da1924425181aa5", 0x0, 0x28000, 0x60000000, 0x113, 0x0, &(0x7f00000006c0)="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"}, 0x40) r8 = bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x17, 0x6, &(0x7f0000000c00)=ANY=[], &(0x7f00000002c0)='GPL\x00', 0x2, 0x0, 0x0, 0x40f00, 0x8, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000340)={0x1, 0x10000003}, 0x8, 0x10, &(0x7f0000000380)={0x0, 0xa, 0x83, 0x2}, 0x10}, 0x78) ioctl$sock_kcm_SIOCKCMATTACH(r4, 0x89e0, &(0x7f0000000500)={0xffffffffffffffff, r8}) 06:09:01 executing program 3: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x80801, 0x0) connect$inet6(r0, 0x0, 0x0) getsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x3d, &(0x7f0000000300)={@dev}, &(0x7f00000004c0)=0x20) 06:09:01 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet_udp_int(r0, 0x11, 0x67, &(0x7f0000000140)=0x6, 0x4) sendmmsg(r0, &(0x7f0000006f00)=[{{&(0x7f0000000040)=@in={0x2, 0x4e23, @remote}, 0x80, &(0x7f0000000100)=[{&(0x7f00000000c0)="e04013b497936ecafdd12c496f522cc2830fd358bc8f890e410223906070a39cc6e2f84a8622c5f86cad52bba1560397737a6cce189d7db27e", 0x39}], 0x1}}, {{0x0, 0x0, &(0x7f0000000440)=[{&(0x7f0000000200)="9544939c01e602e8fc696947591d4c6fb3cb9a7cf9e53555dac91c09bbd33a6e85981e045d", 0x25}, {&(0x7f0000000240)}, {&(0x7f0000000340)="529cd4456bccdb80c030fe01e5cd61704126c8d4e7ec", 0x16}, {&(0x7f0000000380)="c2597979197f75ed6b82c8bcbf2c6b92a9a53fdd74646d60f9941ca27e", 0x1d}], 0x4}}], 0x2, 0x4c004) sendmmsg(r0, &(0x7f0000007fc0), 0x800001d, 0x0) 06:09:01 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='rpc_pipefs\x00', 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) getdents64(0xffffffffffffffff, &(0x7f00000002c0)=""/4096, 0x1000) r0 = open(&(0x7f0000000440)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000100)='cgroup.threads\x00', 0x2, 0x0) ioctl$SNDRV_PCM_IOCTL_HW_REFINE(r0, 0xc2604110, 0x0) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x0, 0x0) dup2(r1, 0xffffffffffffffff) r2 = open(&(0x7f0000000440)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r2, &(0x7f0000000340)='cgroup.procs\x00', 0x2, 0x0) ioctl$EVIOCGPROP(r2, 0xc004743e, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000001580)={{{@in6=@empty, @in=@dev}}, {{@in6=@private2}, 0x0, @in6=@dev}}, &(0x7f00000012c0)=0xe8) ioctl$SIOCAX25DELUID(0xffffffffffffffff, 0x89e2, 0x0) socket(0x400020000000010, 0x0, 0x0) 06:09:02 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000140)=ANY=[], 0x4240a2a0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000100)={0x26, 'hash\x00', 0x0, 0x0, 'crct10dif-generic\x00'}, 0x58) r3 = accept$alg(r2, 0x0, 0x0) r4 = accept4(r3, 0x0, 0x0, 0x0) splice(0xffffffffffffffff, 0x0, r4, 0x0, 0x30007, 0x0) 06:09:02 executing program 3: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x80801, 0x0) connect$inet6(r0, 0x0, 0x0) getsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x3d, &(0x7f0000000300)={@dev}, &(0x7f00000004c0)=0x20) 06:09:02 executing program 4: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r1, 0x40047438, &(0x7f0000000180)=""/246) ioctl$PPPIOCSFLAGS1(r1, 0x40047457, &(0x7f0000000000)) 06:09:02 executing program 0: r0 = perf_event_open(&(0x7f0000000640)={0x3, 0x70, 0x3e7, 0x0, 0x4, 0x0, 0x0, 0x0, 0x91dd7106ca8fd33b, 0xdb3fedb3c3734f95, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x40000000000, 0x0, 0x1, 0x0, @perf_config_ext={0x18, 0x3}, 0x21, 0x10000000000000, 0x0, 0x0, 0x0, 0x20000007, 0x2}, 0x0, 0xc, 0xffffffffffffffff, 0xa) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='cpuacct.stat\x00', 0x0, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f00000003c0)='syz1\x00', 0x200002, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0xfffffffffffffffc) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000300)='./cgroup/syz0\x00', 0x200002, 0x0) gettid() socket$kcm(0x11, 0xb, 0x0) ioctl$TUNSETTXFILTER(r1, 0x400454d1, &(0x7f00000000c0)=ANY=[@ANYBLOB="00000700000000da6500bbc4bbbbbbbb0180c2000016000000004dc23f0c000000000000bb"]) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000040)=@ipx={0x4, 0x1, 0x0, "2bfaec665b4b", 0xff}, 0x80, 0x0}, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={0xffffffffffffffff, 0x1, 0x49c42ca22ab5a9ac, 0x4, 0x0}, 0x20) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x908b7aabaa7d2404) socket$kcm(0xa, 0x6, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x4000011) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000000c0), 0x0}, 0x28) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x89f1, &(0x7f0000000000)='ip6gre0\x00') perf_event_open(&(0x7f00000004c0)={0x0, 0x70, 0x8, 0x6, 0x0, 0x3, 0x0, 0x3, 0x4, 0x0, 0x9, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x1000, 0x0, @perf_config_ext={0x1ff}, 0x40004, 0xfffffffffffffffd, 0x0, 0x8, 0x8, 0x4, 0x80}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0x10, 0x0, 0x10) sendmsg$kcm(r3, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d200040080000048000001000080000000000300f88000f01700d4bd", 0x2e}], 0xf}, 0x40094) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r5 = socket$kcm(0x2, 0x1, 0x2) socketpair(0x25, 0x6, 0x4, &(0x7f0000000480)) setsockopt$sock_attach_bpf(r5, 0x1, 0x3e, &(0x7f00000002c0)=r4, 0x4) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x6d, &(0x7f0000000cc0)=ANY=[@ANYRESHEX, @ANYBLOB="e99f619c950ec8069b69ac05520100000000000000572e83f4fd34a6db69715afdc8ec492fa879a8460bf2c7459f384ec36d6f0d833fccc87dc8f542ca0731ec72c3f6e0857c63572db61a83246496a2f90400569c8af42a5b8b1e3583115dfe3a40a792ffe638fd722afd02131c170175f382a8d78b6626d1d58220f08d98570bad00042a01c00748cf37385e7d66e6c0efddeb730ebd2f1ab4e816cf7493cf236ca5eb6e5d2a65519a7acf475dbd9fb52eb50ddcf9cee74529f59a2d6cfe6c23f6a688719f922099394146621132f866439970571e206ac47123f2d9cdb5cb7c8506122300000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000)={0x0, 0x8}, 0x10}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r6, 0x18000000000002a0, 0x42, 0x0, &(0x7f0000000800)="b9ff0300600d698cb89e14f088a81fffffff00004000630677fbac14140ee934a0a662079f4b4d2f87e5feca6aab845013f2325f1a39010108038da1924425181aa5", 0x0, 0x28000, 0x60000000, 0x113, 0x0, &(0x7f00000006c0)="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"}, 0x40) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x17, 0x6, &(0x7f0000000c00)=ANY=[], &(0x7f00000002c0)='GPL\x00', 0x2, 0x0, 0x0, 0x40f00, 0x8, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000340)={0x1, 0x10000003}, 0x8, 0x10, &(0x7f0000000380)={0x0, 0xa, 0x83, 0x2}, 0x10}, 0x78) ioctl$sock_kcm_SIOCKCMATTACH(r3, 0x89e0, &(0x7f0000000500)={0xffffffffffffffff, r7}) 06:09:02 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet_udp_int(r0, 0x11, 0x67, &(0x7f0000000140)=0x6, 0x4) sendmmsg(r0, &(0x7f0000006f00)=[{{&(0x7f0000000040)=@in={0x2, 0x4e23, @remote}, 0x80, &(0x7f0000000100)=[{&(0x7f00000000c0)="e04013b497936ecafdd12c496f522cc2830fd358bc8f890e410223906070a39cc6e2f84a8622c5f86cad52bba1560397737a6cce189d7db27e", 0x39}], 0x1}}, {{0x0, 0x0, &(0x7f0000000440)=[{&(0x7f0000000200)="9544939c01e602e8fc696947591d4c6fb3cb9a7cf9e53555dac91c09bbd33a6e85981e045d", 0x25}, {&(0x7f0000000240)="b995a5bf327c6f291a70af1527c6eb87af6b40c22e784c7d81102b1d2c4f5434d0142b1efa49361c7fa370cde02cbad1cdf556d5ebe84042e5b1eee75566d3c3bd4e54fb80c6258eb985131872c446ae99febe93703f66f4e0e10392c8a0d30f35710c7490190fef8483", 0x6a}, {&(0x7f0000000340)="529cd4456bccdb80c030fe01e5cd61704126c8d4e7ec", 0x16}, {&(0x7f0000000380)="c2597979197f75ed6b82c8bcbf2c6b92a9a53fdd74646d60f9941ca27e", 0x1d}], 0x4}}], 0x2, 0x4c004) sendmmsg(r0, &(0x7f0000007fc0), 0x800001d, 0x0) 06:09:02 executing program 2: r0 = socket$netlink(0x10, 0x3, 0xa) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xe8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000140)=@newlink={0x34, 0x10, 0x0, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macsec={{0xb, 0x1, 'macsec\x00'}, {0x4}}}]}, 0x34}}, 0x0) 06:09:02 executing program 3: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x80801, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @ipv4}, 0x1c) getsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x3d, &(0x7f0000000300)={@dev}, &(0x7f00000004c0)=0x20) 06:09:02 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet_udp_int(r0, 0x11, 0x67, &(0x7f0000000140)=0x6, 0x4) sendmmsg(r0, &(0x7f0000006f00)=[{{&(0x7f0000000040)=@in={0x2, 0x4e23, @remote}, 0x80, &(0x7f0000000100)=[{&(0x7f00000000c0)="e04013b497936ecafdd12c496f522cc2830fd358bc8f890e410223906070a39cc6e2f84a8622c5f86cad52bba1560397737a6cce189d7db27e", 0x39}], 0x1}}, {{0x0, 0x0, &(0x7f0000000440)=[{&(0x7f0000000200)="9544939c01e602e8fc696947591d4c6fb3cb9a7cf9e53555dac91c09bbd33a6e85981e045d", 0x25}, {&(0x7f0000000240)="b995a5bf327c6f291a70af1527c6eb87af6b40c22e784c7d81102b1d2c4f5434d0142b1efa49361c7fa370cde02cbad1cdf556d5ebe84042e5b1eee75566d3c3bd4e54fb80c6258eb985131872c446ae99febe93703f66f4e0e10392c8a0d30f35710c7490190fef8483", 0x6a}, {&(0x7f0000000340)="529cd4456bccdb80c030fe01e5cd61704126c8d4e7ec", 0x16}, {&(0x7f0000000380)="c2597979197f75ed6b82c8bcbf2c6b92a9a53fdd74646d60f9941ca27e", 0x1d}], 0x4}}], 0x2, 0x4c004) sendmmsg(r0, &(0x7f0000007fc0), 0x800001d, 0x0) [ 245.662010][T11014] IPVS: ftp: loaded support on port[0] = 21 06:09:02 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000140)=ANY=[], 0x4240a2a0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000100)={0x26, 'hash\x00', 0x0, 0x0, 'crct10dif-generic\x00'}, 0x58) r3 = accept$alg(r2, 0x0, 0x0) r4 = accept4(r3, 0x0, 0x0, 0x0) splice(0xffffffffffffffff, 0x0, r4, 0x0, 0x30007, 0x0) 06:09:02 executing program 2: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x80801, 0x0) getsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x3d, &(0x7f0000000300)={@dev}, &(0x7f00000004c0)=0x20) 06:09:02 executing program 0: r0 = perf_event_open(&(0x7f0000000640)={0x3, 0x70, 0x3e7, 0x0, 0x4, 0x0, 0x0, 0x0, 0x91dd7106ca8fd33b, 0xdb3fedb3c3734f95, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x40000000000, 0x0, 0x1, 0x0, @perf_config_ext={0x18, 0x3}, 0x21, 0x10000000000000, 0x0, 0x0, 0x0, 0x20000007, 0x2}, 0x0, 0xc, 0xffffffffffffffff, 0xa) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='cpuacct.stat\x00', 0x0, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f00000003c0)='syz1\x00', 0x200002, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0xfffffffffffffffc) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000300)='./cgroup/syz0\x00', 0x200002, 0x0) gettid() socket$kcm(0x11, 0xb, 0x0) ioctl$TUNSETTXFILTER(r1, 0x400454d1, &(0x7f00000000c0)=ANY=[@ANYBLOB="00000700000000da6500bbc4bbbbbbbb0180c2000016000000004dc23f0c000000000000bb"]) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000040)=@ipx={0x4, 0x1, 0x0, "2bfaec665b4b", 0xff}, 0x80, 0x0}, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={0xffffffffffffffff, 0x1, 0x49c42ca22ab5a9ac, 0x4, 0x0}, 0x20) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x908b7aabaa7d2404) socket$kcm(0xa, 0x6, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x4000011) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000000c0), 0x0}, 0x28) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x89f1, &(0x7f0000000000)='ip6gre0\x00') perf_event_open(&(0x7f00000004c0)={0x0, 0x70, 0x8, 0x6, 0x0, 0x3, 0x0, 0x3, 0x4, 0x0, 0x9, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x1000, 0x0, @perf_config_ext={0x1ff}, 0x40004, 0xfffffffffffffffd, 0x0, 0x8, 0x8, 0x4, 0x80}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0x10, 0x0, 0x10) sendmsg$kcm(r3, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d200040080000048000001000080000000000300f88000f01700d4bd", 0x2e}], 0xf}, 0x40094) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r5 = socket$kcm(0x2, 0x1, 0x2) socketpair(0x25, 0x6, 0x4, &(0x7f0000000480)) setsockopt$sock_attach_bpf(r5, 0x1, 0x3e, &(0x7f00000002c0)=r4, 0x4) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x6d, &(0x7f0000000cc0)=ANY=[@ANYRESHEX, @ANYBLOB="e99f619c950ec8069b69ac05520100000000000000572e83f4fd34a6db69715afdc8ec492fa879a8460bf2c7459f384ec36d6f0d833fccc87dc8f542ca0731ec72c3f6e0857c63572db61a83246496a2f90400569c8af42a5b8b1e3583115dfe3a40a792ffe638fd722afd02131c170175f382a8d78b6626d1d58220f08d98570bad00042a01c00748cf37385e7d66e6c0efddeb730ebd2f1ab4e816cf7493cf236ca5eb6e5d2a65519a7acf475dbd9fb52eb50ddcf9cee74529f59a2d6cfe6c23f6a688719f922099394146621132f866439970571e206ac47123f2d9cdb5cb7c8506122300000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000)={0x0, 0x8}, 0x10}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r6, 0x18000000000002a0, 0x42, 0x0, &(0x7f0000000800)="b9ff0300600d698cb89e14f088a81fffffff00004000630677fbac14140ee934a0a662079f4b4d2f87e5feca6aab845013f2325f1a39010108038da1924425181aa5", 0x0, 0x28000, 0x60000000, 0x113, 0x0, &(0x7f00000006c0)="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"}, 0x40) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x17, 0x6, &(0x7f0000000c00)=ANY=[], &(0x7f00000002c0)='GPL\x00', 0x2, 0x0, 0x0, 0x40f00, 0x8, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000340)={0x1, 0x10000003}, 0x8, 0x10, &(0x7f0000000380)={0x0, 0xa, 0x83, 0x2}, 0x10}, 0x78) ioctl$sock_kcm_SIOCKCMATTACH(r3, 0x89e0, &(0x7f0000000500)={0xffffffffffffffff, r7}) 06:09:02 executing program 3: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x80801, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @ipv4}, 0x1c) getsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x3d, &(0x7f0000000300)={@dev}, &(0x7f00000004c0)=0x20) 06:09:02 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet_udp_int(r0, 0x11, 0x67, &(0x7f0000000140)=0x6, 0x4) sendmmsg(r0, &(0x7f0000006f00)=[{{&(0x7f0000000040)=@in={0x2, 0x4e23, @remote}, 0x80, &(0x7f0000000100)=[{&(0x7f00000000c0)="e04013b497936ecafdd12c496f522cc2830fd358bc8f890e410223906070a39cc6e2f84a8622c5f86cad52bba1560397737a6cce189d7db27e", 0x39}], 0x1}}, {{0x0, 0x0, &(0x7f0000000440)=[{&(0x7f0000000200)="9544939c01e602e8fc696947591d4c6fb3cb9a7cf9e53555dac91c09bbd33a6e85981e045d", 0x25}, {&(0x7f0000000240)="b995a5bf327c6f291a70af1527c6eb87af6b40c22e784c7d81102b1d2c4f5434d0142b1efa49361c7fa370cde02cbad1cdf556d5ebe84042e5b1eee75566d3c3bd4e54fb80c6258eb985131872c446ae99febe93703f66f4e0e10392c8a0d30f35710c7490190fef8483", 0x6a}, {&(0x7f0000000340)="529cd4456bccdb80c030fe01e5cd61704126c8d4e7ec", 0x16}, {&(0x7f0000000380)="c2597979197f75ed6b82c8bcbf2c6b92a9a53fdd74646d60f9941ca27e", 0x1d}], 0x4}}], 0x2, 0x4c004) sendmmsg(r0, &(0x7f0000007fc0), 0x800001d, 0x0) 06:09:02 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet_udp_int(r0, 0x11, 0x67, &(0x7f0000000140)=0x6, 0x4) sendmmsg(r0, &(0x7f0000006f00)=[{{&(0x7f0000000040)=@in={0x2, 0x4e23, @remote}, 0x80, &(0x7f0000000100)=[{&(0x7f00000000c0)="e04013b497936ecafdd12c496f522cc2830fd358bc8f890e410223906070a39cc6e2f84a8622c5f86cad52bba1560397737a6cce189d7db27e", 0x39}], 0x1}}, {{0x0, 0x0, &(0x7f0000000440)=[{&(0x7f0000000200)="9544939c01e602e8fc696947591d4c6fb3cb9a7cf9e53555dac91c09bbd33a6e85981e045d", 0x25}, {&(0x7f0000000240)="b995a5bf327c6f291a70af1527c6eb87af6b40c22e784c7d81102b1d2c4f5434d0142b1efa49361c7fa370cde02cbad1cdf556d5ebe84042e5b1eee75566d3c3bd4e54fb80c6258eb985131872c446ae99febe93703f66f4e0e10392c8a0d30f35710c7490190fef84833442ab74de59e4c9ebbc7cfe3f26750c16970d537ab353640e9e46e706cd200383135bfbf29b19c2fe729da592a9fb74eca37cb467", 0x9f}, {&(0x7f0000000340)="529cd4456bccdb80c030fe01e5cd61704126c8d4e7ec", 0x16}, {&(0x7f0000000380)="c2597979197f75ed6b82c8bcbf2c6b92a9a53fdd74646d60f9941ca27e", 0x1d}], 0x4}}], 0x2, 0x4c004) sendmmsg(r0, &(0x7f0000007fc0), 0x800001d, 0x0) 06:09:03 executing program 4: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r1, 0x40047438, &(0x7f0000000180)=""/246) ioctl$PPPIOCSFLAGS1(r1, 0x40047457, &(0x7f0000000000)) 06:09:03 executing program 3: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x80801, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @ipv4}, 0x1c) getsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x3d, &(0x7f0000000300)={@dev}, &(0x7f00000004c0)=0x20) 06:09:03 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000140)=ANY=[], 0x4240a2a0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000100)={0x26, 'hash\x00', 0x0, 0x0, 'crct10dif-generic\x00'}, 0x58) r3 = accept$alg(r2, 0x0, 0x0) r4 = accept4(r3, 0x0, 0x0, 0x0) splice(0xffffffffffffffff, 0x0, r4, 0x0, 0x30007, 0x0) 06:09:03 executing program 0: r0 = perf_event_open(&(0x7f0000000640)={0x3, 0x70, 0x3e7, 0x0, 0x4, 0x0, 0x0, 0x0, 0x91dd7106ca8fd33b, 0xdb3fedb3c3734f95, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x40000000000, 0x0, 0x1, 0x0, @perf_config_ext={0x18, 0x3}, 0x21, 0x10000000000000, 0x0, 0x0, 0x0, 0x20000007, 0x2}, 0x0, 0xc, 0xffffffffffffffff, 0xa) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='cpuacct.stat\x00', 0x0, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f00000003c0)='syz1\x00', 0x200002, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0xfffffffffffffffc) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000300)='./cgroup/syz0\x00', 0x200002, 0x0) gettid() socket$kcm(0x11, 0xb, 0x0) ioctl$TUNSETTXFILTER(r1, 0x400454d1, &(0x7f00000000c0)=ANY=[@ANYBLOB="00000700000000da6500bbc4bbbbbbbb0180c2000016000000004dc23f0c000000000000bb"]) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000040)=@ipx={0x4, 0x1, 0x0, "2bfaec665b4b", 0xff}, 0x80, 0x0}, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={0xffffffffffffffff, 0x1, 0x49c42ca22ab5a9ac, 0x4, 0x0}, 0x20) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x908b7aabaa7d2404) socket$kcm(0xa, 0x6, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x4000011) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000000c0), 0x0}, 0x28) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x89f1, &(0x7f0000000000)='ip6gre0\x00') perf_event_open(&(0x7f00000004c0)={0x0, 0x70, 0x8, 0x6, 0x0, 0x3, 0x0, 0x3, 0x4, 0x0, 0x9, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x1000, 0x0, @perf_config_ext={0x1ff}, 0x40004, 0xfffffffffffffffd, 0x0, 0x8, 0x8, 0x4, 0x80}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0x10, 0x0, 0x10) sendmsg$kcm(r3, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d200040080000048000001000080000000000300f88000f01700d4bd", 0x2e}], 0xf}, 0x40094) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r5 = socket$kcm(0x2, 0x1, 0x2) socketpair(0x25, 0x6, 0x4, &(0x7f0000000480)) setsockopt$sock_attach_bpf(r5, 0x1, 0x3e, &(0x7f00000002c0)=r4, 0x4) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x6d, &(0x7f0000000cc0)=ANY=[@ANYRESHEX, @ANYBLOB="e99f619c950ec8069b69ac05520100000000000000572e83f4fd34a6db69715afdc8ec492fa879a8460bf2c7459f384ec36d6f0d833fccc87dc8f542ca0731ec72c3f6e0857c63572db61a83246496a2f90400569c8af42a5b8b1e3583115dfe3a40a792ffe638fd722afd02131c170175f382a8d78b6626d1d58220f08d98570bad00042a01c00748cf37385e7d66e6c0efddeb730ebd2f1ab4e816cf7493cf236ca5eb6e5d2a65519a7acf475dbd9fb52eb50ddcf9cee74529f59a2d6cfe6c23f6a688719f922099394146621132f866439970571e206ac47123f2d9cdb5cb7c8506122300000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000)={0x0, 0x8}, 0x10}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r6, 0x18000000000002a0, 0x42, 0x0, &(0x7f0000000800)="b9ff0300600d698cb89e14f088a81fffffff00004000630677fbac14140ee934a0a662079f4b4d2f87e5feca6aab845013f2325f1a39010108038da1924425181aa5", 0x0, 0x28000, 0x60000000, 0x113, 0x0, &(0x7f00000006c0)="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"}, 0x40) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x17, 0x6, &(0x7f0000000c00)=ANY=[], &(0x7f00000002c0)='GPL\x00', 0x2, 0x0, 0x0, 0x40f00, 0x8, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000340)={0x1, 0x10000003}, 0x8, 0x10, &(0x7f0000000380)={0x0, 0xa, 0x83, 0x2}, 0x10}, 0x78) ioctl$sock_kcm_SIOCKCMATTACH(r3, 0x89e0, &(0x7f0000000500)={0xffffffffffffffff, r7}) 06:09:03 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet_udp_int(r0, 0x11, 0x67, &(0x7f0000000140)=0x6, 0x4) sendmmsg(r0, &(0x7f0000006f00)=[{{&(0x7f0000000040)=@in={0x2, 0x4e23, @remote}, 0x80, &(0x7f0000000100)=[{&(0x7f00000000c0)="e04013b497936ecafdd12c496f522cc2830fd358bc8f890e410223906070a39cc6e2f84a8622c5f86cad52bba1560397737a6cce189d7db27e", 0x39}], 0x1}}, {{0x0, 0x0, &(0x7f0000000440)=[{&(0x7f0000000200)="9544939c01e602e8fc696947591d4c6fb3cb9a7cf9e53555dac91c09bbd33a6e85981e045d", 0x25}, {&(0x7f0000000240)="b995a5bf327c6f291a70af1527c6eb87af6b40c22e784c7d81102b1d2c4f5434d0142b1efa49361c7fa370cde02cbad1cdf556d5ebe84042e5b1eee75566d3c3bd4e54fb80c6258eb985131872c446ae99febe93703f66f4e0e10392c8a0d30f35710c7490190fef84833442ab74de59e4c9ebbc7cfe3f26750c16970d537ab353640e9e46e706cd200383135bfbf29b19c2fe729da592a9fb74eca37cb467", 0x9f}, {&(0x7f0000000340)="529cd4456bccdb80c030fe01e5cd61704126c8d4e7ec", 0x16}, {&(0x7f0000000380)="c2597979197f75ed6b82c8bcbf2c6b92a9a53fdd74646d60f9941ca27e", 0x1d}], 0x4}}], 0x2, 0x4c004) sendmmsg(r0, &(0x7f0000007fc0), 0x800001d, 0x0) 06:09:03 executing program 2: ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x111}}, 0x20) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffc}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f0000000100)={0x7, 0x8, 0xfa00, {r1}}, 0x10) 06:09:03 executing program 5: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(r4, &(0x7f0000000100)={0x26, 'hash\x00', 0x0, 0x0, 'crct10dif-generic\x00'}, 0x58) r5 = accept$alg(r4, 0x0, 0x0) r6 = accept4(r5, 0x0, 0x0, 0x0) splice(r0, 0x0, r6, 0x0, 0x30007, 0x0) 06:09:03 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet_udp_int(r0, 0x11, 0x67, &(0x7f0000000140)=0x6, 0x4) sendmmsg(r0, &(0x7f0000006f00)=[{{&(0x7f0000000040)=@in={0x2, 0x4e23, @remote}, 0x80, &(0x7f0000000100)=[{&(0x7f00000000c0)="e04013b497936ecafdd12c496f522cc2830fd358bc8f890e410223906070a39cc6e2f84a8622c5f86cad52bba1560397737a6cce189d7db27e", 0x39}], 0x1}}, {{0x0, 0x0, &(0x7f0000000440)=[{&(0x7f0000000200)="9544939c01e602e8fc696947591d4c6fb3cb9a7cf9e53555dac91c09bbd33a6e85981e045d", 0x25}, {&(0x7f0000000240)="b995a5bf327c6f291a70af1527c6eb87af6b40c22e784c7d81102b1d2c4f5434d0142b1efa49361c7fa370cde02cbad1cdf556d5ebe84042e5b1eee75566d3c3bd4e54fb80c6258eb985131872c446ae99febe93703f66f4e0e10392c8a0d30f35710c7490190fef84833442ab74de59e4c9ebbc7cfe3f26750c16970d537ab353640e9e46e706cd200383135bfbf29b19c2fe729da592a9fb74eca37cb467", 0x9f}, {&(0x7f0000000340)="529cd4456bccdb80c030fe01e5cd61704126c8d4e7ec", 0x16}, {&(0x7f0000000380)="c2597979197f75ed6b82c8bcbf2c6b92a9a53fdd74646d60f9941ca27e", 0x1d}], 0x4}}], 0x2, 0x4c004) sendmmsg(r0, &(0x7f0000007fc0), 0x800001d, 0x0) 06:09:03 executing program 2: ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x111}}, 0x20) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffc}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f0000000100)={0x7, 0x8, 0xfa00, {r1}}, 0x10) [ 246.624288][T11081] IPVS: ftp: loaded support on port[0] = 21 06:09:03 executing program 3: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x80801, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @ipv4}, 0x1c) getsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x3d, 0x0, &(0x7f00000004c0)) 06:09:03 executing program 0: r0 = perf_event_open(&(0x7f0000000640)={0x3, 0x70, 0x3e7, 0x0, 0x4, 0x0, 0x0, 0x0, 0x91dd7106ca8fd33b, 0xdb3fedb3c3734f95, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x40000000000, 0x0, 0x1, 0x0, @perf_config_ext={0x18, 0x3}, 0x21, 0x10000000000000, 0x0, 0x0, 0x0, 0x20000007, 0x2}, 0x0, 0xc, 0xffffffffffffffff, 0xa) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='cpuacct.stat\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f00000003c0)='syz1\x00', 0x200002, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0xfffffffffffffffc) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000300)='./cgroup/syz0\x00', 0x200002, 0x0) gettid() socket$kcm(0x11, 0xb, 0x0) ioctl$TUNSETTXFILTER(r1, 0x400454d1, &(0x7f00000000c0)=ANY=[@ANYBLOB="00000700000000da6500bbc4bbbbbbbb0180c2000016000000004dc23f0c000000000000bb"]) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000040)=@ipx={0x4, 0x1, 0x0, "2bfaec665b4b", 0xff}, 0x80, 0x0}, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={0xffffffffffffffff, 0x1, 0x49c42ca22ab5a9ac, 0x4, 0x0}, 0x20) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x908b7aabaa7d2404) socket$kcm(0xa, 0x6, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x4000011) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000000c0), 0x0}, 0x28) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x89f1, &(0x7f0000000000)='ip6gre0\x00') perf_event_open(&(0x7f00000004c0)={0x0, 0x70, 0x8, 0x6, 0x0, 0x3, 0x0, 0x3, 0x4, 0x0, 0x9, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x1000, 0x0, @perf_config_ext={0x1ff}, 0x40004, 0xfffffffffffffffd, 0x0, 0x8, 0x8, 0x4, 0x80}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0x10, 0x0, 0x10) sendmsg$kcm(r3, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d200040080000048000001000080000000000300f88000f01700d4bd", 0x2e}], 0xf}, 0x40094) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r5 = socket$kcm(0x2, 0x1, 0x2) socketpair(0x25, 0x6, 0x4, &(0x7f0000000480)) setsockopt$sock_attach_bpf(r5, 0x1, 0x3e, &(0x7f00000002c0)=r4, 0x4) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x6d, &(0x7f0000000cc0)=ANY=[@ANYRESHEX, @ANYBLOB="e99f619c950ec8069b69ac05520100000000000000572e83f4fd34a6db69715afdc8ec492fa879a8460bf2c7459f384ec36d6f0d833fccc87dc8f542ca0731ec72c3f6e0857c63572db61a83246496a2f90400569c8af42a5b8b1e3583115dfe3a40a792ffe638fd722afd02131c170175f382a8d78b6626d1d58220f08d98570bad00042a01c00748cf37385e7d66e6c0efddeb730ebd2f1ab4e816cf7493cf236ca5eb6e5d2a65519a7acf475dbd9fb52eb50ddcf9cee74529f59a2d6cfe6c23f6a688719f922099394146621132f866439970571e206ac47123f2d9cdb5cb7c8506122300000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000)={0x0, 0x8}, 0x10}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r6, 0x18000000000002a0, 0x42, 0x0, &(0x7f0000000800)="b9ff0300600d698cb89e14f088a81fffffff00004000630677fbac14140ee934a0a662079f4b4d2f87e5feca6aab845013f2325f1a39010108038da1924425181aa5", 0x0, 0x28000, 0x60000000, 0x113, 0x0, &(0x7f00000006c0)="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"}, 0x40) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x17, 0x6, &(0x7f0000000c00)=ANY=[], &(0x7f00000002c0)='GPL\x00', 0x2, 0x0, 0x0, 0x40f00, 0x8, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000340)={0x1, 0x10000003}, 0x8, 0x10, &(0x7f0000000380)={0x0, 0xa, 0x83, 0x2}, 0x10}, 0x78) ioctl$sock_kcm_SIOCKCMATTACH(r3, 0x89e0, &(0x7f0000000500)={0xffffffffffffffff, r7}) 06:09:03 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000001380)=ANY=[], 0x12) mmap(&(0x7f0000000000/0x12000)=nil, 0x12000, 0x2, 0x10012, r0, 0x0) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000005000/0x1000)=nil, 0x1000, 0x0, 0x2812, r1, 0x0) write$FUSE_DIRENTPLUS(r1, &(0x7f00000000c0)=ANY=[], 0x1) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x10012, r2, 0x0) 06:09:04 executing program 4: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000000c0)) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r1, 0x40047438, &(0x7f0000000180)=""/246) ioctl$PPPIOCSFLAGS1(r1, 0x40047457, &(0x7f0000000000)) 06:09:04 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet_udp_int(r0, 0x11, 0x67, &(0x7f0000000140)=0x6, 0x4) sendmmsg(r0, &(0x7f0000006f00)=[{{&(0x7f0000000040)=@in={0x2, 0x4e23, @remote}, 0x80, &(0x7f0000000100)=[{&(0x7f00000000c0)="e04013b497936ecafdd12c496f522cc2830fd358bc8f890e410223906070a39cc6e2f84a8622c5f86cad52bba1560397737a6cce189d7db27e", 0x39}], 0x1}}, {{0x0, 0x0, &(0x7f0000000440)=[{&(0x7f0000000200)="9544939c01e602e8fc696947591d4c6fb3cb9a7cf9e53555dac91c09bbd33a6e85981e045d", 0x25}, {&(0x7f0000000240)="b995a5bf327c6f291a70af1527c6eb87af6b40c22e784c7d81102b1d2c4f5434d0142b1efa49361c7fa370cde02cbad1cdf556d5ebe84042e5b1eee75566d3c3bd4e54fb80c6258eb985131872c446ae99febe93703f66f4e0e10392c8a0d30f35710c7490190fef84833442ab74de59e4c9ebbc7cfe3f26750c16970d537ab353640e9e46e706cd200383135bfbf29b19c2fe729da592a9fb74eca37cb46775eb6db0118a3c59ac107fcf691822488d67f90e891045cb2ea35a", 0xba}, {&(0x7f0000000340)="529cd4456bccdb80c030fe01e5cd61704126c8d4e7ec", 0x16}, {&(0x7f0000000380)="c2597979197f75ed6b82c8bcbf2c6b92a9a53fdd74646d60f9941ca27e", 0x1d}], 0x4}}], 0x2, 0x4c004) sendmmsg(r0, &(0x7f0000007fc0), 0x800001d, 0x0) 06:09:04 executing program 3: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x80801, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @ipv4}, 0x1c) getsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x3d, 0x0, &(0x7f00000004c0)) 06:09:04 executing program 0: r0 = perf_event_open(&(0x7f0000000640)={0x3, 0x70, 0x3e7, 0x0, 0x4, 0x0, 0x0, 0x0, 0x91dd7106ca8fd33b, 0xdb3fedb3c3734f95, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x40000000000, 0x0, 0x1, 0x0, @perf_config_ext={0x18, 0x3}, 0x21, 0x10000000000000, 0x0, 0x0, 0x0, 0x20000007, 0x2}, 0x0, 0xc, 0xffffffffffffffff, 0xa) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='cpuacct.stat\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f00000003c0)='syz1\x00', 0x200002, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0xfffffffffffffffc) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000300)='./cgroup/syz0\x00', 0x200002, 0x0) gettid() socket$kcm(0x11, 0xb, 0x0) ioctl$TUNSETTXFILTER(r1, 0x400454d1, &(0x7f00000000c0)=ANY=[@ANYBLOB="00000700000000da6500bbc4bbbbbbbb0180c2000016000000004dc23f0c000000000000bb"]) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000040)=@ipx={0x4, 0x1, 0x0, "2bfaec665b4b", 0xff}, 0x80, 0x0}, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={0xffffffffffffffff, 0x1, 0x49c42ca22ab5a9ac, 0x4, 0x0}, 0x20) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x908b7aabaa7d2404) socket$kcm(0xa, 0x6, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x4000011) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000000c0), 0x0}, 0x28) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x89f1, &(0x7f0000000000)='ip6gre0\x00') perf_event_open(&(0x7f00000004c0)={0x0, 0x70, 0x8, 0x6, 0x0, 0x3, 0x0, 0x3, 0x4, 0x0, 0x9, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x1000, 0x0, @perf_config_ext={0x1ff}, 0x40004, 0xfffffffffffffffd, 0x0, 0x8, 0x8, 0x4, 0x80}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0x10, 0x0, 0x10) sendmsg$kcm(r3, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d200040080000048000001000080000000000300f88000f01700d4bd", 0x2e}], 0xf}, 0x40094) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r5 = socket$kcm(0x2, 0x1, 0x2) socketpair(0x25, 0x6, 0x4, &(0x7f0000000480)) setsockopt$sock_attach_bpf(r5, 0x1, 0x3e, &(0x7f00000002c0)=r4, 0x4) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x6d, &(0x7f0000000cc0)=ANY=[@ANYRESHEX, @ANYBLOB="e99f619c950ec8069b69ac05520100000000000000572e83f4fd34a6db69715afdc8ec492fa879a8460bf2c7459f384ec36d6f0d833fccc87dc8f542ca0731ec72c3f6e0857c63572db61a83246496a2f90400569c8af42a5b8b1e3583115dfe3a40a792ffe638fd722afd02131c170175f382a8d78b6626d1d58220f08d98570bad00042a01c00748cf37385e7d66e6c0efddeb730ebd2f1ab4e816cf7493cf236ca5eb6e5d2a65519a7acf475dbd9fb52eb50ddcf9cee74529f59a2d6cfe6c23f6a688719f922099394146621132f866439970571e206ac47123f2d9cdb5cb7c8506122300000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000)={0x0, 0x8}, 0x10}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r6, 0x18000000000002a0, 0x42, 0x0, &(0x7f0000000800)="b9ff0300600d698cb89e14f088a81fffffff00004000630677fbac14140ee934a0a662079f4b4d2f87e5feca6aab845013f2325f1a39010108038da1924425181aa5", 0x0, 0x28000, 0x60000000, 0x113, 0x0, &(0x7f00000006c0)="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"}, 0x40) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x17, 0x6, &(0x7f0000000c00)=ANY=[], &(0x7f00000002c0)='GPL\x00', 0x2, 0x0, 0x0, 0x40f00, 0x8, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000340)={0x1, 0x10000003}, 0x8, 0x10, &(0x7f0000000380)={0x0, 0xa, 0x83, 0x2}, 0x10}, 0x78) ioctl$sock_kcm_SIOCKCMATTACH(r3, 0x89e0, &(0x7f0000000500)={0xffffffffffffffff, r7}) 06:09:04 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000001380)=ANY=[], 0x12) mmap(&(0x7f0000000000/0x12000)=nil, 0x12000, 0x2, 0x10012, r0, 0x0) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000005000/0x1000)=nil, 0x1000, 0x0, 0x2812, r1, 0x0) write$FUSE_DIRENTPLUS(r1, &(0x7f00000000c0)=ANY=[], 0x1) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x10012, r2, 0x0) 06:09:04 executing program 3: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x80801, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @ipv4}, 0x1c) getsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x3d, 0x0, &(0x7f00000004c0)) [ 247.508909][T11140] IPVS: ftp: loaded support on port[0] = 21 06:09:04 executing program 5: pipe(0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000140)=ANY=[], 0x4240a2a0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000100)={0x26, 'hash\x00', 0x0, 0x0, 'crct10dif-generic\x00'}, 0x58) r3 = accept$alg(r2, 0x0, 0x0) r4 = accept4(r3, 0x0, 0x0, 0x0) splice(0xffffffffffffffff, 0x0, r4, 0x0, 0x30007, 0x0) 06:09:04 executing program 2: setrlimit(0x7, &(0x7f0000000040)) open_tree(0xffffffffffffffff, 0x0, 0x0) 06:09:04 executing program 3: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x80801, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @ipv4}, 0x1c) getsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x3d, &(0x7f0000000300)={@dev}, 0x0) 06:09:04 executing program 0: r0 = perf_event_open(&(0x7f0000000640)={0x3, 0x70, 0x3e7, 0x0, 0x4, 0x0, 0x0, 0x0, 0x91dd7106ca8fd33b, 0xdb3fedb3c3734f95, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x40000000000, 0x0, 0x1, 0x0, @perf_config_ext={0x18, 0x3}, 0x21, 0x10000000000000, 0x0, 0x0, 0x0, 0x20000007, 0x2}, 0x0, 0xc, 0xffffffffffffffff, 0xa) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='cpuacct.stat\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f00000003c0)='syz1\x00', 0x200002, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0xfffffffffffffffc) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000300)='./cgroup/syz0\x00', 0x200002, 0x0) gettid() socket$kcm(0x11, 0xb, 0x0) ioctl$TUNSETTXFILTER(r1, 0x400454d1, &(0x7f00000000c0)=ANY=[@ANYBLOB="00000700000000da6500bbc4bbbbbbbb0180c2000016000000004dc23f0c000000000000bb"]) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000040)=@ipx={0x4, 0x1, 0x0, "2bfaec665b4b", 0xff}, 0x80, 0x0}, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={0xffffffffffffffff, 0x1, 0x49c42ca22ab5a9ac, 0x4, 0x0}, 0x20) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x908b7aabaa7d2404) socket$kcm(0xa, 0x6, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x4000011) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000000c0), 0x0}, 0x28) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x89f1, &(0x7f0000000000)='ip6gre0\x00') perf_event_open(&(0x7f00000004c0)={0x0, 0x70, 0x8, 0x6, 0x0, 0x3, 0x0, 0x3, 0x4, 0x0, 0x9, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x1000, 0x0, @perf_config_ext={0x1ff}, 0x40004, 0xfffffffffffffffd, 0x0, 0x8, 0x8, 0x4, 0x80}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0x10, 0x0, 0x10) sendmsg$kcm(r3, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d200040080000048000001000080000000000300f88000f01700d4bd", 0x2e}], 0xf}, 0x40094) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r5 = socket$kcm(0x2, 0x1, 0x2) socketpair(0x25, 0x6, 0x4, &(0x7f0000000480)) setsockopt$sock_attach_bpf(r5, 0x1, 0x3e, &(0x7f00000002c0)=r4, 0x4) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x6d, &(0x7f0000000cc0)=ANY=[@ANYRESHEX, @ANYBLOB="e99f619c950ec8069b69ac05520100000000000000572e83f4fd34a6db69715afdc8ec492fa879a8460bf2c7459f384ec36d6f0d833fccc87dc8f542ca0731ec72c3f6e0857c63572db61a83246496a2f90400569c8af42a5b8b1e3583115dfe3a40a792ffe638fd722afd02131c170175f382a8d78b6626d1d58220f08d98570bad00042a01c00748cf37385e7d66e6c0efddeb730ebd2f1ab4e816cf7493cf236ca5eb6e5d2a65519a7acf475dbd9fb52eb50ddcf9cee74529f59a2d6cfe6c23f6a688719f922099394146621132f866439970571e206ac47123f2d9cdb5cb7c8506122300000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000)={0x0, 0x8}, 0x10}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r6, 0x18000000000002a0, 0x42, 0x0, &(0x7f0000000800)="b9ff0300600d698cb89e14f088a81fffffff00004000630677fbac14140ee934a0a662079f4b4d2f87e5feca6aab845013f2325f1a39010108038da1924425181aa5", 0x0, 0x28000, 0x60000000, 0x113, 0x0, &(0x7f00000006c0)="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"}, 0x40) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x17, 0x6, &(0x7f0000000c00)=ANY=[], &(0x7f00000002c0)='GPL\x00', 0x2, 0x0, 0x0, 0x40f00, 0x8, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000340)={0x1, 0x10000003}, 0x8, 0x10, &(0x7f0000000380)={0x0, 0xa, 0x83, 0x2}, 0x10}, 0x78) ioctl$sock_kcm_SIOCKCMATTACH(r3, 0x89e0, &(0x7f0000000500)={0xffffffffffffffff, r7}) 06:09:04 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet_udp_int(r0, 0x11, 0x67, &(0x7f0000000140)=0x6, 0x4) sendmmsg(r0, &(0x7f0000006f00)=[{{&(0x7f0000000040)=@in={0x2, 0x4e23, @remote}, 0x80, &(0x7f0000000100)=[{&(0x7f00000000c0)="e04013b497936ecafdd12c496f522cc2830fd358bc8f890e410223906070a39cc6e2f84a8622c5f86cad52bba1560397737a6cce189d7db27e", 0x39}], 0x1}}, {{0x0, 0x0, &(0x7f0000000440)=[{&(0x7f0000000200)="9544939c01e602e8fc696947591d4c6fb3cb9a7cf9e53555dac91c09bbd33a6e85981e045d", 0x25}, {&(0x7f0000000240)="b995a5bf327c6f291a70af1527c6eb87af6b40c22e784c7d81102b1d2c4f5434d0142b1efa49361c7fa370cde02cbad1cdf556d5ebe84042e5b1eee75566d3c3bd4e54fb80c6258eb985131872c446ae99febe93703f66f4e0e10392c8a0d30f35710c7490190fef84833442ab74de59e4c9ebbc7cfe3f26750c16970d537ab353640e9e46e706cd200383135bfbf29b19c2fe729da592a9fb74eca37cb46775eb6db0118a3c59ac107fcf691822488d67f90e891045cb2ea35a", 0xba}, {&(0x7f0000000340)="529cd4456bccdb80c030fe01e5cd61704126c8d4e7ec", 0x16}, {&(0x7f0000000380)="c2597979197f75ed6b82c8bcbf2c6b92a9a53fdd74646d60f9941ca27e", 0x1d}], 0x4}}], 0x2, 0x4c004) sendmmsg(r0, &(0x7f0000007fc0), 0x800001d, 0x0) 06:09:04 executing program 5: pipe(0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000140)=ANY=[], 0x4240a2a0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000100)={0x26, 'hash\x00', 0x0, 0x0, 'crct10dif-generic\x00'}, 0x58) r3 = accept$alg(r2, 0x0, 0x0) r4 = accept4(r3, 0x0, 0x0, 0x0) splice(0xffffffffffffffff, 0x0, r4, 0x0, 0x30007, 0x0) 06:09:05 executing program 4: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000000c0)) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r1, 0x40047438, &(0x7f0000000180)=""/246) ioctl$PPPIOCSFLAGS1(r1, 0x40047457, &(0x7f0000000000)) 06:09:05 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000025c000)={0x3, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb3b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket(0x1e, 0x0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000980)={@random="096047da2257", @link_local, @val={@void, {0x8906, 0x0, 0x1}}, {@ipv6={0x86dd, @dccp_packet={0x0, 0x6, "3404fe", 0x10, 0x21, 0x0, @loopback, @dev, {[], {{0x0, 0x0, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, "61ba43", 0x0, "bd713a"}}}}}}}, 0x0) ioctl$EXT4_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0x6612) r0 = gettid() process_vm_writev(r0, &(0x7f0000000000)=[{&(0x7f00008f9f09)=""/247, 0xf7}], 0x10000000000000ac, &(0x7f0000000a40)=[{&(0x7f0000000140)=""/31}, {&(0x7f0000000700)=""/89}, {&(0x7f0000000780)=""/129}, {&(0x7f0000000840)=""/148}, {&(0x7f0000001380)=""/4096, 0xffba}, {&(0x7f0000000900)=""/81}, {&(0x7f0000000980)=""/150}], 0x381, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0x6) chown(&(0x7f00000001c0)='./file0\x00', r2, 0x0) getpgrp(0xffffffffffffffff) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f0000000080)={0x0, 0x382, &(0x7f0000000140)={0x0, 0xb7ff}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(r3, 0x29, 0x23, &(0x7f0000000300)={{{@in=@remote, @in6=@local}}, {{@in=@local}, 0x0, @in=@loopback}}, &(0x7f0000000400)=0xe8) r4 = socket$can_j1939(0x1d, 0x2, 0x7) r5 = dup(r4) getsockopt$SO_J1939_PROMISC(r5, 0x6b, 0x2, &(0x7f0000000000), &(0x7f0000000040)=0xfffffffffffffff6) statx(r5, &(0x7f0000000440)='./file0\x00', 0x1000, 0x40, &(0x7f0000000480)) 06:09:05 executing program 3: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x80801, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @ipv4}, 0x1c) getsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x3d, &(0x7f0000000300)={@dev}, 0x0) 06:09:05 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet_udp_int(r0, 0x11, 0x67, &(0x7f0000000140)=0x6, 0x4) sendmmsg(r0, &(0x7f0000006f00)=[{{&(0x7f0000000040)=@in={0x2, 0x4e23, @remote}, 0x80, &(0x7f0000000100)=[{&(0x7f00000000c0)="e04013b497936ecafdd12c496f522cc2830fd358bc8f890e410223906070a39cc6e2f84a8622c5f86cad52bba1560397737a6cce189d7db27e", 0x39}], 0x1}}, {{0x0, 0x0, &(0x7f0000000440)=[{&(0x7f0000000200)="9544939c01e602e8fc696947591d4c6fb3cb9a7cf9e53555dac91c09bbd33a6e85981e045d", 0x25}, {&(0x7f0000000240)="b995a5bf327c6f291a70af1527c6eb87af6b40c22e784c7d81102b1d2c4f5434d0142b1efa49361c7fa370cde02cbad1cdf556d5ebe84042e5b1eee75566d3c3bd4e54fb80c6258eb985131872c446ae99febe93703f66f4e0e10392c8a0d30f35710c7490190fef84833442ab74de59e4c9ebbc7cfe3f26750c16970d537ab353640e9e46e706cd200383135bfbf29b19c2fe729da592a9fb74eca37cb46775eb6db0118a3c59ac107fcf691822488d67f90e891045cb2ea35a", 0xba}, {&(0x7f0000000340)="529cd4456bccdb80c030fe01e5cd61704126c8d4e7ec", 0x16}, {&(0x7f0000000380)="c2597979197f75ed6b82c8bcbf2c6b92a9a53fdd74646d60f9941ca27e", 0x1d}], 0x4}}], 0x2, 0x4c004) sendmmsg(r0, &(0x7f0000007fc0), 0x800001d, 0x0) 06:09:05 executing program 0: r0 = perf_event_open(&(0x7f0000000640)={0x3, 0x70, 0x3e7, 0x0, 0x4, 0x0, 0x0, 0x0, 0x91dd7106ca8fd33b, 0xdb3fedb3c3734f95, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x40000000000, 0x0, 0x1, 0x0, @perf_config_ext={0x18, 0x3}, 0x21, 0x10000000000000, 0x0, 0x0, 0x0, 0x20000007, 0x2}, 0x0, 0xc, 0xffffffffffffffff, 0xa) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r0) r1 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f00000003c0)='syz1\x00', 0x200002, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0xfffffffffffffffc) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000300)='./cgroup/syz0\x00', 0x200002, 0x0) gettid() socket$kcm(0x11, 0xb, 0x0) ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, &(0x7f00000000c0)=ANY=[@ANYBLOB="00000700000000da6500bbc4bbbbbbbb0180c2000016000000004dc23f0c000000000000bb"]) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000040)=@ipx={0x4, 0x1, 0x0, "2bfaec665b4b", 0xff}, 0x80, 0x0}, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={0xffffffffffffffff, 0x1, 0x49c42ca22ab5a9ac, 0x4, 0x0}, 0x20) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x908b7aabaa7d2404) socket$kcm(0xa, 0x6, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x4000011) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000000c0), 0x0}, 0x28) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x89f1, &(0x7f0000000000)='ip6gre0\x00') perf_event_open(&(0x7f00000004c0)={0x0, 0x70, 0x8, 0x6, 0x0, 0x3, 0x0, 0x3, 0x4, 0x0, 0x9, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x1000, 0x0, @perf_config_ext={0x1ff}, 0x40004, 0xfffffffffffffffd, 0x0, 0x8, 0x8, 0x4, 0x80}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0x10, 0x0, 0x10) sendmsg$kcm(r3, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d200040080000048000001000080000000000300f88000f01700d4bd", 0x2e}], 0xf}, 0x40094) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r5 = socket$kcm(0x2, 0x1, 0x2) socketpair(0x25, 0x6, 0x4, &(0x7f0000000480)) setsockopt$sock_attach_bpf(r5, 0x1, 0x3e, &(0x7f00000002c0)=r4, 0x4) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x6d, &(0x7f0000000cc0)=ANY=[@ANYRESHEX, @ANYBLOB="e99f619c950ec8069b69ac05520100000000000000572e83f4fd34a6db69715afdc8ec492fa879a8460bf2c7459f384ec36d6f0d833fccc87dc8f542ca0731ec72c3f6e0857c63572db61a83246496a2f90400569c8af42a5b8b1e3583115dfe3a40a792ffe638fd722afd02131c170175f382a8d78b6626d1d58220f08d98570bad00042a01c00748cf37385e7d66e6c0efddeb730ebd2f1ab4e816cf7493cf236ca5eb6e5d2a65519a7acf475dbd9fb52eb50ddcf9cee74529f59a2d6cfe6c23f6a688719f922099394146621132f866439970571e206ac47123f2d9cdb5cb7c8506122300000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000)={0x0, 0x8}, 0x10}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r6, 0x18000000000002a0, 0x42, 0x0, &(0x7f0000000800)="b9ff0300600d698cb89e14f088a81fffffff00004000630677fbac14140ee934a0a662079f4b4d2f87e5feca6aab845013f2325f1a39010108038da1924425181aa5", 0x0, 0x28000, 0x60000000, 0x113, 0x0, &(0x7f00000006c0)="097baacf569909ebb78a19b4d4f607feb3072ad9474026c7c148d184a2647de87a8fd14ad5d15cadabd6c7545b05000000ad90e0d4000000000f3f750d2a75f6fa77d3fa4e023987f7a54b04eb238604aa90cab7b44f95ae6ce9b5f877439af64cb6573e5bc85c5e766604ff55b7a234246bd2ee44c9e99d69190bbe089603846d17b8678d05a0bda6ae300ca8c43271b65bb62b0af61bf4da3891f5bcf900ed368b36e2db9957b0dfa5cf084db8cb2b2c54661f9eac8a58a72fc9e768405eb33bce450dd088d2e16d757eeb1239a2389330535afb4944b7b27c4b26d812ab58864f3ffa3ce8cf739275492a0c90b425a792a19b9abf846b926e9f93f4b57ab77c0db63fb7d5a1e04ef52157f14f1dedcc4437"}, 0x40) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x17, 0x6, &(0x7f0000000c00)=ANY=[], &(0x7f00000002c0)='GPL\x00', 0x2, 0x0, 0x0, 0x40f00, 0x8, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000340)={0x1, 0x10000003}, 0x8, 0x10, &(0x7f0000000380)={0x0, 0xa, 0x83, 0x2}, 0x10}, 0x78) ioctl$sock_kcm_SIOCKCMATTACH(r3, 0x89e0, &(0x7f0000000500)={0xffffffffffffffff, r7}) 06:09:05 executing program 5: pipe(0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000140)=ANY=[], 0x4240a2a0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000100)={0x26, 'hash\x00', 0x0, 0x0, 'crct10dif-generic\x00'}, 0x58) r3 = accept$alg(r2, 0x0, 0x0) r4 = accept4(r3, 0x0, 0x0, 0x0) splice(0xffffffffffffffff, 0x0, r4, 0x0, 0x30007, 0x0) 06:09:05 executing program 3: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x80801, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @ipv4}, 0x1c) getsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x3d, &(0x7f0000000300)={@dev}, 0x0) 06:09:05 executing program 5: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(r4, &(0x7f0000000100)={0x26, 'hash\x00', 0x0, 0x0, 'crct10dif-generic\x00'}, 0x58) r5 = accept$alg(r4, 0x0, 0x0) r6 = accept4(r5, 0x0, 0x0, 0x0) splice(r0, 0x0, r6, 0x0, 0x30007, 0x0) 06:09:05 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet_udp_int(r0, 0x11, 0x67, &(0x7f0000000140)=0x6, 0x4) sendmmsg(r0, &(0x7f0000006f00)=[{{&(0x7f0000000040)=@in={0x2, 0x4e23, @remote}, 0x80, &(0x7f0000000100)=[{&(0x7f00000000c0)="e04013b497936ecafdd12c496f522cc2830fd358bc8f890e410223906070a39cc6e2f84a8622c5f86cad52bba1560397737a6cce189d7db27e", 0x39}], 0x1}}, {{0x0, 0x0, &(0x7f0000000440)=[{&(0x7f0000000200)="9544939c01e602e8fc696947591d4c6fb3cb9a7cf9e53555dac91c09bbd33a6e85981e045d", 0x25}, {&(0x7f0000000240)="b995a5bf327c6f291a70af1527c6eb87af6b40c22e784c7d81102b1d2c4f5434d0142b1efa49361c7fa370cde02cbad1cdf556d5ebe84042e5b1eee75566d3c3bd4e54fb80c6258eb985131872c446ae99febe93703f66f4e0e10392c8a0d30f35710c7490190fef84833442ab74de59e4c9ebbc7cfe3f26750c16970d537ab353640e9e46e706cd200383135bfbf29b19c2fe729da592a9fb74eca37cb46775eb6db0118a3c59ac107fcf691822488d67f90e891045cb2ea35a79b6cd27c9fa5f37c9f6d6e4e2", 0xc7}, {&(0x7f0000000340)="529cd4456bccdb80c030fe01e5cd61704126c8d4e7ec", 0x16}, {&(0x7f0000000380)="c2597979197f75ed6b82c8bcbf2c6b92a9a53fdd74646d60f9941ca27e", 0x1d}], 0x4}}], 0x2, 0x4c004) sendmmsg(r0, &(0x7f0000007fc0), 0x800001d, 0x0) 06:09:05 executing program 2: r0 = eventfd(0x0) r1 = fcntl$dupfd(r0, 0x0, r0) close(r1) r2 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r2, &(0x7f0000000040)={0x2, 0x4e5e, @remote}, 0x10) write$P9_RSYMLINK(r1, 0x0, 0x0) [ 248.479363][T11204] IPVS: ftp: loaded support on port[0] = 21 06:09:05 executing program 0: r0 = perf_event_open(&(0x7f0000000640)={0x3, 0x70, 0x3e7, 0x0, 0x4, 0x0, 0x0, 0x0, 0x91dd7106ca8fd33b, 0xdb3fedb3c3734f95, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x40000000000, 0x0, 0x1, 0x0, @perf_config_ext={0x18, 0x3}, 0x21, 0x10000000000000, 0x0, 0x0, 0x0, 0x20000007, 0x2}, 0x0, 0xc, 0xffffffffffffffff, 0xa) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r0) r1 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f00000003c0)='syz1\x00', 0x200002, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0xfffffffffffffffc) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000300)='./cgroup/syz0\x00', 0x200002, 0x0) gettid() socket$kcm(0x11, 0xb, 0x0) ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, &(0x7f00000000c0)=ANY=[@ANYBLOB="00000700000000da6500bbc4bbbbbbbb0180c2000016000000004dc23f0c000000000000bb"]) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000040)=@ipx={0x4, 0x1, 0x0, "2bfaec665b4b", 0xff}, 0x80, 0x0}, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={0xffffffffffffffff, 0x1, 0x49c42ca22ab5a9ac, 0x4, 0x0}, 0x20) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x908b7aabaa7d2404) socket$kcm(0xa, 0x6, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x4000011) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000000c0), 0x0}, 0x28) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x89f1, &(0x7f0000000000)='ip6gre0\x00') perf_event_open(&(0x7f00000004c0)={0x0, 0x70, 0x8, 0x6, 0x0, 0x3, 0x0, 0x3, 0x4, 0x0, 0x9, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x1000, 0x0, @perf_config_ext={0x1ff}, 0x40004, 0xfffffffffffffffd, 0x0, 0x8, 0x8, 0x4, 0x80}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0x10, 0x0, 0x10) sendmsg$kcm(r3, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d200040080000048000001000080000000000300f88000f01700d4bd", 0x2e}], 0xf}, 0x40094) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r5 = socket$kcm(0x2, 0x1, 0x2) socketpair(0x25, 0x6, 0x4, &(0x7f0000000480)) setsockopt$sock_attach_bpf(r5, 0x1, 0x3e, &(0x7f00000002c0)=r4, 0x4) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x6d, &(0x7f0000000cc0)=ANY=[@ANYRESHEX, @ANYBLOB="e99f619c950ec8069b69ac05520100000000000000572e83f4fd34a6db69715afdc8ec492fa879a8460bf2c7459f384ec36d6f0d833fccc87dc8f542ca0731ec72c3f6e0857c63572db61a83246496a2f90400569c8af42a5b8b1e3583115dfe3a40a792ffe638fd722afd02131c170175f382a8d78b6626d1d58220f08d98570bad00042a01c00748cf37385e7d66e6c0efddeb730ebd2f1ab4e816cf7493cf236ca5eb6e5d2a65519a7acf475dbd9fb52eb50ddcf9cee74529f59a2d6cfe6c23f6a688719f922099394146621132f866439970571e206ac47123f2d9cdb5cb7c8506122300000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000)={0x0, 0x8}, 0x10}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r6, 0x18000000000002a0, 0x42, 0x0, &(0x7f0000000800)="b9ff0300600d698cb89e14f088a81fffffff00004000630677fbac14140ee934a0a662079f4b4d2f87e5feca6aab845013f2325f1a39010108038da1924425181aa5", 0x0, 0x28000, 0x60000000, 0x113, 0x0, &(0x7f00000006c0)="097baacf569909ebb78a19b4d4f607feb3072ad9474026c7c148d184a2647de87a8fd14ad5d15cadabd6c7545b05000000ad90e0d4000000000f3f750d2a75f6fa77d3fa4e023987f7a54b04eb238604aa90cab7b44f95ae6ce9b5f877439af64cb6573e5bc85c5e766604ff55b7a234246bd2ee44c9e99d69190bbe089603846d17b8678d05a0bda6ae300ca8c43271b65bb62b0af61bf4da3891f5bcf900ed368b36e2db9957b0dfa5cf084db8cb2b2c54661f9eac8a58a72fc9e768405eb33bce450dd088d2e16d757eeb1239a2389330535afb4944b7b27c4b26d812ab58864f3ffa3ce8cf739275492a0c90b425a792a19b9abf846b926e9f93f4b57ab77c0db63fb7d5a1e04ef52157f14f1dedcc4437"}, 0x40) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x17, 0x6, &(0x7f0000000c00)=ANY=[], &(0x7f00000002c0)='GPL\x00', 0x2, 0x0, 0x0, 0x40f00, 0x8, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000340)={0x1, 0x10000003}, 0x8, 0x10, &(0x7f0000000380)={0x0, 0xa, 0x83, 0x2}, 0x10}, 0x78) ioctl$sock_kcm_SIOCKCMATTACH(r3, 0x89e0, &(0x7f0000000500)={0xffffffffffffffff, r7}) 06:09:05 executing program 2: ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x111}}, 0x20) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffc}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f0000000100)={0x7, 0x8, 0xfa00, {r1, 0x6}}, 0x10) 06:09:05 executing program 4: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000000c0)) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r1, 0x40047438, &(0x7f0000000180)=""/246) ioctl$PPPIOCSFLAGS1(r1, 0x40047457, &(0x7f0000000000)) 06:09:05 executing program 3: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0xe8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcc, &(0x7f0000ee5000)={{0xa, 0x0, 0x0, @mcast1}, {0xa, 0x0, 0x0, @initdev}}, 0x5c) 06:09:05 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet_udp_int(r0, 0x11, 0x67, &(0x7f0000000140)=0x6, 0x4) sendmmsg(r0, &(0x7f0000006f00)=[{{&(0x7f0000000040)=@in={0x2, 0x4e23, @remote}, 0x80, &(0x7f0000000100)=[{&(0x7f00000000c0)="e04013b497936ecafdd12c496f522cc2830fd358bc8f890e410223906070a39cc6e2f84a8622c5f86cad52bba1560397737a6cce189d7db27e", 0x39}], 0x1}}, {{0x0, 0x0, &(0x7f0000000440)=[{&(0x7f0000000200)="9544939c01e602e8fc696947591d4c6fb3cb9a7cf9e53555dac91c09bbd33a6e85981e045d", 0x25}, {&(0x7f0000000240)="b995a5bf327c6f291a70af1527c6eb87af6b40c22e784c7d81102b1d2c4f5434d0142b1efa49361c7fa370cde02cbad1cdf556d5ebe84042e5b1eee75566d3c3bd4e54fb80c6258eb985131872c446ae99febe93703f66f4e0e10392c8a0d30f35710c7490190fef84833442ab74de59e4c9ebbc7cfe3f26750c16970d537ab353640e9e46e706cd200383135bfbf29b19c2fe729da592a9fb74eca37cb46775eb6db0118a3c59ac107fcf691822488d67f90e891045cb2ea35a79b6cd27c9fa5f37c9f6d6e4e2", 0xc7}, {&(0x7f0000000340)="529cd4456bccdb80c030fe01e5cd61704126c8d4e7ec", 0x16}, {&(0x7f0000000380)="c2597979197f75ed6b82c8bcbf2c6b92a9a53fdd74646d60f9941ca27e", 0x1d}], 0x4}}], 0x2, 0x4c004) sendmmsg(r0, &(0x7f0000007fc0), 0x800001d, 0x0) 06:09:05 executing program 0: r0 = perf_event_open(&(0x7f0000000640)={0x3, 0x70, 0x3e7, 0x0, 0x4, 0x0, 0x0, 0x0, 0x91dd7106ca8fd33b, 0xdb3fedb3c3734f95, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x40000000000, 0x0, 0x1, 0x0, @perf_config_ext={0x18, 0x3}, 0x21, 0x10000000000000, 0x0, 0x0, 0x0, 0x20000007, 0x2}, 0x0, 0xc, 0xffffffffffffffff, 0xa) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r0) r1 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f00000003c0)='syz1\x00', 0x200002, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0xfffffffffffffffc) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000300)='./cgroup/syz0\x00', 0x200002, 0x0) gettid() socket$kcm(0x11, 0xb, 0x0) ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, &(0x7f00000000c0)=ANY=[@ANYBLOB="00000700000000da6500bbc4bbbbbbbb0180c2000016000000004dc23f0c000000000000bb"]) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000040)=@ipx={0x4, 0x1, 0x0, "2bfaec665b4b", 0xff}, 0x80, 0x0}, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={0xffffffffffffffff, 0x1, 0x49c42ca22ab5a9ac, 0x4, 0x0}, 0x20) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x908b7aabaa7d2404) socket$kcm(0xa, 0x6, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x4000011) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000000c0), 0x0}, 0x28) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x89f1, &(0x7f0000000000)='ip6gre0\x00') perf_event_open(&(0x7f00000004c0)={0x0, 0x70, 0x8, 0x6, 0x0, 0x3, 0x0, 0x3, 0x4, 0x0, 0x9, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x1000, 0x0, @perf_config_ext={0x1ff}, 0x40004, 0xfffffffffffffffd, 0x0, 0x8, 0x8, 0x4, 0x80}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0x10, 0x0, 0x10) sendmsg$kcm(r3, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d200040080000048000001000080000000000300f88000f01700d4bd", 0x2e}], 0xf}, 0x40094) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r5 = socket$kcm(0x2, 0x1, 0x2) socketpair(0x25, 0x6, 0x4, &(0x7f0000000480)) setsockopt$sock_attach_bpf(r5, 0x1, 0x3e, &(0x7f00000002c0)=r4, 0x4) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x6d, &(0x7f0000000cc0)=ANY=[@ANYRESHEX, @ANYBLOB="e99f619c950ec8069b69ac05520100000000000000572e83f4fd34a6db69715afdc8ec492fa879a8460bf2c7459f384ec36d6f0d833fccc87dc8f542ca0731ec72c3f6e0857c63572db61a83246496a2f90400569c8af42a5b8b1e3583115dfe3a40a792ffe638fd722afd02131c170175f382a8d78b6626d1d58220f08d98570bad00042a01c00748cf37385e7d66e6c0efddeb730ebd2f1ab4e816cf7493cf236ca5eb6e5d2a65519a7acf475dbd9fb52eb50ddcf9cee74529f59a2d6cfe6c23f6a688719f922099394146621132f866439970571e206ac47123f2d9cdb5cb7c8506122300000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000)={0x0, 0x8}, 0x10}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r6, 0x18000000000002a0, 0x42, 0x0, &(0x7f0000000800)="b9ff0300600d698cb89e14f088a81fffffff00004000630677fbac14140ee934a0a662079f4b4d2f87e5feca6aab845013f2325f1a39010108038da1924425181aa5", 0x0, 0x28000, 0x60000000, 0x113, 0x0, &(0x7f00000006c0)="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"}, 0x40) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x17, 0x6, &(0x7f0000000c00)=ANY=[], &(0x7f00000002c0)='GPL\x00', 0x2, 0x0, 0x0, 0x40f00, 0x8, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000340)={0x1, 0x10000003}, 0x8, 0x10, &(0x7f0000000380)={0x0, 0xa, 0x83, 0x2}, 0x10}, 0x78) ioctl$sock_kcm_SIOCKCMATTACH(r3, 0x89e0, &(0x7f0000000500)={0xffffffffffffffff, r7}) 06:09:05 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='rpc_pipefs\x00', 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) getdents64(0xffffffffffffffff, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) open(0x0, 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) socket$inet6(0xa, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) 06:09:06 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet_udp_int(r0, 0x11, 0x67, &(0x7f0000000140)=0x6, 0x4) sendmmsg(r0, &(0x7f0000006f00)=[{{&(0x7f0000000040)=@in={0x2, 0x4e23, @remote}, 0x80, &(0x7f0000000100)=[{&(0x7f00000000c0)="e04013b497936ecafdd12c496f522cc2830fd358bc8f890e410223906070a39cc6e2f84a8622c5f86cad52bba1560397737a6cce189d7db27e", 0x39}], 0x1}}, {{0x0, 0x0, &(0x7f0000000440)=[{&(0x7f0000000200)="9544939c01e602e8fc696947591d4c6fb3cb9a7cf9e53555dac91c09bbd33a6e85981e045d", 0x25}, {&(0x7f0000000240)="b995a5bf327c6f291a70af1527c6eb87af6b40c22e784c7d81102b1d2c4f5434d0142b1efa49361c7fa370cde02cbad1cdf556d5ebe84042e5b1eee75566d3c3bd4e54fb80c6258eb985131872c446ae99febe93703f66f4e0e10392c8a0d30f35710c7490190fef84833442ab74de59e4c9ebbc7cfe3f26750c16970d537ab353640e9e46e706cd200383135bfbf29b19c2fe729da592a9fb74eca37cb46775eb6db0118a3c59ac107fcf691822488d67f90e891045cb2ea35a79b6cd27c9fa5f37c9f6d6e4e2", 0xc7}, {&(0x7f0000000340)="529cd4456bccdb80c030fe01e5cd61704126c8d4e7ec", 0x16}, {&(0x7f0000000380)="c2597979197f75ed6b82c8bcbf2c6b92a9a53fdd74646d60f9941ca27e", 0x1d}], 0x4}}], 0x2, 0x4c004) sendmmsg(r0, &(0x7f0000007fc0), 0x800001d, 0x0) [ 249.284441][T11263] IPVS: ftp: loaded support on port[0] = 21 06:09:06 executing program 5: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(r4, &(0x7f0000000100)={0x26, 'hash\x00', 0x0, 0x0, 'crct10dif-generic\x00'}, 0x58) r5 = accept$alg(r4, 0x0, 0x0) r6 = accept4(r5, 0x0, 0x0, 0x0) splice(r0, 0x0, r6, 0x0, 0x30007, 0x0) 06:09:06 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f00000001c0)) r0 = socket$inet(0x2, 0x3, 0xa3) setsockopt$inet_mreqn(r0, 0x0, 0x5, &(0x7f0000000440)={@multicast2, @multicast2}, 0xc) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) 06:09:06 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000300)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_IRQCHIP(r1, 0x8208ae63, &(0x7f00000003c0)={0x2, 0x2000000, @ioapic}) 06:09:06 executing program 0: perf_event_open(&(0x7f0000000640)={0x3, 0x70, 0x3e7, 0x0, 0x4, 0x0, 0x0, 0x0, 0x91dd7106ca8fd33b, 0xdb3fedb3c3734f95, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x40000000000, 0x0, 0x1, 0x0, @perf_config_ext={0x18, 0x3}, 0x21, 0x10000000000000, 0x0, 0x0, 0x0, 0x20000007, 0x2}, 0x0, 0xc, 0xffffffffffffffff, 0xa) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='cpuacct.stat\x00', 0x0, 0x0) r1 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f00000003c0)='syz1\x00', 0x200002, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0xfffffffffffffffc) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000300)='./cgroup/syz0\x00', 0x200002, 0x0) gettid() socket$kcm(0x11, 0xb, 0x0) ioctl$TUNSETTXFILTER(r0, 0x400454d1, &(0x7f00000000c0)=ANY=[@ANYBLOB="00000700000000da6500bbc4bbbbbbbb0180c2000016000000004dc23f0c000000000000bb"]) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000040)=@ipx={0x4, 0x1, 0x0, "2bfaec665b4b", 0xff}, 0x80, 0x0}, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={0xffffffffffffffff, 0x1, 0x49c42ca22ab5a9ac, 0x4, 0x0}, 0x20) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x908b7aabaa7d2404) socket$kcm(0xa, 0x6, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x4000011) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000000c0), 0x0}, 0x28) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x89f1, &(0x7f0000000000)='ip6gre0\x00') perf_event_open(&(0x7f00000004c0)={0x0, 0x70, 0x8, 0x6, 0x0, 0x3, 0x0, 0x3, 0x4, 0x0, 0x9, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x1000, 0x0, @perf_config_ext={0x1ff}, 0x40004, 0xfffffffffffffffd, 0x0, 0x8, 0x8, 0x4, 0x80}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0x10, 0x0, 0x10) sendmsg$kcm(r3, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d200040080000048000001000080000000000300f88000f01700d4bd", 0x2e}], 0xf}, 0x40094) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r5 = socket$kcm(0x2, 0x1, 0x2) socketpair(0x25, 0x6, 0x4, &(0x7f0000000480)) setsockopt$sock_attach_bpf(r5, 0x1, 0x3e, &(0x7f00000002c0)=r4, 0x4) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x6d, &(0x7f0000000cc0)=ANY=[@ANYRESHEX, @ANYBLOB="e99f619c950ec8069b69ac05520100000000000000572e83f4fd34a6db69715afdc8ec492fa879a8460bf2c7459f384ec36d6f0d833fccc87dc8f542ca0731ec72c3f6e0857c63572db61a83246496a2f90400569c8af42a5b8b1e3583115dfe3a40a792ffe638fd722afd02131c170175f382a8d78b6626d1d58220f08d98570bad00042a01c00748cf37385e7d66e6c0efddeb730ebd2f1ab4e816cf7493cf236ca5eb6e5d2a65519a7acf475dbd9fb52eb50ddcf9cee74529f59a2d6cfe6c23f6a688719f922099394146621132f866439970571e206ac47123f2d9cdb5cb7c8506122300000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000)={0x0, 0x8}, 0x10}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r6, 0x18000000000002a0, 0x42, 0x0, &(0x7f0000000800)="b9ff0300600d698cb89e14f088a81fffffff00004000630677fbac14140ee934a0a662079f4b4d2f87e5feca6aab845013f2325f1a39010108038da1924425181aa5", 0x0, 0x28000, 0x60000000, 0x113, 0x0, &(0x7f00000006c0)="097baacf569909ebb78a19b4d4f607feb3072ad9474026c7c148d184a2647de87a8fd14ad5d15cadabd6c7545b05000000ad90e0d4000000000f3f750d2a75f6fa77d3fa4e023987f7a54b04eb238604aa90cab7b44f95ae6ce9b5f877439af64cb6573e5bc85c5e766604ff55b7a234246bd2ee44c9e99d69190bbe089603846d17b8678d05a0bda6ae300ca8c43271b65bb62b0af61bf4da3891f5bcf900ed368b36e2db9957b0dfa5cf084db8cb2b2c54661f9eac8a58a72fc9e768405eb33bce450dd088d2e16d757eeb1239a2389330535afb4944b7b27c4b26d812ab58864f3ffa3ce8cf739275492a0c90b425a792a19b9abf846b926e9f93f4b57ab77c0db63fb7d5a1e04ef52157f14f1dedcc4437"}, 0x40) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x17, 0x6, &(0x7f0000000c00)=ANY=[], &(0x7f00000002c0)='GPL\x00', 0x2, 0x0, 0x0, 0x40f00, 0x8, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000340)={0x1, 0x10000003}, 0x8, 0x10, &(0x7f0000000380)={0x0, 0xa, 0x83, 0x2}, 0x10}, 0x78) ioctl$sock_kcm_SIOCKCMATTACH(r3, 0x89e0, &(0x7f0000000500)={0xffffffffffffffff, r7}) 06:09:06 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet_udp_int(r0, 0x11, 0x67, &(0x7f0000000140)=0x6, 0x4) sendmmsg(r0, &(0x7f0000006f00)=[{{&(0x7f0000000040)=@in={0x2, 0x4e23, @remote}, 0x80, &(0x7f0000000100)=[{&(0x7f00000000c0)="e04013b497936ecafdd12c496f522cc2830fd358bc8f890e410223906070a39cc6e2f84a8622c5f86cad52bba1560397737a6cce189d7db27e", 0x39}], 0x1}}, {{0x0, 0x0, &(0x7f0000000440)=[{&(0x7f0000000200)="9544939c01e602e8fc696947591d4c6fb3cb9a7cf9e53555dac91c09bbd33a6e85981e045d", 0x25}, {&(0x7f0000000240)="b995a5bf327c6f291a70af1527c6eb87af6b40c22e784c7d81102b1d2c4f5434d0142b1efa49361c7fa370cde02cbad1cdf556d5ebe84042e5b1eee75566d3c3bd4e54fb80c6258eb985131872c446ae99febe93703f66f4e0e10392c8a0d30f35710c7490190fef84833442ab74de59e4c9ebbc7cfe3f26750c16970d537ab353640e9e46e706cd200383135bfbf29b19c2fe729da592a9fb74eca37cb46775eb6db0118a3c59ac107fcf691822488d67f90e891045cb2ea35a79b6cd27c9fa5f37c9f6d6e4e2ca9267b2a8aa34", 0xce}, {&(0x7f0000000340)="529cd4456bccdb80c030fe01e5cd61704126c8d4e7ec", 0x16}, {&(0x7f0000000380)="c2597979197f75ed6b82c8bcbf2c6b92a9a53fdd74646d60f9941ca27e", 0x1d}], 0x4}}], 0x2, 0x4c004) sendmmsg(r0, &(0x7f0000007fc0), 0x800001d, 0x0) [ 249.639324][T11300] L1TF CPU bug present and SMT on, data leak possible. See CVE-2018-3646 and https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/l1tf.html for details. 06:09:06 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f00000001c0)) r0 = socket$inet(0x2, 0x3, 0xa3) setsockopt$inet_mreqn(r0, 0x0, 0x5, &(0x7f0000000440)={@multicast2, @multicast2}, 0xc) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) 06:09:07 executing program 4: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000000c0)=0xe) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r1, 0x40047438, &(0x7f0000000180)=""/246) ioctl$PPPIOCSFLAGS1(r1, 0x40047457, &(0x7f0000000000)) 06:09:07 executing program 0: perf_event_open(&(0x7f0000000640)={0x3, 0x70, 0x3e7, 0x0, 0x4, 0x0, 0x0, 0x0, 0x91dd7106ca8fd33b, 0xdb3fedb3c3734f95, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x40000000000, 0x0, 0x1, 0x0, @perf_config_ext={0x18, 0x3}, 0x21, 0x10000000000000, 0x0, 0x0, 0x0, 0x20000007, 0x2}, 0x0, 0xc, 0xffffffffffffffff, 0xa) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='cpuacct.stat\x00', 0x0, 0x0) r1 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f00000003c0)='syz1\x00', 0x200002, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0xfffffffffffffffc) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000300)='./cgroup/syz0\x00', 0x200002, 0x0) gettid() socket$kcm(0x11, 0xb, 0x0) ioctl$TUNSETTXFILTER(r0, 0x400454d1, &(0x7f00000000c0)=ANY=[@ANYBLOB="00000700000000da6500bbc4bbbbbbbb0180c2000016000000004dc23f0c000000000000bb"]) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000040)=@ipx={0x4, 0x1, 0x0, "2bfaec665b4b", 0xff}, 0x80, 0x0}, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={0xffffffffffffffff, 0x1, 0x49c42ca22ab5a9ac, 0x4, 0x0}, 0x20) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x908b7aabaa7d2404) socket$kcm(0xa, 0x6, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x4000011) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000000c0), 0x0}, 0x28) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x89f1, &(0x7f0000000000)='ip6gre0\x00') perf_event_open(&(0x7f00000004c0)={0x0, 0x70, 0x8, 0x6, 0x0, 0x3, 0x0, 0x3, 0x4, 0x0, 0x9, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x1000, 0x0, @perf_config_ext={0x1ff}, 0x40004, 0xfffffffffffffffd, 0x0, 0x8, 0x8, 0x4, 0x80}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0x10, 0x0, 0x10) sendmsg$kcm(r3, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d200040080000048000001000080000000000300f88000f01700d4bd", 0x2e}], 0xf}, 0x40094) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r5 = socket$kcm(0x2, 0x1, 0x2) socketpair(0x25, 0x6, 0x4, &(0x7f0000000480)) setsockopt$sock_attach_bpf(r5, 0x1, 0x3e, &(0x7f00000002c0)=r4, 0x4) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x6d, &(0x7f0000000cc0)=ANY=[@ANYRESHEX, @ANYBLOB="e99f619c950ec8069b69ac05520100000000000000572e83f4fd34a6db69715afdc8ec492fa879a8460bf2c7459f384ec36d6f0d833fccc87dc8f542ca0731ec72c3f6e0857c63572db61a83246496a2f90400569c8af42a5b8b1e3583115dfe3a40a792ffe638fd722afd02131c170175f382a8d78b6626d1d58220f08d98570bad00042a01c00748cf37385e7d66e6c0efddeb730ebd2f1ab4e816cf7493cf236ca5eb6e5d2a65519a7acf475dbd9fb52eb50ddcf9cee74529f59a2d6cfe6c23f6a688719f922099394146621132f866439970571e206ac47123f2d9cdb5cb7c8506122300000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000)={0x0, 0x8}, 0x10}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r6, 0x18000000000002a0, 0x42, 0x0, &(0x7f0000000800)="b9ff0300600d698cb89e14f088a81fffffff00004000630677fbac14140ee934a0a662079f4b4d2f87e5feca6aab845013f2325f1a39010108038da1924425181aa5", 0x0, 0x28000, 0x60000000, 0x113, 0x0, &(0x7f00000006c0)="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"}, 0x40) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x17, 0x6, &(0x7f0000000c00)=ANY=[], &(0x7f00000002c0)='GPL\x00', 0x2, 0x0, 0x0, 0x40f00, 0x8, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000340)={0x1, 0x10000003}, 0x8, 0x10, &(0x7f0000000380)={0x0, 0xa, 0x83, 0x2}, 0x10}, 0x78) ioctl$sock_kcm_SIOCKCMATTACH(r3, 0x89e0, &(0x7f0000000500)={0xffffffffffffffff, r7}) 06:09:07 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000880)='/dev/loop#\x00', 0x0, 0x182) r1 = memfd_create(&(0x7f0000000240)='.^\xc5', 0x0) pwritev(r1, &(0x7f0000000000)=[{&(0x7f0000000140)='!', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, r0, 0x0, 0x24000000) ioctl$LOOP_CLR_FD(r0, 0x4c01) ioctl$LOOP_SET_FD(r0, 0x1261, 0xffffffffffffffff) 06:09:07 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet_udp_int(r0, 0x11, 0x67, &(0x7f0000000140)=0x6, 0x4) sendmmsg(r0, &(0x7f0000006f00)=[{{&(0x7f0000000040)=@in={0x2, 0x4e23, @remote}, 0x80, &(0x7f0000000100)=[{&(0x7f00000000c0)="e04013b497936ecafdd12c496f522cc2830fd358bc8f890e410223906070a39cc6e2f84a8622c5f86cad52bba1560397737a6cce189d7db27e", 0x39}], 0x1}}, {{0x0, 0x0, &(0x7f0000000440)=[{&(0x7f0000000200)="9544939c01e602e8fc696947591d4c6fb3cb9a7cf9e53555dac91c09bbd33a6e85981e045d", 0x25}, {&(0x7f0000000240)="b995a5bf327c6f291a70af1527c6eb87af6b40c22e784c7d81102b1d2c4f5434d0142b1efa49361c7fa370cde02cbad1cdf556d5ebe84042e5b1eee75566d3c3bd4e54fb80c6258eb985131872c446ae99febe93703f66f4e0e10392c8a0d30f35710c7490190fef84833442ab74de59e4c9ebbc7cfe3f26750c16970d537ab353640e9e46e706cd200383135bfbf29b19c2fe729da592a9fb74eca37cb46775eb6db0118a3c59ac107fcf691822488d67f90e891045cb2ea35a79b6cd27c9fa5f37c9f6d6e4e2ca9267b2a8aa34", 0xce}, {&(0x7f0000000340)="529cd4456bccdb80c030fe01e5cd61704126c8d4e7ec", 0x16}, {&(0x7f0000000380)="c2597979197f75ed6b82c8bcbf2c6b92a9a53fdd74646d60f9941ca27e", 0x1d}], 0x4}}], 0x2, 0x4c004) sendmmsg(r0, &(0x7f0000007fc0), 0x800001d, 0x0) 06:09:07 executing program 2: perf_event_open(&(0x7f0000000500)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x42000) syz_emit_ethernet(0x36, &(0x7f00000001c0)={@local, @dev={[], 0x1}, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x4, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @local}, {{0x2000, 0x0, 0x41424344, 0x41424344, 0x0, 0x6, 0x5}}}}}}, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)=ANY=[@ANYBLOB="aaaaaaaaaaaaaaaaaaaaaaaa86dd6020920000140600fe800000000000000000600a000000aafe8000000000000000000000000000aa00004e22", @ANYRES32=0x41424344, @ANYBLOB="50c28ce422"], 0x0) 06:09:07 executing program 2: perf_event_open(&(0x7f0000000500)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x42000) syz_emit_ethernet(0x36, &(0x7f00000001c0)={@local, @dev={[], 0x1}, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x4, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @local}, {{0x2000, 0x0, 0x41424344, 0x41424344, 0x0, 0x6, 0x5}}}}}}, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)=ANY=[@ANYBLOB="aaaaaaaaaaaaaaaaaaaaaaaa86dd6020920000140600fe800000000000000000600a000000aafe8000000000000000000000000000aa00004e22", @ANYRES32=0x41424344, @ANYBLOB="50c28ce422"], 0x0) [ 250.363423][T11335] IPVS: ftp: loaded support on port[0] = 21 06:09:07 executing program 5: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(r4, &(0x7f0000000100)={0x26, 'hash\x00', 0x0, 0x0, 'crct10dif-generic\x00'}, 0x58) r5 = accept$alg(r4, 0x0, 0x0) r6 = accept4(r5, 0x0, 0x0, 0x0) splice(r0, 0x0, r6, 0x0, 0x30007, 0x0) 06:09:07 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet_udp_int(r0, 0x11, 0x67, &(0x7f0000000140)=0x6, 0x4) sendmmsg(r0, &(0x7f0000006f00)=[{{&(0x7f0000000040)=@in={0x2, 0x4e23, @remote}, 0x80, &(0x7f0000000100)=[{&(0x7f00000000c0)="e04013b497936ecafdd12c496f522cc2830fd358bc8f890e410223906070a39cc6e2f84a8622c5f86cad52bba1560397737a6cce189d7db27e", 0x39}], 0x1}}, {{0x0, 0x0, &(0x7f0000000440)=[{&(0x7f0000000200)="9544939c01e602e8fc696947591d4c6fb3cb9a7cf9e53555dac91c09bbd33a6e85981e045d", 0x25}, {&(0x7f0000000240)="b995a5bf327c6f291a70af1527c6eb87af6b40c22e784c7d81102b1d2c4f5434d0142b1efa49361c7fa370cde02cbad1cdf556d5ebe84042e5b1eee75566d3c3bd4e54fb80c6258eb985131872c446ae99febe93703f66f4e0e10392c8a0d30f35710c7490190fef84833442ab74de59e4c9ebbc7cfe3f26750c16970d537ab353640e9e46e706cd200383135bfbf29b19c2fe729da592a9fb74eca37cb46775eb6db0118a3c59ac107fcf691822488d67f90e891045cb2ea35a79b6cd27c9fa5f37c9f6d6e4e2ca9267b2a8aa34", 0xce}, {&(0x7f0000000340)="529cd4456bccdb80c030fe01e5cd61704126c8d4e7ec", 0x16}, {&(0x7f0000000380)="c2597979197f75ed6b82c8bcbf2c6b92a9a53fdd74646d60f9941ca27e", 0x1d}], 0x4}}], 0x2, 0x4c004) sendmmsg(r0, &(0x7f0000007fc0), 0x800001d, 0x0) 06:09:07 executing program 0: perf_event_open(&(0x7f0000000640)={0x3, 0x70, 0x3e7, 0x0, 0x4, 0x0, 0x0, 0x0, 0x91dd7106ca8fd33b, 0xdb3fedb3c3734f95, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x40000000000, 0x0, 0x1, 0x0, @perf_config_ext={0x18, 0x3}, 0x21, 0x10000000000000, 0x0, 0x0, 0x0, 0x20000007, 0x2}, 0x0, 0xc, 0xffffffffffffffff, 0xa) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='cpuacct.stat\x00', 0x0, 0x0) r1 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f00000003c0)='syz1\x00', 0x200002, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0xfffffffffffffffc) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000300)='./cgroup/syz0\x00', 0x200002, 0x0) gettid() socket$kcm(0x11, 0xb, 0x0) ioctl$TUNSETTXFILTER(r0, 0x400454d1, &(0x7f00000000c0)=ANY=[@ANYBLOB="00000700000000da6500bbc4bbbbbbbb0180c2000016000000004dc23f0c000000000000bb"]) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000040)=@ipx={0x4, 0x1, 0x0, "2bfaec665b4b", 0xff}, 0x80, 0x0}, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={0xffffffffffffffff, 0x1, 0x49c42ca22ab5a9ac, 0x4, 0x0}, 0x20) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x908b7aabaa7d2404) socket$kcm(0xa, 0x6, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x4000011) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000000c0), 0x0}, 0x28) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x89f1, &(0x7f0000000000)='ip6gre0\x00') perf_event_open(&(0x7f00000004c0)={0x0, 0x70, 0x8, 0x6, 0x0, 0x3, 0x0, 0x3, 0x4, 0x0, 0x9, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x1000, 0x0, @perf_config_ext={0x1ff}, 0x40004, 0xfffffffffffffffd, 0x0, 0x8, 0x8, 0x4, 0x80}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0x10, 0x0, 0x10) sendmsg$kcm(r3, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d200040080000048000001000080000000000300f88000f01700d4bd", 0x2e}], 0xf}, 0x40094) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r5 = socket$kcm(0x2, 0x1, 0x2) socketpair(0x25, 0x6, 0x4, &(0x7f0000000480)) setsockopt$sock_attach_bpf(r5, 0x1, 0x3e, &(0x7f00000002c0)=r4, 0x4) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x6d, &(0x7f0000000cc0)=ANY=[@ANYRESHEX, @ANYBLOB="e99f619c950ec8069b69ac05520100000000000000572e83f4fd34a6db69715afdc8ec492fa879a8460bf2c7459f384ec36d6f0d833fccc87dc8f542ca0731ec72c3f6e0857c63572db61a83246496a2f90400569c8af42a5b8b1e3583115dfe3a40a792ffe638fd722afd02131c170175f382a8d78b6626d1d58220f08d98570bad00042a01c00748cf37385e7d66e6c0efddeb730ebd2f1ab4e816cf7493cf236ca5eb6e5d2a65519a7acf475dbd9fb52eb50ddcf9cee74529f59a2d6cfe6c23f6a688719f922099394146621132f866439970571e206ac47123f2d9cdb5cb7c8506122300000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000)={0x0, 0x8}, 0x10}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r6, 0x18000000000002a0, 0x42, 0x0, &(0x7f0000000800)="b9ff0300600d698cb89e14f088a81fffffff00004000630677fbac14140ee934a0a662079f4b4d2f87e5feca6aab845013f2325f1a39010108038da1924425181aa5", 0x0, 0x28000, 0x60000000, 0x113, 0x0, &(0x7f00000006c0)="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"}, 0x40) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x17, 0x6, &(0x7f0000000c00)=ANY=[], &(0x7f00000002c0)='GPL\x00', 0x2, 0x0, 0x0, 0x40f00, 0x8, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000340)={0x1, 0x10000003}, 0x8, 0x10, &(0x7f0000000380)={0x0, 0xa, 0x83, 0x2}, 0x10}, 0x78) ioctl$sock_kcm_SIOCKCMATTACH(r3, 0x89e0, &(0x7f0000000500)={0xffffffffffffffff, r7}) 06:09:07 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ptmx\x00', 0x3d, 0x0) sendmsg$ETHTOOL_MSG_STRSET_GET(0xffffffffffffffff, &(0x7f0000000780)={0x0, 0x0, &(0x7f0000000740)={&(0x7f0000001dc0)={0x1c, 0x0, 0x0, 0x0, 0x0, {0xe}, [@ETHTOOL_A_STRSET_STRINGSETS={0x8, 0x2, 0x0, 0x1, [{0x4}]}]}, 0x1c}}, 0x0) write$binfmt_aout(r0, &(0x7f00000000c0)=ANY=[], 0xffffff78) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x0) r2 = dup3(r1, r0, 0x0) ioctl$sock_SIOCINQ(r2, 0x541b, &(0x7f0000000000)) 06:09:07 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet_udp_int(r0, 0x11, 0x67, &(0x7f0000000140)=0x6, 0x4) sendmmsg(r0, &(0x7f0000006f00)=[{{&(0x7f0000000040)=@in={0x2, 0x4e23, @remote}, 0x80, &(0x7f0000000100)=[{&(0x7f00000000c0)="e04013b497936ecafdd12c496f522cc2830fd358bc8f890e410223906070a39cc6e2f84a8622c5f86cad52bba1560397737a6cce189d7db27e", 0x39}], 0x1}}, {{0x0, 0x0, &(0x7f0000000440)=[{&(0x7f0000000200)="9544939c01e602e8fc696947591d4c6fb3cb9a7cf9e53555dac91c09bbd33a6e85981e045d", 0x25}, {&(0x7f0000000240)="b995a5bf327c6f291a70af1527c6eb87af6b40c22e784c7d81102b1d2c4f5434d0142b1efa49361c7fa370cde02cbad1cdf556d5ebe84042e5b1eee75566d3c3bd4e54fb80c6258eb985131872c446ae99febe93703f66f4e0e10392c8a0d30f35710c7490190fef84833442ab74de59e4c9ebbc7cfe3f26750c16970d537ab353640e9e46e706cd200383135bfbf29b19c2fe729da592a9fb74eca37cb46775eb6db0118a3c59ac107fcf691822488d67f90e891045cb2ea35a79b6cd27c9fa5f37c9f6d6e4e2ca9267b2a8aa34f9727b", 0xd1}, {&(0x7f0000000340)="529cd4456bccdb80c030fe01e5cd61704126c8d4e7ec", 0x16}, {&(0x7f0000000380)="c2597979197f75ed6b82c8bcbf2c6b92a9a53fdd74646d60f9941ca27e", 0x1d}], 0x4}}], 0x2, 0x4c004) sendmmsg(r0, &(0x7f0000007fc0), 0x800001d, 0x0) 06:09:07 executing program 2: perf_event_open(&(0x7f0000000500)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x42000) syz_emit_ethernet(0x36, &(0x7f00000001c0)={@local, @dev={[], 0x1}, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x4, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @local}, {{0x2000, 0x0, 0x41424344, 0x41424344, 0x0, 0x6, 0x5}}}}}}, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)=ANY=[@ANYBLOB="aaaaaaaaaaaaaaaaaaaaaaaa86dd6020920000140600fe800000000000000000600a000000aafe8000000000000000000000000000aa00004e22", @ANYRES32=0x41424344, @ANYBLOB="50c28ce422"], 0x0) 06:09:08 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet_udp_int(r0, 0x11, 0x67, &(0x7f0000000140)=0x6, 0x4) sendmmsg(r0, &(0x7f0000006f00)=[{{&(0x7f0000000040)=@in={0x2, 0x4e23, @remote}, 0x80, &(0x7f0000000100)=[{&(0x7f00000000c0)="e04013b497936ecafdd12c496f522cc2830fd358bc8f890e410223906070a39cc6e2f84a8622c5f86cad52bba1560397737a6cce189d7db27e", 0x39}], 0x1}}, {{0x0, 0x0, &(0x7f0000000440)=[{&(0x7f0000000200)="9544939c01e602e8fc696947591d4c6fb3cb9a7cf9e53555dac91c09bbd33a6e85981e045d", 0x25}, {&(0x7f0000000240)="b995a5bf327c6f291a70af1527c6eb87af6b40c22e784c7d81102b1d2c4f5434d0142b1efa49361c7fa370cde02cbad1cdf556d5ebe84042e5b1eee75566d3c3bd4e54fb80c6258eb985131872c446ae99febe93703f66f4e0e10392c8a0d30f35710c7490190fef84833442ab74de59e4c9ebbc7cfe3f26750c16970d537ab353640e9e46e706cd200383135bfbf29b19c2fe729da592a9fb74eca37cb46775eb6db0118a3c59ac107fcf691822488d67f90e891045cb2ea35a79b6cd27c9fa5f37c9f6d6e4e2ca9267b2a8aa34f9727b", 0xd1}, {&(0x7f0000000340)="529cd4456bccdb80c030fe01e5cd61704126c8d4e7ec", 0x16}, {&(0x7f0000000380)="c2597979197f75ed6b82c8bcbf2c6b92a9a53fdd74646d60f9941ca27e", 0x1d}], 0x4}}], 0x2, 0x4c004) sendmmsg(r0, &(0x7f0000007fc0), 0x800001d, 0x0) 06:09:08 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000140)={'syzkaller1\x00', {0x7, 0x0, @remote}}) write$tun(r0, &(0x7f0000000880)={@void, @val, @mpls={[], @ipv6=@icmpv6={0x0, 0x6, "9eef7b", 0x58, 0x3a, 0x0, @remote, @mcast2, {[], @param_prob={0x3, 0x0, 0x0, 0x0, {0x0, 0x6, "6595c3", 0x0, 0x0, 0x0, @mcast2, @loopback, [@hopopts={0x0, 0x0, [], [@ra]}], "4011c6ed3ec831c0a859df4fd6a1cf59a90c42b433580b28"}}}}}}, 0x8a) 06:09:08 executing program 0: ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='cpuacct.stat\x00', 0x0, 0x0) r1 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f00000003c0)='syz1\x00', 0x200002, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0xfffffffffffffffc) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000300)='./cgroup/syz0\x00', 0x200002, 0x0) gettid() socket$kcm(0x11, 0xb, 0x0) ioctl$TUNSETTXFILTER(r0, 0x400454d1, &(0x7f00000000c0)=ANY=[@ANYBLOB="00000700000000da6500bbc4bbbbbbbb0180c2000016000000004dc23f0c000000000000bb"]) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000040)=@ipx={0x4, 0x1, 0x0, "2bfaec665b4b", 0xff}, 0x80, 0x0}, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={0xffffffffffffffff, 0x1, 0x49c42ca22ab5a9ac, 0x4, 0x0}, 0x20) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x908b7aabaa7d2404) socket$kcm(0xa, 0x6, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x4000011) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000000c0), 0x0}, 0x28) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x89f1, &(0x7f0000000000)='ip6gre0\x00') perf_event_open(&(0x7f00000004c0)={0x0, 0x70, 0x8, 0x6, 0x0, 0x3, 0x0, 0x3, 0x4, 0x0, 0x9, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x1000, 0x0, @perf_config_ext={0x1ff}, 0x40004, 0xfffffffffffffffd, 0x0, 0x8, 0x8, 0x4, 0x80}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0x10, 0x0, 0x10) sendmsg$kcm(r3, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d200040080000048000001000080000000000300f88000f01700d4bd", 0x2e}], 0xf}, 0x40094) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r5 = socket$kcm(0x2, 0x1, 0x2) socketpair(0x25, 0x6, 0x4, &(0x7f0000000480)) setsockopt$sock_attach_bpf(r5, 0x1, 0x3e, &(0x7f00000002c0)=r4, 0x4) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x6d, &(0x7f0000000cc0)=ANY=[@ANYRESHEX, @ANYBLOB="e99f619c950ec8069b69ac05520100000000000000572e83f4fd34a6db69715afdc8ec492fa879a8460bf2c7459f384ec36d6f0d833fccc87dc8f542ca0731ec72c3f6e0857c63572db61a83246496a2f90400569c8af42a5b8b1e3583115dfe3a40a792ffe638fd722afd02131c170175f382a8d78b6626d1d58220f08d98570bad00042a01c00748cf37385e7d66e6c0efddeb730ebd2f1ab4e816cf7493cf236ca5eb6e5d2a65519a7acf475dbd9fb52eb50ddcf9cee74529f59a2d6cfe6c23f6a688719f922099394146621132f866439970571e206ac47123f2d9cdb5cb7c8506122300000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000)={0x0, 0x8}, 0x10}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r6, 0x18000000000002a0, 0x42, 0x0, &(0x7f0000000800)="b9ff0300600d698cb89e14f088a81fffffff00004000630677fbac14140ee934a0a662079f4b4d2f87e5feca6aab845013f2325f1a39010108038da1924425181aa5", 0x0, 0x28000, 0x60000000, 0x113, 0x0, &(0x7f00000006c0)="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"}, 0x40) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x17, 0x6, &(0x7f0000000c00)=ANY=[], &(0x7f00000002c0)='GPL\x00', 0x2, 0x0, 0x0, 0x40f00, 0x8, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000340)={0x1, 0x10000003}, 0x8, 0x10, &(0x7f0000000380)={0x0, 0xa, 0x83, 0x2}, 0x10}, 0x78) ioctl$sock_kcm_SIOCKCMATTACH(r3, 0x89e0, &(0x7f0000000500)={0xffffffffffffffff, r7}) 06:09:08 executing program 4: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000000c0)=0xe) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r1, 0x40047438, &(0x7f0000000180)=""/246) ioctl$PPPIOCSFLAGS1(r1, 0x40047457, &(0x7f0000000000)) 06:09:08 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet_udp_int(r0, 0x11, 0x67, &(0x7f0000000140)=0x6, 0x4) sendmmsg(r0, &(0x7f0000006f00)=[{{&(0x7f0000000040)=@in={0x2, 0x4e23, @remote}, 0x80, &(0x7f0000000100)=[{&(0x7f00000000c0)="e04013b497936ecafdd12c496f522cc2830fd358bc8f890e410223906070a39cc6e2f84a8622c5f86cad52bba1560397737a6cce189d7db27e", 0x39}], 0x1}}, {{0x0, 0x0, &(0x7f0000000440)=[{&(0x7f0000000200)="9544939c01e602e8fc696947591d4c6fb3cb9a7cf9e53555dac91c09bbd33a6e85981e045d", 0x25}, {&(0x7f0000000240)="b995a5bf327c6f291a70af1527c6eb87af6b40c22e784c7d81102b1d2c4f5434d0142b1efa49361c7fa370cde02cbad1cdf556d5ebe84042e5b1eee75566d3c3bd4e54fb80c6258eb985131872c446ae99febe93703f66f4e0e10392c8a0d30f35710c7490190fef84833442ab74de59e4c9ebbc7cfe3f26750c16970d537ab353640e9e46e706cd200383135bfbf29b19c2fe729da592a9fb74eca37cb46775eb6db0118a3c59ac107fcf691822488d67f90e891045cb2ea35a79b6cd27c9fa5f37c9f6d6e4e2ca9267b2a8aa34f9727b", 0xd1}, {&(0x7f0000000340)="529cd4456bccdb80c030fe01e5cd61704126c8d4e7ec", 0x16}, {&(0x7f0000000380)="c2597979197f75ed6b82c8bcbf2c6b92a9a53fdd74646d60f9941ca27e", 0x1d}], 0x4}}], 0x2, 0x4c004) sendmmsg(r0, &(0x7f0000007fc0), 0x800001d, 0x0) [ 251.288979][T11395] IPVS: ftp: loaded support on port[0] = 21 06:09:08 executing program 0: ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='cpuacct.stat\x00', 0x0, 0x0) r1 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f00000003c0)='syz1\x00', 0x200002, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0xfffffffffffffffc) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000300)='./cgroup/syz0\x00', 0x200002, 0x0) gettid() socket$kcm(0x11, 0xb, 0x0) ioctl$TUNSETTXFILTER(r0, 0x400454d1, &(0x7f00000000c0)=ANY=[@ANYBLOB="00000700000000da6500bbc4bbbbbbbb0180c2000016000000004dc23f0c000000000000bb"]) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000040)=@ipx={0x4, 0x1, 0x0, "2bfaec665b4b", 0xff}, 0x80, 0x0}, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={0xffffffffffffffff, 0x1, 0x49c42ca22ab5a9ac, 0x4, 0x0}, 0x20) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x908b7aabaa7d2404) socket$kcm(0xa, 0x6, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x4000011) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000000c0), 0x0}, 0x28) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x89f1, &(0x7f0000000000)='ip6gre0\x00') perf_event_open(&(0x7f00000004c0)={0x0, 0x70, 0x8, 0x6, 0x0, 0x3, 0x0, 0x3, 0x4, 0x0, 0x9, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x1000, 0x0, @perf_config_ext={0x1ff}, 0x40004, 0xfffffffffffffffd, 0x0, 0x8, 0x8, 0x4, 0x80}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0x10, 0x0, 0x10) sendmsg$kcm(r3, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d200040080000048000001000080000000000300f88000f01700d4bd", 0x2e}], 0xf}, 0x40094) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r5 = socket$kcm(0x2, 0x1, 0x2) socketpair(0x25, 0x6, 0x4, &(0x7f0000000480)) setsockopt$sock_attach_bpf(r5, 0x1, 0x3e, &(0x7f00000002c0)=r4, 0x4) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x6d, &(0x7f0000000cc0)=ANY=[@ANYRESHEX, @ANYBLOB="e99f619c950ec8069b69ac05520100000000000000572e83f4fd34a6db69715afdc8ec492fa879a8460bf2c7459f384ec36d6f0d833fccc87dc8f542ca0731ec72c3f6e0857c63572db61a83246496a2f90400569c8af42a5b8b1e3583115dfe3a40a792ffe638fd722afd02131c170175f382a8d78b6626d1d58220f08d98570bad00042a01c00748cf37385e7d66e6c0efddeb730ebd2f1ab4e816cf7493cf236ca5eb6e5d2a65519a7acf475dbd9fb52eb50ddcf9cee74529f59a2d6cfe6c23f6a688719f922099394146621132f866439970571e206ac47123f2d9cdb5cb7c8506122300000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000)={0x0, 0x8}, 0x10}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r6, 0x18000000000002a0, 0x42, 0x0, &(0x7f0000000800)="b9ff0300600d698cb89e14f088a81fffffff00004000630677fbac14140ee934a0a662079f4b4d2f87e5feca6aab845013f2325f1a39010108038da1924425181aa5", 0x0, 0x28000, 0x60000000, 0x113, 0x0, &(0x7f00000006c0)="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"}, 0x40) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x17, 0x6, &(0x7f0000000c00)=ANY=[], &(0x7f00000002c0)='GPL\x00', 0x2, 0x0, 0x0, 0x40f00, 0x8, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000340)={0x1, 0x10000003}, 0x8, 0x10, &(0x7f0000000380)={0x0, 0xa, 0x83, 0x2}, 0x10}, 0x78) ioctl$sock_kcm_SIOCKCMATTACH(r3, 0x89e0, &(0x7f0000000500)={0xffffffffffffffff, r7}) 06:09:08 executing program 5: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x2, 0x0, 0x0) r2 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000100)={0x26, 'hash\x00', 0x0, 0x0, 'crct10dif-generic\x00'}, 0x58) r4 = accept$alg(r3, 0x0, 0x0) r5 = accept4(r4, 0x0, 0x0, 0x0) splice(r0, 0x0, r5, 0x0, 0x30007, 0x0) 06:09:08 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet_udp_int(r0, 0x11, 0x67, &(0x7f0000000140)=0x6, 0x4) sendmmsg(r0, &(0x7f0000006f00)=[{{&(0x7f0000000040)=@in={0x2, 0x4e23, @remote}, 0x80, &(0x7f0000000100)=[{&(0x7f00000000c0)="e04013b497936ecafdd12c496f522cc2830fd358bc8f890e410223906070a39cc6e2f84a8622c5f86cad52bba1560397737a6cce189d7db27e", 0x39}], 0x1}}, {{0x0, 0x0, &(0x7f0000000440)=[{&(0x7f0000000200)="9544939c01e602e8fc696947591d4c6fb3cb9a7cf9e53555dac91c09bbd33a6e85981e045d", 0x25}, {&(0x7f0000000240)="b995a5bf327c6f291a70af1527c6eb87af6b40c22e784c7d81102b1d2c4f5434d0142b1efa49361c7fa370cde02cbad1cdf556d5ebe84042e5b1eee75566d3c3bd4e54fb80c6258eb985131872c446ae99febe93703f66f4e0e10392c8a0d30f35710c7490190fef84833442ab74de59e4c9ebbc7cfe3f26750c16970d537ab353640e9e46e706cd200383135bfbf29b19c2fe729da592a9fb74eca37cb46775eb6db0118a3c59ac107fcf691822488d67f90e891045cb2ea35a79b6cd27c9fa5f37c9f6d6e4e2ca9267b2a8aa34f9727b0f53", 0xd3}, {&(0x7f0000000340)="529cd4456bccdb80c030fe01e5cd61704126c8d4e7ec", 0x16}, {&(0x7f0000000380)="c2597979197f75ed6b82c8bcbf2c6b92a9a53fdd74646d60f9941ca27e", 0x1d}], 0x4}}], 0x2, 0x4c004) sendmmsg(r0, &(0x7f0000007fc0), 0x800001d, 0x0) 06:09:08 executing program 0: ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='cpuacct.stat\x00', 0x0, 0x0) r1 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f00000003c0)='syz1\x00', 0x200002, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0xfffffffffffffffc) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000300)='./cgroup/syz0\x00', 0x200002, 0x0) gettid() socket$kcm(0x11, 0xb, 0x0) ioctl$TUNSETTXFILTER(r0, 0x400454d1, &(0x7f00000000c0)=ANY=[@ANYBLOB="00000700000000da6500bbc4bbbbbbbb0180c2000016000000004dc23f0c000000000000bb"]) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000040)=@ipx={0x4, 0x1, 0x0, "2bfaec665b4b", 0xff}, 0x80, 0x0}, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={0xffffffffffffffff, 0x1, 0x49c42ca22ab5a9ac, 0x4, 0x0}, 0x20) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x908b7aabaa7d2404) socket$kcm(0xa, 0x6, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x4000011) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000000c0), 0x0}, 0x28) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x89f1, &(0x7f0000000000)='ip6gre0\x00') perf_event_open(&(0x7f00000004c0)={0x0, 0x70, 0x8, 0x6, 0x0, 0x3, 0x0, 0x3, 0x4, 0x0, 0x9, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x1000, 0x0, @perf_config_ext={0x1ff}, 0x40004, 0xfffffffffffffffd, 0x0, 0x8, 0x8, 0x4, 0x80}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0x10, 0x0, 0x10) sendmsg$kcm(r3, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d200040080000048000001000080000000000300f88000f01700d4bd", 0x2e}], 0xf}, 0x40094) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r5 = socket$kcm(0x2, 0x1, 0x2) socketpair(0x25, 0x6, 0x4, &(0x7f0000000480)) setsockopt$sock_attach_bpf(r5, 0x1, 0x3e, &(0x7f00000002c0)=r4, 0x4) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x6d, &(0x7f0000000cc0)=ANY=[@ANYRESHEX, @ANYBLOB="e99f619c950ec8069b69ac05520100000000000000572e83f4fd34a6db69715afdc8ec492fa879a8460bf2c7459f384ec36d6f0d833fccc87dc8f542ca0731ec72c3f6e0857c63572db61a83246496a2f90400569c8af42a5b8b1e3583115dfe3a40a792ffe638fd722afd02131c170175f382a8d78b6626d1d58220f08d98570bad00042a01c00748cf37385e7d66e6c0efddeb730ebd2f1ab4e816cf7493cf236ca5eb6e5d2a65519a7acf475dbd9fb52eb50ddcf9cee74529f59a2d6cfe6c23f6a688719f922099394146621132f866439970571e206ac47123f2d9cdb5cb7c8506122300000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000)={0x0, 0x8}, 0x10}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r6, 0x18000000000002a0, 0x42, 0x0, &(0x7f0000000800)="b9ff0300600d698cb89e14f088a81fffffff00004000630677fbac14140ee934a0a662079f4b4d2f87e5feca6aab845013f2325f1a39010108038da1924425181aa5", 0x0, 0x28000, 0x60000000, 0x113, 0x0, &(0x7f00000006c0)="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"}, 0x40) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x17, 0x6, &(0x7f0000000c00)=ANY=[], &(0x7f00000002c0)='GPL\x00', 0x2, 0x0, 0x0, 0x40f00, 0x8, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000340)={0x1, 0x10000003}, 0x8, 0x10, &(0x7f0000000380)={0x0, 0xa, 0x83, 0x2}, 0x10}, 0x78) ioctl$sock_kcm_SIOCKCMATTACH(r3, 0x89e0, &(0x7f0000000500)={0xffffffffffffffff, r7}) 06:09:08 executing program 3: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) creat(&(0x7f00000001c0)='./file1\x00', 0x0) sendmsg$TIPC_NL_SOCK_GET(0xffffffffffffffff, &(0x7f0000000a80)={0x0, 0x0, &(0x7f0000000a40)={&(0x7f0000001800)=ANY=[], 0xb0}}, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="0a02014d3804000019080300e60100006c00007a000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 06:09:08 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet_udp_int(r0, 0x11, 0x67, &(0x7f0000000140)=0x6, 0x4) sendmmsg(r0, &(0x7f0000006f00)=[{{&(0x7f0000000040)=@in={0x2, 0x4e23, @remote}, 0x80, &(0x7f0000000100)=[{&(0x7f00000000c0)="e04013b497936ecafdd12c496f522cc2830fd358bc8f890e410223906070a39cc6e2f84a8622c5f86cad52bba1560397737a6cce189d7db27e", 0x39}], 0x1}}, {{0x0, 0x0, &(0x7f0000000440)=[{&(0x7f0000000200)="9544939c01e602e8fc696947591d4c6fb3cb9a7cf9e53555dac91c09bbd33a6e85981e045d", 0x25}, {&(0x7f0000000240)="b995a5bf327c6f291a70af1527c6eb87af6b40c22e784c7d81102b1d2c4f5434d0142b1efa49361c7fa370cde02cbad1cdf556d5ebe84042e5b1eee75566d3c3bd4e54fb80c6258eb985131872c446ae99febe93703f66f4e0e10392c8a0d30f35710c7490190fef84833442ab74de59e4c9ebbc7cfe3f26750c16970d537ab353640e9e46e706cd200383135bfbf29b19c2fe729da592a9fb74eca37cb46775eb6db0118a3c59ac107fcf691822488d67f90e891045cb2ea35a79b6cd27c9fa5f37c9f6d6e4e2ca9267b2a8aa34f9727b0f53", 0xd3}, {&(0x7f0000000340)="529cd4456bccdb80c030fe01e5cd61704126c8d4e7ec", 0x16}, {&(0x7f0000000380)="c2597979197f75ed6b82c8bcbf2c6b92a9a53fdd74646d60f9941ca27e", 0x1d}], 0x4}}], 0x2, 0x4c004) sendmmsg(r0, &(0x7f0000007fc0), 0x800001d, 0x0) 06:09:09 executing program 4: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000000c0)=0xe) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r1, 0x40047438, &(0x7f0000000180)=""/246) ioctl$PPPIOCSFLAGS1(r1, 0x40047457, &(0x7f0000000000)) 06:09:09 executing program 0: r0 = perf_event_open(0x0, 0x0, 0xc, 0xffffffffffffffff, 0xa) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='cpuacct.stat\x00', 0x0, 0x0) r2 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r2, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f00000003c0)='syz1\x00', 0x200002, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0xfffffffffffffffc) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000300)='./cgroup/syz0\x00', 0x200002, 0x0) gettid() socket$kcm(0x11, 0xb, 0x0) ioctl$TUNSETTXFILTER(r1, 0x400454d1, &(0x7f00000000c0)=ANY=[@ANYBLOB="00000700000000da6500bbc4bbbbbbbb0180c2000016000000004dc23f0c000000000000bb"]) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000040)=@ipx={0x4, 0x1, 0x0, "2bfaec665b4b", 0xff}, 0x80, 0x0}, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={0xffffffffffffffff, 0x1, 0x49c42ca22ab5a9ac, 0x4, 0x0}, 0x20) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x908b7aabaa7d2404) socket$kcm(0xa, 0x6, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x4000011) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000000c0), 0x0}, 0x28) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x89f1, &(0x7f0000000000)='ip6gre0\x00') perf_event_open(&(0x7f00000004c0)={0x0, 0x70, 0x8, 0x6, 0x0, 0x3, 0x0, 0x3, 0x4, 0x0, 0x9, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x1000, 0x0, @perf_config_ext={0x1ff}, 0x40004, 0xfffffffffffffffd, 0x0, 0x8, 0x8, 0x4, 0x80}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0x10, 0x0, 0x10) sendmsg$kcm(r4, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d200040080000048000001000080000000000300f88000f01700d4bd", 0x2e}], 0xf}, 0x40094) r5 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r6 = socket$kcm(0x2, 0x1, 0x2) socketpair(0x25, 0x6, 0x4, &(0x7f0000000480)) setsockopt$sock_attach_bpf(r6, 0x1, 0x3e, &(0x7f00000002c0)=r5, 0x4) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x6d, &(0x7f0000000cc0)=ANY=[@ANYRESHEX, @ANYBLOB="e99f619c950ec8069b69ac05520100000000000000572e83f4fd34a6db69715afdc8ec492fa879a8460bf2c7459f384ec36d6f0d833fccc87dc8f542ca0731ec72c3f6e0857c63572db61a83246496a2f90400569c8af42a5b8b1e3583115dfe3a40a792ffe638fd722afd02131c170175f382a8d78b6626d1d58220f08d98570bad00042a01c00748cf37385e7d66e6c0efddeb730ebd2f1ab4e816cf7493cf236ca5eb6e5d2a65519a7acf475dbd9fb52eb50ddcf9cee74529f59a2d6cfe6c23f6a688719f922099394146621132f866439970571e206ac47123f2d9cdb5cb7c8506122300000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000)={0x0, 0x8}, 0x10}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r7, 0x18000000000002a0, 0x42, 0x0, &(0x7f0000000800)="b9ff0300600d698cb89e14f088a81fffffff00004000630677fbac14140ee934a0a662079f4b4d2f87e5feca6aab845013f2325f1a39010108038da1924425181aa5", 0x0, 0x28000, 0x60000000, 0x113, 0x0, &(0x7f00000006c0)="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"}, 0x40) r8 = bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x17, 0x6, &(0x7f0000000c00)=ANY=[], &(0x7f00000002c0)='GPL\x00', 0x2, 0x0, 0x0, 0x40f00, 0x8, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000340)={0x1, 0x10000003}, 0x8, 0x10, &(0x7f0000000380)={0x0, 0xa, 0x83, 0x2}, 0x10}, 0x78) ioctl$sock_kcm_SIOCKCMATTACH(r4, 0x89e0, &(0x7f0000000500)={0xffffffffffffffff, r8}) [ 252.431751][T11462] IPVS: ftp: loaded support on port[0] = 21 06:09:09 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) syslog(0x3, &(0x7f00000000c0)=""/147, 0x6558a7e3409167e0) open(&(0x7f0000000e00)='./file0\x00', 0x0, 0x0) mount(&(0x7f0000000200)=ANY=[], &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, 0x0) symlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000280)='./file0\x00') r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='mounts\x00') r1 = memfd_create(&(0x7f0000000000), 0x0) write$P9_RREADLINK(r0, &(0x7f0000000340)={0x10, 0x17, 0x2, {0x7, './file0'}}, 0x10) ioctl$sock_inet_SIOCDELRT(0xffffffffffffffff, 0x890c, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, 0x0) getpid() sendfile(r1, r0, 0x0, 0xfffffffe) 06:09:09 executing program 5: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x2, 0x0, 0x0) r2 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000100)={0x26, 'hash\x00', 0x0, 0x0, 'crct10dif-generic\x00'}, 0x58) r4 = accept$alg(r3, 0x0, 0x0) r5 = accept4(r4, 0x0, 0x0, 0x0) splice(r0, 0x0, r5, 0x0, 0x30007, 0x0) 06:09:09 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDFONTOP_COPY(r0, 0x4b72, &(0x7f0000000080)={0x2, 0x0, 0x0, 0x0, 0x0, 0x0}) 06:09:09 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet_udp_int(r0, 0x11, 0x67, &(0x7f0000000140)=0x6, 0x4) sendmmsg(r0, &(0x7f0000006f00)=[{{&(0x7f0000000040)=@in={0x2, 0x4e23, @remote}, 0x80, &(0x7f0000000100)=[{&(0x7f00000000c0)="e04013b497936ecafdd12c496f522cc2830fd358bc8f890e410223906070a39cc6e2f84a8622c5f86cad52bba1560397737a6cce189d7db27e", 0x39}], 0x1}}, {{0x0, 0x0, &(0x7f0000000440)=[{&(0x7f0000000200)="9544939c01e602e8fc696947591d4c6fb3cb9a7cf9e53555dac91c09bbd33a6e85981e045d", 0x25}, {&(0x7f0000000240)="b995a5bf327c6f291a70af1527c6eb87af6b40c22e784c7d81102b1d2c4f5434d0142b1efa49361c7fa370cde02cbad1cdf556d5ebe84042e5b1eee75566d3c3bd4e54fb80c6258eb985131872c446ae99febe93703f66f4e0e10392c8a0d30f35710c7490190fef84833442ab74de59e4c9ebbc7cfe3f26750c16970d537ab353640e9e46e706cd200383135bfbf29b19c2fe729da592a9fb74eca37cb46775eb6db0118a3c59ac107fcf691822488d67f90e891045cb2ea35a79b6cd27c9fa5f37c9f6d6e4e2ca9267b2a8aa34f9727b0f53", 0xd3}, {&(0x7f0000000340)="529cd4456bccdb80c030fe01e5cd61704126c8d4e7ec", 0x16}, {&(0x7f0000000380)="c2597979197f75ed6b82c8bcbf2c6b92a9a53fdd74646d60f9941ca27e", 0x1d}], 0x4}}], 0x2, 0x4c004) sendmmsg(r0, &(0x7f0000007fc0), 0x800001d, 0x0) 06:09:09 executing program 0: r0 = perf_event_open(0x0, 0x0, 0xc, 0xffffffffffffffff, 0xa) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='cpuacct.stat\x00', 0x0, 0x0) r2 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r2, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f00000003c0)='syz1\x00', 0x200002, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0xfffffffffffffffc) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000300)='./cgroup/syz0\x00', 0x200002, 0x0) gettid() socket$kcm(0x11, 0xb, 0x0) ioctl$TUNSETTXFILTER(r1, 0x400454d1, &(0x7f00000000c0)=ANY=[@ANYBLOB="00000700000000da6500bbc4bbbbbbbb0180c2000016000000004dc23f0c000000000000bb"]) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000040)=@ipx={0x4, 0x1, 0x0, "2bfaec665b4b", 0xff}, 0x80, 0x0}, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={0xffffffffffffffff, 0x1, 0x49c42ca22ab5a9ac, 0x4, 0x0}, 0x20) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x908b7aabaa7d2404) socket$kcm(0xa, 0x6, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x4000011) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000000c0), 0x0}, 0x28) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x89f1, &(0x7f0000000000)='ip6gre0\x00') perf_event_open(&(0x7f00000004c0)={0x0, 0x70, 0x8, 0x6, 0x0, 0x3, 0x0, 0x3, 0x4, 0x0, 0x9, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x1000, 0x0, @perf_config_ext={0x1ff}, 0x40004, 0xfffffffffffffffd, 0x0, 0x8, 0x8, 0x4, 0x80}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0x10, 0x0, 0x10) sendmsg$kcm(r4, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d200040080000048000001000080000000000300f88000f01700d4bd", 0x2e}], 0xf}, 0x40094) r5 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r6 = socket$kcm(0x2, 0x1, 0x2) socketpair(0x25, 0x6, 0x4, &(0x7f0000000480)) setsockopt$sock_attach_bpf(r6, 0x1, 0x3e, &(0x7f00000002c0)=r5, 0x4) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x6d, &(0x7f0000000cc0)=ANY=[@ANYRESHEX, @ANYBLOB="e99f619c950ec8069b69ac05520100000000000000572e83f4fd34a6db69715afdc8ec492fa879a8460bf2c7459f384ec36d6f0d833fccc87dc8f542ca0731ec72c3f6e0857c63572db61a83246496a2f90400569c8af42a5b8b1e3583115dfe3a40a792ffe638fd722afd02131c170175f382a8d78b6626d1d58220f08d98570bad00042a01c00748cf37385e7d66e6c0efddeb730ebd2f1ab4e816cf7493cf236ca5eb6e5d2a65519a7acf475dbd9fb52eb50ddcf9cee74529f59a2d6cfe6c23f6a688719f922099394146621132f866439970571e206ac47123f2d9cdb5cb7c8506122300000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000)={0x0, 0x8}, 0x10}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r7, 0x18000000000002a0, 0x42, 0x0, &(0x7f0000000800)="b9ff0300600d698cb89e14f088a81fffffff00004000630677fbac14140ee934a0a662079f4b4d2f87e5feca6aab845013f2325f1a39010108038da1924425181aa5", 0x0, 0x28000, 0x60000000, 0x113, 0x0, &(0x7f00000006c0)="097baacf569909ebb78a19b4d4f607feb3072ad9474026c7c148d184a2647de87a8fd14ad5d15cadabd6c7545b05000000ad90e0d4000000000f3f750d2a75f6fa77d3fa4e023987f7a54b04eb238604aa90cab7b44f95ae6ce9b5f877439af64cb6573e5bc85c5e766604ff55b7a234246bd2ee44c9e99d69190bbe089603846d17b8678d05a0bda6ae300ca8c43271b65bb62b0af61bf4da3891f5bcf900ed368b36e2db9957b0dfa5cf084db8cb2b2c54661f9eac8a58a72fc9e768405eb33bce450dd088d2e16d757eeb1239a2389330535afb4944b7b27c4b26d812ab58864f3ffa3ce8cf739275492a0c90b425a792a19b9abf846b926e9f93f4b57ab77c0db63fb7d5a1e04ef52157f14f1dedcc4437"}, 0x40) r8 = bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x17, 0x6, &(0x7f0000000c00)=ANY=[], &(0x7f00000002c0)='GPL\x00', 0x2, 0x0, 0x0, 0x40f00, 0x8, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000340)={0x1, 0x10000003}, 0x8, 0x10, &(0x7f0000000380)={0x0, 0xa, 0x83, 0x2}, 0x10}, 0x78) ioctl$sock_kcm_SIOCKCMATTACH(r4, 0x89e0, &(0x7f0000000500)={0xffffffffffffffff, r8}) 06:09:09 executing program 3: sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000005c0)=ANY=[@ANYBLOB="340000001200012400f74c999aabc56a08000000", @ANYRES32=0x0, @ANYBLOB="0000000000000000140035"], 0x34}}, 0x0) r0 = socket(0x10, 0x3, 0x0) sendmmsg$alg(r0, &(0x7f0000000140), 0x4924b68, 0x0) 06:09:10 executing program 4: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000000c0)=0xe) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r1, 0x40047438, &(0x7f0000000180)=""/246) ioctl$PPPIOCSFLAGS1(r1, 0x40047457, &(0x7f0000000000)) 06:09:10 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) syslog(0x3, &(0x7f00000000c0)=""/147, 0x6558a7e3409167e0) open(&(0x7f0000000e00)='./file0\x00', 0x0, 0x0) mount(&(0x7f0000000200)=ANY=[], &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, 0x0) symlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000280)='./file0\x00') r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='mounts\x00') r1 = memfd_create(&(0x7f0000000000), 0x0) write$P9_RREADLINK(r0, &(0x7f0000000340)={0x10, 0x17, 0x2, {0x7, './file0'}}, 0x10) ioctl$sock_inet_SIOCDELRT(0xffffffffffffffff, 0x890c, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, 0x0) getpid() sendfile(r1, r0, 0x0, 0xfffffffe) [ 253.340212][T11520] IPVS: ftp: loaded support on port[0] = 21 06:09:10 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet_udp_int(r0, 0x11, 0x67, &(0x7f0000000140)=0x6, 0x4) sendmmsg(r0, &(0x7f0000006f00)=[{{&(0x7f0000000040)=@in={0x2, 0x4e23, @remote}, 0x80, &(0x7f0000000100)=[{&(0x7f00000000c0)="e04013b497936ecafdd12c496f522cc2830fd358bc8f890e410223906070a39cc6e2f84a8622c5f86cad52bba1560397737a6cce189d7db27e", 0x39}], 0x1}}, {{0x0, 0x0, &(0x7f0000000440)=[{&(0x7f0000000240)="b995a5bf327c6f291a70af1527c6eb87af6b40c22e784c7d81102b1d2c4f5434d0142b1efa49361c7fa370cde02cbad1cdf556d5ebe84042e5b1eee75566d3c3bd4e54fb80c6258eb985131872c446ae99febe93703f66f4e0e10392c8a0d30f35710c7490190fef84833442ab74de59e4c9ebbc7cfe3f26750c16970d537ab353640e9e46e706cd200383135bfbf29b19c2fe729da592a9fb74eca37cb46775eb6db0118a3c59ac107fcf691822488d67f90e891045cb2ea35a79b6cd27c9fa5f37c9f6d6e4e2ca9267b2a8aa34f9727b0f539f", 0xd4}, {&(0x7f0000000340)="529cd4456bccdb80c030fe01e5cd61704126c8d4e7ec", 0x16}, {&(0x7f0000000380)="c2597979197f75ed6b82c8bcbf2c6b92a9a53fdd74646d60f9941ca27e", 0x1d}], 0x3}}], 0x2, 0x4c004) sendmmsg(r0, &(0x7f0000007fc0), 0x800001d, 0x0) 06:09:10 executing program 0: r0 = perf_event_open(0x0, 0x0, 0xc, 0xffffffffffffffff, 0xa) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='cpuacct.stat\x00', 0x0, 0x0) r2 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r2, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f00000003c0)='syz1\x00', 0x200002, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0xfffffffffffffffc) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000300)='./cgroup/syz0\x00', 0x200002, 0x0) gettid() socket$kcm(0x11, 0xb, 0x0) ioctl$TUNSETTXFILTER(r1, 0x400454d1, &(0x7f00000000c0)=ANY=[@ANYBLOB="00000700000000da6500bbc4bbbbbbbb0180c2000016000000004dc23f0c000000000000bb"]) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000040)=@ipx={0x4, 0x1, 0x0, "2bfaec665b4b", 0xff}, 0x80, 0x0}, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={0xffffffffffffffff, 0x1, 0x49c42ca22ab5a9ac, 0x4, 0x0}, 0x20) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x908b7aabaa7d2404) socket$kcm(0xa, 0x6, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x4000011) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000000c0), 0x0}, 0x28) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x89f1, &(0x7f0000000000)='ip6gre0\x00') perf_event_open(&(0x7f00000004c0)={0x0, 0x70, 0x8, 0x6, 0x0, 0x3, 0x0, 0x3, 0x4, 0x0, 0x9, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x1000, 0x0, @perf_config_ext={0x1ff}, 0x40004, 0xfffffffffffffffd, 0x0, 0x8, 0x8, 0x4, 0x80}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0x10, 0x0, 0x10) sendmsg$kcm(r4, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d200040080000048000001000080000000000300f88000f01700d4bd", 0x2e}], 0xf}, 0x40094) r5 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r6 = socket$kcm(0x2, 0x1, 0x2) socketpair(0x25, 0x6, 0x4, &(0x7f0000000480)) setsockopt$sock_attach_bpf(r6, 0x1, 0x3e, &(0x7f00000002c0)=r5, 0x4) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x6d, &(0x7f0000000cc0)=ANY=[@ANYRESHEX, @ANYBLOB="e99f619c950ec8069b69ac05520100000000000000572e83f4fd34a6db69715afdc8ec492fa879a8460bf2c7459f384ec36d6f0d833fccc87dc8f542ca0731ec72c3f6e0857c63572db61a83246496a2f90400569c8af42a5b8b1e3583115dfe3a40a792ffe638fd722afd02131c170175f382a8d78b6626d1d58220f08d98570bad00042a01c00748cf37385e7d66e6c0efddeb730ebd2f1ab4e816cf7493cf236ca5eb6e5d2a65519a7acf475dbd9fb52eb50ddcf9cee74529f59a2d6cfe6c23f6a688719f922099394146621132f866439970571e206ac47123f2d9cdb5cb7c8506122300000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000)={0x0, 0x8}, 0x10}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r7, 0x18000000000002a0, 0x42, 0x0, &(0x7f0000000800)="b9ff0300600d698cb89e14f088a81fffffff00004000630677fbac14140ee934a0a662079f4b4d2f87e5feca6aab845013f2325f1a39010108038da1924425181aa5", 0x0, 0x28000, 0x60000000, 0x113, 0x0, &(0x7f00000006c0)="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"}, 0x40) r8 = bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x17, 0x6, &(0x7f0000000c00)=ANY=[], &(0x7f00000002c0)='GPL\x00', 0x2, 0x0, 0x0, 0x40f00, 0x8, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000340)={0x1, 0x10000003}, 0x8, 0x10, &(0x7f0000000380)={0x0, 0xa, 0x83, 0x2}, 0x10}, 0x78) ioctl$sock_kcm_SIOCKCMATTACH(r4, 0x89e0, &(0x7f0000000500)={0xffffffffffffffff, r8}) 06:09:10 executing program 3: pipe(&(0x7f0000000000)) r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r2 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r2, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000140)=ANY=[], 0x1000000c8) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = dup2(r3, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) close(r0) 06:09:10 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet_udp_int(r0, 0x11, 0x67, &(0x7f0000000140)=0x6, 0x4) sendmmsg(r0, &(0x7f0000006f00)=[{{&(0x7f0000000040)=@in={0x2, 0x4e23, @remote}, 0x80, &(0x7f0000000100)=[{&(0x7f00000000c0)="e04013b497936ecafdd12c496f522cc2830fd358bc8f890e410223906070a39cc6e2f84a8622c5f86cad52bba1560397737a6cce189d7db27e", 0x39}], 0x1}}, {{0x0, 0x0, &(0x7f0000000440)=[{&(0x7f0000000240)="b995a5bf327c6f291a70af1527c6eb87af6b40c22e784c7d81102b1d2c4f5434d0142b1efa49361c7fa370cde02cbad1cdf556d5ebe84042e5b1eee75566d3c3bd4e54fb80c6258eb985131872c446ae99febe93703f66f4e0e10392c8a0d30f35710c7490190fef84833442ab74de59e4c9ebbc7cfe3f26750c16970d537ab353640e9e46e706cd200383135bfbf29b19c2fe729da592a9fb74eca37cb46775eb6db0118a3c59ac107fcf691822488d67f90e891045cb2ea35a79b6cd27c9fa5f37c9f6d6e4e2ca9267b2a8aa34f9727b0f539f", 0xd4}, {&(0x7f0000000340)="529cd4456bccdb80c030fe01e5cd61704126c8d4e7ec", 0x16}, {&(0x7f0000000380)="c2597979197f75ed6b82c8bcbf2c6b92a9a53fdd74646d60f9941ca27e", 0x1d}], 0x3}}], 0x2, 0x4c004) sendmmsg(r0, &(0x7f0000007fc0), 0x800001d, 0x0) 06:09:10 executing program 5: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x2, 0x0, 0x0) r2 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000100)={0x26, 'hash\x00', 0x0, 0x0, 'crct10dif-generic\x00'}, 0x58) r4 = accept$alg(r3, 0x0, 0x0) r5 = accept4(r4, 0x0, 0x0, 0x0) splice(r0, 0x0, r5, 0x0, 0x30007, 0x0) 06:09:10 executing program 0: r0 = perf_event_open(&(0x7f0000000640)={0x0, 0x70, 0x3e7, 0x0, 0x4, 0x0, 0x0, 0x0, 0x91dd7106ca8fd33b, 0xdb3fedb3c3734f95, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x40000000000, 0x0, 0x1, 0x0, @perf_config_ext={0x18, 0x3}, 0x21, 0x10000000000000, 0x0, 0x0, 0x0, 0x20000007, 0x2}, 0x0, 0xc, 0xffffffffffffffff, 0xa) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='cpuacct.stat\x00', 0x0, 0x0) r2 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r2, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f00000003c0)='syz1\x00', 0x200002, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0xfffffffffffffffc) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000300)='./cgroup/syz0\x00', 0x200002, 0x0) gettid() socket$kcm(0x11, 0xb, 0x0) ioctl$TUNSETTXFILTER(r1, 0x400454d1, &(0x7f00000000c0)=ANY=[@ANYBLOB="00000700000000da6500bbc4bbbbbbbb0180c2000016000000004dc23f0c000000000000bb"]) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000040)=@ipx={0x4, 0x1, 0x0, "2bfaec665b4b", 0xff}, 0x80, 0x0}, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={0xffffffffffffffff, 0x1, 0x49c42ca22ab5a9ac, 0x4, 0x0}, 0x20) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x908b7aabaa7d2404) socket$kcm(0xa, 0x6, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x4000011) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000000c0), 0x0}, 0x28) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x89f1, &(0x7f0000000000)='ip6gre0\x00') perf_event_open(&(0x7f00000004c0)={0x0, 0x70, 0x8, 0x6, 0x0, 0x3, 0x0, 0x3, 0x4, 0x0, 0x9, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x1000, 0x0, @perf_config_ext={0x1ff}, 0x40004, 0xfffffffffffffffd, 0x0, 0x8, 0x8, 0x4, 0x80}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0x10, 0x0, 0x10) sendmsg$kcm(r4, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d200040080000048000001000080000000000300f88000f01700d4bd", 0x2e}], 0xf}, 0x40094) r5 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r6 = socket$kcm(0x2, 0x1, 0x2) socketpair(0x25, 0x6, 0x4, &(0x7f0000000480)) setsockopt$sock_attach_bpf(r6, 0x1, 0x3e, &(0x7f00000002c0)=r5, 0x4) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x6d, &(0x7f0000000cc0)=ANY=[@ANYRESHEX, @ANYBLOB="e99f619c950ec8069b69ac05520100000000000000572e83f4fd34a6db69715afdc8ec492fa879a8460bf2c7459f384ec36d6f0d833fccc87dc8f542ca0731ec72c3f6e0857c63572db61a83246496a2f90400569c8af42a5b8b1e3583115dfe3a40a792ffe638fd722afd02131c170175f382a8d78b6626d1d58220f08d98570bad00042a01c00748cf37385e7d66e6c0efddeb730ebd2f1ab4e816cf7493cf236ca5eb6e5d2a65519a7acf475dbd9fb52eb50ddcf9cee74529f59a2d6cfe6c23f6a688719f922099394146621132f866439970571e206ac47123f2d9cdb5cb7c8506122300000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000)={0x0, 0x8}, 0x10}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r7, 0x18000000000002a0, 0x42, 0x0, &(0x7f0000000800)="b9ff0300600d698cb89e14f088a81fffffff00004000630677fbac14140ee934a0a662079f4b4d2f87e5feca6aab845013f2325f1a39010108038da1924425181aa5", 0x0, 0x28000, 0x60000000, 0x113, 0x0, &(0x7f00000006c0)="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"}, 0x40) r8 = bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x17, 0x6, &(0x7f0000000c00)=ANY=[], &(0x7f00000002c0)='GPL\x00', 0x2, 0x0, 0x0, 0x40f00, 0x8, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000340)={0x1, 0x10000003}, 0x8, 0x10, &(0x7f0000000380)={0x0, 0xa, 0x83, 0x2}, 0x10}, 0x78) ioctl$sock_kcm_SIOCKCMATTACH(r4, 0x89e0, &(0x7f0000000500)={0xffffffffffffffff, r8}) 06:09:10 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) syslog(0x3, &(0x7f00000000c0)=""/147, 0x6558a7e3409167e0) open(&(0x7f0000000e00)='./file0\x00', 0x0, 0x0) mount(&(0x7f0000000200)=ANY=[], &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, 0x0) symlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000280)='./file0\x00') r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='mounts\x00') r1 = memfd_create(&(0x7f0000000000), 0x0) write$P9_RREADLINK(r0, &(0x7f0000000340)={0x10, 0x17, 0x2, {0x7, './file0'}}, 0x10) ioctl$sock_inet_SIOCDELRT(0xffffffffffffffff, 0x890c, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, 0x0) getpid() sendfile(r1, r0, 0x0, 0xfffffffe) 06:09:11 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) syslog(0x3, &(0x7f00000000c0)=""/147, 0x6558a7e3409167e0) open(&(0x7f0000000e00)='./file0\x00', 0x0, 0x0) mount(&(0x7f0000000200)=ANY=[], &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, 0x0) symlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000280)='./file0\x00') r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='mounts\x00') r1 = memfd_create(&(0x7f0000000000), 0x0) write$P9_RREADLINK(r0, &(0x7f0000000340)={0x10, 0x17, 0x2, {0x7, './file0'}}, 0x10) ioctl$sock_inet_SIOCDELRT(0xffffffffffffffff, 0x890c, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, 0x0) getpid() sendfile(r1, r0, 0x0, 0xfffffffe) 06:09:11 executing program 4: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000000c0)=0xe) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r1, 0x40047438, &(0x7f0000000180)=""/246) ioctl$PPPIOCSFLAGS1(r1, 0x40047457, &(0x7f0000000000)) [ 254.524451][T11582] IPVS: ftp: loaded support on port[0] = 21 06:09:11 executing program 0: r0 = perf_event_open(&(0x7f0000000640)={0x0, 0x70, 0x3e7, 0x0, 0x4, 0x0, 0x0, 0x0, 0x91dd7106ca8fd33b, 0xdb3fedb3c3734f95, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x40000000000, 0x0, 0x1, 0x0, @perf_config_ext={0x18, 0x3}, 0x21, 0x10000000000000, 0x0, 0x0, 0x0, 0x20000007, 0x2}, 0x0, 0xc, 0xffffffffffffffff, 0xa) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='cpuacct.stat\x00', 0x0, 0x0) r2 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r2, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f00000003c0)='syz1\x00', 0x200002, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0xfffffffffffffffc) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000300)='./cgroup/syz0\x00', 0x200002, 0x0) gettid() socket$kcm(0x11, 0xb, 0x0) ioctl$TUNSETTXFILTER(r1, 0x400454d1, &(0x7f00000000c0)=ANY=[@ANYBLOB="00000700000000da6500bbc4bbbbbbbb0180c2000016000000004dc23f0c000000000000bb"]) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000040)=@ipx={0x4, 0x1, 0x0, "2bfaec665b4b", 0xff}, 0x80, 0x0}, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={0xffffffffffffffff, 0x1, 0x49c42ca22ab5a9ac, 0x4, 0x0}, 0x20) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x908b7aabaa7d2404) socket$kcm(0xa, 0x6, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x4000011) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000000c0), 0x0}, 0x28) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x89f1, &(0x7f0000000000)='ip6gre0\x00') perf_event_open(&(0x7f00000004c0)={0x0, 0x70, 0x8, 0x6, 0x0, 0x3, 0x0, 0x3, 0x4, 0x0, 0x9, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x1000, 0x0, @perf_config_ext={0x1ff}, 0x40004, 0xfffffffffffffffd, 0x0, 0x8, 0x8, 0x4, 0x80}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0x10, 0x0, 0x10) sendmsg$kcm(r4, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d200040080000048000001000080000000000300f88000f01700d4bd", 0x2e}], 0xf}, 0x40094) r5 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r6 = socket$kcm(0x2, 0x1, 0x2) socketpair(0x25, 0x6, 0x4, &(0x7f0000000480)) setsockopt$sock_attach_bpf(r6, 0x1, 0x3e, &(0x7f00000002c0)=r5, 0x4) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x6d, &(0x7f0000000cc0)=ANY=[@ANYRESHEX, @ANYBLOB="e99f619c950ec8069b69ac05520100000000000000572e83f4fd34a6db69715afdc8ec492fa879a8460bf2c7459f384ec36d6f0d833fccc87dc8f542ca0731ec72c3f6e0857c63572db61a83246496a2f90400569c8af42a5b8b1e3583115dfe3a40a792ffe638fd722afd02131c170175f382a8d78b6626d1d58220f08d98570bad00042a01c00748cf37385e7d66e6c0efddeb730ebd2f1ab4e816cf7493cf236ca5eb6e5d2a65519a7acf475dbd9fb52eb50ddcf9cee74529f59a2d6cfe6c23f6a688719f922099394146621132f866439970571e206ac47123f2d9cdb5cb7c8506122300000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000)={0x0, 0x8}, 0x10}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r7, 0x18000000000002a0, 0x42, 0x0, &(0x7f0000000800)="b9ff0300600d698cb89e14f088a81fffffff00004000630677fbac14140ee934a0a662079f4b4d2f87e5feca6aab845013f2325f1a39010108038da1924425181aa5", 0x0, 0x28000, 0x60000000, 0x113, 0x0, &(0x7f00000006c0)="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"}, 0x40) r8 = bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x17, 0x6, &(0x7f0000000c00)=ANY=[], &(0x7f00000002c0)='GPL\x00', 0x2, 0x0, 0x0, 0x40f00, 0x8, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000340)={0x1, 0x10000003}, 0x8, 0x10, &(0x7f0000000380)={0x0, 0xa, 0x83, 0x2}, 0x10}, 0x78) ioctl$sock_kcm_SIOCKCMATTACH(r4, 0x89e0, &(0x7f0000000500)={0xffffffffffffffff, r8}) 06:09:11 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet_udp_int(r0, 0x11, 0x67, &(0x7f0000000140)=0x6, 0x4) sendmmsg(r0, &(0x7f0000006f00)=[{{&(0x7f0000000040)=@in={0x2, 0x4e23, @remote}, 0x80, &(0x7f0000000100)=[{&(0x7f00000000c0)="e04013b497936ecafdd12c496f522cc2830fd358bc8f890e410223906070a39cc6e2f84a8622c5f86cad52bba1560397737a6cce189d7db27e", 0x39}], 0x1}}, {{0x0, 0x0, &(0x7f0000000440)=[{&(0x7f0000000240)="b995a5bf327c6f291a70af1527c6eb87af6b40c22e784c7d81102b1d2c4f5434d0142b1efa49361c7fa370cde02cbad1cdf556d5ebe84042e5b1eee75566d3c3bd4e54fb80c6258eb985131872c446ae99febe93703f66f4e0e10392c8a0d30f35710c7490190fef84833442ab74de59e4c9ebbc7cfe3f26750c16970d537ab353640e9e46e706cd200383135bfbf29b19c2fe729da592a9fb74eca37cb46775eb6db0118a3c59ac107fcf691822488d67f90e891045cb2ea35a79b6cd27c9fa5f37c9f6d6e4e2ca9267b2a8aa34f9727b0f539f", 0xd4}, {&(0x7f0000000340)="529cd4456bccdb80c030fe01e5cd61704126c8d4e7ec", 0x16}, {&(0x7f0000000380)="c2597979197f75ed6b82c8bcbf2c6b92a9a53fdd74646d60f9941ca27e", 0x1d}], 0x3}}], 0x2, 0x4c004) sendmmsg(r0, &(0x7f0000007fc0), 0x800001d, 0x0) 06:09:11 executing program 5: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)) r2 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000100)={0x26, 'hash\x00', 0x0, 0x0, 'crct10dif-generic\x00'}, 0x58) r4 = accept$alg(r3, 0x0, 0x0) r5 = accept4(r4, 0x0, 0x0, 0x0) splice(r0, 0x0, r5, 0x0, 0x30007, 0x0) 06:09:11 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) syslog(0x3, &(0x7f00000000c0)=""/147, 0x6558a7e3409167e0) open(&(0x7f0000000e00)='./file0\x00', 0x0, 0x0) mount(&(0x7f0000000200)=ANY=[], &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, 0x0) symlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000280)='./file0\x00') r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='mounts\x00') r1 = memfd_create(&(0x7f0000000000), 0x0) write$P9_RREADLINK(r0, &(0x7f0000000340)={0x10, 0x17, 0x2, {0x7, './file0'}}, 0x10) ioctl$sock_inet_SIOCDELRT(0xffffffffffffffff, 0x890c, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, 0x0) sendfile(r1, r0, 0x0, 0xfffffffe) 06:09:11 executing program 3: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x5385, &(0x7f0000000180)={0x1, 0x0, 0x0, '['}) 06:09:11 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet_udp_int(r0, 0x11, 0x67, &(0x7f0000000140)=0x6, 0x4) sendmmsg(r0, &(0x7f0000006f00)=[{{&(0x7f0000000040)=@in={0x2, 0x4e23, @remote}, 0x80, &(0x7f0000000100)=[{&(0x7f00000000c0)="e04013b497936ecafdd12c496f522cc2830fd358bc8f890e410223906070a39cc6e2f84a8622c5f86cad52bba1560397737a6cce189d7db27e", 0x39}], 0x1}}, {{0x0, 0x0, &(0x7f0000000440)=[{0x0}, {&(0x7f0000000240)="b995a5bf327c6f291a70af1527c6eb87af6b40c22e784c7d81102b1d2c4f5434d0142b1efa49361c7fa370cde02cbad1cdf556d5ebe84042e5b1eee75566d3c3bd4e54fb80c6258eb985131872c446ae99febe93703f66f4e0e10392c8a0d30f35710c7490190fef84833442ab74de59e4c9ebbc7cfe3f26750c16970d537ab353640e9e46e706cd200383135bfbf29b19c2fe729da592a9fb74eca37cb46775eb6db0118a3c59ac107fcf691822488d67f90e891045cb2ea35a79b6cd27c9fa5f37c9f6d6e4e2ca9267b2a8aa34f9727b0f539f", 0xd4}, {&(0x7f0000000340)="529cd4456bccdb80c030fe01e5cd61704126c8d4e7ec", 0x16}, {&(0x7f0000000380)="c2597979197f75ed6b82c8bcbf2c6b92a9a53fdd74646d60f9941ca27e", 0x1d}], 0x4}}], 0x2, 0x4c004) sendmmsg(r0, &(0x7f0000007fc0), 0x800001d, 0x0) 06:09:11 executing program 0: r0 = perf_event_open(&(0x7f0000000640)={0x0, 0x70, 0x3e7, 0x0, 0x4, 0x0, 0x0, 0x0, 0x91dd7106ca8fd33b, 0xdb3fedb3c3734f95, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x40000000000, 0x0, 0x1, 0x0, @perf_config_ext={0x18, 0x3}, 0x21, 0x10000000000000, 0x0, 0x0, 0x0, 0x20000007, 0x2}, 0x0, 0xc, 0xffffffffffffffff, 0xa) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='cpuacct.stat\x00', 0x0, 0x0) r2 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r2, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f00000003c0)='syz1\x00', 0x200002, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0xfffffffffffffffc) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000300)='./cgroup/syz0\x00', 0x200002, 0x0) gettid() socket$kcm(0x11, 0xb, 0x0) ioctl$TUNSETTXFILTER(r1, 0x400454d1, &(0x7f00000000c0)=ANY=[@ANYBLOB="00000700000000da6500bbc4bbbbbbbb0180c2000016000000004dc23f0c000000000000bb"]) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000040)=@ipx={0x4, 0x1, 0x0, "2bfaec665b4b", 0xff}, 0x80, 0x0}, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={0xffffffffffffffff, 0x1, 0x49c42ca22ab5a9ac, 0x4, 0x0}, 0x20) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x908b7aabaa7d2404) socket$kcm(0xa, 0x6, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x4000011) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000000c0), 0x0}, 0x28) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x89f1, &(0x7f0000000000)='ip6gre0\x00') perf_event_open(&(0x7f00000004c0)={0x0, 0x70, 0x8, 0x6, 0x0, 0x3, 0x0, 0x3, 0x4, 0x0, 0x9, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x1000, 0x0, @perf_config_ext={0x1ff}, 0x40004, 0xfffffffffffffffd, 0x0, 0x8, 0x8, 0x4, 0x80}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0x10, 0x0, 0x10) sendmsg$kcm(r4, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d200040080000048000001000080000000000300f88000f01700d4bd", 0x2e}], 0xf}, 0x40094) r5 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r6 = socket$kcm(0x2, 0x1, 0x2) socketpair(0x25, 0x6, 0x4, &(0x7f0000000480)) setsockopt$sock_attach_bpf(r6, 0x1, 0x3e, &(0x7f00000002c0)=r5, 0x4) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x6d, &(0x7f0000000cc0)=ANY=[@ANYRESHEX, @ANYBLOB="e99f619c950ec8069b69ac05520100000000000000572e83f4fd34a6db69715afdc8ec492fa879a8460bf2c7459f384ec36d6f0d833fccc87dc8f542ca0731ec72c3f6e0857c63572db61a83246496a2f90400569c8af42a5b8b1e3583115dfe3a40a792ffe638fd722afd02131c170175f382a8d78b6626d1d58220f08d98570bad00042a01c00748cf37385e7d66e6c0efddeb730ebd2f1ab4e816cf7493cf236ca5eb6e5d2a65519a7acf475dbd9fb52eb50ddcf9cee74529f59a2d6cfe6c23f6a688719f922099394146621132f866439970571e206ac47123f2d9cdb5cb7c8506122300000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000)={0x0, 0x8}, 0x10}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r7, 0x18000000000002a0, 0x42, 0x0, &(0x7f0000000800)="b9ff0300600d698cb89e14f088a81fffffff00004000630677fbac14140ee934a0a662079f4b4d2f87e5feca6aab845013f2325f1a39010108038da1924425181aa5", 0x0, 0x28000, 0x60000000, 0x113, 0x0, &(0x7f00000006c0)="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"}, 0x40) r8 = bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x17, 0x6, &(0x7f0000000c00)=ANY=[], &(0x7f00000002c0)='GPL\x00', 0x2, 0x0, 0x0, 0x40f00, 0x8, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000340)={0x1, 0x10000003}, 0x8, 0x10, &(0x7f0000000380)={0x0, 0xa, 0x83, 0x2}, 0x10}, 0x78) ioctl$sock_kcm_SIOCKCMATTACH(r4, 0x89e0, &(0x7f0000000500)={0xffffffffffffffff, r8}) 06:09:11 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDFONTOP_COPY(r0, 0x4b72, &(0x7f0000000080)={0x3, 0x0, 0x0, 0x0, 0x0, 0x0}) 06:09:11 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet_udp_int(r0, 0x11, 0x67, &(0x7f0000000140)=0x6, 0x4) sendmmsg(r0, &(0x7f0000006f00)=[{{&(0x7f0000000040)=@in={0x2, 0x4e23, @remote}, 0x80, &(0x7f0000000100)=[{&(0x7f00000000c0)="e04013b497936ecafdd12c496f522cc2830fd358bc8f890e410223906070a39cc6e2f84a8622c5f86cad52bba1560397737a6cce189d7db27e", 0x39}], 0x1}}, {{0x0, 0x0, &(0x7f0000000440)=[{0x0}, {&(0x7f0000000240)="b995a5bf327c6f291a70af1527c6eb87af6b40c22e784c7d81102b1d2c4f5434d0142b1efa49361c7fa370cde02cbad1cdf556d5ebe84042e5b1eee75566d3c3bd4e54fb80c6258eb985131872c446ae99febe93703f66f4e0e10392c8a0d30f35710c7490190fef84833442ab74de59e4c9ebbc7cfe3f26750c16970d537ab353640e9e46e706cd200383135bfbf29b19c2fe729da592a9fb74eca37cb46775eb6db0118a3c59ac107fcf691822488d67f90e891045cb2ea35a79b6cd27c9fa5f37c9f6d6e4e2ca9267b2a8aa34f9727b0f539f", 0xd4}, {&(0x7f0000000340)="529cd4456bccdb80c030fe01e5cd61704126c8d4e7ec", 0x16}, {&(0x7f0000000380)="c2597979197f75ed6b82c8bcbf2c6b92a9a53fdd74646d60f9941ca27e", 0x1d}], 0x4}}], 0x2, 0x4c004) sendmmsg(r0, &(0x7f0000007fc0), 0x800001d, 0x0) 06:09:12 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) syslog(0x3, &(0x7f00000000c0)=""/147, 0x6558a7e3409167e0) open(&(0x7f0000000e00)='./file0\x00', 0x0, 0x0) mount(&(0x7f0000000200)=ANY=[], &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, 0x0) symlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000280)='./file0\x00') r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='mounts\x00') r1 = memfd_create(&(0x7f0000000000), 0x0) write$P9_RREADLINK(r0, &(0x7f0000000340)={0x10, 0x17, 0x2, {0x7, './file0'}}, 0x10) ioctl$sock_inet_SIOCDELRT(0xffffffffffffffff, 0x890c, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, 0x0) sendfile(r1, r0, 0x0, 0xfffffffe) 06:09:12 executing program 3: r0 = signalfd4(0xffffffffffffffff, &(0x7f0000000640), 0x8, 0x0) readv(r0, &(0x7f00000006c0)=[{&(0x7f0000000680)=""/12, 0xc}], 0x1) 06:09:12 executing program 0: r0 = perf_event_open(&(0x7f0000000640)={0x3, 0x70, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x91dd7106ca8fd33b, 0xdb3fedb3c3734f95, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x40000000000, 0x0, 0x1, 0x0, @perf_config_ext={0x18, 0x3}, 0x21, 0x10000000000000, 0x0, 0x0, 0x0, 0x20000007, 0x2}, 0x0, 0xc, 0xffffffffffffffff, 0xa) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='cpuacct.stat\x00', 0x0, 0x0) r2 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r2, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f00000003c0)='syz1\x00', 0x200002, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0xfffffffffffffffc) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000300)='./cgroup/syz0\x00', 0x200002, 0x0) gettid() socket$kcm(0x11, 0xb, 0x0) ioctl$TUNSETTXFILTER(r1, 0x400454d1, &(0x7f00000000c0)=ANY=[@ANYBLOB="00000700000000da6500bbc4bbbbbbbb0180c2000016000000004dc23f0c000000000000bb"]) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000040)=@ipx={0x4, 0x1, 0x0, "2bfaec665b4b", 0xff}, 0x80, 0x0}, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={0xffffffffffffffff, 0x1, 0x49c42ca22ab5a9ac, 0x4, 0x0}, 0x20) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x908b7aabaa7d2404) socket$kcm(0xa, 0x6, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x4000011) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000000c0), 0x0}, 0x28) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x89f1, &(0x7f0000000000)='ip6gre0\x00') perf_event_open(&(0x7f00000004c0)={0x0, 0x70, 0x8, 0x6, 0x0, 0x3, 0x0, 0x3, 0x4, 0x0, 0x9, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x1000, 0x0, @perf_config_ext={0x1ff}, 0x40004, 0xfffffffffffffffd, 0x0, 0x8, 0x8, 0x4, 0x80}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0x10, 0x0, 0x10) sendmsg$kcm(r4, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d200040080000048000001000080000000000300f88000f01700d4bd", 0x2e}], 0xf}, 0x40094) r5 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r6 = socket$kcm(0x2, 0x1, 0x2) socketpair(0x25, 0x6, 0x4, &(0x7f0000000480)) setsockopt$sock_attach_bpf(r6, 0x1, 0x3e, &(0x7f00000002c0)=r5, 0x4) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x6d, &(0x7f0000000cc0)=ANY=[@ANYRESHEX, @ANYBLOB="e99f619c950ec8069b69ac05520100000000000000572e83f4fd34a6db69715afdc8ec492fa879a8460bf2c7459f384ec36d6f0d833fccc87dc8f542ca0731ec72c3f6e0857c63572db61a83246496a2f90400569c8af42a5b8b1e3583115dfe3a40a792ffe638fd722afd02131c170175f382a8d78b6626d1d58220f08d98570bad00042a01c00748cf37385e7d66e6c0efddeb730ebd2f1ab4e816cf7493cf236ca5eb6e5d2a65519a7acf475dbd9fb52eb50ddcf9cee74529f59a2d6cfe6c23f6a688719f922099394146621132f866439970571e206ac47123f2d9cdb5cb7c8506122300000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000)={0x0, 0x8}, 0x10}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r7, 0x18000000000002a0, 0x42, 0x0, &(0x7f0000000800)="b9ff0300600d698cb89e14f088a81fffffff00004000630677fbac14140ee934a0a662079f4b4d2f87e5feca6aab845013f2325f1a39010108038da1924425181aa5", 0x0, 0x28000, 0x60000000, 0x113, 0x0, &(0x7f00000006c0)="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"}, 0x40) r8 = bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x17, 0x6, &(0x7f0000000c00)=ANY=[], &(0x7f00000002c0)='GPL\x00', 0x2, 0x0, 0x0, 0x40f00, 0x8, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000340)={0x1, 0x10000003}, 0x8, 0x10, &(0x7f0000000380)={0x0, 0xa, 0x83, 0x2}, 0x10}, 0x78) ioctl$sock_kcm_SIOCKCMATTACH(r4, 0x89e0, &(0x7f0000000500)={0xffffffffffffffff, r8}) 06:09:12 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet_udp_int(r0, 0x11, 0x67, &(0x7f0000000140)=0x6, 0x4) sendmmsg(r0, &(0x7f0000006f00)=[{{&(0x7f0000000040)=@in={0x2, 0x4e23, @remote}, 0x80, &(0x7f0000000100)=[{&(0x7f00000000c0)="e04013b497936ecafdd12c496f522cc2830fd358bc8f890e410223906070a39cc6e2f84a8622c5f86cad52bba1560397737a6cce189d7db27e", 0x39}], 0x1}}, {{0x0, 0x0, &(0x7f0000000440)=[{0x0}, {&(0x7f0000000240)="b995a5bf327c6f291a70af1527c6eb87af6b40c22e784c7d81102b1d2c4f5434d0142b1efa49361c7fa370cde02cbad1cdf556d5ebe84042e5b1eee75566d3c3bd4e54fb80c6258eb985131872c446ae99febe93703f66f4e0e10392c8a0d30f35710c7490190fef84833442ab74de59e4c9ebbc7cfe3f26750c16970d537ab353640e9e46e706cd200383135bfbf29b19c2fe729da592a9fb74eca37cb46775eb6db0118a3c59ac107fcf691822488d67f90e891045cb2ea35a79b6cd27c9fa5f37c9f6d6e4e2ca9267b2a8aa34f9727b0f539f", 0xd4}, {&(0x7f0000000340)="529cd4456bccdb80c030fe01e5cd61704126c8d4e7ec", 0x16}, {&(0x7f0000000380)="c2597979197f75ed6b82c8bcbf2c6b92a9a53fdd74646d60f9941ca27e", 0x1d}], 0x4}}], 0x2, 0x4c004) sendmmsg(r0, &(0x7f0000007fc0), 0x800001d, 0x0) 06:09:12 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000032000/0x18000)=nil, &(0x7f0000000280)=[@text32={0x20, &(0x7f0000000140)="b9800000c00f3235010000000f309a090000006500660f3882af724d00002ed8ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f013a360f06c4c18d72d68366baa100ed", 0x51}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) gettid() waitid(0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0x4, 0x0, 0x40000007, 0xfffffffffffffffc, 0x0, 0x0, 0x4cb]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='ns\x00') gettid() perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x12, 0x2, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa, @perf_config_ext, 0x48, 0x0, 0x0, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 06:09:12 executing program 5: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)) r2 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000100)={0x26, 'hash\x00', 0x0, 0x0, 'crct10dif-generic\x00'}, 0x58) r4 = accept$alg(r3, 0x0, 0x0) r5 = accept4(r4, 0x0, 0x0, 0x0) splice(r0, 0x0, r5, 0x0, 0x30007, 0x0) 06:09:12 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) syslog(0x3, &(0x7f00000000c0)=""/147, 0x6558a7e3409167e0) open(&(0x7f0000000e00)='./file0\x00', 0x0, 0x0) mount(&(0x7f0000000200)=ANY=[], &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, 0x0) symlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000280)='./file0\x00') r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='mounts\x00') r1 = memfd_create(&(0x7f0000000000), 0x0) write$P9_RREADLINK(r0, &(0x7f0000000340)={0x10, 0x17, 0x2, {0x7, './file0'}}, 0x10) ioctl$sock_inet_SIOCDELRT(0xffffffffffffffff, 0x890c, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, 0x0) sendfile(r1, r0, 0x0, 0xfffffffe) 06:09:12 executing program 4: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000000c0)=0xe) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r1, 0x40047438, &(0x7f0000000180)=""/246) ioctl$PPPIOCSFLAGS1(r1, 0x40047457, &(0x7f0000000000)) 06:09:12 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet_udp_int(r0, 0x11, 0x67, &(0x7f0000000140)=0x6, 0x4) sendmmsg(r0, &(0x7f0000006f00)=[{{&(0x7f0000000040)=@in={0x2, 0x4e23, @remote}, 0x80, &(0x7f0000000100)=[{&(0x7f00000000c0)="e04013b497936ecafdd12c496f522cc2830fd358bc8f890e410223906070a39cc6e2f84a8622c5f86cad52bba1560397737a6cce189d7db27e", 0x39}], 0x1}}, {{0x0, 0x0, &(0x7f0000000440)=[{&(0x7f0000000200)}, {&(0x7f0000000240)="b995a5bf327c6f291a70af1527c6eb87af6b40c22e784c7d81102b1d2c4f5434d0142b1efa49361c7fa370cde02cbad1cdf556d5ebe84042e5b1eee75566d3c3bd4e54fb80c6258eb985131872c446ae99febe93703f66f4e0e10392c8a0d30f35710c7490190fef84833442ab74de59e4c9ebbc7cfe3f26750c16970d537ab353640e9e46e706cd200383135bfbf29b19c2fe729da592a9fb74eca37cb46775eb6db0118a3c59ac107fcf691822488d67f90e891045cb2ea35a79b6cd27c9fa5f37c9f6d6e4e2ca9267b2a8aa34f9727b0f539f", 0xd4}, {&(0x7f0000000340)="529cd4456bccdb80c030fe01e5cd61704126c8d4e7ec", 0x16}, {&(0x7f0000000380)="c2597979197f75ed6b82c8bcbf2c6b92a9a53fdd74646d60f9941ca27e", 0x1d}], 0x4}}], 0x2, 0x4c004) sendmmsg(r0, &(0x7f0000007fc0), 0x800001d, 0x0) [ 255.888465][T11646] kvm [11644]: vcpu0, guest rIP: 0x14c Hyper-V unhandled wrmsr: 0x4000004c data 0xfffffffc00000006 [ 255.921817][T11655] IPVS: ftp: loaded support on port[0] = 21 [ 255.944391][T11646] kvm: apic: phys broadcast and lowest prio [ 256.020742][T11646] kvm: apic: phys broadcast and lowest prio [ 256.049687][T11646] ================================================================== [ 256.058211][T11646] BUG: KASAN: slab-out-of-bounds in kvm_vcpu_gfn_to_memslot+0x50e/0x540 [ 256.066554][T11646] Read of size 8 at addr ffff888085c20468 by task syz-executor.3/11646 [ 256.074788][T11646] [ 256.077128][T11646] CPU: 0 PID: 11646 Comm: syz-executor.3 Not tainted 5.7.0-rc1-next-20200415-syzkaller #0 [ 256.087012][T11646] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 256.097068][T11646] Call Trace: [ 256.100464][T11646] dump_stack+0x188/0x20d [ 256.104888][T11646] print_address_description.constprop.0.cold+0xd3/0x315 [ 256.111925][T11646] ? kvm_vcpu_gfn_to_memslot+0x50e/0x540 [ 256.117565][T11646] __kasan_report.cold+0x35/0x4d [ 256.122512][T11646] ? kvm_vcpu_gfn_to_memslot+0x50e/0x540 [ 256.128156][T11646] ? kvm_vcpu_gfn_to_memslot+0x50e/0x540 [ 256.133797][T11646] kasan_report+0x33/0x50 [ 256.138138][T11646] kvm_vcpu_gfn_to_memslot+0x50e/0x540 [ 256.143630][T11646] kvm_vcpu_write_guest+0x48/0xd0 [ 256.148752][T11646] enter_smm+0xa12/0x1740 [ 256.153105][T11646] ? emulator_pio_in_emulated+0x70/0x70 [ 256.158699][T11646] ? print_usage_bug+0x240/0x240 [ 256.163711][T11646] ? kvm_set_msr_common+0x1eb/0x27c0 [ 256.169113][T11646] ? kvm_apic_accept_events+0x1c4/0x540 [ 256.175285][T11646] ? kvm_lapic_enable_pv_eoi+0x160/0x160 [ 256.180929][T11646] ? vcpu_mmio_read+0x4e0/0x4e0 [ 256.186839][T11646] ? vmx_handle_exit+0x2c0/0x1700 [ 256.191885][T11646] vcpu_enter_guest+0x1f2a/0x59d0 [ 256.196919][T11646] ? vmx_vcpu_load_vmcs+0x960/0x960 [ 256.202173][T11646] ? kvm_vcpu_reload_apic_access_page+0x300/0x300 [ 256.208749][T11646] ? kvm_arch_vcpu_ioctl_run+0x23a/0x16e0 [ 256.214490][T11646] ? lock_release+0x800/0x800 [ 256.219286][T11646] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 256.224852][T11646] ? rcu_read_lock_any_held.part.0+0x50/0x50 [ 256.231546][T11646] ? kvm_check_async_pf_completion+0x2a4/0x400 [ 256.237714][T11646] ? lockdep_hardirqs_on+0x463/0x620 [ 256.243018][T11646] ? kvm_arch_vcpu_ioctl_run+0x3fb/0x16e0 [ 256.248753][T11646] kvm_arch_vcpu_ioctl_run+0x3fb/0x16e0 [ 256.254320][T11646] kvm_vcpu_ioctl+0x493/0xe60 [ 256.259014][T11646] ? kvm_get_dirty_log_protect.isra.0+0x670/0x670 [ 256.265537][T11646] ? ioctl_file_clone+0x180/0x180 [ 256.270633][T11646] ? __fget_files+0x32f/0x500 [ 256.275331][T11646] ? do_dup2+0x520/0x520 [ 256.279643][T11646] ? __x64_sys_futex+0x380/0x4f0 [ 256.284613][T11646] ? kvm_get_dirty_log_protect.isra.0+0x670/0x670 [ 256.291037][T11646] ksys_ioctl+0x11a/0x180 [ 256.295384][T11646] __x64_sys_ioctl+0x6f/0xb0 [ 256.299988][T11646] ? lockdep_hardirqs_on+0x463/0x620 [ 256.305352][T11646] do_syscall_64+0xf6/0x7d0 [ 256.310007][T11646] entry_SYSCALL_64_after_hwframe+0x49/0xb3 [ 256.316776][T11646] RIP: 0033:0x45ca29 06:09:13 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) syslog(0x3, &(0x7f00000000c0)=""/147, 0x6558a7e3409167e0) open(&(0x7f0000000e00)='./file0\x00', 0x0, 0x0) mount(&(0x7f0000000200)=ANY=[], &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, 0x0) symlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000280)='./file0\x00') r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='mounts\x00') r1 = memfd_create(&(0x7f0000000000), 0x0) write$P9_RREADLINK(r0, &(0x7f0000000340)={0x10, 0x17, 0x2, {0x7, './file0'}}, 0x10) ioctl$sock_inet_SIOCDELRT(0xffffffffffffffff, 0x890c, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r0, 0x0, 0xfffffffe) 06:09:13 executing program 0: r0 = perf_event_open(&(0x7f0000000640)={0x3, 0x70, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x91dd7106ca8fd33b, 0xdb3fedb3c3734f95, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x40000000000, 0x0, 0x1, 0x0, @perf_config_ext={0x18, 0x3}, 0x21, 0x10000000000000, 0x0, 0x0, 0x0, 0x20000007, 0x2}, 0x0, 0xc, 0xffffffffffffffff, 0xa) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='cpuacct.stat\x00', 0x0, 0x0) r2 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r2, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f00000003c0)='syz1\x00', 0x200002, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0xfffffffffffffffc) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000300)='./cgroup/syz0\x00', 0x200002, 0x0) gettid() socket$kcm(0x11, 0xb, 0x0) ioctl$TUNSETTXFILTER(r1, 0x400454d1, &(0x7f00000000c0)=ANY=[@ANYBLOB="00000700000000da6500bbc4bbbbbbbb0180c2000016000000004dc23f0c000000000000bb"]) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000040)=@ipx={0x4, 0x1, 0x0, "2bfaec665b4b", 0xff}, 0x80, 0x0}, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={0xffffffffffffffff, 0x1, 0x49c42ca22ab5a9ac, 0x4, 0x0}, 0x20) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x908b7aabaa7d2404) socket$kcm(0xa, 0x6, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x4000011) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000000c0), 0x0}, 0x28) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x89f1, &(0x7f0000000000)='ip6gre0\x00') perf_event_open(&(0x7f00000004c0)={0x0, 0x70, 0x8, 0x6, 0x0, 0x3, 0x0, 0x3, 0x4, 0x0, 0x9, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x1000, 0x0, @perf_config_ext={0x1ff}, 0x40004, 0xfffffffffffffffd, 0x0, 0x8, 0x8, 0x4, 0x80}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0x10, 0x0, 0x10) sendmsg$kcm(r4, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d200040080000048000001000080000000000300f88000f01700d4bd", 0x2e}], 0xf}, 0x40094) r5 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r6 = socket$kcm(0x2, 0x1, 0x2) socketpair(0x25, 0x6, 0x4, &(0x7f0000000480)) setsockopt$sock_attach_bpf(r6, 0x1, 0x3e, &(0x7f00000002c0)=r5, 0x4) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x6d, &(0x7f0000000cc0)=ANY=[@ANYRESHEX, @ANYBLOB="e99f619c950ec8069b69ac05520100000000000000572e83f4fd34a6db69715afdc8ec492fa879a8460bf2c7459f384ec36d6f0d833fccc87dc8f542ca0731ec72c3f6e0857c63572db61a83246496a2f90400569c8af42a5b8b1e3583115dfe3a40a792ffe638fd722afd02131c170175f382a8d78b6626d1d58220f08d98570bad00042a01c00748cf37385e7d66e6c0efddeb730ebd2f1ab4e816cf7493cf236ca5eb6e5d2a65519a7acf475dbd9fb52eb50ddcf9cee74529f59a2d6cfe6c23f6a688719f922099394146621132f866439970571e206ac47123f2d9cdb5cb7c8506122300000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000)={0x0, 0x8}, 0x10}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r7, 0x18000000000002a0, 0x42, 0x0, &(0x7f0000000800)="b9ff0300600d698cb89e14f088a81fffffff00004000630677fbac14140ee934a0a662079f4b4d2f87e5feca6aab845013f2325f1a39010108038da1924425181aa5", 0x0, 0x28000, 0x60000000, 0x113, 0x0, &(0x7f00000006c0)="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"}, 0x40) r8 = bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x17, 0x6, &(0x7f0000000c00)=ANY=[], &(0x7f00000002c0)='GPL\x00', 0x2, 0x0, 0x0, 0x40f00, 0x8, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000340)={0x1, 0x10000003}, 0x8, 0x10, &(0x7f0000000380)={0x0, 0xa, 0x83, 0x2}, 0x10}, 0x78) ioctl$sock_kcm_SIOCKCMATTACH(r4, 0x89e0, &(0x7f0000000500)={0xffffffffffffffff, r8}) [ 256.320674][T11646] Code: 0d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 256.340284][T11646] RSP: 002b:00007fc8fa46ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 256.348704][T11646] RAX: ffffffffffffffda RBX: 00000000004e7fc0 RCX: 000000000045ca29 [ 256.356710][T11646] RDX: 0000000000000000 RSI: 000000000000ae80 RDI: 0000000000000005 [ 256.364806][T11646] RBP: 000000000078bf00 R08: 0000000000000000 R09: 0000000000000000 [ 256.372792][T11646] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000ffffffff [ 256.380779][T11646] R13: 00000000000003c6 R14: 00000000004c6703 R15: 00007fc8fa46b6d4 [ 256.388776][T11646] [ 256.391111][T11646] Allocated by task 11654: [ 256.395536][T11646] save_stack+0x1b/0x40 [ 256.399701][T11646] __kasan_kmalloc.constprop.0+0xbf/0xd0 [ 256.405447][T11646] kvmalloc_node+0x61/0xf0 [ 256.410311][T11646] kvm_set_memslot+0x115/0x1530 [ 256.415172][T11646] __kvm_set_memory_region+0xcf7/0x1320 [ 256.420731][T11646] __x86_set_memory_region+0x2ef/0x5a0 [ 256.426201][T11646] vmx_create_vcpu+0x2107/0x2b40 [ 256.431149][T11646] kvm_arch_vcpu_create+0x6ef/0xb80 [ 256.436361][T11646] kvm_vm_ioctl+0x1614/0x2400 [ 256.441046][T11646] ksys_ioctl+0x11a/0x180 [ 256.445383][T11646] __x64_sys_ioctl+0x6f/0xb0 [ 256.449980][T11646] do_syscall_64+0xf6/0x7d0 [ 256.454496][T11646] entry_SYSCALL_64_after_hwframe+0x49/0xb3 [ 256.460383][T11646] [ 256.462717][T11646] Freed by task 16: [ 256.466537][T11646] save_stack+0x1b/0x40 [ 256.470731][T11646] __kasan_slab_free+0xf7/0x140 [ 256.475763][T11646] kfree+0x109/0x2b0 [ 256.479662][T11646] rcu_core+0x59f/0x1370 [ 256.483977][T11646] __do_softirq+0x26c/0x9f7 [ 256.488481][T11646] [ 256.490813][T11646] The buggy address belongs to the object at ffff888085c20000 [ 256.490813][T11646] which belongs to the cache kmalloc-2k of size 2048 [ 256.505047][T11646] The buggy address is located 1128 bytes inside of [ 256.505047][T11646] 2048-byte region [ffff888085c20000, ffff888085c20800) [ 256.518491][T11646] The buggy address belongs to the page: [ 256.524131][T11646] page:ffffea0002170800 refcount:1 mapcount:0 mapping:000000004ca5a5ea index:0x0 [ 256.533239][T11646] flags: 0xfffe0000000200(slab) [ 256.538115][T11646] raw: 00fffe0000000200 ffffea00029f9288 ffffea00028d6888 ffff8880aa000e00 [ 256.546710][T11646] raw: 0000000000000000 ffff888085c20000 0000000100000001 0000000000000000 [ 256.555291][T11646] page dumped because: kasan: bad access detected [ 256.561699][T11646] [ 256.564023][T11646] Memory state around the buggy address: [ 256.569659][T11646] ffff888085c20300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 256.577731][T11646] ffff888085c20380: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 256.585798][T11646] >ffff888085c20400: 00 00 00 00 00 00 00 00 00 00 00 00 00 fc fc fc [ 256.593858][T11646] ^ [ 256.601321][T11646] ffff888085c20480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 256.609389][T11646] ffff888085c20500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 256.617488][T11646] ================================================================== [ 256.625547][T11646] Disabling lock debugging due to kernel taint 06:09:13 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet_udp_int(r0, 0x11, 0x67, &(0x7f0000000140)=0x6, 0x4) sendmmsg(r0, &(0x7f0000006f00)=[{{&(0x7f0000000040)=@in={0x2, 0x4e23, @remote}, 0x80, &(0x7f0000000100)=[{&(0x7f00000000c0)="e04013b497936ecafdd12c496f522cc2830fd358bc8f890e410223906070a39cc6e2f84a8622c5f86cad52bba1560397737a6cce189d7db27e", 0x39}], 0x1}}, {{0x0, 0x0, &(0x7f0000000440)=[{&(0x7f0000000200)}, {&(0x7f0000000240)="b995a5bf327c6f291a70af1527c6eb87af6b40c22e784c7d81102b1d2c4f5434d0142b1efa49361c7fa370cde02cbad1cdf556d5ebe84042e5b1eee75566d3c3bd4e54fb80c6258eb985131872c446ae99febe93703f66f4e0e10392c8a0d30f35710c7490190fef84833442ab74de59e4c9ebbc7cfe3f26750c16970d537ab353640e9e46e706cd200383135bfbf29b19c2fe729da592a9fb74eca37cb46775eb6db0118a3c59ac107fcf691822488d67f90e891045cb2ea35a79b6cd27c9fa5f37c9f6d6e4e2ca9267b2a8aa34f9727b0f539f", 0xd4}, {&(0x7f0000000340)="529cd4456bccdb80c030fe01e5cd61704126c8d4e7ec", 0x16}, {&(0x7f0000000380)="c2597979197f75ed6b82c8bcbf2c6b92a9a53fdd74646d60f9941ca27e", 0x1d}], 0x4}}], 0x2, 0x4c004) sendmmsg(r0, &(0x7f0000007fc0), 0x800001d, 0x0) 06:09:13 executing program 5: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)) r2 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000100)={0x26, 'hash\x00', 0x0, 0x0, 'crct10dif-generic\x00'}, 0x58) r4 = accept$alg(r3, 0x0, 0x0) r5 = accept4(r4, 0x0, 0x0, 0x0) splice(r0, 0x0, r5, 0x0, 0x30007, 0x0) 06:09:13 executing program 0: r0 = perf_event_open(&(0x7f0000000640)={0x3, 0x70, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x91dd7106ca8fd33b, 0xdb3fedb3c3734f95, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x40000000000, 0x0, 0x1, 0x0, @perf_config_ext={0x18, 0x3}, 0x21, 0x10000000000000, 0x0, 0x0, 0x0, 0x20000007, 0x2}, 0x0, 0xc, 0xffffffffffffffff, 0xa) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='cpuacct.stat\x00', 0x0, 0x0) r2 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r2, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f00000003c0)='syz1\x00', 0x200002, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0xfffffffffffffffc) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000300)='./cgroup/syz0\x00', 0x200002, 0x0) gettid() socket$kcm(0x11, 0xb, 0x0) ioctl$TUNSETTXFILTER(r1, 0x400454d1, &(0x7f00000000c0)=ANY=[@ANYBLOB="00000700000000da6500bbc4bbbbbbbb0180c2000016000000004dc23f0c000000000000bb"]) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000040)=@ipx={0x4, 0x1, 0x0, "2bfaec665b4b", 0xff}, 0x80, 0x0}, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={0xffffffffffffffff, 0x1, 0x49c42ca22ab5a9ac, 0x4, 0x0}, 0x20) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x908b7aabaa7d2404) socket$kcm(0xa, 0x6, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x4000011) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000000c0), 0x0}, 0x28) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x89f1, &(0x7f0000000000)='ip6gre0\x00') perf_event_open(&(0x7f00000004c0)={0x0, 0x70, 0x8, 0x6, 0x0, 0x3, 0x0, 0x3, 0x4, 0x0, 0x9, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x1000, 0x0, @perf_config_ext={0x1ff}, 0x40004, 0xfffffffffffffffd, 0x0, 0x8, 0x8, 0x4, 0x80}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0x10, 0x0, 0x10) sendmsg$kcm(r4, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d200040080000048000001000080000000000300f88000f01700d4bd", 0x2e}], 0xf}, 0x40094) r5 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r6 = socket$kcm(0x2, 0x1, 0x2) socketpair(0x25, 0x6, 0x4, &(0x7f0000000480)) setsockopt$sock_attach_bpf(r6, 0x1, 0x3e, &(0x7f00000002c0)=r5, 0x4) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x6d, &(0x7f0000000cc0)=ANY=[@ANYRESHEX, @ANYBLOB="e99f619c950ec8069b69ac05520100000000000000572e83f4fd34a6db69715afdc8ec492fa879a8460bf2c7459f384ec36d6f0d833fccc87dc8f542ca0731ec72c3f6e0857c63572db61a83246496a2f90400569c8af42a5b8b1e3583115dfe3a40a792ffe638fd722afd02131c170175f382a8d78b6626d1d58220f08d98570bad00042a01c00748cf37385e7d66e6c0efddeb730ebd2f1ab4e816cf7493cf236ca5eb6e5d2a65519a7acf475dbd9fb52eb50ddcf9cee74529f59a2d6cfe6c23f6a688719f922099394146621132f866439970571e206ac47123f2d9cdb5cb7c8506122300000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000)={0x0, 0x8}, 0x10}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r7, 0x18000000000002a0, 0x42, 0x0, &(0x7f0000000800)="b9ff0300600d698cb89e14f088a81fffffff00004000630677fbac14140ee934a0a662079f4b4d2f87e5feca6aab845013f2325f1a39010108038da1924425181aa5", 0x0, 0x28000, 0x60000000, 0x113, 0x0, &(0x7f00000006c0)="097baacf569909ebb78a19b4d4f607feb3072ad9474026c7c148d184a2647de87a8fd14ad5d15cadabd6c7545b05000000ad90e0d4000000000f3f750d2a75f6fa77d3fa4e023987f7a54b04eb238604aa90cab7b44f95ae6ce9b5f877439af64cb6573e5bc85c5e766604ff55b7a234246bd2ee44c9e99d69190bbe089603846d17b8678d05a0bda6ae300ca8c43271b65bb62b0af61bf4da3891f5bcf900ed368b36e2db9957b0dfa5cf084db8cb2b2c54661f9eac8a58a72fc9e768405eb33bce450dd088d2e16d757eeb1239a2389330535afb4944b7b27c4b26d812ab58864f3ffa3ce8cf739275492a0c90b425a792a19b9abf846b926e9f93f4b57ab77c0db63fb7d5a1e04ef52157f14f1dedcc4437"}, 0x40) r8 = bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x17, 0x6, &(0x7f0000000c00)=ANY=[], &(0x7f00000002c0)='GPL\x00', 0x2, 0x0, 0x0, 0x40f00, 0x8, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000340)={0x1, 0x10000003}, 0x8, 0x10, &(0x7f0000000380)={0x0, 0xa, 0x83, 0x2}, 0x10}, 0x78) ioctl$sock_kcm_SIOCKCMATTACH(r4, 0x89e0, &(0x7f0000000500)={0xffffffffffffffff, r8}) 06:09:13 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet_udp_int(r0, 0x11, 0x67, &(0x7f0000000140)=0x6, 0x4) sendmmsg(r0, &(0x7f0000006f00)=[{{&(0x7f0000000040)=@in={0x2, 0x4e23, @remote}, 0x80, &(0x7f0000000100)=[{&(0x7f00000000c0)="e04013b497936ecafdd12c496f522cc2830fd358bc8f890e410223906070a39cc6e2f84a8622c5f86cad52bba1560397737a6cce189d7db27e", 0x39}], 0x1}}, {{0x0, 0x0, &(0x7f0000000440)=[{&(0x7f0000000200)}, {&(0x7f0000000240)="b995a5bf327c6f291a70af1527c6eb87af6b40c22e784c7d81102b1d2c4f5434d0142b1efa49361c7fa370cde02cbad1cdf556d5ebe84042e5b1eee75566d3c3bd4e54fb80c6258eb985131872c446ae99febe93703f66f4e0e10392c8a0d30f35710c7490190fef84833442ab74de59e4c9ebbc7cfe3f26750c16970d537ab353640e9e46e706cd200383135bfbf29b19c2fe729da592a9fb74eca37cb46775eb6db0118a3c59ac107fcf691822488d67f90e891045cb2ea35a79b6cd27c9fa5f37c9f6d6e4e2ca9267b2a8aa34f9727b0f539f", 0xd4}, {&(0x7f0000000340)="529cd4456bccdb80c030fe01e5cd61704126c8d4e7ec", 0x16}, {&(0x7f0000000380)="c2597979197f75ed6b82c8bcbf2c6b92a9a53fdd74646d60f9941ca27e", 0x1d}], 0x4}}], 0x2, 0x4c004) sendmmsg(r0, &(0x7f0000007fc0), 0x800001d, 0x0) 06:09:13 executing program 4: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000000c0)=0xe) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r1 = openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$EVIOCGPROP(r1, 0x40047438, &(0x7f0000000180)=""/246) ioctl$PPPIOCSFLAGS1(r1, 0x40047457, &(0x7f0000000000)) [ 256.918914][T11646] Kernel panic - not syncing: panic_on_warn set ... [ 256.925553][T11646] CPU: 0 PID: 11646 Comm: syz-executor.3 Tainted: G B 5.7.0-rc1-next-20200415-syzkaller #0 [ 256.936859][T11646] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 256.946914][T11646] Call Trace: [ 256.950216][T11646] dump_stack+0x188/0x20d [ 256.954666][T11646] panic+0x2e3/0x75c [ 256.958569][T11646] ? add_taint.cold+0x16/0x16 [ 256.963317][T11646] ? preempt_schedule_common+0x5e/0xc0 [ 256.968803][T11646] ? kvm_vcpu_gfn_to_memslot+0x50e/0x540 [ 256.974446][T11646] ? preempt_schedule_thunk+0x16/0x18 [ 256.979850][T11646] ? trace_hardirqs_on+0x55/0x220 [ 256.984885][T11646] ? kvm_vcpu_gfn_to_memslot+0x50e/0x540 [ 256.990523][T11646] end_report+0x4d/0x53 [ 256.994685][T11646] __kasan_report.cold+0xd/0x4d [ 256.999543][T11646] ? kvm_vcpu_gfn_to_memslot+0x50e/0x540 [ 257.005186][T11646] ? kvm_vcpu_gfn_to_memslot+0x50e/0x540 [ 257.010821][T11646] kasan_report+0x33/0x50 [ 257.015156][T11646] kvm_vcpu_gfn_to_memslot+0x50e/0x540 [ 257.020620][T11646] kvm_vcpu_write_guest+0x48/0xd0 [ 257.025652][T11646] enter_smm+0xa12/0x1740 [ 257.029992][T11646] ? emulator_pio_in_emulated+0x70/0x70 [ 257.035893][T11646] ? print_usage_bug+0x240/0x240 [ 257.040839][T11646] ? kvm_set_msr_common+0x1eb/0x27c0 [ 257.046153][T11646] ? kvm_apic_accept_events+0x1c4/0x540 [ 257.051976][T11646] ? kvm_lapic_enable_pv_eoi+0x160/0x160 [ 257.057615][T11646] ? vcpu_mmio_read+0x4e0/0x4e0 [ 257.062470][T11646] ? vmx_handle_exit+0x2c0/0x1700 [ 257.067533][T11646] vcpu_enter_guest+0x1f2a/0x59d0 [ 257.073079][T11646] ? vmx_vcpu_load_vmcs+0x960/0x960 [ 257.078318][T11646] ? kvm_vcpu_reload_apic_access_page+0x300/0x300 [ 257.084737][T11646] ? kvm_arch_vcpu_ioctl_run+0x23a/0x16e0 [ 257.090461][T11646] ? lock_release+0x800/0x800 [ 257.095145][T11646] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 257.100697][T11646] ? rcu_read_lock_any_held.part.0+0x50/0x50 [ 257.106689][T11646] ? kvm_check_async_pf_completion+0x2a4/0x400 [ 257.112846][T11646] ? lockdep_hardirqs_on+0x463/0x620 [ 257.118141][T11646] ? kvm_arch_vcpu_ioctl_run+0x3fb/0x16e0 [ 257.123871][T11646] kvm_arch_vcpu_ioctl_run+0x3fb/0x16e0 [ 257.129424][T11646] kvm_vcpu_ioctl+0x493/0xe60 [ 257.134109][T11646] ? kvm_get_dirty_log_protect.isra.0+0x670/0x670 [ 257.136763][T11721] IPVS: ftp: loaded support on port[0] = 21 [ 257.140522][T11646] ? ioctl_file_clone+0x180/0x180 [ 257.140539][T11646] ? __fget_files+0x32f/0x500 [ 257.140552][T11646] ? do_dup2+0x520/0x520 [ 257.140572][T11646] ? __x64_sys_futex+0x380/0x4f0 [ 257.165258][T11646] ? kvm_get_dirty_log_protect.isra.0+0x670/0x670 [ 257.171683][T11646] ksys_ioctl+0x11a/0x180 [ 257.176021][T11646] __x64_sys_ioctl+0x6f/0xb0 [ 257.181486][T11646] ? lockdep_hardirqs_on+0x463/0x620 [ 257.186778][T11646] do_syscall_64+0xf6/0x7d0 [ 257.191292][T11646] entry_SYSCALL_64_after_hwframe+0x49/0xb3 [ 257.197185][T11646] RIP: 0033:0x45ca29 [ 257.201087][T11646] Code: 0d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 257.220701][T11646] RSP: 002b:00007fc8fa46ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 257.229113][T11646] RAX: ffffffffffffffda RBX: 00000000004e7fc0 RCX: 000000000045ca29 [ 257.237088][T11646] RDX: 0000000000000000 RSI: 000000000000ae80 RDI: 0000000000000005 [ 257.245147][T11646] RBP: 000000000078bf00 R08: 0000000000000000 R09: 0000000000000000 [ 257.253236][T11646] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000ffffffff [ 257.261207][T11646] R13: 00000000000003c6 R14: 00000000004c6703 R15: 00007fc8fa46b6d4 [ 257.271825][T11646] Kernel Offset: disabled [ 257.276198][T11646] Rebooting in 86400 seconds..