6\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83CZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x98\x86\"R\x06\x00\x00\x00\x00\x00\x00\x00\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&\x014\x01\xf4\xb7\x83\x9a\xfa*\xa6\x06\xb7Pk7N\xc2\xd9\xee\xd0\xb0M\x00\xab\xc3\t\fc\xd8dx\xd5\x1dU*s)\x12[\x14\xb1\xc0\xd7\x1a\xa0\x16\xa2z\x9e\x93 \xddeF>29\v\x02\xa2b\x13R\xef\xffA,\xb9.$\xfa\x9f\xde[\x80\xd1=\xce\x1b\xeb\xf6\xf4\xe3z\x1f\x9dz\xa3\xc0\xe2\xa2\xb1\xeeq\xf5\xec0\x8e\xf4\xfb\xd9\x87\xf03\xdb\xae|\x10&V5c\xa6\xce\xcd\x8a\xdf\xe1\x89\"\xea\xde\xe7\xa3\xbe\xe7\xff\xf9 \x11\xfdY\xc6\xa1\xe8\xda\v\\?\xcb\x87\bn\x9b\x01\x1f\xf8\xe8\x1eV\xfaC\xdf\xc3Vv\x9b\x1a\xfc\x14.c\x94\xc9=\xb0\x0f!d\b\x18*@m\x7f\xaal\x17G\xd6?\x81\x16P\x03\x10e\xc3\xcd\xb1B\xeb\x01B\\\x91A\xa1\x8an\xb4#\xadr\x1e\x81v\xa2\x0e6x\xca\x8b\xa6\xd8\x81\x10:\x0e(\xdd\xfc\xc9\xc6\xb4\xf0\'f:\xbd\xfe\x11\xf8\xc8W\x81s^\xd9W\xf1\x94\xaf\xc5\x8a\xb4f\x1b\x17E\xb23\x12\xb0\xeb\xef\x8c\xb24h\xd7}\x7f\x92Hgej\x957\xe2A'}, 0x30) 03:43:32 executing program 0: socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) 03:43:32 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x238) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) writev(r0, &(0x7f0000000540)=[{&(0x7f0000000140)="cedbddea5b67f4290aa7fd7c0cc7e2e613891a59fd3dc2e8a3c6e7c9fa96", 0x1e}, {&(0x7f0000000340)="e4bc7c957b83ba155edae525e00f76c76056ac3fe8a5de5ccfba604ac6b0d4a0fd42802b43143a32d703bd21baddda61ba1cb78758f519c19a06193e8bfc0d1f1fad3be6885359773264bd153a2bf50591662cca307c7a22f8a9e70629a1beac22b823bfee7fec832958c20007e0b8707c6ac0e8b1", 0x75}, {&(0x7f00000004c0)="4b8043af3b13f04c3ee02ee028e584b538cfb06be329d5ca0649880187b5cd5ff601bf73", 0x24}], 0x3) sendto$inet(r0, &(0x7f00000012c0)="0c268a927f1f6588b967481241ba7860005cf65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95425a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x27) 03:43:32 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x238) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) writev(r0, &(0x7f0000000540)=[{&(0x7f0000000140)="cedbddea5b67f4290aa7fd7c0cc7e2e613891a59fd3dc2e8a3c6e7c9fa96", 0x1e}, {&(0x7f0000000340)="e4bc7c957b83ba155edae525e00f76c76056ac3fe8a5de5ccfba604ac6b0d4a0fd42802b43143a32d703bd21baddda61ba1cb78758f519c19a0619", 0x3b}, {0x0}], 0x3) sendto$inet(r0, &(0x7f00000012c0)="0c268a927f1f6588b967481241ba7860005cf65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95425a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x27) 03:43:32 executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000fe1000)={0x5, 0x83, 0x0, 0xf}, 0x1c) bpf$PROG_LOAD(0x5, &(0x7f0000fed000)={0x7, 0x9, &(0x7f00000000c0)=@framed={{}, [@map={0x18, 0x0, 0x1, 0x0, r0}, @map, @map]}, &(0x7f0000919ff6)='syzkaller\x00', 0x0, 0xe1, &(0x7f0000000000)=""/225}, 0x14) 03:43:32 executing program 5: openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) ioctl$RNDADDENTROPY(0xffffffffffffffff, 0x40085203, &(0x7f0000000100)={0x6, 0xb1, "56f80f8d7c9ad684157765ee68815e033b7b2972a2d067318db9ac518603e0dbae813e160bd3f15b30c226056579cf64ac2525dd44c15e56204f1e3f1b8c03b31f4281605682d4b39a61b89636b3a2a5ea0bd3f5e8bd40d8c0406969d18fed78e4f4108902b5959ec383c40036f5262e703d6ad6a7a486302c382e45645bfe4c472249b482a28e9519e744cdbe884985d913612a17250eab7e4f0bf4b35aab9f7b923116a8d30baf612ca3bc2ef9b3f8d1"}) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_sctp(0x2, 0x5, 0x84) dup3(0xffffffffffffffff, r0, 0x0) socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp_SCTP_AUTH_DEACTIVATE_KEY(0xffffffffffffffff, 0x84, 0x23, 0x0, 0x0) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f00000000c0)={0x51, 0xfffc, 0x0, {0x103, 0xf1}, {0x9}, @ramp={0x2, 0x3, {0x7fff, 0x0, 0x7, 0x7}}}) r1 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r1, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @bcast, @rose, @rose, @null]}, 0x48) listen(r1, 0x0) unshare(0x40000000) r2 = accept(r1, 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r3, 0xffffffffffffffff) write$binfmt_elf64(r2, &(0x7f00000002c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}], "", [[], []]}, 0x278) 03:43:32 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, 0x0, 0x0) 03:43:32 executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000fe1000)={0x5, 0x83, 0x0, 0xf}, 0x1c) bpf$PROG_LOAD(0x5, &(0x7f0000fed000)={0x7, 0x9, &(0x7f00000000c0)=@framed={{}, [@map={0x18, 0x0, 0x1, 0x0, r0}, @map, @map]}, &(0x7f0000919ff6)='syzkaller\x00', 0x0, 0xe1, &(0x7f0000000000)=""/225}, 0x14) [ 691.691690][T28193] IPVS: ftp: loaded support on port[0] = 21 03:43:32 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x400007) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0x32600) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xb4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000040)='cpuset') write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000700)=ANY=[@ANYBLOB="006d176df3384ed3ddbcf3be0e26fd017529253262b78ee8b9d470"], 0x1b) ioctl$TUNSETCARRIER(0xffffffffffffffff, 0x400454e2, &(0x7f0000000080)=0x1) write$cgroup_int(r0, &(0x7f0000000380), 0x12) write$cgroup_int(r1, &(0x7f0000000400), 0xd) r2 = gettid() write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000000)=r2, 0x12) r3 = socket$kcm(0x2b, 0x0, 0x0) socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r3, 0x0, 0x0) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000280)=r2, 0x12) r4 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) close(r5) write$cgroup_type(r5, &(0x7f0000000080)='threaded\x00', 0xfffffc61) r6 = bpf$MAP_CREATE(0x2, &(0x7f0000009280), 0x3c) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x17, 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB], &(0x7f0000000200)='syzkaller\x00', 0xfa1, 0x0, 0x0, 0x41100, 0x2, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, &(0x7f0000000240), 0x8, 0x10, 0x0}, 0x78) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000008740)={0x0, 0x0, &(0x7f0000008700)=[{0x0}, {&(0x7f0000008680)=""/23, 0x17}, {&(0x7f00000086c0)=""/38, 0x26}], 0x3}, 0x8000) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x6, 0x2, 0x2e15579, 0x3f, 0x1, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffffff, 0x0, 0x5}, 0x3c) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0xb, [], 0x0, 0xc, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r7}, 0x7e) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r8, &(0x7f0000000000)=ANY=[], 0x50c000) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x18, 0x26, &(0x7f0000000a00)=ANY=[@ANYBLOB="0000752c0000000000000000ffffffff9500000000000000181400006200ed587c1ba87fb23af22b6cf03fb851054ce322d4b3a5894516c0c1479e1cfbf3061ad7aef6d6c36e4e74a8219f8441192ab16361719f26a1e543525c94027f7a5f275546d8cacee044fc20d858e268019caeb1633cc4888faa05d02cd44de32962e022697754125edcfb3477c4e122a0e97ab43de94a7a94efd527400e2c2ff4468fd6e773773f089b268fddef712ab174487ae9049f64895522be3862156a1af15513c3ff285844c9aae255d74c0dacf6c47d6809ce69ee6e41a03a03b29152ee43afabd82aa883f260995238aa70895dc3aee59a119dc82fb5fd00af56ded09336e2df6a0bb41bd191d57b35eb262a1aa8d5fec5", @ANYRES32=r6, @ANYBLOB="00000000000000000c72c0fff6ffffff850000005b0000009500000000000000"], &(0x7f0000000040)='GPL\x00', 0x3ff, 0xd5, &(0x7f0000000080)=""/213, 0x61800, 0xab6c50112a8dd52c, [], 0x0, 0x16, 0xffffffffffffffff, 0x8, &(0x7f0000000180)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000001c0)={0x2, 0x6, 0x6, 0x5}, 0x10, 0x0, r8}, 0x78) bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x11, 0x5, 0x81, 0x2, 0x100, r5, 0x3, [], 0x0, 0xffffffffffffffff, 0x4, 0x3}, 0x3c) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r9, &(0x7f0000000200), 0x806000) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, r4, 0x0, 0x2a8, &(0x7f0000000440)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\a\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83CZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x98\x86\"R\x06\x00\x00\x00\x00\x00\x00\x00\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&\x014\x01\xf4\xb7\x83\x9a\xfa*\xa6\x06\xb7Pk7N\xc2\xd9\xee\xd0\xb0M\x00\xab\xc3\t\fc\xd8dx\xd5\x1dU*s)\x12[\x14\xb1\xc0\xd7\x1a\xa0\x16\xa2z\x9e\x93 \xddeF>29\v\x02\xa2b\x13R\xef\xffA,\xb9.$\xfa\x9f\xde[\x80\xd1=\xce\x1b\xeb\xf6\xf4\xe3z\x1f\x9dz\xa3\xc0\xe2\xa2\xb1\xeeq\xf5\xec0\x8e\xf4\xfb\xd9\x87\xf03\xdb\xae|\x10&V5c\xa6\xce\xcd\x8a\xdf\xe1\x89\"\xea\xde\xe7\xa3\xbe\xe7\xff\xf9 \x11\xfdY\xc6\xa1\xe8\xda\v\\?\xcb\x87\bn\x9b\x01\x1f\xf8\xe8\x1eV\xfaC\xdf\xc3Vv\x9b\x1a\xfc\x14.c\x94\xc9=\xb0\x0f!d\b\x18*@m\x7f\xaal\x17G\xd6?\x81\x16P\x03\x10e\xc3\xcd\xb1B\xeb\x01B\\\x91A\xa1\x8an\xb4#\xadr\x1e\x81v\xa2\x0e6x\xca\x8b\xa6\xd8\x81\x10:\x0e(\xdd\xfc\xc9\xc6\xb4\xf0\'f:\xbd\xfe\x11\xf8\xc8W\x81s^\xd9W\xf1\x94\xaf\xc5\x8a\xb4f\x1b\x17E\xb23\x12\xb0\xeb\xef\x8c\xb24h\xd7}\x7f\x92Hgej\x957\xe2A'}, 0x30) 03:43:32 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, 0x0, 0x0) 03:43:32 executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000fe1000)={0x5, 0x83, 0x0, 0xf}, 0x1c) bpf$PROG_LOAD(0x5, &(0x7f0000fed000)={0x7, 0x9, &(0x7f00000000c0)=@framed={{}, [@map={0x18, 0x0, 0x1, 0x0, r0}, @map, @map]}, &(0x7f0000919ff6)='syzkaller\x00', 0x0, 0xe1, &(0x7f0000000000)=""/225}, 0x14) 03:43:32 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x238) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) writev(r0, &(0x7f0000000540)=[{&(0x7f0000000140)="cedbddea5b67f4290aa7fd7c0cc7e2e613891a59fd3dc2e8a3c6e7c9fa96", 0x1e}, {&(0x7f0000000340)="e4bc7c957b83ba155edae525e00f76c76056ac3fe8a5de5ccfba604ac6b0d4a0fd42802b43143a32d703bd21baddda61ba1cb78758f519c19a06193e8bfc0d1f1fad3be6885359773264bd153a2bf50591662cca307c7a22f8a9e70629a1beac22b823bfee7fec832958c20007e0b8707c6ac0e8b1", 0x75}, {&(0x7f00000004c0)="4b8043af3b13f04c3ee02ee028e584b538cfb06be329d5ca0649880187b5cd5ff601bf73", 0x24}, {0x0}], 0x4) sendto$inet(r0, &(0x7f00000012c0)="0c268a927f1f6588b967481241ba7860005cf65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95425a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x27) 03:43:32 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x238) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) writev(r0, &(0x7f0000000540)=[{&(0x7f0000000140)="cedbddea5b67f4290aa7fd7c0cc7e2e613891a59fd3dc2e8a3c6e7c9fa96", 0x1e}, {&(0x7f0000000340)="e4bc7c957b83ba155edae525e00f76c76056ac3fe8a5de5ccfba604ac6b0d4a0fd42802b43143a32d703bd21baddda61ba1cb78758f519c19a0619", 0x3b}, {0x0}], 0x3) sendto$inet(r0, &(0x7f00000012c0)="0c268a927f1f6588b967481241ba7860005cf65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95425a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x27) 03:43:33 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, 0x0, 0x0) 03:43:33 executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000fe1000)={0x5, 0x83, 0x80}, 0x1c) bpf$PROG_LOAD(0x5, &(0x7f0000fed000)={0x7, 0x9, &(0x7f00000000c0)=@framed={{}, [@map={0x18, 0x0, 0x1, 0x0, r0}, @map, @map]}, &(0x7f0000919ff6)='syzkaller\x00', 0x0, 0xe1, &(0x7f0000000000)=""/225}, 0x14) 03:43:33 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x400007) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0x32600) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xb4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000040)='cpuset') write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000700)=ANY=[@ANYBLOB="006d176df3384ed3ddbcf3be0e26fd017529253262b78ee8b9d470"], 0x1b) ioctl$TUNSETCARRIER(0xffffffffffffffff, 0x400454e2, &(0x7f0000000080)=0x1) write$cgroup_int(r0, &(0x7f0000000380), 0x12) write$cgroup_int(r1, &(0x7f0000000400), 0xd) r2 = gettid() write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000000)=r2, 0x12) r3 = socket$kcm(0x2b, 0x0, 0x0) socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r3, 0x0, 0x0) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000280)=r2, 0x12) r4 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) close(r5) write$cgroup_type(r5, &(0x7f0000000080)='threaded\x00', 0xfffffc61) r6 = bpf$MAP_CREATE(0x2, &(0x7f0000009280), 0x3c) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x17, 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB], &(0x7f0000000200)='syzkaller\x00', 0xfa1, 0x0, 0x0, 0x41100, 0x2, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, &(0x7f0000000240), 0x8, 0x10, 0x0}, 0x78) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000008740)={0x0, 0x0, &(0x7f0000008700)=[{0x0}, {&(0x7f0000008680)=""/23, 0x17}, {&(0x7f00000086c0)=""/38, 0x26}], 0x3}, 0x8000) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x6, 0x2, 0x2e15579, 0x3f, 0x1, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffffff, 0x0, 0x5}, 0x3c) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0xb, [], 0x0, 0xc, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r7}, 0x7e) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r8, &(0x7f0000000000)=ANY=[], 0x50c000) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x18, 0x26, &(0x7f0000000a00)=ANY=[@ANYBLOB="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", @ANYRES32=r6, @ANYBLOB="00000000000000000c72c0fff6ffffff850000005b0000009500000000000000"], &(0x7f0000000040)='GPL\x00', 0x3ff, 0xd5, &(0x7f0000000080)=""/213, 0x61800, 0xab6c50112a8dd52c, [], 0x0, 0x16, 0xffffffffffffffff, 0x8, &(0x7f0000000180)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000001c0)={0x2, 0x6, 0x6, 0x5}, 0x10, 0x0, r8}, 0x78) bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x11, 0x5, 0x81, 0x2, 0x100, r5, 0x3, [], 0x0, 0xffffffffffffffff, 0x4, 0x3}, 0x3c) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r9, &(0x7f0000000200), 0x806000) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, r4, 0x0, 0x2a8, &(0x7f0000000440)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\a\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83CZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x98\x86\"R\x06\x00\x00\x00\x00\x00\x00\x00\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&\x014\x01\xf4\xb7\x83\x9a\xfa*\xa6\x06\xb7Pk7N\xc2\xd9\xee\xd0\xb0M\x00\xab\xc3\t\fc\xd8dx\xd5\x1dU*s)\x12[\x14\xb1\xc0\xd7\x1a\xa0\x16\xa2z\x9e\x93 \xddeF>29\v\x02\xa2b\x13R\xef\xffA,\xb9.$\xfa\x9f\xde[\x80\xd1=\xce\x1b\xeb\xf6\xf4\xe3z\x1f\x9dz\xa3\xc0\xe2\xa2\xb1\xeeq\xf5\xec0\x8e\xf4\xfb\xd9\x87\xf03\xdb\xae|\x10&V5c\xa6\xce\xcd\x8a\xdf\xe1\x89\"\xea\xde\xe7\xa3\xbe\xe7\xff\xf9 \x11\xfdY\xc6\xa1\xe8\xda\v\\?\xcb\x87\bn\x9b\x01\x1f\xf8\xe8\x1eV\xfaC\xdf\xc3Vv\x9b\x1a\xfc\x14.c\x94\xc9=\xb0\x0f!d\b\x18*@m\x7f\xaal\x17G\xd6?\x81\x16P\x03\x10e\xc3\xcd\xb1B\xeb\x01B\\\x91A\xa1\x8an\xb4#\xadr\x1e\x81v\xa2\x0e6x\xca\x8b\xa6\xd8\x81\x10:\x0e(\xdd\xfc\xc9\xc6\xb4\xf0\'f:\xbd\xfe\x11\xf8\xc8W\x81s^\xd9W\xf1\x94\xaf\xc5\x8a\xb4f\x1b\x17E\xb23\x12\xb0\xeb\xef\x8c\xb24h\xd7}\x7f\x92Hgej\x957\xe2A'}, 0x30) 03:43:33 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x0, 0x0}, 0x10) 03:43:33 executing program 5: openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) ioctl$RNDADDENTROPY(0xffffffffffffffff, 0x40085203, &(0x7f0000000100)={0x6, 0xb1, "56f80f8d7c9ad684157765ee68815e033b7b2972a2d067318db9ac518603e0dbae813e160bd3f15b30c226056579cf64ac2525dd44c15e56204f1e3f1b8c03b31f4281605682d4b39a61b89636b3a2a5ea0bd3f5e8bd40d8c0406969d18fed78e4f4108902b5959ec383c40036f5262e703d6ad6a7a486302c382e45645bfe4c472249b482a28e9519e744cdbe884985d913612a17250eab7e4f0bf4b35aab9f7b923116a8d30baf612ca3bc2ef9b3f8d1"}) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_sctp(0x2, 0x5, 0x84) dup3(0xffffffffffffffff, r0, 0x0) socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp_SCTP_AUTH_DEACTIVATE_KEY(0xffffffffffffffff, 0x84, 0x23, 0x0, 0x0) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f00000000c0)={0x51, 0xfffc, 0x0, {0x103, 0xf1}, {0x9}, @ramp={0x2, 0x3, {0x7fff, 0x0, 0x7, 0x7}}}) r1 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r1, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @bcast, @rose, @rose, @null]}, 0x48) listen(r1, 0x0) unshare(0x40000000) r2 = accept(r1, 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r3, 0xffffffffffffffff) write$binfmt_elf64(r2, &(0x7f00000002c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}], "", [[], []]}, 0x278) 03:43:33 executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000fe1000)={0x5, 0x83, 0x80}, 0x1c) bpf$PROG_LOAD(0x5, &(0x7f0000fed000)={0x7, 0x9, &(0x7f00000000c0)=@framed={{}, [@map={0x18, 0x0, 0x1, 0x0, r0}, @map, @map]}, &(0x7f0000919ff6)='syzkaller\x00', 0x0, 0xe1, &(0x7f0000000000)=""/225}, 0x14) 03:43:33 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x238) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) writev(r0, &(0x7f0000000540)=[{&(0x7f0000000140)="cedbddea5b67f4290aa7fd7c0cc7e2e613891a59fd3dc2e8a3c6e7c9fa96", 0x1e}, {&(0x7f0000000340)="e4bc7c957b83ba155edae525e00f76c76056ac3fe8a5de5ccfba604ac6b0d4a0fd42802b43143a32d703bd21baddda61ba1cb78758f519c19a06193e8bfc0d1f1fad3be6885359773264bd153a2bf50591662cca307c7a22f8a9e70629a1beac22b823bfee7fec832958c20007e0b8707c6ac0e8b1", 0x75}, {&(0x7f00000004c0)="4b8043af3b13f04c3ee02ee028e584b538cfb06be329d5ca0649880187b5cd5ff601bf73", 0x24}, {0x0}], 0x4) sendto$inet(r0, &(0x7f00000012c0)="0c268a927f1f6588b967481241ba7860005cf65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95425a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x27) 03:43:33 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x0, 0x0}, 0x10) [ 692.624594][T28234] IPVS: ftp: loaded support on port[0] = 21 03:43:33 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x238) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) writev(r0, &(0x7f0000000540)=[{&(0x7f0000000140)="cedbddea5b67f4290aa7fd7c0cc7e2e613891a59fd3dc2e8a3c6e7c9fa96", 0x1e}, {&(0x7f0000000340)="e4bc7c957b83ba155edae525e00f76c76056ac3fe8a5de5ccfba604ac6b0d4a0fd42802b43143a32d703bd21baddda61ba1cb78758f519c19a06193e8bfc0d1f1fad3be6885359773264bd153a2bf50591662cca307c7a22", 0x58}, {0x0}], 0x3) sendto$inet(r0, &(0x7f00000012c0)="0c268a927f1f6588b967481241ba7860005cf65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95425a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x27) 03:43:33 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x400007) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0x32600) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xb4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000040)='cpuset') write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000700)=ANY=[@ANYBLOB="006d176df3384ed3ddbcf3be0e26fd017529253262b78ee8b9d470"], 0x1b) ioctl$TUNSETCARRIER(0xffffffffffffffff, 0x400454e2, &(0x7f0000000080)=0x1) write$cgroup_int(r0, &(0x7f0000000380), 0x12) write$cgroup_int(r1, &(0x7f0000000400), 0xd) r2 = gettid() write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000000)=r2, 0x12) r3 = socket$kcm(0x2b, 0x0, 0x0) socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r3, 0x0, 0x0) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000280)=r2, 0x12) r4 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) close(r5) write$cgroup_type(r5, &(0x7f0000000080)='threaded\x00', 0xfffffc61) r6 = bpf$MAP_CREATE(0x2, &(0x7f0000009280), 0x3c) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x17, 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB], &(0x7f0000000200)='syzkaller\x00', 0xfa1, 0x0, 0x0, 0x41100, 0x2, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, &(0x7f0000000240), 0x8, 0x10, 0x0}, 0x78) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000008740)={0x0, 0x0, &(0x7f0000008700)=[{0x0}, {&(0x7f0000008680)=""/23, 0x17}, {&(0x7f00000086c0)=""/38, 0x26}], 0x3}, 0x8000) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x6, 0x2, 0x2e15579, 0x3f, 0x1, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffffff, 0x0, 0x5}, 0x3c) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0xb, [], 0x0, 0xc, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r7}, 0x7e) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r8, &(0x7f0000000000)=ANY=[], 0x50c000) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x18, 0x26, &(0x7f0000000a00)=ANY=[@ANYBLOB="0000752c0000000000000000ffffffff9500000000000000181400006200ed587c1ba87fb23af22b6cf03fb851054ce322d4b3a5894516c0c1479e1cfbf3061ad7aef6d6c36e4e74a8219f8441192ab16361719f26a1e543525c94027f7a5f275546d8cacee044fc20d858e268019caeb1633cc4888faa05d02cd44de32962e022697754125edcfb3477c4e122a0e97ab43de94a7a94efd527400e2c2ff4468fd6e773773f089b268fddef712ab174487ae9049f64895522be3862156a1af15513c3ff285844c9aae255d74c0dacf6c47d6809ce69ee6e41a03a03b29152ee43afabd82aa883f260995238aa70895dc3aee59a119dc82fb5fd00af56ded09336e2df6a0bb41bd191d57b35eb262a1aa8d5fec5", @ANYRES32=r6, @ANYBLOB="00000000000000000c72c0fff6ffffff850000005b0000009500000000000000"], &(0x7f0000000040)='GPL\x00', 0x3ff, 0xd5, &(0x7f0000000080)=""/213, 0x61800, 0xab6c50112a8dd52c, [], 0x0, 0x16, 0xffffffffffffffff, 0x8, &(0x7f0000000180)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000001c0)={0x2, 0x6, 0x6, 0x5}, 0x10, 0x0, r8}, 0x78) bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x11, 0x5, 0x81, 0x2, 0x100, r5, 0x3, [], 0x0, 0xffffffffffffffff, 0x4, 0x3}, 0x3c) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r9, &(0x7f0000000200), 0x806000) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, r4, 0x0, 0x2a8, &(0x7f0000000440)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\a\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83CZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x98\x86\"R\x06\x00\x00\x00\x00\x00\x00\x00\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&\x014\x01\xf4\xb7\x83\x9a\xfa*\xa6\x06\xb7Pk7N\xc2\xd9\xee\xd0\xb0M\x00\xab\xc3\t\fc\xd8dx\xd5\x1dU*s)\x12[\x14\xb1\xc0\xd7\x1a\xa0\x16\xa2z\x9e\x93 \xddeF>29\v\x02\xa2b\x13R\xef\xffA,\xb9.$\xfa\x9f\xde[\x80\xd1=\xce\x1b\xeb\xf6\xf4\xe3z\x1f\x9dz\xa3\xc0\xe2\xa2\xb1\xeeq\xf5\xec0\x8e\xf4\xfb\xd9\x87\xf03\xdb\xae|\x10&V5c\xa6\xce\xcd\x8a\xdf\xe1\x89\"\xea\xde\xe7\xa3\xbe\xe7\xff\xf9 \x11\xfdY\xc6\xa1\xe8\xda\v\\?\xcb\x87\bn\x9b\x01\x1f\xf8\xe8\x1eV\xfaC\xdf\xc3Vv\x9b\x1a\xfc\x14.c\x94\xc9=\xb0\x0f!d\b\x18*@m\x7f\xaal\x17G\xd6?\x81\x16P\x03\x10e\xc3\xcd\xb1B\xeb\x01B\\\x91A\xa1\x8an\xb4#\xadr\x1e\x81v\xa2\x0e6x\xca\x8b\xa6\xd8\x81\x10:\x0e(\xdd\xfc\xc9\xc6\xb4\xf0\'f:\xbd\xfe\x11\xf8\xc8W\x81s^\xd9W\xf1\x94\xaf\xc5\x8a\xb4f\x1b\x17E\xb23\x12\xb0\xeb\xef\x8c\xb24h\xd7}\x7f\x92Hgej\x957\xe2A'}, 0x30) 03:43:33 executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000fe1000)={0x5, 0x83, 0x80}, 0x1c) bpf$PROG_LOAD(0x5, &(0x7f0000fed000)={0x7, 0x9, &(0x7f00000000c0)=@framed={{}, [@map={0x18, 0x0, 0x1, 0x0, r0}, @map, @map]}, &(0x7f0000919ff6)='syzkaller\x00', 0x0, 0xe1, &(0x7f0000000000)=""/225}, 0x14) 03:43:33 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x0, 0x0}, 0x10) 03:43:34 executing program 5: openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) ioctl$RNDADDENTROPY(0xffffffffffffffff, 0x40085203, &(0x7f0000000100)={0x6, 0xb7, "56f80f8d7c9ad684157765ee68815e033b7b2972a2d067318db9ac518603e0dbae813e160bd3f15b30c226056579cf64ac2525dd44c15e56204f1e3f1b8c03b31f4281605682d4b39a61b89636b3a2a5ea0bd3f5e8bd40d8c0406969d18fed78e4f4108902b5959ec383c40036f5262e703d6ad6a7a486302c382e45645bfe4c472249b482a28e9519e744cdbe884985d913612a17250eab7e4f0bf4b35aab9f7b923116a8d30baf612ca3bc2ef9b3f8d1c6b570cb60bd"}) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_sctp(0x2, 0x5, 0x84) dup3(0xffffffffffffffff, r0, 0x0) socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp_SCTP_AUTH_DEACTIVATE_KEY(0xffffffffffffffff, 0x84, 0x23, 0x0, 0x0) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f00000000c0)={0x51, 0xfffc, 0x0, {0x103, 0xf1}, {0x9}, @ramp={0x2, 0x3, {0x7fff, 0x0, 0x7, 0x7}}}) r1 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r1, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @bcast, @rose, @rose, @null]}, 0x48) listen(r1, 0x0) unshare(0x40000000) r2 = accept(r1, 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r3, 0xffffffffffffffff) write$binfmt_elf64(r2, &(0x7f00000002c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}], "", [[], []]}, 0x278) 03:43:34 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x0, &(0x7f0000000400)}, 0x10) 03:43:34 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000fe1000)={0x5, 0x83, 0x80, 0xf}, 0x1c) bpf$PROG_LOAD(0x5, 0x0, 0x0) 03:43:34 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x400007) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0x32600) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xb4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000040)='cpuset') write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000700)=ANY=[@ANYBLOB="006d176df3384ed3ddbcf3be0e26fd017529253262b78ee8b9d470"], 0x1b) ioctl$TUNSETCARRIER(0xffffffffffffffff, 0x400454e2, &(0x7f0000000080)=0x1) write$cgroup_int(r0, &(0x7f0000000380), 0x12) write$cgroup_int(r1, &(0x7f0000000400), 0xd) r2 = gettid() write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000000)=r2, 0x12) r3 = socket$kcm(0x2b, 0x0, 0x0) socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r3, 0x0, 0x0) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000280)=r2, 0x12) r4 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) close(r5) write$cgroup_type(r5, &(0x7f0000000080)='threaded\x00', 0xfffffc61) r6 = bpf$MAP_CREATE(0x2, &(0x7f0000009280), 0x3c) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x17, 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB], &(0x7f0000000200)='syzkaller\x00', 0xfa1, 0x0, 0x0, 0x41100, 0x2, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, &(0x7f0000000240), 0x8, 0x10, 0x0}, 0x78) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000008740)={0x0, 0x0, &(0x7f0000008700)=[{0x0}, {&(0x7f0000008680)=""/23, 0x17}, {&(0x7f00000086c0)=""/38, 0x26}], 0x3}, 0x8000) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x6, 0x2, 0x2e15579, 0x3f, 0x1, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffffff, 0x0, 0x5}, 0x3c) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0xb, [], 0x0, 0xc, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r7}, 0x7e) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r8, &(0x7f0000000000)=ANY=[], 0x50c000) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x18, 0x38, &(0x7f0000000a00)=ANY=[@ANYBLOB="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", @ANYRES32=r6, @ANYBLOB="00000000000000000c72c0fff6ffffff850000005b0000009500000000000000"], &(0x7f0000000040)='GPL\x00', 0x3ff, 0xd5, &(0x7f0000000080)=""/213, 0x61800, 0xab6c50112a8dd52c, [], 0x0, 0x16, 0xffffffffffffffff, 0x8, &(0x7f0000000180)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000001c0)={0x2, 0x6, 0x6, 0x5}, 0x10, 0x0, r8}, 0x78) bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x11, 0x5, 0x81, 0x2, 0x100, r5, 0x3, [], 0x0, 0xffffffffffffffff, 0x4, 0x3}, 0x3c) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r9, &(0x7f0000000200), 0x806000) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, r4, 0x0, 0x2a8, &(0x7f0000000440)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\a\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83CZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x98\x86\"R\x06\x00\x00\x00\x00\x00\x00\x00\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&\x014\x01\xf4\xb7\x83\x9a\xfa*\xa6\x06\xb7Pk7N\xc2\xd9\xee\xd0\xb0M\x00\xab\xc3\t\fc\xd8dx\xd5\x1dU*s)\x12[\x14\xb1\xc0\xd7\x1a\xa0\x16\xa2z\x9e\x93 \xddeF>29\v\x02\xa2b\x13R\xef\xffA,\xb9.$\xfa\x9f\xde[\x80\xd1=\xce\x1b\xeb\xf6\xf4\xe3z\x1f\x9dz\xa3\xc0\xe2\xa2\xb1\xeeq\xf5\xec0\x8e\xf4\xfb\xd9\x87\xf03\xdb\xae|\x10&V5c\xa6\xce\xcd\x8a\xdf\xe1\x89\"\xea\xde\xe7\xa3\xbe\xe7\xff\xf9 \x11\xfdY\xc6\xa1\xe8\xda\v\\?\xcb\x87\bn\x9b\x01\x1f\xf8\xe8\x1eV\xfaC\xdf\xc3Vv\x9b\x1a\xfc\x14.c\x94\xc9=\xb0\x0f!d\b\x18*@m\x7f\xaal\x17G\xd6?\x81\x16P\x03\x10e\xc3\xcd\xb1B\xeb\x01B\\\x91A\xa1\x8an\xb4#\xadr\x1e\x81v\xa2\x0e6x\xca\x8b\xa6\xd8\x81\x10:\x0e(\xdd\xfc\xc9\xc6\xb4\xf0\'f:\xbd\xfe\x11\xf8\xc8W\x81s^\xd9W\xf1\x94\xaf\xc5\x8a\xb4f\x1b\x17E\xb23\x12\xb0\xeb\xef\x8c\xb24h\xd7}\x7f\x92Hgej\x957\xe2A'}, 0x30) 03:43:34 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x238) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) writev(r0, &(0x7f0000000540)=[{&(0x7f0000000140)="cedbddea5b67f4290aa7fd7c0cc7e2e613891a59fd3dc2e8a3c6e7c9fa96", 0x1e}, {&(0x7f0000000340)="e4bc7c957b83ba155edae525e00f76c76056ac3fe8a5de5ccfba604ac6b0d4a0fd42802b43143a32d703bd21baddda61ba1cb78758f519c19a06193e8bfc0d1f1fad3be6885359773264bd153a2bf50591662cca307c7a22f8a9e70629a1beac22b823bfee7fec832958c20007e0b8707c6ac0e8b1", 0x75}, {&(0x7f00000004c0)="4b8043af3b13f04c3ee02ee028e584b538cfb06be329d5ca0649880187b5cd5ff601bf73", 0x24}, {0x0}], 0x4) sendto$inet(r0, &(0x7f00000012c0)="0c268a927f1f6588b967481241ba7860005cf65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95425a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x27) 03:43:34 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x238) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) writev(r0, &(0x7f0000000540)=[{&(0x7f0000000140)="cedbddea5b67f4290aa7fd7c0cc7e2e613891a59fd3dc2e8a3c6e7c9fa96", 0x1e}, {&(0x7f0000000340)="e4bc7c957b83ba155edae525e00f76c76056ac3fe8a5de5ccfba604ac6b0d4a0fd42802b43143a32d703bd21baddda61ba1cb78758f519c19a06193e8bfc0d1f1fad3be6885359773264bd153a2bf50591662cca307c7a22", 0x58}, {0x0}], 0x3) sendto$inet(r0, &(0x7f00000012c0)="0c268a927f1f6588b967481241ba7860005cf65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95425a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x27) 03:43:34 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x0, &(0x7f0000000400)}, 0x10) [ 693.429104][T28266] IPVS: ftp: loaded support on port[0] = 21 03:43:34 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000fe1000)={0x5, 0x83, 0x80, 0xf}, 0x1c) bpf$PROG_LOAD(0x5, 0x0, 0x0) 03:43:34 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x400007) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0x32600) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xb4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000040)='cpuset') write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000700)=ANY=[@ANYBLOB="006d176df3384ed3ddbcf3be0e26fd017529253262b78ee8b9d470"], 0x1b) ioctl$TUNSETCARRIER(0xffffffffffffffff, 0x400454e2, &(0x7f0000000080)=0x1) write$cgroup_int(r0, &(0x7f0000000380), 0x12) write$cgroup_int(r1, &(0x7f0000000400), 0xd) r2 = gettid() write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000000)=r2, 0x12) r3 = socket$kcm(0x2b, 0x0, 0x0) socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r3, 0x0, 0x0) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000280)=r2, 0x12) r4 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) close(r5) write$cgroup_type(r5, &(0x7f0000000080)='threaded\x00', 0xfffffc61) r6 = bpf$MAP_CREATE(0x2, &(0x7f0000009280), 0x3c) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x17, 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB], &(0x7f0000000200)='syzkaller\x00', 0xfa1, 0x0, 0x0, 0x41100, 0x2, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, &(0x7f0000000240), 0x8, 0x10, 0x0}, 0x78) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000008740)={0x0, 0x0, &(0x7f0000008700)=[{0x0}, {&(0x7f0000008680)=""/23, 0x17}, {&(0x7f00000086c0)=""/38, 0x26}], 0x3}, 0x8000) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x6, 0x2, 0x2e15579, 0x3f, 0x1, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffffff, 0x0, 0x5}, 0x3c) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0xb, [], 0x0, 0xc, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r7}, 0x7e) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r8, &(0x7f0000000000)=ANY=[], 0x50c000) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x18, 0x38, &(0x7f0000000a00)=ANY=[@ANYBLOB="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", @ANYRES32=r6, @ANYBLOB="00000000000000000c72c0fff6ffffff850000005b0000009500000000000000"], &(0x7f0000000040)='GPL\x00', 0x3ff, 0xd5, &(0x7f0000000080)=""/213, 0x61800, 0xab6c50112a8dd52c, [], 0x0, 0x16, 0xffffffffffffffff, 0x8, &(0x7f0000000180)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000001c0)={0x2, 0x6, 0x6, 0x5}, 0x10, 0x0, r8}, 0x78) bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x11, 0x5, 0x81, 0x2, 0x100, r5, 0x3, [], 0x0, 0xffffffffffffffff, 0x4, 0x3}, 0x3c) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r9, &(0x7f0000000200), 0x806000) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, r4, 0x0, 0x2a8, &(0x7f0000000440)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\a\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83CZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x98\x86\"R\x06\x00\x00\x00\x00\x00\x00\x00\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&\x014\x01\xf4\xb7\x83\x9a\xfa*\xa6\x06\xb7Pk7N\xc2\xd9\xee\xd0\xb0M\x00\xab\xc3\t\fc\xd8dx\xd5\x1dU*s)\x12[\x14\xb1\xc0\xd7\x1a\xa0\x16\xa2z\x9e\x93 \xddeF>29\v\x02\xa2b\x13R\xef\xffA,\xb9.$\xfa\x9f\xde[\x80\xd1=\xce\x1b\xeb\xf6\xf4\xe3z\x1f\x9dz\xa3\xc0\xe2\xa2\xb1\xeeq\xf5\xec0\x8e\xf4\xfb\xd9\x87\xf03\xdb\xae|\x10&V5c\xa6\xce\xcd\x8a\xdf\xe1\x89\"\xea\xde\xe7\xa3\xbe\xe7\xff\xf9 \x11\xfdY\xc6\xa1\xe8\xda\v\\?\xcb\x87\bn\x9b\x01\x1f\xf8\xe8\x1eV\xfaC\xdf\xc3Vv\x9b\x1a\xfc\x14.c\x94\xc9=\xb0\x0f!d\b\x18*@m\x7f\xaal\x17G\xd6?\x81\x16P\x03\x10e\xc3\xcd\xb1B\xeb\x01B\\\x91A\xa1\x8an\xb4#\xadr\x1e\x81v\xa2\x0e6x\xca\x8b\xa6\xd8\x81\x10:\x0e(\xdd\xfc\xc9\xc6\xb4\xf0\'f:\xbd\xfe\x11\xf8\xc8W\x81s^\xd9W\xf1\x94\xaf\xc5\x8a\xb4f\x1b\x17E\xb23\x12\xb0\xeb\xef\x8c\xb24h\xd7}\x7f\x92Hgej\x957\xe2A'}, 0x30) 03:43:34 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x0, &(0x7f0000000400)}, 0x10) 03:43:34 executing program 5: openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) ioctl$RNDADDENTROPY(0xffffffffffffffff, 0x40085203, &(0x7f0000000100)={0x6, 0xb7, "56f80f8d7c9ad684157765ee68815e033b7b2972a2d067318db9ac518603e0dbae813e160bd3f15b30c226056579cf64ac2525dd44c15e56204f1e3f1b8c03b31f4281605682d4b39a61b89636b3a2a5ea0bd3f5e8bd40d8c0406969d18fed78e4f4108902b5959ec383c40036f5262e703d6ad6a7a486302c382e45645bfe4c472249b482a28e9519e744cdbe884985d913612a17250eab7e4f0bf4b35aab9f7b923116a8d30baf612ca3bc2ef9b3f8d1c6b570cb60bd"}) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_sctp(0x2, 0x5, 0x84) dup3(0xffffffffffffffff, r0, 0x0) socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp_SCTP_AUTH_DEACTIVATE_KEY(0xffffffffffffffff, 0x84, 0x23, 0x0, 0x0) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f00000000c0)={0x51, 0xfffc, 0x0, {0x103, 0xf1}, {0x9}, @ramp={0x2, 0x3, {0x7fff, 0x0, 0x7, 0x7}}}) r1 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r1, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @bcast, @rose, @rose, @null]}, 0x48) listen(r1, 0x0) unshare(0x40000000) r2 = accept(r1, 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r3, 0xffffffffffffffff) write$binfmt_elf64(r2, &(0x7f00000002c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}], "", [[], []]}, 0x278) 03:43:34 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000fe1000)={0x5, 0x83, 0x80, 0xf}, 0x1c) bpf$PROG_LOAD(0x5, 0x0, 0x0) 03:43:34 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x238) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) writev(r0, &(0x7f0000000540)=[{&(0x7f0000000140)="cedbddea5b67f4290aa7fd7c0cc7e2e613891a59fd3dc2e8a3c6e7c9fa96", 0x1e}, {&(0x7f0000000340)="e4bc7c957b83ba155edae525e00f76c76056ac3fe8a5de5ccfba604ac6b0d4a0fd42802b43143a32d703bd21baddda61ba1cb78758f519c19a06193e8bfc0d1f1fad3be6885359773264bd153a2bf50591662cca307c7a22f8a9e70629a1beac22b823bfee7fec832958c20007e0b8707c6ac0e8b1", 0x75}, {&(0x7f00000004c0)="4b8043af3b13f04c3ee02ee028e584b538cfb06be329d5ca0649880187b5cd5ff601bf73", 0x24}, {&(0x7f0000000800)}], 0x4) sendto$inet(r0, &(0x7f00000012c0)="0c268a927f1f6588b967481241ba7860005cf65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95425a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x27) 03:43:35 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x238) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) writev(r0, &(0x7f0000000540)=[{&(0x7f0000000140)="cedbddea5b67f4290aa7fd7c0cc7e2e613891a59fd3dc2e8a3c6e7c9fa96", 0x1e}, {&(0x7f0000000340)="e4bc7c957b83ba155edae525e00f76c76056ac3fe8a5de5ccfba604ac6b0d4a0fd42802b43143a32d703bd21baddda61ba1cb78758f519c19a06193e8bfc0d1f1fad3be6885359773264bd153a2bf50591662cca307c7a22", 0x58}, {0x0}], 0x3) sendto$inet(r0, &(0x7f00000012c0)="0c268a927f1f6588b967481241ba7860005cf65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95425a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x27) 03:43:35 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x0, 0x0, 0x0, 0xe8}]}, 0x10) [ 694.094111][T28298] IPVS: ftp: loaded support on port[0] = 21 03:43:35 executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000fe1000)={0x5, 0x83, 0x80, 0xf}, 0x1c) bpf$PROG_LOAD(0x5, &(0x7f0000fed000)={0x0, 0x9, &(0x7f00000000c0)=@framed={{}, [@map={0x18, 0x0, 0x1, 0x0, r0}, @map, @map]}, &(0x7f0000919ff6)='syzkaller\x00', 0x0, 0xe1, &(0x7f0000000000)=""/225}, 0x14) 03:43:35 executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000fe1000)={0x5, 0x83, 0x80, 0xf}, 0x1c) bpf$PROG_LOAD(0x5, &(0x7f0000fed000)={0x0, 0x9, &(0x7f00000000c0)=@framed={{}, [@map={0x18, 0x0, 0x1, 0x0, r0}, @map, @map]}, &(0x7f0000919ff6)='syzkaller\x00', 0x0, 0xe1, &(0x7f0000000000)=""/225}, 0x14) 03:43:35 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x400007) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0x32600) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xb4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000040)='cpuset') write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000700)=ANY=[@ANYBLOB="006d176df3384ed3ddbcf3be0e26fd017529253262b78ee8b9d470"], 0x1b) ioctl$TUNSETCARRIER(0xffffffffffffffff, 0x400454e2, &(0x7f0000000080)=0x1) write$cgroup_int(r0, &(0x7f0000000380), 0x12) write$cgroup_int(r1, &(0x7f0000000400), 0xd) r2 = gettid() write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000000)=r2, 0x12) r3 = socket$kcm(0x2b, 0x0, 0x0) socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r3, 0x0, 0x0) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000280)=r2, 0x12) r4 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) close(r5) write$cgroup_type(r5, &(0x7f0000000080)='threaded\x00', 0xfffffc61) r6 = bpf$MAP_CREATE(0x2, &(0x7f0000009280), 0x3c) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x17, 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB], &(0x7f0000000200)='syzkaller\x00', 0xfa1, 0x0, 0x0, 0x41100, 0x2, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, &(0x7f0000000240), 0x8, 0x10, 0x0}, 0x78) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000008740)={0x0, 0x0, &(0x7f0000008700)=[{0x0}, {&(0x7f0000008680)=""/23, 0x17}, {&(0x7f00000086c0)=""/38, 0x26}], 0x3}, 0x8000) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x6, 0x2, 0x2e15579, 0x3f, 0x1, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffffff, 0x0, 0x5}, 0x3c) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0xb, [], 0x0, 0xc, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r7}, 0x7e) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r8, &(0x7f0000000000)=ANY=[], 0x50c000) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x18, 0x38, &(0x7f0000000a00)=ANY=[@ANYBLOB="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", @ANYRES32=r6, @ANYBLOB="00000000000000000c72c0fff6ffffff850000005b0000009500000000000000"], &(0x7f0000000040)='GPL\x00', 0x3ff, 0xd5, &(0x7f0000000080)=""/213, 0x61800, 0xab6c50112a8dd52c, [], 0x0, 0x16, 0xffffffffffffffff, 0x8, &(0x7f0000000180)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000001c0)={0x2, 0x6, 0x6, 0x5}, 0x10, 0x0, r8}, 0x78) bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x11, 0x5, 0x81, 0x2, 0x100, r5, 0x3, [], 0x0, 0xffffffffffffffff, 0x4, 0x3}, 0x3c) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r9, &(0x7f0000000200), 0x806000) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, r4, 0x0, 0x2a8, &(0x7f0000000440)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\a\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83CZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x98\x86\"R\x06\x00\x00\x00\x00\x00\x00\x00\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&\x014\x01\xf4\xb7\x83\x9a\xfa*\xa6\x06\xb7Pk7N\xc2\xd9\xee\xd0\xb0M\x00\xab\xc3\t\fc\xd8dx\xd5\x1dU*s)\x12[\x14\xb1\xc0\xd7\x1a\xa0\x16\xa2z\x9e\x93 \xddeF>29\v\x02\xa2b\x13R\xef\xffA,\xb9.$\xfa\x9f\xde[\x80\xd1=\xce\x1b\xeb\xf6\xf4\xe3z\x1f\x9dz\xa3\xc0\xe2\xa2\xb1\xeeq\xf5\xec0\x8e\xf4\xfb\xd9\x87\xf03\xdb\xae|\x10&V5c\xa6\xce\xcd\x8a\xdf\xe1\x89\"\xea\xde\xe7\xa3\xbe\xe7\xff\xf9 \x11\xfdY\xc6\xa1\xe8\xda\v\\?\xcb\x87\bn\x9b\x01\x1f\xf8\xe8\x1eV\xfaC\xdf\xc3Vv\x9b\x1a\xfc\x14.c\x94\xc9=\xb0\x0f!d\b\x18*@m\x7f\xaal\x17G\xd6?\x81\x16P\x03\x10e\xc3\xcd\xb1B\xeb\x01B\\\x91A\xa1\x8an\xb4#\xadr\x1e\x81v\xa2\x0e6x\xca\x8b\xa6\xd8\x81\x10:\x0e(\xdd\xfc\xc9\xc6\xb4\xf0\'f:\xbd\xfe\x11\xf8\xc8W\x81s^\xd9W\xf1\x94\xaf\xc5\x8a\xb4f\x1b\x17E\xb23\x12\xb0\xeb\xef\x8c\xb24h\xd7}\x7f\x92Hgej\x957\xe2A'}, 0x30) 03:43:35 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x0, 0x0, 0x0, 0xe8}]}, 0x10) 03:43:35 executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000fe1000)={0x5, 0x83, 0x80, 0xf}, 0x1c) bpf$PROG_LOAD(0x5, &(0x7f0000fed000)={0x0, 0x9, &(0x7f00000000c0)=@framed={{}, [@map={0x18, 0x0, 0x1, 0x0, r0}, @map, @map]}, &(0x7f0000919ff6)='syzkaller\x00', 0x0, 0xe1, &(0x7f0000000000)=""/225}, 0x14) 03:43:35 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x238) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) writev(r0, &(0x7f0000000540)=[{&(0x7f0000000140)="cedbddea5b67f4290aa7fd7c0cc7e2e613891a59fd3dc2e8a3c6e7c9fa96", 0x1e}, {&(0x7f0000000340)="e4bc7c957b83ba155edae525e00f76c76056ac3fe8a5de5ccfba604ac6b0d4a0fd42802b43143a32d703bd21baddda61ba1cb78758f519c19a06193e8bfc0d1f1fad3be6885359773264bd153a2bf50591662cca307c7a22f8a9e70629a1beac22b823bfee7fec", 0x67}, {0x0}], 0x3) sendto$inet(r0, &(0x7f00000012c0)="0c268a927f1f6588b967481241ba7860005cf65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95425a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x27) 03:43:35 executing program 5: openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) ioctl$RNDADDENTROPY(0xffffffffffffffff, 0x40085203, &(0x7f0000000100)={0x6, 0xb7, "56f80f8d7c9ad684157765ee68815e033b7b2972a2d067318db9ac518603e0dbae813e160bd3f15b30c226056579cf64ac2525dd44c15e56204f1e3f1b8c03b31f4281605682d4b39a61b89636b3a2a5ea0bd3f5e8bd40d8c0406969d18fed78e4f4108902b5959ec383c40036f5262e703d6ad6a7a486302c382e45645bfe4c472249b482a28e9519e744cdbe884985d913612a17250eab7e4f0bf4b35aab9f7b923116a8d30baf612ca3bc2ef9b3f8d1c6b570cb60bd"}) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_sctp(0x2, 0x5, 0x84) dup3(0xffffffffffffffff, r0, 0x0) socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp_SCTP_AUTH_DEACTIVATE_KEY(0xffffffffffffffff, 0x84, 0x23, 0x0, 0x0) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f00000000c0)={0x51, 0xfffc, 0x0, {0x103, 0xf1}, {0x9}, @ramp={0x2, 0x3, {0x7fff, 0x0, 0x7, 0x7}}}) r1 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r1, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @bcast, @rose, @rose, @null]}, 0x48) listen(r1, 0x0) unshare(0x40000000) r2 = accept(r1, 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r3, 0xffffffffffffffff) write$binfmt_elf64(r2, &(0x7f00000002c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}], "", [[], []]}, 0x278) 03:43:35 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x0, 0x0, 0x0, 0xe8}]}, 0x10) 03:43:35 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x400007) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0x32600) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xb4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000040)='cpuset') write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000700)=ANY=[@ANYBLOB="006d176df3384ed3ddbcf3be0e26fd017529253262b78ee8b9d470"], 0x1b) ioctl$TUNSETCARRIER(0xffffffffffffffff, 0x400454e2, &(0x7f0000000080)=0x1) write$cgroup_int(r0, &(0x7f0000000380), 0x12) write$cgroup_int(r1, &(0x7f0000000400), 0xd) r2 = gettid() write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000000)=r2, 0x12) r3 = socket$kcm(0x2b, 0x0, 0x0) socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r3, 0x0, 0x0) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000280)=r2, 0x12) r4 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) close(r5) write$cgroup_type(r5, &(0x7f0000000080)='threaded\x00', 0xfffffc61) r6 = bpf$MAP_CREATE(0x2, &(0x7f0000009280), 0x3c) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x17, 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB], &(0x7f0000000200)='syzkaller\x00', 0xfa1, 0x0, 0x0, 0x41100, 0x2, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, &(0x7f0000000240), 0x8, 0x10, 0x0}, 0x78) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000008740)={0x0, 0x0, &(0x7f0000008700)=[{0x0}, {&(0x7f0000008680)=""/23, 0x17}, {&(0x7f00000086c0)=""/38, 0x26}], 0x3}, 0x8000) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x6, 0x2, 0x2e15579, 0x3f, 0x1, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffffff, 0x0, 0x5}, 0x3c) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0xb, [], 0x0, 0xc, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r7}, 0x7e) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r8, &(0x7f0000000000)=ANY=[], 0x50c000) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x18, 0x40, &(0x7f0000000a00)=ANY=[@ANYBLOB="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", @ANYRES32=r6, @ANYBLOB="00000000000000000c72c0fff6ffffff850000005b0000009500000000000000"], &(0x7f0000000040)='GPL\x00', 0x3ff, 0xd5, &(0x7f0000000080)=""/213, 0x61800, 0xab6c50112a8dd52c, [], 0x0, 0x16, 0xffffffffffffffff, 0x8, &(0x7f0000000180)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000001c0)={0x2, 0x6, 0x6, 0x5}, 0x10, 0x0, r8}, 0x78) bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x11, 0x5, 0x81, 0x2, 0x100, r5, 0x3, [], 0x0, 0xffffffffffffffff, 0x4, 0x3}, 0x3c) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r9, &(0x7f0000000200), 0x806000) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, r4, 0x0, 0x2a8, &(0x7f0000000440)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\a\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83CZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x98\x86\"R\x06\x00\x00\x00\x00\x00\x00\x00\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&\x014\x01\xf4\xb7\x83\x9a\xfa*\xa6\x06\xb7Pk7N\xc2\xd9\xee\xd0\xb0M\x00\xab\xc3\t\fc\xd8dx\xd5\x1dU*s)\x12[\x14\xb1\xc0\xd7\x1a\xa0\x16\xa2z\x9e\x93 \xddeF>29\v\x02\xa2b\x13R\xef\xffA,\xb9.$\xfa\x9f\xde[\x80\xd1=\xce\x1b\xeb\xf6\xf4\xe3z\x1f\x9dz\xa3\xc0\xe2\xa2\xb1\xeeq\xf5\xec0\x8e\xf4\xfb\xd9\x87\xf03\xdb\xae|\x10&V5c\xa6\xce\xcd\x8a\xdf\xe1\x89\"\xea\xde\xe7\xa3\xbe\xe7\xff\xf9 \x11\xfdY\xc6\xa1\xe8\xda\v\\?\xcb\x87\bn\x9b\x01\x1f\xf8\xe8\x1eV\xfaC\xdf\xc3Vv\x9b\x1a\xfc\x14.c\x94\xc9=\xb0\x0f!d\b\x18*@m\x7f\xaal\x17G\xd6?\x81\x16P\x03\x10e\xc3\xcd\xb1B\xeb\x01B\\\x91A\xa1\x8an\xb4#\xadr\x1e\x81v\xa2\x0e6x\xca\x8b\xa6\xd8\x81\x10:\x0e(\xdd\xfc\xc9\xc6\xb4\xf0\'f:\xbd\xfe\x11\xf8\xc8W\x81s^\xd9W\xf1\x94\xaf\xc5\x8a\xb4f\x1b\x17E\xb23\x12\xb0\xeb\xef\x8c\xb24h\xd7}\x7f\x92Hgej\x957\xe2A'}, 0x30) 03:43:35 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x238) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) writev(r0, &(0x7f0000000540)=[{&(0x7f0000000140)="cedbddea5b67f4290aa7fd7c0cc7e2e613891a59fd3dc2e8a3c6e7c9fa96", 0x1e}, {&(0x7f0000000340)="e4bc7c957b83ba155edae525e00f76c76056ac3fe8a5de5ccfba604ac6b0d4a0fd42802b43143a32d703bd21baddda61ba1cb78758f519c19a06193e8bfc0d1f1fad3be6885359773264bd153a2bf50591662cca307c7a22f8a9e70629a1beac22b823bfee7fec832958c20007e0b8707c6ac0e8b1", 0x75}, {&(0x7f00000004c0)="4b8043af3b13f04c3ee02ee028e584b538cfb06be329d5ca0649880187b5cd5ff601bf73", 0x24}, {&(0x7f0000000800)}], 0x4) sendto$inet(r0, &(0x7f00000012c0)="0c268a927f1f6588b967481241ba7860005cf65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95425a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x27) 03:43:35 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000fe1000)={0x5, 0x83, 0x80, 0xf}, 0x1c) bpf$PROG_LOAD(0x5, &(0x7f0000fed000)={0x7, 0x0, 0x0, &(0x7f0000919ff6)='syzkaller\x00', 0x0, 0xe1, &(0x7f0000000000)=""/225, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) [ 695.012635][T28341] IPVS: ftp: loaded support on port[0] = 21 03:43:36 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6}]}, 0x10) 03:43:36 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000fe1000)={0x5, 0x83, 0x80, 0xf}, 0x1c) bpf$PROG_LOAD(0x5, &(0x7f0000fed000)={0x7, 0x0, 0x0, &(0x7f0000919ff6)='syzkaller\x00', 0x0, 0xe1, &(0x7f0000000000)=""/225, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) 03:43:36 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x400007) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0x32600) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xb4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000040)='cpuset') write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000700)=ANY=[@ANYBLOB="006d176df3384ed3ddbcf3be0e26fd017529253262b78ee8b9d470"], 0x1b) ioctl$TUNSETCARRIER(0xffffffffffffffff, 0x400454e2, &(0x7f0000000080)=0x1) write$cgroup_int(r0, &(0x7f0000000380), 0x12) write$cgroup_int(r1, &(0x7f0000000400), 0xd) r2 = gettid() write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000000)=r2, 0x12) r3 = socket$kcm(0x2b, 0x0, 0x0) socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r3, 0x0, 0x0) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000280)=r2, 0x12) r4 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) close(r5) write$cgroup_type(r5, &(0x7f0000000080)='threaded\x00', 0xfffffc61) r6 = bpf$MAP_CREATE(0x2, &(0x7f0000009280), 0x3c) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x17, 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB], &(0x7f0000000200)='syzkaller\x00', 0xfa1, 0x0, 0x0, 0x41100, 0x2, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, &(0x7f0000000240), 0x8, 0x10, 0x0}, 0x78) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000008740)={0x0, 0x0, &(0x7f0000008700)=[{0x0}, {&(0x7f0000008680)=""/23, 0x17}, {&(0x7f00000086c0)=""/38, 0x26}], 0x3}, 0x8000) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x6, 0x2, 0x2e15579, 0x3f, 0x1, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffffff, 0x0, 0x5}, 0x3c) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0xb, [], 0x0, 0xc, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r7}, 0x7e) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r8, &(0x7f0000000000)=ANY=[], 0x50c000) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x18, 0x40, &(0x7f0000000a00)=ANY=[@ANYBLOB="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", @ANYRES32=r6, @ANYBLOB="00000000000000000c72c0fff6ffffff850000005b0000009500000000000000"], &(0x7f0000000040)='GPL\x00', 0x3ff, 0xd5, &(0x7f0000000080)=""/213, 0x61800, 0xab6c50112a8dd52c, [], 0x0, 0x16, 0xffffffffffffffff, 0x8, &(0x7f0000000180)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000001c0)={0x2, 0x6, 0x6, 0x5}, 0x10, 0x0, r8}, 0x78) bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x11, 0x5, 0x81, 0x2, 0x100, r5, 0x3, [], 0x0, 0xffffffffffffffff, 0x4, 0x3}, 0x3c) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r9, &(0x7f0000000200), 0x806000) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, r4, 0x0, 0x2a8, &(0x7f0000000440)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\a\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83CZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x98\x86\"R\x06\x00\x00\x00\x00\x00\x00\x00\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&\x014\x01\xf4\xb7\x83\x9a\xfa*\xa6\x06\xb7Pk7N\xc2\xd9\xee\xd0\xb0M\x00\xab\xc3\t\fc\xd8dx\xd5\x1dU*s)\x12[\x14\xb1\xc0\xd7\x1a\xa0\x16\xa2z\x9e\x93 \xddeF>29\v\x02\xa2b\x13R\xef\xffA,\xb9.$\xfa\x9f\xde[\x80\xd1=\xce\x1b\xeb\xf6\xf4\xe3z\x1f\x9dz\xa3\xc0\xe2\xa2\xb1\xeeq\xf5\xec0\x8e\xf4\xfb\xd9\x87\xf03\xdb\xae|\x10&V5c\xa6\xce\xcd\x8a\xdf\xe1\x89\"\xea\xde\xe7\xa3\xbe\xe7\xff\xf9 \x11\xfdY\xc6\xa1\xe8\xda\v\\?\xcb\x87\bn\x9b\x01\x1f\xf8\xe8\x1eV\xfaC\xdf\xc3Vv\x9b\x1a\xfc\x14.c\x94\xc9=\xb0\x0f!d\b\x18*@m\x7f\xaal\x17G\xd6?\x81\x16P\x03\x10e\xc3\xcd\xb1B\xeb\x01B\\\x91A\xa1\x8an\xb4#\xadr\x1e\x81v\xa2\x0e6x\xca\x8b\xa6\xd8\x81\x10:\x0e(\xdd\xfc\xc9\xc6\xb4\xf0\'f:\xbd\xfe\x11\xf8\xc8W\x81s^\xd9W\xf1\x94\xaf\xc5\x8a\xb4f\x1b\x17E\xb23\x12\xb0\xeb\xef\x8c\xb24h\xd7}\x7f\x92Hgej\x957\xe2A'}, 0x30) 03:43:36 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000fe1000)={0x5, 0x83, 0x80, 0xf}, 0x1c) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000fed000)={0x7, 0x9, &(0x7f00000000c0)=@framed={{}, [@map={0x18, 0x0, 0x1, 0x0, r0}, @map, @map]}, &(0x7f0000919ff6)='syzkaller\x00', 0x0, 0xe1, &(0x7f0000000000)=""/225}, 0x14) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) 03:43:36 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x238) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) writev(r0, &(0x7f0000000540)=[{&(0x7f0000000140)="cedbddea5b67f4290aa7fd7c0cc7e2e613891a59fd3dc2e8a3c6e7c9fa96", 0x1e}, {&(0x7f0000000340)="e4bc7c957b83ba155edae525e00f76c76056ac3fe8a5de5ccfba604ac6b0d4a0fd42802b43143a32d703bd21baddda61ba1cb78758f519c19a06193e8bfc0d1f1fad3be6885359773264bd153a2bf50591662cca307c7a22f8a9e70629a1beac22b823bfee7fec", 0x67}, {0x0}], 0x3) sendto$inet(r0, &(0x7f00000012c0)="0c268a927f1f6588b967481241ba7860005cf65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95425a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x27) 03:43:36 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000fe1000)={0x5, 0x83, 0x80, 0xf}, 0x1c) bpf$PROG_LOAD(0x5, &(0x7f0000fed000)={0x7, 0x0, 0x0, &(0x7f0000919ff6)='syzkaller\x00', 0x0, 0xe1, &(0x7f0000000000)=""/225, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) 03:43:36 executing program 5: openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) ioctl$RNDADDENTROPY(0xffffffffffffffff, 0x40085203, &(0x7f0000000100)={0x6, 0xba, "56f80f8d7c9ad684157765ee68815e033b7b2972a2d067318db9ac518603e0dbae813e160bd3f15b30c226056579cf64ac2525dd44c15e56204f1e3f1b8c03b31f4281605682d4b39a61b89636b3a2a5ea0bd3f5e8bd40d8c0406969d18fed78e4f4108902b5959ec383c40036f5262e703d6ad6a7a486302c382e45645bfe4c472249b482a28e9519e744cdbe884985d913612a17250eab7e4f0bf4b35aab9f7b923116a8d30baf612ca3bc2ef9b3f8d1c6b570cb60bd8d5b68"}) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_sctp(0x2, 0x5, 0x84) dup3(0xffffffffffffffff, r0, 0x0) socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp_SCTP_AUTH_DEACTIVATE_KEY(0xffffffffffffffff, 0x84, 0x23, 0x0, 0x0) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f00000000c0)={0x51, 0xfffc, 0x0, {0x103, 0xf1}, {0x9}, @ramp={0x2, 0x3, {0x7fff, 0x0, 0x7, 0x7}}}) r1 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r1, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @bcast, @rose, @rose, @null]}, 0x48) listen(r1, 0x0) unshare(0x40000000) r2 = accept(r1, 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r3, 0xffffffffffffffff) write$binfmt_elf64(r2, &(0x7f00000002c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}], "", [[], []]}, 0x278) 03:43:36 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000fe1000)={0x5, 0x83, 0x80, 0xf}, 0x1c) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000fed000)={0x7, 0x9, &(0x7f00000000c0)=@framed={{}, [@map={0x18, 0x0, 0x1, 0x0, r0}, @map, @map]}, &(0x7f0000919ff6)='syzkaller\x00', 0x0, 0xe1, &(0x7f0000000000)=""/225}, 0x14) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) 03:43:36 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x238) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) writev(r0, &(0x7f0000000540)=[{&(0x7f0000000140)="cedbddea5b67f4290aa7fd7c0cc7e2e613891a59fd3dc2e8a3c6e7c9fa96", 0x1e}, {&(0x7f0000000340)="e4bc7c957b83ba155edae525e00f76c76056ac3fe8a5de5ccfba604ac6b0d4a0fd42802b43143a32d703bd21baddda61ba1cb78758f519c19a06193e8bfc0d1f1fad3be6885359773264bd153a2bf50591662cca307c7a22f8a9e70629a1beac22b823bfee7fec832958c20007e0b8707c6ac0e8b1", 0x75}, {&(0x7f00000004c0)="4b8043af3b13f04c3ee02ee028e584b538cfb06be329d5ca0649880187b5cd5ff601bf73", 0x24}, {&(0x7f0000000800)}], 0x4) sendto$inet(r0, &(0x7f00000012c0)="0c268a927f1f6588b967481241ba7860005cf65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95425a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x27) 03:43:36 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x400007) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0x32600) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xb4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000040)='cpuset') write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000700)=ANY=[@ANYBLOB="006d176df3384ed3ddbcf3be0e26fd017529253262b78ee8b9d470"], 0x1b) ioctl$TUNSETCARRIER(0xffffffffffffffff, 0x400454e2, &(0x7f0000000080)=0x1) write$cgroup_int(r0, &(0x7f0000000380), 0x12) write$cgroup_int(r1, &(0x7f0000000400), 0xd) r2 = gettid() write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000000)=r2, 0x12) r3 = socket$kcm(0x2b, 0x0, 0x0) socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r3, 0x0, 0x0) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000280)=r2, 0x12) r4 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) close(r5) write$cgroup_type(r5, &(0x7f0000000080)='threaded\x00', 0xfffffc61) r6 = bpf$MAP_CREATE(0x2, &(0x7f0000009280), 0x3c) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x17, 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB], &(0x7f0000000200)='syzkaller\x00', 0xfa1, 0x0, 0x0, 0x41100, 0x2, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, &(0x7f0000000240), 0x8, 0x10, 0x0}, 0x78) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000008740)={0x0, 0x0, &(0x7f0000008700)=[{0x0}, {&(0x7f0000008680)=""/23, 0x17}, {&(0x7f00000086c0)=""/38, 0x26}], 0x3}, 0x8000) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x6, 0x2, 0x2e15579, 0x3f, 0x1, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffffff, 0x0, 0x5}, 0x3c) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0xb, [], 0x0, 0xc, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r7}, 0x7e) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r8, &(0x7f0000000000)=ANY=[], 0x50c000) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x18, 0x40, &(0x7f0000000a00)=ANY=[@ANYBLOB="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", @ANYRES32=r6, @ANYBLOB="00000000000000000c72c0fff6ffffff850000005b0000009500000000000000"], &(0x7f0000000040)='GPL\x00', 0x3ff, 0xd5, &(0x7f0000000080)=""/213, 0x61800, 0xab6c50112a8dd52c, [], 0x0, 0x16, 0xffffffffffffffff, 0x8, &(0x7f0000000180)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000001c0)={0x2, 0x6, 0x6, 0x5}, 0x10, 0x0, r8}, 0x78) bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x11, 0x5, 0x81, 0x2, 0x100, r5, 0x3, [], 0x0, 0xffffffffffffffff, 0x4, 0x3}, 0x3c) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r9, &(0x7f0000000200), 0x806000) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, r4, 0x0, 0x2a8, &(0x7f0000000440)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\a\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83CZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x98\x86\"R\x06\x00\x00\x00\x00\x00\x00\x00\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&\x014\x01\xf4\xb7\x83\x9a\xfa*\xa6\x06\xb7Pk7N\xc2\xd9\xee\xd0\xb0M\x00\xab\xc3\t\fc\xd8dx\xd5\x1dU*s)\x12[\x14\xb1\xc0\xd7\x1a\xa0\x16\xa2z\x9e\x93 \xddeF>29\v\x02\xa2b\x13R\xef\xffA,\xb9.$\xfa\x9f\xde[\x80\xd1=\xce\x1b\xeb\xf6\xf4\xe3z\x1f\x9dz\xa3\xc0\xe2\xa2\xb1\xeeq\xf5\xec0\x8e\xf4\xfb\xd9\x87\xf03\xdb\xae|\x10&V5c\xa6\xce\xcd\x8a\xdf\xe1\x89\"\xea\xde\xe7\xa3\xbe\xe7\xff\xf9 \x11\xfdY\xc6\xa1\xe8\xda\v\\?\xcb\x87\bn\x9b\x01\x1f\xf8\xe8\x1eV\xfaC\xdf\xc3Vv\x9b\x1a\xfc\x14.c\x94\xc9=\xb0\x0f!d\b\x18*@m\x7f\xaal\x17G\xd6?\x81\x16P\x03\x10e\xc3\xcd\xb1B\xeb\x01B\\\x91A\xa1\x8an\xb4#\xadr\x1e\x81v\xa2\x0e6x\xca\x8b\xa6\xd8\x81\x10:\x0e(\xdd\xfc\xc9\xc6\xb4\xf0\'f:\xbd\xfe\x11\xf8\xc8W\x81s^\xd9W\xf1\x94\xaf\xc5\x8a\xb4f\x1b\x17E\xb23\x12\xb0\xeb\xef\x8c\xb24h\xd7}\x7f\x92Hgej\x957\xe2A'}, 0x30) [ 695.858839][T28378] IPVS: ftp: loaded support on port[0] = 21 03:43:36 executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000fe1000)={0x5, 0x83, 0x80, 0xf}, 0x1c) bpf$PROG_LOAD(0x5, &(0x7f0000fed000)={0x7, 0x7, &(0x7f00000000c0)=@framed={{}, [@map={0x18, 0x0, 0x1, 0x0, r0}, @map]}, &(0x7f0000919ff6)='syzkaller\x00', 0x0, 0xe1, &(0x7f0000000000)=""/225, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) 03:43:37 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000fe1000)={0x5, 0x83, 0x80, 0xf}, 0x1c) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000fed000)={0x7, 0x9, &(0x7f00000000c0)=@framed={{}, [@map={0x18, 0x0, 0x1, 0x0, r0}, @map, @map]}, &(0x7f0000919ff6)='syzkaller\x00', 0x0, 0xe1, &(0x7f0000000000)=""/225}, 0x14) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) 03:43:37 executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000fe1000)={0x5, 0x83, 0x80, 0xf}, 0x1c) bpf$PROG_LOAD(0x5, &(0x7f0000fed000)={0x7, 0x7, &(0x7f00000000c0)=@framed={{}, [@map={0x18, 0x0, 0x1, 0x0, r0}, @map]}, &(0x7f0000919ff6)='syzkaller\x00', 0x0, 0xe1, &(0x7f0000000000)=""/225, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) 03:43:37 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x238) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) writev(r0, &(0x7f0000000540)=[{&(0x7f0000000140)="cedbddea5b67f4290aa7fd7c0cc7e2e613891a59fd3dc2e8a3c6e7c9fa96", 0x1e}, {&(0x7f0000000340)="e4bc7c957b83ba155edae525e00f76c76056ac3fe8a5de5ccfba604ac6b0d4a0fd42802b43143a32d703bd21baddda61ba1cb78758f519c19a06193e8bfc0d1f1fad3be6885359773264bd153a2bf50591662cca307c7a22f8a9e70629a1beac22b823bfee7fec", 0x67}, {0x0}], 0x3) sendto$inet(r0, &(0x7f00000012c0)="0c268a927f1f6588b967481241ba7860005cf65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95425a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x27) 03:43:37 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000fe1000)={0x5, 0x83, 0x80, 0xf}, 0x1c) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000fed000)={0x7, 0x9, &(0x7f00000000c0)=@framed={{}, [@map={0x18, 0x0, 0x1, 0x0, r0}, @map, @map]}, &(0x7f0000919ff6)='syzkaller\x00', 0x0, 0xe1, &(0x7f0000000000)=""/225}, 0x14) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) 03:43:37 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x400007) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0x32600) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xb4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000040)='cpuset') write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000700)=ANY=[@ANYBLOB="006d176df3384ed3ddbcf3be0e26fd017529253262b78ee8b9d470"], 0x1b) ioctl$TUNSETCARRIER(0xffffffffffffffff, 0x400454e2, &(0x7f0000000080)=0x1) write$cgroup_int(r0, &(0x7f0000000380), 0x12) write$cgroup_int(r1, &(0x7f0000000400), 0xd) r2 = gettid() write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000000)=r2, 0x12) r3 = socket$kcm(0x2b, 0x0, 0x0) socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r3, 0x0, 0x0) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000280)=r2, 0x12) r4 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) close(r5) write$cgroup_type(r5, &(0x7f0000000080)='threaded\x00', 0xfffffc61) r6 = bpf$MAP_CREATE(0x2, &(0x7f0000009280), 0x3c) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x17, 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB], &(0x7f0000000200)='syzkaller\x00', 0xfa1, 0x0, 0x0, 0x41100, 0x2, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, &(0x7f0000000240), 0x8, 0x10, 0x0}, 0x78) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000008740)={0x0, 0x0, &(0x7f0000008700)=[{0x0}, {&(0x7f0000008680)=""/23, 0x17}, {&(0x7f00000086c0)=""/38, 0x26}], 0x3}, 0x8000) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x6, 0x2, 0x2e15579, 0x3f, 0x1, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffffff, 0x0, 0x5}, 0x3c) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0xb, [], 0x0, 0xc, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r7}, 0x7e) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r8, &(0x7f0000000000)=ANY=[], 0x50c000) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x18, 0x45, &(0x7f0000000a00)=ANY=[@ANYBLOB="0000752c0000000000000000ffffffff9500000000000000181400006200ed587c1ba87fb23af22b6cf03fb851054ce322d4b3a5894516c0c1479e1cfbf3061ad7aef6d6c36e4e74a8219f8441192ab16361719f26a1e543525c94027f7a5f275546d8cacee044fc20d858e268019caeb1633cc4888faa05d02cd44de32962e022697754125edcfb3477c4e122a0e97ab43de94a7a94efd527400e2c2ff4468fd6e773773f089b268fddef712ab174487ae9049f64895522be3862156a1af15513c3ff285844c9aae255d74c0dacf6c47d6809ce69ee6e41a03a03b29152ee43afabd82aa883f260995238aa70895dc3aee59a119dc82fb5fd00af56ded09336e2df6a0bb41bd191d57b35eb262a1aa8d5fec51b24500685f8c0adaf3639790fdbd7cb2ac3af37a802a6ac7265a819c91986c45e7c54d91c5ced552d96c04a80c063fee16b3a52bc603deebe32e4e0dfdfe9d03658daad65606e175041076684110e66f74db9509b1a29e765c9208ddba13e3b42b3963dce5432c4fb7844a9b64c518820c9c0198fadb6ea6a350f89a1eb1a3c1e20527ce574c3514f9ad62be70eee070faa267d83564e6db87e4d16ccd118397c2e4825140e6b46c35edb77df7b9a3334ad3f8cb70b73f4b9d8b29eb50b2c2dfc8d82841a6251fcfcb978ce90873ddcfa0125800302f5ed70c724e0253fb45955750f1e7c94ca05a91ec592ee3a52fad9", @ANYRES32=r6, @ANYBLOB="00000000000000000c72c0fff6ffffff850000005b0000009500000000000000"], &(0x7f0000000040)='GPL\x00', 0x3ff, 0xd5, &(0x7f0000000080)=""/213, 0x61800, 0xab6c50112a8dd52c, [], 0x0, 0x16, 0xffffffffffffffff, 0x8, &(0x7f0000000180)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000001c0)={0x2, 0x6, 0x6, 0x5}, 0x10, 0x0, r8}, 0x78) bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x11, 0x5, 0x81, 0x2, 0x100, r5, 0x3, [], 0x0, 0xffffffffffffffff, 0x4, 0x3}, 0x3c) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r9, &(0x7f0000000200), 0x806000) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, r4, 0x0, 0x2a8, &(0x7f0000000440)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\a\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83CZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x98\x86\"R\x06\x00\x00\x00\x00\x00\x00\x00\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&\x014\x01\xf4\xb7\x83\x9a\xfa*\xa6\x06\xb7Pk7N\xc2\xd9\xee\xd0\xb0M\x00\xab\xc3\t\fc\xd8dx\xd5\x1dU*s)\x12[\x14\xb1\xc0\xd7\x1a\xa0\x16\xa2z\x9e\x93 \xddeF>29\v\x02\xa2b\x13R\xef\xffA,\xb9.$\xfa\x9f\xde[\x80\xd1=\xce\x1b\xeb\xf6\xf4\xe3z\x1f\x9dz\xa3\xc0\xe2\xa2\xb1\xeeq\xf5\xec0\x8e\xf4\xfb\xd9\x87\xf03\xdb\xae|\x10&V5c\xa6\xce\xcd\x8a\xdf\xe1\x89\"\xea\xde\xe7\xa3\xbe\xe7\xff\xf9 \x11\xfdY\xc6\xa1\xe8\xda\v\\?\xcb\x87\bn\x9b\x01\x1f\xf8\xe8\x1eV\xfaC\xdf\xc3Vv\x9b\x1a\xfc\x14.c\x94\xc9=\xb0\x0f!d\b\x18*@m\x7f\xaal\x17G\xd6?\x81\x16P\x03\x10e\xc3\xcd\xb1B\xeb\x01B\\\x91A\xa1\x8an\xb4#\xadr\x1e\x81v\xa2\x0e6x\xca\x8b\xa6\xd8\x81\x10:\x0e(\xdd\xfc\xc9\xc6\xb4\xf0\'f:\xbd\xfe\x11\xf8\xc8W\x81s^\xd9W\xf1\x94\xaf\xc5\x8a\xb4f\x1b\x17E\xb23\x12\xb0\xeb\xef\x8c\xb24h\xd7}\x7f\x92Hgej\x957\xe2A'}, 0x30) 03:43:37 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x238) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) writev(r0, &(0x7f0000000540)=[{&(0x7f0000000140)="cedbddea5b67f4290aa7fd7c0cc7e2e613891a59fd3dc2e8a3c6e7c9fa96", 0x1e}, {&(0x7f0000000340)="e4bc7c957b83ba155edae525e00f76c76056ac3fe8a5de5ccfba604ac6b0d4a0fd42802b43143a32d703bd21baddda61ba1cb78758f519c19a06193e8bfc0d1f1fad3be6885359773264bd153a2bf50591662cca307c7a22f8a9e70629a1beac22b823bfee7fec832958c20007e0b8707c6ac0e8b1", 0x75}, {&(0x7f00000004c0)="4b8043af3b13f04c3ee02ee028e584b538cfb06be329d5ca0649880187b5cd5ff601bf73", 0x24}, {&(0x7f0000000800)="87cfb3bd1ada6e425b", 0x9}], 0x4) sendto$inet(r0, &(0x7f00000012c0)="0c268a927f1f6588b967481241ba7860005cf65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95425a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x27) 03:43:37 executing program 5: openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) ioctl$RNDADDENTROPY(0xffffffffffffffff, 0x40085203, &(0x7f0000000100)={0x6, 0xba, "56f80f8d7c9ad684157765ee68815e033b7b2972a2d067318db9ac518603e0dbae813e160bd3f15b30c226056579cf64ac2525dd44c15e56204f1e3f1b8c03b31f4281605682d4b39a61b89636b3a2a5ea0bd3f5e8bd40d8c0406969d18fed78e4f4108902b5959ec383c40036f5262e703d6ad6a7a486302c382e45645bfe4c472249b482a28e9519e744cdbe884985d913612a17250eab7e4f0bf4b35aab9f7b923116a8d30baf612ca3bc2ef9b3f8d1c6b570cb60bd8d5b68"}) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_sctp(0x2, 0x5, 0x84) dup3(0xffffffffffffffff, r0, 0x0) socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp_SCTP_AUTH_DEACTIVATE_KEY(0xffffffffffffffff, 0x84, 0x23, 0x0, 0x0) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f00000000c0)={0x51, 0xfffc, 0x0, {0x103, 0xf1}, {0x9}, @ramp={0x2, 0x3, {0x7fff, 0x0, 0x7, 0x7}}}) r1 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r1, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @bcast, @rose, @rose, @null]}, 0x48) listen(r1, 0x0) unshare(0x40000000) r2 = accept(r1, 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r3, 0xffffffffffffffff) write$binfmt_elf64(r2, &(0x7f00000002c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}], "", [[], []]}, 0x278) 03:43:37 executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000fe1000)={0x5, 0x83, 0x80, 0xf}, 0x1c) bpf$PROG_LOAD(0x5, &(0x7f0000fed000)={0x7, 0x7, &(0x7f00000000c0)=@framed={{}, [@map={0x18, 0x0, 0x1, 0x0, r0}, @map]}, &(0x7f0000919ff6)='syzkaller\x00', 0x0, 0xe1, &(0x7f0000000000)=""/225, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) 03:43:37 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000fe1000)={0x5, 0x83, 0x80, 0xf}, 0x1c) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000fed000)={0x7, 0x9, &(0x7f00000000c0)=@framed={{}, [@map={0x18, 0x0, 0x1, 0x0, r0}, @map, @map]}, &(0x7f0000919ff6)='syzkaller\x00', 0x0, 0xe1, &(0x7f0000000000)=""/225}, 0x14) 03:43:37 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x400007) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0x32600) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xb4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000040)='cpuset') write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000700)=ANY=[@ANYBLOB="006d176df3384ed3ddbcf3be0e26fd017529253262b78ee8b9d470"], 0x1b) ioctl$TUNSETCARRIER(0xffffffffffffffff, 0x400454e2, &(0x7f0000000080)=0x1) write$cgroup_int(r0, &(0x7f0000000380), 0x12) write$cgroup_int(r1, &(0x7f0000000400), 0xd) r2 = gettid() write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000000)=r2, 0x12) r3 = socket$kcm(0x2b, 0x0, 0x0) socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r3, 0x0, 0x0) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000280)=r2, 0x12) r4 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) close(r5) write$cgroup_type(r5, &(0x7f0000000080)='threaded\x00', 0xfffffc61) r6 = bpf$MAP_CREATE(0x2, &(0x7f0000009280), 0x3c) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x17, 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB], &(0x7f0000000200)='syzkaller\x00', 0xfa1, 0x0, 0x0, 0x41100, 0x2, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, &(0x7f0000000240), 0x8, 0x10, 0x0}, 0x78) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000008740)={0x0, 0x0, &(0x7f0000008700)=[{0x0}, {&(0x7f0000008680)=""/23, 0x17}, {&(0x7f00000086c0)=""/38, 0x26}], 0x3}, 0x8000) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x6, 0x2, 0x2e15579, 0x3f, 0x1, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffffff, 0x0, 0x5}, 0x3c) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0xb, [], 0x0, 0xc, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r7}, 0x7e) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r8, &(0x7f0000000000)=ANY=[], 0x50c000) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x18, 0x45, &(0x7f0000000a00)=ANY=[@ANYBLOB="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", @ANYRES32=r6, @ANYBLOB="00000000000000000c72c0fff6ffffff850000005b0000009500000000000000"], &(0x7f0000000040)='GPL\x00', 0x3ff, 0xd5, &(0x7f0000000080)=""/213, 0x61800, 0xab6c50112a8dd52c, [], 0x0, 0x16, 0xffffffffffffffff, 0x8, &(0x7f0000000180)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000001c0)={0x2, 0x6, 0x6, 0x5}, 0x10, 0x0, r8}, 0x78) bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x11, 0x5, 0x81, 0x2, 0x100, r5, 0x3, [], 0x0, 0xffffffffffffffff, 0x4, 0x3}, 0x3c) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r9, &(0x7f0000000200), 0x806000) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, r4, 0x0, 0x2a8, &(0x7f0000000440)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\a\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83CZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x98\x86\"R\x06\x00\x00\x00\x00\x00\x00\x00\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&\x014\x01\xf4\xb7\x83\x9a\xfa*\xa6\x06\xb7Pk7N\xc2\xd9\xee\xd0\xb0M\x00\xab\xc3\t\fc\xd8dx\xd5\x1dU*s)\x12[\x14\xb1\xc0\xd7\x1a\xa0\x16\xa2z\x9e\x93 \xddeF>29\v\x02\xa2b\x13R\xef\xffA,\xb9.$\xfa\x9f\xde[\x80\xd1=\xce\x1b\xeb\xf6\xf4\xe3z\x1f\x9dz\xa3\xc0\xe2\xa2\xb1\xeeq\xf5\xec0\x8e\xf4\xfb\xd9\x87\xf03\xdb\xae|\x10&V5c\xa6\xce\xcd\x8a\xdf\xe1\x89\"\xea\xde\xe7\xa3\xbe\xe7\xff\xf9 \x11\xfdY\xc6\xa1\xe8\xda\v\\?\xcb\x87\bn\x9b\x01\x1f\xf8\xe8\x1eV\xfaC\xdf\xc3Vv\x9b\x1a\xfc\x14.c\x94\xc9=\xb0\x0f!d\b\x18*@m\x7f\xaal\x17G\xd6?\x81\x16P\x03\x10e\xc3\xcd\xb1B\xeb\x01B\\\x91A\xa1\x8an\xb4#\xadr\x1e\x81v\xa2\x0e6x\xca\x8b\xa6\xd8\x81\x10:\x0e(\xdd\xfc\xc9\xc6\xb4\xf0\'f:\xbd\xfe\x11\xf8\xc8W\x81s^\xd9W\xf1\x94\xaf\xc5\x8a\xb4f\x1b\x17E\xb23\x12\xb0\xeb\xef\x8c\xb24h\xd7}\x7f\x92Hgej\x957\xe2A'}, 0x30) 03:43:37 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000fe1000)={0x5, 0x83, 0x80, 0xf}, 0x1c) bpf$MAP_CREATE(0x0, 0x0, 0x0) [ 696.862708][T28415] IPVS: ftp: loaded support on port[0] = 21 03:43:37 executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000fe1000)={0x5, 0x83, 0x80, 0xf}, 0x1c) bpf$PROG_LOAD(0x5, &(0x7f0000fed000)={0x7, 0x7, &(0x7f00000000c0)=@framed={{}, [@map={0x18, 0x0, 0x1, 0x0, r0}, @map]}, &(0x7f0000919ff6)='syzkaller\x00', 0x0, 0xe1, &(0x7f0000000000)=""/225, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) 03:43:38 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x238) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) writev(r0, &(0x7f0000000540)=[{&(0x7f0000000140)="cedbddea5b67f4290aa7fd7c0cc7e2e613891a59fd3dc2e8a3c6e7c9fa96", 0x1e}, {&(0x7f0000000340)="e4bc7c957b83ba155edae525e00f76c76056ac3fe8a5de5ccfba604ac6b0d4a0fd42802b43143a32d703bd21baddda61ba1cb78758f519c19a06193e8bfc0d1f1fad3be6885359773264bd153a2bf50591662cca307c7a22f8", 0x59}, {0x0}], 0x3) sendto$inet(r0, &(0x7f00000012c0)="0c268a927f1f6588b967481241ba7860005cf65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95425a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x27) 03:43:38 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000fe1000)={0x5, 0x83, 0x80, 0xf}, 0x1c) 03:43:38 executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000fe1000)={0x5, 0x83, 0x80, 0xf}, 0x1c) bpf$PROG_LOAD(0x5, &(0x7f0000fed000)={0x7, 0x7, &(0x7f00000000c0)=@framed={{}, [@map={0x18, 0x0, 0x1, 0x0, r0}, @map]}, &(0x7f0000919ff6)='syzkaller\x00', 0x0, 0xe1, &(0x7f0000000000)=""/225, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) 03:43:38 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x238) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) writev(r0, &(0x7f0000000540)=[{&(0x7f0000000140)="cedbddea5b67f4290aa7fd7c0cc7e2e613891a59fd3dc2e8a3c6e7c9fa96", 0x1e}, {&(0x7f0000000340)="e4bc7c957b83ba155edae525e00f76c76056ac3fe8a5de5ccfba604ac6b0d4a0fd42802b43143a32d703bd21baddda61ba1cb78758f519c19a06193e8bfc0d1f1fad3be6885359773264bd153a2bf50591662cca307c7a22f8a9e70629a1beac22b823bfee7fec832958c20007e0b8707c6ac0e8b1", 0x75}, {&(0x7f00000004c0)="4b8043af3b13f04c3ee02ee028e584b538cfb06be329d5ca0649880187b5cd5ff601bf73", 0x24}, {&(0x7f0000000800)="87cfb3bd1ada6e425b", 0x9}], 0x4) sendto$inet(r0, &(0x7f00000012c0)="0c268a927f1f6588b967481241ba7860005cf65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95425a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x27) 03:43:38 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x400007) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0x32600) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xb4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000040)='cpuset') write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000700)=ANY=[@ANYBLOB="006d176df3384ed3ddbcf3be0e26fd017529253262b78ee8b9d470"], 0x1b) ioctl$TUNSETCARRIER(0xffffffffffffffff, 0x400454e2, &(0x7f0000000080)=0x1) write$cgroup_int(r0, &(0x7f0000000380), 0x12) write$cgroup_int(r1, &(0x7f0000000400), 0xd) r2 = gettid() write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000000)=r2, 0x12) r3 = socket$kcm(0x2b, 0x0, 0x0) socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r3, 0x0, 0x0) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000280)=r2, 0x12) r4 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) close(r5) write$cgroup_type(r5, &(0x7f0000000080)='threaded\x00', 0xfffffc61) r6 = bpf$MAP_CREATE(0x2, &(0x7f0000009280), 0x3c) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x17, 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB], &(0x7f0000000200)='syzkaller\x00', 0xfa1, 0x0, 0x0, 0x41100, 0x2, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, &(0x7f0000000240), 0x8, 0x10, 0x0}, 0x78) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000008740)={0x0, 0x0, &(0x7f0000008700)=[{0x0}, {&(0x7f0000008680)=""/23, 0x17}, {&(0x7f00000086c0)=""/38, 0x26}], 0x3}, 0x8000) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x6, 0x2, 0x2e15579, 0x3f, 0x1, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffffff, 0x0, 0x5}, 0x3c) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0xb, [], 0x0, 0xc, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r7}, 0x7e) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r8, &(0x7f0000000000)=ANY=[], 0x50c000) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x18, 0x45, &(0x7f0000000a00)=ANY=[@ANYBLOB="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", @ANYRES32=r6, @ANYBLOB="00000000000000000c72c0fff6ffffff850000005b0000009500000000000000"], &(0x7f0000000040)='GPL\x00', 0x3ff, 0xd5, &(0x7f0000000080)=""/213, 0x61800, 0xab6c50112a8dd52c, [], 0x0, 0x16, 0xffffffffffffffff, 0x8, &(0x7f0000000180)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000001c0)={0x2, 0x6, 0x6, 0x5}, 0x10, 0x0, r8}, 0x78) bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x11, 0x5, 0x81, 0x2, 0x100, r5, 0x3, [], 0x0, 0xffffffffffffffff, 0x4, 0x3}, 0x3c) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r9, &(0x7f0000000200), 0x806000) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, r4, 0x0, 0x2a8, &(0x7f0000000440)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\a\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83CZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x98\x86\"R\x06\x00\x00\x00\x00\x00\x00\x00\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&\x014\x01\xf4\xb7\x83\x9a\xfa*\xa6\x06\xb7Pk7N\xc2\xd9\xee\xd0\xb0M\x00\xab\xc3\t\fc\xd8dx\xd5\x1dU*s)\x12[\x14\xb1\xc0\xd7\x1a\xa0\x16\xa2z\x9e\x93 \xddeF>29\v\x02\xa2b\x13R\xef\xffA,\xb9.$\xfa\x9f\xde[\x80\xd1=\xce\x1b\xeb\xf6\xf4\xe3z\x1f\x9dz\xa3\xc0\xe2\xa2\xb1\xeeq\xf5\xec0\x8e\xf4\xfb\xd9\x87\xf03\xdb\xae|\x10&V5c\xa6\xce\xcd\x8a\xdf\xe1\x89\"\xea\xde\xe7\xa3\xbe\xe7\xff\xf9 \x11\xfdY\xc6\xa1\xe8\xda\v\\?\xcb\x87\bn\x9b\x01\x1f\xf8\xe8\x1eV\xfaC\xdf\xc3Vv\x9b\x1a\xfc\x14.c\x94\xc9=\xb0\x0f!d\b\x18*@m\x7f\xaal\x17G\xd6?\x81\x16P\x03\x10e\xc3\xcd\xb1B\xeb\x01B\\\x91A\xa1\x8an\xb4#\xadr\x1e\x81v\xa2\x0e6x\xca\x8b\xa6\xd8\x81\x10:\x0e(\xdd\xfc\xc9\xc6\xb4\xf0\'f:\xbd\xfe\x11\xf8\xc8W\x81s^\xd9W\xf1\x94\xaf\xc5\x8a\xb4f\x1b\x17E\xb23\x12\xb0\xeb\xef\x8c\xb24h\xd7}\x7f\x92Hgej\x957\xe2A'}, 0x30) 03:43:38 executing program 5: openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) ioctl$RNDADDENTROPY(0xffffffffffffffff, 0x40085203, &(0x7f0000000100)={0x6, 0xba, "56f80f8d7c9ad684157765ee68815e033b7b2972a2d067318db9ac518603e0dbae813e160bd3f15b30c226056579cf64ac2525dd44c15e56204f1e3f1b8c03b31f4281605682d4b39a61b89636b3a2a5ea0bd3f5e8bd40d8c0406969d18fed78e4f4108902b5959ec383c40036f5262e703d6ad6a7a486302c382e45645bfe4c472249b482a28e9519e744cdbe884985d913612a17250eab7e4f0bf4b35aab9f7b923116a8d30baf612ca3bc2ef9b3f8d1c6b570cb60bd8d5b68"}) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_sctp(0x2, 0x5, 0x84) dup3(0xffffffffffffffff, r0, 0x0) socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp_SCTP_AUTH_DEACTIVATE_KEY(0xffffffffffffffff, 0x84, 0x23, 0x0, 0x0) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f00000000c0)={0x51, 0xfffc, 0x0, {0x103, 0xf1}, {0x9}, @ramp={0x2, 0x3, {0x7fff, 0x0, 0x7, 0x7}}}) r1 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r1, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @bcast, @rose, @rose, @null]}, 0x48) listen(r1, 0x0) unshare(0x40000000) r2 = accept(r1, 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r3, 0xffffffffffffffff) write$binfmt_elf64(r2, &(0x7f00000002c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}], "", [[], []]}, 0x278) 03:43:38 executing program 0: bpf$MAP_CREATE(0x0, 0x0, 0x0) 03:43:38 executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000fe1000)={0x5, 0x83, 0x80, 0xf}, 0x1c) bpf$PROG_LOAD(0x5, &(0x7f0000fed000)={0x7, 0x7, &(0x7f00000000c0)=@framed={{}, [@map={0x18, 0x0, 0x1, 0x0, r0}, @map]}, &(0x7f0000919ff6)='syzkaller\x00', 0x0, 0xe1, &(0x7f0000000000)=""/225, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) 03:43:38 executing program 0: bpf$MAP_CREATE(0x0, 0x0, 0x0) [ 697.940527][T28457] IPVS: ftp: loaded support on port[0] = 21 03:43:39 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x400007) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0x32600) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xb4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000040)='cpuset') write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000700)=ANY=[@ANYBLOB="006d176df3384ed3ddbcf3be0e26fd017529253262b78ee8b9d470"], 0x1b) ioctl$TUNSETCARRIER(0xffffffffffffffff, 0x400454e2, &(0x7f0000000080)=0x1) write$cgroup_int(r0, &(0x7f0000000380), 0x12) write$cgroup_int(r1, &(0x7f0000000400), 0xd) r2 = gettid() write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000000)=r2, 0x12) r3 = socket$kcm(0x2b, 0x0, 0x0) socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r3, 0x0, 0x0) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000280)=r2, 0x12) r4 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) close(r5) write$cgroup_type(r5, &(0x7f0000000080)='threaded\x00', 0xfffffc61) r6 = bpf$MAP_CREATE(0x2, &(0x7f0000009280), 0x3c) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x17, 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB], &(0x7f0000000200)='syzkaller\x00', 0xfa1, 0x0, 0x0, 0x41100, 0x2, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, &(0x7f0000000240), 0x8, 0x10, 0x0}, 0x78) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000008740)={0x0, 0x0, &(0x7f0000008700)=[{0x0}, {&(0x7f0000008680)=""/23, 0x17}, {&(0x7f00000086c0)=""/38, 0x26}], 0x3}, 0x8000) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x6, 0x2, 0x2e15579, 0x3f, 0x1, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffffff, 0x0, 0x5}, 0x3c) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0xb, [], 0x0, 0xc, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r7}, 0x7e) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r8, &(0x7f0000000000)=ANY=[], 0x50c000) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x18, 0x47, &(0x7f0000000a00)=ANY=[@ANYBLOB="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", @ANYRES32=r6, @ANYBLOB="00000000000000000c72c0fff6ffffff850000005b0000009500000000000000"], &(0x7f0000000040)='GPL\x00', 0x3ff, 0xd5, &(0x7f0000000080)=""/213, 0x61800, 0xab6c50112a8dd52c, [], 0x0, 0x16, 0xffffffffffffffff, 0x8, &(0x7f0000000180)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000001c0)={0x2, 0x6, 0x6, 0x5}, 0x10, 0x0, r8}, 0x78) bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x11, 0x5, 0x81, 0x2, 0x100, r5, 0x3, [], 0x0, 0xffffffffffffffff, 0x4, 0x3}, 0x3c) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r9, &(0x7f0000000200), 0x806000) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, r4, 0x0, 0x2a8, &(0x7f0000000440)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\a\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83CZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x98\x86\"R\x06\x00\x00\x00\x00\x00\x00\x00\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&\x014\x01\xf4\xb7\x83\x9a\xfa*\xa6\x06\xb7Pk7N\xc2\xd9\xee\xd0\xb0M\x00\xab\xc3\t\fc\xd8dx\xd5\x1dU*s)\x12[\x14\xb1\xc0\xd7\x1a\xa0\x16\xa2z\x9e\x93 \xddeF>29\v\x02\xa2b\x13R\xef\xffA,\xb9.$\xfa\x9f\xde[\x80\xd1=\xce\x1b\xeb\xf6\xf4\xe3z\x1f\x9dz\xa3\xc0\xe2\xa2\xb1\xeeq\xf5\xec0\x8e\xf4\xfb\xd9\x87\xf03\xdb\xae|\x10&V5c\xa6\xce\xcd\x8a\xdf\xe1\x89\"\xea\xde\xe7\xa3\xbe\xe7\xff\xf9 \x11\xfdY\xc6\xa1\xe8\xda\v\\?\xcb\x87\bn\x9b\x01\x1f\xf8\xe8\x1eV\xfaC\xdf\xc3Vv\x9b\x1a\xfc\x14.c\x94\xc9=\xb0\x0f!d\b\x18*@m\x7f\xaal\x17G\xd6?\x81\x16P\x03\x10e\xc3\xcd\xb1B\xeb\x01B\\\x91A\xa1\x8an\xb4#\xadr\x1e\x81v\xa2\x0e6x\xca\x8b\xa6\xd8\x81\x10:\x0e(\xdd\xfc\xc9\xc6\xb4\xf0\'f:\xbd\xfe\x11\xf8\xc8W\x81s^\xd9W\xf1\x94\xaf\xc5\x8a\xb4f\x1b\x17E\xb23\x12\xb0\xeb\xef\x8c\xb24h\xd7}\x7f\x92Hgej\x957\xe2A'}, 0x30) 03:43:39 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x238) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) writev(r0, &(0x7f0000000540)=[{&(0x7f0000000140)="cedbddea5b67f4290aa7fd7c0cc7e2e613891a59fd3dc2e8a3c6e7c9fa96", 0x1e}, {&(0x7f0000000340)="e4bc7c957b83ba155edae525e00f76c76056ac3fe8a5de5ccfba604ac6b0d4a0fd42802b43143a32d703bd21baddda61ba1cb78758f519c19a06193e8bfc0d1f1fad3be6885359773264bd", 0x4b}, {0x0}], 0x3) sendto$inet(r0, &(0x7f00000012c0)="0c268a927f1f6588b967481241ba7860005cf65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95425a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x27) 03:43:39 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000fe1000)={0x5, 0x83, 0x80, 0xf}, 0x1c) bpf$PROG_LOAD(0x5, &(0x7f0000fed000)={0x7, 0x7, &(0x7f00000000c0)=@framed={{}, [@map, @map]}, &(0x7f0000919ff6)='syzkaller\x00', 0x0, 0xe1, &(0x7f0000000000)=""/225, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) 03:43:39 executing program 0: bpf$MAP_CREATE(0x0, 0x0, 0x0) 03:43:39 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x238) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) writev(r0, &(0x7f0000000540)=[{&(0x7f0000000140)="cedbddea5b67f4290aa7fd7c0cc7e2e613891a59fd3dc2e8a3c6e7c9fa96", 0x1e}, {&(0x7f0000000340)="e4bc7c957b83ba155edae525e00f76c76056ac3fe8a5de5ccfba604ac6b0d4a0fd42802b43143a32d703bd21baddda61ba1cb78758f519c19a06193e8bfc0d1f1fad3be6885359773264bd153a2bf50591662cca307c7a22f8a9e70629a1beac22b823bfee7fec832958c20007e0b8707c6ac0e8b1", 0x75}, {&(0x7f00000004c0)="4b8043af3b13f04c3ee02ee028e584b538cfb06be329d5ca0649880187b5cd5ff601bf73", 0x24}, {&(0x7f0000000800)="87cfb3bd1ada6e425b", 0x9}], 0x4) sendto$inet(r0, &(0x7f00000012c0)="0c268a927f1f6588b967481241ba7860005cf65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95425a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x27) 03:43:39 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000fe1000)={0x5, 0x83, 0x80, 0xf}, 0x1c) bpf$PROG_LOAD(0x5, &(0x7f0000fed000)={0x7, 0x7, &(0x7f00000000c0)=@framed={{}, [@map, @map]}, &(0x7f0000919ff6)='syzkaller\x00', 0x0, 0xe1, &(0x7f0000000000)=""/225, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) 03:43:39 executing program 5: openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) ioctl$RNDADDENTROPY(0xffffffffffffffff, 0x40085203, &(0x7f0000000100)={0x6, 0xbb, "56f80f8d7c9ad684157765ee68815e033b7b2972a2d067318db9ac518603e0dbae813e160bd3f15b30c226056579cf64ac2525dd44c15e56204f1e3f1b8c03b31f4281605682d4b39a61b89636b3a2a5ea0bd3f5e8bd40d8c0406969d18fed78e4f4108902b5959ec383c40036f5262e703d6ad6a7a486302c382e45645bfe4c472249b482a28e9519e744cdbe884985d913612a17250eab7e4f0bf4b35aab9f7b923116a8d30baf612ca3bc2ef9b3f8d1c6b570cb60bd8d5b6805"}) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_sctp(0x2, 0x5, 0x84) dup3(0xffffffffffffffff, r0, 0x0) socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp_SCTP_AUTH_DEACTIVATE_KEY(0xffffffffffffffff, 0x84, 0x23, 0x0, 0x0) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f00000000c0)={0x51, 0xfffc, 0x0, {0x103, 0xf1}, {0x9}, @ramp={0x2, 0x3, {0x7fff, 0x0, 0x7, 0x7}}}) r1 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r1, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @bcast, @rose, @rose, @null]}, 0x48) listen(r1, 0x0) unshare(0x40000000) r2 = accept(r1, 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r3, 0xffffffffffffffff) write$binfmt_elf64(r2, &(0x7f00000002c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}], "", [[], []]}, 0x278) 03:43:39 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000fe1000)={0x0, 0x83, 0x80, 0xf}, 0x1c) 03:43:39 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x400007) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0x32600) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xb4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000040)='cpuset') write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000700)=ANY=[@ANYBLOB="006d176df3384ed3ddbcf3be0e26fd017529253262b78ee8b9d470"], 0x1b) ioctl$TUNSETCARRIER(0xffffffffffffffff, 0x400454e2, &(0x7f0000000080)=0x1) write$cgroup_int(r0, &(0x7f0000000380), 0x12) write$cgroup_int(r1, &(0x7f0000000400), 0xd) r2 = gettid() write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000000)=r2, 0x12) r3 = socket$kcm(0x2b, 0x0, 0x0) socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r3, 0x0, 0x0) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000280)=r2, 0x12) r4 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) close(r5) write$cgroup_type(r5, &(0x7f0000000080)='threaded\x00', 0xfffffc61) r6 = bpf$MAP_CREATE(0x2, &(0x7f0000009280), 0x3c) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x17, 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB], &(0x7f0000000200)='syzkaller\x00', 0xfa1, 0x0, 0x0, 0x41100, 0x2, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, &(0x7f0000000240), 0x8, 0x10, 0x0}, 0x78) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000008740)={0x0, 0x0, &(0x7f0000008700)=[{0x0}, {&(0x7f0000008680)=""/23, 0x17}, {&(0x7f00000086c0)=""/38, 0x26}], 0x3}, 0x8000) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x6, 0x2, 0x2e15579, 0x3f, 0x1, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffffff, 0x0, 0x5}, 0x3c) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0xb, [], 0x0, 0xc, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r7}, 0x7e) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r8, &(0x7f0000000000)=ANY=[], 0x50c000) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x18, 0x47, &(0x7f0000000a00)=ANY=[@ANYBLOB="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", @ANYRES32=r6, @ANYBLOB="00000000000000000c72c0fff6ffffff850000005b0000009500000000000000"], &(0x7f0000000040)='GPL\x00', 0x3ff, 0xd5, &(0x7f0000000080)=""/213, 0x61800, 0xab6c50112a8dd52c, [], 0x0, 0x16, 0xffffffffffffffff, 0x8, &(0x7f0000000180)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000001c0)={0x2, 0x6, 0x6, 0x5}, 0x10, 0x0, r8}, 0x78) bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x11, 0x5, 0x81, 0x2, 0x100, r5, 0x3, [], 0x0, 0xffffffffffffffff, 0x4, 0x3}, 0x3c) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r9, &(0x7f0000000200), 0x806000) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, r4, 0x0, 0x2a8, &(0x7f0000000440)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\a\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83CZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x98\x86\"R\x06\x00\x00\x00\x00\x00\x00\x00\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&\x014\x01\xf4\xb7\x83\x9a\xfa*\xa6\x06\xb7Pk7N\xc2\xd9\xee\xd0\xb0M\x00\xab\xc3\t\fc\xd8dx\xd5\x1dU*s)\x12[\x14\xb1\xc0\xd7\x1a\xa0\x16\xa2z\x9e\x93 \xddeF>29\v\x02\xa2b\x13R\xef\xffA,\xb9.$\xfa\x9f\xde[\x80\xd1=\xce\x1b\xeb\xf6\xf4\xe3z\x1f\x9dz\xa3\xc0\xe2\xa2\xb1\xeeq\xf5\xec0\x8e\xf4\xfb\xd9\x87\xf03\xdb\xae|\x10&V5c\xa6\xce\xcd\x8a\xdf\xe1\x89\"\xea\xde\xe7\xa3\xbe\xe7\xff\xf9 \x11\xfdY\xc6\xa1\xe8\xda\v\\?\xcb\x87\bn\x9b\x01\x1f\xf8\xe8\x1eV\xfaC\xdf\xc3Vv\x9b\x1a\xfc\x14.c\x94\xc9=\xb0\x0f!d\b\x18*@m\x7f\xaal\x17G\xd6?\x81\x16P\x03\x10e\xc3\xcd\xb1B\xeb\x01B\\\x91A\xa1\x8an\xb4#\xadr\x1e\x81v\xa2\x0e6x\xca\x8b\xa6\xd8\x81\x10:\x0e(\xdd\xfc\xc9\xc6\xb4\xf0\'f:\xbd\xfe\x11\xf8\xc8W\x81s^\xd9W\xf1\x94\xaf\xc5\x8a\xb4f\x1b\x17E\xb23\x12\xb0\xeb\xef\x8c\xb24h\xd7}\x7f\x92Hgej\x957\xe2A'}, 0x30) 03:43:39 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000fe1000)={0x5, 0x83, 0x80, 0xf}, 0x1c) bpf$PROG_LOAD(0x5, &(0x7f0000fed000)={0x7, 0x7, &(0x7f00000000c0)=@framed={{}, [@map, @map]}, &(0x7f0000919ff6)='syzkaller\x00', 0x0, 0xe1, &(0x7f0000000000)=""/225, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) [ 698.707947][T28489] IPVS: ftp: loaded support on port[0] = 21 03:43:39 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000fe1000)={0x0, 0x83, 0x80, 0xf}, 0x1c) 03:43:39 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x238) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) writev(r0, &(0x7f0000000540)=[{&(0x7f0000000140)="cedbddea5b67f4290aa7fd7c0cc7e2e613891a59fd3dc2e8a3c6e7c9fa96", 0x1e}, {&(0x7f0000000340)="e4bc7c957b83ba155edae525e00f76c76056ac3fe8a5de5ccfba604ac6b0d4a0fd42802b43143a32d703bd21baddda61ba1cb78758f519c19a06193e8b", 0x3d}, {0x0}], 0x3) sendto$inet(r0, &(0x7f00000012c0)="0c268a927f1f6588b967481241ba7860005cf65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95425a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x27) 03:43:39 executing program 5: openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) ioctl$RNDADDENTROPY(0xffffffffffffffff, 0x40085203, &(0x7f0000000100)={0x6, 0xbb, "56f80f8d7c9ad684157765ee68815e033b7b2972a2d067318db9ac518603e0dbae813e160bd3f15b30c226056579cf64ac2525dd44c15e56204f1e3f1b8c03b31f4281605682d4b39a61b89636b3a2a5ea0bd3f5e8bd40d8c0406969d18fed78e4f4108902b5959ec383c40036f5262e703d6ad6a7a486302c382e45645bfe4c472249b482a28e9519e744cdbe884985d913612a17250eab7e4f0bf4b35aab9f7b923116a8d30baf612ca3bc2ef9b3f8d1c6b570cb60bd8d5b6805"}) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_sctp(0x2, 0x5, 0x84) dup3(0xffffffffffffffff, r0, 0x0) socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp_SCTP_AUTH_DEACTIVATE_KEY(0xffffffffffffffff, 0x84, 0x23, 0x0, 0x0) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f00000000c0)={0x51, 0xfffc, 0x0, {0x103, 0xf1}, {0x9}, @ramp={0x2, 0x3, {0x7fff, 0x0, 0x7, 0x7}}}) r1 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r1, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @bcast, @rose, @rose, @null]}, 0x48) listen(r1, 0x0) unshare(0x40000000) r2 = accept(r1, 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r3, 0xffffffffffffffff) write$binfmt_elf64(r2, &(0x7f00000002c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}], "", [[], []]}, 0x278) 03:43:40 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000fe1000)={0x5, 0x83, 0x80, 0xf}, 0x1c) bpf$PROG_LOAD(0x5, &(0x7f0000fed000)={0x7, 0x9, &(0x7f00000000c0)=@framed={{}, [@map, @map, @map]}, &(0x7f0000919ff6)='syzkaller\x00', 0x0, 0xe1, &(0x7f0000000000)=""/225}, 0x14) 03:43:40 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000fe1000)={0x0, 0x83, 0x80, 0xf}, 0x1c) 03:43:40 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x238) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) writev(r0, &(0x7f0000000540)=[{&(0x7f0000000140)="cedbddea5b67f4290aa7fd7c0cc7e2e613891a59fd3dc2e8a3c6e7c9fa96", 0x1e}, {&(0x7f0000000340)="e4bc7c957b83ba155edae525e00f76c76056ac3fe8a5de5ccfba604ac6b0d4a0fd42802b43143a32d703bd21baddda61ba1cb78758f519c19a06193e8bfc0d1f1fad3be6885359773264bd153a2bf50591662cca307c7a22f8a9e70629a1beac22b823bfee7fec832958c20007e0b8707c6ac0e8b1", 0x75}, {&(0x7f00000004c0)="4b8043af3b13f04c3ee02ee028e584b538cfb06be329d5ca0649880187b5cd5ff601bf73", 0x24}, {&(0x7f0000000800)="87cfb3bd1ada6e425bdd5aaccdaf", 0xe}], 0x4) sendto$inet(r0, &(0x7f00000012c0)="0c268a927f1f6588b967481241ba7860005cf65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95425a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x27) 03:43:40 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x400007) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0x32600) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xb4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000040)='cpuset') write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000700)=ANY=[@ANYBLOB="006d176df3384ed3ddbcf3be0e26fd017529253262b78ee8b9d470"], 0x1b) ioctl$TUNSETCARRIER(0xffffffffffffffff, 0x400454e2, &(0x7f0000000080)=0x1) write$cgroup_int(r0, &(0x7f0000000380), 0x12) write$cgroup_int(r1, &(0x7f0000000400), 0xd) r2 = gettid() write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000000)=r2, 0x12) r3 = socket$kcm(0x2b, 0x0, 0x0) socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r3, 0x0, 0x0) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000280)=r2, 0x12) r4 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) close(r5) write$cgroup_type(r5, &(0x7f0000000080)='threaded\x00', 0xfffffc61) r6 = bpf$MAP_CREATE(0x2, &(0x7f0000009280), 0x3c) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x17, 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB], &(0x7f0000000200)='syzkaller\x00', 0xfa1, 0x0, 0x0, 0x41100, 0x2, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, &(0x7f0000000240), 0x8, 0x10, 0x0}, 0x78) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000008740)={0x0, 0x0, &(0x7f0000008700)=[{0x0}, {&(0x7f0000008680)=""/23, 0x17}, {&(0x7f00000086c0)=""/38, 0x26}], 0x3}, 0x8000) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x6, 0x2, 0x2e15579, 0x3f, 0x1, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffffff, 0x0, 0x5}, 0x3c) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0xb, [], 0x0, 0xc, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r7}, 0x7e) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r8, &(0x7f0000000000)=ANY=[], 0x50c000) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x18, 0x47, &(0x7f0000000a00)=ANY=[@ANYBLOB="0000752c0000000000000000ffffffff9500000000000000181400006200ed587c1ba87fb23af22b6cf03fb851054ce322d4b3a5894516c0c1479e1cfbf3061ad7aef6d6c36e4e74a8219f8441192ab16361719f26a1e543525c94027f7a5f275546d8cacee044fc20d858e268019caeb1633cc4888faa05d02cd44de32962e022697754125edcfb3477c4e122a0e97ab43de94a7a94efd527400e2c2ff4468fd6e773773f089b268fddef712ab174487ae9049f64895522be3862156a1af15513c3ff285844c9aae255d74c0dacf6c47d6809ce69ee6e41a03a03b29152ee43afabd82aa883f260995238aa70895dc3aee59a119dc82fb5fd00af56ded09336e2df6a0bb41bd191d57b35eb262a1aa8d5fec51b24500685f8c0adaf3639790fdbd7cb2ac3af37a802a6ac7265a819c91986c45e7c54d91c5ced552d96c04a80c063fee16b3a52bc603deebe32e4e0dfdfe9d03658daad65606e175041076684110e66f74db9509b1a29e765c9208ddba13e3b42b3963dce5432c4fb7844a9b64c518820c9c0198fadb6ea6a350f89a1eb1a3c1e20527ce574c3514f9ad62be70eee070faa267d83564e6db87e4d16ccd118397c2e4825140e6b46c35edb77df7b9a3334ad3f8cb70b73f4b9d8b29eb50b2c2dfc8d82841a6251fcfcb978ce90873ddcfa0125800302f5ed70c724e0253fb45955750f1e7c94ca05a91ec592ee3a52fad94c89205ece2d1d96afbfa0b59f9bd6c116", @ANYRES32=r6, @ANYBLOB="00000000000000000c72c0fff6ffffff850000005b0000009500000000000000"], &(0x7f0000000040)='GPL\x00', 0x3ff, 0xd5, &(0x7f0000000080)=""/213, 0x61800, 0xab6c50112a8dd52c, [], 0x0, 0x16, 0xffffffffffffffff, 0x8, &(0x7f0000000180)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000001c0)={0x2, 0x6, 0x6, 0x5}, 0x10, 0x0, r8}, 0x78) bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x11, 0x5, 0x81, 0x2, 0x100, r5, 0x3, [], 0x0, 0xffffffffffffffff, 0x4, 0x3}, 0x3c) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r9, &(0x7f0000000200), 0x806000) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, r4, 0x0, 0x2a8, &(0x7f0000000440)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\a\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83CZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x98\x86\"R\x06\x00\x00\x00\x00\x00\x00\x00\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&\x014\x01\xf4\xb7\x83\x9a\xfa*\xa6\x06\xb7Pk7N\xc2\xd9\xee\xd0\xb0M\x00\xab\xc3\t\fc\xd8dx\xd5\x1dU*s)\x12[\x14\xb1\xc0\xd7\x1a\xa0\x16\xa2z\x9e\x93 \xddeF>29\v\x02\xa2b\x13R\xef\xffA,\xb9.$\xfa\x9f\xde[\x80\xd1=\xce\x1b\xeb\xf6\xf4\xe3z\x1f\x9dz\xa3\xc0\xe2\xa2\xb1\xeeq\xf5\xec0\x8e\xf4\xfb\xd9\x87\xf03\xdb\xae|\x10&V5c\xa6\xce\xcd\x8a\xdf\xe1\x89\"\xea\xde\xe7\xa3\xbe\xe7\xff\xf9 \x11\xfdY\xc6\xa1\xe8\xda\v\\?\xcb\x87\bn\x9b\x01\x1f\xf8\xe8\x1eV\xfaC\xdf\xc3Vv\x9b\x1a\xfc\x14.c\x94\xc9=\xb0\x0f!d\b\x18*@m\x7f\xaal\x17G\xd6?\x81\x16P\x03\x10e\xc3\xcd\xb1B\xeb\x01B\\\x91A\xa1\x8an\xb4#\xadr\x1e\x81v\xa2\x0e6x\xca\x8b\xa6\xd8\x81\x10:\x0e(\xdd\xfc\xc9\xc6\xb4\xf0\'f:\xbd\xfe\x11\xf8\xc8W\x81s^\xd9W\xf1\x94\xaf\xc5\x8a\xb4f\x1b\x17E\xb23\x12\xb0\xeb\xef\x8c\xb24h\xd7}\x7f\x92Hgej\x957\xe2A'}, 0x30) [ 699.360799][T28506] IPVS: ftp: loaded support on port[0] = 21 03:43:40 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000fe1000)={0x5, 0x0, 0x80, 0xf}, 0x1c) 03:43:40 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000fe1000)={0x5, 0x83, 0x80, 0xf}, 0x1c) bpf$PROG_LOAD(0x5, &(0x7f0000fed000)={0x7, 0x9, &(0x7f00000000c0)=@framed={{}, [@map, @map, @map]}, &(0x7f0000919ff6)='syzkaller\x00', 0x0, 0xe1, &(0x7f0000000000)=""/225}, 0x14) 03:43:40 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x400007) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0x32600) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xb4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000040)='cpuset') write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000700)=ANY=[@ANYBLOB="006d176df3384ed3ddbcf3be0e26fd017529253262b78ee8b9d470"], 0x1b) ioctl$TUNSETCARRIER(0xffffffffffffffff, 0x400454e2, &(0x7f0000000080)=0x1) write$cgroup_int(r0, &(0x7f0000000380), 0x12) write$cgroup_int(r1, &(0x7f0000000400), 0xd) r2 = gettid() write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000000)=r2, 0x12) r3 = socket$kcm(0x2b, 0x0, 0x0) socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r3, 0x0, 0x0) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000280)=r2, 0x12) r4 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) close(r5) write$cgroup_type(r5, &(0x7f0000000080)='threaded\x00', 0xfffffc61) r6 = bpf$MAP_CREATE(0x2, &(0x7f0000009280), 0x3c) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x17, 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB], &(0x7f0000000200)='syzkaller\x00', 0xfa1, 0x0, 0x0, 0x41100, 0x2, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, &(0x7f0000000240), 0x8, 0x10, 0x0}, 0x78) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000008740)={0x0, 0x0, &(0x7f0000008700)=[{0x0}, {&(0x7f0000008680)=""/23, 0x17}, {&(0x7f00000086c0)=""/38, 0x26}], 0x3}, 0x8000) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x6, 0x2, 0x2e15579, 0x3f, 0x1, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffffff, 0x0, 0x5}, 0x3c) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0xb, [], 0x0, 0xc, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r7}, 0x7e) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r8, &(0x7f0000000000)=ANY=[], 0x50c000) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x18, 0x48, &(0x7f0000000a00)=ANY=[@ANYBLOB="0000752c0000000000000000ffffffff9500000000000000181400006200ed587c1ba87fb23af22b6cf03fb851054ce322d4b3a5894516c0c1479e1cfbf3061ad7aef6d6c36e4e74a8219f8441192ab16361719f26a1e543525c94027f7a5f275546d8cacee044fc20d858e268019caeb1633cc4888faa05d02cd44de32962e022697754125edcfb3477c4e122a0e97ab43de94a7a94efd527400e2c2ff4468fd6e773773f089b268fddef712ab174487ae9049f64895522be3862156a1af15513c3ff285844c9aae255d74c0dacf6c47d6809ce69ee6e41a03a03b29152ee43afabd82aa883f260995238aa70895dc3aee59a119dc82fb5fd00af56ded09336e2df6a0bb41bd191d57b35eb262a1aa8d5fec51b24500685f8c0adaf3639790fdbd7cb2ac3af37a802a6ac7265a819c91986c45e7c54d91c5ced552d96c04a80c063fee16b3a52bc603deebe32e4e0dfdfe9d03658daad65606e175041076684110e66f74db9509b1a29e765c9208ddba13e3b42b3963dce5432c4fb7844a9b64c518820c9c0198fadb6ea6a350f89a1eb1a3c1e20527ce574c3514f9ad62be70eee070faa267d83564e6db87e4d16ccd118397c2e4825140e6b46c35edb77df7b9a3334ad3f8cb70b73f4b9d8b29eb50b2c2dfc8d82841a6251fcfcb978ce90873ddcfa0125800302f5ed70c724e0253fb45955750f1e7c94ca05a91ec592ee3a52fad94c89205ece2d1d96afbfa0b59f9bd6c1161c638fff8696973fed", @ANYRES32=r6, @ANYBLOB="00000000000000000c72c0fff6ffffff850000005b0000009500000000000000"], &(0x7f0000000040)='GPL\x00', 0x3ff, 0xd5, &(0x7f0000000080)=""/213, 0x61800, 0xab6c50112a8dd52c, [], 0x0, 0x16, 0xffffffffffffffff, 0x8, &(0x7f0000000180)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000001c0)={0x2, 0x6, 0x6, 0x5}, 0x10, 0x0, r8}, 0x78) bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x11, 0x5, 0x81, 0x2, 0x100, r5, 0x3, [], 0x0, 0xffffffffffffffff, 0x4, 0x3}, 0x3c) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r9, &(0x7f0000000200), 0x806000) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, r4, 0x0, 0x2a8, &(0x7f0000000440)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\a\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83CZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x98\x86\"R\x06\x00\x00\x00\x00\x00\x00\x00\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&\x014\x01\xf4\xb7\x83\x9a\xfa*\xa6\x06\xb7Pk7N\xc2\xd9\xee\xd0\xb0M\x00\xab\xc3\t\fc\xd8dx\xd5\x1dU*s)\x12[\x14\xb1\xc0\xd7\x1a\xa0\x16\xa2z\x9e\x93 \xddeF>29\v\x02\xa2b\x13R\xef\xffA,\xb9.$\xfa\x9f\xde[\x80\xd1=\xce\x1b\xeb\xf6\xf4\xe3z\x1f\x9dz\xa3\xc0\xe2\xa2\xb1\xeeq\xf5\xec0\x8e\xf4\xfb\xd9\x87\xf03\xdb\xae|\x10&V5c\xa6\xce\xcd\x8a\xdf\xe1\x89\"\xea\xde\xe7\xa3\xbe\xe7\xff\xf9 \x11\xfdY\xc6\xa1\xe8\xda\v\\?\xcb\x87\bn\x9b\x01\x1f\xf8\xe8\x1eV\xfaC\xdf\xc3Vv\x9b\x1a\xfc\x14.c\x94\xc9=\xb0\x0f!d\b\x18*@m\x7f\xaal\x17G\xd6?\x81\x16P\x03\x10e\xc3\xcd\xb1B\xeb\x01B\\\x91A\xa1\x8an\xb4#\xadr\x1e\x81v\xa2\x0e6x\xca\x8b\xa6\xd8\x81\x10:\x0e(\xdd\xfc\xc9\xc6\xb4\xf0\'f:\xbd\xfe\x11\xf8\xc8W\x81s^\xd9W\xf1\x94\xaf\xc5\x8a\xb4f\x1b\x17E\xb23\x12\xb0\xeb\xef\x8c\xb24h\xd7}\x7f\x92Hgej\x957\xe2A'}, 0x30) 03:43:40 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000fe1000)={0x5, 0x83, 0x80, 0xf}, 0x1c) bpf$PROG_LOAD(0x5, &(0x7f0000fed000)={0x7, 0x9, &(0x7f00000000c0)=@framed={{}, [@map, @map, @map]}, &(0x7f0000919ff6)='syzkaller\x00', 0x0, 0xe1, &(0x7f0000000000)=""/225}, 0x14) 03:43:40 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000fe1000)={0x5, 0x0, 0x80, 0xf}, 0x1c) 03:43:40 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x238) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) writev(r0, &(0x7f0000000540)=[{&(0x7f0000000140)="cedbddea5b67f4290aa7fd7c0cc7e2e613891a59fd3dc2e8a3c6e7c9fa96", 0x1e}, {&(0x7f0000000340)="e4bc7c957b83ba155edae525e00f76c76056ac3fe8a5de5ccfba604ac6b0d4a0fd42802b43143a32d703bd21baddda61ba1cb78758f519c19a06193e8b", 0x3d}, {0x0}], 0x3) sendto$inet(r0, &(0x7f00000012c0)="0c268a927f1f6588b967481241ba7860005cf65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95425a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x27) 03:43:40 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x238) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) writev(r0, &(0x7f0000000540)=[{&(0x7f0000000140)="cedbddea5b67f4290aa7fd7c0cc7e2e613891a59fd3dc2e8a3c6e7c9fa96", 0x1e}, {&(0x7f0000000340)="e4bc7c957b83ba155edae525e00f76c76056ac3fe8a5de5ccfba604ac6b0d4a0fd42802b43143a32d703bd21baddda61ba1cb78758f519c19a06193e8bfc0d1f1fad3be6885359773264bd153a2bf50591662cca307c7a22f8a9e70629a1beac22b823bfee7fec832958c20007e0b8707c6ac0e8b1", 0x75}, {&(0x7f00000004c0)="4b8043af3b13f04c3ee02ee028e584b538cfb06be329d5ca0649880187b5cd5ff601bf73", 0x24}, {&(0x7f0000000800)="87cfb3bd1ada6e425bdd5aaccdaf", 0xe}], 0x4) sendto$inet(r0, &(0x7f00000012c0)="0c268a927f1f6588b967481241ba7860005cf65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95425a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x27) 03:43:41 executing program 5: openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) ioctl$RNDADDENTROPY(0xffffffffffffffff, 0x40085203, &(0x7f0000000100)={0x6, 0xbb, "56f80f8d7c9ad684157765ee68815e033b7b2972a2d067318db9ac518603e0dbae813e160bd3f15b30c226056579cf64ac2525dd44c15e56204f1e3f1b8c03b31f4281605682d4b39a61b89636b3a2a5ea0bd3f5e8bd40d8c0406969d18fed78e4f4108902b5959ec383c40036f5262e703d6ad6a7a486302c382e45645bfe4c472249b482a28e9519e744cdbe884985d913612a17250eab7e4f0bf4b35aab9f7b923116a8d30baf612ca3bc2ef9b3f8d1c6b570cb60bd8d5b6805"}) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_sctp(0x2, 0x5, 0x84) dup3(0xffffffffffffffff, r0, 0x0) socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp_SCTP_AUTH_DEACTIVATE_KEY(0xffffffffffffffff, 0x84, 0x23, 0x0, 0x0) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f00000000c0)={0x51, 0xfffc, 0x0, {0x103, 0xf1}, {0x9}, @ramp={0x2, 0x3, {0x7fff, 0x0, 0x7, 0x7}}}) r1 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r1, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @bcast, @rose, @rose, @null]}, 0x48) listen(r1, 0x0) unshare(0x40000000) r2 = accept(r1, 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r3, 0xffffffffffffffff) write$binfmt_elf64(r2, &(0x7f00000002c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}], "", [[], []]}, 0x278) 03:43:41 executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000fe1000)={0x5, 0x83, 0x80, 0xf}, 0x1c) bpf$PROG_LOAD(0x5, &(0x7f0000fed000)={0x7, 0x9, &(0x7f00000000c0)=@framed={{}, [@map={0x18, 0x0, 0x1, 0x0, r0}, @map, @map]}, 0x0, 0x0, 0xe1, &(0x7f0000000000)=""/225, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) 03:43:41 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000fe1000)={0x5, 0x0, 0x80, 0xf}, 0x1c) 03:43:41 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x400007) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0x32600) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xb4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000040)='cpuset') write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000700)=ANY=[@ANYBLOB="006d176df3384ed3ddbcf3be0e26fd017529253262b78ee8b9d470"], 0x1b) ioctl$TUNSETCARRIER(0xffffffffffffffff, 0x400454e2, &(0x7f0000000080)=0x1) write$cgroup_int(r0, &(0x7f0000000380), 0x12) write$cgroup_int(r1, &(0x7f0000000400), 0xd) r2 = gettid() write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000000)=r2, 0x12) r3 = socket$kcm(0x2b, 0x0, 0x0) socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r3, 0x0, 0x0) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000280)=r2, 0x12) r4 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) close(r5) write$cgroup_type(r5, &(0x7f0000000080)='threaded\x00', 0xfffffc61) r6 = bpf$MAP_CREATE(0x2, &(0x7f0000009280), 0x3c) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x17, 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB], &(0x7f0000000200)='syzkaller\x00', 0xfa1, 0x0, 0x0, 0x41100, 0x2, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, &(0x7f0000000240), 0x8, 0x10, 0x0}, 0x78) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000008740)={0x0, 0x0, &(0x7f0000008700)=[{0x0}, {&(0x7f0000008680)=""/23, 0x17}, {&(0x7f00000086c0)=""/38, 0x26}], 0x3}, 0x8000) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x6, 0x2, 0x2e15579, 0x3f, 0x1, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffffff, 0x0, 0x5}, 0x3c) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0xb, [], 0x0, 0xc, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r7}, 0x7e) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r8, &(0x7f0000000000)=ANY=[], 0x50c000) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x18, 0x48, &(0x7f0000000a00)=ANY=[@ANYBLOB="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", @ANYRES32=r6, @ANYBLOB="00000000000000000c72c0fff6ffffff850000005b0000009500000000000000"], &(0x7f0000000040)='GPL\x00', 0x3ff, 0xd5, &(0x7f0000000080)=""/213, 0x61800, 0xab6c50112a8dd52c, [], 0x0, 0x16, 0xffffffffffffffff, 0x8, &(0x7f0000000180)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000001c0)={0x2, 0x6, 0x6, 0x5}, 0x10, 0x0, r8}, 0x78) bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x11, 0x5, 0x81, 0x2, 0x100, r5, 0x3, [], 0x0, 0xffffffffffffffff, 0x4, 0x3}, 0x3c) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r9, &(0x7f0000000200), 0x806000) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, r4, 0x0, 0x2a8, &(0x7f0000000440)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\a\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83CZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x98\x86\"R\x06\x00\x00\x00\x00\x00\x00\x00\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&\x014\x01\xf4\xb7\x83\x9a\xfa*\xa6\x06\xb7Pk7N\xc2\xd9\xee\xd0\xb0M\x00\xab\xc3\t\fc\xd8dx\xd5\x1dU*s)\x12[\x14\xb1\xc0\xd7\x1a\xa0\x16\xa2z\x9e\x93 \xddeF>29\v\x02\xa2b\x13R\xef\xffA,\xb9.$\xfa\x9f\xde[\x80\xd1=\xce\x1b\xeb\xf6\xf4\xe3z\x1f\x9dz\xa3\xc0\xe2\xa2\xb1\xeeq\xf5\xec0\x8e\xf4\xfb\xd9\x87\xf03\xdb\xae|\x10&V5c\xa6\xce\xcd\x8a\xdf\xe1\x89\"\xea\xde\xe7\xa3\xbe\xe7\xff\xf9 \x11\xfdY\xc6\xa1\xe8\xda\v\\?\xcb\x87\bn\x9b\x01\x1f\xf8\xe8\x1eV\xfaC\xdf\xc3Vv\x9b\x1a\xfc\x14.c\x94\xc9=\xb0\x0f!d\b\x18*@m\x7f\xaal\x17G\xd6?\x81\x16P\x03\x10e\xc3\xcd\xb1B\xeb\x01B\\\x91A\xa1\x8an\xb4#\xadr\x1e\x81v\xa2\x0e6x\xca\x8b\xa6\xd8\x81\x10:\x0e(\xdd\xfc\xc9\xc6\xb4\xf0\'f:\xbd\xfe\x11\xf8\xc8W\x81s^\xd9W\xf1\x94\xaf\xc5\x8a\xb4f\x1b\x17E\xb23\x12\xb0\xeb\xef\x8c\xb24h\xd7}\x7f\x92Hgej\x957\xe2A'}, 0x30) 03:43:41 executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000fe1000)={0x5, 0x83, 0x80, 0xf}, 0x1c) bpf$PROG_LOAD(0x5, &(0x7f0000fed000)={0x7, 0x9, &(0x7f00000000c0)=@framed={{}, [@map={0x18, 0x0, 0x1, 0x0, r0}, @map, @map]}, 0x0, 0x0, 0xe1, &(0x7f0000000000)=""/225, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) 03:43:41 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000fe1000)={0x5, 0x83, 0x0, 0xf}, 0x1c) [ 700.474280][T28559] IPVS: ftp: loaded support on port[0] = 21 03:43:41 executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000fe1000)={0x5, 0x83, 0x80, 0xf}, 0x1c) bpf$PROG_LOAD(0x5, &(0x7f0000fed000)={0x7, 0x9, &(0x7f00000000c0)=@framed={{}, [@map={0x18, 0x0, 0x1, 0x0, r0}, @map, @map]}, 0x0, 0x0, 0xe1, &(0x7f0000000000)=""/225, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) 03:43:41 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x238) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) writev(r0, &(0x7f0000000540)=[{&(0x7f0000000140)="cedbddea5b67f4290aa7fd7c0cc7e2e613891a59fd3dc2e8a3c6e7c9fa96", 0x1e}, {&(0x7f0000000340)="e4bc7c957b83ba155edae525e00f76c76056ac3fe8a5de5ccfba604ac6b0d4a0fd42802b43143a32d703bd21baddda61ba1cb78758f519c19a06193e8bfc0d1f1fad3be6885359773264bd153a2bf50591662cca307c7a22f8a9e70629a1beac22b823bfee7fec832958c20007e0b8707c6ac0e8b1", 0x75}, {&(0x7f00000004c0)="4b8043af3b13f04c3ee02ee028e584b538cfb06be329d5ca0649880187b5cd5ff601bf73", 0x24}, {&(0x7f0000000800)="87cfb3bd1ada6e425bdd5aaccdaf", 0xe}], 0x4) sendto$inet(r0, &(0x7f00000012c0)="0c268a927f1f6588b967481241ba7860005cf65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95425a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x27) 03:43:41 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x238) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) writev(r0, &(0x7f0000000540)=[{&(0x7f0000000140)="cedbddea5b67f4290aa7fd7c0cc7e2e613891a59fd3dc2e8a3c6e7c9fa96", 0x1e}, {&(0x7f0000000340)="e4bc7c957b83ba155edae525e00f76c76056ac3fe8a5de5ccfba604ac6b0d4a0fd42802b43143a32d703bd21baddda61ba1cb78758f519c19a06193e8b", 0x3d}, {0x0}], 0x3) sendto$inet(r0, &(0x7f00000012c0)="0c268a927f1f6588b967481241ba7860005cf65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95425a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x27) 03:43:41 executing program 5: openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) ioctl$RNDADDENTROPY(0xffffffffffffffff, 0x40085203, &(0x7f0000000100)={0x6, 0xbc, "56f80f8d7c9ad684157765ee68815e033b7b2972a2d067318db9ac518603e0dbae813e160bd3f15b30c226056579cf64ac2525dd44c15e56204f1e3f1b8c03b31f4281605682d4b39a61b89636b3a2a5ea0bd3f5e8bd40d8c0406969d18fed78e4f4108902b5959ec383c40036f5262e703d6ad6a7a486302c382e45645bfe4c472249b482a28e9519e744cdbe884985d913612a17250eab7e4f0bf4b35aab9f7b923116a8d30baf612ca3bc2ef9b3f8d1c6b570cb60bd8d5b6805ce"}) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_sctp(0x2, 0x5, 0x84) dup3(0xffffffffffffffff, r0, 0x0) socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp_SCTP_AUTH_DEACTIVATE_KEY(0xffffffffffffffff, 0x84, 0x23, 0x0, 0x0) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f00000000c0)={0x51, 0xfffc, 0x0, {0x103, 0xf1}, {0x9}, @ramp={0x2, 0x3, {0x7fff, 0x0, 0x7, 0x7}}}) r1 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r1, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @bcast, @rose, @rose, @null]}, 0x48) listen(r1, 0x0) unshare(0x40000000) r2 = accept(r1, 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r3, 0xffffffffffffffff) write$binfmt_elf64(r2, &(0x7f00000002c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}], "", [[], []]}, 0x278) 03:43:41 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x400007) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0x32600) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xb4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000040)='cpuset') write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000700)=ANY=[@ANYBLOB="006d176df3384ed3ddbcf3be0e26fd017529253262b78ee8b9d470"], 0x1b) ioctl$TUNSETCARRIER(0xffffffffffffffff, 0x400454e2, &(0x7f0000000080)=0x1) write$cgroup_int(r0, &(0x7f0000000380), 0x12) write$cgroup_int(r1, &(0x7f0000000400), 0xd) r2 = gettid() write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000000)=r2, 0x12) r3 = socket$kcm(0x2b, 0x0, 0x0) socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r3, 0x0, 0x0) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000280)=r2, 0x12) r4 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) close(r5) write$cgroup_type(r5, &(0x7f0000000080)='threaded\x00', 0xfffffc61) r6 = bpf$MAP_CREATE(0x2, &(0x7f0000009280), 0x3c) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x17, 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB], &(0x7f0000000200)='syzkaller\x00', 0xfa1, 0x0, 0x0, 0x41100, 0x2, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, &(0x7f0000000240), 0x8, 0x10, 0x0}, 0x78) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000008740)={0x0, 0x0, &(0x7f0000008700)=[{0x0}, {&(0x7f0000008680)=""/23, 0x17}, {&(0x7f00000086c0)=""/38, 0x26}], 0x3}, 0x8000) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x6, 0x2, 0x2e15579, 0x3f, 0x1, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffffff, 0x0, 0x5}, 0x3c) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0xb, [], 0x0, 0xc, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r7}, 0x7e) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r8, &(0x7f0000000000)=ANY=[], 0x50c000) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x18, 0x48, &(0x7f0000000a00)=ANY=[@ANYBLOB="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", @ANYRES32=r6, @ANYBLOB="00000000000000000c72c0fff6ffffff850000005b0000009500000000000000"], &(0x7f0000000040)='GPL\x00', 0x3ff, 0xd5, &(0x7f0000000080)=""/213, 0x61800, 0xab6c50112a8dd52c, [], 0x0, 0x16, 0xffffffffffffffff, 0x8, &(0x7f0000000180)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000001c0)={0x2, 0x6, 0x6, 0x5}, 0x10, 0x0, r8}, 0x78) bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x11, 0x5, 0x81, 0x2, 0x100, r5, 0x3, [], 0x0, 0xffffffffffffffff, 0x4, 0x3}, 0x3c) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r9, &(0x7f0000000200), 0x806000) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, r4, 0x0, 0x2a8, &(0x7f0000000440)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\a\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83CZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x98\x86\"R\x06\x00\x00\x00\x00\x00\x00\x00\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&\x014\x01\xf4\xb7\x83\x9a\xfa*\xa6\x06\xb7Pk7N\xc2\xd9\xee\xd0\xb0M\x00\xab\xc3\t\fc\xd8dx\xd5\x1dU*s)\x12[\x14\xb1\xc0\xd7\x1a\xa0\x16\xa2z\x9e\x93 \xddeF>29\v\x02\xa2b\x13R\xef\xffA,\xb9.$\xfa\x9f\xde[\x80\xd1=\xce\x1b\xeb\xf6\xf4\xe3z\x1f\x9dz\xa3\xc0\xe2\xa2\xb1\xeeq\xf5\xec0\x8e\xf4\xfb\xd9\x87\xf03\xdb\xae|\x10&V5c\xa6\xce\xcd\x8a\xdf\xe1\x89\"\xea\xde\xe7\xa3\xbe\xe7\xff\xf9 \x11\xfdY\xc6\xa1\xe8\xda\v\\?\xcb\x87\bn\x9b\x01\x1f\xf8\xe8\x1eV\xfaC\xdf\xc3Vv\x9b\x1a\xfc\x14.c\x94\xc9=\xb0\x0f!d\b\x18*@m\x7f\xaal\x17G\xd6?\x81\x16P\x03\x10e\xc3\xcd\xb1B\xeb\x01B\\\x91A\xa1\x8an\xb4#\xadr\x1e\x81v\xa2\x0e6x\xca\x8b\xa6\xd8\x81\x10:\x0e(\xdd\xfc\xc9\xc6\xb4\xf0\'f:\xbd\xfe\x11\xf8\xc8W\x81s^\xd9W\xf1\x94\xaf\xc5\x8a\xb4f\x1b\x17E\xb23\x12\xb0\xeb\xef\x8c\xb24h\xd7}\x7f\x92Hgej\x957\xe2A'}, 0x30) 03:43:41 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000fe1000)={0x5, 0x83, 0x0, 0xf}, 0x1c) 03:43:41 executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000fe1000)={0x5, 0x83, 0x80, 0xf}, 0x1c) bpf$PROG_LOAD(0x5, &(0x7f0000fed000)={0x7, 0x9, &(0x7f00000000c0)=@framed={{}, [@map={0x18, 0x0, 0x1, 0x0, r0}, @map, @map]}, &(0x7f0000919ff6)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) [ 700.997702][T28582] IPVS: ftp: loaded support on port[0] = 21 03:43:42 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000fe1000)={0x5, 0x83, 0x0, 0xf}, 0x1c) 03:43:42 executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000fe1000)={0x5, 0x83, 0x80, 0xf}, 0x1c) bpf$PROG_LOAD(0x5, &(0x7f0000fed000)={0x7, 0x9, &(0x7f00000000c0)=@framed={{}, [@map={0x18, 0x0, 0x1, 0x0, r0}, @map, @map]}, &(0x7f0000919ff6)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) 03:43:42 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x400007) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0x32600) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xb4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000040)='cpuset') write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000700)=ANY=[@ANYBLOB="006d176df3384ed3ddbcf3be0e26fd017529253262b78ee8b9d470"], 0x1b) ioctl$TUNSETCARRIER(0xffffffffffffffff, 0x400454e2, &(0x7f0000000080)=0x1) write$cgroup_int(r0, &(0x7f0000000380), 0x12) write$cgroup_int(r1, &(0x7f0000000400), 0xd) r2 = gettid() write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000000)=r2, 0x12) r3 = socket$kcm(0x2b, 0x0, 0x0) socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r3, 0x0, 0x0) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000280)=r2, 0x12) r4 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) close(r5) write$cgroup_type(r5, &(0x7f0000000080)='threaded\x00', 0xfffffc61) r6 = bpf$MAP_CREATE(0x2, &(0x7f0000009280), 0x3c) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x17, 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB], &(0x7f0000000200)='syzkaller\x00', 0xfa1, 0x0, 0x0, 0x41100, 0x2, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, &(0x7f0000000240), 0x8, 0x10, 0x0}, 0x78) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000008740)={0x0, 0x0, &(0x7f0000008700)=[{0x0}, {&(0x7f0000008680)=""/23, 0x17}, {&(0x7f00000086c0)=""/38, 0x26}], 0x3}, 0x8000) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x6, 0x2, 0x2e15579, 0x3f, 0x1, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffffff, 0x0, 0x5}, 0x3c) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0xb, [], 0x0, 0xc, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r7}, 0x7e) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r8, &(0x7f0000000000)=ANY=[], 0x50c000) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x18, 0x48, &(0x7f0000000a00)=ANY=[@ANYBLOB="0000752c0000000000000000ffffffff9500000000000000181400006200ed587c1ba87fb23af22b6cf03fb851054ce322d4b3a5894516c0c1479e1cfbf3061ad7aef6d6c36e4e74a8219f8441192ab16361719f26a1e543525c94027f7a5f275546d8cacee044fc20d858e268019caeb1633cc4888faa05d02cd44de32962e022697754125edcfb3477c4e122a0e97ab43de94a7a94efd527400e2c2ff4468fd6e773773f089b268fddef712ab174487ae9049f64895522be3862156a1af15513c3ff285844c9aae255d74c0dacf6c47d6809ce69ee6e41a03a03b29152ee43afabd82aa883f260995238aa70895dc3aee59a119dc82fb5fd00af56ded09336e2df6a0bb41bd191d57b35eb262a1aa8d5fec51b24500685f8c0adaf3639790fdbd7cb2ac3af37a802a6ac7265a819c91986c45e7c54d91c5ced552d96c04a80c063fee16b3a52bc603deebe32e4e0dfdfe9d03658daad65606e175041076684110e66f74db9509b1a29e765c9208ddba13e3b42b3963dce5432c4fb7844a9b64c518820c9c0198fadb6ea6a350f89a1eb1a3c1e20527ce574c3514f9ad62be70eee070faa267d83564e6db87e4d16ccd118397c2e4825140e6b46c35edb77df7b9a3334ad3f8cb70b73f4b9d8b29eb50b2c2dfc8d82841a6251fcfcb978ce90873ddcfa0125800302f5ed70c724e0253fb45955750f1e7c94ca05a91ec592ee3a52fad94c89205ece2d1d96afbfa0b59f9bd6c1161c638fff8696973fedca3f3ddf", @ANYRES32=r6, @ANYBLOB="00000000000000000c72c0fff6ffffff850000005b0000009500000000000000"], &(0x7f0000000040)='GPL\x00', 0x3ff, 0xd5, &(0x7f0000000080)=""/213, 0x61800, 0xab6c50112a8dd52c, [], 0x0, 0x16, 0xffffffffffffffff, 0x8, &(0x7f0000000180)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000001c0)={0x2, 0x6, 0x6, 0x5}, 0x10, 0x0, r8}, 0x78) bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x11, 0x5, 0x81, 0x2, 0x100, r5, 0x3, [], 0x0, 0xffffffffffffffff, 0x4, 0x3}, 0x3c) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r9, &(0x7f0000000200), 0x806000) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, r4, 0x0, 0x2a8, &(0x7f0000000440)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\a\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83CZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x98\x86\"R\x06\x00\x00\x00\x00\x00\x00\x00\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&\x014\x01\xf4\xb7\x83\x9a\xfa*\xa6\x06\xb7Pk7N\xc2\xd9\xee\xd0\xb0M\x00\xab\xc3\t\fc\xd8dx\xd5\x1dU*s)\x12[\x14\xb1\xc0\xd7\x1a\xa0\x16\xa2z\x9e\x93 \xddeF>29\v\x02\xa2b\x13R\xef\xffA,\xb9.$\xfa\x9f\xde[\x80\xd1=\xce\x1b\xeb\xf6\xf4\xe3z\x1f\x9dz\xa3\xc0\xe2\xa2\xb1\xeeq\xf5\xec0\x8e\xf4\xfb\xd9\x87\xf03\xdb\xae|\x10&V5c\xa6\xce\xcd\x8a\xdf\xe1\x89\"\xea\xde\xe7\xa3\xbe\xe7\xff\xf9 \x11\xfdY\xc6\xa1\xe8\xda\v\\?\xcb\x87\bn\x9b\x01\x1f\xf8\xe8\x1eV\xfaC\xdf\xc3Vv\x9b\x1a\xfc\x14.c\x94\xc9=\xb0\x0f!d\b\x18*@m\x7f\xaal\x17G\xd6?\x81\x16P\x03\x10e\xc3\xcd\xb1B\xeb\x01B\\\x91A\xa1\x8an\xb4#\xadr\x1e\x81v\xa2\x0e6x\xca\x8b\xa6\xd8\x81\x10:\x0e(\xdd\xfc\xc9\xc6\xb4\xf0\'f:\xbd\xfe\x11\xf8\xc8W\x81s^\xd9W\xf1\x94\xaf\xc5\x8a\xb4f\x1b\x17E\xb23\x12\xb0\xeb\xef\x8c\xb24h\xd7}\x7f\x92Hgej\x957\xe2A'}, 0x30) 03:43:42 executing program 5: openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) ioctl$RNDADDENTROPY(0xffffffffffffffff, 0x40085203, &(0x7f0000000100)={0x6, 0xbc, "56f80f8d7c9ad684157765ee68815e033b7b2972a2d067318db9ac518603e0dbae813e160bd3f15b30c226056579cf64ac2525dd44c15e56204f1e3f1b8c03b31f4281605682d4b39a61b89636b3a2a5ea0bd3f5e8bd40d8c0406969d18fed78e4f4108902b5959ec383c40036f5262e703d6ad6a7a486302c382e45645bfe4c472249b482a28e9519e744cdbe884985d913612a17250eab7e4f0bf4b35aab9f7b923116a8d30baf612ca3bc2ef9b3f8d1c6b570cb60bd8d5b6805ce"}) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_sctp(0x2, 0x5, 0x84) dup3(0xffffffffffffffff, r0, 0x0) socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp_SCTP_AUTH_DEACTIVATE_KEY(0xffffffffffffffff, 0x84, 0x23, 0x0, 0x0) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f00000000c0)={0x51, 0xfffc, 0x0, {0x103, 0xf1}, {0x9}, @ramp={0x2, 0x3, {0x7fff, 0x0, 0x7, 0x7}}}) r1 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r1, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @bcast, @rose, @rose, @null]}, 0x48) listen(r1, 0x0) unshare(0x40000000) r2 = accept(r1, 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r3, 0xffffffffffffffff) write$binfmt_elf64(r2, &(0x7f00000002c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}], "", [[], []]}, 0x278) 03:43:42 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x238) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) writev(r0, &(0x7f0000000540)=[{&(0x7f0000000140)="cedbddea5b67f4290aa7fd7c0cc7e2e613891a59fd3dc2e8a3c6e7c9fa96", 0x1e}, {&(0x7f0000000340)="e4bc7c957b83ba155edae525e00f76c76056ac3fe8a5de5ccfba604ac6b0d4a0fd42802b43143a32d703bd21baddda61ba1cb78758f519c19a06193e8bfc0d1f1fad3be6885359773264bd153a2bf50591662cca307c7a22f8a9e70629a1beac22b823bfee7fec832958c20007e0b8707c6ac0e8b1", 0x75}, {&(0x7f00000004c0)="4b8043af3b13f04c3ee02ee028e584b538cfb06be329d5ca0649880187b5cd5ff601bf73", 0x24}, {&(0x7f0000000800)="87cfb3bd1ada6e425bdd5aaccdafa6e4", 0x10}], 0x4) sendto$inet(r0, &(0x7f00000012c0)="0c268a927f1f6588b967481241ba7860005cf65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95425a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x27) 03:43:42 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x238) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) writev(r0, &(0x7f0000000540)=[{&(0x7f0000000140)="cedbddea5b67f4290aa7fd7c0cc7e2e613891a59fd3dc2e8a3c6e7c9fa96", 0x1e}, {&(0x7f0000000340)="e4bc7c957b83ba155edae525e00f76c76056ac3fe8a5de5ccfba604ac6b0d4a0fd42802b43143a32d703bd21baddda61ba1cb78758f519c19a06193e8bfc0d1f1fad3be6", 0x44}, {0x0}], 0x3) sendto$inet(r0, &(0x7f00000012c0)="0c268a927f1f6588b967481241ba7860005cf65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95425a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x27) [ 701.532255][T28607] IPVS: ftp: loaded support on port[0] = 21 [ 701.560537][T27358] tipc: TX() has been purged, node left! [ 701.566970][T27358] tipc: TX() has been purged, node left! 03:43:42 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000fe1000)={0x5, 0x83, 0x80}, 0x1c) [ 701.596892][T27358] tipc: TX() has been purged, node left! [ 701.606105][T27358] tipc: TX() has been purged, node left! [ 701.627860][T27358] tipc: TX() has been purged, node left! 03:43:42 executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000fe1000)={0x5, 0x83, 0x80, 0xf}, 0x1c) bpf$PROG_LOAD(0x5, &(0x7f0000fed000)={0x7, 0x9, &(0x7f00000000c0)=@framed={{}, [@map={0x18, 0x0, 0x1, 0x0, r0}, @map, @map]}, &(0x7f0000919ff6)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) [ 701.646755][T27358] tipc: TX() has been purged, node left! [ 701.660403][T27358] tipc: TX() has been purged, node left! [ 701.673943][T27358] tipc: TX() has been purged, node left! 03:43:42 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000fe1000)={0x5, 0x83, 0x80}, 0x1c) [ 701.826478][T27358] tipc: TX() has been purged, node left! 03:43:42 executing program 5: openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) ioctl$RNDADDENTROPY(0xffffffffffffffff, 0x40085203, &(0x7f0000000100)={0x6, 0xbc, "56f80f8d7c9ad684157765ee68815e033b7b2972a2d067318db9ac518603e0dbae813e160bd3f15b30c226056579cf64ac2525dd44c15e56204f1e3f1b8c03b31f4281605682d4b39a61b89636b3a2a5ea0bd3f5e8bd40d8c0406969d18fed78e4f4108902b5959ec383c40036f5262e703d6ad6a7a486302c382e45645bfe4c472249b482a28e9519e744cdbe884985d913612a17250eab7e4f0bf4b35aab9f7b923116a8d30baf612ca3bc2ef9b3f8d1c6b570cb60bd8d5b6805ce"}) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_sctp(0x2, 0x5, 0x84) dup3(0xffffffffffffffff, r0, 0x0) socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp_SCTP_AUTH_DEACTIVATE_KEY(0xffffffffffffffff, 0x84, 0x23, 0x0, 0x0) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f00000000c0)={0x51, 0xfffc, 0x0, {0x103, 0xf1}, {0x9}, @ramp={0x2, 0x3, {0x7fff, 0x0, 0x7, 0x7}}}) r1 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r1, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @bcast, @rose, @rose, @null]}, 0x48) listen(r1, 0x0) unshare(0x40000000) r2 = accept(r1, 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r3, 0xffffffffffffffff) write$binfmt_elf64(r2, &(0x7f00000002c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}], "", [[], []]}, 0x278) 03:43:42 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x400007) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0x32600) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xb4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000040)='cpuset') write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000700)=ANY=[@ANYBLOB="006d176df3384ed3ddbcf3be0e26fd017529253262b78ee8b9d470"], 0x1b) ioctl$TUNSETCARRIER(0xffffffffffffffff, 0x400454e2, &(0x7f0000000080)=0x1) write$cgroup_int(r0, &(0x7f0000000380), 0x12) write$cgroup_int(r1, &(0x7f0000000400), 0xd) r2 = gettid() write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000000)=r2, 0x12) r3 = socket$kcm(0x2b, 0x0, 0x0) socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r3, 0x0, 0x0) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000280)=r2, 0x12) r4 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) close(r5) write$cgroup_type(r5, &(0x7f0000000080)='threaded\x00', 0xfffffc61) r6 = bpf$MAP_CREATE(0x2, &(0x7f0000009280), 0x3c) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x17, 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB], &(0x7f0000000200)='syzkaller\x00', 0xfa1, 0x0, 0x0, 0x41100, 0x2, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, &(0x7f0000000240), 0x8, 0x10, 0x0}, 0x78) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000008740)={0x0, 0x0, &(0x7f0000008700)=[{0x0}, {&(0x7f0000008680)=""/23, 0x17}, {&(0x7f00000086c0)=""/38, 0x26}], 0x3}, 0x8000) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x6, 0x2, 0x2e15579, 0x3f, 0x1, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffffff, 0x0, 0x5}, 0x3c) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0xb, [], 0x0, 0xc, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r7}, 0x7e) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r8, &(0x7f0000000000)=ANY=[], 0x50c000) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x18, 0x48, &(0x7f0000000a00)=ANY=[@ANYBLOB="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", @ANYRES32=r6, @ANYBLOB="00000000000000000c72c0fff6ffffff850000005b0000009500000000000000"], &(0x7f0000000040)='GPL\x00', 0x3ff, 0xd5, &(0x7f0000000080)=""/213, 0x61800, 0xab6c50112a8dd52c, [], 0x0, 0x16, 0xffffffffffffffff, 0x8, &(0x7f0000000180)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000001c0)={0x2, 0x6, 0x6, 0x5}, 0x10, 0x0, r8}, 0x78) bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x11, 0x5, 0x81, 0x2, 0x100, r5, 0x3, [], 0x0, 0xffffffffffffffff, 0x4, 0x3}, 0x3c) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r9, &(0x7f0000000200), 0x806000) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, r4, 0x0, 0x2a8, &(0x7f0000000440)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\a\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83CZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x98\x86\"R\x06\x00\x00\x00\x00\x00\x00\x00\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&\x014\x01\xf4\xb7\x83\x9a\xfa*\xa6\x06\xb7Pk7N\xc2\xd9\xee\xd0\xb0M\x00\xab\xc3\t\fc\xd8dx\xd5\x1dU*s)\x12[\x14\xb1\xc0\xd7\x1a\xa0\x16\xa2z\x9e\x93 \xddeF>29\v\x02\xa2b\x13R\xef\xffA,\xb9.$\xfa\x9f\xde[\x80\xd1=\xce\x1b\xeb\xf6\xf4\xe3z\x1f\x9dz\xa3\xc0\xe2\xa2\xb1\xeeq\xf5\xec0\x8e\xf4\xfb\xd9\x87\xf03\xdb\xae|\x10&V5c\xa6\xce\xcd\x8a\xdf\xe1\x89\"\xea\xde\xe7\xa3\xbe\xe7\xff\xf9 \x11\xfdY\xc6\xa1\xe8\xda\v\\?\xcb\x87\bn\x9b\x01\x1f\xf8\xe8\x1eV\xfaC\xdf\xc3Vv\x9b\x1a\xfc\x14.c\x94\xc9=\xb0\x0f!d\b\x18*@m\x7f\xaal\x17G\xd6?\x81\x16P\x03\x10e\xc3\xcd\xb1B\xeb\x01B\\\x91A\xa1\x8an\xb4#\xadr\x1e\x81v\xa2\x0e6x\xca\x8b\xa6\xd8\x81\x10:\x0e(\xdd\xfc\xc9\xc6\xb4\xf0\'f:\xbd\xfe\x11\xf8\xc8W\x81s^\xd9W\xf1\x94\xaf\xc5\x8a\xb4f\x1b\x17E\xb23\x12\xb0\xeb\xef\x8c\xb24h\xd7}\x7f\x92Hgej\x957\xe2A'}, 0x30) [ 701.976390][T27358] tipc: TX() has been purged, node left! 03:43:43 executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000fe1000)={0x5, 0x83, 0x80, 0xf}, 0x1c) bpf$PROG_LOAD(0x5, &(0x7f0000fed000)={0x7, 0x9, &(0x7f00000000c0)=@framed={{}, [@map={0x18, 0x0, 0x1, 0x0, r0}, @map, @map]}, &(0x7f0000919ff6)='syzkaller\x00', 0x0, 0xe1, &(0x7f0000000000)=""/225, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x78) 03:43:43 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000fe1000)={0x5, 0x83, 0x80}, 0x1c) [ 702.156607][T27358] tipc: TX() has been purged, node left! 03:43:43 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x238) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) writev(r0, &(0x7f0000000540)=[{&(0x7f0000000140)="cedbddea5b67f4290aa7fd7c0cc7e2e613891a59fd3dc2e8a3c6e7c9fa96", 0x1e}, {&(0x7f0000000340)="e4bc7c957b83ba155edae525e00f76c76056ac3fe8a5de5ccfba604ac6b0d4a0fd42802b43143a32d703bd21baddda61ba1cb78758f519c19a06193e8bfc0d1f1fad3be6", 0x44}, {0x0}], 0x3) sendto$inet(r0, &(0x7f00000012c0)="0c268a927f1f6588b967481241ba7860005cf65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95425a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x27) 03:43:43 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x238) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) writev(r0, &(0x7f0000000540)=[{&(0x7f0000000140)="cedbddea5b67f4290aa7fd7c0cc7e2e613891a59fd3dc2e8a3c6e7c9fa96", 0x1e}, {&(0x7f0000000340)="e4bc7c957b83ba155edae525e00f76c76056ac3fe8a5de5ccfba604ac6b0d4a0fd42802b43143a32d703bd21baddda61ba1cb78758f519c19a06193e8bfc0d1f1fad3be6885359773264bd153a2bf50591662cca307c7a22f8a9e70629a1beac22b823bfee7fec832958c20007e0b8707c6ac0e8b1", 0x75}, {&(0x7f00000004c0)="4b8043af3b13f04c3ee02ee028e584b538cfb06be329d5ca0649880187b5cd5ff601bf73", 0x24}, {&(0x7f0000000800)="87cfb3bd1ada6e425bdd5aaccdafa6e4", 0x10}], 0x4) sendto$inet(r0, &(0x7f00000012c0)="0c268a927f1f6588b967481241ba7860005cf65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95425a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x27) 03:43:43 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) sendmmsg$inet(r0, &(0x7f0000001100)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000001340)="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", 0x2d9}], 0x1}}], 0x1, 0x0) 03:43:43 executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000fe1000)={0x5, 0x83, 0x80, 0xf}, 0x1c) bpf$PROG_LOAD(0x5, &(0x7f0000fed000)={0x7, 0x9, &(0x7f00000000c0)=@framed={{}, [@map={0x18, 0x0, 0x1, 0x0, r0}, @map, @map]}, &(0x7f0000919ff6)='syzkaller\x00', 0x0, 0xe1, &(0x7f0000000000)=""/225, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x78) [ 702.270421][T28637] IPVS: ftp: loaded support on port[0] = 21 [ 702.326431][T27358] tipc: TX() has been purged, node left! [ 702.382509][T27358] tipc: TX() has been purged, node left! [ 702.388555][T27358] tipc: TX() has been purged, node left! [ 702.436666][T27358] tipc: TX() has been purged, node left! [ 702.472179][T27358] tipc: TX() has been purged, node left! 03:43:43 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x400007) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0x32600) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xb4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000040)='cpuset') write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000700)=ANY=[@ANYBLOB="006d176df3384ed3ddbcf3be0e26fd017529253262b78ee8b9d470"], 0x1b) ioctl$TUNSETCARRIER(0xffffffffffffffff, 0x400454e2, &(0x7f0000000080)=0x1) write$cgroup_int(r0, &(0x7f0000000380), 0x12) write$cgroup_int(r1, &(0x7f0000000400), 0xd) r2 = gettid() write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000000)=r2, 0x12) r3 = socket$kcm(0x2b, 0x0, 0x0) socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r3, 0x0, 0x0) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000280)=r2, 0x12) r4 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) close(r5) write$cgroup_type(r5, &(0x7f0000000080)='threaded\x00', 0xfffffc61) r6 = bpf$MAP_CREATE(0x2, &(0x7f0000009280), 0x3c) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x17, 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB], &(0x7f0000000200)='syzkaller\x00', 0xfa1, 0x0, 0x0, 0x41100, 0x2, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, &(0x7f0000000240), 0x8, 0x10, 0x0}, 0x78) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000008740)={0x0, 0x0, &(0x7f0000008700)=[{0x0}, {&(0x7f0000008680)=""/23, 0x17}, {&(0x7f00000086c0)=""/38, 0x26}], 0x3}, 0x8000) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x6, 0x2, 0x2e15579, 0x3f, 0x1, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffffff, 0x0, 0x5}, 0x3c) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0xb, [], 0x0, 0xc, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r7}, 0x7e) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r8, &(0x7f0000000000)=ANY=[], 0x50c000) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x18, 0x48, &(0x7f0000000a00)=ANY=[@ANYBLOB="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", @ANYRES32=r6, @ANYBLOB="00000000000000000c72c0fff6ffffff850000005b0000009500000000000000"], &(0x7f0000000040)='GPL\x00', 0x3ff, 0xd5, &(0x7f0000000080)=""/213, 0x61800, 0xab6c50112a8dd52c, [], 0x0, 0x16, 0xffffffffffffffff, 0x8, &(0x7f0000000180)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000001c0)={0x2, 0x6, 0x6, 0x5}, 0x10, 0x0, r8}, 0x78) bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x11, 0x5, 0x81, 0x2, 0x100, r5, 0x3, [], 0x0, 0xffffffffffffffff, 0x4, 0x3}, 0x3c) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r9, &(0x7f0000000200), 0x806000) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, r4, 0x0, 0x2a8, &(0x7f0000000440)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\a\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83CZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x98\x86\"R\x06\x00\x00\x00\x00\x00\x00\x00\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&\x014\x01\xf4\xb7\x83\x9a\xfa*\xa6\x06\xb7Pk7N\xc2\xd9\xee\xd0\xb0M\x00\xab\xc3\t\fc\xd8dx\xd5\x1dU*s)\x12[\x14\xb1\xc0\xd7\x1a\xa0\x16\xa2z\x9e\x93 \xddeF>29\v\x02\xa2b\x13R\xef\xffA,\xb9.$\xfa\x9f\xde[\x80\xd1=\xce\x1b\xeb\xf6\xf4\xe3z\x1f\x9dz\xa3\xc0\xe2\xa2\xb1\xeeq\xf5\xec0\x8e\xf4\xfb\xd9\x87\xf03\xdb\xae|\x10&V5c\xa6\xce\xcd\x8a\xdf\xe1\x89\"\xea\xde\xe7\xa3\xbe\xe7\xff\xf9 \x11\xfdY\xc6\xa1\xe8\xda\v\\?\xcb\x87\bn\x9b\x01\x1f\xf8\xe8\x1eV\xfaC\xdf\xc3Vv\x9b\x1a\xfc\x14.c\x94\xc9=\xb0\x0f!d\b\x18*@m\x7f\xaal\x17G\xd6?\x81\x16P\x03\x10e\xc3\xcd\xb1B\xeb\x01B\\\x91A\xa1\x8an\xb4#\xadr\x1e\x81v\xa2\x0e6x\xca\x8b\xa6\xd8\x81\x10:\x0e(\xdd\xfc\xc9\xc6\xb4\xf0\'f:\xbd\xfe\x11\xf8\xc8W\x81s^\xd9W\xf1\x94\xaf\xc5\x8a\xb4f\x1b\x17E\xb23\x12\xb0\xeb\xef\x8c\xb24h\xd7}\x7f\x92Hgej\x957\xe2A'}, 0x30) 03:43:43 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) sendmmsg$inet(r0, &(0x7f0000001100)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000001340)="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", 0x2d9}], 0x1}}], 0x1, 0x0) 03:43:43 executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000fe1000)={0x5, 0x83, 0x80, 0xf}, 0x1c) bpf$PROG_LOAD(0x5, &(0x7f0000fed000)={0x7, 0x9, &(0x7f00000000c0)=@framed={{}, [@map={0x18, 0x0, 0x1, 0x0, r0}, @map, @map]}, &(0x7f0000919ff6)='syzkaller\x00', 0x0, 0xe1, &(0x7f0000000000)=""/225, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x78) 03:43:43 executing program 5: openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) ioctl$RNDADDENTROPY(0xffffffffffffffff, 0x40085203, &(0x7f0000000100)={0x6, 0xbc, "56f80f8d7c9ad684157765ee68815e033b7b2972a2d067318db9ac518603e0dbae813e160bd3f15b30c226056579cf64ac2525dd44c15e56204f1e3f1b8c03b31f4281605682d4b39a61b89636b3a2a5ea0bd3f5e8bd40d8c0406969d18fed78e4f4108902b5959ec383c40036f5262e703d6ad6a7a486302c382e45645bfe4c472249b482a28e9519e744cdbe884985d913612a17250eab7e4f0bf4b35aab9f7b923116a8d30baf612ca3bc2ef9b3f8d1c6b570cb60bd8d5b6805ce"}) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_sctp(0x2, 0x5, 0x84) dup3(0xffffffffffffffff, r0, 0x0) socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp_SCTP_AUTH_DEACTIVATE_KEY(0xffffffffffffffff, 0x84, 0x23, 0x0, 0x0) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f00000000c0)={0x51, 0xfffc, 0x0, {0x103, 0xf1}, {0x9}, @ramp={0x2, 0x3, {0x7fff, 0x0, 0x7, 0x7}}}) r1 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r1, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @bcast, @rose, @rose, @null]}, 0x48) listen(r1, 0x0) unshare(0x40000000) r2 = accept(r1, 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r3, 0xffffffffffffffff) write$binfmt_elf64(r2, &(0x7f00000002c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}], "", [[], []]}, 0x278) 03:43:43 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x400007) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0x32600) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xb4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000040)='cpuset') write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000700)=ANY=[@ANYBLOB="006d176df3384ed3ddbcf3be0e26fd017529253262b78ee8b9d470"], 0x1b) ioctl$TUNSETCARRIER(0xffffffffffffffff, 0x400454e2, &(0x7f0000000080)=0x1) write$cgroup_int(r0, &(0x7f0000000380), 0x12) write$cgroup_int(r1, &(0x7f0000000400), 0xd) r2 = gettid() write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000000)=r2, 0x12) r3 = socket$kcm(0x2b, 0x0, 0x0) socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r3, 0x0, 0x0) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000280)=r2, 0x12) r4 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) close(r5) write$cgroup_type(r5, &(0x7f0000000080)='threaded\x00', 0xfffffc61) r6 = bpf$MAP_CREATE(0x2, &(0x7f0000009280), 0x3c) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x17, 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB], &(0x7f0000000200)='syzkaller\x00', 0xfa1, 0x0, 0x0, 0x41100, 0x2, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, &(0x7f0000000240), 0x8, 0x10, 0x0}, 0x78) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000008740)={0x0, 0x0, &(0x7f0000008700)=[{0x0}, {&(0x7f0000008680)=""/23, 0x17}, {&(0x7f00000086c0)=""/38, 0x26}], 0x3}, 0x8000) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x6, 0x2, 0x2e15579, 0x3f, 0x1, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffffff, 0x0, 0x5}, 0x3c) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0xb, [], 0x0, 0xc, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r7}, 0x7e) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r8, &(0x7f0000000000)=ANY=[], 0x50c000) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x18, 0x49, &(0x7f0000000a00)=ANY=[@ANYBLOB="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", @ANYRES32=r6, @ANYBLOB="00000000000000000c72c0fff6ffffff850000005b0000009500000000000000"], &(0x7f0000000040)='GPL\x00', 0x3ff, 0xd5, &(0x7f0000000080)=""/213, 0x61800, 0xab6c50112a8dd52c, [], 0x0, 0x16, 0xffffffffffffffff, 0x8, &(0x7f0000000180)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000001c0)={0x2, 0x6, 0x6, 0x5}, 0x10, 0x0, r8}, 0x78) bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x11, 0x5, 0x81, 0x2, 0x100, r5, 0x3, [], 0x0, 0xffffffffffffffff, 0x4, 0x3}, 0x3c) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r9, &(0x7f0000000200), 0x806000) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, r4, 0x0, 0x2a8, &(0x7f0000000440)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\a\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83CZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x98\x86\"R\x06\x00\x00\x00\x00\x00\x00\x00\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&\x014\x01\xf4\xb7\x83\x9a\xfa*\xa6\x06\xb7Pk7N\xc2\xd9\xee\xd0\xb0M\x00\xab\xc3\t\fc\xd8dx\xd5\x1dU*s)\x12[\x14\xb1\xc0\xd7\x1a\xa0\x16\xa2z\x9e\x93 \xddeF>29\v\x02\xa2b\x13R\xef\xffA,\xb9.$\xfa\x9f\xde[\x80\xd1=\xce\x1b\xeb\xf6\xf4\xe3z\x1f\x9dz\xa3\xc0\xe2\xa2\xb1\xeeq\xf5\xec0\x8e\xf4\xfb\xd9\x87\xf03\xdb\xae|\x10&V5c\xa6\xce\xcd\x8a\xdf\xe1\x89\"\xea\xde\xe7\xa3\xbe\xe7\xff\xf9 \x11\xfdY\xc6\xa1\xe8\xda\v\\?\xcb\x87\bn\x9b\x01\x1f\xf8\xe8\x1eV\xfaC\xdf\xc3Vv\x9b\x1a\xfc\x14.c\x94\xc9=\xb0\x0f!d\b\x18*@m\x7f\xaal\x17G\xd6?\x81\x16P\x03\x10e\xc3\xcd\xb1B\xeb\x01B\\\x91A\xa1\x8an\xb4#\xadr\x1e\x81v\xa2\x0e6x\xca\x8b\xa6\xd8\x81\x10:\x0e(\xdd\xfc\xc9\xc6\xb4\xf0\'f:\xbd\xfe\x11\xf8\xc8W\x81s^\xd9W\xf1\x94\xaf\xc5\x8a\xb4f\x1b\x17E\xb23\x12\xb0\xeb\xef\x8c\xb24h\xd7}\x7f\x92Hgej\x957\xe2A'}, 0x30) 03:43:43 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x238) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) writev(r0, &(0x7f0000000540)=[{&(0x7f0000000140)="cedbddea5b67f4290aa7fd7c0cc7e2e613891a59fd3dc2e8a3c6e7c9fa96", 0x1e}, {&(0x7f0000000340)="e4bc7c957b83ba155edae525e00f76c76056ac3fe8a5de5ccfba604ac6b0d4a0fd42802b43143a32d703bd21baddda61ba1cb78758f519c19a06193e8bfc0d1f1fad3be6885359773264bd153a2bf50591662cca307c7a22f8a9e70629a1beac22b823bfee7fec832958c20007e0b8707c6ac0e8b1", 0x75}, {&(0x7f00000004c0)="4b8043af3b13f04c3ee02ee028e584b538cfb06be329d5ca0649880187b5cd5ff601bf73", 0x24}, {&(0x7f0000000800)="87cfb3bd1ada6e425bdd5aaccdafa6e4", 0x10}], 0x4) sendto$inet(r0, &(0x7f00000012c0)="0c268a927f1f6588b967481241ba7860005cf65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95425a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x27) 03:43:43 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) sendmmsg$inet(r0, &(0x7f0000001100)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000001340)="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", 0x2d9}], 0x1}}], 0x1, 0x0) 03:43:43 executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000fe1000)={0x5, 0x83, 0x80, 0xf}, 0x1c) bpf$PROG_LOAD(0x5, &(0x7f0000fed000)={0x7, 0x9, &(0x7f00000000c0)=@framed={{}, [@map={0x18, 0x0, 0x1, 0x0, r0}, @map, @map]}, &(0x7f0000919ff6)='syzkaller\x00', 0x0, 0xe1, &(0x7f0000000000)=""/225, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0}, 0x78) [ 702.979786][T28669] IPVS: ftp: loaded support on port[0] = 21 03:43:44 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x238) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) writev(r0, &(0x7f0000000540)=[{&(0x7f0000000140)="cedbddea5b67f4290aa7fd7c0cc7e2e613891a59fd3dc2e8a3c6e7c9fa96", 0x1e}, {&(0x7f0000000340)="e4bc7c957b83ba155edae525e00f76c76056ac3fe8a5de5ccfba604ac6b0d4a0fd42802b43143a32d703bd21baddda61ba1cb78758f519c19a06193e8bfc0d1f1fad3be6", 0x44}, {0x0}], 0x3) sendto$inet(r0, &(0x7f00000012c0)="0c268a927f1f6588b967481241ba7860005cf65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95425a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x27) 03:43:44 executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000fe1000)={0x5, 0x83, 0x80, 0xf}, 0x1c) bpf$PROG_LOAD(0x5, &(0x7f0000fed000)={0x7, 0x9, &(0x7f00000000c0)=@framed={{}, [@map={0x18, 0x0, 0x1, 0x0, r0}, @map, @map]}, &(0x7f0000919ff6)='syzkaller\x00', 0x0, 0xe1, &(0x7f0000000000)=""/225, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0}, 0x78) 03:43:44 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) sendmmsg$inet(r0, &(0x7f0000001100)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000001340)="492b7b56e7bf1546ba9024d15debc3fdf835944e6359dfc82ad6a44af6174b7048d6774edb2a522c3b5aebed3bba4b546494bbf6043a7a659fa12216b37584d6922636fff14b623e8c3e9fe28800be702458a4e01e63a39ce0913a26da044aa26f457632cfb8104ef5156bc27f3c08d0a0662a69249556e9a7dcc2da9fdefdd1378f5ef60bb2a8ea72a06c11be333049a90b1c46352f3c5409e32849a93d43e39038bd6c1d6e8eab5b135933cc6fc02853cf997defa87b0bdc2eedad7426259c9118c5a885705288956f19cf9fcb5a5e3f772253900b73288028f2135004a304699d8879a3b2570b1c0f7d45bd5a730a2e57413513c2bb12b095d986617eab6020147d6974b75058c7d235a54b139958054e31290acf55b048b3a6a5e7515295ba626378ce82b4ee22cc23bd5b82363bcb7ff225fc556ecfa3b764d8ef16aa66c6b85d546bac428bfd4e23996cc7d4b1f36e08bf5611234fa7ecf93d7835ab9b0302b9371497d4ab867e0d5750a3d047abef4793b4a80055c50797e611556c1e29e825c3980bd81a4b221d44f9abefeea268e98df6310f32755bc5c2fd19e9ab91958074421fbc49a067de17743a2eb60aecee575d892009f653bd7548f24194179f506ad2e30e2910f51231eff390e2e6b28a834ef9c2380df877e8ac1d4649df50e06ec92ad336888ac4d45db52a2dead697ba7b1ebf042cdcc9fa2c8af8e818375fc8dc0689f6d16478be23bee3cc43e5ff224bdbbd089cdbcced85a88a739f8fc81314e362527742ae15b57d200580205ee0000cbf1b47d38ff82eb464b778cd5beffd4d43378e7ebed4a31b3fb7d325b958b9eb9d7c5fc4274ecb863c1edd6fc4ef7f6b58dee0cbbe57293c33a3d098501c91f45fff812bc8036f9b13181d223d23be06d53bb0b0f4d3a05ca9d0b2e4de29fe137077bb6d39d0b97d818115d867dad9586f9c71153e4dc2bb8a0d0436769ed8e6bb9ddadb8eb91cbfdd9efc801ebe106ed8151e61153db150c2e2fa4109740028cdb606", 0x2d9}], 0x1}}], 0x1, 0x0) 03:43:44 executing program 5: openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) ioctl$RNDADDENTROPY(0xffffffffffffffff, 0x40085203, &(0x7f0000000100)={0x6, 0xbc, "56f80f8d7c9ad684157765ee68815e033b7b2972a2d067318db9ac518603e0dbae813e160bd3f15b30c226056579cf64ac2525dd44c15e56204f1e3f1b8c03b31f4281605682d4b39a61b89636b3a2a5ea0bd3f5e8bd40d8c0406969d18fed78e4f4108902b5959ec383c40036f5262e703d6ad6a7a486302c382e45645bfe4c472249b482a28e9519e744cdbe884985d913612a17250eab7e4f0bf4b35aab9f7b923116a8d30baf612ca3bc2ef9b3f8d1c6b570cb60bd8d5b6805ce"}) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_sctp(0x2, 0x5, 0x84) dup3(0xffffffffffffffff, r0, 0x0) socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp_SCTP_AUTH_DEACTIVATE_KEY(0xffffffffffffffff, 0x84, 0x23, 0x0, 0x0) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f00000000c0)={0x51, 0xfffc, 0x0, {0x103, 0xf1}, {0x9}, @ramp={0x2, 0x3, {0x7fff, 0x0, 0x7, 0x7}}}) r1 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r1, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @bcast, @rose, @rose, @null]}, 0x48) listen(r1, 0x0) unshare(0x40000000) r2 = accept(r1, 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r3, 0xffffffffffffffff) write$binfmt_elf64(r2, &(0x7f00000002c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}], "", [[], []]}, 0x278) 03:43:44 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x400007) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0x32600) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xb4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000040)='cpuset') write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000700)=ANY=[@ANYBLOB="006d176df3384ed3ddbcf3be0e26fd017529253262b78ee8b9d470"], 0x1b) ioctl$TUNSETCARRIER(0xffffffffffffffff, 0x400454e2, &(0x7f0000000080)=0x1) write$cgroup_int(r0, &(0x7f0000000380), 0x12) write$cgroup_int(r1, &(0x7f0000000400), 0xd) r2 = gettid() write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000000)=r2, 0x12) r3 = socket$kcm(0x2b, 0x0, 0x0) socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r3, 0x0, 0x0) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000280)=r2, 0x12) r4 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) close(r5) write$cgroup_type(r5, &(0x7f0000000080)='threaded\x00', 0xfffffc61) r6 = bpf$MAP_CREATE(0x2, &(0x7f0000009280), 0x3c) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x17, 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB], &(0x7f0000000200)='syzkaller\x00', 0xfa1, 0x0, 0x0, 0x41100, 0x2, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, &(0x7f0000000240), 0x8, 0x10, 0x0}, 0x78) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000008740)={0x0, 0x0, &(0x7f0000008700)=[{0x0}, {&(0x7f0000008680)=""/23, 0x17}, {&(0x7f00000086c0)=""/38, 0x26}], 0x3}, 0x8000) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x6, 0x2, 0x2e15579, 0x3f, 0x1, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffffff, 0x0, 0x5}, 0x3c) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0xb, [], 0x0, 0xc, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r7}, 0x7e) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r8, &(0x7f0000000000)=ANY=[], 0x50c000) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x18, 0x49, &(0x7f0000000a00)=ANY=[@ANYBLOB="0000752c0000000000000000ffffffff9500000000000000181400006200ed587c1ba87fb23af22b6cf03fb851054ce322d4b3a5894516c0c1479e1cfbf3061ad7aef6d6c36e4e74a8219f8441192ab16361719f26a1e543525c94027f7a5f275546d8cacee044fc20d858e268019caeb1633cc4888faa05d02cd44de32962e022697754125edcfb3477c4e122a0e97ab43de94a7a94efd527400e2c2ff4468fd6e773773f089b268fddef712ab174487ae9049f64895522be3862156a1af15513c3ff285844c9aae255d74c0dacf6c47d6809ce69ee6e41a03a03b29152ee43afabd82aa883f260995238aa70895dc3aee59a119dc82fb5fd00af56ded09336e2df6a0bb41bd191d57b35eb262a1aa8d5fec51b24500685f8c0adaf3639790fdbd7cb2ac3af37a802a6ac7265a819c91986c45e7c54d91c5ced552d96c04a80c063fee16b3a52bc603deebe32e4e0dfdfe9d03658daad65606e175041076684110e66f74db9509b1a29e765c9208ddba13e3b42b3963dce5432c4fb7844a9b64c518820c9c0198fadb6ea6a350f89a1eb1a3c1e20527ce574c3514f9ad62be70eee070faa267d83564e6db87e4d16ccd118397c2e4825140e6b46c35edb77df7b9a3334ad3f8cb70b73f4b9d8b29eb50b2c2dfc8d82841a6251fcfcb978ce90873ddcfa0125800302f5ed70c724e0253fb45955750f1e7c94ca05a91ec592ee3a52fad94c89205ece2d1d96afbfa0b59f9bd6c1161c638fff8696973fedca3f3ddf5bbb", @ANYRES32=r6, @ANYBLOB="00000000000000000c72c0fff6ffffff850000005b0000009500000000000000"], &(0x7f0000000040)='GPL\x00', 0x3ff, 0xd5, &(0x7f0000000080)=""/213, 0x61800, 0xab6c50112a8dd52c, [], 0x0, 0x16, 0xffffffffffffffff, 0x8, &(0x7f0000000180)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000001c0)={0x2, 0x6, 0x6, 0x5}, 0x10, 0x0, r8}, 0x78) bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x11, 0x5, 0x81, 0x2, 0x100, r5, 0x3, [], 0x0, 0xffffffffffffffff, 0x4, 0x3}, 0x3c) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r9, &(0x7f0000000200), 0x806000) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, r4, 0x0, 0x2a8, &(0x7f0000000440)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\a\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83CZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x98\x86\"R\x06\x00\x00\x00\x00\x00\x00\x00\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&\x014\x01\xf4\xb7\x83\x9a\xfa*\xa6\x06\xb7Pk7N\xc2\xd9\xee\xd0\xb0M\x00\xab\xc3\t\fc\xd8dx\xd5\x1dU*s)\x12[\x14\xb1\xc0\xd7\x1a\xa0\x16\xa2z\x9e\x93 \xddeF>29\v\x02\xa2b\x13R\xef\xffA,\xb9.$\xfa\x9f\xde[\x80\xd1=\xce\x1b\xeb\xf6\xf4\xe3z\x1f\x9dz\xa3\xc0\xe2\xa2\xb1\xeeq\xf5\xec0\x8e\xf4\xfb\xd9\x87\xf03\xdb\xae|\x10&V5c\xa6\xce\xcd\x8a\xdf\xe1\x89\"\xea\xde\xe7\xa3\xbe\xe7\xff\xf9 \x11\xfdY\xc6\xa1\xe8\xda\v\\?\xcb\x87\bn\x9b\x01\x1f\xf8\xe8\x1eV\xfaC\xdf\xc3Vv\x9b\x1a\xfc\x14.c\x94\xc9=\xb0\x0f!d\b\x18*@m\x7f\xaal\x17G\xd6?\x81\x16P\x03\x10e\xc3\xcd\xb1B\xeb\x01B\\\x91A\xa1\x8an\xb4#\xadr\x1e\x81v\xa2\x0e6x\xca\x8b\xa6\xd8\x81\x10:\x0e(\xdd\xfc\xc9\xc6\xb4\xf0\'f:\xbd\xfe\x11\xf8\xc8W\x81s^\xd9W\xf1\x94\xaf\xc5\x8a\xb4f\x1b\x17E\xb23\x12\xb0\xeb\xef\x8c\xb24h\xd7}\x7f\x92Hgej\x957\xe2A'}, 0x30) 03:43:44 executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000fe1000)={0x5, 0x83, 0x80, 0xf}, 0x1c) bpf$PROG_LOAD(0x5, &(0x7f0000fed000)={0x7, 0x9, &(0x7f00000000c0)=@framed={{}, [@map={0x18, 0x0, 0x1, 0x0, r0}, @map, @map]}, &(0x7f0000919ff6)='syzkaller\x00', 0x0, 0xe1, &(0x7f0000000000)=""/225, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0}, 0x78) 03:43:44 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendmmsg$inet(r0, &(0x7f0000001100)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000001340)="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", 0x2d9}], 0x1}}], 0x1, 0x0) 03:43:44 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x238) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) writev(r0, &(0x7f0000000540)=[{&(0x7f0000000140)="cedbddea5b67f4290aa7fd7c0cc7e2e613891a59fd3dc2e8a3c6e7c9fa96", 0x1e}, {&(0x7f0000000340)="e4bc7c957b83ba155edae525e00f76c76056ac3fe8a5de5ccfba604ac6b0d4a0fd42802b43143a32d703bd21baddda61ba1cb78758f519c19a06193e8bfc0d1f1fad3be6885359773264bd153a2bf50591662cca307c7a22f8a9e70629a1beac22b823bfee7fec832958c20007e0b8707c6ac0e8b1", 0x75}, {&(0x7f00000004c0)="4b8043af3b13f04c3ee02ee028e584b538cfb06be329d5ca0649880187b5cd5ff601bf73", 0x24}, {&(0x7f0000000800)="87cfb3bd1ada6e425bdd5aaccdafa6e4ea", 0x11}], 0x4) sendto$inet(r0, &(0x7f00000012c0)="0c268a927f1f6588b967481241ba7860005cf65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95425a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x27) [ 703.751400][T28704] IPVS: ftp: loaded support on port[0] = 21 03:43:44 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x238) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) writev(r0, &(0x7f0000000540)=[{&(0x7f0000000140)="cedbddea5b67f4290aa7fd7c0cc7e2e613891a59fd3dc2e8a3c6e7c9fa96", 0x1e}, {&(0x7f0000000340)="e4bc7c957b83ba155edae525e00f76c76056ac3fe8a5de5ccfba604ac6b0d4a0fd42802b43143a32d703bd21baddda61ba1cb78758f519c19a06193e8bfc0d1f1fad3be688535977", 0x48}, {0x0}], 0x3) sendto$inet(r0, &(0x7f00000012c0)="0c268a927f1f6588b967481241ba7860005cf65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95425a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x27) 03:43:44 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) sendmmsg$inet(r0, &(0x7f0000001100)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000001340)="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", 0x2d9}], 0x1}}], 0x1, 0x0) 03:43:44 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendmmsg$inet(r0, &(0x7f0000001100)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000001340)="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", 0x2d9}], 0x1}}], 0x1, 0x0) 03:43:45 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x400007) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0x32600) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xb4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000040)='cpuset') write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000700)=ANY=[@ANYBLOB="006d176df3384ed3ddbcf3be0e26fd017529253262b78ee8b9d470"], 0x1b) ioctl$TUNSETCARRIER(0xffffffffffffffff, 0x400454e2, &(0x7f0000000080)=0x1) write$cgroup_int(r0, &(0x7f0000000380), 0x12) write$cgroup_int(r1, &(0x7f0000000400), 0xd) r2 = gettid() write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000000)=r2, 0x12) r3 = socket$kcm(0x2b, 0x0, 0x0) socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r3, 0x0, 0x0) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000280)=r2, 0x12) r4 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) close(r5) write$cgroup_type(r5, &(0x7f0000000080)='threaded\x00', 0xfffffc61) r6 = bpf$MAP_CREATE(0x2, &(0x7f0000009280), 0x3c) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x17, 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB], &(0x7f0000000200)='syzkaller\x00', 0xfa1, 0x0, 0x0, 0x41100, 0x2, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, &(0x7f0000000240), 0x8, 0x10, 0x0}, 0x78) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000008740)={0x0, 0x0, &(0x7f0000008700)=[{0x0}, {&(0x7f0000008680)=""/23, 0x17}, {&(0x7f00000086c0)=""/38, 0x26}], 0x3}, 0x8000) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x6, 0x2, 0x2e15579, 0x3f, 0x1, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffffff, 0x0, 0x5}, 0x3c) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0xb, [], 0x0, 0xc, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r7}, 0x7e) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r8, &(0x7f0000000000)=ANY=[], 0x50c000) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x18, 0x49, &(0x7f0000000a00)=ANY=[@ANYBLOB="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", @ANYRES32=r6, @ANYBLOB="00000000000000000c72c0fff6ffffff850000005b0000009500000000000000"], &(0x7f0000000040)='GPL\x00', 0x3ff, 0xd5, &(0x7f0000000080)=""/213, 0x61800, 0xab6c50112a8dd52c, [], 0x0, 0x16, 0xffffffffffffffff, 0x8, &(0x7f0000000180)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000001c0)={0x2, 0x6, 0x6, 0x5}, 0x10, 0x0, r8}, 0x78) bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x11, 0x5, 0x81, 0x2, 0x100, r5, 0x3, [], 0x0, 0xffffffffffffffff, 0x4, 0x3}, 0x3c) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r9, &(0x7f0000000200), 0x806000) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, r4, 0x0, 0x2a8, &(0x7f0000000440)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\a\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83CZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x98\x86\"R\x06\x00\x00\x00\x00\x00\x00\x00\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&\x014\x01\xf4\xb7\x83\x9a\xfa*\xa6\x06\xb7Pk7N\xc2\xd9\xee\xd0\xb0M\x00\xab\xc3\t\fc\xd8dx\xd5\x1dU*s)\x12[\x14\xb1\xc0\xd7\x1a\xa0\x16\xa2z\x9e\x93 \xddeF>29\v\x02\xa2b\x13R\xef\xffA,\xb9.$\xfa\x9f\xde[\x80\xd1=\xce\x1b\xeb\xf6\xf4\xe3z\x1f\x9dz\xa3\xc0\xe2\xa2\xb1\xeeq\xf5\xec0\x8e\xf4\xfb\xd9\x87\xf03\xdb\xae|\x10&V5c\xa6\xce\xcd\x8a\xdf\xe1\x89\"\xea\xde\xe7\xa3\xbe\xe7\xff\xf9 \x11\xfdY\xc6\xa1\xe8\xda\v\\?\xcb\x87\bn\x9b\x01\x1f\xf8\xe8\x1eV\xfaC\xdf\xc3Vv\x9b\x1a\xfc\x14.c\x94\xc9=\xb0\x0f!d\b\x18*@m\x7f\xaal\x17G\xd6?\x81\x16P\x03\x10e\xc3\xcd\xb1B\xeb\x01B\\\x91A\xa1\x8an\xb4#\xadr\x1e\x81v\xa2\x0e6x\xca\x8b\xa6\xd8\x81\x10:\x0e(\xdd\xfc\xc9\xc6\xb4\xf0\'f:\xbd\xfe\x11\xf8\xc8W\x81s^\xd9W\xf1\x94\xaf\xc5\x8a\xb4f\x1b\x17E\xb23\x12\xb0\xeb\xef\x8c\xb24h\xd7}\x7f\x92Hgej\x957\xe2A'}, 0x30) 03:43:45 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendmmsg$inet(r0, &(0x7f0000001100)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000001340)="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", 0x2d9}], 0x1}}], 0x1, 0x0) 03:43:45 executing program 5: openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) ioctl$RNDADDENTROPY(0xffffffffffffffff, 0x40085203, &(0x7f0000000100)={0x6, 0xbc, "56f80f8d7c9ad684157765ee68815e033b7b2972a2d067318db9ac518603e0dbae813e160bd3f15b30c226056579cf64ac2525dd44c15e56204f1e3f1b8c03b31f4281605682d4b39a61b89636b3a2a5ea0bd3f5e8bd40d8c0406969d18fed78e4f4108902b5959ec383c40036f5262e703d6ad6a7a486302c382e45645bfe4c472249b482a28e9519e744cdbe884985d913612a17250eab7e4f0bf4b35aab9f7b923116a8d30baf612ca3bc2ef9b3f8d1c6b570cb60bd8d5b6805ce"}) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_sctp(0x2, 0x5, 0x84) dup3(0xffffffffffffffff, r0, 0x0) socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp_SCTP_AUTH_DEACTIVATE_KEY(0xffffffffffffffff, 0x84, 0x23, 0x0, 0x0) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f00000000c0)={0x51, 0xfffc, 0x0, {0x103, 0xf1}, {0x9}, @ramp={0x2, 0x3, {0x7fff, 0x0, 0x7, 0x7}}}) r1 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r1, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @bcast, @rose, @rose, @null]}, 0x48) listen(r1, 0x0) unshare(0x40000000) r2 = accept(r1, 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r3, 0xffffffffffffffff) write$binfmt_elf64(r2, &(0x7f00000002c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}], "", [[], []]}, 0x278) 03:43:45 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) sendmmsg$inet(r0, &(0x7f0000001100)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000001340)="492b7b56e7bf1546ba9024d15debc3fdf835944e6359dfc82ad6a44af6174b7048d6774edb2a522c3b5aebed3bba4b546494bbf6043a7a659fa12216b37584d6922636fff14b623e8c3e9fe28800be702458a4e01e63a39ce0913a26da044aa26f457632cfb8104ef5156bc27f3c08d0a0662a69249556e9a7dcc2da9fdefdd1378f5ef60bb2a8ea72a06c11be333049a90b1c46352f3c5409e32849a93d43e39038bd6c1d6e8eab5b135933cc6fc02853cf997defa87b0bdc2eedad7426259c9118c5a885705288956f19cf9fcb5a5e3f772253900b73288028f2135004a304699d8879a3b2570b1c0f7d45bd5a730a2e57413513c2bb12b095d986617eab6020147d6974b75058c7d235a54b139958054e31290acf55b048b3a6a5e7515295ba626378ce82b4ee22cc23bd5b82363bcb7ff225fc556ecfa3b764d8ef16aa66c6b85d546bac428bfd4e23996cc7d4b1f36e08bf5611234fa7ecf93d7835ab9b0302b9371497d4ab867e0d5750a3d047abef4793b4a80055c50797e611556c1e29e825c3980bd81a4b221d44f9abefeea268e98df6310f32755bc5c2fd19e9ab91958074421fbc49a067de17743a2eb60aecee575d892009f653bd7548f24194179f506ad2e30e2910f51231eff390e2e6b28a834ef9c2380df877e8ac1d4649df50e06ec92ad336888ac4d45db52a2dead697ba7b1ebf042cdcc9fa2c8af8e818375fc8dc0689f6d16478be23bee3cc43e5ff224bdbbd089cdbcced85a88a739f8fc81314e362527742ae15b57d200580205ee0000cbf1b47d38ff82eb464b778cd5beffd4d43378e7ebed4a31b3fb7d325b958b9eb9d7c5fc4274ecb863c1edd6fc4ef7f6b58dee0cbbe57293c33a3d098501c91f45fff812bc8036f9b13181d223d23be06d53bb0b0f4d3a05ca9d0b2e4de29fe137077bb6d39d0b97d818115d867dad9586f9c71153e4dc2bb8a0d0436769ed8e6bb9ddadb8eb91cbfdd9efc801ebe106ed8151e61153db150c2e2fa4109740028cdb606", 0x2d9}], 0x1}}], 0x1, 0x0) 03:43:45 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x238) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) writev(r0, &(0x7f0000000540)=[{&(0x7f0000000140)="cedbddea5b67f4290aa7fd7c0cc7e2e613891a59fd3dc2e8a3c6e7c9fa96", 0x1e}, {&(0x7f0000000340)="e4bc7c957b83ba155edae525e00f76c76056ac3fe8a5de5ccfba604ac6b0d4a0fd42802b43143a32d703bd21baddda61ba1cb78758f519c19a06193e8bfc0d1f1fad3be6885359773264bd153a2bf50591662cca307c7a22f8a9e70629a1beac22b823bfee7fec832958c20007e0b8707c6ac0e8b1", 0x75}, {&(0x7f00000004c0)="4b8043af3b13f04c3ee02ee028e584b538cfb06be329d5ca0649880187b5cd5ff601bf73", 0x24}, {&(0x7f0000000800)="87cfb3bd1ada6e425bdd5aaccdafa6e4ea", 0x11}], 0x4) sendto$inet(r0, &(0x7f00000012c0)="0c268a927f1f6588b967481241ba7860005cf65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95425a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x27) 03:43:45 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x238) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) writev(r0, &(0x7f0000000540)=[{&(0x7f0000000140)="cedbddea5b67f4290aa7fd7c0cc7e2e613891a59fd3dc2e8a3c6e7c9fa96", 0x1e}, {&(0x7f0000000340)="e4bc7c957b83ba155edae525e00f76c76056ac3fe8a5de5ccfba604ac6b0d4a0fd42802b43143a32d703bd21baddda61ba1cb78758f519c19a06193e8bfc0d1f1fad3be688535977", 0x48}, {0x0}], 0x3) sendto$inet(r0, &(0x7f00000012c0)="0c268a927f1f6588b967481241ba7860005cf65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95425a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x27) 03:43:45 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) sendmmsg$inet(r0, &(0x7f0000001100)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000001340)="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", 0x2d9}], 0x1}}], 0x1, 0x0) 03:43:45 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) sendmmsg$inet(r0, &(0x7f0000001100)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000001340)="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", 0x2d9}], 0x1}}], 0x1, 0x0) [ 704.598359][T28742] IPVS: ftp: loaded support on port[0] = 21 03:43:45 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x400007) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0x32600) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xb4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000040)='cpuset') write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000700)=ANY=[@ANYBLOB="006d176df3384ed3ddbcf3be0e26fd017529253262b78ee8b9d470"], 0x1b) ioctl$TUNSETCARRIER(0xffffffffffffffff, 0x400454e2, &(0x7f0000000080)=0x1) write$cgroup_int(r0, &(0x7f0000000380), 0x12) write$cgroup_int(r1, &(0x7f0000000400), 0xd) r2 = gettid() write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000000)=r2, 0x12) r3 = socket$kcm(0x2b, 0x0, 0x0) socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r3, 0x0, 0x0) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000280)=r2, 0x12) r4 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) close(r5) write$cgroup_type(r5, &(0x7f0000000080)='threaded\x00', 0xfffffc61) r6 = bpf$MAP_CREATE(0x2, &(0x7f0000009280), 0x3c) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x17, 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB], &(0x7f0000000200)='syzkaller\x00', 0xfa1, 0x0, 0x0, 0x41100, 0x2, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, &(0x7f0000000240), 0x8, 0x10, 0x0}, 0x78) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000008740)={0x0, 0x0, &(0x7f0000008700)=[{0x0}, {&(0x7f0000008680)=""/23, 0x17}, {&(0x7f00000086c0)=""/38, 0x26}], 0x3}, 0x8000) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x6, 0x2, 0x2e15579, 0x3f, 0x1, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffffff, 0x0, 0x5}, 0x3c) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0xb, [], 0x0, 0xc, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r7}, 0x7e) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r8, &(0x7f0000000000)=ANY=[], 0x50c000) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x18, 0x49, &(0x7f0000000a00)=ANY=[@ANYBLOB="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", @ANYRES32=r6, @ANYBLOB="00000000000000000c72c0fff6ffffff850000005b0000009500000000000000"], &(0x7f0000000040)='GPL\x00', 0x3ff, 0xd5, &(0x7f0000000080)=""/213, 0x61800, 0xab6c50112a8dd52c, [], 0x0, 0x16, 0xffffffffffffffff, 0x8, &(0x7f0000000180)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000001c0)={0x2, 0x6, 0x6, 0x5}, 0x10, 0x0, r8}, 0x78) bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x11, 0x5, 0x81, 0x2, 0x100, r5, 0x3, [], 0x0, 0xffffffffffffffff, 0x4, 0x3}, 0x3c) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r9, &(0x7f0000000200), 0x806000) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, r4, 0x0, 0x2a8, &(0x7f0000000440)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\a\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83CZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x98\x86\"R\x06\x00\x00\x00\x00\x00\x00\x00\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&\x014\x01\xf4\xb7\x83\x9a\xfa*\xa6\x06\xb7Pk7N\xc2\xd9\xee\xd0\xb0M\x00\xab\xc3\t\fc\xd8dx\xd5\x1dU*s)\x12[\x14\xb1\xc0\xd7\x1a\xa0\x16\xa2z\x9e\x93 \xddeF>29\v\x02\xa2b\x13R\xef\xffA,\xb9.$\xfa\x9f\xde[\x80\xd1=\xce\x1b\xeb\xf6\xf4\xe3z\x1f\x9dz\xa3\xc0\xe2\xa2\xb1\xeeq\xf5\xec0\x8e\xf4\xfb\xd9\x87\xf03\xdb\xae|\x10&V5c\xa6\xce\xcd\x8a\xdf\xe1\x89\"\xea\xde\xe7\xa3\xbe\xe7\xff\xf9 \x11\xfdY\xc6\xa1\xe8\xda\v\\?\xcb\x87\bn\x9b\x01\x1f\xf8\xe8\x1eV\xfaC\xdf\xc3Vv\x9b\x1a\xfc\x14.c\x94\xc9=\xb0\x0f!d\b\x18*@m\x7f\xaal\x17G\xd6?\x81\x16P\x03\x10e\xc3\xcd\xb1B\xeb\x01B\\\x91A\xa1\x8an\xb4#\xadr\x1e\x81v\xa2\x0e6x\xca\x8b\xa6\xd8\x81\x10:\x0e(\xdd\xfc\xc9\xc6\xb4\xf0\'f:\xbd\xfe\x11\xf8\xc8W\x81s^\xd9W\xf1\x94\xaf\xc5\x8a\xb4f\x1b\x17E\xb23\x12\xb0\xeb\xef\x8c\xb24h\xd7}\x7f\x92Hgej\x957\xe2A'}, 0x30) 03:43:45 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) sendmmsg$inet(r0, &(0x7f0000001100)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000001340)="492b7b56e7bf1546ba9024d15debc3fdf835944e6359dfc82ad6a44af6174b7048d6774edb2a522c3b5aebed3bba4b546494bbf6043a7a659fa12216b37584d6922636fff14b623e8c3e9fe28800be702458a4e01e63a39ce0913a26da044aa26f457632cfb8104ef5156bc27f3c08d0a0662a69249556e9a7dcc2da9fdefdd1378f5ef60bb2a8ea72a06c11be333049a90b1c46352f3c5409e32849a93d43e39038bd6c1d6e8eab5b135933cc6fc02853cf997defa87b0bdc2eedad7426259c9118c5a885705288956f19cf9fcb5a5e3f772253900b73288028f2135004a304699d8879a3b2570b1c0f7d45bd5a730a2e57413513c2bb12b095d986617eab6020147d6974b75058c7d235a54b139958054e31290acf55b048b3a6a5e7515295ba626378ce82b4ee22cc23bd5b82363bcb7ff225fc556ecfa3b764d8ef16aa66c6b85d546bac428bfd4e23996cc7d4b1f36e08bf5611234fa7ecf93d7835ab9b0302b9371497d4ab867e0d5750a3d047abef4793b4a80055c50797e611556c1e29e825c3980bd81a4b221d44f9abefeea268e98df6310f32755bc5c2fd19e9ab91958074421fbc49a067de17743a2eb60aecee575d892009f653bd7548f24194179f506ad2e30e2910f51231eff390e2e6b28a834ef9c2380df877e8ac1d4649df50e06ec92ad336888ac4d45db52a2dead697ba7b1ebf042cdcc9fa2c8af8e818375fc8dc0689f6d16478be23bee3cc43e5ff224bdbbd089cdbcced85a88a739f8fc81314e362527742ae15b57d200580205ee0000cbf1b47d38ff82eb464b778cd5beffd4d43378e7ebed4a31b3fb7d325b958b9eb9d7c5fc4274ecb863c1edd6fc4ef7f6b58dee0cbbe57293c33a3d098501c91f45fff812bc8036f9b13181d223d23be06d53bb0b0f4d3a05ca9d0b2e4de29fe137077bb6d39d0b97d818115d867dad9586f9c71153e4dc2bb8a0d0436769ed8e6bb9ddadb8eb91cbfdd9efc801ebe106ed8151e61153db150c2e2fa4109740028cdb606", 0x2d9}], 0x1}}], 0x1, 0x0) 03:43:45 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) sendmmsg$inet(r0, &(0x7f0000001100)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000001340)="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", 0x2d9}], 0x1}}], 0x1, 0x0) 03:43:46 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x238) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) writev(r0, &(0x7f0000000540)=[{&(0x7f0000000140)="cedbddea5b67f4290aa7fd7c0cc7e2e613891a59fd3dc2e8a3c6e7c9fa96", 0x1e}, {&(0x7f0000000340)="e4bc7c957b83ba155edae525e00f76c76056ac3fe8a5de5ccfba604ac6b0d4a0fd42802b43143a32d703bd21baddda61ba1cb78758f519c19a06193e8bfc0d1f1fad3be6885359773264bd153a2bf50591662cca307c7a22f8a9e70629a1beac22b823bfee7fec832958c20007e0b8707c6ac0e8b1", 0x75}, {&(0x7f00000004c0)="4b8043af3b13f04c3ee02ee028e584b538cfb06be329d5ca0649880187b5cd5ff601bf73", 0x24}, {&(0x7f0000000800)="87cfb3bd1ada6e425bdd5aaccdafa6e4ea", 0x11}], 0x4) sendto$inet(r0, &(0x7f00000012c0)="0c268a927f1f6588b967481241ba7860005cf65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95425a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x27) 03:43:46 executing program 5: openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) ioctl$RNDADDENTROPY(0xffffffffffffffff, 0x40085203, &(0x7f0000000100)={0x6, 0xbc, "56f80f8d7c9ad684157765ee68815e033b7b2972a2d067318db9ac518603e0dbae813e160bd3f15b30c226056579cf64ac2525dd44c15e56204f1e3f1b8c03b31f4281605682d4b39a61b89636b3a2a5ea0bd3f5e8bd40d8c0406969d18fed78e4f4108902b5959ec383c40036f5262e703d6ad6a7a486302c382e45645bfe4c472249b482a28e9519e744cdbe884985d913612a17250eab7e4f0bf4b35aab9f7b923116a8d30baf612ca3bc2ef9b3f8d1c6b570cb60bd8d5b6805ce"}) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_sctp(0x2, 0x5, 0x84) dup3(0xffffffffffffffff, r0, 0x0) socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp_SCTP_AUTH_DEACTIVATE_KEY(0xffffffffffffffff, 0x84, 0x23, 0x0, 0x0) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f00000000c0)={0x51, 0xfffc, 0x0, {0x103, 0xf1}, {0x9}, @ramp={0x2, 0x3, {0x7fff, 0x0, 0x7, 0x7}}}) r1 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r1, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @bcast, @rose, @rose, @null]}, 0x48) listen(r1, 0x0) unshare(0x40000000) r2 = accept(r1, 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r3, 0xffffffffffffffff) write$binfmt_elf64(r2, &(0x7f00000002c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}], "", [[], []]}, 0x278) 03:43:46 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x238) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) writev(r0, &(0x7f0000000540)=[{&(0x7f0000000140)="cedbddea5b67f4290aa7fd7c0cc7e2e613891a59fd3dc2e8a3c6e7c9fa96", 0x1e}, {&(0x7f0000000340)="e4bc7c957b83ba155edae525e00f76c76056ac3fe8a5de5ccfba604ac6b0d4a0fd42802b43143a32d703bd21baddda61ba1cb78758f519c19a06193e8bfc0d1f1fad3be688535977", 0x48}, {0x0}], 0x3) sendto$inet(r0, &(0x7f00000012c0)="0c268a927f1f6588b967481241ba7860005cf65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95425a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x27) 03:43:46 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) 03:43:46 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) sendmmsg$inet(r0, &(0x7f0000001100)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000001340)="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", 0x2d9}], 0x1}}], 0x1, 0x0) 03:43:46 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x400007) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0x32600) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xb4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000040)='cpuset') write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000700)=ANY=[@ANYBLOB="006d176df3384ed3ddbcf3be0e26fd017529253262b78ee8b9d470"], 0x1b) ioctl$TUNSETCARRIER(0xffffffffffffffff, 0x400454e2, &(0x7f0000000080)=0x1) write$cgroup_int(r0, &(0x7f0000000380), 0x12) write$cgroup_int(r1, &(0x7f0000000400), 0xd) r2 = gettid() write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000000)=r2, 0x12) r3 = socket$kcm(0x2b, 0x0, 0x0) socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r3, 0x0, 0x0) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000280)=r2, 0x12) r4 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) close(r5) write$cgroup_type(r5, &(0x7f0000000080)='threaded\x00', 0xfffffc61) r6 = bpf$MAP_CREATE(0x2, &(0x7f0000009280), 0x3c) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x17, 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB], &(0x7f0000000200)='syzkaller\x00', 0xfa1, 0x0, 0x0, 0x41100, 0x2, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, &(0x7f0000000240), 0x8, 0x10, 0x0}, 0x78) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000008740)={0x0, 0x0, &(0x7f0000008700)=[{0x0}, {&(0x7f0000008680)=""/23, 0x17}, {&(0x7f00000086c0)=""/38, 0x26}], 0x3}, 0x8000) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x6, 0x2, 0x2e15579, 0x3f, 0x1, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffffff, 0x0, 0x5}, 0x3c) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0xb, [], 0x0, 0xc, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r7}, 0x7e) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r8, &(0x7f0000000000)=ANY=[], 0x50c000) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x18, 0x49, &(0x7f0000000a00)=ANY=[@ANYBLOB="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", @ANYRES32=r6, @ANYBLOB="00000000000000000c72c0fff6ffffff850000005b0000009500000000000000"], &(0x7f0000000040)='GPL\x00', 0x3ff, 0xd5, &(0x7f0000000080)=""/213, 0x61800, 0xab6c50112a8dd52c, [], 0x0, 0x16, 0xffffffffffffffff, 0x8, &(0x7f0000000180)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000001c0)={0x2, 0x6, 0x6, 0x5}, 0x10, 0x0, r8}, 0x78) bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x11, 0x5, 0x81, 0x2, 0x100, r5, 0x3, [], 0x0, 0xffffffffffffffff, 0x4, 0x3}, 0x3c) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r9, &(0x7f0000000200), 0x806000) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, r4, 0x0, 0x2a8, &(0x7f0000000440)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\a\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83CZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x98\x86\"R\x06\x00\x00\x00\x00\x00\x00\x00\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&\x014\x01\xf4\xb7\x83\x9a\xfa*\xa6\x06\xb7Pk7N\xc2\xd9\xee\xd0\xb0M\x00\xab\xc3\t\fc\xd8dx\xd5\x1dU*s)\x12[\x14\xb1\xc0\xd7\x1a\xa0\x16\xa2z\x9e\x93 \xddeF>29\v\x02\xa2b\x13R\xef\xffA,\xb9.$\xfa\x9f\xde[\x80\xd1=\xce\x1b\xeb\xf6\xf4\xe3z\x1f\x9dz\xa3\xc0\xe2\xa2\xb1\xeeq\xf5\xec0\x8e\xf4\xfb\xd9\x87\xf03\xdb\xae|\x10&V5c\xa6\xce\xcd\x8a\xdf\xe1\x89\"\xea\xde\xe7\xa3\xbe\xe7\xff\xf9 \x11\xfdY\xc6\xa1\xe8\xda\v\\?\xcb\x87\bn\x9b\x01\x1f\xf8\xe8\x1eV\xfaC\xdf\xc3Vv\x9b\x1a\xfc\x14.c\x94\xc9=\xb0\x0f!d\b\x18*@m\x7f\xaal\x17G\xd6?\x81\x16P\x03\x10e\xc3\xcd\xb1B\xeb\x01B\\\x91A\xa1\x8an\xb4#\xadr\x1e\x81v\xa2\x0e6x\xca\x8b\xa6\xd8\x81\x10:\x0e(\xdd\xfc\xc9\xc6\xb4\xf0\'f:\xbd\xfe\x11\xf8\xc8W\x81s^\xd9W\xf1\x94\xaf\xc5\x8a\xb4f\x1b\x17E\xb23\x12\xb0\xeb\xef\x8c\xb24h\xd7}\x7f\x92Hgej\x957\xe2A'}, 0x30) [ 705.431431][T28774] IPVS: ftp: loaded support on port[0] = 21 03:43:46 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) 03:43:46 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) sendmmsg$inet(r0, &(0x7f0000001100)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000001340)="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", 0x2d9}], 0x1}}], 0x1, 0x0) 03:43:46 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x238) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) writev(r0, &(0x7f0000000540)=[{&(0x7f0000000140)="cedbddea5b67f4290aa7fd7c0cc7e2e613891a59fd3dc2e8a3c6e7c9fa96", 0x1e}, {&(0x7f0000000340)="e4bc7c957b83ba155edae525e00f76c76056ac3fe8a5de5ccfba604ac6b0d4a0fd42802b43143a32d703bd21baddda61ba1cb78758f519c19a06193e8bfc0d1f1fad3be6885359773264bd153a2bf50591662cca307c7a22f8a9e70629a1beac22b823bfee7fec832958c20007e0b8707c6ac0e8b1", 0x75}, {&(0x7f0000000800)="87cfb3bd1ada6e425bdd5aaccdafa6e4ea74", 0x12}], 0x3) sendto$inet(r0, &(0x7f00000012c0)="0c268a927f1f6588b967481241ba7860005cf65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95425a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x27) 03:43:46 executing program 5: openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) ioctl$RNDADDENTROPY(0xffffffffffffffff, 0x40085203, &(0x7f0000000100)={0x6, 0xbc, "56f80f8d7c9ad684157765ee68815e033b7b2972a2d067318db9ac518603e0dbae813e160bd3f15b30c226056579cf64ac2525dd44c15e56204f1e3f1b8c03b31f4281605682d4b39a61b89636b3a2a5ea0bd3f5e8bd40d8c0406969d18fed78e4f4108902b5959ec383c40036f5262e703d6ad6a7a486302c382e45645bfe4c472249b482a28e9519e744cdbe884985d913612a17250eab7e4f0bf4b35aab9f7b923116a8d30baf612ca3bc2ef9b3f8d1c6b570cb60bd8d5b6805ce"}) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_sctp(0x2, 0x5, 0x84) dup3(0xffffffffffffffff, r0, 0x0) socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp_SCTP_AUTH_DEACTIVATE_KEY(0xffffffffffffffff, 0x84, 0x23, 0x0, 0x0) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f00000000c0)={0x51, 0xfffc, 0x0, {0x103, 0xf1}, {0x9}, @ramp={0x2, 0x3, {0x7fff, 0x0, 0x7, 0x7}}}) r1 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r1, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @bcast, @rose, @rose, @null]}, 0x48) listen(r1, 0x0) unshare(0x40000000) r2 = accept(r1, 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r3, 0xffffffffffffffff) write$binfmt_elf64(r2, &(0x7f00000002c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}], "", [[], []]}, 0x278) 03:43:46 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x238) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) writev(r0, &(0x7f0000000540)=[{&(0x7f0000000140)="cedbddea5b67f4290aa7fd7c0cc7e2e613891a59fd3dc2e8a3c6e7c9fa96", 0x1e}, {&(0x7f0000000340)="e4bc7c957b83ba155edae525e00f76c76056ac3fe8a5de5ccfba604ac6b0d4a0fd42802b43143a32d703bd21baddda61ba1cb78758f519c19a06193e8bfc0d1f1fad3be6885359773264", 0x4a}, {0x0}], 0x3) sendto$inet(r0, &(0x7f00000012c0)="0c268a927f1f6588b967481241ba7860005cf65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95425a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x27) 03:43:46 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) 03:43:46 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) sendmmsg$inet(r0, &(0x7f0000001100)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000001340)="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", 0x2d9}], 0x1}}], 0x1, 0x0) [ 706.026941][T28799] IPVS: ftp: loaded support on port[0] = 21 03:43:47 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x400007) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0x32600) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xb4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000040)='cpuset') write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000700)=ANY=[@ANYBLOB="006d176df3384ed3ddbcf3be0e26fd017529253262b78ee8b9d470"], 0x1b) ioctl$TUNSETCARRIER(0xffffffffffffffff, 0x400454e2, &(0x7f0000000080)=0x1) write$cgroup_int(r0, &(0x7f0000000380), 0x12) write$cgroup_int(r1, &(0x7f0000000400), 0xd) r2 = gettid() write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000000)=r2, 0x12) r3 = socket$kcm(0x2b, 0x0, 0x0) socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r3, 0x0, 0x0) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000280)=r2, 0x12) r4 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) close(r5) write$cgroup_type(r5, &(0x7f0000000080)='threaded\x00', 0xfffffc61) r6 = bpf$MAP_CREATE(0x2, &(0x7f0000009280), 0x3c) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x17, 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB], &(0x7f0000000200)='syzkaller\x00', 0xfa1, 0x0, 0x0, 0x41100, 0x2, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, &(0x7f0000000240), 0x8, 0x10, 0x0}, 0x78) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000008740)={0x0, 0x0, &(0x7f0000008700)=[{0x0}, {&(0x7f0000008680)=""/23, 0x17}, {&(0x7f00000086c0)=""/38, 0x26}], 0x3}, 0x8000) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x6, 0x2, 0x2e15579, 0x3f, 0x1, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffffff, 0x0, 0x5}, 0x3c) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0xb, [], 0x0, 0xc, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r7}, 0x7e) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r8, &(0x7f0000000000)=ANY=[], 0x50c000) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x18, 0x49, &(0x7f0000000a00)=ANY=[@ANYBLOB="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", @ANYRES32=r6, @ANYBLOB="00000000000000000c72c0fff6ffffff850000005b0000009500000000000000"], &(0x7f0000000040)='GPL\x00', 0x3ff, 0xd5, &(0x7f0000000080)=""/213, 0x61800, 0xab6c50112a8dd52c, [], 0x0, 0x16, 0xffffffffffffffff, 0x8, &(0x7f0000000180)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000001c0)={0x2, 0x6, 0x6, 0x5}, 0x10, 0x0, r8}, 0x78) bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x11, 0x5, 0x81, 0x2, 0x100, r5, 0x3, [], 0x0, 0xffffffffffffffff, 0x4, 0x3}, 0x3c) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r9, &(0x7f0000000200), 0x806000) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, r4, 0x0, 0x2a8, &(0x7f0000000440)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\a\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83CZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x98\x86\"R\x06\x00\x00\x00\x00\x00\x00\x00\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&\x014\x01\xf4\xb7\x83\x9a\xfa*\xa6\x06\xb7Pk7N\xc2\xd9\xee\xd0\xb0M\x00\xab\xc3\t\fc\xd8dx\xd5\x1dU*s)\x12[\x14\xb1\xc0\xd7\x1a\xa0\x16\xa2z\x9e\x93 \xddeF>29\v\x02\xa2b\x13R\xef\xffA,\xb9.$\xfa\x9f\xde[\x80\xd1=\xce\x1b\xeb\xf6\xf4\xe3z\x1f\x9dz\xa3\xc0\xe2\xa2\xb1\xeeq\xf5\xec0\x8e\xf4\xfb\xd9\x87\xf03\xdb\xae|\x10&V5c\xa6\xce\xcd\x8a\xdf\xe1\x89\"\xea\xde\xe7\xa3\xbe\xe7\xff\xf9 \x11\xfdY\xc6\xa1\xe8\xda\v\\?\xcb\x87\bn\x9b\x01\x1f\xf8\xe8\x1eV\xfaC\xdf\xc3Vv\x9b\x1a\xfc\x14.c\x94\xc9=\xb0\x0f!d\b\x18*@m\x7f\xaal\x17G\xd6?\x81\x16P\x03\x10e\xc3\xcd\xb1B\xeb\x01B\\\x91A\xa1\x8an\xb4#\xadr\x1e\x81v\xa2\x0e6x\xca\x8b\xa6\xd8\x81\x10:\x0e(\xdd\xfc\xc9\xc6\xb4\xf0\'f:\xbd\xfe\x11\xf8\xc8W\x81s^\xd9W\xf1\x94\xaf\xc5\x8a\xb4f\x1b\x17E\xb23\x12\xb0\xeb\xef\x8c\xb24h\xd7}\x7f\x92Hgej\x957\xe2A'}, 0x30) 03:43:47 executing program 5: openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) ioctl$RNDADDENTROPY(0xffffffffffffffff, 0x40085203, &(0x7f0000000100)={0x6, 0xbc, "56f80f8d7c9ad684157765ee68815e033b7b2972a2d067318db9ac518603e0dbae813e160bd3f15b30c226056579cf64ac2525dd44c15e56204f1e3f1b8c03b31f4281605682d4b39a61b89636b3a2a5ea0bd3f5e8bd40d8c0406969d18fed78e4f4108902b5959ec383c40036f5262e703d6ad6a7a486302c382e45645bfe4c472249b482a28e9519e744cdbe884985d913612a17250eab7e4f0bf4b35aab9f7b923116a8d30baf612ca3bc2ef9b3f8d1c6b570cb60bd8d5b6805ce"}) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_sctp(0x2, 0x5, 0x84) dup3(0xffffffffffffffff, r0, 0x0) socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp_SCTP_AUTH_DEACTIVATE_KEY(0xffffffffffffffff, 0x84, 0x23, 0x0, 0x0) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f00000000c0)={0x51, 0xfffc, 0x0, {0x103, 0xf1}, {0x9}, @ramp={0x2, 0x3, {0x7fff, 0x0, 0x7, 0x7}}}) r1 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r1, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @bcast, @rose, @rose, @null]}, 0x48) listen(r1, 0x0) unshare(0x40000000) r2 = accept(r1, 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r3, 0xffffffffffffffff) write$binfmt_elf64(r2, &(0x7f00000002c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}], "", [[], []]}, 0x278) 03:43:47 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) 03:43:47 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) sendmmsg$inet(r0, &(0x7f0000001100)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000001340)="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", 0x2d9}], 0x1}}], 0x1, 0x0) 03:43:47 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x238) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) writev(r0, &(0x7f0000000540)=[{&(0x7f0000000140)="cedbddea5b67f4290aa7fd7c0cc7e2e613891a59fd3dc2e8a3c6e7c9fa96", 0x1e}, {&(0x7f0000000340)="e4bc7c957b83ba155edae525e00f76c76056ac3fe8a5de5ccfba604ac6b0d4a0fd42802b43143a32d703bd21baddda61ba1cb78758f519c19a06193e8bfc0d1f1fad3be6885359773264", 0x4a}, {0x0}], 0x3) sendto$inet(r0, &(0x7f00000012c0)="0c268a927f1f6588b967481241ba7860005cf65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95425a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x27) [ 706.502812][T28816] IPVS: ftp: loaded support on port[0] = 21 03:43:47 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x238) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) writev(r0, &(0x7f0000000540)=[{&(0x7f0000000140)="cedbddea5b67f4290aa7fd7c0cc7e2e613891a59fd3dc2e8a3c6e7c9fa96", 0x1e}, {&(0x7f0000000340)="e4bc7c957b83ba155edae525e00f76c76056ac3fe8a5de5ccfba604ac6b0d4a0fd42802b43143a32d703bd21baddda61ba1cb78758f519c19a06193e8bfc0d1f1fad3be6885359773264bd153a2bf50591662cca307c7a22f8a9e70629a1beac22b823bfee7fec832958c20007e0b8707c6ac0e8b1", 0x75}, {&(0x7f0000000800)="87cfb3bd1ada6e425bdd5aaccdafa6e4ea74", 0x12}], 0x3) sendto$inet(r0, &(0x7f00000012c0)="0c268a927f1f6588b967481241ba7860005cf65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95425a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x27) 03:43:47 executing program 1: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) 03:43:47 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) sendmmsg$inet(r0, &(0x7f0000001100)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000001340)="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", 0x2d9}], 0x1}}], 0x1, 0x0) 03:43:47 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x400007) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0x32600) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xb4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000040)='cpuset') write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000700)=ANY=[@ANYBLOB="006d176df3384ed3ddbcf3be0e26fd017529253262b78ee8b9d470"], 0x1b) ioctl$TUNSETCARRIER(0xffffffffffffffff, 0x400454e2, &(0x7f0000000080)=0x1) write$cgroup_int(r0, &(0x7f0000000380), 0x12) write$cgroup_int(r1, &(0x7f0000000400), 0xd) r2 = gettid() write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000000)=r2, 0x12) r3 = socket$kcm(0x2b, 0x0, 0x0) socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r3, 0x0, 0x0) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000280)=r2, 0x12) r4 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) close(r5) write$cgroup_type(r5, &(0x7f0000000080)='threaded\x00', 0xfffffc61) r6 = bpf$MAP_CREATE(0x2, &(0x7f0000009280), 0x3c) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x17, 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB], &(0x7f0000000200)='syzkaller\x00', 0xfa1, 0x0, 0x0, 0x41100, 0x2, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, &(0x7f0000000240), 0x8, 0x10, 0x0}, 0x78) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000008740)={0x0, 0x0, &(0x7f0000008700)=[{0x0}, {&(0x7f0000008680)=""/23, 0x17}, {&(0x7f00000086c0)=""/38, 0x26}], 0x3}, 0x8000) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x6, 0x2, 0x2e15579, 0x3f, 0x1, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffffff, 0x0, 0x5}, 0x3c) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0xb, [], 0x0, 0xc, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r7}, 0x7e) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r8, &(0x7f0000000000)=ANY=[], 0x50c000) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x18, 0x49, &(0x7f0000000a00)=ANY=[@ANYBLOB="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", @ANYRES32=r6, @ANYBLOB="00000000000000000c72c0fff6ffffff850000005b0000009500000000000000"], 0x0, 0x3ff, 0xd5, &(0x7f0000000080)=""/213, 0x61800, 0xab6c50112a8dd52c, [], 0x0, 0x16, 0xffffffffffffffff, 0x8, &(0x7f0000000180)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000001c0)={0x2, 0x6, 0x6, 0x5}, 0x10, 0x0, r8}, 0x78) bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x11, 0x5, 0x81, 0x2, 0x100, r5, 0x3, [], 0x0, 0xffffffffffffffff, 0x4, 0x3}, 0x3c) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r9, &(0x7f0000000200), 0x806000) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, r4, 0x0, 0x2a8, &(0x7f0000000440)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\a\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83CZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x98\x86\"R\x06\x00\x00\x00\x00\x00\x00\x00\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&\x014\x01\xf4\xb7\x83\x9a\xfa*\xa6\x06\xb7Pk7N\xc2\xd9\xee\xd0\xb0M\x00\xab\xc3\t\fc\xd8dx\xd5\x1dU*s)\x12[\x14\xb1\xc0\xd7\x1a\xa0\x16\xa2z\x9e\x93 \xddeF>29\v\x02\xa2b\x13R\xef\xffA,\xb9.$\xfa\x9f\xde[\x80\xd1=\xce\x1b\xeb\xf6\xf4\xe3z\x1f\x9dz\xa3\xc0\xe2\xa2\xb1\xeeq\xf5\xec0\x8e\xf4\xfb\xd9\x87\xf03\xdb\xae|\x10&V5c\xa6\xce\xcd\x8a\xdf\xe1\x89\"\xea\xde\xe7\xa3\xbe\xe7\xff\xf9 \x11\xfdY\xc6\xa1\xe8\xda\v\\?\xcb\x87\bn\x9b\x01\x1f\xf8\xe8\x1eV\xfaC\xdf\xc3Vv\x9b\x1a\xfc\x14.c\x94\xc9=\xb0\x0f!d\b\x18*@m\x7f\xaal\x17G\xd6?\x81\x16P\x03\x10e\xc3\xcd\xb1B\xeb\x01B\\\x91A\xa1\x8an\xb4#\xadr\x1e\x81v\xa2\x0e6x\xca\x8b\xa6\xd8\x81\x10:\x0e(\xdd\xfc\xc9\xc6\xb4\xf0\'f:\xbd\xfe\x11\xf8\xc8W\x81s^\xd9W\xf1\x94\xaf\xc5\x8a\xb4f\x1b\x17E\xb23\x12\xb0\xeb\xef\x8c\xb24h\xd7}\x7f\x92Hgej\x957\xe2A'}, 0x30) 03:43:47 executing program 5: openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) ioctl$RNDADDENTROPY(0xffffffffffffffff, 0x40085203, &(0x7f0000000100)={0x6, 0xbc, "56f80f8d7c9ad684157765ee68815e033b7b2972a2d067318db9ac518603e0dbae813e160bd3f15b30c226056579cf64ac2525dd44c15e56204f1e3f1b8c03b31f4281605682d4b39a61b89636b3a2a5ea0bd3f5e8bd40d8c0406969d18fed78e4f4108902b5959ec383c40036f5262e703d6ad6a7a486302c382e45645bfe4c472249b482a28e9519e744cdbe884985d913612a17250eab7e4f0bf4b35aab9f7b923116a8d30baf612ca3bc2ef9b3f8d1c6b570cb60bd8d5b6805ce"}) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_sctp(0x2, 0x5, 0x84) dup3(0xffffffffffffffff, r0, 0x0) socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp_SCTP_AUTH_DEACTIVATE_KEY(0xffffffffffffffff, 0x84, 0x23, 0x0, 0x0) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f00000000c0)={0x51, 0xfffc, 0x0, {0x103, 0xf1}, {0x9}, @ramp={0x2, 0x3, {0x7fff, 0x0, 0x7, 0x7}}}) r1 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r1, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @bcast, @rose, @rose, @null]}, 0x48) listen(r1, 0x0) unshare(0x40000000) r2 = accept(r1, 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r3, 0xffffffffffffffff) write$binfmt_elf64(r2, &(0x7f00000002c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}], "", [[], []]}, 0x278) 03:43:48 executing program 0: setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(0xffffffffffffffff, &(0x7f0000000280)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) sendmmsg$inet(0xffffffffffffffff, &(0x7f0000001100)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000001340)="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", 0x2d9}], 0x1}}], 0x1, 0x0) 03:43:48 executing program 1: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) [ 707.135632][T28841] IPVS: ftp: loaded support on port[0] = 21 03:43:48 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x238) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) writev(r0, &(0x7f0000000540)=[{&(0x7f0000000140)="cedbddea5b67f4290aa7fd7c0cc7e2e613891a59fd3dc2e8a3c6e7c9fa96", 0x1e}, {&(0x7f0000000340)="e4bc7c957b83ba155edae525e00f76c76056ac3fe8a5de5ccfba604ac6b0d4a0fd42802b43143a32d703bd21baddda61ba1cb78758f519c19a06193e8bfc0d1f1fad3be6885359773264", 0x4a}, {0x0}], 0x3) sendto$inet(r0, &(0x7f00000012c0)="0c268a927f1f6588b967481241ba7860005cf65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95425a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x27) 03:43:48 executing program 1: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) 03:43:48 executing program 0: setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(0xffffffffffffffff, &(0x7f0000000280)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) sendmmsg$inet(0xffffffffffffffff, &(0x7f0000001100)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000001340)="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", 0x2d9}], 0x1}}], 0x1, 0x0) 03:43:48 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x400007) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0x32600) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xb4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000040)='cpuset') write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000700)=ANY=[@ANYBLOB="006d176df3384ed3ddbcf3be0e26fd017529253262b78ee8b9d470"], 0x1b) ioctl$TUNSETCARRIER(0xffffffffffffffff, 0x400454e2, &(0x7f0000000080)=0x1) write$cgroup_int(r0, &(0x7f0000000380), 0x12) write$cgroup_int(r1, &(0x7f0000000400), 0xd) r2 = gettid() write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000000)=r2, 0x12) r3 = socket$kcm(0x2b, 0x0, 0x0) socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r3, 0x0, 0x0) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000280)=r2, 0x12) r4 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) close(r5) write$cgroup_type(r5, &(0x7f0000000080)='threaded\x00', 0xfffffc61) r6 = bpf$MAP_CREATE(0x2, &(0x7f0000009280), 0x3c) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x17, 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB], &(0x7f0000000200)='syzkaller\x00', 0xfa1, 0x0, 0x0, 0x41100, 0x2, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, &(0x7f0000000240), 0x8, 0x10, 0x0}, 0x78) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000008740)={0x0, 0x0, &(0x7f0000008700)=[{0x0}, {&(0x7f0000008680)=""/23, 0x17}, {&(0x7f00000086c0)=""/38, 0x26}], 0x3}, 0x8000) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x6, 0x2, 0x2e15579, 0x3f, 0x1, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffffff, 0x0, 0x5}, 0x3c) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0xb, [], 0x0, 0xc, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r7}, 0x7e) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r8, &(0x7f0000000000)=ANY=[], 0x50c000) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x18, 0x49, &(0x7f0000000a00)=ANY=[@ANYBLOB="0000752c0000000000000000ffffffff9500000000000000181400006200ed587c1ba87fb23af22b6cf03fb851054ce322d4b3a5894516c0c1479e1cfbf3061ad7aef6d6c36e4e74a8219f8441192ab16361719f26a1e543525c94027f7a5f275546d8cacee044fc20d858e268019caeb1633cc4888faa05d02cd44de32962e022697754125edcfb3477c4e122a0e97ab43de94a7a94efd527400e2c2ff4468fd6e773773f089b268fddef712ab174487ae9049f64895522be3862156a1af15513c3ff285844c9aae255d74c0dacf6c47d6809ce69ee6e41a03a03b29152ee43afabd82aa883f260995238aa70895dc3aee59a119dc82fb5fd00af56ded09336e2df6a0bb41bd191d57b35eb262a1aa8d5fec51b24500685f8c0adaf3639790fdbd7cb2ac3af37a802a6ac7265a819c91986c45e7c54d91c5ced552d96c04a80c063fee16b3a52bc603deebe32e4e0dfdfe9d03658daad65606e175041076684110e66f74db9509b1a29e765c9208ddba13e3b42b3963dce5432c4fb7844a9b64c518820c9c0198fadb6ea6a350f89a1eb1a3c1e20527ce574c3514f9ad62be70eee070faa267d83564e6db87e4d16ccd118397c2e4825140e6b46c35edb77df7b9a3334ad3f8cb70b73f4b9d8b29eb50b2c2dfc8d82841a6251fcfcb978ce90873ddcfa0125800302f5ed70c724e0253fb45955750f1e7c94ca05a91ec592ee3a52fad94c89205ece2d1d96afbfa0b59f9bd6c1161c638fff8696973fedca3f3ddf5bbb1023", @ANYRES32=r6, @ANYBLOB="00000000000000000c72c0fff6ffffff850000005b0000009500000000000000"], 0x0, 0x3ff, 0xd5, &(0x7f0000000080)=""/213, 0x61800, 0xab6c50112a8dd52c, [], 0x0, 0x16, 0xffffffffffffffff, 0x8, &(0x7f0000000180)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000001c0)={0x2, 0x6, 0x6, 0x5}, 0x10, 0x0, r8}, 0x78) bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x11, 0x5, 0x81, 0x2, 0x100, r5, 0x3, [], 0x0, 0xffffffffffffffff, 0x4, 0x3}, 0x3c) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r9, &(0x7f0000000200), 0x806000) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, r4, 0x0, 0x2a8, &(0x7f0000000440)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\a\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83CZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x98\x86\"R\x06\x00\x00\x00\x00\x00\x00\x00\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&\x014\x01\xf4\xb7\x83\x9a\xfa*\xa6\x06\xb7Pk7N\xc2\xd9\xee\xd0\xb0M\x00\xab\xc3\t\fc\xd8dx\xd5\x1dU*s)\x12[\x14\xb1\xc0\xd7\x1a\xa0\x16\xa2z\x9e\x93 \xddeF>29\v\x02\xa2b\x13R\xef\xffA,\xb9.$\xfa\x9f\xde[\x80\xd1=\xce\x1b\xeb\xf6\xf4\xe3z\x1f\x9dz\xa3\xc0\xe2\xa2\xb1\xeeq\xf5\xec0\x8e\xf4\xfb\xd9\x87\xf03\xdb\xae|\x10&V5c\xa6\xce\xcd\x8a\xdf\xe1\x89\"\xea\xde\xe7\xa3\xbe\xe7\xff\xf9 \x11\xfdY\xc6\xa1\xe8\xda\v\\?\xcb\x87\bn\x9b\x01\x1f\xf8\xe8\x1eV\xfaC\xdf\xc3Vv\x9b\x1a\xfc\x14.c\x94\xc9=\xb0\x0f!d\b\x18*@m\x7f\xaal\x17G\xd6?\x81\x16P\x03\x10e\xc3\xcd\xb1B\xeb\x01B\\\x91A\xa1\x8an\xb4#\xadr\x1e\x81v\xa2\x0e6x\xca\x8b\xa6\xd8\x81\x10:\x0e(\xdd\xfc\xc9\xc6\xb4\xf0\'f:\xbd\xfe\x11\xf8\xc8W\x81s^\xd9W\xf1\x94\xaf\xc5\x8a\xb4f\x1b\x17E\xb23\x12\xb0\xeb\xef\x8c\xb24h\xd7}\x7f\x92Hgej\x957\xe2A'}, 0x30) 03:43:48 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x238) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) writev(r0, &(0x7f0000000540)=[{&(0x7f0000000140)="cedbddea5b67f4290aa7fd7c0cc7e2e613891a59fd3dc2e8a3c6e7c9fa96", 0x1e}, {&(0x7f0000000340)="e4bc7c957b83ba155edae525e00f76c76056ac3fe8a5de5ccfba604ac6b0d4a0fd42802b43143a32d703bd21baddda61ba1cb78758f519c19a06193e8bfc0d1f1fad3be6885359773264bd153a2bf50591662cca307c7a22f8a9e70629a1beac22b823bfee7fec832958c20007e0b8707c6ac0e8b1", 0x75}, {&(0x7f0000000800)="87cfb3bd1ada6e425bdd5aaccdafa6e4ea74", 0x12}], 0x3) sendto$inet(r0, &(0x7f00000012c0)="0c268a927f1f6588b967481241ba7860005cf65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95425a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x27) 03:43:48 executing program 5: openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) ioctl$RNDADDENTROPY(0xffffffffffffffff, 0x40085203, &(0x7f0000000100)={0x6, 0xbc, "56f80f8d7c9ad684157765ee68815e033b7b2972a2d067318db9ac518603e0dbae813e160bd3f15b30c226056579cf64ac2525dd44c15e56204f1e3f1b8c03b31f4281605682d4b39a61b89636b3a2a5ea0bd3f5e8bd40d8c0406969d18fed78e4f4108902b5959ec383c40036f5262e703d6ad6a7a486302c382e45645bfe4c472249b482a28e9519e744cdbe884985d913612a17250eab7e4f0bf4b35aab9f7b923116a8d30baf612ca3bc2ef9b3f8d1c6b570cb60bd8d5b6805ce"}) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_sctp(0x2, 0x5, 0x84) dup3(0xffffffffffffffff, r0, 0x0) socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp_SCTP_AUTH_DEACTIVATE_KEY(0xffffffffffffffff, 0x84, 0x23, 0x0, 0x0) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f00000000c0)={0x51, 0xfffc, 0x0, {0x103, 0xf1}, {0x9}, @ramp={0x2, 0x3, {0x7fff, 0x0, 0x7, 0x7}}}) r1 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r1, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @bcast, @rose, @rose, @null]}, 0x48) listen(r1, 0x0) unshare(0x40000000) r2 = accept(r1, 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r3, 0xffffffffffffffff) write$binfmt_elf64(r2, &(0x7f00000002c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}], "", [[], []]}, 0x278) 03:43:48 executing program 1: r0 = socket$inet(0x2, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) 03:43:48 executing program 0: setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(0xffffffffffffffff, &(0x7f0000000280)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) sendmmsg$inet(0xffffffffffffffff, &(0x7f0000001100)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000001340)="492b7b56e7bf1546ba9024d15debc3fdf835944e6359dfc82ad6a44af6174b7048d6774edb2a522c3b5aebed3bba4b546494bbf6043a7a659fa12216b37584d6922636fff14b623e8c3e9fe28800be702458a4e01e63a39ce0913a26da044aa26f457632cfb8104ef5156bc27f3c08d0a0662a69249556e9a7dcc2da9fdefdd1378f5ef60bb2a8ea72a06c11be333049a90b1c46352f3c5409e32849a93d43e39038bd6c1d6e8eab5b135933cc6fc02853cf997defa87b0bdc2eedad7426259c9118c5a885705288956f19cf9fcb5a5e3f772253900b73288028f2135004a304699d8879a3b2570b1c0f7d45bd5a730a2e57413513c2bb12b095d986617eab6020147d6974b75058c7d235a54b139958054e31290acf55b048b3a6a5e7515295ba626378ce82b4ee22cc23bd5b82363bcb7ff225fc556ecfa3b764d8ef16aa66c6b85d546bac428bfd4e23996cc7d4b1f36e08bf5611234fa7ecf93d7835ab9b0302b9371497d4ab867e0d5750a3d047abef4793b4a80055c50797e611556c1e29e825c3980bd81a4b221d44f9abefeea268e98df6310f32755bc5c2fd19e9ab91958074421fbc49a067de17743a2eb60aecee575d892009f653bd7548f24194179f506ad2e30e2910f51231eff390e2e6b28a834ef9c2380df877e8ac1d4649df50e06ec92ad336888ac4d45db52a2dead697ba7b1ebf042cdcc9fa2c8af8e818375fc8dc0689f6d16478be23bee3cc43e5ff224bdbbd089cdbcced85a88a739f8fc81314e362527742ae15b57d200580205ee0000cbf1b47d38ff82eb464b778cd5beffd4d43378e7ebed4a31b3fb7d325b958b9eb9d7c5fc4274ecb863c1edd6fc4ef7f6b58dee0cbbe57293c33a3d098501c91f45fff812bc8036f9b13181d223d23be06d53bb0b0f4d3a05ca9d0b2e4de29fe137077bb6d39d0b97d818115d867dad9586f9c71153e4dc2bb8a0d0436769ed8e6bb9ddadb8eb91cbfdd9efc801ebe106ed8151e61153db150c2e2fa4109740028cdb606", 0x2d9}], 0x1}}], 0x1, 0x0) 03:43:48 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x238) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) writev(r0, &(0x7f0000000540)=[{&(0x7f0000000340)="e4bc7c957b83ba155edae525e00f76c76056ac3fe8a5de5ccfba604ac6b0d4a0fd42802b43143a32d703bd21baddda61ba1cb78758f519c19a06193e8bfc0d1f1fad3be6885359773264bd", 0x4b}, {0x0}], 0x2) sendto$inet(r0, &(0x7f00000012c0)="0c268a927f1f6588b967481241ba7860005cf65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95425a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x27) [ 707.933813][T28865] IPVS: ftp: loaded support on port[0] = 21 03:43:49 executing program 0: r0 = socket$inet(0x2, 0x0, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) sendmmsg$inet(r0, &(0x7f0000001100)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000001340)="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", 0x2d9}], 0x1}}], 0x1, 0x0) 03:43:49 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x400007) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0x32600) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xb4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000040)='cpuset') write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000700)=ANY=[@ANYBLOB="006d176df3384ed3ddbcf3be0e26fd017529253262b78ee8b9d470"], 0x1b) ioctl$TUNSETCARRIER(0xffffffffffffffff, 0x400454e2, &(0x7f0000000080)=0x1) write$cgroup_int(r0, &(0x7f0000000380), 0x12) write$cgroup_int(r1, &(0x7f0000000400), 0xd) r2 = gettid() write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000000)=r2, 0x12) r3 = socket$kcm(0x2b, 0x0, 0x0) socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r3, 0x0, 0x0) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000280)=r2, 0x12) r4 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) close(r5) write$cgroup_type(r5, &(0x7f0000000080)='threaded\x00', 0xfffffc61) r6 = bpf$MAP_CREATE(0x2, &(0x7f0000009280), 0x3c) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x17, 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB], &(0x7f0000000200)='syzkaller\x00', 0xfa1, 0x0, 0x0, 0x41100, 0x2, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, &(0x7f0000000240), 0x8, 0x10, 0x0}, 0x78) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000008740)={0x0, 0x0, &(0x7f0000008700)=[{0x0}, {&(0x7f0000008680)=""/23, 0x17}, {&(0x7f00000086c0)=""/38, 0x26}], 0x3}, 0x8000) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x6, 0x2, 0x2e15579, 0x3f, 0x1, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffffff, 0x0, 0x5}, 0x3c) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0xb, [], 0x0, 0xc, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r7}, 0x7e) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r8, &(0x7f0000000000)=ANY=[], 0x50c000) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x18, 0x49, &(0x7f0000000a00)=ANY=[@ANYBLOB="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", @ANYRES32=r6, @ANYBLOB="00000000000000000c72c0fff6ffffff850000005b0000009500000000000000"], 0x0, 0x3ff, 0xd5, &(0x7f0000000080)=""/213, 0x61800, 0xab6c50112a8dd52c, [], 0x0, 0x16, 0xffffffffffffffff, 0x8, &(0x7f0000000180)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000001c0)={0x2, 0x6, 0x6, 0x5}, 0x10, 0x0, r8}, 0x78) bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x11, 0x5, 0x81, 0x2, 0x100, r5, 0x3, [], 0x0, 0xffffffffffffffff, 0x4, 0x3}, 0x3c) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r9, &(0x7f0000000200), 0x806000) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, r4, 0x0, 0x2a8, &(0x7f0000000440)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\a\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83CZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x98\x86\"R\x06\x00\x00\x00\x00\x00\x00\x00\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&\x014\x01\xf4\xb7\x83\x9a\xfa*\xa6\x06\xb7Pk7N\xc2\xd9\xee\xd0\xb0M\x00\xab\xc3\t\fc\xd8dx\xd5\x1dU*s)\x12[\x14\xb1\xc0\xd7\x1a\xa0\x16\xa2z\x9e\x93 \xddeF>29\v\x02\xa2b\x13R\xef\xffA,\xb9.$\xfa\x9f\xde[\x80\xd1=\xce\x1b\xeb\xf6\xf4\xe3z\x1f\x9dz\xa3\xc0\xe2\xa2\xb1\xeeq\xf5\xec0\x8e\xf4\xfb\xd9\x87\xf03\xdb\xae|\x10&V5c\xa6\xce\xcd\x8a\xdf\xe1\x89\"\xea\xde\xe7\xa3\xbe\xe7\xff\xf9 \x11\xfdY\xc6\xa1\xe8\xda\v\\?\xcb\x87\bn\x9b\x01\x1f\xf8\xe8\x1eV\xfaC\xdf\xc3Vv\x9b\x1a\xfc\x14.c\x94\xc9=\xb0\x0f!d\b\x18*@m\x7f\xaal\x17G\xd6?\x81\x16P\x03\x10e\xc3\xcd\xb1B\xeb\x01B\\\x91A\xa1\x8an\xb4#\xadr\x1e\x81v\xa2\x0e6x\xca\x8b\xa6\xd8\x81\x10:\x0e(\xdd\xfc\xc9\xc6\xb4\xf0\'f:\xbd\xfe\x11\xf8\xc8W\x81s^\xd9W\xf1\x94\xaf\xc5\x8a\xb4f\x1b\x17E\xb23\x12\xb0\xeb\xef\x8c\xb24h\xd7}\x7f\x92Hgej\x957\xe2A'}, 0x30) 03:43:49 executing program 1: r0 = socket$inet(0x2, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) 03:43:49 executing program 1: r0 = socket$inet(0x2, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) 03:43:49 executing program 0: r0 = socket$inet(0x2, 0x0, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) sendmmsg$inet(r0, &(0x7f0000001100)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000001340)="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", 0x2d9}], 0x1}}], 0x1, 0x0) 03:43:49 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x238) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) writev(r0, &(0x7f0000000540)=[{&(0x7f0000000140)="cedbddea5b67f4290aa7fd7c0cc7e2e613891a59fd3dc2e8a3c6e7c9fa96", 0x1e}, {&(0x7f0000000340)="e4bc7c957b83ba155edae525e00f76c76056ac3fe8a5de5ccfba604ac6b0d4a0fd42802b43143a32d703bd21baddda61ba1cb78758f519c19a06193e8bfc0d1f1fad3be6885359773264bd153a2bf50591662cca307c7a22f8a9e70629a1beac22b823bfee7fec832958c20007e0b8707c6ac0e8b1", 0x75}, {0x0}, {&(0x7f0000000800)="87cfb3bd1ada6e425bdd5aaccdafa6e4ea74", 0x12}], 0x4) sendto$inet(r0, &(0x7f00000012c0)="0c268a927f1f6588b967481241ba7860005cf65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95425a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x27) 03:43:49 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x400007) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0x32600) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xb4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000040)='cpuset') write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000700)=ANY=[@ANYBLOB="006d176df3384ed3ddbcf3be0e26fd017529253262b78ee8b9d470"], 0x1b) ioctl$TUNSETCARRIER(0xffffffffffffffff, 0x400454e2, &(0x7f0000000080)=0x1) write$cgroup_int(r0, &(0x7f0000000380), 0x12) write$cgroup_int(r1, &(0x7f0000000400), 0xd) r2 = gettid() write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000000)=r2, 0x12) r3 = socket$kcm(0x2b, 0x0, 0x0) socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r3, 0x0, 0x0) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000280)=r2, 0x12) r4 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) close(r5) write$cgroup_type(r5, &(0x7f0000000080)='threaded\x00', 0xfffffc61) r6 = bpf$MAP_CREATE(0x2, &(0x7f0000009280), 0x3c) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x17, 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB], &(0x7f0000000200)='syzkaller\x00', 0xfa1, 0x0, 0x0, 0x41100, 0x2, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, &(0x7f0000000240), 0x8, 0x10, 0x0}, 0x78) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000008740)={0x0, 0x0, &(0x7f0000008700)=[{0x0}, {&(0x7f0000008680)=""/23, 0x17}, {&(0x7f00000086c0)=""/38, 0x26}], 0x3}, 0x8000) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x6, 0x2, 0x2e15579, 0x3f, 0x1, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffffff, 0x0, 0x5}, 0x3c) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0xb, [], 0x0, 0xc, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r7}, 0x7e) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r8, &(0x7f0000000000)=ANY=[], 0x50c000) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x18, 0x8, &(0x7f0000000a00)=ANY=[@ANYBLOB="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", @ANYRES32=r6, @ANYBLOB="00000000000000000c72c0fff6ffffff850000005b0000009500000000000000"], &(0x7f0000000040)='GPL\x00', 0x0, 0xd5, &(0x7f0000000080)=""/213, 0x61800, 0xab6c50112a8dd52c, [], 0x0, 0x16, 0xffffffffffffffff, 0x8, &(0x7f0000000180)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000001c0)={0x2, 0x6, 0x6, 0x5}, 0x10, 0x0, r8}, 0x78) bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x11, 0x5, 0x81, 0x2, 0x100, r5, 0x3, [], 0x0, 0xffffffffffffffff, 0x4, 0x3}, 0x3c) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r9, &(0x7f0000000200), 0x806000) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, r4, 0x0, 0x2a8, &(0x7f0000000440)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\a\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83CZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x98\x86\"R\x06\x00\x00\x00\x00\x00\x00\x00\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&\x014\x01\xf4\xb7\x83\x9a\xfa*\xa6\x06\xb7Pk7N\xc2\xd9\xee\xd0\xb0M\x00\xab\xc3\t\fc\xd8dx\xd5\x1dU*s)\x12[\x14\xb1\xc0\xd7\x1a\xa0\x16\xa2z\x9e\x93 \xddeF>29\v\x02\xa2b\x13R\xef\xffA,\xb9.$\xfa\x9f\xde[\x80\xd1=\xce\x1b\xeb\xf6\xf4\xe3z\x1f\x9dz\xa3\xc0\xe2\xa2\xb1\xeeq\xf5\xec0\x8e\xf4\xfb\xd9\x87\xf03\xdb\xae|\x10&V5c\xa6\xce\xcd\x8a\xdf\xe1\x89\"\xea\xde\xe7\xa3\xbe\xe7\xff\xf9 \x11\xfdY\xc6\xa1\xe8\xda\v\\?\xcb\x87\bn\x9b\x01\x1f\xf8\xe8\x1eV\xfaC\xdf\xc3Vv\x9b\x1a\xfc\x14.c\x94\xc9=\xb0\x0f!d\b\x18*@m\x7f\xaal\x17G\xd6?\x81\x16P\x03\x10e\xc3\xcd\xb1B\xeb\x01B\\\x91A\xa1\x8an\xb4#\xadr\x1e\x81v\xa2\x0e6x\xca\x8b\xa6\xd8\x81\x10:\x0e(\xdd\xfc\xc9\xc6\xb4\xf0\'f:\xbd\xfe\x11\xf8\xc8W\x81s^\xd9W\xf1\x94\xaf\xc5\x8a\xb4f\x1b\x17E\xb23\x12\xb0\xeb\xef\x8c\xb24h\xd7}\x7f\x92Hgej\x957\xe2A'}, 0x30) 03:43:49 executing program 5: openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) ioctl$RNDADDENTROPY(0xffffffffffffffff, 0x40085203, &(0x7f0000000100)={0x6, 0xbc, "56f80f8d7c9ad684157765ee68815e033b7b2972a2d067318db9ac518603e0dbae813e160bd3f15b30c226056579cf64ac2525dd44c15e56204f1e3f1b8c03b31f4281605682d4b39a61b89636b3a2a5ea0bd3f5e8bd40d8c0406969d18fed78e4f4108902b5959ec383c40036f5262e703d6ad6a7a486302c382e45645bfe4c472249b482a28e9519e744cdbe884985d913612a17250eab7e4f0bf4b35aab9f7b923116a8d30baf612ca3bc2ef9b3f8d1c6b570cb60bd8d5b6805ce"}) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_sctp(0x2, 0x5, 0x84) dup3(0xffffffffffffffff, r0, 0x0) socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp_SCTP_AUTH_DEACTIVATE_KEY(0xffffffffffffffff, 0x84, 0x23, 0x0, 0x0) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f00000000c0)={0x51, 0xfffc, 0x0, {0x103, 0xf1}, {0x9}, @ramp={0x2, 0x3, {0x7fff, 0x0, 0x7, 0x7}}}) r1 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r1, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @bcast, @rose, @rose, @null]}, 0x48) listen(r1, 0x0) unshare(0x40000000) r2 = accept(r1, 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r3, 0xffffffffffffffff) write$binfmt_elf64(r2, &(0x7f00000002c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}], "", [[], []]}, 0x278) 03:43:49 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x238) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) writev(r0, &(0x7f0000000540)=[{&(0x7f0000000340)="e4bc7c957b83ba155edae525e00f76c76056ac3fe8a5de5ccfba604ac6b0d4a0fd42802b43143a32d703bd21baddda61ba1cb78758f519c19a06193e8bfc0d1f1fad3be6885359773264bd", 0x4b}, {0x0}], 0x2) sendto$inet(r0, &(0x7f00000012c0)="0c268a927f1f6588b967481241ba7860005cf65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95425a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x27) 03:43:49 executing program 1: socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) 03:43:49 executing program 0: r0 = socket$inet(0x2, 0x0, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) sendmmsg$inet(r0, &(0x7f0000001100)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000001340)="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", 0x2d9}], 0x1}}], 0x1, 0x0) [ 708.917003][T29219] IPVS: ftp: loaded support on port[0] = 21 03:43:50 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) sendmmsg$inet(r0, &(0x7f0000001100)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000001340)="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", 0x2d9}], 0x1}}], 0x1, 0x0) 03:43:50 executing program 1: socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) 03:43:50 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x400007) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0x32600) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xb4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000040)='cpuset') write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000700)=ANY=[@ANYBLOB="006d176df3384ed3ddbcf3be0e26fd017529253262b78ee8b9d470"], 0x1b) ioctl$TUNSETCARRIER(0xffffffffffffffff, 0x400454e2, &(0x7f0000000080)=0x1) write$cgroup_int(r0, &(0x7f0000000380), 0x12) write$cgroup_int(r1, &(0x7f0000000400), 0xd) r2 = gettid() write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000000)=r2, 0x12) r3 = socket$kcm(0x2b, 0x0, 0x0) socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r3, 0x0, 0x0) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000280)=r2, 0x12) r4 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) close(r5) write$cgroup_type(r5, &(0x7f0000000080)='threaded\x00', 0xfffffc61) r6 = bpf$MAP_CREATE(0x2, &(0x7f0000009280), 0x3c) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x17, 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB], &(0x7f0000000200)='syzkaller\x00', 0xfa1, 0x0, 0x0, 0x41100, 0x2, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, &(0x7f0000000240), 0x8, 0x10, 0x0}, 0x78) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000008740)={0x0, 0x0, &(0x7f0000008700)=[{0x0}, {&(0x7f0000008680)=""/23, 0x17}, {&(0x7f00000086c0)=""/38, 0x26}], 0x3}, 0x8000) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x6, 0x2, 0x2e15579, 0x3f, 0x1, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffffff, 0x0, 0x5}, 0x3c) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0xb, [], 0x0, 0xc, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r7}, 0x7e) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r8, &(0x7f0000000000)=ANY=[], 0x50c000) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x18, 0x8, &(0x7f0000000a00)=ANY=[@ANYBLOB="0000752c0000000000000000ffffffff9500000000000000181400006200ed587c1ba87fb23af22b6cf03fb851054ce322d4b3a5894516c0c1479e1cfbf3061ad7aef6d6c36e4e74a8219f8441192ab16361719f26a1e543525c94027f7a5f275546d8cacee044fc20d858e268019caeb1633cc4888faa05d02cd44de32962e022697754125edcfb3477c4e122a0e97ab43de94a7a94efd527400e2c2ff4468fd6e773773f089b268fddef712ab174487ae9049f64895522be3862156a1af15513c3ff285844c9aae255d74c0dacf6c47d6809ce69ee6e41a03a03b29152ee43afabd82aa883f260995238aa70895dc3aee59a119dc82fb5fd00af56ded09336e2df6a0bb41bd191d57b35eb262a1aa8d5fec51b24500685f8c0adaf3639790fdbd7cb2ac3af37a802a6ac7265a819c91986c45e7c54d91c5ced552d96c04a80c063fee16b3a52bc603deebe32e4e0dfdfe9d03658daad65606e175041076684110e66f74db9509b1a29e765c9208ddba13e3b42b3963dce5432c4fb7844a9b64c518820c9c0198fadb6ea6a350f89a1eb1a3c1e20527ce574c3514f9ad62be70eee070faa267d83564e6db87e4d16ccd118397c2e4825140e6b46c35edb77df7b9a3334ad3f8cb70b73f4b9d8b29eb50b2c2dfc8d82841a6251fcfcb978ce90873ddcfa0125800302f5ed70c724e0253fb45955750f1e7c94ca05a91ec592ee3a52fad94c89205ece2d1d96afbfa0b59f9bd6c1161c638fff8696973fedca3f3ddf5bbb1023", @ANYRES32=r6, @ANYBLOB="00000000000000000c72c0fff6ffffff850000005b0000009500000000000000"], &(0x7f0000000040)='GPL\x00', 0x0, 0xd5, &(0x7f0000000080)=""/213, 0x61800, 0xab6c50112a8dd52c, [], 0x0, 0x16, 0xffffffffffffffff, 0x8, &(0x7f0000000180)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000001c0)={0x2, 0x6, 0x6, 0x5}, 0x10, 0x0, r8}, 0x78) bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x11, 0x5, 0x81, 0x2, 0x100, r5, 0x3, [], 0x0, 0xffffffffffffffff, 0x4, 0x3}, 0x3c) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r9, &(0x7f0000000200), 0x806000) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, r4, 0x0, 0x2a8, &(0x7f0000000440)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\a\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83CZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x98\x86\"R\x06\x00\x00\x00\x00\x00\x00\x00\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&\x014\x01\xf4\xb7\x83\x9a\xfa*\xa6\x06\xb7Pk7N\xc2\xd9\xee\xd0\xb0M\x00\xab\xc3\t\fc\xd8dx\xd5\x1dU*s)\x12[\x14\xb1\xc0\xd7\x1a\xa0\x16\xa2z\x9e\x93 \xddeF>29\v\x02\xa2b\x13R\xef\xffA,\xb9.$\xfa\x9f\xde[\x80\xd1=\xce\x1b\xeb\xf6\xf4\xe3z\x1f\x9dz\xa3\xc0\xe2\xa2\xb1\xeeq\xf5\xec0\x8e\xf4\xfb\xd9\x87\xf03\xdb\xae|\x10&V5c\xa6\xce\xcd\x8a\xdf\xe1\x89\"\xea\xde\xe7\xa3\xbe\xe7\xff\xf9 \x11\xfdY\xc6\xa1\xe8\xda\v\\?\xcb\x87\bn\x9b\x01\x1f\xf8\xe8\x1eV\xfaC\xdf\xc3Vv\x9b\x1a\xfc\x14.c\x94\xc9=\xb0\x0f!d\b\x18*@m\x7f\xaal\x17G\xd6?\x81\x16P\x03\x10e\xc3\xcd\xb1B\xeb\x01B\\\x91A\xa1\x8an\xb4#\xadr\x1e\x81v\xa2\x0e6x\xca\x8b\xa6\xd8\x81\x10:\x0e(\xdd\xfc\xc9\xc6\xb4\xf0\'f:\xbd\xfe\x11\xf8\xc8W\x81s^\xd9W\xf1\x94\xaf\xc5\x8a\xb4f\x1b\x17E\xb23\x12\xb0\xeb\xef\x8c\xb24h\xd7}\x7f\x92Hgej\x957\xe2A'}, 0x30) 03:43:50 executing program 5: openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) ioctl$RNDADDENTROPY(0xffffffffffffffff, 0x40085203, &(0x7f0000000100)={0x6, 0xbc, "56f80f8d7c9ad684157765ee68815e033b7b2972a2d067318db9ac518603e0dbae813e160bd3f15b30c226056579cf64ac2525dd44c15e56204f1e3f1b8c03b31f4281605682d4b39a61b89636b3a2a5ea0bd3f5e8bd40d8c0406969d18fed78e4f4108902b5959ec383c40036f5262e703d6ad6a7a486302c382e45645bfe4c472249b482a28e9519e744cdbe884985d913612a17250eab7e4f0bf4b35aab9f7b923116a8d30baf612ca3bc2ef9b3f8d1c6b570cb60bd8d5b6805ce"}) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_sctp(0x2, 0x0, 0x84) dup3(0xffffffffffffffff, r0, 0x0) socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp_SCTP_AUTH_DEACTIVATE_KEY(0xffffffffffffffff, 0x84, 0x23, 0x0, 0x0) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f00000000c0)={0x51, 0xfffc, 0x0, {0x103, 0xf1}, {0x9}, @ramp={0x2, 0x3, {0x7fff, 0x0, 0x7, 0x7}}}) r1 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r1, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @bcast, @rose, @rose, @null]}, 0x48) listen(r1, 0x0) unshare(0x40000000) r2 = accept(r1, 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r3, 0xffffffffffffffff) write$binfmt_elf64(r2, &(0x7f00000002c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}], "", [[], []]}, 0x278) 03:43:50 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x238) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) writev(r0, &(0x7f0000000540)=[{&(0x7f0000000340)="e4bc7c957b83ba155edae525e00f76c76056ac3fe8a5de5ccfba604ac6b0d4a0fd42802b43143a32d703bd21baddda61ba1cb78758f519c19a06193e8bfc0d1f1fad3be6885359773264bd", 0x4b}, {0x0}], 0x2) sendto$inet(r0, &(0x7f00000012c0)="0c268a927f1f6588b967481241ba7860005cf65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95425a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x27) 03:43:50 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x238) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) writev(r0, &(0x7f0000000540)=[{&(0x7f0000000140)="cedbddea5b67f4290aa7fd7c0cc7e2e613891a59fd3dc2e8a3c6e7c9fa96", 0x1e}, {&(0x7f0000000340)="e4bc7c957b83ba155edae525e00f76c76056ac3fe8a5de5ccfba604ac6b0d4a0fd42802b43143a32d703bd21baddda61ba1cb78758f519c19a06193e8bfc0d1f1fad3be6885359773264bd153a2bf50591662cca307c7a22f8a9e70629a1beac22b823bfee7fec832958c20007e0b8707c6ac0e8b1", 0x75}, {0x0}, {&(0x7f0000000800)="87cfb3bd1ada6e425bdd5aaccdafa6e4ea74", 0x12}], 0x4) sendto$inet(r0, &(0x7f00000012c0)="0c268a927f1f6588b967481241ba7860005cf65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95425a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x27) 03:43:50 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) sendmmsg$inet(r0, &(0x7f0000001100)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000001340)="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", 0x2d9}], 0x1}}], 0x1, 0x0) 03:43:50 executing program 1: socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) [ 709.600442][T29243] IPVS: ftp: loaded support on port[0] = 21 03:43:50 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) sendmmsg$inet(r0, &(0x7f0000001100)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000001340)="492b7b56e7bf1546ba9024d15debc3fdf835944e6359dfc82ad6a44af6174b7048d6774edb2a522c3b5aebed3bba4b546494bbf6043a7a659fa12216b37584d6922636fff14b623e8c3e9fe28800be702458a4e01e63a39ce0913a26da044aa26f457632cfb8104ef5156bc27f3c08d0a0662a69249556e9a7dcc2da9fdefdd1378f5ef60bb2a8ea72a06c11be333049a90b1c46352f3c5409e32849a93d43e39038bd6c1d6e8eab5b135933cc6fc02853cf997defa87b0bdc2eedad7426259c9118c5a885705288956f19cf9fcb5a5e3f772253900b73288028f2135004a304699d8879a3b2570b1c0f7d45bd5a730a2e57413513c2bb12b095d986617eab6020147d6974b75058c7d235a54b139958054e31290acf55b048b3a6a5e7515295ba626378ce82b4ee22cc23bd5b82363bcb7ff225fc556ecfa3b764d8ef16aa66c6b85d546bac428bfd4e23996cc7d4b1f36e08bf5611234fa7ecf93d7835ab9b0302b9371497d4ab867e0d5750a3d047abef4793b4a80055c50797e611556c1e29e825c3980bd81a4b221d44f9abefeea268e98df6310f32755bc5c2fd19e9ab91958074421fbc49a067de17743a2eb60aecee575d892009f653bd7548f24194179f506ad2e30e2910f51231eff390e2e6b28a834ef9c2380df877e8ac1d4649df50e06ec92ad336888ac4d45db52a2dead697ba7b1ebf042cdcc9fa2c8af8e818375fc8dc0689f6d16478be23bee3cc43e5ff224bdbbd089cdbcced85a88a739f8fc81314e362527742ae15b57d200580205ee0000cbf1b47d38ff82eb464b778cd5beffd4d43378e7ebed4a31b3fb7d325b958b9eb9d7c5fc4274ecb863c1edd6fc4ef7f6b58dee0cbbe57293c33a3d098501c91f45fff812bc8036f9b13181d223d23be06d53bb0b0f4d3a05ca9d0b2e4de29fe137077bb6d39d0b97d818115d867dad9586f9c71153e4dc2bb8a0d0436769ed8e6bb9ddadb8eb91cbfdd9efc801ebe106ed8151e61153db150c2e2fa4109740028cdb606", 0x2d9}], 0x1}}], 0x1, 0x0) 03:43:50 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, 0x0, 0x0) 03:43:50 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x400007) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0x32600) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xb4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000040)='cpuset') write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000700)=ANY=[@ANYBLOB="006d176df3384ed3ddbcf3be0e26fd017529253262b78ee8b9d470"], 0x1b) ioctl$TUNSETCARRIER(0xffffffffffffffff, 0x400454e2, &(0x7f0000000080)=0x1) write$cgroup_int(r0, &(0x7f0000000380), 0x12) write$cgroup_int(r1, &(0x7f0000000400), 0xd) r2 = gettid() write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000000)=r2, 0x12) r3 = socket$kcm(0x2b, 0x0, 0x0) socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r3, 0x0, 0x0) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000280)=r2, 0x12) r4 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) close(r5) write$cgroup_type(r5, &(0x7f0000000080)='threaded\x00', 0xfffffc61) r6 = bpf$MAP_CREATE(0x2, &(0x7f0000009280), 0x3c) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x17, 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB], &(0x7f0000000200)='syzkaller\x00', 0xfa1, 0x0, 0x0, 0x41100, 0x2, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, &(0x7f0000000240), 0x8, 0x10, 0x0}, 0x78) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000008740)={0x0, 0x0, &(0x7f0000008700)=[{0x0}, {&(0x7f0000008680)=""/23, 0x17}, {&(0x7f00000086c0)=""/38, 0x26}], 0x3}, 0x8000) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x6, 0x2, 0x2e15579, 0x3f, 0x1, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffffff, 0x0, 0x5}, 0x3c) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0xb, [], 0x0, 0xc, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r7}, 0x7e) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r8, &(0x7f0000000000)=ANY=[], 0x50c000) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x18, 0x8, &(0x7f0000000a00)=ANY=[@ANYBLOB="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", @ANYRES32=r6, @ANYBLOB="00000000000000000c72c0fff6ffffff850000005b0000009500000000000000"], &(0x7f0000000040)='GPL\x00', 0x0, 0xd5, &(0x7f0000000080)=""/213, 0x61800, 0xab6c50112a8dd52c, [], 0x0, 0x16, 0xffffffffffffffff, 0x8, &(0x7f0000000180)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000001c0)={0x2, 0x6, 0x6, 0x5}, 0x10, 0x0, r8}, 0x78) bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x11, 0x5, 0x81, 0x2, 0x100, r5, 0x3, [], 0x0, 0xffffffffffffffff, 0x4, 0x3}, 0x3c) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r9, &(0x7f0000000200), 0x806000) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, r4, 0x0, 0x2a8, &(0x7f0000000440)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\a\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83CZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x98\x86\"R\x06\x00\x00\x00\x00\x00\x00\x00\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&\x014\x01\xf4\xb7\x83\x9a\xfa*\xa6\x06\xb7Pk7N\xc2\xd9\xee\xd0\xb0M\x00\xab\xc3\t\fc\xd8dx\xd5\x1dU*s)\x12[\x14\xb1\xc0\xd7\x1a\xa0\x16\xa2z\x9e\x93 \xddeF>29\v\x02\xa2b\x13R\xef\xffA,\xb9.$\xfa\x9f\xde[\x80\xd1=\xce\x1b\xeb\xf6\xf4\xe3z\x1f\x9dz\xa3\xc0\xe2\xa2\xb1\xeeq\xf5\xec0\x8e\xf4\xfb\xd9\x87\xf03\xdb\xae|\x10&V5c\xa6\xce\xcd\x8a\xdf\xe1\x89\"\xea\xde\xe7\xa3\xbe\xe7\xff\xf9 \x11\xfdY\xc6\xa1\xe8\xda\v\\?\xcb\x87\bn\x9b\x01\x1f\xf8\xe8\x1eV\xfaC\xdf\xc3Vv\x9b\x1a\xfc\x14.c\x94\xc9=\xb0\x0f!d\b\x18*@m\x7f\xaal\x17G\xd6?\x81\x16P\x03\x10e\xc3\xcd\xb1B\xeb\x01B\\\x91A\xa1\x8an\xb4#\xadr\x1e\x81v\xa2\x0e6x\xca\x8b\xa6\xd8\x81\x10:\x0e(\xdd\xfc\xc9\xc6\xb4\xf0\'f:\xbd\xfe\x11\xf8\xc8W\x81s^\xd9W\xf1\x94\xaf\xc5\x8a\xb4f\x1b\x17E\xb23\x12\xb0\xeb\xef\x8c\xb24h\xd7}\x7f\x92Hgej\x957\xe2A'}, 0x30) 03:43:51 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, 0x0, 0x0) 03:43:51 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x238) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) writev(r0, &(0x7f0000000540)=[{0x0}, {&(0x7f0000000340)="e4bc7c957b83ba155edae525e00f76c76056ac3fe8a5de5ccfba604ac6b0d4a0fd42802b43143a32d703bd21baddda61ba1cb78758f519c19a06193e8bfc0d1f1fad3be6885359773264bd", 0x4b}, {0x0}], 0x3) sendto$inet(r0, &(0x7f00000012c0)="0c268a927f1f6588b967481241ba7860005cf65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95425a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x27) 03:43:51 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x0, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) sendmmsg$inet(r0, &(0x7f0000001100)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000001340)="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", 0x2d9}], 0x1}}], 0x1, 0x0) 03:43:51 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, 0x0, 0x0) 03:43:51 executing program 5: openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) ioctl$RNDADDENTROPY(0xffffffffffffffff, 0x40085203, &(0x7f0000000100)={0x6, 0xbc, "56f80f8d7c9ad684157765ee68815e033b7b2972a2d067318db9ac518603e0dbae813e160bd3f15b30c226056579cf64ac2525dd44c15e56204f1e3f1b8c03b31f4281605682d4b39a61b89636b3a2a5ea0bd3f5e8bd40d8c0406969d18fed78e4f4108902b5959ec383c40036f5262e703d6ad6a7a486302c382e45645bfe4c472249b482a28e9519e744cdbe884985d913612a17250eab7e4f0bf4b35aab9f7b923116a8d30baf612ca3bc2ef9b3f8d1c6b570cb60bd8d5b6805ce"}) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_sctp(0x2, 0x0, 0x84) dup3(0xffffffffffffffff, r0, 0x0) socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp_SCTP_AUTH_DEACTIVATE_KEY(0xffffffffffffffff, 0x84, 0x23, 0x0, 0x0) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f00000000c0)={0x51, 0xfffc, 0x0, {0x103, 0xf1}, {0x9}, @ramp={0x2, 0x3, {0x7fff, 0x0, 0x7, 0x7}}}) r1 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r1, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @bcast, @rose, @rose, @null]}, 0x48) listen(r1, 0x0) unshare(0x40000000) r2 = accept(r1, 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r3, 0xffffffffffffffff) write$binfmt_elf64(r2, &(0x7f00000002c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}], "", [[], []]}, 0x278) 03:43:51 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x238) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) writev(r0, &(0x7f0000000540)=[{&(0x7f0000000140)="cedbddea5b67f4290aa7fd7c0cc7e2e613891a59fd3dc2e8a3c6e7c9fa96", 0x1e}, {&(0x7f0000000340)="e4bc7c957b83ba155edae525e00f76c76056ac3fe8a5de5ccfba604ac6b0d4a0fd42802b43143a32d703bd21baddda61ba1cb78758f519c19a06193e8bfc0d1f1fad3be6885359773264bd153a2bf50591662cca307c7a22f8a9e70629a1beac22b823bfee7fec832958c20007e0b8707c6ac0e8b1", 0x75}, {0x0}, {&(0x7f0000000800)="87cfb3bd1ada6e425bdd5aaccdafa6e4ea74", 0x12}], 0x4) sendto$inet(r0, &(0x7f00000012c0)="0c268a927f1f6588b967481241ba7860005cf65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95425a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x27) 03:43:51 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x400007) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0x32600) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xb4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000040)='cpuset') write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000700)=ANY=[@ANYBLOB="006d176df3384ed3ddbcf3be0e26fd017529253262b78ee8b9d470"], 0x1b) ioctl$TUNSETCARRIER(0xffffffffffffffff, 0x400454e2, &(0x7f0000000080)=0x1) write$cgroup_int(r0, &(0x7f0000000380), 0x12) write$cgroup_int(r1, &(0x7f0000000400), 0xd) r2 = gettid() write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000000)=r2, 0x12) r3 = socket$kcm(0x2b, 0x0, 0x0) socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r3, 0x0, 0x0) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000280)=r2, 0x12) r4 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) close(r5) write$cgroup_type(r5, &(0x7f0000000080)='threaded\x00', 0xfffffc61) r6 = bpf$MAP_CREATE(0x2, &(0x7f0000009280), 0x3c) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x17, 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB], &(0x7f0000000200)='syzkaller\x00', 0xfa1, 0x0, 0x0, 0x41100, 0x2, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, &(0x7f0000000240), 0x8, 0x10, 0x0}, 0x78) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000008740)={0x0, 0x0, &(0x7f0000008700)=[{0x0}, {&(0x7f0000008680)=""/23, 0x17}, {&(0x7f00000086c0)=""/38, 0x26}], 0x3}, 0x8000) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x6, 0x2, 0x2e15579, 0x3f, 0x1, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffffff, 0x0, 0x5}, 0x3c) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0xb, [], 0x0, 0xc, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r7}, 0x7e) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r8, &(0x7f0000000000)=ANY=[], 0x50c000) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x18, 0x49, &(0x7f0000000a00)=ANY=[@ANYBLOB="0000752c0000000000000000ffffffff9500000000000000181400006200ed587c1ba87fb23af22b6cf03fb851054ce322d4b3a5894516c0c1479e1cfbf3061ad7aef6d6c36e4e74a8219f8441192ab16361719f26a1e543525c94027f7a5f275546d8cacee044fc20d858e268019caeb1633cc4888faa05d02cd44de32962e022697754125edcfb3477c4e122a0e97ab43de94a7a94efd527400e2c2ff4468fd6e773773f089b268fddef712ab174487ae9049f64895522be3862156a1af15513c3ff285844c9aae255d74c0dacf6c47d6809ce69ee6e41a03a03b29152ee43afabd82aa883f260995238aa70895dc3aee59a119dc82fb5fd00af56ded09336e2df6a0bb41bd191d57b35eb262a1aa8d5fec51b24500685f8c0adaf3639790fdbd7cb2ac3af37a802a6ac7265a819c91986c45e7c54d91c5ced552d96c04a80c063fee16b3a52bc603deebe32e4e0dfdfe9d03658daad65606e175041076684110e66f74db9509b1a29e765c9208ddba13e3b42b3963dce5432c4fb7844a9b64c518820c9c0198fadb6ea6a350f89a1eb1a3c1e20527ce574c3514f9ad62be70eee070faa267d83564e6db87e4d16ccd118397c2e4825140e6b46c35edb77df7b9a3334ad3f8cb70b73f4b9d8b29eb50b2c2dfc8d82841a6251fcfcb978ce90873ddcfa0125800302f5ed70c724e0253fb45955750f1e7c94ca05a91ec592ee3a52fad94c89205ece2d1d96afbfa0b59f9bd6c1161c638fff8696973fedca3f3ddf5bbb1023", @ANYRES32=r6, @ANYBLOB="00000000000000000c72c0fff6ffffff850000005b0000009500000000000000"], &(0x7f0000000040)='GPL\x00', 0x3ff, 0x0, 0x0, 0x61800, 0xab6c50112a8dd52c, [], 0x0, 0x16, 0xffffffffffffffff, 0x8, &(0x7f0000000180)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000001c0)={0x2, 0x6, 0x6, 0x5}, 0x10, 0x0, r8}, 0x78) bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x11, 0x5, 0x81, 0x2, 0x100, r5, 0x3, [], 0x0, 0xffffffffffffffff, 0x4, 0x3}, 0x3c) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r9, &(0x7f0000000200), 0x806000) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, r4, 0x0, 0x2a8, &(0x7f0000000440)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\a\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83CZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x98\x86\"R\x06\x00\x00\x00\x00\x00\x00\x00\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&\x014\x01\xf4\xb7\x83\x9a\xfa*\xa6\x06\xb7Pk7N\xc2\xd9\xee\xd0\xb0M\x00\xab\xc3\t\fc\xd8dx\xd5\x1dU*s)\x12[\x14\xb1\xc0\xd7\x1a\xa0\x16\xa2z\x9e\x93 \xddeF>29\v\x02\xa2b\x13R\xef\xffA,\xb9.$\xfa\x9f\xde[\x80\xd1=\xce\x1b\xeb\xf6\xf4\xe3z\x1f\x9dz\xa3\xc0\xe2\xa2\xb1\xeeq\xf5\xec0\x8e\xf4\xfb\xd9\x87\xf03\xdb\xae|\x10&V5c\xa6\xce\xcd\x8a\xdf\xe1\x89\"\xea\xde\xe7\xa3\xbe\xe7\xff\xf9 \x11\xfdY\xc6\xa1\xe8\xda\v\\?\xcb\x87\bn\x9b\x01\x1f\xf8\xe8\x1eV\xfaC\xdf\xc3Vv\x9b\x1a\xfc\x14.c\x94\xc9=\xb0\x0f!d\b\x18*@m\x7f\xaal\x17G\xd6?\x81\x16P\x03\x10e\xc3\xcd\xb1B\xeb\x01B\\\x91A\xa1\x8an\xb4#\xadr\x1e\x81v\xa2\x0e6x\xca\x8b\xa6\xd8\x81\x10:\x0e(\xdd\xfc\xc9\xc6\xb4\xf0\'f:\xbd\xfe\x11\xf8\xc8W\x81s^\xd9W\xf1\x94\xaf\xc5\x8a\xb4f\x1b\x17E\xb23\x12\xb0\xeb\xef\x8c\xb24h\xd7}\x7f\x92Hgej\x957\xe2A'}, 0x30) 03:43:51 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x0, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) sendmmsg$inet(r0, &(0x7f0000001100)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000001340)="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", 0x2d9}], 0x1}}], 0x1, 0x0) [ 710.625342][T29298] IPVS: ftp: loaded support on port[0] = 21 03:43:51 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x0, 0x0}, 0x10) 03:43:51 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x0, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) sendmmsg$inet(r0, &(0x7f0000001100)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000001340)="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", 0x2d9}], 0x1}}], 0x1, 0x0) 03:43:51 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x238) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) writev(r0, &(0x7f0000000540)=[{0x0}, {&(0x7f0000000340)="e4bc7c957b83ba155edae525e00f76c76056ac3fe8a5de5ccfba604ac6b0d4a0fd42802b43143a32d703bd21baddda61ba1cb78758f519c19a06193e8bfc0d1f1fad3be6885359773264bd", 0x4b}, {0x0}], 0x3) sendto$inet(r0, &(0x7f00000012c0)="0c268a927f1f6588b967481241ba7860005cf65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95425a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x27) 03:43:51 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x0, 0x0}, 0x10) 03:43:51 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x400007) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0x32600) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xb4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000040)='cpuset') write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000700)=ANY=[@ANYBLOB="006d176df3384ed3ddbcf3be0e26fd017529253262b78ee8b9d470"], 0x1b) ioctl$TUNSETCARRIER(0xffffffffffffffff, 0x400454e2, &(0x7f0000000080)=0x1) write$cgroup_int(r0, &(0x7f0000000380), 0x12) write$cgroup_int(r1, &(0x7f0000000400), 0xd) r2 = gettid() write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000000)=r2, 0x12) r3 = socket$kcm(0x2b, 0x0, 0x0) socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r3, 0x0, 0x0) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000280)=r2, 0x12) r4 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) close(r5) write$cgroup_type(r5, &(0x7f0000000080)='threaded\x00', 0xfffffc61) r6 = bpf$MAP_CREATE(0x2, &(0x7f0000009280), 0x3c) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x17, 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB], &(0x7f0000000200)='syzkaller\x00', 0xfa1, 0x0, 0x0, 0x41100, 0x2, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, &(0x7f0000000240), 0x8, 0x10, 0x0}, 0x78) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000008740)={0x0, 0x0, &(0x7f0000008700)=[{0x0}, {&(0x7f0000008680)=""/23, 0x17}, {&(0x7f00000086c0)=""/38, 0x26}], 0x3}, 0x8000) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x6, 0x2, 0x2e15579, 0x3f, 0x1, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffffff, 0x0, 0x5}, 0x3c) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0xb, [], 0x0, 0xc, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r7}, 0x7e) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r8, &(0x7f0000000000)=ANY=[], 0x50c000) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x18, 0x49, &(0x7f0000000a00)=ANY=[@ANYBLOB="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", @ANYRES32=r6, @ANYBLOB="00000000000000000c72c0fff6ffffff850000005b0000009500000000000000"], &(0x7f0000000040)='GPL\x00', 0x3ff, 0x0, 0x0, 0x61800, 0xab6c50112a8dd52c, [], 0x0, 0x16, 0xffffffffffffffff, 0x8, &(0x7f0000000180)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000001c0)={0x2, 0x6, 0x6, 0x5}, 0x10, 0x0, r8}, 0x78) bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x11, 0x5, 0x81, 0x2, 0x100, r5, 0x3, [], 0x0, 0xffffffffffffffff, 0x4, 0x3}, 0x3c) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r9, &(0x7f0000000200), 0x806000) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, r4, 0x0, 0x2a8, &(0x7f0000000440)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\a\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83CZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x98\x86\"R\x06\x00\x00\x00\x00\x00\x00\x00\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&\x014\x01\xf4\xb7\x83\x9a\xfa*\xa6\x06\xb7Pk7N\xc2\xd9\xee\xd0\xb0M\x00\xab\xc3\t\fc\xd8dx\xd5\x1dU*s)\x12[\x14\xb1\xc0\xd7\x1a\xa0\x16\xa2z\x9e\x93 \xddeF>29\v\x02\xa2b\x13R\xef\xffA,\xb9.$\xfa\x9f\xde[\x80\xd1=\xce\x1b\xeb\xf6\xf4\xe3z\x1f\x9dz\xa3\xc0\xe2\xa2\xb1\xeeq\xf5\xec0\x8e\xf4\xfb\xd9\x87\xf03\xdb\xae|\x10&V5c\xa6\xce\xcd\x8a\xdf\xe1\x89\"\xea\xde\xe7\xa3\xbe\xe7\xff\xf9 \x11\xfdY\xc6\xa1\xe8\xda\v\\?\xcb\x87\bn\x9b\x01\x1f\xf8\xe8\x1eV\xfaC\xdf\xc3Vv\x9b\x1a\xfc\x14.c\x94\xc9=\xb0\x0f!d\b\x18*@m\x7f\xaal\x17G\xd6?\x81\x16P\x03\x10e\xc3\xcd\xb1B\xeb\x01B\\\x91A\xa1\x8an\xb4#\xadr\x1e\x81v\xa2\x0e6x\xca\x8b\xa6\xd8\x81\x10:\x0e(\xdd\xfc\xc9\xc6\xb4\xf0\'f:\xbd\xfe\x11\xf8\xc8W\x81s^\xd9W\xf1\x94\xaf\xc5\x8a\xb4f\x1b\x17E\xb23\x12\xb0\xeb\xef\x8c\xb24h\xd7}\x7f\x92Hgej\x957\xe2A'}, 0x30) 03:43:51 executing program 5: openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) ioctl$RNDADDENTROPY(0xffffffffffffffff, 0x40085203, &(0x7f0000000100)={0x6, 0xbc, "56f80f8d7c9ad684157765ee68815e033b7b2972a2d067318db9ac518603e0dbae813e160bd3f15b30c226056579cf64ac2525dd44c15e56204f1e3f1b8c03b31f4281605682d4b39a61b89636b3a2a5ea0bd3f5e8bd40d8c0406969d18fed78e4f4108902b5959ec383c40036f5262e703d6ad6a7a486302c382e45645bfe4c472249b482a28e9519e744cdbe884985d913612a17250eab7e4f0bf4b35aab9f7b923116a8d30baf612ca3bc2ef9b3f8d1c6b570cb60bd8d5b6805ce"}) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_sctp(0x2, 0x0, 0x84) dup3(0xffffffffffffffff, r0, 0x0) socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp_SCTP_AUTH_DEACTIVATE_KEY(0xffffffffffffffff, 0x84, 0x23, 0x0, 0x0) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f00000000c0)={0x51, 0xfffc, 0x0, {0x103, 0xf1}, {0x9}, @ramp={0x2, 0x3, {0x7fff, 0x0, 0x7, 0x7}}}) r1 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r1, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @bcast, @rose, @rose, @null]}, 0x48) listen(r1, 0x0) unshare(0x40000000) r2 = accept(r1, 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r3, 0xffffffffffffffff) write$binfmt_elf64(r2, &(0x7f00000002c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}], "", [[], []]}, 0x278) 03:43:52 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x238) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) writev(r0, &(0x7f0000000540)=[{&(0x7f0000000140)="cedbddea5b67f4290aa7fd7c0cc7e2e613891a59fd3dc2e8a3c6e7c9fa96", 0x1e}, {&(0x7f0000000340)="e4bc7c957b83ba155edae525e00f76c76056ac3fe8a5de5ccfba604ac6b0d4a0fd42802b43143a32d703bd21baddda61ba1cb78758f519c19a06193e8bfc0d1f1fad3be6885359773264bd153a2bf50591662cca307c7a22f8a9e70629a1beac22b823bfee7fec832958c20007e0b8707c6ac0e8b1", 0x75}, {&(0x7f00000004c0)}, {&(0x7f0000000800)="87cfb3bd1ada6e425bdd5aaccdafa6e4ea74", 0x12}], 0x4) sendto$inet(r0, &(0x7f00000012c0)="0c268a927f1f6588b967481241ba7860005cf65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95425a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x27) 03:43:52 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x0, 0x0}, 0x10) 03:43:52 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, 0x0, 0x0) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) sendmmsg$inet(r0, &(0x7f0000001100)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000001340)="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", 0x2d9}], 0x1}}], 0x1, 0x0) [ 711.290777][T29329] IPVS: ftp: loaded support on port[0] = 21 03:43:52 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x0, &(0x7f0000000400)}, 0x10) 03:43:52 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x400007) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0x32600) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xb4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000040)='cpuset') write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000700)=ANY=[@ANYBLOB="006d176df3384ed3ddbcf3be0e26fd017529253262b78ee8b9d470"], 0x1b) ioctl$TUNSETCARRIER(0xffffffffffffffff, 0x400454e2, &(0x7f0000000080)=0x1) write$cgroup_int(r0, &(0x7f0000000380), 0x12) write$cgroup_int(r1, &(0x7f0000000400), 0xd) r2 = gettid() write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000000)=r2, 0x12) r3 = socket$kcm(0x2b, 0x0, 0x0) socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r3, 0x0, 0x0) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000280)=r2, 0x12) r4 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) close(r5) write$cgroup_type(r5, &(0x7f0000000080)='threaded\x00', 0xfffffc61) r6 = bpf$MAP_CREATE(0x2, &(0x7f0000009280), 0x3c) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x17, 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB], &(0x7f0000000200)='syzkaller\x00', 0xfa1, 0x0, 0x0, 0x41100, 0x2, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, &(0x7f0000000240), 0x8, 0x10, 0x0}, 0x78) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000008740)={0x0, 0x0, &(0x7f0000008700)=[{0x0}, {&(0x7f0000008680)=""/23, 0x17}, {&(0x7f00000086c0)=""/38, 0x26}], 0x3}, 0x8000) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x6, 0x2, 0x2e15579, 0x3f, 0x1, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffffff, 0x0, 0x5}, 0x3c) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0xb, [], 0x0, 0xc, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r7}, 0x7e) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r8, &(0x7f0000000000)=ANY=[], 0x50c000) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x18, 0x49, &(0x7f0000000a00)=ANY=[@ANYBLOB="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", @ANYRES32=r6, @ANYBLOB="00000000000000000c72c0fff6ffffff850000005b0000009500000000000000"], &(0x7f0000000040)='GPL\x00', 0x3ff, 0x0, 0x0, 0x61800, 0xab6c50112a8dd52c, [], 0x0, 0x16, 0xffffffffffffffff, 0x8, &(0x7f0000000180)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000001c0)={0x2, 0x6, 0x6, 0x5}, 0x10, 0x0, r8}, 0x78) bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x11, 0x5, 0x81, 0x2, 0x100, r5, 0x3, [], 0x0, 0xffffffffffffffff, 0x4, 0x3}, 0x3c) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r9, &(0x7f0000000200), 0x806000) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, r4, 0x0, 0x2a8, &(0x7f0000000440)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\a\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83CZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x98\x86\"R\x06\x00\x00\x00\x00\x00\x00\x00\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&\x014\x01\xf4\xb7\x83\x9a\xfa*\xa6\x06\xb7Pk7N\xc2\xd9\xee\xd0\xb0M\x00\xab\xc3\t\fc\xd8dx\xd5\x1dU*s)\x12[\x14\xb1\xc0\xd7\x1a\xa0\x16\xa2z\x9e\x93 \xddeF>29\v\x02\xa2b\x13R\xef\xffA,\xb9.$\xfa\x9f\xde[\x80\xd1=\xce\x1b\xeb\xf6\xf4\xe3z\x1f\x9dz\xa3\xc0\xe2\xa2\xb1\xeeq\xf5\xec0\x8e\xf4\xfb\xd9\x87\xf03\xdb\xae|\x10&V5c\xa6\xce\xcd\x8a\xdf\xe1\x89\"\xea\xde\xe7\xa3\xbe\xe7\xff\xf9 \x11\xfdY\xc6\xa1\xe8\xda\v\\?\xcb\x87\bn\x9b\x01\x1f\xf8\xe8\x1eV\xfaC\xdf\xc3Vv\x9b\x1a\xfc\x14.c\x94\xc9=\xb0\x0f!d\b\x18*@m\x7f\xaal\x17G\xd6?\x81\x16P\x03\x10e\xc3\xcd\xb1B\xeb\x01B\\\x91A\xa1\x8an\xb4#\xadr\x1e\x81v\xa2\x0e6x\xca\x8b\xa6\xd8\x81\x10:\x0e(\xdd\xfc\xc9\xc6\xb4\xf0\'f:\xbd\xfe\x11\xf8\xc8W\x81s^\xd9W\xf1\x94\xaf\xc5\x8a\xb4f\x1b\x17E\xb23\x12\xb0\xeb\xef\x8c\xb24h\xd7}\x7f\x92Hgej\x957\xe2A'}, 0x30) 03:43:52 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, 0x0, 0x0) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) sendmmsg$inet(r0, &(0x7f0000001100)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000001340)="492b7b56e7bf1546ba9024d15debc3fdf835944e6359dfc82ad6a44af6174b7048d6774edb2a522c3b5aebed3bba4b546494bbf6043a7a659fa12216b37584d6922636fff14b623e8c3e9fe28800be702458a4e01e63a39ce0913a26da044aa26f457632cfb8104ef5156bc27f3c08d0a0662a69249556e9a7dcc2da9fdefdd1378f5ef60bb2a8ea72a06c11be333049a90b1c46352f3c5409e32849a93d43e39038bd6c1d6e8eab5b135933cc6fc02853cf997defa87b0bdc2eedad7426259c9118c5a885705288956f19cf9fcb5a5e3f772253900b73288028f2135004a304699d8879a3b2570b1c0f7d45bd5a730a2e57413513c2bb12b095d986617eab6020147d6974b75058c7d235a54b139958054e31290acf55b048b3a6a5e7515295ba626378ce82b4ee22cc23bd5b82363bcb7ff225fc556ecfa3b764d8ef16aa66c6b85d546bac428bfd4e23996cc7d4b1f36e08bf5611234fa7ecf93d7835ab9b0302b9371497d4ab867e0d5750a3d047abef4793b4a80055c50797e611556c1e29e825c3980bd81a4b221d44f9abefeea268e98df6310f32755bc5c2fd19e9ab91958074421fbc49a067de17743a2eb60aecee575d892009f653bd7548f24194179f506ad2e30e2910f51231eff390e2e6b28a834ef9c2380df877e8ac1d4649df50e06ec92ad336888ac4d45db52a2dead697ba7b1ebf042cdcc9fa2c8af8e818375fc8dc0689f6d16478be23bee3cc43e5ff224bdbbd089cdbcced85a88a739f8fc81314e362527742ae15b57d200580205ee0000cbf1b47d38ff82eb464b778cd5beffd4d43378e7ebed4a31b3fb7d325b958b9eb9d7c5fc4274ecb863c1edd6fc4ef7f6b58dee0cbbe57293c33a3d098501c91f45fff812bc8036f9b13181d223d23be06d53bb0b0f4d3a05ca9d0b2e4de29fe137077bb6d39d0b97d818115d867dad9586f9c71153e4dc2bb8a0d0436769ed8e6bb9ddadb8eb91cbfdd9efc801ebe106ed8151e61153db150c2e2fa4109740028cdb606", 0x2d9}], 0x1}}], 0x1, 0x0) 03:43:52 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x238) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) writev(r0, &(0x7f0000000540)=[{0x0}, {&(0x7f0000000340)="e4bc7c957b83ba155edae525e00f76c76056ac3fe8a5de5ccfba604ac6b0d4a0fd42802b43143a32d703bd21baddda61ba1cb78758f519c19a06193e8bfc0d1f1fad3be6885359773264bd", 0x4b}, {0x0}], 0x3) sendto$inet(r0, &(0x7f00000012c0)="0c268a927f1f6588b967481241ba7860005cf65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95425a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x27) 03:43:52 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x0, &(0x7f0000000400)}, 0x10) 03:43:52 executing program 5: openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) ioctl$RNDADDENTROPY(0xffffffffffffffff, 0x40085203, &(0x7f0000000100)={0x6, 0xbc, "56f80f8d7c9ad684157765ee68815e033b7b2972a2d067318db9ac518603e0dbae813e160bd3f15b30c226056579cf64ac2525dd44c15e56204f1e3f1b8c03b31f4281605682d4b39a61b89636b3a2a5ea0bd3f5e8bd40d8c0406969d18fed78e4f4108902b5959ec383c40036f5262e703d6ad6a7a486302c382e45645bfe4c472249b482a28e9519e744cdbe884985d913612a17250eab7e4f0bf4b35aab9f7b923116a8d30baf612ca3bc2ef9b3f8d1c6b570cb60bd8d5b6805ce"}) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet_sctp(0x2, 0x5, 0x84) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp_SCTP_AUTH_DEACTIVATE_KEY(0xffffffffffffffff, 0x84, 0x23, 0x0, 0x0) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f00000000c0)={0x51, 0xfffc, 0x0, {0x103, 0xf1}, {0x9}, @ramp={0x2, 0x3, {0x7fff, 0x0, 0x7, 0x7}}}) r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @bcast, @rose, @rose, @null]}, 0x48) listen(r0, 0x0) unshare(0x40000000) r1 = accept(r0, 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r2, 0xffffffffffffffff) write$binfmt_elf64(r1, &(0x7f00000002c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}], "", [[], []]}, 0x278) 03:43:52 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, 0x0, 0x0) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) sendmmsg$inet(r0, &(0x7f0000001100)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000001340)="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", 0x2d9}], 0x1}}], 0x1, 0x0) 03:43:52 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x0, &(0x7f0000000400)}, 0x10) 03:43:52 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x238) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) writev(r0, &(0x7f0000000540)=[{&(0x7f0000000140)="cedbddea5b67f4290aa7fd7c0cc7e2e613891a59fd3dc2e8a3c6e7c9fa96", 0x1e}, {&(0x7f0000000340)="e4bc7c957b83ba155edae525e00f76c76056ac3fe8a5de5ccfba604ac6b0d4a0fd42802b43143a32d703bd21baddda61ba1cb78758f519c19a06193e8bfc0d1f1fad3be6885359773264bd153a2bf50591662cca307c7a22f8a9e70629a1beac22b823bfee7fec832958c20007e0b8707c6ac0e8b1", 0x75}, {&(0x7f00000004c0)}, {&(0x7f0000000800)="87cfb3bd1ada6e425bdd5aaccdafa6e4ea74", 0x12}], 0x4) sendto$inet(r0, &(0x7f00000012c0)="0c268a927f1f6588b967481241ba7860005cf65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95425a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x27) [ 712.013145][T29354] IPVS: ftp: loaded support on port[0] = 21 03:43:53 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x400007) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0x32600) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xb4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000040)='cpuset') write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000700)=ANY=[@ANYBLOB="006d176df3384ed3ddbcf3be0e26fd017529253262b78ee8b9d470"], 0x1b) ioctl$TUNSETCARRIER(0xffffffffffffffff, 0x400454e2, &(0x7f0000000080)=0x1) write$cgroup_int(r0, &(0x7f0000000380), 0x12) write$cgroup_int(r1, &(0x7f0000000400), 0xd) r2 = gettid() write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000000)=r2, 0x12) r3 = socket$kcm(0x2b, 0x0, 0x0) socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r3, 0x0, 0x0) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000280)=r2, 0x12) r4 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) close(r5) write$cgroup_type(r5, &(0x7f0000000080)='threaded\x00', 0xfffffc61) r6 = bpf$MAP_CREATE(0x2, &(0x7f0000009280), 0x3c) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x17, 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB], &(0x7f0000000200)='syzkaller\x00', 0xfa1, 0x0, 0x0, 0x41100, 0x2, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, &(0x7f0000000240), 0x8, 0x10, 0x0}, 0x78) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000008740)={0x0, 0x0, &(0x7f0000008700)=[{0x0}, {&(0x7f0000008680)=""/23, 0x17}, {&(0x7f00000086c0)=""/38, 0x26}], 0x3}, 0x8000) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x6, 0x2, 0x2e15579, 0x3f, 0x1, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffffff, 0x0, 0x5}, 0x3c) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0xb, [], 0x0, 0xc, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r7}, 0x7e) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r8, &(0x7f0000000000)=ANY=[], 0x50c000) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x18, 0x8, &(0x7f0000000a00)=ANY=[@ANYBLOB="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", @ANYRES32=r6, @ANYBLOB="00000000000000000c72c0fff6ffffff850000005b0000009500000000000000"], &(0x7f0000000040)='GPL\x00', 0x3ff, 0xd5, &(0x7f0000000080)=""/213, 0x0, 0xab6c50112a8dd52c, [], 0x0, 0x16, 0xffffffffffffffff, 0x8, &(0x7f0000000180)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000001c0)={0x2, 0x6, 0x6, 0x5}, 0x10, 0x0, r8}, 0x78) bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x11, 0x5, 0x81, 0x2, 0x100, r5, 0x3, [], 0x0, 0xffffffffffffffff, 0x4, 0x3}, 0x3c) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r9, &(0x7f0000000200), 0x806000) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, r4, 0x0, 0x2a8, &(0x7f0000000440)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\a\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83CZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x98\x86\"R\x06\x00\x00\x00\x00\x00\x00\x00\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&\x014\x01\xf4\xb7\x83\x9a\xfa*\xa6\x06\xb7Pk7N\xc2\xd9\xee\xd0\xb0M\x00\xab\xc3\t\fc\xd8dx\xd5\x1dU*s)\x12[\x14\xb1\xc0\xd7\x1a\xa0\x16\xa2z\x9e\x93 \xddeF>29\v\x02\xa2b\x13R\xef\xffA,\xb9.$\xfa\x9f\xde[\x80\xd1=\xce\x1b\xeb\xf6\xf4\xe3z\x1f\x9dz\xa3\xc0\xe2\xa2\xb1\xeeq\xf5\xec0\x8e\xf4\xfb\xd9\x87\xf03\xdb\xae|\x10&V5c\xa6\xce\xcd\x8a\xdf\xe1\x89\"\xea\xde\xe7\xa3\xbe\xe7\xff\xf9 \x11\xfdY\xc6\xa1\xe8\xda\v\\?\xcb\x87\bn\x9b\x01\x1f\xf8\xe8\x1eV\xfaC\xdf\xc3Vv\x9b\x1a\xfc\x14.c\x94\xc9=\xb0\x0f!d\b\x18*@m\x7f\xaal\x17G\xd6?\x81\x16P\x03\x10e\xc3\xcd\xb1B\xeb\x01B\\\x91A\xa1\x8an\xb4#\xadr\x1e\x81v\xa2\x0e6x\xca\x8b\xa6\xd8\x81\x10:\x0e(\xdd\xfc\xc9\xc6\xb4\xf0\'f:\xbd\xfe\x11\xf8\xc8W\x81s^\xd9W\xf1\x94\xaf\xc5\x8a\xb4f\x1b\x17E\xb23\x12\xb0\xeb\xef\x8c\xb24h\xd7}\x7f\x92Hgej\x957\xe2A'}, 0x30) 03:43:53 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0), 0x25d) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) sendmmsg$inet(r0, &(0x7f0000001100)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000001340)="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", 0x2d9}], 0x1}}], 0x1, 0x0) [ 712.076394][T27358] tipc: TX() has been purged, node left! 03:43:53 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x0, 0x0, 0x0, 0xe8}]}, 0x10) [ 712.168559][T27358] tipc: TX() has been purged, node left! [ 712.174500][T27358] tipc: TX() has been purged, node left! [ 712.204815][T27358] tipc: TX() has been purged, node left! [ 712.321977][T27358] tipc: TX() has been purged, node left! [ 712.335805][T27358] tipc: TX() has been purged, node left! [ 712.357779][T27358] tipc: TX() has been purged, node left! 03:43:53 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x238) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) writev(r0, &(0x7f0000000540)=[{&(0x7f0000000140)}, {&(0x7f0000000340)="e4bc7c957b83ba155edae525e00f76c76056ac3fe8a5de5ccfba604ac6b0d4a0fd42802b43143a32d703bd21baddda61ba1cb78758f519c19a06193e8bfc0d1f1fad3be6885359773264bd", 0x4b}, {0x0}], 0x3) sendto$inet(r0, &(0x7f00000012c0)="0c268a927f1f6588b967481241ba7860005cf65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95425a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x27) 03:43:53 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0), 0x25d) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) sendmmsg$inet(r0, &(0x7f0000001100)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000001340)="492b7b56e7bf1546ba9024d15debc3fdf835944e6359dfc82ad6a44af6174b7048d6774edb2a522c3b5aebed3bba4b546494bbf6043a7a659fa12216b37584d6922636fff14b623e8c3e9fe28800be702458a4e01e63a39ce0913a26da044aa26f457632cfb8104ef5156bc27f3c08d0a0662a69249556e9a7dcc2da9fdefdd1378f5ef60bb2a8ea72a06c11be333049a90b1c46352f3c5409e32849a93d43e39038bd6c1d6e8eab5b135933cc6fc02853cf997defa87b0bdc2eedad7426259c9118c5a885705288956f19cf9fcb5a5e3f772253900b73288028f2135004a304699d8879a3b2570b1c0f7d45bd5a730a2e57413513c2bb12b095d986617eab6020147d6974b75058c7d235a54b139958054e31290acf55b048b3a6a5e7515295ba626378ce82b4ee22cc23bd5b82363bcb7ff225fc556ecfa3b764d8ef16aa66c6b85d546bac428bfd4e23996cc7d4b1f36e08bf5611234fa7ecf93d7835ab9b0302b9371497d4ab867e0d5750a3d047abef4793b4a80055c50797e611556c1e29e825c3980bd81a4b221d44f9abefeea268e98df6310f32755bc5c2fd19e9ab91958074421fbc49a067de17743a2eb60aecee575d892009f653bd7548f24194179f506ad2e30e2910f51231eff390e2e6b28a834ef9c2380df877e8ac1d4649df50e06ec92ad336888ac4d45db52a2dead697ba7b1ebf042cdcc9fa2c8af8e818375fc8dc0689f6d16478be23bee3cc43e5ff224bdbbd089cdbcced85a88a739f8fc81314e362527742ae15b57d200580205ee0000cbf1b47d38ff82eb464b778cd5beffd4d43378e7ebed4a31b3fb7d325b958b9eb9d7c5fc4274ecb863c1edd6fc4ef7f6b58dee0cbbe57293c33a3d098501c91f45fff812bc8036f9b13181d223d23be06d53bb0b0f4d3a05ca9d0b2e4de29fe137077bb6d39d0b97d818115d867dad9586f9c71153e4dc2bb8a0d0436769ed8e6bb9ddadb8eb91cbfdd9efc801ebe106ed8151e61153db150c2e2fa4109740028cdb606", 0x2d9}], 0x1}}], 0x1, 0x0) [ 712.389937][T27358] tipc: TX() has been purged, node left! [ 712.412951][T27358] tipc: TX() has been purged, node left! [ 712.508570][T27358] tipc: TX() has been purged, node left! [ 712.566701][T27358] tipc: TX() has been purged, node left! 03:43:53 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x400007) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0x32600) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xb4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000040)='cpuset') write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000700)=ANY=[@ANYBLOB="006d176df3384ed3ddbcf3be0e26fd017529253262b78ee8b9d470"], 0x1b) ioctl$TUNSETCARRIER(0xffffffffffffffff, 0x400454e2, &(0x7f0000000080)=0x1) write$cgroup_int(r0, &(0x7f0000000380), 0x12) write$cgroup_int(r1, &(0x7f0000000400), 0xd) r2 = gettid() write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000000)=r2, 0x12) r3 = socket$kcm(0x2b, 0x0, 0x0) socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r3, 0x0, 0x0) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000280)=r2, 0x12) r4 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) close(r5) write$cgroup_type(r5, &(0x7f0000000080)='threaded\x00', 0xfffffc61) r6 = bpf$MAP_CREATE(0x2, &(0x7f0000009280), 0x3c) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x17, 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB], &(0x7f0000000200)='syzkaller\x00', 0xfa1, 0x0, 0x0, 0x41100, 0x2, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, &(0x7f0000000240), 0x8, 0x10, 0x0}, 0x78) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000008740)={0x0, 0x0, &(0x7f0000008700)=[{0x0}, {&(0x7f0000008680)=""/23, 0x17}, {&(0x7f00000086c0)=""/38, 0x26}], 0x3}, 0x8000) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x6, 0x2, 0x2e15579, 0x3f, 0x1, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffffff, 0x0, 0x5}, 0x3c) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0xb, [], 0x0, 0xc, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r7}, 0x7e) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r8, &(0x7f0000000000)=ANY=[], 0x50c000) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x18, 0x8, &(0x7f0000000a00)=ANY=[@ANYBLOB="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", @ANYRES32=r6, @ANYBLOB="00000000000000000c72c0fff6ffffff850000005b0000009500000000000000"], &(0x7f0000000040)='GPL\x00', 0x3ff, 0xd5, &(0x7f0000000080)=""/213, 0x0, 0xab6c50112a8dd52c, [], 0x0, 0x16, 0xffffffffffffffff, 0x8, &(0x7f0000000180)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000001c0)={0x2, 0x6, 0x6, 0x5}, 0x10, 0x0, r8}, 0x78) bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x11, 0x5, 0x81, 0x2, 0x100, r5, 0x3, [], 0x0, 0xffffffffffffffff, 0x4, 0x3}, 0x3c) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r9, &(0x7f0000000200), 0x806000) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, r4, 0x0, 0x2a8, &(0x7f0000000440)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\a\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83CZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x98\x86\"R\x06\x00\x00\x00\x00\x00\x00\x00\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&\x014\x01\xf4\xb7\x83\x9a\xfa*\xa6\x06\xb7Pk7N\xc2\xd9\xee\xd0\xb0M\x00\xab\xc3\t\fc\xd8dx\xd5\x1dU*s)\x12[\x14\xb1\xc0\xd7\x1a\xa0\x16\xa2z\x9e\x93 \xddeF>29\v\x02\xa2b\x13R\xef\xffA,\xb9.$\xfa\x9f\xde[\x80\xd1=\xce\x1b\xeb\xf6\xf4\xe3z\x1f\x9dz\xa3\xc0\xe2\xa2\xb1\xeeq\xf5\xec0\x8e\xf4\xfb\xd9\x87\xf03\xdb\xae|\x10&V5c\xa6\xce\xcd\x8a\xdf\xe1\x89\"\xea\xde\xe7\xa3\xbe\xe7\xff\xf9 \x11\xfdY\xc6\xa1\xe8\xda\v\\?\xcb\x87\bn\x9b\x01\x1f\xf8\xe8\x1eV\xfaC\xdf\xc3Vv\x9b\x1a\xfc\x14.c\x94\xc9=\xb0\x0f!d\b\x18*@m\x7f\xaal\x17G\xd6?\x81\x16P\x03\x10e\xc3\xcd\xb1B\xeb\x01B\\\x91A\xa1\x8an\xb4#\xadr\x1e\x81v\xa2\x0e6x\xca\x8b\xa6\xd8\x81\x10:\x0e(\xdd\xfc\xc9\xc6\xb4\xf0\'f:\xbd\xfe\x11\xf8\xc8W\x81s^\xd9W\xf1\x94\xaf\xc5\x8a\xb4f\x1b\x17E\xb23\x12\xb0\xeb\xef\x8c\xb24h\xd7}\x7f\x92Hgej\x957\xe2A'}, 0x30) 03:43:53 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x0, 0x0, 0x0, 0xe8}]}, 0x10) 03:43:53 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x238) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) writev(r0, &(0x7f0000000540)=[{&(0x7f0000000140)="cedbddea5b67f4290aa7fd7c0cc7e2e613891a59fd3dc2e8a3c6e7c9fa96", 0x1e}, {&(0x7f0000000340)="e4bc7c957b83ba155edae525e00f76c76056ac3fe8a5de5ccfba604ac6b0d4a0fd42802b43143a32d703bd21baddda61ba1cb78758f519c19a06193e8bfc0d1f1fad3be6885359773264bd153a2bf50591662cca307c7a22f8a9e70629a1beac22b823bfee7fec832958c20007e0b8707c6ac0e8b1", 0x75}, {&(0x7f00000004c0)}, {&(0x7f0000000800)="87cfb3bd1ada6e425bdd5aaccdafa6e4ea74", 0x12}], 0x4) sendto$inet(r0, &(0x7f00000012c0)="0c268a927f1f6588b967481241ba7860005cf65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95425a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x27) 03:43:53 executing program 5: openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) ioctl$RNDADDENTROPY(0xffffffffffffffff, 0x40085203, &(0x7f0000000100)={0x6, 0xbc, "56f80f8d7c9ad684157765ee68815e033b7b2972a2d067318db9ac518603e0dbae813e160bd3f15b30c226056579cf64ac2525dd44c15e56204f1e3f1b8c03b31f4281605682d4b39a61b89636b3a2a5ea0bd3f5e8bd40d8c0406969d18fed78e4f4108902b5959ec383c40036f5262e703d6ad6a7a486302c382e45645bfe4c472249b482a28e9519e744cdbe884985d913612a17250eab7e4f0bf4b35aab9f7b923116a8d30baf612ca3bc2ef9b3f8d1c6b570cb60bd8d5b6805ce"}) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet_sctp(0x2, 0x5, 0x84) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp_SCTP_AUTH_DEACTIVATE_KEY(0xffffffffffffffff, 0x84, 0x23, 0x0, 0x0) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f00000000c0)={0x51, 0xfffc, 0x0, {0x103, 0xf1}, {0x9}, @ramp={0x2, 0x3, {0x7fff, 0x0, 0x7, 0x7}}}) r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @bcast, @rose, @rose, @null]}, 0x48) listen(r0, 0x0) unshare(0x40000000) r1 = accept(r0, 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r2, 0xffffffffffffffff) write$binfmt_elf64(r1, &(0x7f00000002c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}], "", [[], []]}, 0x278) 03:43:53 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0), 0x25d) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) sendmmsg$inet(r0, &(0x7f0000001100)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000001340)="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", 0x2d9}], 0x1}}], 0x1, 0x0) [ 712.749469][T27358] tipc: TX() has been purged, node left! 03:43:53 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x0, 0x0, 0x0, 0xe8}]}, 0x10) [ 712.910589][T27358] tipc: TX() has been purged, node left! 03:43:54 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(0xffffffffffffffff, &(0x7f0000000280)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) sendmmsg$inet(r0, &(0x7f0000001100)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000001340)="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", 0x2d9}], 0x1}}], 0x1, 0x0) [ 713.050751][T29402] IPVS: ftp: loaded support on port[0] = 21 [ 713.086711][T27358] tipc: TX() has been purged, node left! 03:43:54 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x400007) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0x32600) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xb4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000040)='cpuset') write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000700)=ANY=[@ANYBLOB="006d176df3384ed3ddbcf3be0e26fd017529253262b78ee8b9d470"], 0x1b) ioctl$TUNSETCARRIER(0xffffffffffffffff, 0x400454e2, &(0x7f0000000080)=0x1) write$cgroup_int(r0, &(0x7f0000000380), 0x12) write$cgroup_int(r1, &(0x7f0000000400), 0xd) r2 = gettid() write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000000)=r2, 0x12) r3 = socket$kcm(0x2b, 0x0, 0x0) socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r3, 0x0, 0x0) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000280)=r2, 0x12) r4 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) close(r5) write$cgroup_type(r5, &(0x7f0000000080)='threaded\x00', 0xfffffc61) r6 = bpf$MAP_CREATE(0x2, &(0x7f0000009280), 0x3c) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x17, 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB], &(0x7f0000000200)='syzkaller\x00', 0xfa1, 0x0, 0x0, 0x41100, 0x2, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, &(0x7f0000000240), 0x8, 0x10, 0x0}, 0x78) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000008740)={0x0, 0x0, &(0x7f0000008700)=[{0x0}, {&(0x7f0000008680)=""/23, 0x17}, {&(0x7f00000086c0)=""/38, 0x26}], 0x3}, 0x8000) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x6, 0x2, 0x2e15579, 0x3f, 0x1, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffffff, 0x0, 0x5}, 0x3c) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0xb, [], 0x0, 0xc, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r7}, 0x7e) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r8, &(0x7f0000000000)=ANY=[], 0x50c000) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x18, 0x8, &(0x7f0000000a00)=ANY=[@ANYBLOB="0000752c0000000000000000ffffffff9500000000000000181400006200ed587c1ba87fb23af22b6cf03fb851054ce322d4b3a5894516c0c1479e1cfbf3061ad7aef6d6c36e4e74a8219f8441192ab16361719f26a1e543525c94027f7a5f275546d8cacee044fc20d858e268019caeb1633cc4888faa05d02cd44de32962e022697754125edcfb3477c4e122a0e97ab43de94a7a94efd527400e2c2ff4468fd6e773773f089b268fddef712ab174487ae9049f64895522be3862156a1af15513c3ff285844c9aae255d74c0dacf6c47d6809ce69ee6e41a03a03b29152ee43afabd82aa883f260995238aa70895dc3aee59a119dc82fb5fd00af56ded09336e2df6a0bb41bd191d57b35eb262a1aa8d5fec51b24500685f8c0adaf3639790fdbd7cb2ac3af37a802a6ac7265a819c91986c45e7c54d91c5ced552d96c04a80c063fee16b3a52bc603deebe32e4e0dfdfe9d03658daad65606e175041076684110e66f74db9509b1a29e765c9208ddba13e3b42b3963dce5432c4fb7844a9b64c518820c9c0198fadb6ea6a350f89a1eb1a3c1e20527ce574c3514f9ad62be70eee070faa267d83564e6db87e4d16ccd118397c2e4825140e6b46c35edb77df7b9a3334ad3f8cb70b73f4b9d8b29eb50b2c2dfc8d82841a6251fcfcb978ce90873ddcfa0125800302f5ed70c724e0253fb45955750f1e7c94ca05a91ec592ee3a52fad94c89205ece2d1d96afbfa0b59f9bd6c1161c638fff8696973fedca3f3ddf5bbb1023", @ANYRES32=r6, @ANYBLOB="00000000000000000c72c0fff6ffffff850000005b0000009500000000000000"], &(0x7f0000000040)='GPL\x00', 0x3ff, 0xd5, &(0x7f0000000080)=""/213, 0x0, 0xab6c50112a8dd52c, [], 0x0, 0x16, 0xffffffffffffffff, 0x8, &(0x7f0000000180)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000001c0)={0x2, 0x6, 0x6, 0x5}, 0x10, 0x0, r8}, 0x78) bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x11, 0x5, 0x81, 0x2, 0x100, r5, 0x3, [], 0x0, 0xffffffffffffffff, 0x4, 0x3}, 0x3c) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r9, &(0x7f0000000200), 0x806000) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, r4, 0x0, 0x2a8, &(0x7f0000000440)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\a\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83CZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x98\x86\"R\x06\x00\x00\x00\x00\x00\x00\x00\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&\x014\x01\xf4\xb7\x83\x9a\xfa*\xa6\x06\xb7Pk7N\xc2\xd9\xee\xd0\xb0M\x00\xab\xc3\t\fc\xd8dx\xd5\x1dU*s)\x12[\x14\xb1\xc0\xd7\x1a\xa0\x16\xa2z\x9e\x93 \xddeF>29\v\x02\xa2b\x13R\xef\xffA,\xb9.$\xfa\x9f\xde[\x80\xd1=\xce\x1b\xeb\xf6\xf4\xe3z\x1f\x9dz\xa3\xc0\xe2\xa2\xb1\xeeq\xf5\xec0\x8e\xf4\xfb\xd9\x87\xf03\xdb\xae|\x10&V5c\xa6\xce\xcd\x8a\xdf\xe1\x89\"\xea\xde\xe7\xa3\xbe\xe7\xff\xf9 \x11\xfdY\xc6\xa1\xe8\xda\v\\?\xcb\x87\bn\x9b\x01\x1f\xf8\xe8\x1eV\xfaC\xdf\xc3Vv\x9b\x1a\xfc\x14.c\x94\xc9=\xb0\x0f!d\b\x18*@m\x7f\xaal\x17G\xd6?\x81\x16P\x03\x10e\xc3\xcd\xb1B\xeb\x01B\\\x91A\xa1\x8an\xb4#\xadr\x1e\x81v\xa2\x0e6x\xca\x8b\xa6\xd8\x81\x10:\x0e(\xdd\xfc\xc9\xc6\xb4\xf0\'f:\xbd\xfe\x11\xf8\xc8W\x81s^\xd9W\xf1\x94\xaf\xc5\x8a\xb4f\x1b\x17E\xb23\x12\xb0\xeb\xef\x8c\xb24h\xd7}\x7f\x92Hgej\x957\xe2A'}, 0x30) 03:43:54 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6}]}, 0x10) 03:43:54 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x238) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) writev(r0, &(0x7f0000000540)=[{&(0x7f0000000140)}, {&(0x7f0000000340)="e4bc7c957b83ba155edae525e00f76c76056ac3fe8a5de5ccfba604ac6b0d4a0fd42802b43143a32d703bd21baddda61ba1cb78758f519c19a06193e8bfc0d1f1fad3be6885359773264bd", 0x4b}, {0x0}], 0x3) sendto$inet(r0, &(0x7f00000012c0)="0c268a927f1f6588b967481241ba7860005cf65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95425a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x27) 03:43:54 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(0xffffffffffffffff, &(0x7f0000000280)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) sendmmsg$inet(r0, &(0x7f0000001100)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000001340)="492b7b56e7bf1546ba9024d15debc3fdf835944e6359dfc82ad6a44af6174b7048d6774edb2a522c3b5aebed3bba4b546494bbf6043a7a659fa12216b37584d6922636fff14b623e8c3e9fe28800be702458a4e01e63a39ce0913a26da044aa26f457632cfb8104ef5156bc27f3c08d0a0662a69249556e9a7dcc2da9fdefdd1378f5ef60bb2a8ea72a06c11be333049a90b1c46352f3c5409e32849a93d43e39038bd6c1d6e8eab5b135933cc6fc02853cf997defa87b0bdc2eedad7426259c9118c5a885705288956f19cf9fcb5a5e3f772253900b73288028f2135004a304699d8879a3b2570b1c0f7d45bd5a730a2e57413513c2bb12b095d986617eab6020147d6974b75058c7d235a54b139958054e31290acf55b048b3a6a5e7515295ba626378ce82b4ee22cc23bd5b82363bcb7ff225fc556ecfa3b764d8ef16aa66c6b85d546bac428bfd4e23996cc7d4b1f36e08bf5611234fa7ecf93d7835ab9b0302b9371497d4ab867e0d5750a3d047abef4793b4a80055c50797e611556c1e29e825c3980bd81a4b221d44f9abefeea268e98df6310f32755bc5c2fd19e9ab91958074421fbc49a067de17743a2eb60aecee575d892009f653bd7548f24194179f506ad2e30e2910f51231eff390e2e6b28a834ef9c2380df877e8ac1d4649df50e06ec92ad336888ac4d45db52a2dead697ba7b1ebf042cdcc9fa2c8af8e818375fc8dc0689f6d16478be23bee3cc43e5ff224bdbbd089cdbcced85a88a739f8fc81314e362527742ae15b57d200580205ee0000cbf1b47d38ff82eb464b778cd5beffd4d43378e7ebed4a31b3fb7d325b958b9eb9d7c5fc4274ecb863c1edd6fc4ef7f6b58dee0cbbe57293c33a3d098501c91f45fff812bc8036f9b13181d223d23be06d53bb0b0f4d3a05ca9d0b2e4de29fe137077bb6d39d0b97d818115d867dad9586f9c71153e4dc2bb8a0d0436769ed8e6bb9ddadb8eb91cbfdd9efc801ebe106ed8151e61153db150c2e2fa4109740028cdb606", 0x2d9}], 0x1}}], 0x1, 0x0) 03:43:54 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) 03:43:54 executing program 5: openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) ioctl$RNDADDENTROPY(0xffffffffffffffff, 0x40085203, &(0x7f0000000100)={0x6, 0xbc, "56f80f8d7c9ad684157765ee68815e033b7b2972a2d067318db9ac518603e0dbae813e160bd3f15b30c226056579cf64ac2525dd44c15e56204f1e3f1b8c03b31f4281605682d4b39a61b89636b3a2a5ea0bd3f5e8bd40d8c0406969d18fed78e4f4108902b5959ec383c40036f5262e703d6ad6a7a486302c382e45645bfe4c472249b482a28e9519e744cdbe884985d913612a17250eab7e4f0bf4b35aab9f7b923116a8d30baf612ca3bc2ef9b3f8d1c6b570cb60bd8d5b6805ce"}) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet_sctp(0x2, 0x5, 0x84) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp_SCTP_AUTH_DEACTIVATE_KEY(0xffffffffffffffff, 0x84, 0x23, 0x0, 0x0) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f00000000c0)={0x51, 0xfffc, 0x0, {0x103, 0xf1}, {0x9}, @ramp={0x2, 0x3, {0x7fff, 0x0, 0x7, 0x7}}}) r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @bcast, @rose, @rose, @null]}, 0x48) listen(r0, 0x0) unshare(0x40000000) r1 = accept(r0, 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r2, 0xffffffffffffffff) write$binfmt_elf64(r1, &(0x7f00000002c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}], "", [[], []]}, 0x278) 03:43:54 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x238) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) writev(r0, &(0x7f0000000540)=[{&(0x7f0000000140)="cedbddea5b67f4290aa7fd7c0cc7e2e613891a59fd3dc2e8a3c6e7c9fa96", 0x1e}, {&(0x7f0000000340)="e4bc7c957b83ba155edae525e00f76c76056ac3fe8a5de5ccfba604ac6b0d4a0fd42802b43143a32d703bd21baddda61ba1cb78758f519c19a06193e8bfc0d1f1fad3be6885359773264bd153a2bf50591662cca307c7a22f8a9e70629a1beac22b823bfee7fec832958c20007e0b8707c6ac0e8b1", 0x75}, {&(0x7f00000004c0)="4b8043af3b13f04c3ee02ee028e584b538cf", 0x12}, {&(0x7f0000000800)="87cfb3bd1ada6e425bdd5aaccdafa6e4ea74", 0x12}], 0x4) sendto$inet(r0, &(0x7f00000012c0)="0c268a927f1f6588b967481241ba7860005cf65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95425a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x27) 03:43:54 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(0xffffffffffffffff, &(0x7f0000000280)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) sendmmsg$inet(r0, &(0x7f0000001100)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000001340)="492b7b56e7bf1546ba9024d15debc3fdf835944e6359dfc82ad6a44af6174b7048d6774edb2a522c3b5aebed3bba4b546494bbf6043a7a659fa12216b37584d6922636fff14b623e8c3e9fe28800be702458a4e01e63a39ce0913a26da044aa26f457632cfb8104ef5156bc27f3c08d0a0662a69249556e9a7dcc2da9fdefdd1378f5ef60bb2a8ea72a06c11be333049a90b1c46352f3c5409e32849a93d43e39038bd6c1d6e8eab5b135933cc6fc02853cf997defa87b0bdc2eedad7426259c9118c5a885705288956f19cf9fcb5a5e3f772253900b73288028f2135004a304699d8879a3b2570b1c0f7d45bd5a730a2e57413513c2bb12b095d986617eab6020147d6974b75058c7d235a54b139958054e31290acf55b048b3a6a5e7515295ba626378ce82b4ee22cc23bd5b82363bcb7ff225fc556ecfa3b764d8ef16aa66c6b85d546bac428bfd4e23996cc7d4b1f36e08bf5611234fa7ecf93d7835ab9b0302b9371497d4ab867e0d5750a3d047abef4793b4a80055c50797e611556c1e29e825c3980bd81a4b221d44f9abefeea268e98df6310f32755bc5c2fd19e9ab91958074421fbc49a067de17743a2eb60aecee575d892009f653bd7548f24194179f506ad2e30e2910f51231eff390e2e6b28a834ef9c2380df877e8ac1d4649df50e06ec92ad336888ac4d45db52a2dead697ba7b1ebf042cdcc9fa2c8af8e818375fc8dc0689f6d16478be23bee3cc43e5ff224bdbbd089cdbcced85a88a739f8fc81314e362527742ae15b57d200580205ee0000cbf1b47d38ff82eb464b778cd5beffd4d43378e7ebed4a31b3fb7d325b958b9eb9d7c5fc4274ecb863c1edd6fc4ef7f6b58dee0cbbe57293c33a3d098501c91f45fff812bc8036f9b13181d223d23be06d53bb0b0f4d3a05ca9d0b2e4de29fe137077bb6d39d0b97d818115d867dad9586f9c71153e4dc2bb8a0d0436769ed8e6bb9ddadb8eb91cbfdd9efc801ebe106ed8151e61153db150c2e2fa4109740028cdb606", 0x2d9}], 0x1}}], 0x1, 0x0) 03:43:54 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x400007) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0x32600) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xb4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000040)='cpuset') write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000700)=ANY=[@ANYBLOB="006d176df3384ed3ddbcf3be0e26fd017529253262b78ee8b9d470"], 0x1b) ioctl$TUNSETCARRIER(0xffffffffffffffff, 0x400454e2, &(0x7f0000000080)=0x1) write$cgroup_int(r0, &(0x7f0000000380), 0x12) write$cgroup_int(r1, &(0x7f0000000400), 0xd) r2 = gettid() write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000000)=r2, 0x12) r3 = socket$kcm(0x2b, 0x0, 0x0) socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r3, 0x0, 0x0) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000280)=r2, 0x12) r4 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) close(r5) write$cgroup_type(r5, &(0x7f0000000080)='threaded\x00', 0xfffffc61) r6 = bpf$MAP_CREATE(0x2, &(0x7f0000009280), 0x3c) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x17, 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB], &(0x7f0000000200)='syzkaller\x00', 0xfa1, 0x0, 0x0, 0x41100, 0x2, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, &(0x7f0000000240), 0x8, 0x10, 0x0}, 0x78) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000008740)={0x0, 0x0, &(0x7f0000008700)=[{0x0}, {&(0x7f0000008680)=""/23, 0x17}, {&(0x7f00000086c0)=""/38, 0x26}], 0x3}, 0x8000) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x6, 0x2, 0x2e15579, 0x3f, 0x1, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffffff, 0x0, 0x5}, 0x3c) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0xb, [], 0x0, 0xc, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r7}, 0x7e) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r8, &(0x7f0000000000)=ANY=[], 0x50c000) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x18, 0x8, &(0x7f0000000a00)=ANY=[@ANYBLOB="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", @ANYRES32=r6, @ANYBLOB="00000000000000000c72c0fff6ffffff850000005b0000009500000000000000"], &(0x7f0000000040)='GPL\x00', 0x3ff, 0xd5, &(0x7f0000000080)=""/213, 0x61800, 0x0, [], 0x0, 0x16, 0xffffffffffffffff, 0x8, &(0x7f0000000180)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000001c0)={0x2, 0x6, 0x6, 0x5}, 0x10, 0x0, r8}, 0x78) bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x11, 0x5, 0x81, 0x2, 0x100, r5, 0x3, [], 0x0, 0xffffffffffffffff, 0x4, 0x3}, 0x3c) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r9, &(0x7f0000000200), 0x806000) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, r4, 0x0, 0x2a8, &(0x7f0000000440)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\a\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83CZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x98\x86\"R\x06\x00\x00\x00\x00\x00\x00\x00\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&\x014\x01\xf4\xb7\x83\x9a\xfa*\xa6\x06\xb7Pk7N\xc2\xd9\xee\xd0\xb0M\x00\xab\xc3\t\fc\xd8dx\xd5\x1dU*s)\x12[\x14\xb1\xc0\xd7\x1a\xa0\x16\xa2z\x9e\x93 \xddeF>29\v\x02\xa2b\x13R\xef\xffA,\xb9.$\xfa\x9f\xde[\x80\xd1=\xce\x1b\xeb\xf6\xf4\xe3z\x1f\x9dz\xa3\xc0\xe2\xa2\xb1\xeeq\xf5\xec0\x8e\xf4\xfb\xd9\x87\xf03\xdb\xae|\x10&V5c\xa6\xce\xcd\x8a\xdf\xe1\x89\"\xea\xde\xe7\xa3\xbe\xe7\xff\xf9 \x11\xfdY\xc6\xa1\xe8\xda\v\\?\xcb\x87\bn\x9b\x01\x1f\xf8\xe8\x1eV\xfaC\xdf\xc3Vv\x9b\x1a\xfc\x14.c\x94\xc9=\xb0\x0f!d\b\x18*@m\x7f\xaal\x17G\xd6?\x81\x16P\x03\x10e\xc3\xcd\xb1B\xeb\x01B\\\x91A\xa1\x8an\xb4#\xadr\x1e\x81v\xa2\x0e6x\xca\x8b\xa6\xd8\x81\x10:\x0e(\xdd\xfc\xc9\xc6\xb4\xf0\'f:\xbd\xfe\x11\xf8\xc8W\x81s^\xd9W\xf1\x94\xaf\xc5\x8a\xb4f\x1b\x17E\xb23\x12\xb0\xeb\xef\x8c\xb24h\xd7}\x7f\x92Hgej\x957\xe2A'}, 0x30) 03:43:54 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x0, &(0x7f00000000c0)=0x2000000000000074, 0x238) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000100)='bbr\x00', 0x4) sendto$inet(r0, &(0x7f00000012c0)="0c268a927f1f6588b967481241ba7860005cf65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95425a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x27) [ 713.809566][T29533] IPVS: ftp: loaded support on port[0] = 21 03:43:54 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x238) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) writev(r0, &(0x7f0000000540)=[{&(0x7f0000000140)}, {&(0x7f0000000340)="e4bc7c957b83ba155edae525e00f76c76056ac3fe8a5de5ccfba604ac6b0d4a0fd42802b43143a32d703bd21baddda61ba1cb78758f519c19a06193e8bfc0d1f1fad3be6885359773264bd", 0x4b}, {0x0}], 0x3) sendto$inet(r0, &(0x7f00000012c0)="0c268a927f1f6588b967481241ba7860005cf65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95425a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x27) 03:43:54 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, 0x0, 0x0) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) sendmmsg$inet(r0, &(0x7f0000001100)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000001340)="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", 0x2d9}], 0x1}}], 0x1, 0x0) 03:43:55 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x0, &(0x7f00000000c0)=0x2000000000000074, 0x238) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000100)='bbr\x00', 0x4) sendto$inet(r0, &(0x7f00000012c0)="0c268a927f1f6588b967481241ba7860005cf65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95425a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x27) 03:43:55 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x400007) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0x32600) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xb4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000040)='cpuset') write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000700)=ANY=[@ANYBLOB="006d176df3384ed3ddbcf3be0e26fd017529253262b78ee8b9d470"], 0x1b) ioctl$TUNSETCARRIER(0xffffffffffffffff, 0x400454e2, &(0x7f0000000080)=0x1) write$cgroup_int(r0, &(0x7f0000000380), 0x12) write$cgroup_int(r1, &(0x7f0000000400), 0xd) r2 = gettid() write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000000)=r2, 0x12) r3 = socket$kcm(0x2b, 0x0, 0x0) socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r3, 0x0, 0x0) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000280)=r2, 0x12) r4 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) close(r5) write$cgroup_type(r5, &(0x7f0000000080)='threaded\x00', 0xfffffc61) r6 = bpf$MAP_CREATE(0x2, &(0x7f0000009280), 0x3c) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x17, 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB], &(0x7f0000000200)='syzkaller\x00', 0xfa1, 0x0, 0x0, 0x41100, 0x2, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, &(0x7f0000000240), 0x8, 0x10, 0x0}, 0x78) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000008740)={0x0, 0x0, &(0x7f0000008700)=[{0x0}, {&(0x7f0000008680)=""/23, 0x17}, {&(0x7f00000086c0)=""/38, 0x26}], 0x3}, 0x8000) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x6, 0x2, 0x2e15579, 0x3f, 0x1, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffffff, 0x0, 0x5}, 0x3c) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0xb, [], 0x0, 0xc, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r7}, 0x7e) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r8, &(0x7f0000000000)=ANY=[], 0x50c000) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x18, 0x8, &(0x7f0000000a00)=ANY=[@ANYBLOB="0000752c0000000000000000ffffffff9500000000000000181400006200ed587c1ba87fb23af22b6cf03fb851054ce322d4b3a5894516c0c1479e1cfbf3061ad7aef6d6c36e4e74a8219f8441192ab16361719f26a1e543525c94027f7a5f275546d8cacee044fc20d858e268019caeb1633cc4888faa05d02cd44de32962e022697754125edcfb3477c4e122a0e97ab43de94a7a94efd527400e2c2ff4468fd6e773773f089b268fddef712ab174487ae9049f64895522be3862156a1af15513c3ff285844c9aae255d74c0dacf6c47d6809ce69ee6e41a03a03b29152ee43afabd82aa883f260995238aa70895dc3aee59a119dc82fb5fd00af56ded09336e2df6a0bb41bd191d57b35eb262a1aa8d5fec51b24500685f8c0adaf3639790fdbd7cb2ac3af37a802a6ac7265a819c91986c45e7c54d91c5ced552d96c04a80c063fee16b3a52bc603deebe32e4e0dfdfe9d03658daad65606e175041076684110e66f74db9509b1a29e765c9208ddba13e3b42b3963dce5432c4fb7844a9b64c518820c9c0198fadb6ea6a350f89a1eb1a3c1e20527ce574c3514f9ad62be70eee070faa267d83564e6db87e4d16ccd118397c2e4825140e6b46c35edb77df7b9a3334ad3f8cb70b73f4b9d8b29eb50b2c2dfc8d82841a6251fcfcb978ce90873ddcfa0125800302f5ed70c724e0253fb45955750f1e7c94ca05a91ec592ee3a52fad94c89205ece2d1d96afbfa0b59f9bd6c1161c638fff8696973fedca3f3ddf5bbb1023", @ANYRES32=r6, @ANYBLOB="00000000000000000c72c0fff6ffffff850000005b0000009500000000000000"], &(0x7f0000000040)='GPL\x00', 0x3ff, 0xd5, &(0x7f0000000080)=""/213, 0x61800, 0x0, [], 0x0, 0x16, 0xffffffffffffffff, 0x8, &(0x7f0000000180)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000001c0)={0x2, 0x6, 0x6, 0x5}, 0x10, 0x0, r8}, 0x78) bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x11, 0x5, 0x81, 0x2, 0x100, r5, 0x3, [], 0x0, 0xffffffffffffffff, 0x4, 0x3}, 0x3c) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r9, &(0x7f0000000200), 0x806000) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, r4, 0x0, 0x2a8, &(0x7f0000000440)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\a\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83CZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x98\x86\"R\x06\x00\x00\x00\x00\x00\x00\x00\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&\x014\x01\xf4\xb7\x83\x9a\xfa*\xa6\x06\xb7Pk7N\xc2\xd9\xee\xd0\xb0M\x00\xab\xc3\t\fc\xd8dx\xd5\x1dU*s)\x12[\x14\xb1\xc0\xd7\x1a\xa0\x16\xa2z\x9e\x93 \xddeF>29\v\x02\xa2b\x13R\xef\xffA,\xb9.$\xfa\x9f\xde[\x80\xd1=\xce\x1b\xeb\xf6\xf4\xe3z\x1f\x9dz\xa3\xc0\xe2\xa2\xb1\xeeq\xf5\xec0\x8e\xf4\xfb\xd9\x87\xf03\xdb\xae|\x10&V5c\xa6\xce\xcd\x8a\xdf\xe1\x89\"\xea\xde\xe7\xa3\xbe\xe7\xff\xf9 \x11\xfdY\xc6\xa1\xe8\xda\v\\?\xcb\x87\bn\x9b\x01\x1f\xf8\xe8\x1eV\xfaC\xdf\xc3Vv\x9b\x1a\xfc\x14.c\x94\xc9=\xb0\x0f!d\b\x18*@m\x7f\xaal\x17G\xd6?\x81\x16P\x03\x10e\xc3\xcd\xb1B\xeb\x01B\\\x91A\xa1\x8an\xb4#\xadr\x1e\x81v\xa2\x0e6x\xca\x8b\xa6\xd8\x81\x10:\x0e(\xdd\xfc\xc9\xc6\xb4\xf0\'f:\xbd\xfe\x11\xf8\xc8W\x81s^\xd9W\xf1\x94\xaf\xc5\x8a\xb4f\x1b\x17E\xb23\x12\xb0\xeb\xef\x8c\xb24h\xd7}\x7f\x92Hgej\x957\xe2A'}, 0x30) 03:43:55 executing program 5: openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) ioctl$RNDADDENTROPY(0xffffffffffffffff, 0x40085203, &(0x7f0000000100)={0x6, 0xbc, "56f80f8d7c9ad684157765ee68815e033b7b2972a2d067318db9ac518603e0dbae813e160bd3f15b30c226056579cf64ac2525dd44c15e56204f1e3f1b8c03b31f4281605682d4b39a61b89636b3a2a5ea0bd3f5e8bd40d8c0406969d18fed78e4f4108902b5959ec383c40036f5262e703d6ad6a7a486302c382e45645bfe4c472249b482a28e9519e744cdbe884985d913612a17250eab7e4f0bf4b35aab9f7b923116a8d30baf612ca3bc2ef9b3f8d1c6b570cb60bd8d5b6805ce"}) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_sctp(0x2, 0x5, 0x84) dup3(0xffffffffffffffff, r0, 0x0) socket$inet6_sctp(0xa, 0x0, 0x84) setsockopt$inet_sctp_SCTP_AUTH_DEACTIVATE_KEY(0xffffffffffffffff, 0x84, 0x23, 0x0, 0x0) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f00000000c0)={0x51, 0xfffc, 0x0, {0x103, 0xf1}, {0x9}, @ramp={0x2, 0x3, {0x7fff, 0x0, 0x7, 0x7}}}) r1 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r1, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @bcast, @rose, @rose, @null]}, 0x48) listen(r1, 0x0) unshare(0x40000000) r2 = accept(r1, 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r3, 0xffffffffffffffff) write$binfmt_elf64(r2, &(0x7f00000002c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}], "", [[], []]}, 0x278) 03:43:55 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, 0x0, 0x0) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) sendmmsg$inet(r0, &(0x7f0000001100)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000001340)="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", 0x2d9}], 0x1}}], 0x1, 0x0) 03:43:55 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x238) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) writev(r0, &(0x7f0000000540)=[{&(0x7f0000000140)="cedbddea5b67f4290aa7fd7c0cc7e2e613891a59fd3dc2e8a3c6e7c9fa96", 0x1e}, {&(0x7f0000000340)="e4bc7c957b83ba155edae525e00f76c76056ac3fe8a5de5ccfba604ac6b0d4a0fd42802b43143a32d703bd21baddda61ba1cb78758f519c19a06193e8bfc0d1f1fad3be6885359773264bd153a2bf50591662cca307c7a22f8a9e70629a1beac22b823bfee7fec832958c20007e0b8707c6ac0e8b1", 0x75}, {&(0x7f00000004c0)="4b8043af3b13f04c3ee02ee028e584b538cf", 0x12}, {&(0x7f0000000800)="87cfb3bd1ada6e425bdd5aaccdafa6e4ea74", 0x12}], 0x4) sendto$inet(r0, &(0x7f00000012c0)="0c268a927f1f6588b967481241ba7860005cf65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95425a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x27) 03:43:55 executing program 1: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(r0, 0x8982, &(0x7f0000000100)={0x0, 'veth0_to_bridge\x00'}) [ 714.534958][T29667] IPVS: ftp: loaded support on port[0] = 21 03:43:55 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, 0x0, 0x0) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) sendmmsg$inet(r0, &(0x7f0000001100)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000001340)="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", 0x2d9}], 0x1}}], 0x1, 0x0) 03:43:55 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x238) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) writev(r0, &(0x7f0000000540)=[{&(0x7f0000000140)="cedbddea5b67f4290aa7fd7c0cc7e2", 0xf}, {&(0x7f0000000340)="e4bc7c957b83ba155edae525e00f76c76056ac3fe8a5de5ccfba604ac6b0d4a0fd42802b43143a32d703bd21baddda61ba1cb78758f519c19a06193e8bfc0d1f1fad3be6885359773264bd", 0x4b}, {0x0}], 0x3) sendto$inet(r0, &(0x7f00000012c0)="0c268a927f1f6588b967481241ba7860005cf65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95425a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x27) 03:43:55 executing program 1: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(r0, 0x8982, &(0x7f0000000100)={0x0, 'veth0_to_bridge\x00'}) 03:43:55 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x400007) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0x32600) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xb4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000040)='cpuset') write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000700)=ANY=[@ANYBLOB="006d176df3384ed3ddbcf3be0e26fd017529253262b78ee8b9d470"], 0x1b) ioctl$TUNSETCARRIER(0xffffffffffffffff, 0x400454e2, &(0x7f0000000080)=0x1) write$cgroup_int(r0, &(0x7f0000000380), 0x12) write$cgroup_int(r1, &(0x7f0000000400), 0xd) r2 = gettid() write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000000)=r2, 0x12) r3 = socket$kcm(0x2b, 0x0, 0x0) socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r3, 0x0, 0x0) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000280)=r2, 0x12) r4 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) close(r5) write$cgroup_type(r5, &(0x7f0000000080)='threaded\x00', 0xfffffc61) r6 = bpf$MAP_CREATE(0x2, &(0x7f0000009280), 0x3c) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x17, 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB], &(0x7f0000000200)='syzkaller\x00', 0xfa1, 0x0, 0x0, 0x41100, 0x2, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, &(0x7f0000000240), 0x8, 0x10, 0x0}, 0x78) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000008740)={0x0, 0x0, &(0x7f0000008700)=[{0x0}, {&(0x7f0000008680)=""/23, 0x17}, {&(0x7f00000086c0)=""/38, 0x26}], 0x3}, 0x8000) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x6, 0x2, 0x2e15579, 0x3f, 0x1, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffffff, 0x0, 0x5}, 0x3c) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0xb, [], 0x0, 0xc, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r7}, 0x7e) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r8, &(0x7f0000000000)=ANY=[], 0x50c000) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x18, 0x8, &(0x7f0000000a00)=ANY=[@ANYBLOB="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", @ANYRES32=r6, @ANYBLOB="00000000000000000c72c0fff6ffffff850000005b0000009500000000000000"], &(0x7f0000000040)='GPL\x00', 0x3ff, 0xd5, &(0x7f0000000080)=""/213, 0x61800, 0x0, [], 0x0, 0x16, 0xffffffffffffffff, 0x8, &(0x7f0000000180)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000001c0)={0x2, 0x6, 0x6, 0x5}, 0x10, 0x0, r8}, 0x78) bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x11, 0x5, 0x81, 0x2, 0x100, r5, 0x3, [], 0x0, 0xffffffffffffffff, 0x4, 0x3}, 0x3c) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r9, &(0x7f0000000200), 0x806000) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, r4, 0x0, 0x2a8, &(0x7f0000000440)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\a\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83CZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x98\x86\"R\x06\x00\x00\x00\x00\x00\x00\x00\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&\x014\x01\xf4\xb7\x83\x9a\xfa*\xa6\x06\xb7Pk7N\xc2\xd9\xee\xd0\xb0M\x00\xab\xc3\t\fc\xd8dx\xd5\x1dU*s)\x12[\x14\xb1\xc0\xd7\x1a\xa0\x16\xa2z\x9e\x93 \xddeF>29\v\x02\xa2b\x13R\xef\xffA,\xb9.$\xfa\x9f\xde[\x80\xd1=\xce\x1b\xeb\xf6\xf4\xe3z\x1f\x9dz\xa3\xc0\xe2\xa2\xb1\xeeq\xf5\xec0\x8e\xf4\xfb\xd9\x87\xf03\xdb\xae|\x10&V5c\xa6\xce\xcd\x8a\xdf\xe1\x89\"\xea\xde\xe7\xa3\xbe\xe7\xff\xf9 \x11\xfdY\xc6\xa1\xe8\xda\v\\?\xcb\x87\bn\x9b\x01\x1f\xf8\xe8\x1eV\xfaC\xdf\xc3Vv\x9b\x1a\xfc\x14.c\x94\xc9=\xb0\x0f!d\b\x18*@m\x7f\xaal\x17G\xd6?\x81\x16P\x03\x10e\xc3\xcd\xb1B\xeb\x01B\\\x91A\xa1\x8an\xb4#\xadr\x1e\x81v\xa2\x0e6x\xca\x8b\xa6\xd8\x81\x10:\x0e(\xdd\xfc\xc9\xc6\xb4\xf0\'f:\xbd\xfe\x11\xf8\xc8W\x81s^\xd9W\xf1\x94\xaf\xc5\x8a\xb4f\x1b\x17E\xb23\x12\xb0\xeb\xef\x8c\xb24h\xd7}\x7f\x92Hgej\x957\xe2A'}, 0x30) 03:43:55 executing program 5: openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) ioctl$RNDADDENTROPY(0xffffffffffffffff, 0x40085203, &(0x7f0000000100)={0x6, 0xbc, "56f80f8d7c9ad684157765ee68815e033b7b2972a2d067318db9ac518603e0dbae813e160bd3f15b30c226056579cf64ac2525dd44c15e56204f1e3f1b8c03b31f4281605682d4b39a61b89636b3a2a5ea0bd3f5e8bd40d8c0406969d18fed78e4f4108902b5959ec383c40036f5262e703d6ad6a7a486302c382e45645bfe4c472249b482a28e9519e744cdbe884985d913612a17250eab7e4f0bf4b35aab9f7b923116a8d30baf612ca3bc2ef9b3f8d1c6b570cb60bd8d5b6805ce"}) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_sctp(0x2, 0x5, 0x84) dup3(0xffffffffffffffff, r0, 0x0) socket$inet6_sctp(0xa, 0x0, 0x84) setsockopt$inet_sctp_SCTP_AUTH_DEACTIVATE_KEY(0xffffffffffffffff, 0x84, 0x23, 0x0, 0x0) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f00000000c0)={0x51, 0xfffc, 0x0, {0x103, 0xf1}, {0x9}, @ramp={0x2, 0x3, {0x7fff, 0x0, 0x7, 0x7}}}) r1 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r1, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @bcast, @rose, @rose, @null]}, 0x48) listen(r1, 0x0) unshare(0x40000000) r2 = accept(r1, 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r3, 0xffffffffffffffff) write$binfmt_elf64(r2, &(0x7f00000002c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}], "", [[], []]}, 0x278) 03:43:55 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000280)={0x2, 0x0, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) sendmmsg$inet(r0, &(0x7f0000001100)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000001340)="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", 0x2d9}], 0x1}}], 0x1, 0x0) 03:43:56 executing program 1: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(r0, 0x8982, &(0x7f0000000100)={0x0, 'veth0_to_bridge\x00'}) 03:43:56 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000280)={0x2, 0x0, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) sendmmsg$inet(r0, &(0x7f0000001100)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000001340)="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", 0x2d9}], 0x1}}], 0x1, 0x0) [ 715.146634][T29693] IPVS: ftp: loaded support on port[0] = 21 03:43:56 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x400007) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0x32600) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xb4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000040)='cpuset') write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000700)=ANY=[@ANYBLOB="006d176df3384ed3ddbcf3be0e26fd017529253262b78ee8b9d470"], 0x1b) ioctl$TUNSETCARRIER(0xffffffffffffffff, 0x400454e2, &(0x7f0000000080)=0x1) write$cgroup_int(r0, &(0x7f0000000380), 0x12) write$cgroup_int(r1, &(0x7f0000000400), 0xd) r2 = gettid() write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000000)=r2, 0x12) r3 = socket$kcm(0x2b, 0x0, 0x0) socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r3, 0x0, 0x0) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000280)=r2, 0x12) r4 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) close(r5) write$cgroup_type(r5, &(0x7f0000000080)='threaded\x00', 0xfffffc61) r6 = bpf$MAP_CREATE(0x2, &(0x7f0000009280), 0x3c) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x17, 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB], &(0x7f0000000200)='syzkaller\x00', 0xfa1, 0x0, 0x0, 0x41100, 0x2, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, &(0x7f0000000240), 0x8, 0x10, 0x0}, 0x78) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000008740)={0x0, 0x0, &(0x7f0000008700)=[{0x0}, {&(0x7f0000008680)=""/23, 0x17}, {&(0x7f00000086c0)=""/38, 0x26}], 0x3}, 0x8000) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x6, 0x2, 0x2e15579, 0x3f, 0x1, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffffff, 0x0, 0x5}, 0x3c) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0xb, [], 0x0, 0xc, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r7}, 0x7e) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r8, &(0x7f0000000000)=ANY=[], 0x50c000) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x18, 0x8, &(0x7f0000000a00)=ANY=[@ANYBLOB="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", @ANYRES32=r6, @ANYBLOB="00000000000000000c72c0fff6ffffff850000005b0000009500000000000000"], &(0x7f0000000040)='GPL\x00', 0x3ff, 0xd5, &(0x7f0000000080)=""/213, 0x61800, 0xab6c50112a8dd52c, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000180)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000001c0)={0x2, 0x6, 0x6, 0x5}, 0x10, 0x0, r8}, 0x78) bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x11, 0x5, 0x81, 0x2, 0x100, r5, 0x3, [], 0x0, 0xffffffffffffffff, 0x4, 0x3}, 0x3c) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r9, &(0x7f0000000200), 0x806000) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, r4, 0x0, 0x2a8, &(0x7f0000000440)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\a\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83CZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x98\x86\"R\x06\x00\x00\x00\x00\x00\x00\x00\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&\x014\x01\xf4\xb7\x83\x9a\xfa*\xa6\x06\xb7Pk7N\xc2\xd9\xee\xd0\xb0M\x00\xab\xc3\t\fc\xd8dx\xd5\x1dU*s)\x12[\x14\xb1\xc0\xd7\x1a\xa0\x16\xa2z\x9e\x93 \xddeF>29\v\x02\xa2b\x13R\xef\xffA,\xb9.$\xfa\x9f\xde[\x80\xd1=\xce\x1b\xeb\xf6\xf4\xe3z\x1f\x9dz\xa3\xc0\xe2\xa2\xb1\xeeq\xf5\xec0\x8e\xf4\xfb\xd9\x87\xf03\xdb\xae|\x10&V5c\xa6\xce\xcd\x8a\xdf\xe1\x89\"\xea\xde\xe7\xa3\xbe\xe7\xff\xf9 \x11\xfdY\xc6\xa1\xe8\xda\v\\?\xcb\x87\bn\x9b\x01\x1f\xf8\xe8\x1eV\xfaC\xdf\xc3Vv\x9b\x1a\xfc\x14.c\x94\xc9=\xb0\x0f!d\b\x18*@m\x7f\xaal\x17G\xd6?\x81\x16P\x03\x10e\xc3\xcd\xb1B\xeb\x01B\\\x91A\xa1\x8an\xb4#\xadr\x1e\x81v\xa2\x0e6x\xca\x8b\xa6\xd8\x81\x10:\x0e(\xdd\xfc\xc9\xc6\xb4\xf0\'f:\xbd\xfe\x11\xf8\xc8W\x81s^\xd9W\xf1\x94\xaf\xc5\x8a\xb4f\x1b\x17E\xb23\x12\xb0\xeb\xef\x8c\xb24h\xd7}\x7f\x92Hgej\x957\xe2A'}, 0x30) 03:43:56 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x238) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) writev(r0, &(0x7f0000000540)=[{&(0x7f0000000140)="cedbddea5b67f4290aa7fd7c0cc7e2e613891a59fd3dc2e8a3c6e7c9fa96", 0x1e}, {&(0x7f0000000340)="e4bc7c957b83ba155edae525e00f76c76056ac3fe8a5de5ccfba604ac6b0d4a0fd42802b43143a32d703bd21baddda61ba1cb78758f519c19a06193e8bfc0d1f1fad3be6885359773264bd153a2bf50591662cca307c7a22f8a9e70629a1beac22b823bfee7fec832958c20007e0b8707c6ac0e8b1", 0x75}, {&(0x7f00000004c0)="4b8043af3b13f04c3ee02ee028e584b538cf", 0x12}, {&(0x7f0000000800)="87cfb3bd1ada6e425bdd5aaccdafa6e4ea74", 0x12}], 0x4) sendto$inet(r0, &(0x7f00000012c0)="0c268a927f1f6588b967481241ba7860005cf65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95425a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x27) 03:43:56 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x238) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) writev(r0, &(0x7f0000000540)=[{&(0x7f0000000140)="cedbddea5b67f4290aa7fd7c0cc7e2", 0xf}, {&(0x7f0000000340)="e4bc7c957b83ba155edae525e00f76c76056ac3fe8a5de5ccfba604ac6b0d4a0fd42802b43143a32d703bd21baddda61ba1cb78758f519c19a06193e8bfc0d1f1fad3be6885359773264bd", 0x4b}, {0x0}], 0x3) sendto$inet(r0, &(0x7f00000012c0)="0c268a927f1f6588b967481241ba7860005cf65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95425a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x27) 03:43:56 executing program 1: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(r0, 0x8982, &(0x7f0000000100)={0x0, 'veth0_to_bridge\x00'}) 03:43:56 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000280)={0x2, 0x0, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) sendmmsg$inet(r0, &(0x7f0000001100)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000001340)="492b7b56e7bf1546ba9024d15debc3fdf835944e6359dfc82ad6a44af6174b7048d6774edb2a522c3b5aebed3bba4b546494bbf6043a7a659fa12216b37584d6922636fff14b623e8c3e9fe28800be702458a4e01e63a39ce0913a26da044aa26f457632cfb8104ef5156bc27f3c08d0a0662a69249556e9a7dcc2da9fdefdd1378f5ef60bb2a8ea72a06c11be333049a90b1c46352f3c5409e32849a93d43e39038bd6c1d6e8eab5b135933cc6fc02853cf997defa87b0bdc2eedad7426259c9118c5a885705288956f19cf9fcb5a5e3f772253900b73288028f2135004a304699d8879a3b2570b1c0f7d45bd5a730a2e57413513c2bb12b095d986617eab6020147d6974b75058c7d235a54b139958054e31290acf55b048b3a6a5e7515295ba626378ce82b4ee22cc23bd5b82363bcb7ff225fc556ecfa3b764d8ef16aa66c6b85d546bac428bfd4e23996cc7d4b1f36e08bf5611234fa7ecf93d7835ab9b0302b9371497d4ab867e0d5750a3d047abef4793b4a80055c50797e611556c1e29e825c3980bd81a4b221d44f9abefeea268e98df6310f32755bc5c2fd19e9ab91958074421fbc49a067de17743a2eb60aecee575d892009f653bd7548f24194179f506ad2e30e2910f51231eff390e2e6b28a834ef9c2380df877e8ac1d4649df50e06ec92ad336888ac4d45db52a2dead697ba7b1ebf042cdcc9fa2c8af8e818375fc8dc0689f6d16478be23bee3cc43e5ff224bdbbd089cdbcced85a88a739f8fc81314e362527742ae15b57d200580205ee0000cbf1b47d38ff82eb464b778cd5beffd4d43378e7ebed4a31b3fb7d325b958b9eb9d7c5fc4274ecb863c1edd6fc4ef7f6b58dee0cbbe57293c33a3d098501c91f45fff812bc8036f9b13181d223d23be06d53bb0b0f4d3a05ca9d0b2e4de29fe137077bb6d39d0b97d818115d867dad9586f9c71153e4dc2bb8a0d0436769ed8e6bb9ddadb8eb91cbfdd9efc801ebe106ed8151e61153db150c2e2fa4109740028cdb606", 0x2d9}], 0x1}}], 0x1, 0x0) 03:43:56 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) sendmmsg$inet(r0, &(0x7f0000001100)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000001340)="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", 0x2d9}], 0x1}}], 0x1, 0x0) 03:43:56 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x238) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) writev(r0, &(0x7f0000000540)=[{&(0x7f0000000140)="cedbddea5b67f4290aa7fd7c0cc7e2e613891a59fd3dc2e8a3c6e7c9fa96", 0x1e}, {&(0x7f0000000340)="e4bc7c957b83ba155edae525e00f76c76056ac3fe8a5de5ccfba604ac6b0d4a0fd42802b43143a32d703bd21baddda61ba1cb78758f519c19a06193e8bfc0d1f1fad3be6885359773264bd153a2bf50591662cca307c7a22f8a9e70629a1beac22b823bfee7fec832958c20007e0b8707c6ac0e8b1", 0x75}, {&(0x7f00000004c0)="4b8043af3b13f04c3ee02ee028e584b538cfb06be329d5ca064988", 0x1b}, {&(0x7f0000000800)="87cfb3bd1ada6e425bdd5aaccdafa6e4ea74", 0x12}], 0x4) sendto$inet(r0, &(0x7f00000012c0)="0c268a927f1f6588b967481241ba7860005cf65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95425a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x27) 03:43:56 executing program 1: ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000100)={0x0, 'veth0_to_bridge\x00'}) 03:43:56 executing program 5: openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) ioctl$RNDADDENTROPY(0xffffffffffffffff, 0x40085203, &(0x7f0000000100)={0x6, 0xbc, "56f80f8d7c9ad684157765ee68815e033b7b2972a2d067318db9ac518603e0dbae813e160bd3f15b30c226056579cf64ac2525dd44c15e56204f1e3f1b8c03b31f4281605682d4b39a61b89636b3a2a5ea0bd3f5e8bd40d8c0406969d18fed78e4f4108902b5959ec383c40036f5262e703d6ad6a7a486302c382e45645bfe4c472249b482a28e9519e744cdbe884985d913612a17250eab7e4f0bf4b35aab9f7b923116a8d30baf612ca3bc2ef9b3f8d1c6b570cb60bd8d5b6805ce"}) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_sctp(0x2, 0x5, 0x84) dup3(0xffffffffffffffff, r0, 0x0) socket$inet6_sctp(0xa, 0x0, 0x84) setsockopt$inet_sctp_SCTP_AUTH_DEACTIVATE_KEY(0xffffffffffffffff, 0x84, 0x23, 0x0, 0x0) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f00000000c0)={0x51, 0xfffc, 0x0, {0x103, 0xf1}, {0x9}, @ramp={0x2, 0x3, {0x7fff, 0x0, 0x7, 0x7}}}) r1 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r1, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @bcast, @rose, @rose, @null]}, 0x48) listen(r1, 0x0) unshare(0x40000000) r2 = accept(r1, 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r3, 0xffffffffffffffff) write$binfmt_elf64(r2, &(0x7f00000002c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}], "", [[], []]}, 0x278) 03:43:56 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x400007) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0x32600) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xb4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000040)='cpuset') write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000700)=ANY=[@ANYBLOB="006d176df3384ed3ddbcf3be0e26fd017529253262b78ee8b9d470"], 0x1b) ioctl$TUNSETCARRIER(0xffffffffffffffff, 0x400454e2, &(0x7f0000000080)=0x1) write$cgroup_int(r0, &(0x7f0000000380), 0x12) write$cgroup_int(r1, &(0x7f0000000400), 0xd) r2 = gettid() write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000000)=r2, 0x12) r3 = socket$kcm(0x2b, 0x0, 0x0) socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r3, 0x0, 0x0) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000280)=r2, 0x12) r4 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) close(r5) write$cgroup_type(r5, &(0x7f0000000080)='threaded\x00', 0xfffffc61) r6 = bpf$MAP_CREATE(0x2, &(0x7f0000009280), 0x3c) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x17, 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB], &(0x7f0000000200)='syzkaller\x00', 0xfa1, 0x0, 0x0, 0x41100, 0x2, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, &(0x7f0000000240), 0x8, 0x10, 0x0}, 0x78) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000008740)={0x0, 0x0, &(0x7f0000008700)=[{0x0}, {&(0x7f0000008680)=""/23, 0x17}, {&(0x7f00000086c0)=""/38, 0x26}], 0x3}, 0x8000) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x6, 0x2, 0x2e15579, 0x3f, 0x1, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffffff, 0x0, 0x5}, 0x3c) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0xb, [], 0x0, 0xc, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r7}, 0x7e) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r8, &(0x7f0000000000)=ANY=[], 0x50c000) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x18, 0x8, &(0x7f0000000a00)=ANY=[@ANYBLOB="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", @ANYRES32=r6, @ANYBLOB="00000000000000000c72c0fff6ffffff850000005b0000009500000000000000"], &(0x7f0000000040)='GPL\x00', 0x3ff, 0xd5, &(0x7f0000000080)=""/213, 0x61800, 0xab6c50112a8dd52c, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000180)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000001c0)={0x2, 0x6, 0x6, 0x5}, 0x10, 0x0, r8}, 0x78) bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x11, 0x5, 0x81, 0x2, 0x100, r5, 0x3, [], 0x0, 0xffffffffffffffff, 0x4, 0x3}, 0x3c) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r9, &(0x7f0000000200), 0x806000) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, r4, 0x0, 0x2a8, &(0x7f0000000440)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\a\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83CZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x98\x86\"R\x06\x00\x00\x00\x00\x00\x00\x00\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&\x014\x01\xf4\xb7\x83\x9a\xfa*\xa6\x06\xb7Pk7N\xc2\xd9\xee\xd0\xb0M\x00\xab\xc3\t\fc\xd8dx\xd5\x1dU*s)\x12[\x14\xb1\xc0\xd7\x1a\xa0\x16\xa2z\x9e\x93 \xddeF>29\v\x02\xa2b\x13R\xef\xffA,\xb9.$\xfa\x9f\xde[\x80\xd1=\xce\x1b\xeb\xf6\xf4\xe3z\x1f\x9dz\xa3\xc0\xe2\xa2\xb1\xeeq\xf5\xec0\x8e\xf4\xfb\xd9\x87\xf03\xdb\xae|\x10&V5c\xa6\xce\xcd\x8a\xdf\xe1\x89\"\xea\xde\xe7\xa3\xbe\xe7\xff\xf9 \x11\xfdY\xc6\xa1\xe8\xda\v\\?\xcb\x87\bn\x9b\x01\x1f\xf8\xe8\x1eV\xfaC\xdf\xc3Vv\x9b\x1a\xfc\x14.c\x94\xc9=\xb0\x0f!d\b\x18*@m\x7f\xaal\x17G\xd6?\x81\x16P\x03\x10e\xc3\xcd\xb1B\xeb\x01B\\\x91A\xa1\x8an\xb4#\xadr\x1e\x81v\xa2\x0e6x\xca\x8b\xa6\xd8\x81\x10:\x0e(\xdd\xfc\xc9\xc6\xb4\xf0\'f:\xbd\xfe\x11\xf8\xc8W\x81s^\xd9W\xf1\x94\xaf\xc5\x8a\xb4f\x1b\x17E\xb23\x12\xb0\xeb\xef\x8c\xb24h\xd7}\x7f\x92Hgej\x957\xe2A'}, 0x30) 03:43:56 executing program 1: ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000100)={0x0, 'veth0_to_bridge\x00'}) 03:43:56 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) sendmmsg$inet(r0, &(0x7f0000001100)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000001340)="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", 0x2d9}], 0x1}}], 0x1, 0x0) [ 715.970857][T29735] IPVS: ftp: loaded support on port[0] = 21 03:43:57 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x238) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) writev(r0, &(0x7f0000000540)=[{&(0x7f0000000140)="cedbddea5b67f4290aa7fd7c0cc7e2", 0xf}, {&(0x7f0000000340)="e4bc7c957b83ba155edae525e00f76c76056ac3fe8a5de5ccfba604ac6b0d4a0fd42802b43143a32d703bd21baddda61ba1cb78758f519c19a06193e8bfc0d1f1fad3be6885359773264bd", 0x4b}, {0x0}], 0x3) sendto$inet(r0, &(0x7f00000012c0)="0c268a927f1f6588b967481241ba7860005cf65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95425a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x27) 03:43:57 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) sendmmsg$inet(r0, &(0x7f0000001100)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000001340)="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", 0x2d9}], 0x1}}], 0x1, 0x0) 03:43:57 executing program 1: ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000100)={0x0, 'veth0_to_bridge\x00'}) 03:43:57 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x400007) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0x32600) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xb4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000040)='cpuset') write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000700)=ANY=[@ANYBLOB="006d176df3384ed3ddbcf3be0e26fd017529253262b78ee8b9d470"], 0x1b) ioctl$TUNSETCARRIER(0xffffffffffffffff, 0x400454e2, &(0x7f0000000080)=0x1) write$cgroup_int(r0, &(0x7f0000000380), 0x12) write$cgroup_int(r1, &(0x7f0000000400), 0xd) r2 = gettid() write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000000)=r2, 0x12) r3 = socket$kcm(0x2b, 0x0, 0x0) socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r3, 0x0, 0x0) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000280)=r2, 0x12) r4 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) close(r5) write$cgroup_type(r5, &(0x7f0000000080)='threaded\x00', 0xfffffc61) r6 = bpf$MAP_CREATE(0x2, &(0x7f0000009280), 0x3c) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x17, 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB], &(0x7f0000000200)='syzkaller\x00', 0xfa1, 0x0, 0x0, 0x41100, 0x2, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, &(0x7f0000000240), 0x8, 0x10, 0x0}, 0x78) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000008740)={0x0, 0x0, &(0x7f0000008700)=[{0x0}, {&(0x7f0000008680)=""/23, 0x17}, {&(0x7f00000086c0)=""/38, 0x26}], 0x3}, 0x8000) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x6, 0x2, 0x2e15579, 0x3f, 0x1, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffffff, 0x0, 0x5}, 0x3c) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0xb, [], 0x0, 0xc, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r7}, 0x7e) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r8, &(0x7f0000000000)=ANY=[], 0x50c000) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x18, 0x8, &(0x7f0000000a00)=ANY=[@ANYBLOB="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", @ANYRES32=r6, @ANYBLOB="00000000000000000c72c0fff6ffffff850000005b0000009500000000000000"], &(0x7f0000000040)='GPL\x00', 0x3ff, 0xd5, &(0x7f0000000080)=""/213, 0x61800, 0xab6c50112a8dd52c, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000180)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000001c0)={0x2, 0x6, 0x6, 0x5}, 0x10, 0x0, r8}, 0x78) bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x11, 0x5, 0x81, 0x2, 0x100, r5, 0x3, [], 0x0, 0xffffffffffffffff, 0x4, 0x3}, 0x3c) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r9, &(0x7f0000000200), 0x806000) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, r4, 0x0, 0x2a8, &(0x7f0000000440)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\a\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83CZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x98\x86\"R\x06\x00\x00\x00\x00\x00\x00\x00\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&\x014\x01\xf4\xb7\x83\x9a\xfa*\xa6\x06\xb7Pk7N\xc2\xd9\xee\xd0\xb0M\x00\xab\xc3\t\fc\xd8dx\xd5\x1dU*s)\x12[\x14\xb1\xc0\xd7\x1a\xa0\x16\xa2z\x9e\x93 \xddeF>29\v\x02\xa2b\x13R\xef\xffA,\xb9.$\xfa\x9f\xde[\x80\xd1=\xce\x1b\xeb\xf6\xf4\xe3z\x1f\x9dz\xa3\xc0\xe2\xa2\xb1\xeeq\xf5\xec0\x8e\xf4\xfb\xd9\x87\xf03\xdb\xae|\x10&V5c\xa6\xce\xcd\x8a\xdf\xe1\x89\"\xea\xde\xe7\xa3\xbe\xe7\xff\xf9 \x11\xfdY\xc6\xa1\xe8\xda\v\\?\xcb\x87\bn\x9b\x01\x1f\xf8\xe8\x1eV\xfaC\xdf\xc3Vv\x9b\x1a\xfc\x14.c\x94\xc9=\xb0\x0f!d\b\x18*@m\x7f\xaal\x17G\xd6?\x81\x16P\x03\x10e\xc3\xcd\xb1B\xeb\x01B\\\x91A\xa1\x8an\xb4#\xadr\x1e\x81v\xa2\x0e6x\xca\x8b\xa6\xd8\x81\x10:\x0e(\xdd\xfc\xc9\xc6\xb4\xf0\'f:\xbd\xfe\x11\xf8\xc8W\x81s^\xd9W\xf1\x94\xaf\xc5\x8a\xb4f\x1b\x17E\xb23\x12\xb0\xeb\xef\x8c\xb24h\xd7}\x7f\x92Hgej\x957\xe2A'}, 0x30) 03:43:57 executing program 5: openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) ioctl$RNDADDENTROPY(0xffffffffffffffff, 0x40085203, &(0x7f0000000100)={0x6, 0xbc, "56f80f8d7c9ad684157765ee68815e033b7b2972a2d067318db9ac518603e0dbae813e160bd3f15b30c226056579cf64ac2525dd44c15e56204f1e3f1b8c03b31f4281605682d4b39a61b89636b3a2a5ea0bd3f5e8bd40d8c0406969d18fed78e4f4108902b5959ec383c40036f5262e703d6ad6a7a486302c382e45645bfe4c472249b482a28e9519e744cdbe884985d913612a17250eab7e4f0bf4b35aab9f7b923116a8d30baf612ca3bc2ef9b3f8d1c6b570cb60bd8d5b6805ce"}) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_sctp(0x2, 0x5, 0x84) dup3(0xffffffffffffffff, r0, 0x0) socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp_SCTP_AUTH_DEACTIVATE_KEY(0xffffffffffffffff, 0x84, 0x23, 0x0, 0x0) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, 0x0) r1 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r1, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @bcast, @rose, @rose, @null]}, 0x48) listen(r1, 0x0) unshare(0x40000000) r2 = accept(r1, 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r3, 0xffffffffffffffff) write$binfmt_elf64(r2, &(0x7f00000002c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}], "", [[], []]}, 0x278) 03:43:57 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) sendmmsg$inet(r0, &(0x7f0000001100)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000001340)="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", 0x2d9}], 0x1}}], 0x1, 0x0) 03:43:57 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x238) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) writev(r0, &(0x7f0000000540)=[{&(0x7f0000000140)="cedbddea5b67f4290aa7fd7c0cc7e2e613891a59fd3dc2e8a3c6e7c9fa96", 0x1e}, {&(0x7f0000000340)="e4bc7c957b83ba155edae525e00f76c76056ac3fe8a5de5ccfba604ac6b0d4a0fd42802b43143a32d703bd21baddda61ba1cb78758f519c19a06193e8bfc0d1f1fad3be6885359773264bd153a2bf50591662cca307c7a22f8a9e70629a1beac22b823bfee7fec832958c20007e0b8707c6ac0e8b1", 0x75}, {&(0x7f00000004c0)="4b8043af3b13f04c3ee02ee028e584b538cfb06be329d5ca064988", 0x1b}, {&(0x7f0000000800)="87cfb3bd1ada6e425bdd5aaccdafa6e4ea74", 0x12}], 0x4) sendto$inet(r0, &(0x7f00000012c0)="0c268a927f1f6588b967481241ba7860005cf65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95425a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x27) 03:43:57 executing program 1: socketpair$nbd(0x1, 0x1, 0x0, 0x0) ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000100)={0x0, 'veth0_to_bridge\x00'}) [ 716.636801][T29759] IPVS: ftp: loaded support on port[0] = 21 03:43:57 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x238) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) writev(r0, &(0x7f0000000540)=[{&(0x7f0000000140)="cedbddea5b67f4290aa7fd7c0cc7e2e613891a59fd3dc2", 0x17}, {&(0x7f0000000340)="e4bc7c957b83ba155edae525e00f76c76056ac3fe8a5de5ccfba604ac6b0d4a0fd42802b43143a32d703bd21baddda61ba1cb78758f519c19a06193e8bfc0d1f1fad3be6885359773264bd", 0x4b}, {0x0}], 0x3) sendto$inet(r0, &(0x7f00000012c0)="0c268a927f1f6588b967481241ba7860005cf65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95425a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x27) 03:43:57 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) sendmmsg$inet(r0, &(0x7f0000001100)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000001340)="492b7b56e7bf1546ba9024d15debc3fdf835944e6359dfc82ad6a44af6174b7048d6774edb2a522c3b5aebed3bba4b546494bbf6043a7a659fa12216b37584d6922636fff14b623e8c3e9fe28800be702458a4e01e63a39ce0913a26da044aa26f457632cfb8104ef5156bc27f3c08d0a0662a69249556e9a7dcc2da9fdefdd1378f5ef60bb2a8ea72a06c11be333049a90b1c46352f3c5409e32849a93d43e39038bd6c1d6e8eab5b135933cc6fc02853cf997defa87b0bdc2eedad7426259c9118c5a885705288956f19cf9fcb5a5e3f772253900b73288028f2135004a304699d8879a3b2570b1c0f7d45bd5a730a2e57413513c2bb12b095d986617eab6020147d6974b75058c7d235a54b139958054e31290acf55b048b3a6a5e7515295ba626378ce82b4ee22cc23bd5b82363bcb7ff225fc556ecfa3b764d8ef16aa66c6b85d546bac428bfd4e23996cc7d4b1f36e08bf5611234fa7ecf93d7835ab9b0302b9371497d4ab867e0d5750a3d047abef4793b4a80055c50797e611556c1e29e825c3980bd81a4b221d44f9abefeea268e98df6310f32755bc5c2fd19e9ab91958074421fbc49a067de17743a2eb60aecee575d892009f653bd7548f24194179f506ad2e30e2910f51231eff390e2e6b28a834ef9c2380df877e8ac1d4649df50e06ec92ad336888ac4d45db52a2dead697ba7b1ebf042cdcc9fa2c8af8e818375fc8dc0689f6d16478be23bee3cc43e5ff224bdbbd089cdbcced85a88a739f8fc81314e362527742ae15b57d200580205ee0000cbf1b47d38ff82eb464b778cd5beffd4d43378e7ebed4a31b3fb7d325b958b9eb9d7c5fc4274ecb863c1edd6fc4ef7f6b58dee0cbbe57293c33a3d098501c91f45fff812bc8036f9b13181d223d23be06d53bb0b0f4d3a05ca9d0b2e4de29fe137077bb6d39d0b97d818115d867dad9586f9c71153e4dc2bb8a0d0436769ed8e6bb9ddadb8eb91cbfdd9efc801ebe106ed8151e61153db150c2e2fa4109740028cdb606", 0x2d9}], 0x1}}], 0x1, 0x0) 03:43:57 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x400007) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0x32600) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xb4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000040)='cpuset') write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000700)=ANY=[@ANYBLOB="006d176df3384ed3ddbcf3be0e26fd017529253262b78ee8b9d470"], 0x1b) ioctl$TUNSETCARRIER(0xffffffffffffffff, 0x400454e2, &(0x7f0000000080)=0x1) write$cgroup_int(r0, &(0x7f0000000380), 0x12) write$cgroup_int(r1, &(0x7f0000000400), 0xd) r2 = gettid() write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000000)=r2, 0x12) r3 = socket$kcm(0x2b, 0x0, 0x0) socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r3, 0x0, 0x0) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000280)=r2, 0x12) r4 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) close(r5) write$cgroup_type(r5, &(0x7f0000000080)='threaded\x00', 0xfffffc61) r6 = bpf$MAP_CREATE(0x2, &(0x7f0000009280), 0x3c) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x17, 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB], &(0x7f0000000200)='syzkaller\x00', 0xfa1, 0x0, 0x0, 0x41100, 0x2, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, &(0x7f0000000240), 0x8, 0x10, 0x0}, 0x78) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000008740)={0x0, 0x0, &(0x7f0000008700)=[{0x0}, {&(0x7f0000008680)=""/23, 0x17}, {&(0x7f00000086c0)=""/38, 0x26}], 0x3}, 0x8000) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x6, 0x2, 0x2e15579, 0x3f, 0x1, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffffff, 0x0, 0x5}, 0x3c) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0xb, [], 0x0, 0xc, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r7}, 0x7e) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r8, &(0x7f0000000000)=ANY=[], 0x50c000) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x18, 0x49, &(0x7f0000000a00)=ANY=[@ANYBLOB="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", @ANYRES32=r6, @ANYBLOB="00000000000000000c72c0fff6ffffff850000005b0000009500000000000000"], &(0x7f0000000040)='GPL\x00', 0x3ff, 0xd5, &(0x7f0000000080)=""/213, 0x61800, 0xab6c50112a8dd52c, [], 0x0, 0x16, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000001c0)={0x2, 0x6, 0x6, 0x5}, 0x10, 0x0, r8}, 0x78) bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x11, 0x5, 0x81, 0x2, 0x100, r5, 0x3, [], 0x0, 0xffffffffffffffff, 0x4, 0x3}, 0x3c) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r9, &(0x7f0000000200), 0x806000) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, r4, 0x0, 0x2a8, &(0x7f0000000440)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\a\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83CZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x98\x86\"R\x06\x00\x00\x00\x00\x00\x00\x00\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&\x014\x01\xf4\xb7\x83\x9a\xfa*\xa6\x06\xb7Pk7N\xc2\xd9\xee\xd0\xb0M\x00\xab\xc3\t\fc\xd8dx\xd5\x1dU*s)\x12[\x14\xb1\xc0\xd7\x1a\xa0\x16\xa2z\x9e\x93 \xddeF>29\v\x02\xa2b\x13R\xef\xffA,\xb9.$\xfa\x9f\xde[\x80\xd1=\xce\x1b\xeb\xf6\xf4\xe3z\x1f\x9dz\xa3\xc0\xe2\xa2\xb1\xeeq\xf5\xec0\x8e\xf4\xfb\xd9\x87\xf03\xdb\xae|\x10&V5c\xa6\xce\xcd\x8a\xdf\xe1\x89\"\xea\xde\xe7\xa3\xbe\xe7\xff\xf9 \x11\xfdY\xc6\xa1\xe8\xda\v\\?\xcb\x87\bn\x9b\x01\x1f\xf8\xe8\x1eV\xfaC\xdf\xc3Vv\x9b\x1a\xfc\x14.c\x94\xc9=\xb0\x0f!d\b\x18*@m\x7f\xaal\x17G\xd6?\x81\x16P\x03\x10e\xc3\xcd\xb1B\xeb\x01B\\\x91A\xa1\x8an\xb4#\xadr\x1e\x81v\xa2\x0e6x\xca\x8b\xa6\xd8\x81\x10:\x0e(\xdd\xfc\xc9\xc6\xb4\xf0\'f:\xbd\xfe\x11\xf8\xc8W\x81s^\xd9W\xf1\x94\xaf\xc5\x8a\xb4f\x1b\x17E\xb23\x12\xb0\xeb\xef\x8c\xb24h\xd7}\x7f\x92Hgej\x957\xe2A'}, 0x30) 03:43:57 executing program 1: socketpair$nbd(0x1, 0x1, 0x0, 0x0) ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000100)={0x0, 'veth0_to_bridge\x00'}) 03:43:58 executing program 5: openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) ioctl$RNDADDENTROPY(0xffffffffffffffff, 0x40085203, &(0x7f0000000100)={0x6, 0xbc, "56f80f8d7c9ad684157765ee68815e033b7b2972a2d067318db9ac518603e0dbae813e160bd3f15b30c226056579cf64ac2525dd44c15e56204f1e3f1b8c03b31f4281605682d4b39a61b89636b3a2a5ea0bd3f5e8bd40d8c0406969d18fed78e4f4108902b5959ec383c40036f5262e703d6ad6a7a486302c382e45645bfe4c472249b482a28e9519e744cdbe884985d913612a17250eab7e4f0bf4b35aab9f7b923116a8d30baf612ca3bc2ef9b3f8d1c6b570cb60bd8d5b6805ce"}) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_sctp(0x2, 0x5, 0x84) dup3(0xffffffffffffffff, r0, 0x0) socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp_SCTP_AUTH_DEACTIVATE_KEY(0xffffffffffffffff, 0x84, 0x23, 0x0, 0x0) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, 0x0) r1 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r1, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @bcast, @rose, @rose, @null]}, 0x48) listen(r1, 0x0) unshare(0x40000000) r2 = accept(r1, 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r3, 0xffffffffffffffff) write$binfmt_elf64(r2, &(0x7f00000002c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}], "", [[], []]}, 0x278) 03:43:58 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) sendmmsg$inet(r0, &(0x7f0000001100)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000001340)="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", 0x2d9}], 0x1}}], 0x1, 0x0) 03:43:58 executing program 1: socketpair$nbd(0x1, 0x1, 0x0, 0x0) ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000100)={0x0, 'veth0_to_bridge\x00'}) [ 717.289006][T29791] IPVS: ftp: loaded support on port[0] = 21 03:43:58 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x238) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) writev(r0, &(0x7f0000000540)=[{&(0x7f0000000140)="cedbddea5b67f4290aa7fd7c0cc7e2e613891a59fd3dc2e8a3c6e7c9fa96", 0x1e}, {&(0x7f0000000340)="e4bc7c957b83ba155edae525e00f76c76056ac3fe8a5de5ccfba604ac6b0d4a0fd42802b43143a32d703bd21baddda61ba1cb78758f519c19a06193e8bfc0d1f1fad3be6885359773264bd153a2bf50591662cca307c7a22f8a9e70629a1beac22b823bfee7fec832958c20007e0b8707c6ac0e8b1", 0x75}, {&(0x7f00000004c0)="4b8043af3b13f04c3ee02ee028e584b538cfb06be329d5ca064988", 0x1b}, {&(0x7f0000000800)="87cfb3bd1ada6e425bdd5aaccdafa6e4ea74", 0x12}], 0x4) sendto$inet(r0, &(0x7f00000012c0)="0c268a927f1f6588b967481241ba7860005cf65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95425a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x27) 03:43:58 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, 0x0, 0x0) sendmmsg$inet(r0, &(0x7f0000001100)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000001340)="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", 0x2d9}], 0x1}}], 0x1, 0x0) 03:43:58 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x238) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) writev(r0, &(0x7f0000000540)=[{&(0x7f0000000140)="cedbddea5b67f4290aa7fd7c0cc7e2e613891a59fd3dc2", 0x17}, {&(0x7f0000000340)="e4bc7c957b83ba155edae525e00f76c76056ac3fe8a5de5ccfba604ac6b0d4a0fd42802b43143a32d703bd21baddda61ba1cb78758f519c19a06193e8bfc0d1f1fad3be6885359773264bd", 0x4b}, {0x0}], 0x3) sendto$inet(r0, &(0x7f00000012c0)="0c268a927f1f6588b967481241ba7860005cf65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95425a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x27) 03:43:58 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x400007) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0x32600) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xb4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000040)='cpuset') write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000700)=ANY=[@ANYBLOB="006d176df3384ed3ddbcf3be0e26fd017529253262b78ee8b9d470"], 0x1b) ioctl$TUNSETCARRIER(0xffffffffffffffff, 0x400454e2, &(0x7f0000000080)=0x1) write$cgroup_int(r0, &(0x7f0000000380), 0x12) write$cgroup_int(r1, &(0x7f0000000400), 0xd) r2 = gettid() write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000000)=r2, 0x12) r3 = socket$kcm(0x2b, 0x0, 0x0) socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r3, 0x0, 0x0) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000280)=r2, 0x12) r4 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) close(r5) write$cgroup_type(r5, &(0x7f0000000080)='threaded\x00', 0xfffffc61) r6 = bpf$MAP_CREATE(0x2, &(0x7f0000009280), 0x3c) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x17, 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB], &(0x7f0000000200)='syzkaller\x00', 0xfa1, 0x0, 0x0, 0x41100, 0x2, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, &(0x7f0000000240), 0x8, 0x10, 0x0}, 0x78) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000008740)={0x0, 0x0, &(0x7f0000008700)=[{0x0}, {&(0x7f0000008680)=""/23, 0x17}, {&(0x7f00000086c0)=""/38, 0x26}], 0x3}, 0x8000) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x6, 0x2, 0x2e15579, 0x3f, 0x1, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffffff, 0x0, 0x5}, 0x3c) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0xb, [], 0x0, 0xc, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r7}, 0x7e) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r8, &(0x7f0000000000)=ANY=[], 0x50c000) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x18, 0x49, &(0x7f0000000a00)=ANY=[@ANYBLOB="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", @ANYRES32=r6, @ANYBLOB="00000000000000000c72c0fff6ffffff850000005b0000009500000000000000"], &(0x7f0000000040)='GPL\x00', 0x3ff, 0xd5, &(0x7f0000000080)=""/213, 0x61800, 0xab6c50112a8dd52c, [], 0x0, 0x16, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000001c0)={0x2, 0x6, 0x6, 0x5}, 0x10, 0x0, r8}, 0x78) bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x11, 0x5, 0x81, 0x2, 0x100, r5, 0x3, [], 0x0, 0xffffffffffffffff, 0x4, 0x3}, 0x3c) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r9, &(0x7f0000000200), 0x806000) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, r4, 0x0, 0x2a8, &(0x7f0000000440)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\a\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83CZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x98\x86\"R\x06\x00\x00\x00\x00\x00\x00\x00\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&\x014\x01\xf4\xb7\x83\x9a\xfa*\xa6\x06\xb7Pk7N\xc2\xd9\xee\xd0\xb0M\x00\xab\xc3\t\fc\xd8dx\xd5\x1dU*s)\x12[\x14\xb1\xc0\xd7\x1a\xa0\x16\xa2z\x9e\x93 \xddeF>29\v\x02\xa2b\x13R\xef\xffA,\xb9.$\xfa\x9f\xde[\x80\xd1=\xce\x1b\xeb\xf6\xf4\xe3z\x1f\x9dz\xa3\xc0\xe2\xa2\xb1\xeeq\xf5\xec0\x8e\xf4\xfb\xd9\x87\xf03\xdb\xae|\x10&V5c\xa6\xce\xcd\x8a\xdf\xe1\x89\"\xea\xde\xe7\xa3\xbe\xe7\xff\xf9 \x11\xfdY\xc6\xa1\xe8\xda\v\\?\xcb\x87\bn\x9b\x01\x1f\xf8\xe8\x1eV\xfaC\xdf\xc3Vv\x9b\x1a\xfc\x14.c\x94\xc9=\xb0\x0f!d\b\x18*@m\x7f\xaal\x17G\xd6?\x81\x16P\x03\x10e\xc3\xcd\xb1B\xeb\x01B\\\x91A\xa1\x8an\xb4#\xadr\x1e\x81v\xa2\x0e6x\xca\x8b\xa6\xd8\x81\x10:\x0e(\xdd\xfc\xc9\xc6\xb4\xf0\'f:\xbd\xfe\x11\xf8\xc8W\x81s^\xd9W\xf1\x94\xaf\xc5\x8a\xb4f\x1b\x17E\xb23\x12\xb0\xeb\xef\x8c\xb24h\xd7}\x7f\x92Hgej\x957\xe2A'}, 0x30) 03:43:58 executing program 1: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)) ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000100)={0x0, 'veth0_to_bridge\x00'}) 03:43:58 executing program 5: openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) ioctl$RNDADDENTROPY(0xffffffffffffffff, 0x40085203, &(0x7f0000000100)={0x6, 0xbc, "56f80f8d7c9ad684157765ee68815e033b7b2972a2d067318db9ac518603e0dbae813e160bd3f15b30c226056579cf64ac2525dd44c15e56204f1e3f1b8c03b31f4281605682d4b39a61b89636b3a2a5ea0bd3f5e8bd40d8c0406969d18fed78e4f4108902b5959ec383c40036f5262e703d6ad6a7a486302c382e45645bfe4c472249b482a28e9519e744cdbe884985d913612a17250eab7e4f0bf4b35aab9f7b923116a8d30baf612ca3bc2ef9b3f8d1c6b570cb60bd8d5b6805ce"}) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_sctp(0x2, 0x5, 0x84) dup3(0xffffffffffffffff, r0, 0x0) socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp_SCTP_AUTH_DEACTIVATE_KEY(0xffffffffffffffff, 0x84, 0x23, 0x0, 0x0) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, 0x0) r1 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r1, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @bcast, @rose, @rose, @null]}, 0x48) listen(r1, 0x0) unshare(0x40000000) r2 = accept(r1, 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r3, 0xffffffffffffffff) write$binfmt_elf64(r2, &(0x7f00000002c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}], "", [[], []]}, 0x278) 03:43:58 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, 0x0, 0x0) sendmmsg$inet(r0, &(0x7f0000001100)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000001340)="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", 0x2d9}], 0x1}}], 0x1, 0x0) 03:43:58 executing program 1: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)) ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000100)={0x0, 'veth0_to_bridge\x00'}) [ 717.888075][T29821] IPVS: ftp: loaded support on port[0] = 21 03:43:59 executing program 1: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)) ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000100)={0x0, 'veth0_to_bridge\x00'}) 03:43:59 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, 0x0, 0x0) sendmmsg$inet(r0, &(0x7f0000001100)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000001340)="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", 0x2d9}], 0x1}}], 0x1, 0x0) 03:43:59 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x400007) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0x32600) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xb4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000040)='cpuset') write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000700)=ANY=[@ANYBLOB="006d176df3384ed3ddbcf3be0e26fd017529253262b78ee8b9d470"], 0x1b) ioctl$TUNSETCARRIER(0xffffffffffffffff, 0x400454e2, &(0x7f0000000080)=0x1) write$cgroup_int(r0, &(0x7f0000000380), 0x12) write$cgroup_int(r1, &(0x7f0000000400), 0xd) r2 = gettid() write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000000)=r2, 0x12) r3 = socket$kcm(0x2b, 0x0, 0x0) socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r3, 0x0, 0x0) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000280)=r2, 0x12) r4 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) close(r5) write$cgroup_type(r5, &(0x7f0000000080)='threaded\x00', 0xfffffc61) r6 = bpf$MAP_CREATE(0x2, &(0x7f0000009280), 0x3c) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x17, 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB], &(0x7f0000000200)='syzkaller\x00', 0xfa1, 0x0, 0x0, 0x41100, 0x2, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, &(0x7f0000000240), 0x8, 0x10, 0x0}, 0x78) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000008740)={0x0, 0x0, &(0x7f0000008700)=[{0x0}, {&(0x7f0000008680)=""/23, 0x17}, {&(0x7f00000086c0)=""/38, 0x26}], 0x3}, 0x8000) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x6, 0x2, 0x2e15579, 0x3f, 0x1, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffffff, 0x0, 0x5}, 0x3c) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0xb, [], 0x0, 0xc, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r7}, 0x7e) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r8, &(0x7f0000000000)=ANY=[], 0x50c000) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x18, 0x49, &(0x7f0000000a00)=ANY=[@ANYBLOB="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", @ANYRES32=r6, @ANYBLOB="00000000000000000c72c0fff6ffffff850000005b0000009500000000000000"], &(0x7f0000000040)='GPL\x00', 0x3ff, 0xd5, &(0x7f0000000080)=""/213, 0x61800, 0xab6c50112a8dd52c, [], 0x0, 0x16, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000001c0)={0x2, 0x6, 0x6, 0x5}, 0x10, 0x0, r8}, 0x78) bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x11, 0x5, 0x81, 0x2, 0x100, r5, 0x3, [], 0x0, 0xffffffffffffffff, 0x4, 0x3}, 0x3c) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r9, &(0x7f0000000200), 0x806000) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, r4, 0x0, 0x2a8, &(0x7f0000000440)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\a\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83CZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x98\x86\"R\x06\x00\x00\x00\x00\x00\x00\x00\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&\x014\x01\xf4\xb7\x83\x9a\xfa*\xa6\x06\xb7Pk7N\xc2\xd9\xee\xd0\xb0M\x00\xab\xc3\t\fc\xd8dx\xd5\x1dU*s)\x12[\x14\xb1\xc0\xd7\x1a\xa0\x16\xa2z\x9e\x93 \xddeF>29\v\x02\xa2b\x13R\xef\xffA,\xb9.$\xfa\x9f\xde[\x80\xd1=\xce\x1b\xeb\xf6\xf4\xe3z\x1f\x9dz\xa3\xc0\xe2\xa2\xb1\xeeq\xf5\xec0\x8e\xf4\xfb\xd9\x87\xf03\xdb\xae|\x10&V5c\xa6\xce\xcd\x8a\xdf\xe1\x89\"\xea\xde\xe7\xa3\xbe\xe7\xff\xf9 \x11\xfdY\xc6\xa1\xe8\xda\v\\?\xcb\x87\bn\x9b\x01\x1f\xf8\xe8\x1eV\xfaC\xdf\xc3Vv\x9b\x1a\xfc\x14.c\x94\xc9=\xb0\x0f!d\b\x18*@m\x7f\xaal\x17G\xd6?\x81\x16P\x03\x10e\xc3\xcd\xb1B\xeb\x01B\\\x91A\xa1\x8an\xb4#\xadr\x1e\x81v\xa2\x0e6x\xca\x8b\xa6\xd8\x81\x10:\x0e(\xdd\xfc\xc9\xc6\xb4\xf0\'f:\xbd\xfe\x11\xf8\xc8W\x81s^\xd9W\xf1\x94\xaf\xc5\x8a\xb4f\x1b\x17E\xb23\x12\xb0\xeb\xef\x8c\xb24h\xd7}\x7f\x92Hgej\x957\xe2A'}, 0x30) 03:43:59 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x238) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) writev(r0, &(0x7f0000000540)=[{&(0x7f0000000140)="cedbddea5b67f4290aa7fd7c0cc7e2e613891a59fd3dc2e8a3c6e7c9fa96", 0x1e}, {&(0x7f0000000340)="e4bc7c957b83ba155edae525e00f76c76056ac3fe8a5de5ccfba604ac6b0d4a0fd42802b43143a32d703bd21baddda61ba1cb78758f519c19a06193e8bfc0d1f1fad3be6885359773264bd153a2bf50591662cca307c7a22f8a9e70629a1beac22b823bfee7fec832958c20007e0b8707c6ac0e8b1", 0x75}, {&(0x7f00000004c0)="4b8043af3b13f04c3ee02ee028e584b538cfb06be329d5ca0649880187b5cd5f", 0x20}, {&(0x7f0000000800)="87cfb3bd1ada6e425bdd5aaccdafa6e4ea74", 0x12}], 0x4) sendto$inet(r0, &(0x7f00000012c0)="0c268a927f1f6588b967481241ba7860005cf65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95425a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x27) 03:43:59 executing program 5: openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) ioctl$RNDADDENTROPY(0xffffffffffffffff, 0x40085203, &(0x7f0000000100)={0x6, 0xbc, "56f80f8d7c9ad684157765ee68815e033b7b2972a2d067318db9ac518603e0dbae813e160bd3f15b30c226056579cf64ac2525dd44c15e56204f1e3f1b8c03b31f4281605682d4b39a61b89636b3a2a5ea0bd3f5e8bd40d8c0406969d18fed78e4f4108902b5959ec383c40036f5262e703d6ad6a7a486302c382e45645bfe4c472249b482a28e9519e744cdbe884985d913612a17250eab7e4f0bf4b35aab9f7b923116a8d30baf612ca3bc2ef9b3f8d1c6b570cb60bd8d5b6805ce"}) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_sctp(0x2, 0x5, 0x84) dup3(0xffffffffffffffff, r0, 0x0) socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp_SCTP_AUTH_DEACTIVATE_KEY(0xffffffffffffffff, 0x84, 0x23, 0x0, 0x0) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f00000000c0)={0x0, 0xfffc, 0x0, {0x103, 0xf1}, {0x9}, @ramp={0x2, 0x3, {0x7fff, 0x0, 0x7, 0x7}}}) r1 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r1, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @bcast, @rose, @rose, @null]}, 0x48) listen(r1, 0x0) unshare(0x40000000) r2 = accept(r1, 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r3, 0xffffffffffffffff) write$binfmt_elf64(r2, &(0x7f00000002c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}], "", [[], []]}, 0x278) 03:43:59 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x238) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) writev(r0, &(0x7f0000000540)=[{&(0x7f0000000140)="cedbddea5b67f4290aa7fd7c0cc7e2e613891a59fd3dc2", 0x17}, {&(0x7f0000000340)="e4bc7c957b83ba155edae525e00f76c76056ac3fe8a5de5ccfba604ac6b0d4a0fd42802b43143a32d703bd21baddda61ba1cb78758f519c19a06193e8bfc0d1f1fad3be6885359773264bd", 0x4b}, {0x0}], 0x3) sendto$inet(r0, &(0x7f00000012c0)="0c268a927f1f6588b967481241ba7860005cf65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95425a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x27) 03:43:59 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x0, @local}, 0x10) sendmmsg$inet(r0, &(0x7f0000001100)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000001340)="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", 0x2d9}], 0x1}}], 0x1, 0x0) 03:43:59 executing program 1: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(r0, 0x8982, 0x0) 03:43:59 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x400007) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0x32600) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xb4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000040)='cpuset') write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000700)=ANY=[@ANYBLOB="006d176df3384ed3ddbcf3be0e26fd017529253262b78ee8b9d470"], 0x1b) ioctl$TUNSETCARRIER(0xffffffffffffffff, 0x400454e2, &(0x7f0000000080)=0x1) write$cgroup_int(r0, &(0x7f0000000380), 0x12) write$cgroup_int(r1, &(0x7f0000000400), 0xd) r2 = gettid() write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000000)=r2, 0x12) r3 = socket$kcm(0x2b, 0x0, 0x0) socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r3, 0x0, 0x0) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000280)=r2, 0x12) r4 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) close(r5) write$cgroup_type(r5, &(0x7f0000000080)='threaded\x00', 0xfffffc61) r6 = bpf$MAP_CREATE(0x2, &(0x7f0000009280), 0x3c) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x17, 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB], &(0x7f0000000200)='syzkaller\x00', 0xfa1, 0x0, 0x0, 0x41100, 0x2, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, &(0x7f0000000240), 0x8, 0x10, 0x0}, 0x78) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000008740)={0x0, 0x0, &(0x7f0000008700)=[{0x0}, {&(0x7f0000008680)=""/23, 0x17}, {&(0x7f00000086c0)=""/38, 0x26}], 0x3}, 0x8000) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x6, 0x2, 0x2e15579, 0x3f, 0x1, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffffff, 0x0, 0x5}, 0x3c) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0xb, [], 0x0, 0xc, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r7}, 0x7e) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r8, &(0x7f0000000000)=ANY=[], 0x50c000) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x18, 0x8, &(0x7f0000000a00)=ANY=[@ANYBLOB="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", @ANYRES32=r6, @ANYBLOB="00000000000000000c72c0fff6ffffff850000005b0000009500000000000000"], &(0x7f0000000040)='GPL\x00', 0x3ff, 0xd5, &(0x7f0000000080)=""/213, 0x61800, 0xab6c50112a8dd52c, [], 0x0, 0x16, 0xffffffffffffffff, 0x8, &(0x7f0000000180)={0x0, 0x1}, 0x8, 0x10, &(0x7f00000001c0)={0x2, 0x6, 0x6, 0x5}, 0x10, 0x0, r8}, 0x78) bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x11, 0x5, 0x81, 0x2, 0x100, r5, 0x3, [], 0x0, 0xffffffffffffffff, 0x4, 0x3}, 0x3c) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r9, &(0x7f0000000200), 0x806000) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, r4, 0x0, 0x2a8, &(0x7f0000000440)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\a\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83CZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x98\x86\"R\x06\x00\x00\x00\x00\x00\x00\x00\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&\x014\x01\xf4\xb7\x83\x9a\xfa*\xa6\x06\xb7Pk7N\xc2\xd9\xee\xd0\xb0M\x00\xab\xc3\t\fc\xd8dx\xd5\x1dU*s)\x12[\x14\xb1\xc0\xd7\x1a\xa0\x16\xa2z\x9e\x93 \xddeF>29\v\x02\xa2b\x13R\xef\xffA,\xb9.$\xfa\x9f\xde[\x80\xd1=\xce\x1b\xeb\xf6\xf4\xe3z\x1f\x9dz\xa3\xc0\xe2\xa2\xb1\xeeq\xf5\xec0\x8e\xf4\xfb\xd9\x87\xf03\xdb\xae|\x10&V5c\xa6\xce\xcd\x8a\xdf\xe1\x89\"\xea\xde\xe7\xa3\xbe\xe7\xff\xf9 \x11\xfdY\xc6\xa1\xe8\xda\v\\?\xcb\x87\bn\x9b\x01\x1f\xf8\xe8\x1eV\xfaC\xdf\xc3Vv\x9b\x1a\xfc\x14.c\x94\xc9=\xb0\x0f!d\b\x18*@m\x7f\xaal\x17G\xd6?\x81\x16P\x03\x10e\xc3\xcd\xb1B\xeb\x01B\\\x91A\xa1\x8an\xb4#\xadr\x1e\x81v\xa2\x0e6x\xca\x8b\xa6\xd8\x81\x10:\x0e(\xdd\xfc\xc9\xc6\xb4\xf0\'f:\xbd\xfe\x11\xf8\xc8W\x81s^\xd9W\xf1\x94\xaf\xc5\x8a\xb4f\x1b\x17E\xb23\x12\xb0\xeb\xef\x8c\xb24h\xd7}\x7f\x92Hgej\x957\xe2A'}, 0x30) [ 718.571026][T29851] IPVS: ftp: loaded support on port[0] = 21 03:43:59 executing program 1: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(r0, 0x8982, 0x0) 03:43:59 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x0, @local}, 0x10) sendmmsg$inet(r0, &(0x7f0000001100)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000001340)="492b7b56e7bf1546ba9024d15debc3fdf835944e6359dfc82ad6a44af6174b7048d6774edb2a522c3b5aebed3bba4b546494bbf6043a7a659fa12216b37584d6922636fff14b623e8c3e9fe28800be702458a4e01e63a39ce0913a26da044aa26f457632cfb8104ef5156bc27f3c08d0a0662a69249556e9a7dcc2da9fdefdd1378f5ef60bb2a8ea72a06c11be333049a90b1c46352f3c5409e32849a93d43e39038bd6c1d6e8eab5b135933cc6fc02853cf997defa87b0bdc2eedad7426259c9118c5a885705288956f19cf9fcb5a5e3f772253900b73288028f2135004a304699d8879a3b2570b1c0f7d45bd5a730a2e57413513c2bb12b095d986617eab6020147d6974b75058c7d235a54b139958054e31290acf55b048b3a6a5e7515295ba626378ce82b4ee22cc23bd5b82363bcb7ff225fc556ecfa3b764d8ef16aa66c6b85d546bac428bfd4e23996cc7d4b1f36e08bf5611234fa7ecf93d7835ab9b0302b9371497d4ab867e0d5750a3d047abef4793b4a80055c50797e611556c1e29e825c3980bd81a4b221d44f9abefeea268e98df6310f32755bc5c2fd19e9ab91958074421fbc49a067de17743a2eb60aecee575d892009f653bd7548f24194179f506ad2e30e2910f51231eff390e2e6b28a834ef9c2380df877e8ac1d4649df50e06ec92ad336888ac4d45db52a2dead697ba7b1ebf042cdcc9fa2c8af8e818375fc8dc0689f6d16478be23bee3cc43e5ff224bdbbd089cdbcced85a88a739f8fc81314e362527742ae15b57d200580205ee0000cbf1b47d38ff82eb464b778cd5beffd4d43378e7ebed4a31b3fb7d325b958b9eb9d7c5fc4274ecb863c1edd6fc4ef7f6b58dee0cbbe57293c33a3d098501c91f45fff812bc8036f9b13181d223d23be06d53bb0b0f4d3a05ca9d0b2e4de29fe137077bb6d39d0b97d818115d867dad9586f9c71153e4dc2bb8a0d0436769ed8e6bb9ddadb8eb91cbfdd9efc801ebe106ed8151e61153db150c2e2fa4109740028cdb606", 0x2d9}], 0x1}}], 0x1, 0x0) 03:43:59 executing program 1: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(r0, 0x8982, 0x0) 03:43:59 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x0, @local}, 0x10) sendmmsg$inet(r0, &(0x7f0000001100)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000001340)="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", 0x2d9}], 0x1}}], 0x1, 0x0) 03:43:59 executing program 5: openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) ioctl$RNDADDENTROPY(0xffffffffffffffff, 0x40085203, &(0x7f0000000100)={0x6, 0xbc, "56f80f8d7c9ad684157765ee68815e033b7b2972a2d067318db9ac518603e0dbae813e160bd3f15b30c226056579cf64ac2525dd44c15e56204f1e3f1b8c03b31f4281605682d4b39a61b89636b3a2a5ea0bd3f5e8bd40d8c0406969d18fed78e4f4108902b5959ec383c40036f5262e703d6ad6a7a486302c382e45645bfe4c472249b482a28e9519e744cdbe884985d913612a17250eab7e4f0bf4b35aab9f7b923116a8d30baf612ca3bc2ef9b3f8d1c6b570cb60bd8d5b6805ce"}) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_sctp(0x2, 0x5, 0x84) dup3(0xffffffffffffffff, r0, 0x0) socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp_SCTP_AUTH_DEACTIVATE_KEY(0xffffffffffffffff, 0x84, 0x23, 0x0, 0x0) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f00000000c0)={0x0, 0xfffc, 0x0, {0x103, 0xf1}, {0x9}, @ramp={0x2, 0x3, {0x7fff, 0x0, 0x7, 0x7}}}) r1 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r1, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @bcast, @rose, @rose, @null]}, 0x48) listen(r1, 0x0) unshare(0x40000000) r2 = accept(r1, 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r3, 0xffffffffffffffff) write$binfmt_elf64(r2, &(0x7f00000002c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}], "", [[], []]}, 0x278) 03:44:00 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x238) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) writev(r0, &(0x7f0000000540)=[{&(0x7f0000000140)="cedbddea5b67f4290aa7fd7c0cc7e2e613891a59fd3dc2e8a3c6e7c9fa96", 0x1e}, {&(0x7f0000000340)="e4bc7c957b83ba155edae525e00f76c76056ac3fe8a5de5ccfba604ac6b0d4a0fd42802b43143a32d703bd21baddda61ba1cb78758f519c19a06193e8bfc0d1f1fad3be6885359773264bd153a2bf50591662cca307c7a22f8a9e70629a1beac22b823bfee7fec832958c20007e0b8707c6ac0e8b1", 0x75}, {&(0x7f00000004c0)="4b8043af3b13f04c3ee02ee028e584b538cfb06be329d5ca0649880187b5cd5f", 0x20}, {&(0x7f0000000800)="87cfb3bd1ada6e425bdd5aaccdafa6e4ea74", 0x12}], 0x4) sendto$inet(r0, &(0x7f00000012c0)="0c268a927f1f6588b967481241ba7860005cf65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95425a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x27) 03:44:00 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x238) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) writev(r0, &(0x7f0000000540)=[{&(0x7f0000000140)="cedbddea5b67f4290aa7fd7c0cc7e2e613891a59fd3dc2e8a3c6e7", 0x1b}, {&(0x7f0000000340)="e4bc7c957b83ba155edae525e00f76c76056ac3fe8a5de5ccfba604ac6b0d4a0fd42802b43143a32d703bd21baddda61ba1cb78758f519c19a06193e8bfc0d1f1fad3be6885359773264bd", 0x4b}, {0x0}], 0x3) sendto$inet(r0, &(0x7f00000012c0)="0c268a927f1f6588b967481241ba7860005cf65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95425a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x27) 03:44:00 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f000000b000/0x18000)=nil, &(0x7f00000008c0)=[@text32={0x20, &(0x7f0000000140)="b805000000b9510000000f01c10f46a78900000066ba2100b067ee66ba4100edb9800000c00f32b9210a00000f32b9ad0300000f320f30c4c271de9d0000000066b808008ed0660f38806f000f011c2666b8bf008ee0", 0x56}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 719.181297][T29874] IPVS: ftp: loaded support on port[0] = 21 03:44:00 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x400007) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0x32600) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xb4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000040)='cpuset') write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000700)=ANY=[@ANYBLOB="006d176df3384ed3ddbcf3be0e26fd017529253262b78ee8b9d470"], 0x1b) ioctl$TUNSETCARRIER(0xffffffffffffffff, 0x400454e2, &(0x7f0000000080)=0x1) write$cgroup_int(r0, &(0x7f0000000380), 0x12) write$cgroup_int(r1, &(0x7f0000000400), 0xd) r2 = gettid() write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000000)=r2, 0x12) r3 = socket$kcm(0x2b, 0x0, 0x0) socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r3, 0x0, 0x0) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000280)=r2, 0x12) r4 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) close(r5) write$cgroup_type(r5, &(0x7f0000000080)='threaded\x00', 0xfffffc61) r6 = bpf$MAP_CREATE(0x2, &(0x7f0000009280), 0x3c) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x17, 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB], &(0x7f0000000200)='syzkaller\x00', 0xfa1, 0x0, 0x0, 0x41100, 0x2, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, &(0x7f0000000240), 0x8, 0x10, 0x0}, 0x78) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000008740)={0x0, 0x0, &(0x7f0000008700)=[{0x0}, {&(0x7f0000008680)=""/23, 0x17}, {&(0x7f00000086c0)=""/38, 0x26}], 0x3}, 0x8000) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x6, 0x2, 0x2e15579, 0x3f, 0x1, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffffff, 0x0, 0x5}, 0x3c) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0xb, [], 0x0, 0xc, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r7}, 0x7e) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r8, &(0x7f0000000000)=ANY=[], 0x50c000) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x18, 0x8, &(0x7f0000000a00)=ANY=[@ANYBLOB="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", @ANYRES32=r6, @ANYBLOB="00000000000000000c72c0fff6ffffff850000005b0000009500000000000000"], &(0x7f0000000040)='GPL\x00', 0x3ff, 0xd5, &(0x7f0000000080)=""/213, 0x61800, 0xab6c50112a8dd52c, [], 0x0, 0x16, 0xffffffffffffffff, 0x8, &(0x7f0000000180)={0x0, 0x1}, 0x8, 0x10, &(0x7f00000001c0)={0x2, 0x6, 0x6, 0x5}, 0x10, 0x0, r8}, 0x78) bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x11, 0x5, 0x81, 0x2, 0x100, r5, 0x3, [], 0x0, 0xffffffffffffffff, 0x4, 0x3}, 0x3c) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r9, &(0x7f0000000200), 0x806000) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, r4, 0x0, 0x2a8, &(0x7f0000000440)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\a\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83CZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x98\x86\"R\x06\x00\x00\x00\x00\x00\x00\x00\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&\x014\x01\xf4\xb7\x83\x9a\xfa*\xa6\x06\xb7Pk7N\xc2\xd9\xee\xd0\xb0M\x00\xab\xc3\t\fc\xd8dx\xd5\x1dU*s)\x12[\x14\xb1\xc0\xd7\x1a\xa0\x16\xa2z\x9e\x93 \xddeF>29\v\x02\xa2b\x13R\xef\xffA,\xb9.$\xfa\x9f\xde[\x80\xd1=\xce\x1b\xeb\xf6\xf4\xe3z\x1f\x9dz\xa3\xc0\xe2\xa2\xb1\xeeq\xf5\xec0\x8e\xf4\xfb\xd9\x87\xf03\xdb\xae|\x10&V5c\xa6\xce\xcd\x8a\xdf\xe1\x89\"\xea\xde\xe7\xa3\xbe\xe7\xff\xf9 \x11\xfdY\xc6\xa1\xe8\xda\v\\?\xcb\x87\bn\x9b\x01\x1f\xf8\xe8\x1eV\xfaC\xdf\xc3Vv\x9b\x1a\xfc\x14.c\x94\xc9=\xb0\x0f!d\b\x18*@m\x7f\xaal\x17G\xd6?\x81\x16P\x03\x10e\xc3\xcd\xb1B\xeb\x01B\\\x91A\xa1\x8an\xb4#\xadr\x1e\x81v\xa2\x0e6x\xca\x8b\xa6\xd8\x81\x10:\x0e(\xdd\xfc\xc9\xc6\xb4\xf0\'f:\xbd\xfe\x11\xf8\xc8W\x81s^\xd9W\xf1\x94\xaf\xc5\x8a\xb4f\x1b\x17E\xb23\x12\xb0\xeb\xef\x8c\xb24h\xd7}\x7f\x92Hgej\x957\xe2A'}, 0x30) 03:44:00 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) sendmmsg$inet(0xffffffffffffffff, &(0x7f0000001100)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000001340)="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", 0x2d9}], 0x1}}], 0x1, 0x0) 03:44:00 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x238) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) writev(r0, &(0x7f0000000540)=[{&(0x7f0000000140)="cedbddea5b67f4290aa7fd7c0cc7e2e613891a59fd3dc2e8a3c6e7", 0x1b}, {&(0x7f0000000340)="e4bc7c957b83ba155edae525e00f76c76056ac3fe8a5de5ccfba604ac6b0d4a0fd42802b43143a32d703bd21baddda61ba1cb78758f519c19a06193e8bfc0d1f1fad3be6885359773264bd", 0x4b}, {0x0}], 0x3) sendto$inet(r0, &(0x7f00000012c0)="0c268a927f1f6588b967481241ba7860005cf65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95425a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x27) 03:44:00 executing program 5: openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) ioctl$RNDADDENTROPY(0xffffffffffffffff, 0x40085203, &(0x7f0000000100)={0x6, 0xbc, "56f80f8d7c9ad684157765ee68815e033b7b2972a2d067318db9ac518603e0dbae813e160bd3f15b30c226056579cf64ac2525dd44c15e56204f1e3f1b8c03b31f4281605682d4b39a61b89636b3a2a5ea0bd3f5e8bd40d8c0406969d18fed78e4f4108902b5959ec383c40036f5262e703d6ad6a7a486302c382e45645bfe4c472249b482a28e9519e744cdbe884985d913612a17250eab7e4f0bf4b35aab9f7b923116a8d30baf612ca3bc2ef9b3f8d1c6b570cb60bd8d5b6805ce"}) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_sctp(0x2, 0x5, 0x84) dup3(0xffffffffffffffff, r0, 0x0) socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp_SCTP_AUTH_DEACTIVATE_KEY(0xffffffffffffffff, 0x84, 0x23, 0x0, 0x0) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f00000000c0)={0x0, 0xfffc, 0x0, {0x103, 0xf1}, {0x9}, @ramp={0x2, 0x3, {0x7fff, 0x0, 0x7, 0x7}}}) r1 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r1, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @bcast, @rose, @rose, @null]}, 0x48) listen(r1, 0x0) unshare(0x40000000) r2 = accept(r1, 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r3, 0xffffffffffffffff) write$binfmt_elf64(r2, &(0x7f00000002c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}], "", [[], []]}, 0x278) 03:44:00 executing program 1: openat$btrfs_control(0xffffffffffffff9c, 0x0, 0x0, 0x0) 03:44:00 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) sendmmsg$inet(0xffffffffffffffff, &(0x7f0000001100)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000001340)="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", 0x2d9}], 0x1}}], 0x1, 0x0) 03:44:00 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x400007) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0x32600) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xb4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000040)='cpuset') write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000700)=ANY=[@ANYBLOB="006d176df3384ed3ddbcf3be0e26fd017529253262b78ee8b9d470"], 0x1b) ioctl$TUNSETCARRIER(0xffffffffffffffff, 0x400454e2, &(0x7f0000000080)=0x1) write$cgroup_int(r0, &(0x7f0000000380), 0x12) write$cgroup_int(r1, &(0x7f0000000400), 0xd) r2 = gettid() write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000000)=r2, 0x12) r3 = socket$kcm(0x2b, 0x0, 0x0) socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r3, 0x0, 0x0) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000280)=r2, 0x12) r4 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) close(r5) write$cgroup_type(r5, &(0x7f0000000080)='threaded\x00', 0xfffffc61) r6 = bpf$MAP_CREATE(0x2, &(0x7f0000009280), 0x3c) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x17, 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB], &(0x7f0000000200)='syzkaller\x00', 0xfa1, 0x0, 0x0, 0x41100, 0x2, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, &(0x7f0000000240), 0x8, 0x10, 0x0}, 0x78) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000008740)={0x0, 0x0, &(0x7f0000008700)=[{0x0}, {&(0x7f0000008680)=""/23, 0x17}, {&(0x7f00000086c0)=""/38, 0x26}], 0x3}, 0x8000) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x6, 0x2, 0x2e15579, 0x3f, 0x1, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffffff, 0x0, 0x5}, 0x3c) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0xb, [], 0x0, 0xc, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r7}, 0x7e) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r8, &(0x7f0000000000)=ANY=[], 0x50c000) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x18, 0x8, &(0x7f0000000a00)=ANY=[@ANYBLOB="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", @ANYRES32=r6, @ANYBLOB="00000000000000000c72c0fff6ffffff850000005b0000009500000000000000"], &(0x7f0000000040)='GPL\x00', 0x3ff, 0xd5, &(0x7f0000000080)=""/213, 0x61800, 0xab6c50112a8dd52c, [], 0x0, 0x16, 0xffffffffffffffff, 0x8, &(0x7f0000000180)={0x0, 0x1}, 0x8, 0x10, &(0x7f00000001c0)={0x2, 0x6, 0x6, 0x5}, 0x10, 0x0, r8}, 0x78) bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x11, 0x5, 0x81, 0x2, 0x100, r5, 0x3, [], 0x0, 0xffffffffffffffff, 0x4, 0x3}, 0x3c) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r9, &(0x7f0000000200), 0x806000) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, r4, 0x0, 0x2a8, &(0x7f0000000440)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\a\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83CZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x98\x86\"R\x06\x00\x00\x00\x00\x00\x00\x00\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&\x014\x01\xf4\xb7\x83\x9a\xfa*\xa6\x06\xb7Pk7N\xc2\xd9\xee\xd0\xb0M\x00\xab\xc3\t\fc\xd8dx\xd5\x1dU*s)\x12[\x14\xb1\xc0\xd7\x1a\xa0\x16\xa2z\x9e\x93 \xddeF>29\v\x02\xa2b\x13R\xef\xffA,\xb9.$\xfa\x9f\xde[\x80\xd1=\xce\x1b\xeb\xf6\xf4\xe3z\x1f\x9dz\xa3\xc0\xe2\xa2\xb1\xeeq\xf5\xec0\x8e\xf4\xfb\xd9\x87\xf03\xdb\xae|\x10&V5c\xa6\xce\xcd\x8a\xdf\xe1\x89\"\xea\xde\xe7\xa3\xbe\xe7\xff\xf9 \x11\xfdY\xc6\xa1\xe8\xda\v\\?\xcb\x87\bn\x9b\x01\x1f\xf8\xe8\x1eV\xfaC\xdf\xc3Vv\x9b\x1a\xfc\x14.c\x94\xc9=\xb0\x0f!d\b\x18*@m\x7f\xaal\x17G\xd6?\x81\x16P\x03\x10e\xc3\xcd\xb1B\xeb\x01B\\\x91A\xa1\x8an\xb4#\xadr\x1e\x81v\xa2\x0e6x\xca\x8b\xa6\xd8\x81\x10:\x0e(\xdd\xfc\xc9\xc6\xb4\xf0\'f:\xbd\xfe\x11\xf8\xc8W\x81s^\xd9W\xf1\x94\xaf\xc5\x8a\xb4f\x1b\x17E\xb23\x12\xb0\xeb\xef\x8c\xb24h\xd7}\x7f\x92Hgej\x957\xe2A'}, 0x30) [ 719.789390][T30002] IPVS: ftp: loaded support on port[0] = 21 03:44:00 executing program 1: openat$vcs(0xffffffffffffff9c, &(0x7f0000001300)='/dev/vcs\x00', 0x0, 0x0) 03:44:00 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x238) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) writev(r0, &(0x7f0000000540)=[{&(0x7f0000000140)="cedbddea5b67f4290aa7fd7c0cc7e2e613891a59fd3dc2e8a3c6e7c9fa96", 0x1e}, {&(0x7f0000000340)="e4bc7c957b83ba155edae525e00f76c76056ac3fe8a5de5ccfba604ac6b0d4a0fd42802b43143a32d703bd21baddda61ba1cb78758f519c19a06193e8bfc0d1f1fad3be6885359773264bd153a2bf50591662cca307c7a22f8a9e70629a1beac22b823bfee7fec832958c20007e0b8707c6ac0e8b1", 0x75}, {&(0x7f00000004c0)="4b8043af3b13f04c3ee02ee028e584b538cfb06be329d5ca0649880187b5cd5f", 0x20}, {&(0x7f0000000800)="87cfb3bd1ada6e425bdd5aaccdafa6e4ea74", 0x12}], 0x4) sendto$inet(r0, &(0x7f00000012c0)="0c268a927f1f6588b967481241ba7860005cf65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95425a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x27) 03:44:00 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) sendmmsg$inet(0xffffffffffffffff, &(0x7f0000001100)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000001340)="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", 0x2d9}], 0x1}}], 0x1, 0x0) 03:44:01 executing program 5: openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) ioctl$RNDADDENTROPY(0xffffffffffffffff, 0x40085203, &(0x7f0000000100)={0x6, 0xbc, "56f80f8d7c9ad684157765ee68815e033b7b2972a2d067318db9ac518603e0dbae813e160bd3f15b30c226056579cf64ac2525dd44c15e56204f1e3f1b8c03b31f4281605682d4b39a61b89636b3a2a5ea0bd3f5e8bd40d8c0406969d18fed78e4f4108902b5959ec383c40036f5262e703d6ad6a7a486302c382e45645bfe4c472249b482a28e9519e744cdbe884985d913612a17250eab7e4f0bf4b35aab9f7b923116a8d30baf612ca3bc2ef9b3f8d1c6b570cb60bd8d5b6805ce"}) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_sctp(0x2, 0x5, 0x84) dup3(0xffffffffffffffff, r0, 0x0) socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp_SCTP_AUTH_DEACTIVATE_KEY(0xffffffffffffffff, 0x84, 0x23, 0x0, 0x0) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f00000000c0)={0x51, 0x0, 0x0, {0x103, 0xf1}, {0x9}, @ramp={0x2, 0x3, {0x7fff, 0x0, 0x7, 0x7}}}) r1 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r1, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @bcast, @rose, @rose, @null]}, 0x48) listen(r1, 0x0) unshare(0x40000000) r2 = accept(r1, 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r3, 0xffffffffffffffff) write$binfmt_elf64(r2, &(0x7f00000002c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}], "", [[], []]}, 0x278) 03:44:01 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_ifreq(r0, 0x8949, &(0x7f0000000000)={'veth1_to_bond\x00', @ifru_hwaddr=@remote}) 03:44:01 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) sendmmsg$inet(r0, 0x0, 0x0, 0x0) 03:44:01 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x400007) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0x32600) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xb4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000040)='cpuset') write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000700)=ANY=[@ANYBLOB="006d176df3384ed3ddbcf3be0e26fd017529253262b78ee8b9d470"], 0x1b) ioctl$TUNSETCARRIER(0xffffffffffffffff, 0x400454e2, &(0x7f0000000080)=0x1) write$cgroup_int(r0, &(0x7f0000000380), 0x12) write$cgroup_int(r1, &(0x7f0000000400), 0xd) r2 = gettid() write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000000)=r2, 0x12) r3 = socket$kcm(0x2b, 0x0, 0x0) socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r3, 0x0, 0x0) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000280)=r2, 0x12) r4 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) close(r5) write$cgroup_type(r5, &(0x7f0000000080)='threaded\x00', 0xfffffc61) r6 = bpf$MAP_CREATE(0x2, &(0x7f0000009280), 0x3c) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x17, 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB], &(0x7f0000000200)='syzkaller\x00', 0xfa1, 0x0, 0x0, 0x41100, 0x2, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, &(0x7f0000000240), 0x8, 0x10, 0x0}, 0x78) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000008740)={0x0, 0x0, &(0x7f0000008700)=[{0x0}, {&(0x7f0000008680)=""/23, 0x17}, {&(0x7f00000086c0)=""/38, 0x26}], 0x3}, 0x8000) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x6, 0x2, 0x2e15579, 0x3f, 0x1, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffffff, 0x0, 0x5}, 0x3c) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0xb, [], 0x0, 0xc, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r7}, 0x7e) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r8, &(0x7f0000000000)=ANY=[], 0x50c000) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x18, 0x8, &(0x7f0000000a00)=ANY=[@ANYBLOB="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", @ANYRES32=r6, @ANYBLOB="00000000000000000c72c0fff6ffffff850000005b0000009500000000000000"], &(0x7f0000000040)='GPL\x00', 0x3ff, 0xd5, &(0x7f0000000080)=""/213, 0x61800, 0xab6c50112a8dd52c, [], 0x0, 0x16, 0xffffffffffffffff, 0x8, &(0x7f0000000180)={0xa}, 0x8, 0x10, &(0x7f00000001c0)={0x2, 0x6, 0x6, 0x5}, 0x10, 0x0, r8}, 0x78) bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x11, 0x5, 0x81, 0x2, 0x100, r5, 0x3, [], 0x0, 0xffffffffffffffff, 0x4, 0x3}, 0x3c) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r9, &(0x7f0000000200), 0x806000) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, r4, 0x0, 0x2a8, &(0x7f0000000440)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\a\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83CZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x98\x86\"R\x06\x00\x00\x00\x00\x00\x00\x00\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&\x014\x01\xf4\xb7\x83\x9a\xfa*\xa6\x06\xb7Pk7N\xc2\xd9\xee\xd0\xb0M\x00\xab\xc3\t\fc\xd8dx\xd5\x1dU*s)\x12[\x14\xb1\xc0\xd7\x1a\xa0\x16\xa2z\x9e\x93 \xddeF>29\v\x02\xa2b\x13R\xef\xffA,\xb9.$\xfa\x9f\xde[\x80\xd1=\xce\x1b\xeb\xf6\xf4\xe3z\x1f\x9dz\xa3\xc0\xe2\xa2\xb1\xeeq\xf5\xec0\x8e\xf4\xfb\xd9\x87\xf03\xdb\xae|\x10&V5c\xa6\xce\xcd\x8a\xdf\xe1\x89\"\xea\xde\xe7\xa3\xbe\xe7\xff\xf9 \x11\xfdY\xc6\xa1\xe8\xda\v\\?\xcb\x87\bn\x9b\x01\x1f\xf8\xe8\x1eV\xfaC\xdf\xc3Vv\x9b\x1a\xfc\x14.c\x94\xc9=\xb0\x0f!d\b\x18*@m\x7f\xaal\x17G\xd6?\x81\x16P\x03\x10e\xc3\xcd\xb1B\xeb\x01B\\\x91A\xa1\x8an\xb4#\xadr\x1e\x81v\xa2\x0e6x\xca\x8b\xa6\xd8\x81\x10:\x0e(\xdd\xfc\xc9\xc6\xb4\xf0\'f:\xbd\xfe\x11\xf8\xc8W\x81s^\xd9W\xf1\x94\xaf\xc5\x8a\xb4f\x1b\x17E\xb23\x12\xb0\xeb\xef\x8c\xb24h\xd7}\x7f\x92Hgej\x957\xe2A'}, 0x30) 03:44:01 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x238) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) writev(r0, &(0x7f0000000540)=[{&(0x7f0000000140)="cedbddea5b67f4290aa7fd7c0cc7e2e613891a59fd3dc2e8a3c6e7", 0x1b}, {&(0x7f0000000340)="e4bc7c957b83ba155edae525e00f76c76056ac3fe8a5de5ccfba604ac6b0d4a0fd42802b43143a32d703bd21baddda61ba1cb78758f519c19a06193e8bfc0d1f1fad3be6885359773264bd", 0x4b}, {0x0}], 0x3) sendto$inet(r0, &(0x7f00000012c0)="0c268a927f1f6588b967481241ba7860005cf65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95425a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x27) [ 720.387405][T30027] IPVS: ftp: loaded support on port[0] = 21 03:44:01 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) sendmmsg$inet(r0, 0x0, 0x0, 0x0) 03:44:01 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_ifreq(r0, 0x8949, &(0x7f0000000000)={'veth1_to_bond\x00', @ifru_hwaddr=@remote}) 03:44:01 executing program 5: openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) ioctl$RNDADDENTROPY(0xffffffffffffffff, 0x40085203, &(0x7f0000000100)={0x6, 0xbc, "56f80f8d7c9ad684157765ee68815e033b7b2972a2d067318db9ac518603e0dbae813e160bd3f15b30c226056579cf64ac2525dd44c15e56204f1e3f1b8c03b31f4281605682d4b39a61b89636b3a2a5ea0bd3f5e8bd40d8c0406969d18fed78e4f4108902b5959ec383c40036f5262e703d6ad6a7a486302c382e45645bfe4c472249b482a28e9519e744cdbe884985d913612a17250eab7e4f0bf4b35aab9f7b923116a8d30baf612ca3bc2ef9b3f8d1c6b570cb60bd8d5b6805ce"}) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_sctp(0x2, 0x5, 0x84) dup3(0xffffffffffffffff, r0, 0x0) socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp_SCTP_AUTH_DEACTIVATE_KEY(0xffffffffffffffff, 0x84, 0x23, 0x0, 0x0) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f00000000c0)={0x51, 0x0, 0x0, {0x103, 0xf1}, {0x9}, @ramp={0x2, 0x3, {0x7fff, 0x0, 0x7, 0x7}}}) r1 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r1, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @bcast, @rose, @rose, @null]}, 0x48) listen(r1, 0x0) unshare(0x40000000) r2 = accept(r1, 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r3, 0xffffffffffffffff) write$binfmt_elf64(r2, &(0x7f00000002c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}], "", [[], []]}, 0x278) 03:44:01 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x400007) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0x32600) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xb4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000040)='cpuset') write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000700)=ANY=[@ANYBLOB="006d176df3384ed3ddbcf3be0e26fd017529253262b78ee8b9d470"], 0x1b) ioctl$TUNSETCARRIER(0xffffffffffffffff, 0x400454e2, &(0x7f0000000080)=0x1) write$cgroup_int(r0, &(0x7f0000000380), 0x12) write$cgroup_int(r1, &(0x7f0000000400), 0xd) r2 = gettid() write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000000)=r2, 0x12) r3 = socket$kcm(0x2b, 0x0, 0x0) socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r3, 0x0, 0x0) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000280)=r2, 0x12) r4 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) close(r5) write$cgroup_type(r5, &(0x7f0000000080)='threaded\x00', 0xfffffc61) r6 = bpf$MAP_CREATE(0x2, &(0x7f0000009280), 0x3c) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x17, 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB], &(0x7f0000000200)='syzkaller\x00', 0xfa1, 0x0, 0x0, 0x41100, 0x2, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, &(0x7f0000000240), 0x8, 0x10, 0x0}, 0x78) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000008740)={0x0, 0x0, &(0x7f0000008700)=[{0x0}, {&(0x7f0000008680)=""/23, 0x17}, {&(0x7f00000086c0)=""/38, 0x26}], 0x3}, 0x8000) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x6, 0x2, 0x2e15579, 0x3f, 0x1, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffffff, 0x0, 0x5}, 0x3c) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0xb, [], 0x0, 0xc, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r7}, 0x7e) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r8, &(0x7f0000000000)=ANY=[], 0x50c000) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x18, 0x8, &(0x7f0000000a00)=ANY=[@ANYBLOB="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", @ANYRES32=r6, @ANYBLOB="00000000000000000c72c0fff6ffffff850000005b0000009500000000000000"], &(0x7f0000000040)='GPL\x00', 0x3ff, 0xd5, &(0x7f0000000080)=""/213, 0x61800, 0xab6c50112a8dd52c, [], 0x0, 0x16, 0xffffffffffffffff, 0x8, &(0x7f0000000180)={0xa}, 0x8, 0x10, &(0x7f00000001c0)={0x2, 0x6, 0x6, 0x5}, 0x10, 0x0, r8}, 0x78) bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x11, 0x5, 0x81, 0x2, 0x100, r5, 0x3, [], 0x0, 0xffffffffffffffff, 0x4, 0x3}, 0x3c) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r9, &(0x7f0000000200), 0x806000) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, r4, 0x0, 0x2a8, &(0x7f0000000440)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\a\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83CZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x98\x86\"R\x06\x00\x00\x00\x00\x00\x00\x00\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&\x014\x01\xf4\xb7\x83\x9a\xfa*\xa6\x06\xb7Pk7N\xc2\xd9\xee\xd0\xb0M\x00\xab\xc3\t\fc\xd8dx\xd5\x1dU*s)\x12[\x14\xb1\xc0\xd7\x1a\xa0\x16\xa2z\x9e\x93 \xddeF>29\v\x02\xa2b\x13R\xef\xffA,\xb9.$\xfa\x9f\xde[\x80\xd1=\xce\x1b\xeb\xf6\xf4\xe3z\x1f\x9dz\xa3\xc0\xe2\xa2\xb1\xeeq\xf5\xec0\x8e\xf4\xfb\xd9\x87\xf03\xdb\xae|\x10&V5c\xa6\xce\xcd\x8a\xdf\xe1\x89\"\xea\xde\xe7\xa3\xbe\xe7\xff\xf9 \x11\xfdY\xc6\xa1\xe8\xda\v\\?\xcb\x87\bn\x9b\x01\x1f\xf8\xe8\x1eV\xfaC\xdf\xc3Vv\x9b\x1a\xfc\x14.c\x94\xc9=\xb0\x0f!d\b\x18*@m\x7f\xaal\x17G\xd6?\x81\x16P\x03\x10e\xc3\xcd\xb1B\xeb\x01B\\\x91A\xa1\x8an\xb4#\xadr\x1e\x81v\xa2\x0e6x\xca\x8b\xa6\xd8\x81\x10:\x0e(\xdd\xfc\xc9\xc6\xb4\xf0\'f:\xbd\xfe\x11\xf8\xc8W\x81s^\xd9W\xf1\x94\xaf\xc5\x8a\xb4f\x1b\x17E\xb23\x12\xb0\xeb\xef\x8c\xb24h\xd7}\x7f\x92Hgej\x957\xe2A'}, 0x30) 03:44:01 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x238) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) writev(r0, &(0x7f0000000540)=[{&(0x7f0000000140)="cedbddea5b67f4290aa7fd7c0cc7e2e613891a59fd3dc2e8a3c6e7c9fa96", 0x1e}, {&(0x7f0000000340)="e4bc7c957b83ba155edae525e00f76c76056ac3fe8a5de5ccfba604ac6b0d4a0fd42802b43143a32d703bd21baddda61ba1cb78758f519c19a06193e8bfc0d1f1fad3be6885359773264bd153a2bf50591662cca307c7a22f8a9e70629a1beac22b823bfee7fec832958c20007e0b8707c6ac0e8b1", 0x75}, {&(0x7f00000004c0)="4b8043af3b13f04c3ee02ee028e584b538cfb06be329d5ca0649880187b5cd5ff601", 0x22}, {&(0x7f0000000800)="87cfb3bd1ada6e425bdd5aaccdafa6e4ea74", 0x12}], 0x4) sendto$inet(r0, &(0x7f00000012c0)="0c268a927f1f6588b967481241ba7860005cf65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95425a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x27) 03:44:01 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_ifreq(r0, 0x8949, &(0x7f0000000000)={'veth1_to_bond\x00', @ifru_hwaddr=@remote}) 03:44:01 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) sendmmsg$inet(r0, 0x0, 0x0, 0x0) [ 721.076015][T30051] IPVS: ftp: loaded support on port[0] = 21 03:44:02 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_ifreq(r0, 0x8949, &(0x7f0000000000)={'veth1_to_bond\x00', @ifru_hwaddr=@remote}) 03:44:02 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x238) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) writev(r0, &(0x7f0000000540)=[{&(0x7f0000000140)="cedbddea5b67f4290aa7fd7c0cc7e2e613891a59fd3dc2e8a3c6e7c9fa", 0x1d}, {&(0x7f0000000340)="e4bc7c957b83ba155edae525e00f76c76056ac3fe8a5de5ccfba604ac6b0d4a0fd42802b43143a32d703bd21baddda61ba1cb78758f519c19a06193e8bfc0d1f1fad3be6885359773264bd", 0x4b}, {0x0}], 0x3) sendto$inet(r0, &(0x7f00000012c0)="0c268a927f1f6588b967481241ba7860005cf65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95425a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x27) 03:44:02 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) sendmmsg$inet(r0, &(0x7f0000001100), 0x0, 0x0) 03:44:02 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x400007) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0x32600) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xb4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000040)='cpuset') write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000700)=ANY=[@ANYBLOB="006d176df3384ed3ddbcf3be0e26fd017529253262b78ee8b9d470"], 0x1b) ioctl$TUNSETCARRIER(0xffffffffffffffff, 0x400454e2, &(0x7f0000000080)=0x1) write$cgroup_int(r0, &(0x7f0000000380), 0x12) write$cgroup_int(r1, &(0x7f0000000400), 0xd) r2 = gettid() write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000000)=r2, 0x12) r3 = socket$kcm(0x2b, 0x0, 0x0) socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r3, 0x0, 0x0) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000280)=r2, 0x12) r4 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) close(r5) write$cgroup_type(r5, &(0x7f0000000080)='threaded\x00', 0xfffffc61) r6 = bpf$MAP_CREATE(0x2, &(0x7f0000009280), 0x3c) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x17, 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB], &(0x7f0000000200)='syzkaller\x00', 0xfa1, 0x0, 0x0, 0x41100, 0x2, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, &(0x7f0000000240), 0x8, 0x10, 0x0}, 0x78) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000008740)={0x0, 0x0, &(0x7f0000008700)=[{0x0}, {&(0x7f0000008680)=""/23, 0x17}, {&(0x7f00000086c0)=""/38, 0x26}], 0x3}, 0x8000) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x6, 0x2, 0x2e15579, 0x3f, 0x1, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffffff, 0x0, 0x5}, 0x3c) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0xb, [], 0x0, 0xc, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r7}, 0x7e) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r8, &(0x7f0000000000)=ANY=[], 0x50c000) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x18, 0x8, &(0x7f0000000a00)=ANY=[@ANYBLOB="0000752c0000000000000000ffffffff9500000000000000181400006200ed587c1ba87fb23af22b6cf03fb851054ce322d4b3a5894516c0c1479e1cfbf3061ad7aef6d6c36e4e74a8219f8441192ab16361719f26a1e543525c94027f7a5f275546d8cacee044fc20d858e268019caeb1633cc4888faa05d02cd44de32962e022697754125edcfb3477c4e122a0e97ab43de94a7a94efd527400e2c2ff4468fd6e773773f089b268fddef712ab174487ae9049f64895522be3862156a1af15513c3ff285844c9aae255d74c0dacf6c47d6809ce69ee6e41a03a03b29152ee43afabd82aa883f260995238aa70895dc3aee59a119dc82fb5fd00af56ded09336e2df6a0bb41bd191d57b35eb262a1aa8d5fec51b24500685f8c0adaf3639790fdbd7cb2ac3af37a802a6ac7265a819c91986c45e7c54d91c5ced552d96c04a80c063fee16b3a52bc603deebe32e4e0dfdfe9d03658daad65606e175041076684110e66f74db9509b1a29e765c9208ddba13e3b42b3963dce5432c4fb7844a9b64c518820c9c0198fadb6ea6a350f89a1eb1a3c1e20527ce574c3514f9ad62be70eee070faa267d83564e6db87e4d16ccd118397c2e4825140e6b46c35edb77df7b9a3334ad3f8cb70b73f4b9d8b29eb50b2c2dfc8d82841a6251fcfcb978ce90873ddcfa0125800302f5ed70c724e0253fb45955750f1e7c94ca05a91ec592ee3a52fad94c89205ece2d1d96afbfa0b59f9bd6c1161c638fff8696973fedca3f3ddf5bbb1023", @ANYRES32=r6, @ANYBLOB="00000000000000000c72c0fff6ffffff850000005b0000009500000000000000"], &(0x7f0000000040)='GPL\x00', 0x3ff, 0xd5, &(0x7f0000000080)=""/213, 0x61800, 0xab6c50112a8dd52c, [], 0x0, 0x16, 0xffffffffffffffff, 0x8, &(0x7f0000000180)={0xa}, 0x8, 0x10, &(0x7f00000001c0)={0x2, 0x6, 0x6, 0x5}, 0x10, 0x0, r8}, 0x78) bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x11, 0x5, 0x81, 0x2, 0x100, r5, 0x3, [], 0x0, 0xffffffffffffffff, 0x4, 0x3}, 0x3c) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r9, &(0x7f0000000200), 0x806000) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, r4, 0x0, 0x2a8, &(0x7f0000000440)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\a\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83CZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x98\x86\"R\x06\x00\x00\x00\x00\x00\x00\x00\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&\x014\x01\xf4\xb7\x83\x9a\xfa*\xa6\x06\xb7Pk7N\xc2\xd9\xee\xd0\xb0M\x00\xab\xc3\t\fc\xd8dx\xd5\x1dU*s)\x12[\x14\xb1\xc0\xd7\x1a\xa0\x16\xa2z\x9e\x93 \xddeF>29\v\x02\xa2b\x13R\xef\xffA,\xb9.$\xfa\x9f\xde[\x80\xd1=\xce\x1b\xeb\xf6\xf4\xe3z\x1f\x9dz\xa3\xc0\xe2\xa2\xb1\xeeq\xf5\xec0\x8e\xf4\xfb\xd9\x87\xf03\xdb\xae|\x10&V5c\xa6\xce\xcd\x8a\xdf\xe1\x89\"\xea\xde\xe7\xa3\xbe\xe7\xff\xf9 \x11\xfdY\xc6\xa1\xe8\xda\v\\?\xcb\x87\bn\x9b\x01\x1f\xf8\xe8\x1eV\xfaC\xdf\xc3Vv\x9b\x1a\xfc\x14.c\x94\xc9=\xb0\x0f!d\b\x18*@m\x7f\xaal\x17G\xd6?\x81\x16P\x03\x10e\xc3\xcd\xb1B\xeb\x01B\\\x91A\xa1\x8an\xb4#\xadr\x1e\x81v\xa2\x0e6x\xca\x8b\xa6\xd8\x81\x10:\x0e(\xdd\xfc\xc9\xc6\xb4\xf0\'f:\xbd\xfe\x11\xf8\xc8W\x81s^\xd9W\xf1\x94\xaf\xc5\x8a\xb4f\x1b\x17E\xb23\x12\xb0\xeb\xef\x8c\xb24h\xd7}\x7f\x92Hgej\x957\xe2A'}, 0x30) 03:44:02 executing program 1: ioctl$sock_ifreq(0xffffffffffffffff, 0x8949, &(0x7f0000000000)={'veth1_to_bond\x00', @ifru_hwaddr=@remote}) 03:44:02 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) sendmmsg$inet(r0, &(0x7f0000001100), 0x0, 0x0) 03:44:02 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x238) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) writev(r0, &(0x7f0000000540)=[{&(0x7f0000000140)="cedbddea5b67f4290aa7fd7c0cc7e2e613891a59fd3dc2e8a3c6e7c9fa96", 0x1e}, {&(0x7f0000000340)="e4bc7c957b83ba155edae525e00f76c76056ac3fe8a5de5ccfba604ac6b0d4a0fd42802b43143a32d703bd21baddda61ba1cb78758f519c19a06193e8bfc0d1f1fad3be6885359773264bd153a2bf50591662cca307c7a22f8a9e70629a1beac22b823bfee7fec832958c20007e0b8707c6ac0e8b1", 0x75}, {&(0x7f00000004c0)="4b8043af3b13f04c3ee02ee028e584b538cfb06be329d5ca0649880187b5cd5ff601", 0x22}, {&(0x7f0000000800)="87cfb3bd1ada6e425bdd5aaccdafa6e4ea74", 0x12}], 0x4) sendto$inet(r0, &(0x7f00000012c0)="0c268a927f1f6588b967481241ba7860005cf65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95425a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x27) 03:44:02 executing program 5: openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) ioctl$RNDADDENTROPY(0xffffffffffffffff, 0x40085203, &(0x7f0000000100)={0x6, 0xbc, "56f80f8d7c9ad684157765ee68815e033b7b2972a2d067318db9ac518603e0dbae813e160bd3f15b30c226056579cf64ac2525dd44c15e56204f1e3f1b8c03b31f4281605682d4b39a61b89636b3a2a5ea0bd3f5e8bd40d8c0406969d18fed78e4f4108902b5959ec383c40036f5262e703d6ad6a7a486302c382e45645bfe4c472249b482a28e9519e744cdbe884985d913612a17250eab7e4f0bf4b35aab9f7b923116a8d30baf612ca3bc2ef9b3f8d1c6b570cb60bd8d5b6805ce"}) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_sctp(0x2, 0x5, 0x84) dup3(0xffffffffffffffff, r0, 0x0) socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp_SCTP_AUTH_DEACTIVATE_KEY(0xffffffffffffffff, 0x84, 0x23, 0x0, 0x0) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f00000000c0)={0x51, 0x0, 0x0, {0x103, 0xf1}, {0x9}, @ramp={0x2, 0x3, {0x7fff, 0x0, 0x7, 0x7}}}) r1 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r1, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @bcast, @rose, @rose, @null]}, 0x48) listen(r1, 0x0) unshare(0x40000000) r2 = accept(r1, 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r3, 0xffffffffffffffff) write$binfmt_elf64(r2, &(0x7f00000002c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}], "", [[], []]}, 0x278) 03:44:02 executing program 1: ioctl$sock_ifreq(0xffffffffffffffff, 0x8949, &(0x7f0000000000)={'veth1_to_bond\x00', @ifru_hwaddr=@remote}) 03:44:02 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) sendmmsg$inet(r0, &(0x7f0000001100), 0x0, 0x0) 03:44:02 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x238) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) writev(r0, &(0x7f0000000540)=[{&(0x7f0000000140)="cedbddea5b67f4290aa7fd7c0cc7e2e613891a59fd3dc2e8a3c6e7c9fa", 0x1d}, {&(0x7f0000000340)="e4bc7c957b83ba155edae525e00f76c76056ac3fe8a5de5ccfba604ac6b0d4a0fd42802b43143a32d703bd21baddda61ba1cb78758f519c19a06193e8bfc0d1f1fad3be6885359773264bd", 0x4b}, {0x0}], 0x3) sendto$inet(r0, &(0x7f00000012c0)="0c268a927f1f6588b967481241ba7860005cf65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95425a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x27) 03:44:02 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x400007) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0x32600) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xb4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000040)='cpuset') write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000700)=ANY=[@ANYBLOB="006d176df3384ed3ddbcf3be0e26fd017529253262b78ee8b9d470"], 0x1b) ioctl$TUNSETCARRIER(0xffffffffffffffff, 0x400454e2, &(0x7f0000000080)=0x1) write$cgroup_int(r0, &(0x7f0000000380), 0x12) write$cgroup_int(r1, &(0x7f0000000400), 0xd) r2 = gettid() write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000000)=r2, 0x12) r3 = socket$kcm(0x2b, 0x0, 0x0) socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r3, 0x0, 0x0) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000280)=r2, 0x12) r4 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) close(r5) write$cgroup_type(r5, &(0x7f0000000080)='threaded\x00', 0xfffffc61) r6 = bpf$MAP_CREATE(0x2, &(0x7f0000009280), 0x3c) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x17, 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB], &(0x7f0000000200)='syzkaller\x00', 0xfa1, 0x0, 0x0, 0x41100, 0x2, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, &(0x7f0000000240), 0x8, 0x10, 0x0}, 0x78) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000008740)={0x0, 0x0, &(0x7f0000008700)=[{0x0}, {&(0x7f0000008680)=""/23, 0x17}, {&(0x7f00000086c0)=""/38, 0x26}], 0x3}, 0x8000) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x6, 0x2, 0x2e15579, 0x3f, 0x1, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffffff, 0x0, 0x5}, 0x3c) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0xb, [], 0x0, 0xc, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r7}, 0x7e) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r8, &(0x7f0000000000)=ANY=[], 0x50c000) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x18, 0x49, &(0x7f0000000a00)=ANY=[@ANYBLOB="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", @ANYRES32=r6, @ANYBLOB="00000000000000000c72c0fff6ffffff850000005b0000009500000000000000"], &(0x7f0000000040)='GPL\x00', 0x3ff, 0xd5, &(0x7f0000000080)=""/213, 0x61800, 0xab6c50112a8dd52c, [], 0x0, 0x16, 0xffffffffffffffff, 0x8, &(0x7f0000000180)={0xa, 0x1}, 0x8, 0x10, 0x0, 0x0, 0x0, r8}, 0x78) bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x11, 0x5, 0x81, 0x2, 0x100, r5, 0x3, [], 0x0, 0xffffffffffffffff, 0x4, 0x3}, 0x3c) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r9, &(0x7f0000000200), 0x806000) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, r4, 0x0, 0x2a8, &(0x7f0000000440)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\a\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83CZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x98\x86\"R\x06\x00\x00\x00\x00\x00\x00\x00\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&\x014\x01\xf4\xb7\x83\x9a\xfa*\xa6\x06\xb7Pk7N\xc2\xd9\xee\xd0\xb0M\x00\xab\xc3\t\fc\xd8dx\xd5\x1dU*s)\x12[\x14\xb1\xc0\xd7\x1a\xa0\x16\xa2z\x9e\x93 \xddeF>29\v\x02\xa2b\x13R\xef\xffA,\xb9.$\xfa\x9f\xde[\x80\xd1=\xce\x1b\xeb\xf6\xf4\xe3z\x1f\x9dz\xa3\xc0\xe2\xa2\xb1\xeeq\xf5\xec0\x8e\xf4\xfb\xd9\x87\xf03\xdb\xae|\x10&V5c\xa6\xce\xcd\x8a\xdf\xe1\x89\"\xea\xde\xe7\xa3\xbe\xe7\xff\xf9 \x11\xfdY\xc6\xa1\xe8\xda\v\\?\xcb\x87\bn\x9b\x01\x1f\xf8\xe8\x1eV\xfaC\xdf\xc3Vv\x9b\x1a\xfc\x14.c\x94\xc9=\xb0\x0f!d\b\x18*@m\x7f\xaal\x17G\xd6?\x81\x16P\x03\x10e\xc3\xcd\xb1B\xeb\x01B\\\x91A\xa1\x8an\xb4#\xadr\x1e\x81v\xa2\x0e6x\xca\x8b\xa6\xd8\x81\x10:\x0e(\xdd\xfc\xc9\xc6\xb4\xf0\'f:\xbd\xfe\x11\xf8\xc8W\x81s^\xd9W\xf1\x94\xaf\xc5\x8a\xb4f\x1b\x17E\xb23\x12\xb0\xeb\xef\x8c\xb24h\xd7}\x7f\x92Hgej\x957\xe2A'}, 0x30) 03:44:02 executing program 1: ioctl$sock_ifreq(0xffffffffffffffff, 0x8949, &(0x7f0000000000)={'veth1_to_bond\x00', @ifru_hwaddr=@remote}) [ 722.099546][T30100] IPVS: ftp: loaded support on port[0] = 21 [ 722.116444][T27358] tipc: TX() has been purged, node left! 03:44:03 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) sendmmsg$inet(r0, &(0x7f0000001100)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) [ 722.161043][T27358] tipc: TX() has been purged, node left! [ 722.200027][T27358] tipc: TX() has been purged, node left! 03:44:03 executing program 1: socket$netlink(0x10, 0x3, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x8949, &(0x7f0000000000)={'veth1_to_bond\x00', @ifru_hwaddr=@remote}) [ 722.280204][T27358] tipc: TX() has been purged, node left! 03:44:03 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x238) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) writev(r0, &(0x7f0000000540)=[{&(0x7f0000000140)="cedbddea5b67f4290aa7fd7c0cc7e2e613891a59fd3dc2e8a3c6e7c9fa96", 0x1e}, {&(0x7f0000000340)="e4bc7c957b83ba155edae525e00f76c76056ac3fe8a5de5ccfba604ac6b0d4a0fd42802b43143a32d703bd21baddda61ba1cb78758f519c19a06193e8bfc0d1f1fad3be6885359773264bd153a2bf50591662cca307c7a22f8a9e70629a1beac22b823bfee7fec832958c20007e0b8707c6ac0e8b1", 0x75}, {&(0x7f00000004c0)="4b8043af3b13f04c3ee02ee028e584b538cfb06be329d5ca0649880187b5cd5ff601", 0x22}, {&(0x7f0000000800)="87cfb3bd1ada6e425bdd5aaccdafa6e4ea74", 0x12}], 0x4) sendto$inet(r0, &(0x7f00000012c0)="0c268a927f1f6588b967481241ba7860005cf65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95425a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x27) 03:44:03 executing program 5: openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) ioctl$RNDADDENTROPY(0xffffffffffffffff, 0x40085203, &(0x7f0000000100)={0x6, 0xbc, "56f80f8d7c9ad684157765ee68815e033b7b2972a2d067318db9ac518603e0dbae813e160bd3f15b30c226056579cf64ac2525dd44c15e56204f1e3f1b8c03b31f4281605682d4b39a61b89636b3a2a5ea0bd3f5e8bd40d8c0406969d18fed78e4f4108902b5959ec383c40036f5262e703d6ad6a7a486302c382e45645bfe4c472249b482a28e9519e744cdbe884985d913612a17250eab7e4f0bf4b35aab9f7b923116a8d30baf612ca3bc2ef9b3f8d1c6b570cb60bd8d5b6805ce"}) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_sctp(0x2, 0x5, 0x84) dup3(0xffffffffffffffff, r0, 0x0) socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp_SCTP_AUTH_DEACTIVATE_KEY(0xffffffffffffffff, 0x84, 0x23, 0x0, 0x0) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f00000000c0)={0x51, 0xfffc, 0x0, {0x0, 0xf1}, {0x9}, @ramp={0x2, 0x3, {0x7fff, 0x0, 0x7, 0x7}}}) r1 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r1, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @bcast, @rose, @rose, @null]}, 0x48) listen(r1, 0x0) unshare(0x40000000) r2 = accept(r1, 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r3, 0xffffffffffffffff) write$binfmt_elf64(r2, &(0x7f00000002c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}], "", [[], []]}, 0x278) 03:44:03 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) sendmmsg$inet(r0, &(0x7f0000001100)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) 03:44:03 executing program 1: socket$netlink(0x10, 0x3, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x8949, &(0x7f0000000000)={'veth1_to_bond\x00', @ifru_hwaddr=@remote}) [ 722.434528][T27358] tipc: TX() has been purged, node left! 03:44:03 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x238) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) writev(r0, &(0x7f0000000540)=[{&(0x7f0000000140)="cedbddea5b67f4290aa7fd7c0cc7e2e613891a59fd3dc2e8a3c6e7c9fa", 0x1d}, {&(0x7f0000000340)="e4bc7c957b83ba155edae525e00f76c76056ac3fe8a5de5ccfba604ac6b0d4a0fd42802b43143a32d703bd21baddda61ba1cb78758f519c19a06193e8bfc0d1f1fad3be6885359773264bd", 0x4b}, {0x0}], 0x3) sendto$inet(r0, &(0x7f00000012c0)="0c268a927f1f6588b967481241ba7860005cf65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95425a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x27) 03:44:03 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x400007) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0x32600) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xb4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000040)='cpuset') write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000700)=ANY=[@ANYBLOB="006d176df3384ed3ddbcf3be0e26fd017529253262b78ee8b9d470"], 0x1b) ioctl$TUNSETCARRIER(0xffffffffffffffff, 0x400454e2, &(0x7f0000000080)=0x1) write$cgroup_int(r0, &(0x7f0000000380), 0x12) write$cgroup_int(r1, &(0x7f0000000400), 0xd) r2 = gettid() write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000000)=r2, 0x12) r3 = socket$kcm(0x2b, 0x0, 0x0) socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r3, 0x0, 0x0) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000280)=r2, 0x12) r4 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) close(r5) write$cgroup_type(r5, &(0x7f0000000080)='threaded\x00', 0xfffffc61) r6 = bpf$MAP_CREATE(0x2, &(0x7f0000009280), 0x3c) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x17, 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB], &(0x7f0000000200)='syzkaller\x00', 0xfa1, 0x0, 0x0, 0x41100, 0x2, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, &(0x7f0000000240), 0x8, 0x10, 0x0}, 0x78) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000008740)={0x0, 0x0, &(0x7f0000008700)=[{0x0}, {&(0x7f0000008680)=""/23, 0x17}, {&(0x7f00000086c0)=""/38, 0x26}], 0x3}, 0x8000) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x6, 0x2, 0x2e15579, 0x3f, 0x1, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffffff, 0x0, 0x5}, 0x3c) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0xb, [], 0x0, 0xc, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r7}, 0x7e) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r8, &(0x7f0000000000)=ANY=[], 0x50c000) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x18, 0x49, &(0x7f0000000a00)=ANY=[@ANYBLOB="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", @ANYRES32=r6, @ANYBLOB="00000000000000000c72c0fff6ffffff850000005b0000009500000000000000"], &(0x7f0000000040)='GPL\x00', 0x3ff, 0xd5, &(0x7f0000000080)=""/213, 0x61800, 0xab6c50112a8dd52c, [], 0x0, 0x16, 0xffffffffffffffff, 0x8, &(0x7f0000000180)={0xa, 0x1}, 0x8, 0x10, 0x0, 0x0, 0x0, r8}, 0x78) bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x11, 0x5, 0x81, 0x2, 0x100, r5, 0x3, [], 0x0, 0xffffffffffffffff, 0x4, 0x3}, 0x3c) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r9, &(0x7f0000000200), 0x806000) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, r4, 0x0, 0x2a8, &(0x7f0000000440)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\a\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83CZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x98\x86\"R\x06\x00\x00\x00\x00\x00\x00\x00\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&\x014\x01\xf4\xb7\x83\x9a\xfa*\xa6\x06\xb7Pk7N\xc2\xd9\xee\xd0\xb0M\x00\xab\xc3\t\fc\xd8dx\xd5\x1dU*s)\x12[\x14\xb1\xc0\xd7\x1a\xa0\x16\xa2z\x9e\x93 \xddeF>29\v\x02\xa2b\x13R\xef\xffA,\xb9.$\xfa\x9f\xde[\x80\xd1=\xce\x1b\xeb\xf6\xf4\xe3z\x1f\x9dz\xa3\xc0\xe2\xa2\xb1\xeeq\xf5\xec0\x8e\xf4\xfb\xd9\x87\xf03\xdb\xae|\x10&V5c\xa6\xce\xcd\x8a\xdf\xe1\x89\"\xea\xde\xe7\xa3\xbe\xe7\xff\xf9 \x11\xfdY\xc6\xa1\xe8\xda\v\\?\xcb\x87\bn\x9b\x01\x1f\xf8\xe8\x1eV\xfaC\xdf\xc3Vv\x9b\x1a\xfc\x14.c\x94\xc9=\xb0\x0f!d\b\x18*@m\x7f\xaal\x17G\xd6?\x81\x16P\x03\x10e\xc3\xcd\xb1B\xeb\x01B\\\x91A\xa1\x8an\xb4#\xadr\x1e\x81v\xa2\x0e6x\xca\x8b\xa6\xd8\x81\x10:\x0e(\xdd\xfc\xc9\xc6\xb4\xf0\'f:\xbd\xfe\x11\xf8\xc8W\x81s^\xd9W\xf1\x94\xaf\xc5\x8a\xb4f\x1b\x17E\xb23\x12\xb0\xeb\xef\x8c\xb24h\xd7}\x7f\x92Hgej\x957\xe2A'}, 0x30) [ 722.656485][T27358] tipc: TX() has been purged, node left! [ 722.670608][T30127] IPVS: ftp: loaded support on port[0] = 21 03:44:03 executing program 1: socket$netlink(0x10, 0x3, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x8949, &(0x7f0000000000)={'veth1_to_bond\x00', @ifru_hwaddr=@remote}) [ 722.797958][T27358] tipc: TX() has been purged, node left! [ 722.815059][T27358] tipc: TX() has been purged, node left! 03:44:03 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) sendmmsg$inet(r0, &(0x7f0000001100)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) [ 722.851324][T27358] tipc: TX() has been purged, node left! 03:44:03 executing program 5: openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) ioctl$RNDADDENTROPY(0xffffffffffffffff, 0x40085203, &(0x7f0000000100)={0x6, 0xbc, "56f80f8d7c9ad684157765ee68815e033b7b2972a2d067318db9ac518603e0dbae813e160bd3f15b30c226056579cf64ac2525dd44c15e56204f1e3f1b8c03b31f4281605682d4b39a61b89636b3a2a5ea0bd3f5e8bd40d8c0406969d18fed78e4f4108902b5959ec383c40036f5262e703d6ad6a7a486302c382e45645bfe4c472249b482a28e9519e744cdbe884985d913612a17250eab7e4f0bf4b35aab9f7b923116a8d30baf612ca3bc2ef9b3f8d1c6b570cb60bd8d5b6805ce"}) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_sctp(0x2, 0x5, 0x84) dup3(0xffffffffffffffff, r0, 0x0) socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp_SCTP_AUTH_DEACTIVATE_KEY(0xffffffffffffffff, 0x84, 0x23, 0x0, 0x0) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f00000000c0)={0x51, 0xfffc, 0x0, {0x0, 0xf1}, {0x9}, @ramp={0x2, 0x3, {0x7fff, 0x0, 0x7, 0x7}}}) r1 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r1, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @bcast, @rose, @rose, @null]}, 0x48) listen(r1, 0x0) unshare(0x40000000) r2 = accept(r1, 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r3, 0xffffffffffffffff) write$binfmt_elf64(r2, &(0x7f00000002c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}], "", [[], []]}, 0x278) 03:44:03 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x238) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) writev(r0, &(0x7f0000000540)=[{&(0x7f0000000140)="cedbddea5b67f4290aa7fd7c0cc7e2e613891a59fd3dc2e8a3c6e7c9fa96", 0x1e}, {&(0x7f0000000340)="e4bc7c957b83ba155edae525e00f76c76056ac3fe8a5de5ccfba604ac6b0d4a0fd42802b43143a32d703bd21baddda61ba1cb78758f519c19a06193e8bfc0d1f1fad3be6885359773264bd153a2bf50591662cca307c7a22f8a9e70629a1beac22b823bfee7fec832958c20007e0b8707c6ac0e8b1", 0x75}, {&(0x7f00000004c0)="4b8043af3b13f04c3ee02ee028e584b538cfb06be329d5ca0649880187b5cd5ff601bf", 0x23}, {&(0x7f0000000800)="87cfb3bd1ada6e425bdd5aaccdafa6e4ea74", 0x12}], 0x4) sendto$inet(r0, &(0x7f00000012c0)="0c268a927f1f6588b967481241ba7860005cf65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95425a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x27) 03:44:03 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_ifreq(r0, 0x0, &(0x7f0000000000)={'veth1_to_bond\x00', @ifru_hwaddr=@remote}) 03:44:04 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x400007) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0x32600) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xb4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000040)='cpuset') write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000700)=ANY=[@ANYBLOB="006d176df3384ed3ddbcf3be0e26fd017529253262b78ee8b9d470"], 0x1b) ioctl$TUNSETCARRIER(0xffffffffffffffff, 0x400454e2, &(0x7f0000000080)=0x1) write$cgroup_int(r0, &(0x7f0000000380), 0x12) write$cgroup_int(r1, &(0x7f0000000400), 0xd) r2 = gettid() write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000000)=r2, 0x12) r3 = socket$kcm(0x2b, 0x0, 0x0) socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r3, 0x0, 0x0) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000280)=r2, 0x12) r4 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) close(r5) write$cgroup_type(r5, &(0x7f0000000080)='threaded\x00', 0xfffffc61) r6 = bpf$MAP_CREATE(0x2, &(0x7f0000009280), 0x3c) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x17, 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB], &(0x7f0000000200)='syzkaller\x00', 0xfa1, 0x0, 0x0, 0x41100, 0x2, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, &(0x7f0000000240), 0x8, 0x10, 0x0}, 0x78) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000008740)={0x0, 0x0, &(0x7f0000008700)=[{0x0}, {&(0x7f0000008680)=""/23, 0x17}, {&(0x7f00000086c0)=""/38, 0x26}], 0x3}, 0x8000) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x6, 0x2, 0x2e15579, 0x3f, 0x1, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffffff, 0x0, 0x5}, 0x3c) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0xb, [], 0x0, 0xc, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r7}, 0x7e) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r8, &(0x7f0000000000)=ANY=[], 0x50c000) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x18, 0x49, &(0x7f0000000a00)=ANY=[@ANYBLOB="0000752c0000000000000000ffffffff9500000000000000181400006200ed587c1ba87fb23af22b6cf03fb851054ce322d4b3a5894516c0c1479e1cfbf3061ad7aef6d6c36e4e74a8219f8441192ab16361719f26a1e543525c94027f7a5f275546d8cacee044fc20d858e268019caeb1633cc4888faa05d02cd44de32962e022697754125edcfb3477c4e122a0e97ab43de94a7a94efd527400e2c2ff4468fd6e773773f089b268fddef712ab174487ae9049f64895522be3862156a1af15513c3ff285844c9aae255d74c0dacf6c47d6809ce69ee6e41a03a03b29152ee43afabd82aa883f260995238aa70895dc3aee59a119dc82fb5fd00af56ded09336e2df6a0bb41bd191d57b35eb262a1aa8d5fec51b24500685f8c0adaf3639790fdbd7cb2ac3af37a802a6ac7265a819c91986c45e7c54d91c5ced552d96c04a80c063fee16b3a52bc603deebe32e4e0dfdfe9d03658daad65606e175041076684110e66f74db9509b1a29e765c9208ddba13e3b42b3963dce5432c4fb7844a9b64c518820c9c0198fadb6ea6a350f89a1eb1a3c1e20527ce574c3514f9ad62be70eee070faa267d83564e6db87e4d16ccd118397c2e4825140e6b46c35edb77df7b9a3334ad3f8cb70b73f4b9d8b29eb50b2c2dfc8d82841a6251fcfcb978ce90873ddcfa0125800302f5ed70c724e0253fb45955750f1e7c94ca05a91ec592ee3a52fad94c89205ece2d1d96afbfa0b59f9bd6c1161c638fff8696973fedca3f3ddf5bbb1023", @ANYRES32=r6, @ANYBLOB="00000000000000000c72c0fff6ffffff850000005b0000009500000000000000"], &(0x7f0000000040)='GPL\x00', 0x3ff, 0xd5, &(0x7f0000000080)=""/213, 0x61800, 0xab6c50112a8dd52c, [], 0x0, 0x16, 0xffffffffffffffff, 0x8, &(0x7f0000000180)={0xa, 0x1}, 0x8, 0x10, 0x0, 0x0, 0x0, r8}, 0x78) bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x11, 0x5, 0x81, 0x2, 0x100, r5, 0x3, [], 0x0, 0xffffffffffffffff, 0x4, 0x3}, 0x3c) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r9, &(0x7f0000000200), 0x806000) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, r4, 0x0, 0x2a8, &(0x7f0000000440)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\a\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83CZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x98\x86\"R\x06\x00\x00\x00\x00\x00\x00\x00\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&\x014\x01\xf4\xb7\x83\x9a\xfa*\xa6\x06\xb7Pk7N\xc2\xd9\xee\xd0\xb0M\x00\xab\xc3\t\fc\xd8dx\xd5\x1dU*s)\x12[\x14\xb1\xc0\xd7\x1a\xa0\x16\xa2z\x9e\x93 \xddeF>29\v\x02\xa2b\x13R\xef\xffA,\xb9.$\xfa\x9f\xde[\x80\xd1=\xce\x1b\xeb\xf6\xf4\xe3z\x1f\x9dz\xa3\xc0\xe2\xa2\xb1\xeeq\xf5\xec0\x8e\xf4\xfb\xd9\x87\xf03\xdb\xae|\x10&V5c\xa6\xce\xcd\x8a\xdf\xe1\x89\"\xea\xde\xe7\xa3\xbe\xe7\xff\xf9 \x11\xfdY\xc6\xa1\xe8\xda\v\\?\xcb\x87\bn\x9b\x01\x1f\xf8\xe8\x1eV\xfaC\xdf\xc3Vv\x9b\x1a\xfc\x14.c\x94\xc9=\xb0\x0f!d\b\x18*@m\x7f\xaal\x17G\xd6?\x81\x16P\x03\x10e\xc3\xcd\xb1B\xeb\x01B\\\x91A\xa1\x8an\xb4#\xadr\x1e\x81v\xa2\x0e6x\xca\x8b\xa6\xd8\x81\x10:\x0e(\xdd\xfc\xc9\xc6\xb4\xf0\'f:\xbd\xfe\x11\xf8\xc8W\x81s^\xd9W\xf1\x94\xaf\xc5\x8a\xb4f\x1b\x17E\xb23\x12\xb0\xeb\xef\x8c\xb24h\xd7}\x7f\x92Hgej\x957\xe2A'}, 0x30) [ 723.019319][T27358] tipc: TX() has been purged, node left! 03:44:04 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) sendmmsg$inet(r0, &(0x7f0000001100)=[{{0x0, 0x0, &(0x7f0000000800)}}], 0x1, 0x0) 03:44:04 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x238) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) writev(r0, &(0x7f0000000540)=[{&(0x7f0000000140)="cedbddea5b67f4290aa7fd7c0cc7e2e613891a59fd3dc2e8a3c6e7c9fa96", 0x1e}, {&(0x7f0000000340)="e4bc7c957b83ba155edae525e00f76c76056ac3fe8a5de5ccfba604ac6b0d4a0fd42802b43143a32d703bd21baddda61ba1cb78758f519c19a06193e8bfc0d1f1fad3be6885359773264bd", 0x4b}, {0x0}], 0x3) sendto$inet(0xffffffffffffffff, &(0x7f00000012c0)="0c268a927f1f6588b967481241ba7860005cf65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95425a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x27) [ 723.206409][T27358] tipc: TX() has been purged, node left! [ 723.215178][T30153] IPVS: ftp: loaded support on port[0] = 21 03:44:04 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) sendmmsg$inet(r0, &(0x7f0000001100)=[{{0x0, 0x0, &(0x7f0000000800)}}], 0x1, 0x0) [ 723.312296][T27358] tipc: TX() has been purged, node left! [ 723.318292][T27358] tipc: TX() has been purged, node left! [ 723.326916][T27358] tipc: TX() has been purged, node left! 03:44:04 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_ifreq(r0, 0x0, &(0x7f0000000000)={'veth1_to_bond\x00', @ifru_hwaddr=@remote}) 03:44:04 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x238) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) writev(r0, &(0x7f0000000540)=[{&(0x7f0000000140)="cedbddea5b67f4290aa7fd7c0cc7e2e613891a59fd3dc2e8a3c6e7c9fa96", 0x1e}, {&(0x7f0000000340)="e4bc7c957b83ba155edae525e00f76c76056ac3fe8a5de5ccfba604ac6b0d4a0fd42802b43143a32d703bd21baddda61ba1cb78758f519c19a06193e8bfc0d1f1fad3be6885359773264bd", 0x4b}, {0x0}], 0x3) sendto$inet(0xffffffffffffffff, &(0x7f00000012c0)="0c268a927f1f6588b967481241ba7860005cf65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95425a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x27) 03:44:04 executing program 5: openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) ioctl$RNDADDENTROPY(0xffffffffffffffff, 0x40085203, &(0x7f0000000100)={0x6, 0xbc, "56f80f8d7c9ad684157765ee68815e033b7b2972a2d067318db9ac518603e0dbae813e160bd3f15b30c226056579cf64ac2525dd44c15e56204f1e3f1b8c03b31f4281605682d4b39a61b89636b3a2a5ea0bd3f5e8bd40d8c0406969d18fed78e4f4108902b5959ec383c40036f5262e703d6ad6a7a486302c382e45645bfe4c472249b482a28e9519e744cdbe884985d913612a17250eab7e4f0bf4b35aab9f7b923116a8d30baf612ca3bc2ef9b3f8d1c6b570cb60bd8d5b6805ce"}) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_sctp(0x2, 0x5, 0x84) dup3(0xffffffffffffffff, r0, 0x0) socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp_SCTP_AUTH_DEACTIVATE_KEY(0xffffffffffffffff, 0x84, 0x23, 0x0, 0x0) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f00000000c0)={0x51, 0xfffc, 0x0, {0x0, 0xf1}, {0x9}, @ramp={0x2, 0x3, {0x7fff, 0x0, 0x7, 0x7}}}) r1 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r1, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @bcast, @rose, @rose, @null]}, 0x48) listen(r1, 0x0) unshare(0x40000000) r2 = accept(r1, 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r3, 0xffffffffffffffff) write$binfmt_elf64(r2, &(0x7f00000002c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}], "", [[], []]}, 0x278) 03:44:04 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) sendmmsg$inet(r0, &(0x7f0000001100)=[{{0x0, 0x0, &(0x7f0000000800)}}], 0x1, 0x0) 03:44:04 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x238) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) writev(r0, &(0x7f0000000540)=[{&(0x7f0000000140)="cedbddea5b67f4290aa7fd7c0cc7e2e613891a59fd3dc2e8a3c6e7c9fa96", 0x1e}, {&(0x7f0000000340)="e4bc7c957b83ba155edae525e00f76c76056ac3fe8a5de5ccfba604ac6b0d4a0fd42802b43143a32d703bd21baddda61ba1cb78758f519c19a06193e8bfc0d1f1fad3be6885359773264bd153a2bf50591662cca307c7a22f8a9e70629a1beac22b823bfee7fec832958c20007e0b8707c6ac0e8b1", 0x75}, {&(0x7f00000004c0)="4b8043af3b13f04c3ee02ee028e584b538cfb06be329d5ca0649880187b5cd5ff601bf", 0x23}, {&(0x7f0000000800)="87cfb3bd1ada6e425bdd5aaccdafa6e4ea74", 0x12}], 0x4) sendto$inet(r0, &(0x7f00000012c0)="0c268a927f1f6588b967481241ba7860005cf65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95425a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x27) 03:44:04 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_ifreq(r0, 0x0, &(0x7f0000000000)={'veth1_to_bond\x00', @ifru_hwaddr=@remote}) 03:44:04 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x400007) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0x32600) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xb4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000040)='cpuset') write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000700)=ANY=[@ANYBLOB="006d176df3384ed3ddbcf3be0e26fd017529253262b78ee8b9d470"], 0x1b) ioctl$TUNSETCARRIER(0xffffffffffffffff, 0x400454e2, &(0x7f0000000080)=0x1) write$cgroup_int(r0, &(0x7f0000000380), 0x12) write$cgroup_int(r1, &(0x7f0000000400), 0xd) r2 = gettid() write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000000)=r2, 0x12) r3 = socket$kcm(0x2b, 0x0, 0x0) socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r3, 0x0, 0x0) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000280)=r2, 0x12) r4 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) close(r5) write$cgroup_type(r5, &(0x7f0000000080)='threaded\x00', 0xfffffc61) r6 = bpf$MAP_CREATE(0x2, &(0x7f0000009280), 0x3c) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x17, 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB], &(0x7f0000000200)='syzkaller\x00', 0xfa1, 0x0, 0x0, 0x41100, 0x2, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, &(0x7f0000000240), 0x8, 0x10, 0x0}, 0x78) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000008740)={0x0, 0x0, &(0x7f0000008700)=[{0x0}, {&(0x7f0000008680)=""/23, 0x17}, {&(0x7f00000086c0)=""/38, 0x26}], 0x3}, 0x8000) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x6, 0x2, 0x2e15579, 0x3f, 0x1, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffffff, 0x0, 0x5}, 0x3c) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0xb, [], 0x0, 0xc, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r7}, 0x7e) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r8, &(0x7f0000000000)=ANY=[], 0x50c000) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x18, 0x8, &(0x7f0000000a00)=ANY=[@ANYBLOB="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", @ANYRES32=r6, @ANYBLOB="00000000000000000c72c0fff6ffffff850000005b0000009500000000000000"], &(0x7f0000000040)='GPL\x00', 0x3ff, 0xd5, &(0x7f0000000080)=""/213, 0x61800, 0xab6c50112a8dd52c, [], 0x0, 0x16, 0xffffffffffffffff, 0x8, &(0x7f0000000180)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000001c0)={0x0, 0x6, 0x6, 0x5}, 0x10, 0x0, r8}, 0x78) bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x11, 0x5, 0x81, 0x2, 0x100, r5, 0x3, [], 0x0, 0xffffffffffffffff, 0x4, 0x3}, 0x3c) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r9, &(0x7f0000000200), 0x806000) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, r4, 0x0, 0x2a8, &(0x7f0000000440)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\a\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83CZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x98\x86\"R\x06\x00\x00\x00\x00\x00\x00\x00\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&\x014\x01\xf4\xb7\x83\x9a\xfa*\xa6\x06\xb7Pk7N\xc2\xd9\xee\xd0\xb0M\x00\xab\xc3\t\fc\xd8dx\xd5\x1dU*s)\x12[\x14\xb1\xc0\xd7\x1a\xa0\x16\xa2z\x9e\x93 \xddeF>29\v\x02\xa2b\x13R\xef\xffA,\xb9.$\xfa\x9f\xde[\x80\xd1=\xce\x1b\xeb\xf6\xf4\xe3z\x1f\x9dz\xa3\xc0\xe2\xa2\xb1\xeeq\xf5\xec0\x8e\xf4\xfb\xd9\x87\xf03\xdb\xae|\x10&V5c\xa6\xce\xcd\x8a\xdf\xe1\x89\"\xea\xde\xe7\xa3\xbe\xe7\xff\xf9 \x11\xfdY\xc6\xa1\xe8\xda\v\\?\xcb\x87\bn\x9b\x01\x1f\xf8\xe8\x1eV\xfaC\xdf\xc3Vv\x9b\x1a\xfc\x14.c\x94\xc9=\xb0\x0f!d\b\x18*@m\x7f\xaal\x17G\xd6?\x81\x16P\x03\x10e\xc3\xcd\xb1B\xeb\x01B\\\x91A\xa1\x8an\xb4#\xadr\x1e\x81v\xa2\x0e6x\xca\x8b\xa6\xd8\x81\x10:\x0e(\xdd\xfc\xc9\xc6\xb4\xf0\'f:\xbd\xfe\x11\xf8\xc8W\x81s^\xd9W\xf1\x94\xaf\xc5\x8a\xb4f\x1b\x17E\xb23\x12\xb0\xeb\xef\x8c\xb24h\xd7}\x7f\x92Hgej\x957\xe2A'}, 0x30) 03:44:04 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x238) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) writev(r0, &(0x7f0000000540)=[{&(0x7f0000000140)="cedbddea5b67f4290aa7fd7c0cc7e2e613891a59fd3dc2e8a3c6e7c9fa96", 0x1e}, {&(0x7f0000000340)="e4bc7c957b83ba155edae525e00f76c76056ac3fe8a5de5ccfba604ac6b0d4a0fd42802b43143a32d703bd21baddda61ba1cb78758f519c19a06193e8bfc0d1f1fad3be6885359773264bd", 0x4b}, {0x0}], 0x3) sendto$inet(0xffffffffffffffff, &(0x7f00000012c0)="0c268a927f1f6588b967481241ba7860005cf65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95425a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x27) [ 723.823237][T30182] IPVS: ftp: loaded support on port[0] = 21 03:44:04 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) sendmmsg$inet(r0, &(0x7f0000001100)=[{{0x0, 0x0, &(0x7f0000000800)=[{0x0}], 0x1}}], 0x1, 0x0) 03:44:05 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_ifreq(r0, 0x8949, 0x0) 03:44:05 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x238) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) writev(r0, &(0x7f0000000540)=[{&(0x7f0000000140)="cedbddea5b67f4290aa7fd7c0cc7e2e613891a59fd3dc2e8a3c6e7c9fa96", 0x1e}, {&(0x7f0000000340)="e4bc7c957b83ba155edae525e00f76c76056ac3fe8a5de5ccfba604ac6b0d4a0fd42802b43143a32d703bd21baddda61ba1cb78758f519c19a06193e8bfc0d1f1fad3be6885359773264bd", 0x4b}, {0x0}], 0x3) sendto$inet(r0, 0x0, 0x0, 0x11, 0x0, 0x0) 03:44:05 executing program 5: openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) ioctl$RNDADDENTROPY(0xffffffffffffffff, 0x40085203, &(0x7f0000000100)={0x6, 0xbc, "56f80f8d7c9ad684157765ee68815e033b7b2972a2d067318db9ac518603e0dbae813e160bd3f15b30c226056579cf64ac2525dd44c15e56204f1e3f1b8c03b31f4281605682d4b39a61b89636b3a2a5ea0bd3f5e8bd40d8c0406969d18fed78e4f4108902b5959ec383c40036f5262e703d6ad6a7a486302c382e45645bfe4c472249b482a28e9519e744cdbe884985d913612a17250eab7e4f0bf4b35aab9f7b923116a8d30baf612ca3bc2ef9b3f8d1c6b570cb60bd8d5b6805ce"}) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_sctp(0x2, 0x5, 0x84) dup3(0xffffffffffffffff, r0, 0x0) socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp_SCTP_AUTH_DEACTIVATE_KEY(0xffffffffffffffff, 0x84, 0x23, 0x0, 0x0) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f00000000c0)={0x51, 0xfffc, 0x0, {0x103}, {0x9}, @ramp={0x2, 0x3, {0x7fff, 0x0, 0x7, 0x7}}}) r1 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r1, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @bcast, @rose, @rose, @null]}, 0x48) listen(r1, 0x0) unshare(0x40000000) r2 = accept(r1, 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r3, 0xffffffffffffffff) write$binfmt_elf64(r2, &(0x7f00000002c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}], "", [[], []]}, 0x278) 03:44:05 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x238) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) writev(r0, &(0x7f0000000540)=[{&(0x7f0000000140)="cedbddea5b67f4290aa7fd7c0cc7e2e613891a59fd3dc2e8a3c6e7c9fa96", 0x1e}, {&(0x7f0000000340)="e4bc7c957b83ba155edae525e00f76c76056ac3fe8a5de5ccfba604ac6b0d4a0fd42802b43143a32d703bd21baddda61ba1cb78758f519c19a06193e8bfc0d1f1fad3be6885359773264bd153a2bf50591662cca307c7a22f8a9e70629a1beac22b823bfee7fec832958c20007e0b8707c6ac0e8b1", 0x75}, {&(0x7f00000004c0)="4b8043af3b13f04c3ee02ee028e584b538cfb06be329d5ca0649880187b5cd5ff601bf", 0x23}, {&(0x7f0000000800)="87cfb3bd1ada6e425bdd5aaccdafa6e4ea74", 0x12}], 0x4) sendto$inet(r0, &(0x7f00000012c0)="0c268a927f1f6588b967481241ba7860005cf65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95425a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x27) 03:44:05 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x400007) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0x32600) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xb4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000040)='cpuset') write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000700)=ANY=[@ANYBLOB="006d176df3384ed3ddbcf3be0e26fd017529253262b78ee8b9d470"], 0x1b) ioctl$TUNSETCARRIER(0xffffffffffffffff, 0x400454e2, &(0x7f0000000080)=0x1) write$cgroup_int(r0, &(0x7f0000000380), 0x12) write$cgroup_int(r1, &(0x7f0000000400), 0xd) r2 = gettid() write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000000)=r2, 0x12) r3 = socket$kcm(0x2b, 0x0, 0x0) socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r3, 0x0, 0x0) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000280)=r2, 0x12) r4 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) close(r5) write$cgroup_type(r5, &(0x7f0000000080)='threaded\x00', 0xfffffc61) r6 = bpf$MAP_CREATE(0x2, &(0x7f0000009280), 0x3c) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x17, 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB], &(0x7f0000000200)='syzkaller\x00', 0xfa1, 0x0, 0x0, 0x41100, 0x2, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, &(0x7f0000000240), 0x8, 0x10, 0x0}, 0x78) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000008740)={0x0, 0x0, &(0x7f0000008700)=[{0x0}, {&(0x7f0000008680)=""/23, 0x17}, {&(0x7f00000086c0)=""/38, 0x26}], 0x3}, 0x8000) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x6, 0x2, 0x2e15579, 0x3f, 0x1, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffffff, 0x0, 0x5}, 0x3c) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0xb, [], 0x0, 0xc, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r7}, 0x7e) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r8, &(0x7f0000000000)=ANY=[], 0x50c000) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x18, 0x8, &(0x7f0000000a00)=ANY=[@ANYBLOB="0000752c0000000000000000ffffffff9500000000000000181400006200ed587c1ba87fb23af22b6cf03fb851054ce322d4b3a5894516c0c1479e1cfbf3061ad7aef6d6c36e4e74a8219f8441192ab16361719f26a1e543525c94027f7a5f275546d8cacee044fc20d858e268019caeb1633cc4888faa05d02cd44de32962e022697754125edcfb3477c4e122a0e97ab43de94a7a94efd527400e2c2ff4468fd6e773773f089b268fddef712ab174487ae9049f64895522be3862156a1af15513c3ff285844c9aae255d74c0dacf6c47d6809ce69ee6e41a03a03b29152ee43afabd82aa883f260995238aa70895dc3aee59a119dc82fb5fd00af56ded09336e2df6a0bb41bd191d57b35eb262a1aa8d5fec51b24500685f8c0adaf3639790fdbd7cb2ac3af37a802a6ac7265a819c91986c45e7c54d91c5ced552d96c04a80c063fee16b3a52bc603deebe32e4e0dfdfe9d03658daad65606e175041076684110e66f74db9509b1a29e765c9208ddba13e3b42b3963dce5432c4fb7844a9b64c518820c9c0198fadb6ea6a350f89a1eb1a3c1e20527ce574c3514f9ad62be70eee070faa267d83564e6db87e4d16ccd118397c2e4825140e6b46c35edb77df7b9a3334ad3f8cb70b73f4b9d8b29eb50b2c2dfc8d82841a6251fcfcb978ce90873ddcfa0125800302f5ed70c724e0253fb45955750f1e7c94ca05a91ec592ee3a52fad94c89205ece2d1d96afbfa0b59f9bd6c1161c638fff8696973fedca3f3ddf5bbb1023", @ANYRES32=r6, @ANYBLOB="00000000000000000c72c0fff6ffffff850000005b0000009500000000000000"], &(0x7f0000000040)='GPL\x00', 0x3ff, 0xd5, &(0x7f0000000080)=""/213, 0x61800, 0xab6c50112a8dd52c, [], 0x0, 0x16, 0xffffffffffffffff, 0x8, &(0x7f0000000180)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000001c0)={0x0, 0x6, 0x6, 0x5}, 0x10, 0x0, r8}, 0x78) bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x11, 0x5, 0x81, 0x2, 0x100, r5, 0x3, [], 0x0, 0xffffffffffffffff, 0x4, 0x3}, 0x3c) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r9, &(0x7f0000000200), 0x806000) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, r4, 0x0, 0x2a8, &(0x7f0000000440)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\a\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83CZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x98\x86\"R\x06\x00\x00\x00\x00\x00\x00\x00\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&\x014\x01\xf4\xb7\x83\x9a\xfa*\xa6\x06\xb7Pk7N\xc2\xd9\xee\xd0\xb0M\x00\xab\xc3\t\fc\xd8dx\xd5\x1dU*s)\x12[\x14\xb1\xc0\xd7\x1a\xa0\x16\xa2z\x9e\x93 \xddeF>29\v\x02\xa2b\x13R\xef\xffA,\xb9.$\xfa\x9f\xde[\x80\xd1=\xce\x1b\xeb\xf6\xf4\xe3z\x1f\x9dz\xa3\xc0\xe2\xa2\xb1\xeeq\xf5\xec0\x8e\xf4\xfb\xd9\x87\xf03\xdb\xae|\x10&V5c\xa6\xce\xcd\x8a\xdf\xe1\x89\"\xea\xde\xe7\xa3\xbe\xe7\xff\xf9 \x11\xfdY\xc6\xa1\xe8\xda\v\\?\xcb\x87\bn\x9b\x01\x1f\xf8\xe8\x1eV\xfaC\xdf\xc3Vv\x9b\x1a\xfc\x14.c\x94\xc9=\xb0\x0f!d\b\x18*@m\x7f\xaal\x17G\xd6?\x81\x16P\x03\x10e\xc3\xcd\xb1B\xeb\x01B\\\x91A\xa1\x8an\xb4#\xadr\x1e\x81v\xa2\x0e6x\xca\x8b\xa6\xd8\x81\x10:\x0e(\xdd\xfc\xc9\xc6\xb4\xf0\'f:\xbd\xfe\x11\xf8\xc8W\x81s^\xd9W\xf1\x94\xaf\xc5\x8a\xb4f\x1b\x17E\xb23\x12\xb0\xeb\xef\x8c\xb24h\xd7}\x7f\x92Hgej\x957\xe2A'}, 0x30) 03:44:05 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_ifreq(r0, 0x8949, 0x0) 03:44:05 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) sendmmsg$inet(r0, &(0x7f0000001100)=[{{0x0, 0x0, &(0x7f0000000800)=[{0x0}], 0x1}}], 0x1, 0x0) 03:44:05 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x238) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) writev(r0, &(0x7f0000000540)=[{&(0x7f0000000140)="cedbddea5b67f4290aa7fd7c0cc7e2e613891a59fd3dc2e8a3c6e7c9fa96", 0x1e}, {&(0x7f0000000340)="e4bc7c957b83ba155edae525e00f76c76056ac3fe8a5de5ccfba604ac6b0d4a0fd42802b43143a32d703bd21baddda61ba1cb78758f519c19a06193e8bfc0d1f1fad3be6885359773264bd", 0x4b}, {0x0}], 0x3) sendto$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) [ 724.431213][T30213] IPVS: ftp: loaded support on port[0] = 21 03:44:05 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_ifreq(r0, 0x8949, 0x0) 03:44:05 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) sendmmsg$inet(r0, &(0x7f0000001100)=[{{0x0, 0x0, &(0x7f0000000800)=[{0x0}], 0x1}}], 0x1, 0x0) 03:44:05 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x238) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) writev(r0, &(0x7f0000000540)=[{&(0x7f0000000140)="cedbddea5b67f4290aa7fd7c0cc7e2e613891a59fd3dc2e8a3c6e7c9fa96", 0x1e}, {&(0x7f0000000340)="e4bc7c957b83ba155edae525e00f76c76056ac3fe8a5de5ccfba604ac6b0d4a0fd42802b43143a32d703bd21baddda61ba1cb78758f519c19a06193e8bfc0d1f1fad3be6885359773264bd", 0x4b}, {0x0}], 0x3) sendto$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 03:44:05 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454ca, &(0x7f0000000040)={'\x00', 0x2}) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f00000000c0)={0x0, &(0x7f0000000200)}) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f00000000c0)={0x1, &(0x7f0000000200)=[{0x6}]}) 03:44:05 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x400007) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0x32600) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xb4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000040)='cpuset') write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000700)=ANY=[@ANYBLOB="006d176df3384ed3ddbcf3be0e26fd017529253262b78ee8b9d470"], 0x1b) ioctl$TUNSETCARRIER(0xffffffffffffffff, 0x400454e2, &(0x7f0000000080)=0x1) write$cgroup_int(r0, &(0x7f0000000380), 0x12) write$cgroup_int(r1, &(0x7f0000000400), 0xd) r2 = gettid() write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000000)=r2, 0x12) r3 = socket$kcm(0x2b, 0x0, 0x0) socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r3, 0x0, 0x0) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000280)=r2, 0x12) r4 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) close(r5) write$cgroup_type(r5, &(0x7f0000000080)='threaded\x00', 0xfffffc61) r6 = bpf$MAP_CREATE(0x2, &(0x7f0000009280), 0x3c) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x17, 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB], &(0x7f0000000200)='syzkaller\x00', 0xfa1, 0x0, 0x0, 0x41100, 0x2, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, &(0x7f0000000240), 0x8, 0x10, 0x0}, 0x78) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000008740)={0x0, 0x0, &(0x7f0000008700)=[{0x0}, {&(0x7f0000008680)=""/23, 0x17}, {&(0x7f00000086c0)=""/38, 0x26}], 0x3}, 0x8000) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x6, 0x2, 0x2e15579, 0x3f, 0x1, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffffff, 0x0, 0x5}, 0x3c) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0xb, [], 0x0, 0xc, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r7}, 0x7e) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r8, &(0x7f0000000000)=ANY=[], 0x50c000) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x18, 0x8, &(0x7f0000000a00)=ANY=[@ANYBLOB="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", @ANYRES32=r6, @ANYBLOB="00000000000000000c72c0fff6ffffff850000005b0000009500000000000000"], &(0x7f0000000040)='GPL\x00', 0x3ff, 0xd5, &(0x7f0000000080)=""/213, 0x61800, 0xab6c50112a8dd52c, [], 0x0, 0x16, 0xffffffffffffffff, 0x8, &(0x7f0000000180)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000001c0)={0x0, 0x6, 0x6, 0x5}, 0x10, 0x0, r8}, 0x78) bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x11, 0x5, 0x81, 0x2, 0x100, r5, 0x3, [], 0x0, 0xffffffffffffffff, 0x4, 0x3}, 0x3c) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r9, &(0x7f0000000200), 0x806000) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, r4, 0x0, 0x2a8, &(0x7f0000000440)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\a\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83CZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x98\x86\"R\x06\x00\x00\x00\x00\x00\x00\x00\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&\x014\x01\xf4\xb7\x83\x9a\xfa*\xa6\x06\xb7Pk7N\xc2\xd9\xee\xd0\xb0M\x00\xab\xc3\t\fc\xd8dx\xd5\x1dU*s)\x12[\x14\xb1\xc0\xd7\x1a\xa0\x16\xa2z\x9e\x93 \xddeF>29\v\x02\xa2b\x13R\xef\xffA,\xb9.$\xfa\x9f\xde[\x80\xd1=\xce\x1b\xeb\xf6\xf4\xe3z\x1f\x9dz\xa3\xc0\xe2\xa2\xb1\xeeq\xf5\xec0\x8e\xf4\xfb\xd9\x87\xf03\xdb\xae|\x10&V5c\xa6\xce\xcd\x8a\xdf\xe1\x89\"\xea\xde\xe7\xa3\xbe\xe7\xff\xf9 \x11\xfdY\xc6\xa1\xe8\xda\v\\?\xcb\x87\bn\x9b\x01\x1f\xf8\xe8\x1eV\xfaC\xdf\xc3Vv\x9b\x1a\xfc\x14.c\x94\xc9=\xb0\x0f!d\b\x18*@m\x7f\xaal\x17G\xd6?\x81\x16P\x03\x10e\xc3\xcd\xb1B\xeb\x01B\\\x91A\xa1\x8an\xb4#\xadr\x1e\x81v\xa2\x0e6x\xca\x8b\xa6\xd8\x81\x10:\x0e(\xdd\xfc\xc9\xc6\xb4\xf0\'f:\xbd\xfe\x11\xf8\xc8W\x81s^\xd9W\xf1\x94\xaf\xc5\x8a\xb4f\x1b\x17E\xb23\x12\xb0\xeb\xef\x8c\xb24h\xd7}\x7f\x92Hgej\x957\xe2A'}, 0x30) 03:44:05 executing program 5: openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) ioctl$RNDADDENTROPY(0xffffffffffffffff, 0x40085203, &(0x7f0000000100)={0x6, 0xbc, "56f80f8d7c9ad684157765ee68815e033b7b2972a2d067318db9ac518603e0dbae813e160bd3f15b30c226056579cf64ac2525dd44c15e56204f1e3f1b8c03b31f4281605682d4b39a61b89636b3a2a5ea0bd3f5e8bd40d8c0406969d18fed78e4f4108902b5959ec383c40036f5262e703d6ad6a7a486302c382e45645bfe4c472249b482a28e9519e744cdbe884985d913612a17250eab7e4f0bf4b35aab9f7b923116a8d30baf612ca3bc2ef9b3f8d1c6b570cb60bd8d5b6805ce"}) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_sctp(0x2, 0x5, 0x84) dup3(0xffffffffffffffff, r0, 0x0) socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp_SCTP_AUTH_DEACTIVATE_KEY(0xffffffffffffffff, 0x84, 0x23, 0x0, 0x0) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f00000000c0)={0x51, 0xfffc, 0x0, {0x103}, {0x9}, @ramp={0x2, 0x3, {0x7fff, 0x0, 0x7, 0x7}}}) r1 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r1, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @bcast, @rose, @rose, @null]}, 0x48) listen(r1, 0x0) unshare(0x40000000) r2 = accept(r1, 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r3, 0xffffffffffffffff) write$binfmt_elf64(r2, &(0x7f00000002c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}], "", [[], []]}, 0x278) 03:44:05 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x238) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) writev(r0, &(0x7f0000000540)=[{&(0x7f0000000140)="cedbddea5b67f4290aa7fd7c0cc7e2e613891a59fd3dc2e8a3c6e7c9fa96", 0x1e}, {&(0x7f0000000340)="e4bc7c957b83ba155edae525e00f76c76056ac3fe8a5de5ccfba604ac6b0d4a0fd42802b43143a32d703bd21baddda61ba1cb78758f519c19a06193e8bfc0d1f1fad3be6885359773264bd", 0x4b}, {0x0}], 0x3) sendto$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 03:44:06 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x238) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) writev(r0, &(0x7f0000000540)=[{&(0x7f0000000140)="cedbddea5b67f4290aa7fd7c0cc7e2e613891a59fd3dc2e8a3c6e7c9fa96", 0x1e}, {&(0x7f00000004c0)="4b8043af3b13f04c3ee02ee028e584b538cfb06be329d5ca0649880187b5cd5ff601bf73", 0x24}, {&(0x7f0000000800)="87cfb3bd1ada6e425bdd5aaccdafa6e4ea74", 0x12}], 0x3) sendto$inet(r0, &(0x7f00000012c0)="0c268a927f1f6588b967481241ba7860005cf65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95425a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x27) 03:44:06 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) sendmmsg$inet(r0, &(0x7f0000001100)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000001340)}], 0x1}}], 0x1, 0x0) [ 725.150256][T30249] IPVS: ftp: loaded support on port[0] = 21 03:44:06 executing program 2: r0 = getpgrp(0xffffffffffffffff) syz_open_procfs$namespace(r0, 0x0) 03:44:06 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x400007) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0x32600) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xb4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000040)='cpuset') write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000700)=ANY=[@ANYBLOB="006d176df3384ed3ddbcf3be0e26fd017529253262b78ee8b9d470"], 0x1b) ioctl$TUNSETCARRIER(0xffffffffffffffff, 0x400454e2, &(0x7f0000000080)=0x1) write$cgroup_int(r0, &(0x7f0000000380), 0x12) write$cgroup_int(r1, &(0x7f0000000400), 0xd) r2 = gettid() write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000000)=r2, 0x12) r3 = socket$kcm(0x2b, 0x0, 0x0) socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r3, 0x0, 0x0) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000280)=r2, 0x12) r4 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) close(r5) write$cgroup_type(r5, &(0x7f0000000080)='threaded\x00', 0xfffffc61) r6 = bpf$MAP_CREATE(0x2, &(0x7f0000009280), 0x3c) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x17, 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB], &(0x7f0000000200)='syzkaller\x00', 0xfa1, 0x0, 0x0, 0x41100, 0x2, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, &(0x7f0000000240), 0x8, 0x10, 0x0}, 0x78) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000008740)={0x0, 0x0, &(0x7f0000008700)=[{0x0}, {&(0x7f0000008680)=""/23, 0x17}, {&(0x7f00000086c0)=""/38, 0x26}], 0x3}, 0x8000) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x6, 0x2, 0x2e15579, 0x3f, 0x1, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffffff, 0x0, 0x5}, 0x3c) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0xb, [], 0x0, 0xc, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r7}, 0x7e) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r8, &(0x7f0000000000)=ANY=[], 0x50c000) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x18, 0x8, &(0x7f0000000a00)=ANY=[@ANYBLOB="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", @ANYRES32=r6, @ANYBLOB="00000000000000000c72c0fff6ffffff850000005b0000009500000000000000"], &(0x7f0000000040)='GPL\x00', 0x3ff, 0xd5, &(0x7f0000000080)=""/213, 0x61800, 0xab6c50112a8dd52c, [], 0x0, 0x16, 0xffffffffffffffff, 0x8, &(0x7f0000000180)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000001c0)={0x2, 0x0, 0x6, 0x5}, 0x10, 0x0, r8}, 0x78) bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x11, 0x5, 0x81, 0x2, 0x100, r5, 0x3, [], 0x0, 0xffffffffffffffff, 0x4, 0x3}, 0x3c) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r9, &(0x7f0000000200), 0x806000) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, r4, 0x0, 0x2a8, &(0x7f0000000440)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\a\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83CZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x98\x86\"R\x06\x00\x00\x00\x00\x00\x00\x00\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&\x014\x01\xf4\xb7\x83\x9a\xfa*\xa6\x06\xb7Pk7N\xc2\xd9\xee\xd0\xb0M\x00\xab\xc3\t\fc\xd8dx\xd5\x1dU*s)\x12[\x14\xb1\xc0\xd7\x1a\xa0\x16\xa2z\x9e\x93 \xddeF>29\v\x02\xa2b\x13R\xef\xffA,\xb9.$\xfa\x9f\xde[\x80\xd1=\xce\x1b\xeb\xf6\xf4\xe3z\x1f\x9dz\xa3\xc0\xe2\xa2\xb1\xeeq\xf5\xec0\x8e\xf4\xfb\xd9\x87\xf03\xdb\xae|\x10&V5c\xa6\xce\xcd\x8a\xdf\xe1\x89\"\xea\xde\xe7\xa3\xbe\xe7\xff\xf9 \x11\xfdY\xc6\xa1\xe8\xda\v\\?\xcb\x87\bn\x9b\x01\x1f\xf8\xe8\x1eV\xfaC\xdf\xc3Vv\x9b\x1a\xfc\x14.c\x94\xc9=\xb0\x0f!d\b\x18*@m\x7f\xaal\x17G\xd6?\x81\x16P\x03\x10e\xc3\xcd\xb1B\xeb\x01B\\\x91A\xa1\x8an\xb4#\xadr\x1e\x81v\xa2\x0e6x\xca\x8b\xa6\xd8\x81\x10:\x0e(\xdd\xfc\xc9\xc6\xb4\xf0\'f:\xbd\xfe\x11\xf8\xc8W\x81s^\xd9W\xf1\x94\xaf\xc5\x8a\xb4f\x1b\x17E\xb23\x12\xb0\xeb\xef\x8c\xb24h\xd7}\x7f\x92Hgej\x957\xe2A'}, 0x30) 03:44:06 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) sendmmsg$inet(r0, &(0x7f0000001100)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000001340)}], 0x1}}], 0x1, 0x0) 03:44:06 executing program 5: openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) ioctl$RNDADDENTROPY(0xffffffffffffffff, 0x40085203, &(0x7f0000000100)={0x6, 0xbc, "56f80f8d7c9ad684157765ee68815e033b7b2972a2d067318db9ac518603e0dbae813e160bd3f15b30c226056579cf64ac2525dd44c15e56204f1e3f1b8c03b31f4281605682d4b39a61b89636b3a2a5ea0bd3f5e8bd40d8c0406969d18fed78e4f4108902b5959ec383c40036f5262e703d6ad6a7a486302c382e45645bfe4c472249b482a28e9519e744cdbe884985d913612a17250eab7e4f0bf4b35aab9f7b923116a8d30baf612ca3bc2ef9b3f8d1c6b570cb60bd8d5b6805ce"}) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_sctp(0x2, 0x5, 0x84) dup3(0xffffffffffffffff, r0, 0x0) socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp_SCTP_AUTH_DEACTIVATE_KEY(0xffffffffffffffff, 0x84, 0x23, 0x0, 0x0) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f00000000c0)={0x51, 0xfffc, 0x0, {0x103}, {0x9}, @ramp={0x2, 0x3, {0x7fff, 0x0, 0x7, 0x7}}}) r1 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r1, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @bcast, @rose, @rose, @null]}, 0x48) listen(r1, 0x0) unshare(0x40000000) r2 = accept(r1, 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r3, 0xffffffffffffffff) write$binfmt_elf64(r2, &(0x7f00000002c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}], "", [[], []]}, 0x278) 03:44:06 executing program 2: r0 = getpgrp(0xffffffffffffffff) syz_open_procfs$namespace(r0, 0x0) 03:44:06 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454ca, &(0x7f0000000040)={'\x00', 0x2}) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f00000000c0)={0x0, &(0x7f0000000200)}) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f00000000c0)={0x1, &(0x7f0000000200)=[{0x6}]}) 03:44:06 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x238) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) writev(r0, &(0x7f0000000540)=[{&(0x7f0000000140)="cedbddea5b67f4290aa7fd7c0cc7e2e613891a59fd3dc2e8a3c6e7c9fa96", 0x1e}, {&(0x7f00000004c0)="4b8043af3b13f04c3ee02ee028e584b538cfb06be329d5ca0649880187b5cd5ff601bf73", 0x24}, {&(0x7f0000000800)="87cfb3bd1ada6e425bdd5aaccdafa6e4ea74", 0x12}], 0x3) sendto$inet(r0, &(0x7f00000012c0)="0c268a927f1f6588b967481241ba7860005cf65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95425a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x27) 03:44:06 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) sendmmsg$inet(r0, &(0x7f0000001100)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000001340)}], 0x1}}], 0x1, 0x0) [ 725.730888][T30373] IPVS: ftp: loaded support on port[0] = 21 03:44:06 executing program 2: r0 = getpgrp(0xffffffffffffffff) syz_open_procfs$namespace(r0, 0x0) 03:44:06 executing program 2: r0 = getpgrp(0xffffffffffffffff) syz_open_procfs$namespace(r0, 0x0) 03:44:06 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x400007) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0x32600) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xb4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000040)='cpuset') write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000700)=ANY=[@ANYBLOB="006d176df3384ed3ddbcf3be0e26fd017529253262b78ee8b9d470"], 0x1b) ioctl$TUNSETCARRIER(0xffffffffffffffff, 0x400454e2, &(0x7f0000000080)=0x1) write$cgroup_int(r0, &(0x7f0000000380), 0x12) write$cgroup_int(r1, &(0x7f0000000400), 0xd) r2 = gettid() write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000000)=r2, 0x12) r3 = socket$kcm(0x2b, 0x0, 0x0) socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r3, 0x0, 0x0) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000280)=r2, 0x12) r4 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) close(r5) write$cgroup_type(r5, &(0x7f0000000080)='threaded\x00', 0xfffffc61) r6 = bpf$MAP_CREATE(0x2, &(0x7f0000009280), 0x3c) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x17, 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB], &(0x7f0000000200)='syzkaller\x00', 0xfa1, 0x0, 0x0, 0x41100, 0x2, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, &(0x7f0000000240), 0x8, 0x10, 0x0}, 0x78) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000008740)={0x0, 0x0, &(0x7f0000008700)=[{0x0}, {&(0x7f0000008680)=""/23, 0x17}, {&(0x7f00000086c0)=""/38, 0x26}], 0x3}, 0x8000) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x6, 0x2, 0x2e15579, 0x3f, 0x1, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffffff, 0x0, 0x5}, 0x3c) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0xb, [], 0x0, 0xc, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r7}, 0x7e) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r8, &(0x7f0000000000)=ANY=[], 0x50c000) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x18, 0x8, &(0x7f0000000a00)=ANY=[@ANYBLOB="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", @ANYRES32=r6, @ANYBLOB="00000000000000000c72c0fff6ffffff850000005b0000009500000000000000"], &(0x7f0000000040)='GPL\x00', 0x3ff, 0xd5, &(0x7f0000000080)=""/213, 0x61800, 0xab6c50112a8dd52c, [], 0x0, 0x16, 0xffffffffffffffff, 0x8, &(0x7f0000000180)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000001c0)={0x2, 0x0, 0x6, 0x5}, 0x10, 0x0, r8}, 0x78) bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x11, 0x5, 0x81, 0x2, 0x100, r5, 0x3, [], 0x0, 0xffffffffffffffff, 0x4, 0x3}, 0x3c) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r9, &(0x7f0000000200), 0x806000) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, r4, 0x0, 0x2a8, &(0x7f0000000440)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\a\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83CZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x98\x86\"R\x06\x00\x00\x00\x00\x00\x00\x00\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&\x014\x01\xf4\xb7\x83\x9a\xfa*\xa6\x06\xb7Pk7N\xc2\xd9\xee\xd0\xb0M\x00\xab\xc3\t\fc\xd8dx\xd5\x1dU*s)\x12[\x14\xb1\xc0\xd7\x1a\xa0\x16\xa2z\x9e\x93 \xddeF>29\v\x02\xa2b\x13R\xef\xffA,\xb9.$\xfa\x9f\xde[\x80\xd1=\xce\x1b\xeb\xf6\xf4\xe3z\x1f\x9dz\xa3\xc0\xe2\xa2\xb1\xeeq\xf5\xec0\x8e\xf4\xfb\xd9\x87\xf03\xdb\xae|\x10&V5c\xa6\xce\xcd\x8a\xdf\xe1\x89\"\xea\xde\xe7\xa3\xbe\xe7\xff\xf9 \x11\xfdY\xc6\xa1\xe8\xda\v\\?\xcb\x87\bn\x9b\x01\x1f\xf8\xe8\x1eV\xfaC\xdf\xc3Vv\x9b\x1a\xfc\x14.c\x94\xc9=\xb0\x0f!d\b\x18*@m\x7f\xaal\x17G\xd6?\x81\x16P\x03\x10e\xc3\xcd\xb1B\xeb\x01B\\\x91A\xa1\x8an\xb4#\xadr\x1e\x81v\xa2\x0e6x\xca\x8b\xa6\xd8\x81\x10:\x0e(\xdd\xfc\xc9\xc6\xb4\xf0\'f:\xbd\xfe\x11\xf8\xc8W\x81s^\xd9W\xf1\x94\xaf\xc5\x8a\xb4f\x1b\x17E\xb23\x12\xb0\xeb\xef\x8c\xb24h\xd7}\x7f\x92Hgej\x957\xe2A'}, 0x30) 03:44:07 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454ca, &(0x7f0000000040)={'\x00', 0x2}) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f00000000c0)={0x0, &(0x7f0000000200)}) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f00000000c0)={0x1, &(0x7f0000000200)=[{0x6}]}) 03:44:07 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) sendmmsg$inet(r0, &(0x7f0000001100)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000001340)="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", 0x16d}], 0x1}}], 0x1, 0x0) 03:44:07 executing program 2: syz_open_procfs$namespace(0x0, 0x0) 03:44:07 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) sendmmsg$inet(r0, &(0x7f0000001100)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000001340)='I', 0x1}], 0x1}}], 0x1, 0x0) 03:44:07 executing program 5: openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) ioctl$RNDADDENTROPY(0xffffffffffffffff, 0x40085203, &(0x7f0000000100)={0x6, 0xbc, "56f80f8d7c9ad684157765ee68815e033b7b2972a2d067318db9ac518603e0dbae813e160bd3f15b30c226056579cf64ac2525dd44c15e56204f1e3f1b8c03b31f4281605682d4b39a61b89636b3a2a5ea0bd3f5e8bd40d8c0406969d18fed78e4f4108902b5959ec383c40036f5262e703d6ad6a7a486302c382e45645bfe4c472249b482a28e9519e744cdbe884985d913612a17250eab7e4f0bf4b35aab9f7b923116a8d30baf612ca3bc2ef9b3f8d1c6b570cb60bd8d5b6805ce"}) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_sctp(0x2, 0x5, 0x84) dup3(0xffffffffffffffff, r0, 0x0) socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp_SCTP_AUTH_DEACTIVATE_KEY(0xffffffffffffffff, 0x84, 0x23, 0x0, 0x0) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f00000000c0)={0x51, 0xfffc, 0x0, {0x103, 0xf1}, {}, @ramp={0x2, 0x3, {0x7fff, 0x0, 0x7, 0x7}}}) r1 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r1, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @bcast, @rose, @rose, @null]}, 0x48) listen(r1, 0x0) unshare(0x40000000) r2 = accept(r1, 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r3, 0xffffffffffffffff) write$binfmt_elf64(r2, &(0x7f00000002c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}], "", [[], []]}, 0x278) 03:44:07 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x400007) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0x32600) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xb4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000040)='cpuset') write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000700)=ANY=[@ANYBLOB="006d176df3384ed3ddbcf3be0e26fd017529253262b78ee8b9d470"], 0x1b) ioctl$TUNSETCARRIER(0xffffffffffffffff, 0x400454e2, &(0x7f0000000080)=0x1) write$cgroup_int(r0, &(0x7f0000000380), 0x12) write$cgroup_int(r1, &(0x7f0000000400), 0xd) r2 = gettid() write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000000)=r2, 0x12) r3 = socket$kcm(0x2b, 0x0, 0x0) socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r3, 0x0, 0x0) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000280)=r2, 0x12) r4 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) close(r5) write$cgroup_type(r5, &(0x7f0000000080)='threaded\x00', 0xfffffc61) r6 = bpf$MAP_CREATE(0x2, &(0x7f0000009280), 0x3c) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x17, 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB], &(0x7f0000000200)='syzkaller\x00', 0xfa1, 0x0, 0x0, 0x41100, 0x2, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, &(0x7f0000000240), 0x8, 0x10, 0x0}, 0x78) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000008740)={0x0, 0x0, &(0x7f0000008700)=[{0x0}, {&(0x7f0000008680)=""/23, 0x17}, {&(0x7f00000086c0)=""/38, 0x26}], 0x3}, 0x8000) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x6, 0x2, 0x2e15579, 0x3f, 0x1, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffffff, 0x0, 0x5}, 0x3c) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0xb, [], 0x0, 0xc, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r7}, 0x7e) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r8, &(0x7f0000000000)=ANY=[], 0x50c000) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x18, 0x8, &(0x7f0000000a00)=ANY=[@ANYBLOB="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", @ANYRES32=r6, @ANYBLOB="00000000000000000c72c0fff6ffffff850000005b0000009500000000000000"], &(0x7f0000000040)='GPL\x00', 0x3ff, 0xd5, &(0x7f0000000080)=""/213, 0x61800, 0xab6c50112a8dd52c, [], 0x0, 0x16, 0xffffffffffffffff, 0x8, &(0x7f0000000180)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000001c0)={0x2, 0x0, 0x6, 0x5}, 0x10, 0x0, r8}, 0x78) bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x11, 0x5, 0x81, 0x2, 0x100, r5, 0x3, [], 0x0, 0xffffffffffffffff, 0x4, 0x3}, 0x3c) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r9, &(0x7f0000000200), 0x806000) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, r4, 0x0, 0x2a8, &(0x7f0000000440)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\a\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83CZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x98\x86\"R\x06\x00\x00\x00\x00\x00\x00\x00\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&\x014\x01\xf4\xb7\x83\x9a\xfa*\xa6\x06\xb7Pk7N\xc2\xd9\xee\xd0\xb0M\x00\xab\xc3\t\fc\xd8dx\xd5\x1dU*s)\x12[\x14\xb1\xc0\xd7\x1a\xa0\x16\xa2z\x9e\x93 \xddeF>29\v\x02\xa2b\x13R\xef\xffA,\xb9.$\xfa\x9f\xde[\x80\xd1=\xce\x1b\xeb\xf6\xf4\xe3z\x1f\x9dz\xa3\xc0\xe2\xa2\xb1\xeeq\xf5\xec0\x8e\xf4\xfb\xd9\x87\xf03\xdb\xae|\x10&V5c\xa6\xce\xcd\x8a\xdf\xe1\x89\"\xea\xde\xe7\xa3\xbe\xe7\xff\xf9 \x11\xfdY\xc6\xa1\xe8\xda\v\\?\xcb\x87\bn\x9b\x01\x1f\xf8\xe8\x1eV\xfaC\xdf\xc3Vv\x9b\x1a\xfc\x14.c\x94\xc9=\xb0\x0f!d\b\x18*@m\x7f\xaal\x17G\xd6?\x81\x16P\x03\x10e\xc3\xcd\xb1B\xeb\x01B\\\x91A\xa1\x8an\xb4#\xadr\x1e\x81v\xa2\x0e6x\xca\x8b\xa6\xd8\x81\x10:\x0e(\xdd\xfc\xc9\xc6\xb4\xf0\'f:\xbd\xfe\x11\xf8\xc8W\x81s^\xd9W\xf1\x94\xaf\xc5\x8a\xb4f\x1b\x17E\xb23\x12\xb0\xeb\xef\x8c\xb24h\xd7}\x7f\x92Hgej\x957\xe2A'}, 0x30) 03:44:07 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x238) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) writev(r0, &(0x7f0000000540)=[{&(0x7f0000000140)="cedbddea5b67f4290aa7fd7c0cc7e2e613891a59fd3dc2e8a3c6e7c9fa96", 0x1e}, {&(0x7f00000004c0)="4b8043af3b13f04c3ee02ee028e584b538cfb06be329d5ca0649880187b5cd5ff601bf73", 0x24}, {&(0x7f0000000800)="87cfb3bd1ada6e425bdd5aaccdafa6e4ea74", 0x12}], 0x3) sendto$inet(r0, &(0x7f00000012c0)="0c268a927f1f6588b967481241ba7860005cf65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95425a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x27) 03:44:07 executing program 2: syz_open_procfs$namespace(0x0, 0x0) 03:44:07 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454ca, &(0x7f0000000040)={'\x00', 0x2}) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f00000000c0)={0x0, &(0x7f0000000200)}) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f00000000c0)={0x1, &(0x7f0000000200)=[{0x6}]}) [ 726.654454][T30618] IPVS: ftp: loaded support on port[0] = 21 03:44:07 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) sendmmsg$inet(r0, &(0x7f0000001100)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000001340)='I', 0x1}], 0x1}}], 0x1, 0x0) 03:44:07 executing program 2: syz_open_procfs$namespace(0x0, 0x0) 03:44:07 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x400007) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0x32600) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xb4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000040)='cpuset') write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000700)=ANY=[@ANYBLOB="006d176df3384ed3ddbcf3be0e26fd017529253262b78ee8b9d470"], 0x1b) ioctl$TUNSETCARRIER(0xffffffffffffffff, 0x400454e2, &(0x7f0000000080)=0x1) write$cgroup_int(r0, &(0x7f0000000380), 0x12) write$cgroup_int(r1, &(0x7f0000000400), 0xd) r2 = gettid() write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000000)=r2, 0x12) r3 = socket$kcm(0x2b, 0x0, 0x0) socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r3, 0x0, 0x0) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000280)=r2, 0x12) r4 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) close(r5) write$cgroup_type(r5, &(0x7f0000000080)='threaded\x00', 0xfffffc61) r6 = bpf$MAP_CREATE(0x2, &(0x7f0000009280), 0x3c) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x17, 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB], &(0x7f0000000200)='syzkaller\x00', 0xfa1, 0x0, 0x0, 0x41100, 0x2, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, &(0x7f0000000240), 0x8, 0x10, 0x0}, 0x78) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000008740)={0x0, 0x0, &(0x7f0000008700)=[{0x0}, {&(0x7f0000008680)=""/23, 0x17}, {&(0x7f00000086c0)=""/38, 0x26}], 0x3}, 0x8000) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x6, 0x2, 0x2e15579, 0x3f, 0x1, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffffff, 0x0, 0x5}, 0x3c) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0xb, [], 0x0, 0xc, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r7}, 0x7e) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r8, &(0x7f0000000000)=ANY=[], 0x50c000) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x18, 0x8, &(0x7f0000000a00)=ANY=[@ANYBLOB="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", @ANYRES32=r6, @ANYBLOB="00000000000000000c72c0fff6ffffff850000005b0000009500000000000000"], &(0x7f0000000040)='GPL\x00', 0x3ff, 0xd5, &(0x7f0000000080)=""/213, 0x61800, 0xab6c50112a8dd52c, [], 0x0, 0x16, 0xffffffffffffffff, 0x8, &(0x7f0000000180)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000001c0)={0x2, 0x6, 0x0, 0x5}, 0x10, 0x0, r8}, 0x78) bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x11, 0x5, 0x81, 0x2, 0x100, r5, 0x3, [], 0x0, 0xffffffffffffffff, 0x4, 0x3}, 0x3c) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r9, &(0x7f0000000200), 0x806000) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, r4, 0x0, 0x2a8, &(0x7f0000000440)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\a\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83CZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x98\x86\"R\x06\x00\x00\x00\x00\x00\x00\x00\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&\x014\x01\xf4\xb7\x83\x9a\xfa*\xa6\x06\xb7Pk7N\xc2\xd9\xee\xd0\xb0M\x00\xab\xc3\t\fc\xd8dx\xd5\x1dU*s)\x12[\x14\xb1\xc0\xd7\x1a\xa0\x16\xa2z\x9e\x93 \xddeF>29\v\x02\xa2b\x13R\xef\xffA,\xb9.$\xfa\x9f\xde[\x80\xd1=\xce\x1b\xeb\xf6\xf4\xe3z\x1f\x9dz\xa3\xc0\xe2\xa2\xb1\xeeq\xf5\xec0\x8e\xf4\xfb\xd9\x87\xf03\xdb\xae|\x10&V5c\xa6\xce\xcd\x8a\xdf\xe1\x89\"\xea\xde\xe7\xa3\xbe\xe7\xff\xf9 \x11\xfdY\xc6\xa1\xe8\xda\v\\?\xcb\x87\bn\x9b\x01\x1f\xf8\xe8\x1eV\xfaC\xdf\xc3Vv\x9b\x1a\xfc\x14.c\x94\xc9=\xb0\x0f!d\b\x18*@m\x7f\xaal\x17G\xd6?\x81\x16P\x03\x10e\xc3\xcd\xb1B\xeb\x01B\\\x91A\xa1\x8an\xb4#\xadr\x1e\x81v\xa2\x0e6x\xca\x8b\xa6\xd8\x81\x10:\x0e(\xdd\xfc\xc9\xc6\xb4\xf0\'f:\xbd\xfe\x11\xf8\xc8W\x81s^\xd9W\xf1\x94\xaf\xc5\x8a\xb4f\x1b\x17E\xb23\x12\xb0\xeb\xef\x8c\xb24h\xd7}\x7f\x92Hgej\x957\xe2A'}, 0x30) 03:44:07 executing program 2: getpgrp(0xffffffffffffffff) syz_open_procfs$namespace(0x0, 0x0) 03:44:07 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) sendmmsg$inet(r0, &(0x7f0000001100)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000001340)='I', 0x1}], 0x1}}], 0x1, 0x0) 03:44:08 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454ca, &(0x7f0000000040)={'\x00', 0x2}) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f00000000c0)={0x0, &(0x7f0000000200)}) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f00000000c0)={0x1, &(0x7f0000000200)=[{0x6}]}) 03:44:08 executing program 5: openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) ioctl$RNDADDENTROPY(0xffffffffffffffff, 0x40085203, &(0x7f0000000100)={0x6, 0xbc, "56f80f8d7c9ad684157765ee68815e033b7b2972a2d067318db9ac518603e0dbae813e160bd3f15b30c226056579cf64ac2525dd44c15e56204f1e3f1b8c03b31f4281605682d4b39a61b89636b3a2a5ea0bd3f5e8bd40d8c0406969d18fed78e4f4108902b5959ec383c40036f5262e703d6ad6a7a486302c382e45645bfe4c472249b482a28e9519e744cdbe884985d913612a17250eab7e4f0bf4b35aab9f7b923116a8d30baf612ca3bc2ef9b3f8d1c6b570cb60bd8d5b6805ce"}) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_sctp(0x2, 0x5, 0x84) dup3(0xffffffffffffffff, r0, 0x0) socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp_SCTP_AUTH_DEACTIVATE_KEY(0xffffffffffffffff, 0x84, 0x23, 0x0, 0x0) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f00000000c0)={0x51, 0xfffc, 0x0, {0x103, 0xf1}, {}, @ramp={0x2, 0x3, {0x7fff, 0x0, 0x7, 0x7}}}) r1 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r1, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @bcast, @rose, @rose, @null]}, 0x48) listen(r1, 0x0) unshare(0x40000000) r2 = accept(r1, 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r3, 0xffffffffffffffff) write$binfmt_elf64(r2, &(0x7f00000002c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}], "", [[], []]}, 0x278) 03:44:08 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x238) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) writev(r0, &(0x7f0000000540)=[{&(0x7f0000000140)="cedbddea5b67f4290aa7fd7c0cc7e2e613891a59fd3dc2e8a3c6e7c9fa96", 0x1e}, {0x0}, {&(0x7f00000004c0)="4b8043af3b13f04c3ee02ee028e584b538cfb06be329d5ca0649880187b5cd5ff601bf73", 0x24}, {&(0x7f0000000800)="87cfb3bd1ada6e425bdd5aaccdafa6e4ea74", 0x12}], 0x4) sendto$inet(r0, &(0x7f00000012c0)="0c268a927f1f6588b967481241ba7860005cf65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95425a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x27) 03:44:08 executing program 2: getpgrp(0xffffffffffffffff) syz_open_procfs$namespace(0x0, 0x0) [ 727.311559][T30748] IPVS: ftp: loaded support on port[0] = 21 03:44:08 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x400007) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0x32600) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xb4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000040)='cpuset') write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000700)=ANY=[@ANYBLOB="006d176df3384ed3ddbcf3be0e26fd017529253262b78ee8b9d470"], 0x1b) ioctl$TUNSETCARRIER(0xffffffffffffffff, 0x400454e2, &(0x7f0000000080)=0x1) write$cgroup_int(r0, &(0x7f0000000380), 0x12) write$cgroup_int(r1, &(0x7f0000000400), 0xd) r2 = gettid() write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000000)=r2, 0x12) r3 = socket$kcm(0x2b, 0x0, 0x0) socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r3, 0x0, 0x0) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000280)=r2, 0x12) r4 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) close(r5) write$cgroup_type(r5, &(0x7f0000000080)='threaded\x00', 0xfffffc61) r6 = bpf$MAP_CREATE(0x2, &(0x7f0000009280), 0x3c) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x17, 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB], &(0x7f0000000200)='syzkaller\x00', 0xfa1, 0x0, 0x0, 0x41100, 0x2, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, &(0x7f0000000240), 0x8, 0x10, 0x0}, 0x78) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000008740)={0x0, 0x0, &(0x7f0000008700)=[{0x0}, {&(0x7f0000008680)=""/23, 0x17}, {&(0x7f00000086c0)=""/38, 0x26}], 0x3}, 0x8000) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x6, 0x2, 0x2e15579, 0x3f, 0x1, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffffff, 0x0, 0x5}, 0x3c) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0xb, [], 0x0, 0xc, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r7}, 0x7e) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r8, &(0x7f0000000000)=ANY=[], 0x50c000) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x18, 0x8, &(0x7f0000000a00)=ANY=[@ANYBLOB="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", @ANYRES32=r6, @ANYBLOB="00000000000000000c72c0fff6ffffff850000005b0000009500000000000000"], &(0x7f0000000040)='GPL\x00', 0x3ff, 0xd5, &(0x7f0000000080)=""/213, 0x61800, 0xab6c50112a8dd52c, [], 0x0, 0x16, 0xffffffffffffffff, 0x8, &(0x7f0000000180)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000001c0)={0x2, 0x6, 0x0, 0x5}, 0x10, 0x0, r8}, 0x78) bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x11, 0x5, 0x81, 0x2, 0x100, r5, 0x3, [], 0x0, 0xffffffffffffffff, 0x4, 0x3}, 0x3c) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r9, &(0x7f0000000200), 0x806000) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, r4, 0x0, 0x2a8, &(0x7f0000000440)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\a\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83CZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x98\x86\"R\x06\x00\x00\x00\x00\x00\x00\x00\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&\x014\x01\xf4\xb7\x83\x9a\xfa*\xa6\x06\xb7Pk7N\xc2\xd9\xee\xd0\xb0M\x00\xab\xc3\t\fc\xd8dx\xd5\x1dU*s)\x12[\x14\xb1\xc0\xd7\x1a\xa0\x16\xa2z\x9e\x93 \xddeF>29\v\x02\xa2b\x13R\xef\xffA,\xb9.$\xfa\x9f\xde[\x80\xd1=\xce\x1b\xeb\xf6\xf4\xe3z\x1f\x9dz\xa3\xc0\xe2\xa2\xb1\xeeq\xf5\xec0\x8e\xf4\xfb\xd9\x87\xf03\xdb\xae|\x10&V5c\xa6\xce\xcd\x8a\xdf\xe1\x89\"\xea\xde\xe7\xa3\xbe\xe7\xff\xf9 \x11\xfdY\xc6\xa1\xe8\xda\v\\?\xcb\x87\bn\x9b\x01\x1f\xf8\xe8\x1eV\xfaC\xdf\xc3Vv\x9b\x1a\xfc\x14.c\x94\xc9=\xb0\x0f!d\b\x18*@m\x7f\xaal\x17G\xd6?\x81\x16P\x03\x10e\xc3\xcd\xb1B\xeb\x01B\\\x91A\xa1\x8an\xb4#\xadr\x1e\x81v\xa2\x0e6x\xca\x8b\xa6\xd8\x81\x10:\x0e(\xdd\xfc\xc9\xc6\xb4\xf0\'f:\xbd\xfe\x11\xf8\xc8W\x81s^\xd9W\xf1\x94\xaf\xc5\x8a\xb4f\x1b\x17E\xb23\x12\xb0\xeb\xef\x8c\xb24h\xd7}\x7f\x92Hgej\x957\xe2A'}, 0x30) 03:44:08 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454ca, &(0x7f0000000040)={'\x00', 0x2}) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f00000000c0)={0x0, &(0x7f0000000200)}) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f00000000c0)={0x1, &(0x7f0000000200)=[{0x6}]}) 03:44:08 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) sendmmsg$inet(r0, &(0x7f0000001100)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000001340)="492b7b56e7bf1546ba9024d15debc3fdf835944e6359dfc82ad6a44af6174b7048d6774edb2a522c3b5aebed3bba4b546494bbf6043a7a659fa12216b37584d6922636fff14b623e8c3e9fe28800be702458a4e01e63a39ce0913a26da044aa26f457632cfb8104ef5156bc27f3c08d0a0662a69249556e9a7dcc2da9fdefdd1378f5ef60bb2a8ea72a06c11be333049a90b1c46352f3c5409e32849a93d43e39038bd6c1d6e8eab5b135933cc6fc02853cf997defa87b", 0xb7}], 0x1}}], 0x1, 0x0) 03:44:08 executing program 2: getpgrp(0xffffffffffffffff) syz_open_procfs$namespace(0x0, 0x0) 03:44:08 executing program 5: openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) ioctl$RNDADDENTROPY(0xffffffffffffffff, 0x40085203, &(0x7f0000000100)={0x6, 0xbc, "56f80f8d7c9ad684157765ee68815e033b7b2972a2d067318db9ac518603e0dbae813e160bd3f15b30c226056579cf64ac2525dd44c15e56204f1e3f1b8c03b31f4281605682d4b39a61b89636b3a2a5ea0bd3f5e8bd40d8c0406969d18fed78e4f4108902b5959ec383c40036f5262e703d6ad6a7a486302c382e45645bfe4c472249b482a28e9519e744cdbe884985d913612a17250eab7e4f0bf4b35aab9f7b923116a8d30baf612ca3bc2ef9b3f8d1c6b570cb60bd8d5b6805ce"}) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_sctp(0x2, 0x5, 0x84) dup3(0xffffffffffffffff, r0, 0x0) socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp_SCTP_AUTH_DEACTIVATE_KEY(0xffffffffffffffff, 0x84, 0x23, 0x0, 0x0) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f00000000c0)={0x51, 0xfffc, 0x0, {0x103, 0xf1}, {}, @ramp={0x2, 0x3, {0x7fff, 0x0, 0x7, 0x7}}}) r1 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r1, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @bcast, @rose, @rose, @null]}, 0x48) listen(r1, 0x0) unshare(0x40000000) r2 = accept(r1, 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r3, 0xffffffffffffffff) write$binfmt_elf64(r2, &(0x7f00000002c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}], "", [[], []]}, 0x278) 03:44:08 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) sendmmsg$inet(r0, &(0x7f0000001100)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000001340)="492b7b56e7bf1546ba9024d15debc3fdf835944e6359dfc82ad6a44af6174b7048d6774edb2a522c3b5aebed3bba4b546494bbf6043a7a659fa12216b37584d6922636fff14b623e8c3e9fe28800be702458a4e01e63a39ce0913a26da044aa26f457632cfb8104ef5156bc27f3c08d0a0662a69249556e9a7dcc2da9fdefdd1378f5ef60bb2a8ea72a06c11be333049a90b1c46352f3c5409e32849a93d43e39038bd6c1d6e8eab5b135933cc6fc02853cf997defa87b", 0xb7}], 0x1}}], 0x1, 0x0) 03:44:08 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454ca, &(0x7f0000000040)={'\x00', 0x2}) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f00000000c0)={0x0, &(0x7f0000000200)}) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f00000000c0)={0x1, &(0x7f0000000200)=[{0x6}]}) 03:44:08 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x238) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) writev(r0, &(0x7f0000000540)=[{&(0x7f0000000140)="cedbddea5b67f4290aa7fd7c0cc7e2e613891a59fd3dc2e8a3c6e7c9fa96", 0x1e}, {0x0}, {&(0x7f00000004c0)="4b8043af3b13f04c3ee02ee028e584b538cfb06be329d5ca0649880187b5cd5ff601bf73", 0x24}, {&(0x7f0000000800)="87cfb3bd1ada6e425bdd5aaccdafa6e4ea74", 0x12}], 0x4) sendto$inet(r0, &(0x7f00000012c0)="0c268a927f1f6588b967481241ba7860005cf65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95425a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x27) 03:44:08 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454ca, &(0x7f0000000040)={'\x00', 0x2}) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f00000000c0)={0x0, &(0x7f0000000200)}) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f00000000c0)={0x1, &(0x7f0000000200)=[{0x6}]}) 03:44:08 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x400007) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0x32600) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xb4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000040)='cpuset') write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000700)=ANY=[@ANYBLOB="006d176df3384ed3ddbcf3be0e26fd017529253262b78ee8b9d470"], 0x1b) ioctl$TUNSETCARRIER(0xffffffffffffffff, 0x400454e2, &(0x7f0000000080)=0x1) write$cgroup_int(r0, &(0x7f0000000380), 0x12) write$cgroup_int(r1, &(0x7f0000000400), 0xd) r2 = gettid() write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000000)=r2, 0x12) r3 = socket$kcm(0x2b, 0x0, 0x0) socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r3, 0x0, 0x0) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000280)=r2, 0x12) r4 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) close(r5) write$cgroup_type(r5, &(0x7f0000000080)='threaded\x00', 0xfffffc61) r6 = bpf$MAP_CREATE(0x2, &(0x7f0000009280), 0x3c) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x17, 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB], &(0x7f0000000200)='syzkaller\x00', 0xfa1, 0x0, 0x0, 0x41100, 0x2, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, &(0x7f0000000240), 0x8, 0x10, 0x0}, 0x78) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000008740)={0x0, 0x0, &(0x7f0000008700)=[{0x0}, {&(0x7f0000008680)=""/23, 0x17}, {&(0x7f00000086c0)=""/38, 0x26}], 0x3}, 0x8000) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x6, 0x2, 0x2e15579, 0x3f, 0x1, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffffff, 0x0, 0x5}, 0x3c) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0xb, [], 0x0, 0xc, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r7}, 0x7e) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r8, &(0x7f0000000000)=ANY=[], 0x50c000) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x18, 0x8, &(0x7f0000000a00)=ANY=[@ANYBLOB="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", @ANYRES32=r6, @ANYBLOB="00000000000000000c72c0fff6ffffff850000005b0000009500000000000000"], &(0x7f0000000040)='GPL\x00', 0x3ff, 0xd5, &(0x7f0000000080)=""/213, 0x61800, 0xab6c50112a8dd52c, [], 0x0, 0x16, 0xffffffffffffffff, 0x8, &(0x7f0000000180)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000001c0)={0x2, 0x6, 0x0, 0x5}, 0x10, 0x0, r8}, 0x78) bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x11, 0x5, 0x81, 0x2, 0x100, r5, 0x3, [], 0x0, 0xffffffffffffffff, 0x4, 0x3}, 0x3c) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r9, &(0x7f0000000200), 0x806000) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, r4, 0x0, 0x2a8, &(0x7f0000000440)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\a\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83CZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x98\x86\"R\x06\x00\x00\x00\x00\x00\x00\x00\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&\x014\x01\xf4\xb7\x83\x9a\xfa*\xa6\x06\xb7Pk7N\xc2\xd9\xee\xd0\xb0M\x00\xab\xc3\t\fc\xd8dx\xd5\x1dU*s)\x12[\x14\xb1\xc0\xd7\x1a\xa0\x16\xa2z\x9e\x93 \xddeF>29\v\x02\xa2b\x13R\xef\xffA,\xb9.$\xfa\x9f\xde[\x80\xd1=\xce\x1b\xeb\xf6\xf4\xe3z\x1f\x9dz\xa3\xc0\xe2\xa2\xb1\xeeq\xf5\xec0\x8e\xf4\xfb\xd9\x87\xf03\xdb\xae|\x10&V5c\xa6\xce\xcd\x8a\xdf\xe1\x89\"\xea\xde\xe7\xa3\xbe\xe7\xff\xf9 \x11\xfdY\xc6\xa1\xe8\xda\v\\?\xcb\x87\bn\x9b\x01\x1f\xf8\xe8\x1eV\xfaC\xdf\xc3Vv\x9b\x1a\xfc\x14.c\x94\xc9=\xb0\x0f!d\b\x18*@m\x7f\xaal\x17G\xd6?\x81\x16P\x03\x10e\xc3\xcd\xb1B\xeb\x01B\\\x91A\xa1\x8an\xb4#\xadr\x1e\x81v\xa2\x0e6x\xca\x8b\xa6\xd8\x81\x10:\x0e(\xdd\xfc\xc9\xc6\xb4\xf0\'f:\xbd\xfe\x11\xf8\xc8W\x81s^\xd9W\xf1\x94\xaf\xc5\x8a\xb4f\x1b\x17E\xb23\x12\xb0\xeb\xef\x8c\xb24h\xd7}\x7f\x92Hgej\x957\xe2A'}, 0x30) [ 728.051859][T30772] IPVS: ftp: loaded support on port[0] = 21 03:44:09 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) sendmmsg$inet(r0, &(0x7f0000001100)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000001340)="492b7b56e7bf1546ba9024d15debc3fdf835944e6359dfc82ad6a44af6174b7048d6774edb2a522c3b5aebed3bba4b546494bbf6043a7a659fa12216b37584d6922636fff14b623e8c3e9fe28800be702458a4e01e63a39ce0913a26da044aa26f457632cfb8104ef5156bc27f3c08d0a0662a69249556e9a7dcc2da9fdefdd1378f5ef60bb2a8ea72a06c11be333049a90b1c46352f3c5409e32849a93d43e39038bd6c1d6e8eab5b135933cc6fc02853cf997defa87b", 0xb7}], 0x1}}], 0x1, 0x0) 03:44:09 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454ca, &(0x7f0000000040)={'\x00', 0x2}) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f00000000c0)={0x0, &(0x7f0000000200)}) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f00000000c0)={0x1, &(0x7f0000000200)=[{0x6}]}) 03:44:09 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) sendmmsg$inet(r0, &(0x7f0000001100)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000001340)="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", 0x112}], 0x1}}], 0x1, 0x0) 03:44:09 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x400007) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0x32600) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xb4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000040)='cpuset') write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000700)=ANY=[@ANYBLOB="006d176df3384ed3ddbcf3be0e26fd017529253262b78ee8b9d470"], 0x1b) ioctl$TUNSETCARRIER(0xffffffffffffffff, 0x400454e2, &(0x7f0000000080)=0x1) write$cgroup_int(r0, &(0x7f0000000380), 0x12) write$cgroup_int(r1, &(0x7f0000000400), 0xd) r2 = gettid() write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000000)=r2, 0x12) r3 = socket$kcm(0x2b, 0x0, 0x0) socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r3, 0x0, 0x0) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000280)=r2, 0x12) r4 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) close(r5) write$cgroup_type(r5, &(0x7f0000000080)='threaded\x00', 0xfffffc61) r6 = bpf$MAP_CREATE(0x2, &(0x7f0000009280), 0x3c) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x17, 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB], &(0x7f0000000200)='syzkaller\x00', 0xfa1, 0x0, 0x0, 0x41100, 0x2, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, &(0x7f0000000240), 0x8, 0x10, 0x0}, 0x78) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000008740)={0x0, 0x0, &(0x7f0000008700)=[{0x0}, {&(0x7f0000008680)=""/23, 0x17}, {&(0x7f00000086c0)=""/38, 0x26}], 0x3}, 0x8000) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x6, 0x2, 0x2e15579, 0x3f, 0x1, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffffff, 0x0, 0x5}, 0x3c) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0xb, [], 0x0, 0xc, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r7}, 0x7e) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r8, &(0x7f0000000000)=ANY=[], 0x50c000) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x18, 0x8, &(0x7f0000000a00)=ANY=[@ANYBLOB="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", @ANYRES32=r6, @ANYBLOB="00000000000000000c72c0fff6ffffff850000005b0000009500000000000000"], &(0x7f0000000040)='GPL\x00', 0x3ff, 0xd5, &(0x7f0000000080)=""/213, 0x61800, 0xab6c50112a8dd52c, [], 0x0, 0x16, 0xffffffffffffffff, 0x8, &(0x7f0000000180)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000001c0)={0x2, 0x6, 0x6}, 0x10, 0x0, r8}, 0x78) bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x11, 0x5, 0x81, 0x2, 0x100, r5, 0x3, [], 0x0, 0xffffffffffffffff, 0x4, 0x3}, 0x3c) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r9, &(0x7f0000000200), 0x806000) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, r4, 0x0, 0x2a8, &(0x7f0000000440)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\a\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83CZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x98\x86\"R\x06\x00\x00\x00\x00\x00\x00\x00\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&\x014\x01\xf4\xb7\x83\x9a\xfa*\xa6\x06\xb7Pk7N\xc2\xd9\xee\xd0\xb0M\x00\xab\xc3\t\fc\xd8dx\xd5\x1dU*s)\x12[\x14\xb1\xc0\xd7\x1a\xa0\x16\xa2z\x9e\x93 \xddeF>29\v\x02\xa2b\x13R\xef\xffA,\xb9.$\xfa\x9f\xde[\x80\xd1=\xce\x1b\xeb\xf6\xf4\xe3z\x1f\x9dz\xa3\xc0\xe2\xa2\xb1\xeeq\xf5\xec0\x8e\xf4\xfb\xd9\x87\xf03\xdb\xae|\x10&V5c\xa6\xce\xcd\x8a\xdf\xe1\x89\"\xea\xde\xe7\xa3\xbe\xe7\xff\xf9 \x11\xfdY\xc6\xa1\xe8\xda\v\\?\xcb\x87\bn\x9b\x01\x1f\xf8\xe8\x1eV\xfaC\xdf\xc3Vv\x9b\x1a\xfc\x14.c\x94\xc9=\xb0\x0f!d\b\x18*@m\x7f\xaal\x17G\xd6?\x81\x16P\x03\x10e\xc3\xcd\xb1B\xeb\x01B\\\x91A\xa1\x8an\xb4#\xadr\x1e\x81v\xa2\x0e6x\xca\x8b\xa6\xd8\x81\x10:\x0e(\xdd\xfc\xc9\xc6\xb4\xf0\'f:\xbd\xfe\x11\xf8\xc8W\x81s^\xd9W\xf1\x94\xaf\xc5\x8a\xb4f\x1b\x17E\xb23\x12\xb0\xeb\xef\x8c\xb24h\xd7}\x7f\x92Hgej\x957\xe2A'}, 0x30) 03:44:09 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454ca, &(0x7f0000000040)={'\x00', 0x2}) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f00000000c0)={0x0, &(0x7f0000000200)}) 03:44:09 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x238) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) writev(r0, &(0x7f0000000540)=[{&(0x7f0000000140)="cedbddea5b67f4290aa7fd7c0cc7e2e613891a59fd3dc2e8a3c6e7c9fa96", 0x1e}, {0x0}, {&(0x7f00000004c0)="4b8043af3b13f04c3ee02ee028e584b538cfb06be329d5ca0649880187b5cd5ff601bf73", 0x24}, {&(0x7f0000000800)="87cfb3bd1ada6e425bdd5aaccdafa6e4ea74", 0x12}], 0x4) sendto$inet(r0, &(0x7f00000012c0)="0c268a927f1f6588b967481241ba7860005cf65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95425a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x27) 03:44:09 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) sendmmsg$inet(r0, &(0x7f0000001100)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000001340)="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", 0x112}], 0x1}}], 0x1, 0x0) 03:44:09 executing program 5: openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) ioctl$RNDADDENTROPY(0xffffffffffffffff, 0x40085203, &(0x7f0000000100)={0x6, 0xbc, "56f80f8d7c9ad684157765ee68815e033b7b2972a2d067318db9ac518603e0dbae813e160bd3f15b30c226056579cf64ac2525dd44c15e56204f1e3f1b8c03b31f4281605682d4b39a61b89636b3a2a5ea0bd3f5e8bd40d8c0406969d18fed78e4f4108902b5959ec383c40036f5262e703d6ad6a7a486302c382e45645bfe4c472249b482a28e9519e744cdbe884985d913612a17250eab7e4f0bf4b35aab9f7b923116a8d30baf612ca3bc2ef9b3f8d1c6b570cb60bd8d5b6805ce"}) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_sctp(0x2, 0x5, 0x84) dup3(0xffffffffffffffff, r0, 0x0) socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp_SCTP_AUTH_DEACTIVATE_KEY(0xffffffffffffffff, 0x84, 0x23, 0x0, 0x0) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f00000000c0)={0x51, 0xfffc, 0x0, {0x103, 0xf1}, {0x9}, @ramp={0x0, 0x3, {0x7fff, 0x0, 0x7, 0x7}}}) r1 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r1, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @bcast, @rose, @rose, @null]}, 0x48) listen(r1, 0x0) unshare(0x40000000) r2 = accept(r1, 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r3, 0xffffffffffffffff) write$binfmt_elf64(r2, &(0x7f00000002c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}], "", [[], []]}, 0x278) 03:44:09 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454ca, &(0x7f0000000040)={'\x00', 0x2}) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f00000000c0)={0x0, &(0x7f0000000200)}) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f00000000c0)={0x1, &(0x7f0000000200)=[{0x6}]}) 03:44:10 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f00000000c0)={0x0, &(0x7f0000000200)}) 03:44:10 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) sendmmsg$inet(r0, &(0x7f0000001100)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000001340)="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", 0x112}], 0x1}}], 0x1, 0x0) [ 729.131095][T30820] IPVS: ftp: loaded support on port[0] = 21 03:44:10 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x400007) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0x32600) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xb4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000040)='cpuset') write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000700)=ANY=[@ANYBLOB="006d176df3384ed3ddbcf3be0e26fd017529253262b78ee8b9d470"], 0x1b) ioctl$TUNSETCARRIER(0xffffffffffffffff, 0x400454e2, &(0x7f0000000080)=0x1) write$cgroup_int(r0, &(0x7f0000000380), 0x12) write$cgroup_int(r1, &(0x7f0000000400), 0xd) r2 = gettid() write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000000)=r2, 0x12) r3 = socket$kcm(0x2b, 0x0, 0x0) socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r3, 0x0, 0x0) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000280)=r2, 0x12) r4 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) close(r5) write$cgroup_type(r5, &(0x7f0000000080)='threaded\x00', 0xfffffc61) r6 = bpf$MAP_CREATE(0x2, &(0x7f0000009280), 0x3c) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x17, 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB], &(0x7f0000000200)='syzkaller\x00', 0xfa1, 0x0, 0x0, 0x41100, 0x2, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, &(0x7f0000000240), 0x8, 0x10, 0x0}, 0x78) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000008740)={0x0, 0x0, &(0x7f0000008700)=[{0x0}, {&(0x7f0000008680)=""/23, 0x17}, {&(0x7f00000086c0)=""/38, 0x26}], 0x3}, 0x8000) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x6, 0x2, 0x2e15579, 0x3f, 0x1, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffffff, 0x0, 0x5}, 0x3c) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0xb, [], 0x0, 0xc, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r7}, 0x7e) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r8, &(0x7f0000000000)=ANY=[], 0x50c000) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x18, 0x8, &(0x7f0000000a00)=ANY=[@ANYBLOB="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", @ANYRES32=r6, @ANYBLOB="00000000000000000c72c0fff6ffffff850000005b0000009500000000000000"], &(0x7f0000000040)='GPL\x00', 0x3ff, 0xd5, &(0x7f0000000080)=""/213, 0x61800, 0xab6c50112a8dd52c, [], 0x0, 0x16, 0xffffffffffffffff, 0x8, &(0x7f0000000180)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000001c0)={0x2, 0x6, 0x6}, 0x10, 0x0, r8}, 0x78) bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x11, 0x5, 0x81, 0x2, 0x100, r5, 0x3, [], 0x0, 0xffffffffffffffff, 0x4, 0x3}, 0x3c) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r9, &(0x7f0000000200), 0x806000) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, r4, 0x0, 0x2a8, &(0x7f0000000440)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\a\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83CZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x98\x86\"R\x06\x00\x00\x00\x00\x00\x00\x00\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&\x014\x01\xf4\xb7\x83\x9a\xfa*\xa6\x06\xb7Pk7N\xc2\xd9\xee\xd0\xb0M\x00\xab\xc3\t\fc\xd8dx\xd5\x1dU*s)\x12[\x14\xb1\xc0\xd7\x1a\xa0\x16\xa2z\x9e\x93 \xddeF>29\v\x02\xa2b\x13R\xef\xffA,\xb9.$\xfa\x9f\xde[\x80\xd1=\xce\x1b\xeb\xf6\xf4\xe3z\x1f\x9dz\xa3\xc0\xe2\xa2\xb1\xeeq\xf5\xec0\x8e\xf4\xfb\xd9\x87\xf03\xdb\xae|\x10&V5c\xa6\xce\xcd\x8a\xdf\xe1\x89\"\xea\xde\xe7\xa3\xbe\xe7\xff\xf9 \x11\xfdY\xc6\xa1\xe8\xda\v\\?\xcb\x87\bn\x9b\x01\x1f\xf8\xe8\x1eV\xfaC\xdf\xc3Vv\x9b\x1a\xfc\x14.c\x94\xc9=\xb0\x0f!d\b\x18*@m\x7f\xaal\x17G\xd6?\x81\x16P\x03\x10e\xc3\xcd\xb1B\xeb\x01B\\\x91A\xa1\x8an\xb4#\xadr\x1e\x81v\xa2\x0e6x\xca\x8b\xa6\xd8\x81\x10:\x0e(\xdd\xfc\xc9\xc6\xb4\xf0\'f:\xbd\xfe\x11\xf8\xc8W\x81s^\xd9W\xf1\x94\xaf\xc5\x8a\xb4f\x1b\x17E\xb23\x12\xb0\xeb\xef\x8c\xb24h\xd7}\x7f\x92Hgej\x957\xe2A'}, 0x30) 03:44:10 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f00000000c0)={0x0, &(0x7f0000000200)}) 03:44:10 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454ca, &(0x7f0000000040)={'\x00', 0x2}) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f00000000c0)={0x0, &(0x7f0000000200)}) 03:44:10 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) sendmmsg$inet(r0, &(0x7f0000001100)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000001340)="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", 0x140}], 0x1}}], 0x1, 0x0) 03:44:10 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x238) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) writev(r0, &(0x7f0000000540)=[{&(0x7f0000000140)="cedbddea5b67f4290aa7fd7c0cc7e2e613891a59fd3dc2e8a3c6e7c9fa96", 0x1e}, {&(0x7f0000000340)}, {&(0x7f00000004c0)="4b8043af3b13f04c3ee02ee028e584b538cfb06be329d5ca0649880187b5cd5ff601bf73", 0x24}, {&(0x7f0000000800)="87cfb3bd1ada6e425bdd5aaccdafa6e4ea74", 0x12}], 0x4) sendto$inet(r0, &(0x7f00000012c0)="0c268a927f1f6588b967481241ba7860005cf65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95425a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x27) 03:44:10 executing program 5: openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) ioctl$RNDADDENTROPY(0xffffffffffffffff, 0x40085203, &(0x7f0000000100)={0x6, 0xbc, "56f80f8d7c9ad684157765ee68815e033b7b2972a2d067318db9ac518603e0dbae813e160bd3f15b30c226056579cf64ac2525dd44c15e56204f1e3f1b8c03b31f4281605682d4b39a61b89636b3a2a5ea0bd3f5e8bd40d8c0406969d18fed78e4f4108902b5959ec383c40036f5262e703d6ad6a7a486302c382e45645bfe4c472249b482a28e9519e744cdbe884985d913612a17250eab7e4f0bf4b35aab9f7b923116a8d30baf612ca3bc2ef9b3f8d1c6b570cb60bd8d5b6805ce"}) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_sctp(0x2, 0x5, 0x84) dup3(0xffffffffffffffff, r0, 0x0) socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp_SCTP_AUTH_DEACTIVATE_KEY(0xffffffffffffffff, 0x84, 0x23, 0x0, 0x0) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f00000000c0)={0x51, 0xfffc, 0x0, {0x103, 0xf1}, {0x9}, @ramp={0x0, 0x3, {0x7fff, 0x0, 0x7, 0x7}}}) r1 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r1, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @bcast, @rose, @rose, @null]}, 0x48) listen(r1, 0x0) unshare(0x40000000) r2 = accept(r1, 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r3, 0xffffffffffffffff) write$binfmt_elf64(r2, &(0x7f00000002c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}], "", [[], []]}, 0x278) 03:44:10 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f00000000c0)={0x0, &(0x7f0000000200)}) 03:44:10 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x400007) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0x32600) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xb4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000040)='cpuset') write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000700)=ANY=[@ANYBLOB="006d176df3384ed3ddbcf3be0e26fd017529253262b78ee8b9d470"], 0x1b) ioctl$TUNSETCARRIER(0xffffffffffffffff, 0x400454e2, &(0x7f0000000080)=0x1) write$cgroup_int(r0, &(0x7f0000000380), 0x12) write$cgroup_int(r1, &(0x7f0000000400), 0xd) r2 = gettid() write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000000)=r2, 0x12) r3 = socket$kcm(0x2b, 0x0, 0x0) socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r3, 0x0, 0x0) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000280)=r2, 0x12) r4 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) close(r5) write$cgroup_type(r5, &(0x7f0000000080)='threaded\x00', 0xfffffc61) r6 = bpf$MAP_CREATE(0x2, &(0x7f0000009280), 0x3c) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x17, 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB], &(0x7f0000000200)='syzkaller\x00', 0xfa1, 0x0, 0x0, 0x41100, 0x2, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, &(0x7f0000000240), 0x8, 0x10, 0x0}, 0x78) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000008740)={0x0, 0x0, &(0x7f0000008700)=[{0x0}, {&(0x7f0000008680)=""/23, 0x17}, {&(0x7f00000086c0)=""/38, 0x26}], 0x3}, 0x8000) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x6, 0x2, 0x2e15579, 0x3f, 0x1, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffffff, 0x0, 0x5}, 0x3c) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0xb, [], 0x0, 0xc, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r7}, 0x7e) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r8, &(0x7f0000000000)=ANY=[], 0x50c000) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x18, 0x8, &(0x7f0000000a00)=ANY=[@ANYBLOB="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", @ANYRES32=r6, @ANYBLOB="00000000000000000c72c0fff6ffffff850000005b0000009500000000000000"], &(0x7f0000000040)='GPL\x00', 0x3ff, 0xd5, &(0x7f0000000080)=""/213, 0x61800, 0xab6c50112a8dd52c, [], 0x0, 0x16, 0xffffffffffffffff, 0x8, &(0x7f0000000180)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000001c0)={0x2, 0x6, 0x6}, 0x10, 0x0, r8}, 0x78) bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x11, 0x5, 0x81, 0x2, 0x100, r5, 0x3, [], 0x0, 0xffffffffffffffff, 0x4, 0x3}, 0x3c) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r9, &(0x7f0000000200), 0x806000) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, r4, 0x0, 0x2a8, &(0x7f0000000440)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\a\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83CZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x98\x86\"R\x06\x00\x00\x00\x00\x00\x00\x00\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&\x014\x01\xf4\xb7\x83\x9a\xfa*\xa6\x06\xb7Pk7N\xc2\xd9\xee\xd0\xb0M\x00\xab\xc3\t\fc\xd8dx\xd5\x1dU*s)\x12[\x14\xb1\xc0\xd7\x1a\xa0\x16\xa2z\x9e\x93 \xddeF>29\v\x02\xa2b\x13R\xef\xffA,\xb9.$\xfa\x9f\xde[\x80\xd1=\xce\x1b\xeb\xf6\xf4\xe3z\x1f\x9dz\xa3\xc0\xe2\xa2\xb1\xeeq\xf5\xec0\x8e\xf4\xfb\xd9\x87\xf03\xdb\xae|\x10&V5c\xa6\xce\xcd\x8a\xdf\xe1\x89\"\xea\xde\xe7\xa3\xbe\xe7\xff\xf9 \x11\xfdY\xc6\xa1\xe8\xda\v\\?\xcb\x87\bn\x9b\x01\x1f\xf8\xe8\x1eV\xfaC\xdf\xc3Vv\x9b\x1a\xfc\x14.c\x94\xc9=\xb0\x0f!d\b\x18*@m\x7f\xaal\x17G\xd6?\x81\x16P\x03\x10e\xc3\xcd\xb1B\xeb\x01B\\\x91A\xa1\x8an\xb4#\xadr\x1e\x81v\xa2\x0e6x\xca\x8b\xa6\xd8\x81\x10:\x0e(\xdd\xfc\xc9\xc6\xb4\xf0\'f:\xbd\xfe\x11\xf8\xc8W\x81s^\xd9W\xf1\x94\xaf\xc5\x8a\xb4f\x1b\x17E\xb23\x12\xb0\xeb\xef\x8c\xb24h\xd7}\x7f\x92Hgej\x957\xe2A'}, 0x30) 03:44:10 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) sendmmsg$inet(r0, &(0x7f0000001100)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000001340)="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", 0x140}], 0x1}}], 0x1, 0x0) 03:44:10 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454ca, &(0x7f0000000040)={'\x00', 0x2}) [ 729.930963][T30850] IPVS: ftp: loaded support on port[0] = 21 03:44:11 executing program 1: ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454ca, &(0x7f0000000040)={'\x00', 0x2}) ioctl$TUNATTACHFILTER(0xffffffffffffffff, 0x401054d5, &(0x7f00000000c0)={0x0, &(0x7f0000000200)}) 03:44:11 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) sendmmsg$inet(r0, &(0x7f0000001100)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000001340)="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", 0x140}], 0x1}}], 0x1, 0x0) 03:44:11 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x238) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) writev(r0, &(0x7f0000000540)=[{&(0x7f0000000140)="cedbddea5b67f4290aa7fd7c0cc7e2e613891a59fd3dc2e8a3c6e7c9fa96", 0x1e}, {&(0x7f0000000340)}, {&(0x7f00000004c0)="4b8043af3b13f04c3ee02ee028e584b538cfb06be329d5ca0649880187b5cd5ff601bf73", 0x24}, {&(0x7f0000000800)="87cfb3bd1ada6e425bdd5aaccdafa6e4ea74", 0x12}], 0x4) sendto$inet(r0, &(0x7f00000012c0)="0c268a927f1f6588b967481241ba7860005cf65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95425a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x27) 03:44:11 executing program 5: openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) ioctl$RNDADDENTROPY(0xffffffffffffffff, 0x40085203, &(0x7f0000000100)={0x6, 0xbc, "56f80f8d7c9ad684157765ee68815e033b7b2972a2d067318db9ac518603e0dbae813e160bd3f15b30c226056579cf64ac2525dd44c15e56204f1e3f1b8c03b31f4281605682d4b39a61b89636b3a2a5ea0bd3f5e8bd40d8c0406969d18fed78e4f4108902b5959ec383c40036f5262e703d6ad6a7a486302c382e45645bfe4c472249b482a28e9519e744cdbe884985d913612a17250eab7e4f0bf4b35aab9f7b923116a8d30baf612ca3bc2ef9b3f8d1c6b570cb60bd8d5b6805ce"}) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_sctp(0x2, 0x5, 0x84) dup3(0xffffffffffffffff, r0, 0x0) socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp_SCTP_AUTH_DEACTIVATE_KEY(0xffffffffffffffff, 0x84, 0x23, 0x0, 0x0) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f00000000c0)={0x51, 0xfffc, 0x0, {0x103, 0xf1}, {0x9}, @ramp={0x0, 0x3, {0x7fff, 0x0, 0x7, 0x7}}}) r1 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r1, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @bcast, @rose, @rose, @null]}, 0x48) listen(r1, 0x0) unshare(0x40000000) r2 = accept(r1, 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r3, 0xffffffffffffffff) write$binfmt_elf64(r2, &(0x7f00000002c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}], "", [[], []]}, 0x278) 03:44:11 executing program 2: ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454ca, &(0x7f0000000040)={'\x00', 0x2}) 03:44:11 executing program 1: ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454ca, &(0x7f0000000040)={'\x00', 0x2}) ioctl$TUNATTACHFILTER(0xffffffffffffffff, 0x401054d5, &(0x7f00000000c0)={0x0, &(0x7f0000000200)}) 03:44:11 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) sendmmsg$inet(r0, &(0x7f0000001100)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000001340)="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", 0x157}], 0x1}}], 0x1, 0x0) 03:44:11 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x400007) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0x32600) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xb4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000040)='cpuset') write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000700)=ANY=[@ANYBLOB="006d176df3384ed3ddbcf3be0e26fd017529253262b78ee8b9d470"], 0x1b) ioctl$TUNSETCARRIER(0xffffffffffffffff, 0x400454e2, &(0x7f0000000080)=0x1) write$cgroup_int(r0, &(0x7f0000000380), 0x12) write$cgroup_int(r1, &(0x7f0000000400), 0xd) r2 = gettid() write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000000)=r2, 0x12) r3 = socket$kcm(0x2b, 0x0, 0x0) socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r3, 0x0, 0x0) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000280)=r2, 0x12) r4 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) close(r5) write$cgroup_type(r5, &(0x7f0000000080)='threaded\x00', 0xfffffc61) r6 = bpf$MAP_CREATE(0x2, &(0x7f0000009280), 0x3c) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x17, 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB], &(0x7f0000000200)='syzkaller\x00', 0xfa1, 0x0, 0x0, 0x41100, 0x2, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, &(0x7f0000000240), 0x8, 0x10, 0x0}, 0x78) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000008740)={0x0, 0x0, &(0x7f0000008700)=[{0x0}, {&(0x7f0000008680)=""/23, 0x17}, {&(0x7f00000086c0)=""/38, 0x26}], 0x3}, 0x8000) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x6, 0x2, 0x2e15579, 0x3f, 0x1, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffffff, 0x0, 0x5}, 0x3c) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0xb, [], 0x0, 0xc, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r7}, 0x7e) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r8, &(0x7f0000000000)=ANY=[], 0x50c000) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x18, 0x8, &(0x7f0000000a00)=ANY=[@ANYBLOB="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", @ANYRES32=r6, @ANYBLOB="00000000000000000c72c0fff6ffffff850000005b0000009500000000000000"], &(0x7f0000000040)='GPL\x00', 0x3ff, 0xd5, &(0x7f0000000080)=""/213, 0x61800, 0xab6c50112a8dd52c, [], 0x0, 0x16, 0xffffffffffffffff, 0x8, &(0x7f0000000180)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000001c0)={0x2, 0x6, 0x6, 0x5}, 0x10}, 0x78) bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x11, 0x5, 0x81, 0x2, 0x100, r5, 0x3, [], 0x0, 0xffffffffffffffff, 0x4, 0x3}, 0x3c) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r9, &(0x7f0000000200), 0x806000) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, r4, 0x0, 0x2a8, &(0x7f0000000440)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\a\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83CZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x98\x86\"R\x06\x00\x00\x00\x00\x00\x00\x00\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&\x014\x01\xf4\xb7\x83\x9a\xfa*\xa6\x06\xb7Pk7N\xc2\xd9\xee\xd0\xb0M\x00\xab\xc3\t\fc\xd8dx\xd5\x1dU*s)\x12[\x14\xb1\xc0\xd7\x1a\xa0\x16\xa2z\x9e\x93 \xddeF>29\v\x02\xa2b\x13R\xef\xffA,\xb9.$\xfa\x9f\xde[\x80\xd1=\xce\x1b\xeb\xf6\xf4\xe3z\x1f\x9dz\xa3\xc0\xe2\xa2\xb1\xeeq\xf5\xec0\x8e\xf4\xfb\xd9\x87\xf03\xdb\xae|\x10&V5c\xa6\xce\xcd\x8a\xdf\xe1\x89\"\xea\xde\xe7\xa3\xbe\xe7\xff\xf9 \x11\xfdY\xc6\xa1\xe8\xda\v\\?\xcb\x87\bn\x9b\x01\x1f\xf8\xe8\x1eV\xfaC\xdf\xc3Vv\x9b\x1a\xfc\x14.c\x94\xc9=\xb0\x0f!d\b\x18*@m\x7f\xaal\x17G\xd6?\x81\x16P\x03\x10e\xc3\xcd\xb1B\xeb\x01B\\\x91A\xa1\x8an\xb4#\xadr\x1e\x81v\xa2\x0e6x\xca\x8b\xa6\xd8\x81\x10:\x0e(\xdd\xfc\xc9\xc6\xb4\xf0\'f:\xbd\xfe\x11\xf8\xc8W\x81s^\xd9W\xf1\x94\xaf\xc5\x8a\xb4f\x1b\x17E\xb23\x12\xb0\xeb\xef\x8c\xb24h\xd7}\x7f\x92Hgej\x957\xe2A'}, 0x30) 03:44:11 executing program 2: ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454ca, &(0x7f0000000040)={'\x00', 0x2}) 03:44:11 executing program 1: ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454ca, &(0x7f0000000040)={'\x00', 0x2}) ioctl$TUNATTACHFILTER(0xffffffffffffffff, 0x401054d5, &(0x7f00000000c0)={0x0, &(0x7f0000000200)}) [ 730.710711][T30886] IPVS: ftp: loaded support on port[0] = 21 03:44:11 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) sendmmsg$inet(r0, &(0x7f0000001100)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000001340)="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", 0x157}], 0x1}}], 0x1, 0x0) 03:44:11 executing program 2: ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454ca, &(0x7f0000000040)={'\x00', 0x2}) 03:44:11 executing program 1: r0 = openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454ca, &(0x7f0000000040)={'\x00', 0x2}) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f00000000c0)={0x0, &(0x7f0000000200)}) 03:44:12 executing program 5: openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) ioctl$RNDADDENTROPY(0xffffffffffffffff, 0x40085203, &(0x7f0000000100)={0x6, 0xbc, "56f80f8d7c9ad684157765ee68815e033b7b2972a2d067318db9ac518603e0dbae813e160bd3f15b30c226056579cf64ac2525dd44c15e56204f1e3f1b8c03b31f4281605682d4b39a61b89636b3a2a5ea0bd3f5e8bd40d8c0406969d18fed78e4f4108902b5959ec383c40036f5262e703d6ad6a7a486302c382e45645bfe4c472249b482a28e9519e744cdbe884985d913612a17250eab7e4f0bf4b35aab9f7b923116a8d30baf612ca3bc2ef9b3f8d1c6b570cb60bd8d5b6805ce"}) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_sctp(0x2, 0x5, 0x84) dup3(0xffffffffffffffff, r0, 0x0) socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp_SCTP_AUTH_DEACTIVATE_KEY(0xffffffffffffffff, 0x84, 0x23, 0x0, 0x0) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f00000000c0)={0x51, 0xfffc, 0x0, {0x103, 0xf1}, {0x9}, @ramp={0x2, 0x0, {0x7fff, 0x0, 0x7, 0x7}}}) r1 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r1, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @bcast, @rose, @rose, @null]}, 0x48) listen(r1, 0x0) unshare(0x40000000) r2 = accept(r1, 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r3, 0xffffffffffffffff) write$binfmt_elf64(r2, &(0x7f00000002c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}], "", [[], []]}, 0x278) 03:44:12 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x238) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) writev(r0, &(0x7f0000000540)=[{&(0x7f0000000140)="cedbddea5b67f4290aa7fd7c0cc7e2e613891a59fd3dc2e8a3c6e7c9fa96", 0x1e}, {&(0x7f0000000340)}, {&(0x7f00000004c0)="4b8043af3b13f04c3ee02ee028e584b538cfb06be329d5ca0649880187b5cd5ff601bf73", 0x24}, {&(0x7f0000000800)="87cfb3bd1ada6e425bdd5aaccdafa6e4ea74", 0x12}], 0x4) sendto$inet(r0, &(0x7f00000012c0)="0c268a927f1f6588b967481241ba7860005cf65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95425a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x27) 03:44:12 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) sendmmsg$inet(r0, &(0x7f0000001100)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000001340)="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", 0x157}], 0x1}}], 0x1, 0x0) 03:44:12 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x400007) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0x32600) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xb4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000040)='cpuset') write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000700)=ANY=[@ANYBLOB="006d176df3384ed3ddbcf3be0e26fd017529253262b78ee8b9d470"], 0x1b) ioctl$TUNSETCARRIER(0xffffffffffffffff, 0x400454e2, &(0x7f0000000080)=0x1) write$cgroup_int(r0, &(0x7f0000000380), 0x12) write$cgroup_int(r1, &(0x7f0000000400), 0xd) r2 = gettid() write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000000)=r2, 0x12) r3 = socket$kcm(0x2b, 0x0, 0x0) socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r3, 0x0, 0x0) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000280)=r2, 0x12) r4 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) close(r5) write$cgroup_type(r5, &(0x7f0000000080)='threaded\x00', 0xfffffc61) r6 = bpf$MAP_CREATE(0x2, &(0x7f0000009280), 0x3c) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x17, 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB], &(0x7f0000000200)='syzkaller\x00', 0xfa1, 0x0, 0x0, 0x41100, 0x2, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, &(0x7f0000000240), 0x8, 0x10, 0x0}, 0x78) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000008740)={0x0, 0x0, &(0x7f0000008700)=[{0x0}, {&(0x7f0000008680)=""/23, 0x17}, {&(0x7f00000086c0)=""/38, 0x26}], 0x3}, 0x8000) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x6, 0x2, 0x2e15579, 0x3f, 0x1, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffffff, 0x0, 0x5}, 0x3c) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0xb, [], 0x0, 0xc, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r7}, 0x7e) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r8, &(0x7f0000000000)=ANY=[], 0x50c000) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x18, 0x8, &(0x7f0000000a00)=ANY=[@ANYBLOB="0000752c0000000000000000ffffffff9500000000000000181400006200ed587c1ba87fb23af22b6cf03fb851054ce322d4b3a5894516c0c1479e1cfbf3061ad7aef6d6c36e4e74a8219f8441192ab16361719f26a1e543525c94027f7a5f275546d8cacee044fc20d858e268019caeb1633cc4888faa05d02cd44de32962e022697754125edcfb3477c4e122a0e97ab43de94a7a94efd527400e2c2ff4468fd6e773773f089b268fddef712ab174487ae9049f64895522be3862156a1af15513c3ff285844c9aae255d74c0dacf6c47d6809ce69ee6e41a03a03b29152ee43afabd82aa883f260995238aa70895dc3aee59a119dc82fb5fd00af56ded09336e2df6a0bb41bd191d57b35eb262a1aa8d5fec51b24500685f8c0adaf3639790fdbd7cb2ac3af37a802a6ac7265a819c91986c45e7c54d91c5ced552d96c04a80c063fee16b3a52bc603deebe32e4e0dfdfe9d03658daad65606e175041076684110e66f74db9509b1a29e765c9208ddba13e3b42b3963dce5432c4fb7844a9b64c518820c9c0198fadb6ea6a350f89a1eb1a3c1e20527ce574c3514f9ad62be70eee070faa267d83564e6db87e4d16ccd118397c2e4825140e6b46c35edb77df7b9a3334ad3f8cb70b73f4b9d8b29eb50b2c2dfc8d82841a6251fcfcb978ce90873ddcfa0125800302f5ed70c724e0253fb45955750f1e7c94ca05a91ec592ee3a52fad94c89205ece2d1d96afbfa0b59f9bd6c1161c638fff8696973fedca3f3ddf5bbb1023", @ANYRES32=r6, @ANYBLOB="00000000000000000c72c0fff6ffffff850000005b0000009500000000000000"], &(0x7f0000000040)='GPL\x00', 0x3ff, 0xd5, &(0x7f0000000080)=""/213, 0x61800, 0xab6c50112a8dd52c, [], 0x0, 0x16, 0xffffffffffffffff, 0x8, &(0x7f0000000180)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000001c0)={0x2, 0x6, 0x6, 0x5}, 0x10}, 0x78) bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x11, 0x5, 0x81, 0x2, 0x100, r5, 0x3, [], 0x0, 0xffffffffffffffff, 0x4, 0x3}, 0x3c) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r9, &(0x7f0000000200), 0x806000) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, r4, 0x0, 0x2a8, &(0x7f0000000440)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\a\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83CZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x98\x86\"R\x06\x00\x00\x00\x00\x00\x00\x00\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&\x014\x01\xf4\xb7\x83\x9a\xfa*\xa6\x06\xb7Pk7N\xc2\xd9\xee\xd0\xb0M\x00\xab\xc3\t\fc\xd8dx\xd5\x1dU*s)\x12[\x14\xb1\xc0\xd7\x1a\xa0\x16\xa2z\x9e\x93 \xddeF>29\v\x02\xa2b\x13R\xef\xffA,\xb9.$\xfa\x9f\xde[\x80\xd1=\xce\x1b\xeb\xf6\xf4\xe3z\x1f\x9dz\xa3\xc0\xe2\xa2\xb1\xeeq\xf5\xec0\x8e\xf4\xfb\xd9\x87\xf03\xdb\xae|\x10&V5c\xa6\xce\xcd\x8a\xdf\xe1\x89\"\xea\xde\xe7\xa3\xbe\xe7\xff\xf9 \x11\xfdY\xc6\xa1\xe8\xda\v\\?\xcb\x87\bn\x9b\x01\x1f\xf8\xe8\x1eV\xfaC\xdf\xc3Vv\x9b\x1a\xfc\x14.c\x94\xc9=\xb0\x0f!d\b\x18*@m\x7f\xaal\x17G\xd6?\x81\x16P\x03\x10e\xc3\xcd\xb1B\xeb\x01B\\\x91A\xa1\x8an\xb4#\xadr\x1e\x81v\xa2\x0e6x\xca\x8b\xa6\xd8\x81\x10:\x0e(\xdd\xfc\xc9\xc6\xb4\xf0\'f:\xbd\xfe\x11\xf8\xc8W\x81s^\xd9W\xf1\x94\xaf\xc5\x8a\xb4f\x1b\x17E\xb23\x12\xb0\xeb\xef\x8c\xb24h\xd7}\x7f\x92Hgej\x957\xe2A'}, 0x30) 03:44:12 executing program 2: r0 = openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454ca, &(0x7f0000000040)={'\x00', 0x2}) 03:44:12 executing program 1: r0 = openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454ca, &(0x7f0000000040)={'\x00', 0x2}) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f00000000c0)={0x0, &(0x7f0000000200)}) [ 731.388940][T30921] IPVS: ftp: loaded support on port[0] = 21 03:44:12 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) sendmmsg$inet(r0, &(0x7f0000001100)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000001340)="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", 0x162}], 0x1}}], 0x1, 0x0) 03:44:12 executing program 2: r0 = openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454ca, &(0x7f0000000040)={'\x00', 0x2}) 03:44:12 executing program 1: r0 = openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454ca, &(0x7f0000000040)={'\x00', 0x2}) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f00000000c0)={0x0, &(0x7f0000000200)}) 03:44:12 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) sendmmsg$inet(r0, &(0x7f0000001100)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000001340)="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", 0x162}], 0x1}}], 0x1, 0x0) 03:44:12 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x400007) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0x32600) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xb4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000040)='cpuset') write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000700)=ANY=[@ANYBLOB="006d176df3384ed3ddbcf3be0e26fd017529253262b78ee8b9d470"], 0x1b) ioctl$TUNSETCARRIER(0xffffffffffffffff, 0x400454e2, &(0x7f0000000080)=0x1) write$cgroup_int(r0, &(0x7f0000000380), 0x12) write$cgroup_int(r1, &(0x7f0000000400), 0xd) r2 = gettid() write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000000)=r2, 0x12) r3 = socket$kcm(0x2b, 0x0, 0x0) socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r3, 0x0, 0x0) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000280)=r2, 0x12) r4 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) close(r5) write$cgroup_type(r5, &(0x7f0000000080)='threaded\x00', 0xfffffc61) r6 = bpf$MAP_CREATE(0x2, &(0x7f0000009280), 0x3c) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x17, 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB], &(0x7f0000000200)='syzkaller\x00', 0xfa1, 0x0, 0x0, 0x41100, 0x2, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, &(0x7f0000000240), 0x8, 0x10, 0x0}, 0x78) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000008740)={0x0, 0x0, &(0x7f0000008700)=[{0x0}, {&(0x7f0000008680)=""/23, 0x17}, {&(0x7f00000086c0)=""/38, 0x26}], 0x3}, 0x8000) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x6, 0x2, 0x2e15579, 0x3f, 0x1, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffffff, 0x0, 0x5}, 0x3c) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0xb, [], 0x0, 0xc, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r7}, 0x7e) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r8, &(0x7f0000000000)=ANY=[], 0x50c000) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x18, 0x8, &(0x7f0000000a00)=ANY=[@ANYBLOB="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", @ANYRES32=r6, @ANYBLOB="00000000000000000c72c0fff6ffffff850000005b0000009500000000000000"], &(0x7f0000000040)='GPL\x00', 0x3ff, 0xd5, &(0x7f0000000080)=""/213, 0x61800, 0xab6c50112a8dd52c, [], 0x0, 0x16, 0xffffffffffffffff, 0x8, &(0x7f0000000180)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000001c0)={0x2, 0x6, 0x6, 0x5}, 0x10}, 0x78) bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x11, 0x5, 0x81, 0x2, 0x100, r5, 0x3, [], 0x0, 0xffffffffffffffff, 0x4, 0x3}, 0x3c) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r9, &(0x7f0000000200), 0x806000) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, r4, 0x0, 0x2a8, &(0x7f0000000440)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\a\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83CZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x98\x86\"R\x06\x00\x00\x00\x00\x00\x00\x00\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&\x014\x01\xf4\xb7\x83\x9a\xfa*\xa6\x06\xb7Pk7N\xc2\xd9\xee\xd0\xb0M\x00\xab\xc3\t\fc\xd8dx\xd5\x1dU*s)\x12[\x14\xb1\xc0\xd7\x1a\xa0\x16\xa2z\x9e\x93 \xddeF>29\v\x02\xa2b\x13R\xef\xffA,\xb9.$\xfa\x9f\xde[\x80\xd1=\xce\x1b\xeb\xf6\xf4\xe3z\x1f\x9dz\xa3\xc0\xe2\xa2\xb1\xeeq\xf5\xec0\x8e\xf4\xfb\xd9\x87\xf03\xdb\xae|\x10&V5c\xa6\xce\xcd\x8a\xdf\xe1\x89\"\xea\xde\xe7\xa3\xbe\xe7\xff\xf9 \x11\xfdY\xc6\xa1\xe8\xda\v\\?\xcb\x87\bn\x9b\x01\x1f\xf8\xe8\x1eV\xfaC\xdf\xc3Vv\x9b\x1a\xfc\x14.c\x94\xc9=\xb0\x0f!d\b\x18*@m\x7f\xaal\x17G\xd6?\x81\x16P\x03\x10e\xc3\xcd\xb1B\xeb\x01B\\\x91A\xa1\x8an\xb4#\xadr\x1e\x81v\xa2\x0e6x\xca\x8b\xa6\xd8\x81\x10:\x0e(\xdd\xfc\xc9\xc6\xb4\xf0\'f:\xbd\xfe\x11\xf8\xc8W\x81s^\xd9W\xf1\x94\xaf\xc5\x8a\xb4f\x1b\x17E\xb23\x12\xb0\xeb\xef\x8c\xb24h\xd7}\x7f\x92Hgej\x957\xe2A'}, 0x30) 03:44:12 executing program 5: openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) ioctl$RNDADDENTROPY(0xffffffffffffffff, 0x40085203, &(0x7f0000000100)={0x6, 0xbc, "56f80f8d7c9ad684157765ee68815e033b7b2972a2d067318db9ac518603e0dbae813e160bd3f15b30c226056579cf64ac2525dd44c15e56204f1e3f1b8c03b31f4281605682d4b39a61b89636b3a2a5ea0bd3f5e8bd40d8c0406969d18fed78e4f4108902b5959ec383c40036f5262e703d6ad6a7a486302c382e45645bfe4c472249b482a28e9519e744cdbe884985d913612a17250eab7e4f0bf4b35aab9f7b923116a8d30baf612ca3bc2ef9b3f8d1c6b570cb60bd8d5b6805ce"}) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_sctp(0x2, 0x5, 0x84) dup3(0xffffffffffffffff, r0, 0x0) socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp_SCTP_AUTH_DEACTIVATE_KEY(0xffffffffffffffff, 0x84, 0x23, 0x0, 0x0) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f00000000c0)={0x51, 0xfffc, 0x0, {0x103, 0xf1}, {0x9}, @ramp={0x2, 0x0, {0x7fff, 0x0, 0x7, 0x7}}}) r1 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r1, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @bcast, @rose, @rose, @null]}, 0x48) listen(r1, 0x0) unshare(0x40000000) r2 = accept(r1, 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r3, 0xffffffffffffffff) write$binfmt_elf64(r2, &(0x7f00000002c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}], "", [[], []]}, 0x278) 03:44:12 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x238) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) writev(r0, &(0x7f0000000540)=[{&(0x7f0000000140)="cedbddea5b67f4290aa7fd7c0cc7e2e613891a59fd3dc2e8a3c6e7c9fa96", 0x1e}, {&(0x7f0000000340)="e4bc7c957b83ba155edae525e00f76c76056ac3fe8a5de5ccfba604ac6b0d4a0fd42802b43143a32d703bd21baddda61ba1cb78758f519c19a0619", 0x3b}, {&(0x7f00000004c0)="4b8043af3b13f04c3ee02ee028e584b538cfb06be329d5ca0649880187b5cd5ff601bf73", 0x24}, {&(0x7f0000000800)="87cfb3bd1ada6e425bdd5aaccdafa6e4ea74", 0x12}], 0x4) sendto$inet(r0, &(0x7f00000012c0)="0c268a927f1f6588b967481241ba7860005cf65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95425a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x27) 03:44:12 executing program 2: r0 = openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454ca, &(0x7f0000000040)={'\x00', 0x2}) 03:44:12 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454ca, &(0x7f0000000040)={'\x00', 0x2}) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f00000000c0)={0x0, &(0x7f0000000200)}) 03:44:12 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) sendmmsg$inet(r0, &(0x7f0000001100)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000001340)="492b7b56e7bf1546ba9024d15debc3fdf835944e6359dfc82ad6a44af6174b7048d6774edb2a522c3b5aebed3bba4b546494bbf6043a7a659fa12216b37584d6922636fff14b623e8c3e9fe28800be702458a4e01e63a39ce0913a26da044aa26f457632cfb8104ef5156bc27f3c08d0a0662a69249556e9a7dcc2da9fdefdd1378f5ef60bb2a8ea72a06c11be333049a90b1c46352f3c5409e32849a93d43e39038bd6c1d6e8eab5b135933cc6fc02853cf997defa87b0bdc2eedad7426259c9118c5a885705288956f19cf9fcb5a5e3f772253900b73288028f2135004a304699d8879a3b2570b1c0f7d45bd5a730a2e57413513c2bb12b095d986617eab6020147d6974b75058c7d235a54b139958054e31290acf55b048b3a6a5e7515295ba626378ce82b4ee22cc23bd5b82363bcb7ff225fc556ecfa3b764d8ef16aa66c6b85d546bac428bfd4e23996cc7d4b1f36e08bf5611234fa7ecf93d7835ab9b0302", 0x162}], 0x1}}], 0x1, 0x0) [ 732.019898][T30953] IPVS: ftp: loaded support on port[0] = 21 03:44:13 executing program 2: openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454ca, &(0x7f0000000040)={'\x00', 0x2}) 03:44:13 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x400007) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0x32600) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xb4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000040)='cpuset') write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000700)=ANY=[@ANYBLOB="006d176df3384ed3ddbcf3be0e26fd017529253262b78ee8b9d470"], 0x1b) ioctl$TUNSETCARRIER(0xffffffffffffffff, 0x400454e2, &(0x7f0000000080)=0x1) write$cgroup_int(r0, &(0x7f0000000380), 0x12) write$cgroup_int(r1, &(0x7f0000000400), 0xd) r2 = gettid() write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000000)=r2, 0x12) r3 = socket$kcm(0x2b, 0x0, 0x0) socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r3, 0x0, 0x0) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000280)=r2, 0x12) r4 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) close(r5) write$cgroup_type(r5, &(0x7f0000000080)='threaded\x00', 0xfffffc61) r6 = bpf$MAP_CREATE(0x2, &(0x7f0000009280), 0x3c) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x17, 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB], &(0x7f0000000200)='syzkaller\x00', 0xfa1, 0x0, 0x0, 0x41100, 0x2, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, &(0x7f0000000240), 0x8, 0x10, 0x0}, 0x78) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000008740)={0x0, 0x0, &(0x7f0000008700)=[{0x0}, {&(0x7f0000008680)=""/23, 0x17}, {&(0x7f00000086c0)=""/38, 0x26}], 0x3}, 0x8000) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x6, 0x2, 0x2e15579, 0x3f, 0x1, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffffff, 0x0, 0x5}, 0x3c) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0xb, [], 0x0, 0xc, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r7}, 0x7e) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r8, &(0x7f0000000000)=ANY=[], 0x50c000) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x18, 0x8, &(0x7f0000000a00)=ANY=[@ANYBLOB="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", @ANYRES32=r6, @ANYBLOB="00000000000000000c72c0fff6ffffff850000005b0000009500000000000000"], &(0x7f0000000040)='GPL\x00', 0x3ff, 0xd5, &(0x7f0000000080)=""/213, 0x61800, 0xab6c50112a8dd52c, [], 0x0, 0x16, 0xffffffffffffffff, 0x8, &(0x7f0000000180)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000001c0)={0x2, 0x6, 0x6, 0x5}, 0x10, 0x0, r8}, 0x78) bpf$MAP_CREATE(0x0, 0x0, 0x0) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r9, &(0x7f0000000200), 0x806000) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, r4, 0x0, 0x2a8, &(0x7f0000000440)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\a\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83CZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x98\x86\"R\x06\x00\x00\x00\x00\x00\x00\x00\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&\x014\x01\xf4\xb7\x83\x9a\xfa*\xa6\x06\xb7Pk7N\xc2\xd9\xee\xd0\xb0M\x00\xab\xc3\t\fc\xd8dx\xd5\x1dU*s)\x12[\x14\xb1\xc0\xd7\x1a\xa0\x16\xa2z\x9e\x93 \xddeF>29\v\x02\xa2b\x13R\xef\xffA,\xb9.$\xfa\x9f\xde[\x80\xd1=\xce\x1b\xeb\xf6\xf4\xe3z\x1f\x9dz\xa3\xc0\xe2\xa2\xb1\xeeq\xf5\xec0\x8e\xf4\xfb\xd9\x87\xf03\xdb\xae|\x10&V5c\xa6\xce\xcd\x8a\xdf\xe1\x89\"\xea\xde\xe7\xa3\xbe\xe7\xff\xf9 \x11\xfdY\xc6\xa1\xe8\xda\v\\?\xcb\x87\bn\x9b\x01\x1f\xf8\xe8\x1eV\xfaC\xdf\xc3Vv\x9b\x1a\xfc\x14.c\x94\xc9=\xb0\x0f!d\b\x18*@m\x7f\xaal\x17G\xd6?\x81\x16P\x03\x10e\xc3\xcd\xb1B\xeb\x01B\\\x91A\xa1\x8an\xb4#\xadr\x1e\x81v\xa2\x0e6x\xca\x8b\xa6\xd8\x81\x10:\x0e(\xdd\xfc\xc9\xc6\xb4\xf0\'f:\xbd\xfe\x11\xf8\xc8W\x81s^\xd9W\xf1\x94\xaf\xc5\x8a\xb4f\x1b\x17E\xb23\x12\xb0\xeb\xef\x8c\xb24h\xd7}\x7f\x92Hgej\x957\xe2A'}, 0x30) 03:44:13 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454ca, &(0x7f0000000040)={'\x00', 0x2}) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f00000000c0)={0x0, &(0x7f0000000200)}) 03:44:13 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) sendmmsg$inet(r0, &(0x7f0000001100)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000001340)="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", 0x168}], 0x1}}], 0x1, 0x0) 03:44:13 executing program 5: openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) ioctl$RNDADDENTROPY(0xffffffffffffffff, 0x40085203, &(0x7f0000000100)={0x6, 0xbc, "56f80f8d7c9ad684157765ee68815e033b7b2972a2d067318db9ac518603e0dbae813e160bd3f15b30c226056579cf64ac2525dd44c15e56204f1e3f1b8c03b31f4281605682d4b39a61b89636b3a2a5ea0bd3f5e8bd40d8c0406969d18fed78e4f4108902b5959ec383c40036f5262e703d6ad6a7a486302c382e45645bfe4c472249b482a28e9519e744cdbe884985d913612a17250eab7e4f0bf4b35aab9f7b923116a8d30baf612ca3bc2ef9b3f8d1c6b570cb60bd8d5b6805ce"}) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_sctp(0x2, 0x5, 0x84) dup3(0xffffffffffffffff, r0, 0x0) socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp_SCTP_AUTH_DEACTIVATE_KEY(0xffffffffffffffff, 0x84, 0x23, 0x0, 0x0) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f00000000c0)={0x51, 0xfffc, 0x0, {0x103, 0xf1}, {0x9}, @ramp={0x2, 0x0, {0x7fff, 0x0, 0x7, 0x7}}}) r1 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r1, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @bcast, @rose, @rose, @null]}, 0x48) listen(r1, 0x0) unshare(0x40000000) r2 = accept(r1, 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r3, 0xffffffffffffffff) write$binfmt_elf64(r2, &(0x7f00000002c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}], "", [[], []]}, 0x278) 03:44:13 executing program 2: openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454ca, &(0x7f0000000040)={'\x00', 0x2}) 03:44:13 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) sendmmsg$inet(r0, &(0x7f0000001100)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000001340)="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", 0x168}], 0x1}}], 0x1, 0x0) 03:44:13 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454ca, &(0x7f0000000040)={'\x00', 0x2}) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f00000000c0)={0x0, &(0x7f0000000200)}) [ 732.645938][T30983] IPVS: ftp: loaded support on port[0] = 21 03:44:13 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x238) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) writev(r0, &(0x7f0000000540)=[{&(0x7f0000000140)="cedbddea5b67f4290aa7fd7c0cc7e2e613891a59fd3dc2e8a3c6e7c9fa96", 0x1e}, {&(0x7f0000000340)="e4bc7c957b83ba155edae525e00f76c76056ac3fe8a5de5ccfba604ac6b0d4a0fd42802b43143a32d703bd21baddda61ba1cb78758f519c19a0619", 0x3b}, {&(0x7f00000004c0)="4b8043af3b13f04c3ee02ee028e584b538cfb06be329d5ca0649880187b5cd5ff601bf73", 0x24}, {&(0x7f0000000800)="87cfb3bd1ada6e425bdd5aaccdafa6e4ea74", 0x12}], 0x4) sendto$inet(r0, &(0x7f00000012c0)="0c268a927f1f6588b967481241ba7860005cf65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95425a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x27) 03:44:13 executing program 2: openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454ca, &(0x7f0000000040)={'\x00', 0x2}) [ 732.710274][T27358] tipc: TX() has been purged, node left! [ 732.717312][T27358] tipc: TX() has been purged, node left! 03:44:13 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x400007) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0x32600) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xb4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000040)='cpuset') write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000700)=ANY=[@ANYBLOB="006d176df3384ed3ddbcf3be0e26fd017529253262b78ee8b9d470"], 0x1b) ioctl$TUNSETCARRIER(0xffffffffffffffff, 0x400454e2, &(0x7f0000000080)=0x1) write$cgroup_int(r0, &(0x7f0000000380), 0x12) write$cgroup_int(r1, &(0x7f0000000400), 0xd) r2 = gettid() write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000000)=r2, 0x12) r3 = socket$kcm(0x2b, 0x0, 0x0) socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r3, 0x0, 0x0) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000280)=r2, 0x12) r4 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) close(r5) write$cgroup_type(r5, &(0x7f0000000080)='threaded\x00', 0xfffffc61) r6 = bpf$MAP_CREATE(0x2, &(0x7f0000009280), 0x3c) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x17, 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB], &(0x7f0000000200)='syzkaller\x00', 0xfa1, 0x0, 0x0, 0x41100, 0x2, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, &(0x7f0000000240), 0x8, 0x10, 0x0}, 0x78) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000008740)={0x0, 0x0, &(0x7f0000008700)=[{0x0}, {&(0x7f0000008680)=""/23, 0x17}, {&(0x7f00000086c0)=""/38, 0x26}], 0x3}, 0x8000) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x6, 0x2, 0x2e15579, 0x3f, 0x1, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffffff, 0x0, 0x5}, 0x3c) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0xb, [], 0x0, 0xc, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r7}, 0x7e) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r8, &(0x7f0000000000)=ANY=[], 0x50c000) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x18, 0x8, &(0x7f0000000a00)=ANY=[@ANYBLOB="0000752c0000000000000000ffffffff9500000000000000181400006200ed587c1ba87fb23af22b6cf03fb851054ce322d4b3a5894516c0c1479e1cfbf3061ad7aef6d6c36e4e74a8219f8441192ab16361719f26a1e543525c94027f7a5f275546d8cacee044fc20d858e268019caeb1633cc4888faa05d02cd44de32962e022697754125edcfb3477c4e122a0e97ab43de94a7a94efd527400e2c2ff4468fd6e773773f089b268fddef712ab174487ae9049f64895522be3862156a1af15513c3ff285844c9aae255d74c0dacf6c47d6809ce69ee6e41a03a03b29152ee43afabd82aa883f260995238aa70895dc3aee59a119dc82fb5fd00af56ded09336e2df6a0bb41bd191d57b35eb262a1aa8d5fec51b24500685f8c0adaf3639790fdbd7cb2ac3af37a802a6ac7265a819c91986c45e7c54d91c5ced552d96c04a80c063fee16b3a52bc603deebe32e4e0dfdfe9d03658daad65606e175041076684110e66f74db9509b1a29e765c9208ddba13e3b42b3963dce5432c4fb7844a9b64c518820c9c0198fadb6ea6a350f89a1eb1a3c1e20527ce574c3514f9ad62be70eee070faa267d83564e6db87e4d16ccd118397c2e4825140e6b46c35edb77df7b9a3334ad3f8cb70b73f4b9d8b29eb50b2c2dfc8d82841a6251fcfcb978ce90873ddcfa0125800302f5ed70c724e0253fb45955750f1e7c94ca05a91ec592ee3a52fad94c89205ece2d1d96afbfa0b59f9bd6c1161c638fff8696973fedca3f3ddf5bbb1023", @ANYRES32=r6, @ANYBLOB="00000000000000000c72c0fff6ffffff850000005b0000009500000000000000"], &(0x7f0000000040)='GPL\x00', 0x3ff, 0xd5, &(0x7f0000000080)=""/213, 0x61800, 0xab6c50112a8dd52c, [], 0x0, 0x16, 0xffffffffffffffff, 0x8, &(0x7f0000000180)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000001c0)={0x2, 0x6, 0x6, 0x5}, 0x10, 0x0, r8}, 0x78) bpf$MAP_CREATE(0x0, 0x0, 0x0) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r9, &(0x7f0000000200), 0x806000) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, r4, 0x0, 0x2a8, &(0x7f0000000440)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\a\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83CZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x98\x86\"R\x06\x00\x00\x00\x00\x00\x00\x00\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&\x014\x01\xf4\xb7\x83\x9a\xfa*\xa6\x06\xb7Pk7N\xc2\xd9\xee\xd0\xb0M\x00\xab\xc3\t\fc\xd8dx\xd5\x1dU*s)\x12[\x14\xb1\xc0\xd7\x1a\xa0\x16\xa2z\x9e\x93 \xddeF>29\v\x02\xa2b\x13R\xef\xffA,\xb9.$\xfa\x9f\xde[\x80\xd1=\xce\x1b\xeb\xf6\xf4\xe3z\x1f\x9dz\xa3\xc0\xe2\xa2\xb1\xeeq\xf5\xec0\x8e\xf4\xfb\xd9\x87\xf03\xdb\xae|\x10&V5c\xa6\xce\xcd\x8a\xdf\xe1\x89\"\xea\xde\xe7\xa3\xbe\xe7\xff\xf9 \x11\xfdY\xc6\xa1\xe8\xda\v\\?\xcb\x87\bn\x9b\x01\x1f\xf8\xe8\x1eV\xfaC\xdf\xc3Vv\x9b\x1a\xfc\x14.c\x94\xc9=\xb0\x0f!d\b\x18*@m\x7f\xaal\x17G\xd6?\x81\x16P\x03\x10e\xc3\xcd\xb1B\xeb\x01B\\\x91A\xa1\x8an\xb4#\xadr\x1e\x81v\xa2\x0e6x\xca\x8b\xa6\xd8\x81\x10:\x0e(\xdd\xfc\xc9\xc6\xb4\xf0\'f:\xbd\xfe\x11\xf8\xc8W\x81s^\xd9W\xf1\x94\xaf\xc5\x8a\xb4f\x1b\x17E\xb23\x12\xb0\xeb\xef\x8c\xb24h\xd7}\x7f\x92Hgej\x957\xe2A'}, 0x30) [ 732.762664][T27358] tipc: TX() has been purged, node left! [ 732.781224][T27358] tipc: TX() has been purged, node left! [ 732.803660][T27358] tipc: TX() has been purged, node left! [ 732.825051][T27358] tipc: TX() has been purged, node left! [ 732.833460][T27358] tipc: TX() has been purged, node left! 03:44:13 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) sendmmsg$inet(r0, &(0x7f0000001100)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000001340)="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", 0x168}], 0x1}}], 0x1, 0x0) [ 732.855505][T27358] tipc: TX() has been purged, node left! [ 732.869598][T27358] tipc: TX() has been purged, node left! [ 732.892354][T27358] tipc: TX() has been purged, node left! 03:44:13 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454ca, 0x0) 03:44:14 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454ca, 0x0) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f00000000c0)={0x0, &(0x7f0000000200)}) 03:44:14 executing program 5: openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) ioctl$RNDADDENTROPY(0xffffffffffffffff, 0x40085203, &(0x7f0000000100)={0x6, 0xbc, "56f80f8d7c9ad684157765ee68815e033b7b2972a2d067318db9ac518603e0dbae813e160bd3f15b30c226056579cf64ac2525dd44c15e56204f1e3f1b8c03b31f4281605682d4b39a61b89636b3a2a5ea0bd3f5e8bd40d8c0406969d18fed78e4f4108902b5959ec383c40036f5262e703d6ad6a7a486302c382e45645bfe4c472249b482a28e9519e744cdbe884985d913612a17250eab7e4f0bf4b35aab9f7b923116a8d30baf612ca3bc2ef9b3f8d1c6b570cb60bd8d5b6805ce"}) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_sctp(0x2, 0x5, 0x84) dup3(0xffffffffffffffff, r0, 0x0) socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp_SCTP_AUTH_DEACTIVATE_KEY(0xffffffffffffffff, 0x84, 0x23, 0x0, 0x0) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f00000000c0)={0x51, 0xfffc, 0x0, {0x103, 0xf1}, {0x9}, @ramp={0x2, 0x3, {0x0, 0x0, 0x7, 0x7}}}) r1 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r1, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @bcast, @rose, @rose, @null]}, 0x48) listen(r1, 0x0) unshare(0x40000000) r2 = accept(r1, 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r3, 0xffffffffffffffff) write$binfmt_elf64(r2, &(0x7f00000002c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}], "", [[], []]}, 0x278) [ 733.126420][T27358] tipc: TX() has been purged, node left! 03:44:14 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) sendmmsg$inet(r0, &(0x7f0000001100)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000001340)="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", 0x16b}], 0x1}}], 0x1, 0x0) 03:44:14 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454ca, 0x0) 03:44:14 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454ca, 0x0) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f00000000c0)={0x0, &(0x7f0000000200)}) 03:44:14 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x400007) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0x32600) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xb4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000040)='cpuset') write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000700)=ANY=[@ANYBLOB="006d176df3384ed3ddbcf3be0e26fd017529253262b78ee8b9d470"], 0x1b) ioctl$TUNSETCARRIER(0xffffffffffffffff, 0x400454e2, &(0x7f0000000080)=0x1) write$cgroup_int(r0, &(0x7f0000000380), 0x12) write$cgroup_int(r1, &(0x7f0000000400), 0xd) r2 = gettid() write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000000)=r2, 0x12) r3 = socket$kcm(0x2b, 0x0, 0x0) socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r3, 0x0, 0x0) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000280)=r2, 0x12) r4 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) close(r5) write$cgroup_type(r5, &(0x7f0000000080)='threaded\x00', 0xfffffc61) r6 = bpf$MAP_CREATE(0x2, &(0x7f0000009280), 0x3c) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x17, 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB], &(0x7f0000000200)='syzkaller\x00', 0xfa1, 0x0, 0x0, 0x41100, 0x2, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, &(0x7f0000000240), 0x8, 0x10, 0x0}, 0x78) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000008740)={0x0, 0x0, &(0x7f0000008700)=[{0x0}, {&(0x7f0000008680)=""/23, 0x17}, {&(0x7f00000086c0)=""/38, 0x26}], 0x3}, 0x8000) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x6, 0x2, 0x2e15579, 0x3f, 0x1, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffffff, 0x0, 0x5}, 0x3c) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0xb, [], 0x0, 0xc, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r7}, 0x7e) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r8, &(0x7f0000000000)=ANY=[], 0x50c000) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x18, 0x8, &(0x7f0000000a00)=ANY=[@ANYBLOB="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", @ANYRES32=r6, @ANYBLOB="00000000000000000c72c0fff6ffffff850000005b0000009500000000000000"], &(0x7f0000000040)='GPL\x00', 0x3ff, 0xd5, &(0x7f0000000080)=""/213, 0x61800, 0xab6c50112a8dd52c, [], 0x0, 0x16, 0xffffffffffffffff, 0x8, &(0x7f0000000180)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000001c0)={0x2, 0x6, 0x6, 0x5}, 0x10, 0x0, r8}, 0x78) bpf$MAP_CREATE(0x0, 0x0, 0x0) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r9, &(0x7f0000000200), 0x806000) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, r4, 0x0, 0x2a8, &(0x7f0000000440)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\a\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83CZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x98\x86\"R\x06\x00\x00\x00\x00\x00\x00\x00\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&\x014\x01\xf4\xb7\x83\x9a\xfa*\xa6\x06\xb7Pk7N\xc2\xd9\xee\xd0\xb0M\x00\xab\xc3\t\fc\xd8dx\xd5\x1dU*s)\x12[\x14\xb1\xc0\xd7\x1a\xa0\x16\xa2z\x9e\x93 \xddeF>29\v\x02\xa2b\x13R\xef\xffA,\xb9.$\xfa\x9f\xde[\x80\xd1=\xce\x1b\xeb\xf6\xf4\xe3z\x1f\x9dz\xa3\xc0\xe2\xa2\xb1\xeeq\xf5\xec0\x8e\xf4\xfb\xd9\x87\xf03\xdb\xae|\x10&V5c\xa6\xce\xcd\x8a\xdf\xe1\x89\"\xea\xde\xe7\xa3\xbe\xe7\xff\xf9 \x11\xfdY\xc6\xa1\xe8\xda\v\\?\xcb\x87\bn\x9b\x01\x1f\xf8\xe8\x1eV\xfaC\xdf\xc3Vv\x9b\x1a\xfc\x14.c\x94\xc9=\xb0\x0f!d\b\x18*@m\x7f\xaal\x17G\xd6?\x81\x16P\x03\x10e\xc3\xcd\xb1B\xeb\x01B\\\x91A\xa1\x8an\xb4#\xadr\x1e\x81v\xa2\x0e6x\xca\x8b\xa6\xd8\x81\x10:\x0e(\xdd\xfc\xc9\xc6\xb4\xf0\'f:\xbd\xfe\x11\xf8\xc8W\x81s^\xd9W\xf1\x94\xaf\xc5\x8a\xb4f\x1b\x17E\xb23\x12\xb0\xeb\xef\x8c\xb24h\xd7}\x7f\x92Hgej\x957\xe2A'}, 0x30) [ 733.307884][T27358] tipc: TX() has been purged, node left! [ 733.320915][T31017] IPVS: ftp: loaded support on port[0] = 21 03:44:14 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x238) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) writev(r0, &(0x7f0000000540)=[{&(0x7f0000000140)="cedbddea5b67f4290aa7fd7c0cc7e2e613891a59fd3dc2e8a3c6e7c9fa96", 0x1e}, {&(0x7f0000000340)="e4bc7c957b83ba155edae525e00f76c76056ac3fe8a5de5ccfba604ac6b0d4a0fd42802b43143a32d703bd21baddda61ba1cb78758f519c19a0619", 0x3b}, {&(0x7f00000004c0)="4b8043af3b13f04c3ee02ee028e584b538cfb06be329d5ca0649880187b5cd5ff601bf73", 0x24}, {&(0x7f0000000800)="87cfb3bd1ada6e425bdd5aaccdafa6e4ea74", 0x12}], 0x4) sendto$inet(r0, &(0x7f00000012c0)="0c268a927f1f6588b967481241ba7860005cf65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95425a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x27) [ 733.391086][T27358] tipc: TX() has been purged, node left! [ 733.413368][T27358] tipc: TX() has been purged, node left! 03:44:14 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454ca, 0x0) [ 733.442169][T27358] tipc: TX() has been purged, node left! 03:44:14 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) sendmmsg$inet(r0, &(0x7f0000001100)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000001340)="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", 0x16b}], 0x1}}], 0x1, 0x0) 03:44:14 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454ca, 0x0) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f00000000c0)={0x0, &(0x7f0000000200)}) 03:44:14 executing program 5: openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) ioctl$RNDADDENTROPY(0xffffffffffffffff, 0x40085203, &(0x7f0000000100)={0x6, 0xbc, "56f80f8d7c9ad684157765ee68815e033b7b2972a2d067318db9ac518603e0dbae813e160bd3f15b30c226056579cf64ac2525dd44c15e56204f1e3f1b8c03b31f4281605682d4b39a61b89636b3a2a5ea0bd3f5e8bd40d8c0406969d18fed78e4f4108902b5959ec383c40036f5262e703d6ad6a7a486302c382e45645bfe4c472249b482a28e9519e744cdbe884985d913612a17250eab7e4f0bf4b35aab9f7b923116a8d30baf612ca3bc2ef9b3f8d1c6b570cb60bd8d5b6805ce"}) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_sctp(0x2, 0x5, 0x84) dup3(0xffffffffffffffff, r0, 0x0) socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp_SCTP_AUTH_DEACTIVATE_KEY(0xffffffffffffffff, 0x84, 0x23, 0x0, 0x0) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f00000000c0)={0x51, 0xfffc, 0x0, {0x103, 0xf1}, {0x9}, @ramp={0x2, 0x3, {0x0, 0x0, 0x7, 0x7}}}) r1 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r1, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @bcast, @rose, @rose, @null]}, 0x48) listen(r1, 0x0) unshare(0x40000000) r2 = accept(r1, 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r3, 0xffffffffffffffff) write$binfmt_elf64(r2, &(0x7f00000002c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}], "", [[], []]}, 0x278) 03:44:14 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454ca, &(0x7f0000000040)) 03:44:14 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) sendmmsg$inet(r0, &(0x7f0000001100)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000001340)="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", 0x16b}], 0x1}}], 0x1, 0x0) 03:44:14 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x400007) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0x32600) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xb4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000040)='cpuset') write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000700)=ANY=[@ANYBLOB="006d176df3384ed3ddbcf3be0e26fd017529253262b78ee8b9d470"], 0x1b) ioctl$TUNSETCARRIER(0xffffffffffffffff, 0x400454e2, &(0x7f0000000080)=0x1) write$cgroup_int(r0, &(0x7f0000000380), 0x12) write$cgroup_int(r1, &(0x7f0000000400), 0xd) r2 = gettid() write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000000)=r2, 0x12) r3 = socket$kcm(0x2b, 0x0, 0x0) socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r3, 0x0, 0x0) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000280)=r2, 0x12) r4 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) close(r5) write$cgroup_type(r5, &(0x7f0000000080)='threaded\x00', 0xfffffc61) r6 = bpf$MAP_CREATE(0x2, &(0x7f0000009280), 0x3c) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x17, 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB], &(0x7f0000000200)='syzkaller\x00', 0xfa1, 0x0, 0x0, 0x41100, 0x2, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, &(0x7f0000000240), 0x8, 0x10, 0x0}, 0x78) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000008740)={0x0, 0x0, &(0x7f0000008700)=[{0x0}, {&(0x7f0000008680)=""/23, 0x17}, {&(0x7f00000086c0)=""/38, 0x26}], 0x3}, 0x8000) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x6, 0x2, 0x2e15579, 0x3f, 0x1, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffffff, 0x0, 0x5}, 0x3c) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0xb, [], 0x0, 0xc, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r7}, 0x7e) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r8, &(0x7f0000000000)=ANY=[], 0x50c000) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x18, 0x8, &(0x7f0000000a00)=ANY=[@ANYBLOB="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", @ANYRES32=r6, @ANYBLOB="00000000000000000c72c0fff6ffffff850000005b0000009500000000000000"], &(0x7f0000000040)='GPL\x00', 0x3ff, 0xd5, &(0x7f0000000080)=""/213, 0x61800, 0xab6c50112a8dd52c, [], 0x0, 0x16, 0xffffffffffffffff, 0x8, &(0x7f0000000180)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000001c0)={0x2, 0x6, 0x6, 0x5}, 0x10, 0x0, r8}, 0x78) bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x0, 0x5, 0x81, 0x2, 0x100, r5, 0x3, [], 0x0, 0xffffffffffffffff, 0x4, 0x3}, 0x3c) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r9, &(0x7f0000000200), 0x806000) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, r4, 0x0, 0x2a8, &(0x7f0000000440)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\a\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83CZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x98\x86\"R\x06\x00\x00\x00\x00\x00\x00\x00\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&\x014\x01\xf4\xb7\x83\x9a\xfa*\xa6\x06\xb7Pk7N\xc2\xd9\xee\xd0\xb0M\x00\xab\xc3\t\fc\xd8dx\xd5\x1dU*s)\x12[\x14\xb1\xc0\xd7\x1a\xa0\x16\xa2z\x9e\x93 \xddeF>29\v\x02\xa2b\x13R\xef\xffA,\xb9.$\xfa\x9f\xde[\x80\xd1=\xce\x1b\xeb\xf6\xf4\xe3z\x1f\x9dz\xa3\xc0\xe2\xa2\xb1\xeeq\xf5\xec0\x8e\xf4\xfb\xd9\x87\xf03\xdb\xae|\x10&V5c\xa6\xce\xcd\x8a\xdf\xe1\x89\"\xea\xde\xe7\xa3\xbe\xe7\xff\xf9 \x11\xfdY\xc6\xa1\xe8\xda\v\\?\xcb\x87\bn\x9b\x01\x1f\xf8\xe8\x1eV\xfaC\xdf\xc3Vv\x9b\x1a\xfc\x14.c\x94\xc9=\xb0\x0f!d\b\x18*@m\x7f\xaal\x17G\xd6?\x81\x16P\x03\x10e\xc3\xcd\xb1B\xeb\x01B\\\x91A\xa1\x8an\xb4#\xadr\x1e\x81v\xa2\x0e6x\xca\x8b\xa6\xd8\x81\x10:\x0e(\xdd\xfc\xc9\xc6\xb4\xf0\'f:\xbd\xfe\x11\xf8\xc8W\x81s^\xd9W\xf1\x94\xaf\xc5\x8a\xb4f\x1b\x17E\xb23\x12\xb0\xeb\xef\x8c\xb24h\xd7}\x7f\x92Hgej\x957\xe2A'}, 0x30) 03:44:14 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454ca, &(0x7f0000000040)) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f00000000c0)={0x0, &(0x7f0000000200)}) [ 733.902867][T31047] IPVS: ftp: loaded support on port[0] = 21 03:44:14 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x238) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) writev(r0, &(0x7f0000000540)=[{&(0x7f0000000140)="cedbddea5b67f4290aa7fd7c0cc7e2e613891a59fd3dc2e8a3c6e7c9fa96", 0x1e}, {&(0x7f0000000340)="e4bc7c957b83ba155edae525e00f76c76056ac3fe8a5de5ccfba604ac6b0d4a0fd42802b43143a32d703bd21baddda61ba1cb78758f519c19a06193e8bfc0d1f1fad3be6885359773264bd153a2bf50591662cca307c7a22", 0x58}, {&(0x7f00000004c0)="4b8043af3b13f04c3ee02ee028e584b538cfb06be329d5ca0649880187b5cd5ff601bf73", 0x24}, {&(0x7f0000000800)="87cfb3bd1ada6e425bdd5aaccdafa6e4ea74", 0x12}], 0x4) sendto$inet(r0, &(0x7f00000012c0)="0c268a927f1f6588b967481241ba7860005cf65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95425a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x27) 03:44:15 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454ca, &(0x7f0000000040)) 03:44:15 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) sendmmsg$inet(r0, &(0x7f0000001100)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000001340)="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", 0x16c}], 0x1}}], 0x1, 0x0) 03:44:15 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454ca, &(0x7f0000000040)) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f00000000c0)={0x0, &(0x7f0000000200)}) 03:44:15 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) sendmmsg$inet(r0, &(0x7f0000001100)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000001340)="492b7b56e7bf1546ba9024d15debc3fdf835944e6359dfc82ad6a44af6174b7048d6774edb2a522c3b5aebed3bba4b546494bbf6043a7a659fa12216b37584d6922636fff14b623e8c3e9fe28800be702458a4e01e63a39ce0913a26da044aa26f457632cfb8104ef5156bc27f3c08d0a0662a69249556e9a7dcc2da9fdefdd1378f5ef60bb2a8ea72a06c11be333049a90b1c46352f3c5409e32849a93d43e39038bd6c1d6e8eab5b135933cc6fc02853cf997defa87b0bdc2eedad7426259c9118c5a885705288956f19cf9fcb5a5e3f772253900b73288028f2135004a304699d8879a3b2570b1c0f7d45bd5a730a2e57413513c2bb12b095d986617eab6020147d6974b75058c7d235a54b139958054e31290acf55b048b3a6a5e7515295ba626378ce82b4ee22cc23bd5b82363bcb7ff225fc556ecfa3b764d8ef16aa66c6b85d546bac428bfd4e23996cc7d4b1f36e08bf5611234fa7ecf93d7835ab9b0302b9371497d4ab867e0d57", 0x16c}], 0x1}}], 0x1, 0x0) 03:44:15 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x400007) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0x32600) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xb4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000040)='cpuset') write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000700)=ANY=[@ANYBLOB="006d176df3384ed3ddbcf3be0e26fd017529253262b78ee8b9d470"], 0x1b) ioctl$TUNSETCARRIER(0xffffffffffffffff, 0x400454e2, &(0x7f0000000080)=0x1) write$cgroup_int(r0, &(0x7f0000000380), 0x12) write$cgroup_int(r1, &(0x7f0000000400), 0xd) r2 = gettid() write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000000)=r2, 0x12) r3 = socket$kcm(0x2b, 0x0, 0x0) socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r3, 0x0, 0x0) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000280)=r2, 0x12) r4 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) close(r5) write$cgroup_type(r5, &(0x7f0000000080)='threaded\x00', 0xfffffc61) r6 = bpf$MAP_CREATE(0x2, &(0x7f0000009280), 0x3c) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x17, 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB], &(0x7f0000000200)='syzkaller\x00', 0xfa1, 0x0, 0x0, 0x41100, 0x2, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, &(0x7f0000000240), 0x8, 0x10, 0x0}, 0x78) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000008740)={0x0, 0x0, &(0x7f0000008700)=[{0x0}, {&(0x7f0000008680)=""/23, 0x17}, {&(0x7f00000086c0)=""/38, 0x26}], 0x3}, 0x8000) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x6, 0x2, 0x2e15579, 0x3f, 0x1, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffffff, 0x0, 0x5}, 0x3c) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0xb, [], 0x0, 0xc, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r7}, 0x7e) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r8, &(0x7f0000000000)=ANY=[], 0x50c000) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x18, 0x8, &(0x7f0000000a00)=ANY=[@ANYBLOB="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", @ANYRES32=r6, @ANYBLOB="00000000000000000c72c0fff6ffffff850000005b0000009500000000000000"], &(0x7f0000000040)='GPL\x00', 0x3ff, 0xd5, &(0x7f0000000080)=""/213, 0x61800, 0xab6c50112a8dd52c, [], 0x0, 0x16, 0xffffffffffffffff, 0x8, &(0x7f0000000180)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000001c0)={0x2, 0x6, 0x6, 0x5}, 0x10, 0x0, r8}, 0x78) bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x0, 0x5, 0x81, 0x2, 0x100, r5, 0x3, [], 0x0, 0xffffffffffffffff, 0x4, 0x3}, 0x3c) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r9, &(0x7f0000000200), 0x806000) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, r4, 0x0, 0x2a8, &(0x7f0000000440)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\a\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83CZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x98\x86\"R\x06\x00\x00\x00\x00\x00\x00\x00\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&\x014\x01\xf4\xb7\x83\x9a\xfa*\xa6\x06\xb7Pk7N\xc2\xd9\xee\xd0\xb0M\x00\xab\xc3\t\fc\xd8dx\xd5\x1dU*s)\x12[\x14\xb1\xc0\xd7\x1a\xa0\x16\xa2z\x9e\x93 \xddeF>29\v\x02\xa2b\x13R\xef\xffA,\xb9.$\xfa\x9f\xde[\x80\xd1=\xce\x1b\xeb\xf6\xf4\xe3z\x1f\x9dz\xa3\xc0\xe2\xa2\xb1\xeeq\xf5\xec0\x8e\xf4\xfb\xd9\x87\xf03\xdb\xae|\x10&V5c\xa6\xce\xcd\x8a\xdf\xe1\x89\"\xea\xde\xe7\xa3\xbe\xe7\xff\xf9 \x11\xfdY\xc6\xa1\xe8\xda\v\\?\xcb\x87\bn\x9b\x01\x1f\xf8\xe8\x1eV\xfaC\xdf\xc3Vv\x9b\x1a\xfc\x14.c\x94\xc9=\xb0\x0f!d\b\x18*@m\x7f\xaal\x17G\xd6?\x81\x16P\x03\x10e\xc3\xcd\xb1B\xeb\x01B\\\x91A\xa1\x8an\xb4#\xadr\x1e\x81v\xa2\x0e6x\xca\x8b\xa6\xd8\x81\x10:\x0e(\xdd\xfc\xc9\xc6\xb4\xf0\'f:\xbd\xfe\x11\xf8\xc8W\x81s^\xd9W\xf1\x94\xaf\xc5\x8a\xb4f\x1b\x17E\xb23\x12\xb0\xeb\xef\x8c\xb24h\xd7}\x7f\x92Hgej\x957\xe2A'}, 0x30) 03:44:15 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454ca, &(0x7f0000000040)) 03:44:15 executing program 5: openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) ioctl$RNDADDENTROPY(0xffffffffffffffff, 0x40085203, &(0x7f0000000100)={0x6, 0xbc, "56f80f8d7c9ad684157765ee68815e033b7b2972a2d067318db9ac518603e0dbae813e160bd3f15b30c226056579cf64ac2525dd44c15e56204f1e3f1b8c03b31f4281605682d4b39a61b89636b3a2a5ea0bd3f5e8bd40d8c0406969d18fed78e4f4108902b5959ec383c40036f5262e703d6ad6a7a486302c382e45645bfe4c472249b482a28e9519e744cdbe884985d913612a17250eab7e4f0bf4b35aab9f7b923116a8d30baf612ca3bc2ef9b3f8d1c6b570cb60bd8d5b6805ce"}) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_sctp(0x2, 0x5, 0x84) dup3(0xffffffffffffffff, r0, 0x0) socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp_SCTP_AUTH_DEACTIVATE_KEY(0xffffffffffffffff, 0x84, 0x23, 0x0, 0x0) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f00000000c0)={0x51, 0xfffc, 0x0, {0x103, 0xf1}, {0x9}, @ramp={0x2, 0x3, {0x0, 0x0, 0x7, 0x7}}}) r1 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r1, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @bcast, @rose, @rose, @null]}, 0x48) listen(r1, 0x0) unshare(0x40000000) r2 = accept(r1, 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r3, 0xffffffffffffffff) write$binfmt_elf64(r2, &(0x7f00000002c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}], "", [[], []]}, 0x278) 03:44:15 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x238) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) writev(r0, &(0x7f0000000540)=[{&(0x7f0000000140)="cedbddea5b67f4290aa7fd7c0cc7e2e613891a59fd3dc2e8a3c6e7c9fa96", 0x1e}, {&(0x7f0000000340)="e4bc7c957b83ba155edae525e00f76c76056ac3fe8a5de5ccfba604ac6b0d4a0fd42802b43143a32d703bd21baddda61ba1cb78758f519c19a06193e8bfc0d1f1fad3be6885359773264bd153a2bf50591662cca307c7a22", 0x58}, {&(0x7f00000004c0)="4b8043af3b13f04c3ee02ee028e584b538cfb06be329d5ca0649880187b5cd5ff601bf73", 0x24}, {&(0x7f0000000800)="87cfb3bd1ada6e425bdd5aaccdafa6e4ea74", 0x12}], 0x4) sendto$inet(r0, &(0x7f00000012c0)="0c268a927f1f6588b967481241ba7860005cf65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95425a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x27) 03:44:15 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) sendmmsg$inet(r0, &(0x7f0000001100)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000001340)="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", 0x16c}], 0x1}}], 0x1, 0x0) [ 734.695519][T31284] IPVS: ftp: loaded support on port[0] = 21 03:44:15 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454ca, &(0x7f0000000040)) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f00000000c0)={0x0, &(0x7f0000000200)}) 03:44:15 executing program 2: getsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) keyctl$session_to_parent(0x12) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, 0x0) 03:44:15 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454ca, &(0x7f0000000040)={'\x00', 0x2}) ioctl$TUNATTACHFILTER(0xffffffffffffffff, 0x401054d5, &(0x7f00000000c0)={0x0, &(0x7f0000000200)}) 03:44:16 executing program 0: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) socketpair(0x0, 0x0, 0x6, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0x0) 03:44:16 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x400007) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0x32600) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xb4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000040)='cpuset') write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000700)=ANY=[@ANYBLOB="006d176df3384ed3ddbcf3be0e26fd017529253262b78ee8b9d470"], 0x1b) ioctl$TUNSETCARRIER(0xffffffffffffffff, 0x400454e2, &(0x7f0000000080)=0x1) write$cgroup_int(r0, &(0x7f0000000380), 0x12) write$cgroup_int(r1, &(0x7f0000000400), 0xd) r2 = gettid() write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000000)=r2, 0x12) r3 = socket$kcm(0x2b, 0x0, 0x0) socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r3, 0x0, 0x0) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000280)=r2, 0x12) r4 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) close(r5) write$cgroup_type(r5, &(0x7f0000000080)='threaded\x00', 0xfffffc61) r6 = bpf$MAP_CREATE(0x2, &(0x7f0000009280), 0x3c) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x17, 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB], &(0x7f0000000200)='syzkaller\x00', 0xfa1, 0x0, 0x0, 0x41100, 0x2, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, &(0x7f0000000240), 0x8, 0x10, 0x0}, 0x78) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000008740)={0x0, 0x0, &(0x7f0000008700)=[{0x0}, {&(0x7f0000008680)=""/23, 0x17}, {&(0x7f00000086c0)=""/38, 0x26}], 0x3}, 0x8000) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x6, 0x2, 0x2e15579, 0x3f, 0x1, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffffff, 0x0, 0x5}, 0x3c) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0xb, [], 0x0, 0xc, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r7}, 0x7e) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r8, &(0x7f0000000000)=ANY=[], 0x50c000) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x18, 0x8, &(0x7f0000000a00)=ANY=[@ANYBLOB="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", @ANYRES32=r6, @ANYBLOB="00000000000000000c72c0fff6ffffff850000005b0000009500000000000000"], &(0x7f0000000040)='GPL\x00', 0x3ff, 0xd5, &(0x7f0000000080)=""/213, 0x61800, 0xab6c50112a8dd52c, [], 0x0, 0x16, 0xffffffffffffffff, 0x8, &(0x7f0000000180)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000001c0)={0x2, 0x6, 0x6, 0x5}, 0x10, 0x0, r8}, 0x78) bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x0, 0x5, 0x81, 0x2, 0x100, r5, 0x3, [], 0x0, 0xffffffffffffffff, 0x4, 0x3}, 0x3c) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r9, &(0x7f0000000200), 0x806000) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, r4, 0x0, 0x2a8, &(0x7f0000000440)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\a\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83CZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x98\x86\"R\x06\x00\x00\x00\x00\x00\x00\x00\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&\x014\x01\xf4\xb7\x83\x9a\xfa*\xa6\x06\xb7Pk7N\xc2\xd9\xee\xd0\xb0M\x00\xab\xc3\t\fc\xd8dx\xd5\x1dU*s)\x12[\x14\xb1\xc0\xd7\x1a\xa0\x16\xa2z\x9e\x93 \xddeF>29\v\x02\xa2b\x13R\xef\xffA,\xb9.$\xfa\x9f\xde[\x80\xd1=\xce\x1b\xeb\xf6\xf4\xe3z\x1f\x9dz\xa3\xc0\xe2\xa2\xb1\xeeq\xf5\xec0\x8e\xf4\xfb\xd9\x87\xf03\xdb\xae|\x10&V5c\xa6\xce\xcd\x8a\xdf\xe1\x89\"\xea\xde\xe7\xa3\xbe\xe7\xff\xf9 \x11\xfdY\xc6\xa1\xe8\xda\v\\?\xcb\x87\bn\x9b\x01\x1f\xf8\xe8\x1eV\xfaC\xdf\xc3Vv\x9b\x1a\xfc\x14.c\x94\xc9=\xb0\x0f!d\b\x18*@m\x7f\xaal\x17G\xd6?\x81\x16P\x03\x10e\xc3\xcd\xb1B\xeb\x01B\\\x91A\xa1\x8an\xb4#\xadr\x1e\x81v\xa2\x0e6x\xca\x8b\xa6\xd8\x81\x10:\x0e(\xdd\xfc\xc9\xc6\xb4\xf0\'f:\xbd\xfe\x11\xf8\xc8W\x81s^\xd9W\xf1\x94\xaf\xc5\x8a\xb4f\x1b\x17E\xb23\x12\xb0\xeb\xef\x8c\xb24h\xd7}\x7f\x92Hgej\x957\xe2A'}, 0x30) 03:44:16 executing program 2: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) r1 = dup(r0) bind$rds(0xffffffffffffffff, 0x0, 0x0) sendmsg$rds(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, 0x0}, 0x4000000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_tcp_SIOCINQ(r1, 0x4c81, 0xfffffffffffffffe) 03:44:16 executing program 5: openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) ioctl$RNDADDENTROPY(0xffffffffffffffff, 0x40085203, &(0x7f0000000100)={0x6, 0xbc, "56f80f8d7c9ad684157765ee68815e033b7b2972a2d067318db9ac518603e0dbae813e160bd3f15b30c226056579cf64ac2525dd44c15e56204f1e3f1b8c03b31f4281605682d4b39a61b89636b3a2a5ea0bd3f5e8bd40d8c0406969d18fed78e4f4108902b5959ec383c40036f5262e703d6ad6a7a486302c382e45645bfe4c472249b482a28e9519e744cdbe884985d913612a17250eab7e4f0bf4b35aab9f7b923116a8d30baf612ca3bc2ef9b3f8d1c6b570cb60bd8d5b6805ce"}) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_sctp(0x2, 0x5, 0x84) dup3(0xffffffffffffffff, r0, 0x0) socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp_SCTP_AUTH_DEACTIVATE_KEY(0xffffffffffffffff, 0x84, 0x23, 0x0, 0x0) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f00000000c0)={0x51, 0xfffc, 0x0, {0x103, 0xf1}, {0x9}, @ramp={0x2, 0x3, {0x7fff, 0x0, 0x0, 0x7}}}) r1 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r1, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @bcast, @rose, @rose, @null]}, 0x48) listen(r1, 0x0) unshare(0x40000000) r2 = accept(r1, 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r3, 0xffffffffffffffff) write$binfmt_elf64(r2, &(0x7f00000002c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}], "", [[], []]}, 0x278) 03:44:16 executing program 0: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) socketpair(0x0, 0x0, 0x6, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0x0) 03:44:16 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x400007) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0x32600) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xb4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000040)='cpuset') write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000700)=ANY=[@ANYBLOB="006d176df3384ed3ddbcf3be0e26fd017529253262b78ee8b9d470"], 0x1b) ioctl$TUNSETCARRIER(0xffffffffffffffff, 0x400454e2, &(0x7f0000000080)=0x1) write$cgroup_int(r0, &(0x7f0000000380), 0x12) write$cgroup_int(r1, &(0x7f0000000400), 0xd) r2 = gettid() write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000000)=r2, 0x12) r3 = socket$kcm(0x2b, 0x0, 0x0) socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r3, 0x0, 0x0) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000280)=r2, 0x12) r4 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) close(r5) write$cgroup_type(r5, &(0x7f0000000080)='threaded\x00', 0xfffffc61) r6 = bpf$MAP_CREATE(0x2, &(0x7f0000009280), 0x3c) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x17, 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB], &(0x7f0000000200)='syzkaller\x00', 0xfa1, 0x0, 0x0, 0x41100, 0x2, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, &(0x7f0000000240), 0x8, 0x10, 0x0}, 0x78) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000008740)={0x0, 0x0, &(0x7f0000008700)=[{0x0}, {&(0x7f0000008680)=""/23, 0x17}, {&(0x7f00000086c0)=""/38, 0x26}], 0x3}, 0x8000) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x6, 0x2, 0x2e15579, 0x3f, 0x1, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffffff, 0x0, 0x5}, 0x3c) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0xb, [], 0x0, 0xc, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r7}, 0x7e) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r8, &(0x7f0000000000)=ANY=[], 0x50c000) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x18, 0x8, &(0x7f0000000a00)=ANY=[@ANYBLOB="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", @ANYRES32=r6, @ANYBLOB="00000000000000000c72c0fff6ffffff850000005b0000009500000000000000"], &(0x7f0000000040)='GPL\x00', 0x3ff, 0xd5, &(0x7f0000000080)=""/213, 0x61800, 0xab6c50112a8dd52c, [], 0x0, 0x16, 0xffffffffffffffff, 0x8, &(0x7f0000000180)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000001c0)={0x2, 0x6, 0x6, 0x5}, 0x10, 0x0, r8}, 0x78) bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x11, 0x0, 0x81, 0x2, 0x100, r5, 0x3, [], 0x0, 0xffffffffffffffff, 0x4, 0x3}, 0x3c) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r9, &(0x7f0000000200), 0x806000) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, r4, 0x0, 0x2a8, &(0x7f0000000440)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\a\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83CZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x98\x86\"R\x06\x00\x00\x00\x00\x00\x00\x00\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&\x014\x01\xf4\xb7\x83\x9a\xfa*\xa6\x06\xb7Pk7N\xc2\xd9\xee\xd0\xb0M\x00\xab\xc3\t\fc\xd8dx\xd5\x1dU*s)\x12[\x14\xb1\xc0\xd7\x1a\xa0\x16\xa2z\x9e\x93 \xddeF>29\v\x02\xa2b\x13R\xef\xffA,\xb9.$\xfa\x9f\xde[\x80\xd1=\xce\x1b\xeb\xf6\xf4\xe3z\x1f\x9dz\xa3\xc0\xe2\xa2\xb1\xeeq\xf5\xec0\x8e\xf4\xfb\xd9\x87\xf03\xdb\xae|\x10&V5c\xa6\xce\xcd\x8a\xdf\xe1\x89\"\xea\xde\xe7\xa3\xbe\xe7\xff\xf9 \x11\xfdY\xc6\xa1\xe8\xda\v\\?\xcb\x87\bn\x9b\x01\x1f\xf8\xe8\x1eV\xfaC\xdf\xc3Vv\x9b\x1a\xfc\x14.c\x94\xc9=\xb0\x0f!d\b\x18*@m\x7f\xaal\x17G\xd6?\x81\x16P\x03\x10e\xc3\xcd\xb1B\xeb\x01B\\\x91A\xa1\x8an\xb4#\xadr\x1e\x81v\xa2\x0e6x\xca\x8b\xa6\xd8\x81\x10:\x0e(\xdd\xfc\xc9\xc6\xb4\xf0\'f:\xbd\xfe\x11\xf8\xc8W\x81s^\xd9W\xf1\x94\xaf\xc5\x8a\xb4f\x1b\x17E\xb23\x12\xb0\xeb\xef\x8c\xb24h\xd7}\x7f\x92Hgej\x957\xe2A'}, 0x30) 03:44:16 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x238) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) writev(r0, &(0x7f0000000540)=[{&(0x7f0000000140)="cedbddea5b67f4290aa7fd7c0cc7e2e613891a59fd3dc2e8a3c6e7c9fa96", 0x1e}, {&(0x7f0000000340)="e4bc7c957b83ba155edae525e00f76c76056ac3fe8a5de5ccfba604ac6b0d4a0fd42802b43143a32d703bd21baddda61ba1cb78758f519c19a06193e8bfc0d1f1fad3be6885359773264bd153a2bf50591662cca307c7a22", 0x58}, {&(0x7f00000004c0)="4b8043af3b13f04c3ee02ee028e584b538cfb06be329d5ca0649880187b5cd5ff601bf73", 0x24}, {&(0x7f0000000800)="87cfb3bd1ada6e425bdd5aaccdafa6e4ea74", 0x12}], 0x4) sendto$inet(r0, &(0x7f00000012c0)="0c268a927f1f6588b967481241ba7860005cf65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95425a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x27) 03:44:16 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454ca, &(0x7f0000000040)={'\x00', 0x2}) ioctl$TUNATTACHFILTER(0xffffffffffffffff, 0x401054d5, &(0x7f00000000c0)={0x0, &(0x7f0000000200)}) [ 735.493067][T31319] IPVS: ftp: loaded support on port[0] = 21 03:44:16 executing program 0: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) socketpair(0x0, 0x0, 0x6, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0x0) 03:44:16 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x400007) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0x32600) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xb4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000040)='cpuset') write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000700)=ANY=[@ANYBLOB="006d176df3384ed3ddbcf3be0e26fd017529253262b78ee8b9d470"], 0x1b) ioctl$TUNSETCARRIER(0xffffffffffffffff, 0x400454e2, &(0x7f0000000080)=0x1) write$cgroup_int(r0, &(0x7f0000000380), 0x12) write$cgroup_int(r1, &(0x7f0000000400), 0xd) r2 = gettid() write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000000)=r2, 0x12) r3 = socket$kcm(0x2b, 0x0, 0x0) socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r3, 0x0, 0x0) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000280)=r2, 0x12) r4 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) close(r5) write$cgroup_type(r5, &(0x7f0000000080)='threaded\x00', 0xfffffc61) r6 = bpf$MAP_CREATE(0x2, &(0x7f0000009280), 0x3c) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x17, 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB], &(0x7f0000000200)='syzkaller\x00', 0xfa1, 0x0, 0x0, 0x41100, 0x2, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, &(0x7f0000000240), 0x8, 0x10, 0x0}, 0x78) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000008740)={0x0, 0x0, &(0x7f0000008700)=[{0x0}, {&(0x7f0000008680)=""/23, 0x17}, {&(0x7f00000086c0)=""/38, 0x26}], 0x3}, 0x8000) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x6, 0x2, 0x2e15579, 0x3f, 0x1, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffffff, 0x0, 0x5}, 0x3c) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0xb, [], 0x0, 0xc, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r7}, 0x7e) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r8, &(0x7f0000000000)=ANY=[], 0x50c000) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x18, 0x8, &(0x7f0000000a00)=ANY=[@ANYBLOB="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", @ANYRES32=r6, @ANYBLOB="00000000000000000c72c0fff6ffffff850000005b0000009500000000000000"], &(0x7f0000000040)='GPL\x00', 0x3ff, 0xd5, &(0x7f0000000080)=""/213, 0x61800, 0xab6c50112a8dd52c, [], 0x0, 0x16, 0xffffffffffffffff, 0x8, &(0x7f0000000180)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000001c0)={0x2, 0x6, 0x6, 0x5}, 0x10, 0x0, r8}, 0x78) bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x11, 0x0, 0x81, 0x2, 0x100, r5, 0x3, [], 0x0, 0xffffffffffffffff, 0x4, 0x3}, 0x3c) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r9, &(0x7f0000000200), 0x806000) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, r4, 0x0, 0x2a8, &(0x7f0000000440)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\a\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83CZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x98\x86\"R\x06\x00\x00\x00\x00\x00\x00\x00\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&\x014\x01\xf4\xb7\x83\x9a\xfa*\xa6\x06\xb7Pk7N\xc2\xd9\xee\xd0\xb0M\x00\xab\xc3\t\fc\xd8dx\xd5\x1dU*s)\x12[\x14\xb1\xc0\xd7\x1a\xa0\x16\xa2z\x9e\x93 \xddeF>29\v\x02\xa2b\x13R\xef\xffA,\xb9.$\xfa\x9f\xde[\x80\xd1=\xce\x1b\xeb\xf6\xf4\xe3z\x1f\x9dz\xa3\xc0\xe2\xa2\xb1\xeeq\xf5\xec0\x8e\xf4\xfb\xd9\x87\xf03\xdb\xae|\x10&V5c\xa6\xce\xcd\x8a\xdf\xe1\x89\"\xea\xde\xe7\xa3\xbe\xe7\xff\xf9 \x11\xfdY\xc6\xa1\xe8\xda\v\\?\xcb\x87\bn\x9b\x01\x1f\xf8\xe8\x1eV\xfaC\xdf\xc3Vv\x9b\x1a\xfc\x14.c\x94\xc9=\xb0\x0f!d\b\x18*@m\x7f\xaal\x17G\xd6?\x81\x16P\x03\x10e\xc3\xcd\xb1B\xeb\x01B\\\x91A\xa1\x8an\xb4#\xadr\x1e\x81v\xa2\x0e6x\xca\x8b\xa6\xd8\x81\x10:\x0e(\xdd\xfc\xc9\xc6\xb4\xf0\'f:\xbd\xfe\x11\xf8\xc8W\x81s^\xd9W\xf1\x94\xaf\xc5\x8a\xb4f\x1b\x17E\xb23\x12\xb0\xeb\xef\x8c\xb24h\xd7}\x7f\x92Hgej\x957\xe2A'}, 0x30) 03:44:16 executing program 2: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) r1 = dup(r0) bind$rds(0xffffffffffffffff, 0x0, 0x0) sendmsg$rds(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, 0x0}, 0x4000000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_tcp_SIOCINQ(r1, 0x4c81, 0xfffffffffffffffe) 03:44:16 executing program 5: openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) ioctl$RNDADDENTROPY(0xffffffffffffffff, 0x40085203, &(0x7f0000000100)={0x6, 0xbc, "56f80f8d7c9ad684157765ee68815e033b7b2972a2d067318db9ac518603e0dbae813e160bd3f15b30c226056579cf64ac2525dd44c15e56204f1e3f1b8c03b31f4281605682d4b39a61b89636b3a2a5ea0bd3f5e8bd40d8c0406969d18fed78e4f4108902b5959ec383c40036f5262e703d6ad6a7a486302c382e45645bfe4c472249b482a28e9519e744cdbe884985d913612a17250eab7e4f0bf4b35aab9f7b923116a8d30baf612ca3bc2ef9b3f8d1c6b570cb60bd8d5b6805ce"}) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_sctp(0x2, 0x5, 0x84) dup3(0xffffffffffffffff, r0, 0x0) socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp_SCTP_AUTH_DEACTIVATE_KEY(0xffffffffffffffff, 0x84, 0x23, 0x0, 0x0) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f00000000c0)={0x51, 0xfffc, 0x0, {0x103, 0xf1}, {0x9}, @ramp={0x2, 0x3, {0x7fff, 0x0, 0x0, 0x7}}}) r1 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r1, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @bcast, @rose, @rose, @null]}, 0x48) listen(r1, 0x0) unshare(0x40000000) r2 = accept(r1, 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r3, 0xffffffffffffffff) write$binfmt_elf64(r2, &(0x7f00000002c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}], "", [[], []]}, 0x278) 03:44:16 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454ca, &(0x7f0000000040)={'\x00', 0x2}) ioctl$TUNATTACHFILTER(0xffffffffffffffff, 0x401054d5, &(0x7f00000000c0)={0x0, &(0x7f0000000200)}) 03:44:17 executing program 0: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) socketpair(0x0, 0x0, 0x6, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0x0) [ 736.054094][T31350] IPVS: ftp: loaded support on port[0] = 21 03:44:17 executing program 2: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) r1 = dup(r0) bind$rds(0xffffffffffffffff, 0x0, 0x0) sendmsg$rds(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, 0x0}, 0x4000000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_tcp_SIOCINQ(r1, 0x4c81, 0xfffffffffffffffe) 03:44:17 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x238) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) writev(r0, &(0x7f0000000540)=[{&(0x7f0000000140)="cedbddea5b67f4290aa7fd7c0cc7e2e613891a59fd3dc2e8a3c6e7c9fa96", 0x1e}, {&(0x7f0000000340)="e4bc7c957b83ba155edae525e00f76c76056ac3fe8a5de5ccfba604ac6b0d4a0fd42802b43143a32d703bd21baddda61ba1cb78758f519c19a06193e8bfc0d1f1fad3be6885359773264bd153a2bf50591662cca307c7a22f8a9e70629a1beac22b823bfee7fec", 0x67}, {&(0x7f00000004c0)="4b8043af3b13f04c3ee02ee028e584b538cfb06be329d5ca0649880187b5cd5ff601bf73", 0x24}, {&(0x7f0000000800)="87cfb3bd1ada6e425bdd5aaccdafa6e4ea74", 0x12}], 0x4) sendto$inet(r0, &(0x7f00000012c0)="0c268a927f1f6588b967481241ba7860005cf65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95425a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x27) 03:44:17 executing program 0: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) socketpair(0x0, 0x0, 0x6, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0x0) 03:44:17 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x400007) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0x32600) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xb4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000040)='cpuset') write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000700)=ANY=[@ANYBLOB="006d176df3384ed3ddbcf3be0e26fd017529253262b78ee8b9d470"], 0x1b) ioctl$TUNSETCARRIER(0xffffffffffffffff, 0x400454e2, &(0x7f0000000080)=0x1) write$cgroup_int(r0, &(0x7f0000000380), 0x12) write$cgroup_int(r1, &(0x7f0000000400), 0xd) r2 = gettid() write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000000)=r2, 0x12) r3 = socket$kcm(0x2b, 0x0, 0x0) socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r3, 0x0, 0x0) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000280)=r2, 0x12) r4 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) close(r5) write$cgroup_type(r5, &(0x7f0000000080)='threaded\x00', 0xfffffc61) r6 = bpf$MAP_CREATE(0x2, &(0x7f0000009280), 0x3c) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x17, 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB], &(0x7f0000000200)='syzkaller\x00', 0xfa1, 0x0, 0x0, 0x41100, 0x2, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, &(0x7f0000000240), 0x8, 0x10, 0x0}, 0x78) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000008740)={0x0, 0x0, &(0x7f0000008700)=[{0x0}, {&(0x7f0000008680)=""/23, 0x17}, {&(0x7f00000086c0)=""/38, 0x26}], 0x3}, 0x8000) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x6, 0x2, 0x2e15579, 0x3f, 0x1, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffffff, 0x0, 0x5}, 0x3c) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0xb, [], 0x0, 0xc, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r7}, 0x7e) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r8, &(0x7f0000000000)=ANY=[], 0x50c000) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x18, 0x8, &(0x7f0000000a00)=ANY=[@ANYBLOB="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", @ANYRES32=r6, @ANYBLOB="00000000000000000c72c0fff6ffffff850000005b0000009500000000000000"], &(0x7f0000000040)='GPL\x00', 0x3ff, 0xd5, &(0x7f0000000080)=""/213, 0x61800, 0xab6c50112a8dd52c, [], 0x0, 0x16, 0xffffffffffffffff, 0x8, &(0x7f0000000180)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000001c0)={0x2, 0x6, 0x6, 0x5}, 0x10, 0x0, r8}, 0x78) bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x11, 0x0, 0x81, 0x2, 0x100, r5, 0x3, [], 0x0, 0xffffffffffffffff, 0x4, 0x3}, 0x3c) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r9, &(0x7f0000000200), 0x806000) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, r4, 0x0, 0x2a8, &(0x7f0000000440)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\a\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83CZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x98\x86\"R\x06\x00\x00\x00\x00\x00\x00\x00\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&\x014\x01\xf4\xb7\x83\x9a\xfa*\xa6\x06\xb7Pk7N\xc2\xd9\xee\xd0\xb0M\x00\xab\xc3\t\fc\xd8dx\xd5\x1dU*s)\x12[\x14\xb1\xc0\xd7\x1a\xa0\x16\xa2z\x9e\x93 \xddeF>29\v\x02\xa2b\x13R\xef\xffA,\xb9.$\xfa\x9f\xde[\x80\xd1=\xce\x1b\xeb\xf6\xf4\xe3z\x1f\x9dz\xa3\xc0\xe2\xa2\xb1\xeeq\xf5\xec0\x8e\xf4\xfb\xd9\x87\xf03\xdb\xae|\x10&V5c\xa6\xce\xcd\x8a\xdf\xe1\x89\"\xea\xde\xe7\xa3\xbe\xe7\xff\xf9 \x11\xfdY\xc6\xa1\xe8\xda\v\\?\xcb\x87\bn\x9b\x01\x1f\xf8\xe8\x1eV\xfaC\xdf\xc3Vv\x9b\x1a\xfc\x14.c\x94\xc9=\xb0\x0f!d\b\x18*@m\x7f\xaal\x17G\xd6?\x81\x16P\x03\x10e\xc3\xcd\xb1B\xeb\x01B\\\x91A\xa1\x8an\xb4#\xadr\x1e\x81v\xa2\x0e6x\xca\x8b\xa6\xd8\x81\x10:\x0e(\xdd\xfc\xc9\xc6\xb4\xf0\'f:\xbd\xfe\x11\xf8\xc8W\x81s^\xd9W\xf1\x94\xaf\xc5\x8a\xb4f\x1b\x17E\xb23\x12\xb0\xeb\xef\x8c\xb24h\xd7}\x7f\x92Hgej\x957\xe2A'}, 0x30) 03:44:17 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454ca, &(0x7f0000000040)={'\x00', 0x2}) ioctl$TUNATTACHFILTER(r0, 0x401054d5, 0x0) 03:44:17 executing program 0: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) socketpair(0x0, 0x0, 0x6, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0x0) 03:44:17 executing program 2: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) r1 = dup(r0) bind$rds(0xffffffffffffffff, 0x0, 0x0) sendmsg$rds(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, 0x0}, 0x4000000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_tcp_SIOCINQ(r1, 0x4c81, 0xfffffffffffffffe) 03:44:17 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454ca, &(0x7f0000000040)={'\x00', 0x2}) ioctl$TUNATTACHFILTER(r0, 0x401054d5, 0x0) 03:44:17 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x238) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) writev(r0, &(0x7f0000000540)=[{&(0x7f0000000140)="cedbddea5b67f4290aa7fd7c0cc7e2e613891a59fd3dc2e8a3c6e7c9fa96", 0x1e}, {&(0x7f0000000340)="e4bc7c957b83ba155edae525e00f76c76056ac3fe8a5de5ccfba604ac6b0d4a0fd42802b43143a32d703bd21baddda61ba1cb78758f519c19a06193e8bfc0d1f1fad3be6885359773264bd153a2bf50591662cca307c7a22f8a9e70629a1beac22b823bfee7fec", 0x67}, {&(0x7f00000004c0)="4b8043af3b13f04c3ee02ee028e584b538cfb06be329d5ca0649880187b5cd5ff601bf73", 0x24}, {&(0x7f0000000800)="87cfb3bd1ada6e425bdd5aaccdafa6e4ea74", 0x12}], 0x4) sendto$inet(r0, &(0x7f00000012c0)="0c268a927f1f6588b967481241ba7860005cf65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95425a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x27) 03:44:17 executing program 5: openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) ioctl$RNDADDENTROPY(0xffffffffffffffff, 0x40085203, &(0x7f0000000100)={0x6, 0xbc, "56f80f8d7c9ad684157765ee68815e033b7b2972a2d067318db9ac518603e0dbae813e160bd3f15b30c226056579cf64ac2525dd44c15e56204f1e3f1b8c03b31f4281605682d4b39a61b89636b3a2a5ea0bd3f5e8bd40d8c0406969d18fed78e4f4108902b5959ec383c40036f5262e703d6ad6a7a486302c382e45645bfe4c472249b482a28e9519e744cdbe884985d913612a17250eab7e4f0bf4b35aab9f7b923116a8d30baf612ca3bc2ef9b3f8d1c6b570cb60bd8d5b6805ce"}) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_sctp(0x2, 0x5, 0x84) dup3(0xffffffffffffffff, r0, 0x0) socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp_SCTP_AUTH_DEACTIVATE_KEY(0xffffffffffffffff, 0x84, 0x23, 0x0, 0x0) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f00000000c0)={0x51, 0xfffc, 0x0, {0x103, 0xf1}, {0x9}, @ramp={0x2, 0x3, {0x7fff, 0x0, 0x0, 0x7}}}) r1 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r1, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @bcast, @rose, @rose, @null]}, 0x48) listen(r1, 0x0) unshare(0x40000000) r2 = accept(r1, 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r3, 0xffffffffffffffff) write$binfmt_elf64(r2, &(0x7f00000002c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}], "", [[], []]}, 0x278) 03:44:17 executing program 0: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) socketpair(0x0, 0x0, 0x6, 0x0) bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0x0) 03:44:17 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x400007) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0x32600) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xb4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000040)='cpuset') write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000700)=ANY=[@ANYBLOB="006d176df3384ed3ddbcf3be0e26fd017529253262b78ee8b9d470"], 0x1b) ioctl$TUNSETCARRIER(0xffffffffffffffff, 0x400454e2, &(0x7f0000000080)=0x1) write$cgroup_int(r0, &(0x7f0000000380), 0x12) write$cgroup_int(r1, &(0x7f0000000400), 0xd) r2 = gettid() write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000000)=r2, 0x12) r3 = socket$kcm(0x2b, 0x0, 0x0) socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r3, 0x0, 0x0) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000280)=r2, 0x12) r4 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) close(r5) write$cgroup_type(r5, &(0x7f0000000080)='threaded\x00', 0xfffffc61) r6 = bpf$MAP_CREATE(0x2, &(0x7f0000009280), 0x3c) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x17, 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB], &(0x7f0000000200)='syzkaller\x00', 0xfa1, 0x0, 0x0, 0x41100, 0x2, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, &(0x7f0000000240), 0x8, 0x10, 0x0}, 0x78) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000008740)={0x0, 0x0, &(0x7f0000008700)=[{0x0}, {&(0x7f0000008680)=""/23, 0x17}, {&(0x7f00000086c0)=""/38, 0x26}], 0x3}, 0x8000) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x6, 0x2, 0x2e15579, 0x3f, 0x1, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffffff, 0x0, 0x5}, 0x3c) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0xb, [], 0x0, 0xc, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r7}, 0x7e) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r8, &(0x7f0000000000)=ANY=[], 0x50c000) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x18, 0x8, &(0x7f0000000a00)=ANY=[@ANYBLOB="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", @ANYRES32=r6, @ANYBLOB="00000000000000000c72c0fff6ffffff850000005b0000009500000000000000"], &(0x7f0000000040)='GPL\x00', 0x3ff, 0xd5, &(0x7f0000000080)=""/213, 0x61800, 0xab6c50112a8dd52c, [], 0x0, 0x16, 0xffffffffffffffff, 0x8, &(0x7f0000000180)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000001c0)={0x2, 0x6, 0x6, 0x5}, 0x10, 0x0, r8}, 0x78) bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x11, 0x5, 0x0, 0x2, 0x100, r5, 0x3, [], 0x0, 0xffffffffffffffff, 0x4, 0x3}, 0x3c) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r9, &(0x7f0000000200), 0x806000) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, r4, 0x0, 0x2a8, &(0x7f0000000440)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\a\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83CZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x98\x86\"R\x06\x00\x00\x00\x00\x00\x00\x00\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&\x014\x01\xf4\xb7\x83\x9a\xfa*\xa6\x06\xb7Pk7N\xc2\xd9\xee\xd0\xb0M\x00\xab\xc3\t\fc\xd8dx\xd5\x1dU*s)\x12[\x14\xb1\xc0\xd7\x1a\xa0\x16\xa2z\x9e\x93 \xddeF>29\v\x02\xa2b\x13R\xef\xffA,\xb9.$\xfa\x9f\xde[\x80\xd1=\xce\x1b\xeb\xf6\xf4\xe3z\x1f\x9dz\xa3\xc0\xe2\xa2\xb1\xeeq\xf5\xec0\x8e\xf4\xfb\xd9\x87\xf03\xdb\xae|\x10&V5c\xa6\xce\xcd\x8a\xdf\xe1\x89\"\xea\xde\xe7\xa3\xbe\xe7\xff\xf9 \x11\xfdY\xc6\xa1\xe8\xda\v\\?\xcb\x87\bn\x9b\x01\x1f\xf8\xe8\x1eV\xfaC\xdf\xc3Vv\x9b\x1a\xfc\x14.c\x94\xc9=\xb0\x0f!d\b\x18*@m\x7f\xaal\x17G\xd6?\x81\x16P\x03\x10e\xc3\xcd\xb1B\xeb\x01B\\\x91A\xa1\x8an\xb4#\xadr\x1e\x81v\xa2\x0e6x\xca\x8b\xa6\xd8\x81\x10:\x0e(\xdd\xfc\xc9\xc6\xb4\xf0\'f:\xbd\xfe\x11\xf8\xc8W\x81s^\xd9W\xf1\x94\xaf\xc5\x8a\xb4f\x1b\x17E\xb23\x12\xb0\xeb\xef\x8c\xb24h\xd7}\x7f\x92Hgej\x957\xe2A'}, 0x30) 03:44:17 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454ca, &(0x7f0000000040)={'\x00', 0x2}) ioctl$TUNATTACHFILTER(r0, 0x401054d5, 0x0) 03:44:17 executing program 2: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) r1 = dup(r0) bind$rds(0xffffffffffffffff, 0x0, 0x0) sendmsg$rds(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, 0x0}, 0x4000000) ioctl$sock_inet6_tcp_SIOCINQ(r1, 0x4c81, 0xfffffffffffffffe) 03:44:17 executing program 0: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0x0) [ 736.967825][T31486] IPVS: ftp: loaded support on port[0] = 21 03:44:18 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x400007) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0x32600) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xb4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000040)='cpuset') write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000700)=ANY=[@ANYBLOB="006d176df3384ed3ddbcf3be0e26fd017529253262b78ee8b9d470"], 0x1b) ioctl$TUNSETCARRIER(0xffffffffffffffff, 0x400454e2, &(0x7f0000000080)=0x1) write$cgroup_int(r0, &(0x7f0000000380), 0x12) write$cgroup_int(r1, &(0x7f0000000400), 0xd) r2 = gettid() write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000000)=r2, 0x12) r3 = socket$kcm(0x2b, 0x0, 0x0) socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r3, 0x0, 0x0) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000280)=r2, 0x12) r4 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) close(r5) write$cgroup_type(r5, &(0x7f0000000080)='threaded\x00', 0xfffffc61) r6 = bpf$MAP_CREATE(0x2, &(0x7f0000009280), 0x3c) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x17, 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB], &(0x7f0000000200)='syzkaller\x00', 0xfa1, 0x0, 0x0, 0x41100, 0x2, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, &(0x7f0000000240), 0x8, 0x10, 0x0}, 0x78) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000008740)={0x0, 0x0, &(0x7f0000008700)=[{0x0}, {&(0x7f0000008680)=""/23, 0x17}, {&(0x7f00000086c0)=""/38, 0x26}], 0x3}, 0x8000) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x6, 0x2, 0x2e15579, 0x3f, 0x1, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffffff, 0x0, 0x5}, 0x3c) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0xb, [], 0x0, 0xc, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r7}, 0x7e) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r8, &(0x7f0000000000)=ANY=[], 0x50c000) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x18, 0x8, &(0x7f0000000a00)=ANY=[@ANYBLOB="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", @ANYRES32=r6, @ANYBLOB="00000000000000000c72c0fff6ffffff850000005b0000009500000000000000"], &(0x7f0000000040)='GPL\x00', 0x3ff, 0xd5, &(0x7f0000000080)=""/213, 0x61800, 0xab6c50112a8dd52c, [], 0x0, 0x16, 0xffffffffffffffff, 0x8, &(0x7f0000000180)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000001c0)={0x2, 0x6, 0x6, 0x5}, 0x10, 0x0, r8}, 0x78) bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x11, 0x5, 0x0, 0x2, 0x100, r5, 0x3, [], 0x0, 0xffffffffffffffff, 0x4, 0x3}, 0x3c) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r9, &(0x7f0000000200), 0x806000) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, r4, 0x0, 0x2a8, &(0x7f0000000440)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\a\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83CZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x98\x86\"R\x06\x00\x00\x00\x00\x00\x00\x00\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&\x014\x01\xf4\xb7\x83\x9a\xfa*\xa6\x06\xb7Pk7N\xc2\xd9\xee\xd0\xb0M\x00\xab\xc3\t\fc\xd8dx\xd5\x1dU*s)\x12[\x14\xb1\xc0\xd7\x1a\xa0\x16\xa2z\x9e\x93 \xddeF>29\v\x02\xa2b\x13R\xef\xffA,\xb9.$\xfa\x9f\xde[\x80\xd1=\xce\x1b\xeb\xf6\xf4\xe3z\x1f\x9dz\xa3\xc0\xe2\xa2\xb1\xeeq\xf5\xec0\x8e\xf4\xfb\xd9\x87\xf03\xdb\xae|\x10&V5c\xa6\xce\xcd\x8a\xdf\xe1\x89\"\xea\xde\xe7\xa3\xbe\xe7\xff\xf9 \x11\xfdY\xc6\xa1\xe8\xda\v\\?\xcb\x87\bn\x9b\x01\x1f\xf8\xe8\x1eV\xfaC\xdf\xc3Vv\x9b\x1a\xfc\x14.c\x94\xc9=\xb0\x0f!d\b\x18*@m\x7f\xaal\x17G\xd6?\x81\x16P\x03\x10e\xc3\xcd\xb1B\xeb\x01B\\\x91A\xa1\x8an\xb4#\xadr\x1e\x81v\xa2\x0e6x\xca\x8b\xa6\xd8\x81\x10:\x0e(\xdd\xfc\xc9\xc6\xb4\xf0\'f:\xbd\xfe\x11\xf8\xc8W\x81s^\xd9W\xf1\x94\xaf\xc5\x8a\xb4f\x1b\x17E\xb23\x12\xb0\xeb\xef\x8c\xb24h\xd7}\x7f\x92Hgej\x957\xe2A'}, 0x30) 03:44:18 executing program 0: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0x0) 03:44:18 executing program 5: openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) ioctl$RNDADDENTROPY(0xffffffffffffffff, 0x40085203, &(0x7f0000000100)={0x6, 0xbc, "56f80f8d7c9ad684157765ee68815e033b7b2972a2d067318db9ac518603e0dbae813e160bd3f15b30c226056579cf64ac2525dd44c15e56204f1e3f1b8c03b31f4281605682d4b39a61b89636b3a2a5ea0bd3f5e8bd40d8c0406969d18fed78e4f4108902b5959ec383c40036f5262e703d6ad6a7a486302c382e45645bfe4c472249b482a28e9519e744cdbe884985d913612a17250eab7e4f0bf4b35aab9f7b923116a8d30baf612ca3bc2ef9b3f8d1c6b570cb60bd8d5b6805ce"}) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_sctp(0x2, 0x5, 0x84) dup3(0xffffffffffffffff, r0, 0x0) socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp_SCTP_AUTH_DEACTIVATE_KEY(0xffffffffffffffff, 0x84, 0x23, 0x0, 0x0) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f00000000c0)={0x51, 0xfffc, 0x0, {0x103, 0xf1}, {0x9}, @ramp={0x2, 0x3, {0x7fff, 0x0, 0x7}}}) r1 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r1, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @bcast, @rose, @rose, @null]}, 0x48) listen(r1, 0x0) unshare(0x40000000) r2 = accept(r1, 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r3, 0xffffffffffffffff) write$binfmt_elf64(r2, &(0x7f00000002c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}], "", [[], []]}, 0x278) 03:44:18 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454ca, &(0x7f0000000040)={'\x00', 0x2}) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f00000000c0)={0x0, 0x0}) 03:44:18 executing program 2: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) r1 = dup(r0) bind$rds(0xffffffffffffffff, 0x0, 0x0) sendmsg$rds(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, 0x0}, 0x4000000) ioctl$sock_inet6_tcp_SIOCINQ(r1, 0x4c81, 0xfffffffffffffffe) 03:44:18 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x238) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) writev(r0, &(0x7f0000000540)=[{&(0x7f0000000140)="cedbddea5b67f4290aa7fd7c0cc7e2e613891a59fd3dc2e8a3c6e7c9fa96", 0x1e}, {&(0x7f0000000340)="e4bc7c957b83ba155edae525e00f76c76056ac3fe8a5de5ccfba604ac6b0d4a0fd42802b43143a32d703bd21baddda61ba1cb78758f519c19a06193e8bfc0d1f1fad3be6885359773264bd153a2bf50591662cca307c7a22f8a9e70629a1beac22b823bfee7fec", 0x67}, {&(0x7f00000004c0)="4b8043af3b13f04c3ee02ee028e584b538cfb06be329d5ca0649880187b5cd5ff601bf73", 0x24}, {&(0x7f0000000800)="87cfb3bd1ada6e425bdd5aaccdafa6e4ea74", 0x12}], 0x4) sendto$inet(r0, &(0x7f00000012c0)="0c268a927f1f6588b967481241ba7860005cf65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95425a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x27) 03:44:18 executing program 0: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0x0) 03:44:18 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x400007) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0x32600) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xb4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000040)='cpuset') write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000700)=ANY=[@ANYBLOB="006d176df3384ed3ddbcf3be0e26fd017529253262b78ee8b9d470"], 0x1b) ioctl$TUNSETCARRIER(0xffffffffffffffff, 0x400454e2, &(0x7f0000000080)=0x1) write$cgroup_int(r0, &(0x7f0000000380), 0x12) write$cgroup_int(r1, &(0x7f0000000400), 0xd) r2 = gettid() write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000000)=r2, 0x12) r3 = socket$kcm(0x2b, 0x0, 0x0) socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r3, 0x0, 0x0) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000280)=r2, 0x12) r4 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) close(r5) write$cgroup_type(r5, &(0x7f0000000080)='threaded\x00', 0xfffffc61) r6 = bpf$MAP_CREATE(0x2, &(0x7f0000009280), 0x3c) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x17, 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB], &(0x7f0000000200)='syzkaller\x00', 0xfa1, 0x0, 0x0, 0x41100, 0x2, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, &(0x7f0000000240), 0x8, 0x10, 0x0}, 0x78) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000008740)={0x0, 0x0, &(0x7f0000008700)=[{0x0}, {&(0x7f0000008680)=""/23, 0x17}, {&(0x7f00000086c0)=""/38, 0x26}], 0x3}, 0x8000) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x6, 0x2, 0x2e15579, 0x3f, 0x1, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffffff, 0x0, 0x5}, 0x3c) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0xb, [], 0x0, 0xc, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r7}, 0x7e) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r8, &(0x7f0000000000)=ANY=[], 0x50c000) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x18, 0x8, &(0x7f0000000a00)=ANY=[@ANYBLOB="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", @ANYRES32=r6, @ANYBLOB="00000000000000000c72c0fff6ffffff850000005b0000009500000000000000"], &(0x7f0000000040)='GPL\x00', 0x3ff, 0xd5, &(0x7f0000000080)=""/213, 0x61800, 0xab6c50112a8dd52c, [], 0x0, 0x16, 0xffffffffffffffff, 0x8, &(0x7f0000000180)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000001c0)={0x2, 0x6, 0x6, 0x5}, 0x10, 0x0, r8}, 0x78) bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x11, 0x5, 0x0, 0x2, 0x100, r5, 0x3, [], 0x0, 0xffffffffffffffff, 0x4, 0x3}, 0x3c) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r9, &(0x7f0000000200), 0x806000) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, r4, 0x0, 0x2a8, &(0x7f0000000440)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\a\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83CZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x98\x86\"R\x06\x00\x00\x00\x00\x00\x00\x00\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&\x014\x01\xf4\xb7\x83\x9a\xfa*\xa6\x06\xb7Pk7N\xc2\xd9\xee\xd0\xb0M\x00\xab\xc3\t\fc\xd8dx\xd5\x1dU*s)\x12[\x14\xb1\xc0\xd7\x1a\xa0\x16\xa2z\x9e\x93 \xddeF>29\v\x02\xa2b\x13R\xef\xffA,\xb9.$\xfa\x9f\xde[\x80\xd1=\xce\x1b\xeb\xf6\xf4\xe3z\x1f\x9dz\xa3\xc0\xe2\xa2\xb1\xeeq\xf5\xec0\x8e\xf4\xfb\xd9\x87\xf03\xdb\xae|\x10&V5c\xa6\xce\xcd\x8a\xdf\xe1\x89\"\xea\xde\xe7\xa3\xbe\xe7\xff\xf9 \x11\xfdY\xc6\xa1\xe8\xda\v\\?\xcb\x87\bn\x9b\x01\x1f\xf8\xe8\x1eV\xfaC\xdf\xc3Vv\x9b\x1a\xfc\x14.c\x94\xc9=\xb0\x0f!d\b\x18*@m\x7f\xaal\x17G\xd6?\x81\x16P\x03\x10e\xc3\xcd\xb1B\xeb\x01B\\\x91A\xa1\x8an\xb4#\xadr\x1e\x81v\xa2\x0e6x\xca\x8b\xa6\xd8\x81\x10:\x0e(\xdd\xfc\xc9\xc6\xb4\xf0\'f:\xbd\xfe\x11\xf8\xc8W\x81s^\xd9W\xf1\x94\xaf\xc5\x8a\xb4f\x1b\x17E\xb23\x12\xb0\xeb\xef\x8c\xb24h\xd7}\x7f\x92Hgej\x957\xe2A'}, 0x30) [ 737.506563][T31507] IPVS: ftp: loaded support on port[0] = 21 03:44:18 executing program 2: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) r1 = dup(r0) bind$rds(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet6_tcp_SIOCINQ(r1, 0x4c81, 0xfffffffffffffffe) 03:44:18 executing program 0: bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0x0) 03:44:18 executing program 5: openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) ioctl$RNDADDENTROPY(0xffffffffffffffff, 0x40085203, &(0x7f0000000100)={0x6, 0xbc, "56f80f8d7c9ad684157765ee68815e033b7b2972a2d067318db9ac518603e0dbae813e160bd3f15b30c226056579cf64ac2525dd44c15e56204f1e3f1b8c03b31f4281605682d4b39a61b89636b3a2a5ea0bd3f5e8bd40d8c0406969d18fed78e4f4108902b5959ec383c40036f5262e703d6ad6a7a486302c382e45645bfe4c472249b482a28e9519e744cdbe884985d913612a17250eab7e4f0bf4b35aab9f7b923116a8d30baf612ca3bc2ef9b3f8d1c6b570cb60bd8d5b6805ce"}) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_sctp(0x2, 0x5, 0x84) dup3(0xffffffffffffffff, r0, 0x0) socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp_SCTP_AUTH_DEACTIVATE_KEY(0xffffffffffffffff, 0x84, 0x23, 0x0, 0x0) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f00000000c0)={0x51, 0xfffc, 0x0, {0x103, 0xf1}, {0x9}, @ramp={0x2, 0x3, {0x7fff, 0x0, 0x7}}}) r1 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r1, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @bcast, @rose, @rose, @null]}, 0x48) listen(r1, 0x0) unshare(0x40000000) r2 = accept(r1, 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r3, 0xffffffffffffffff) write$binfmt_elf64(r2, &(0x7f00000002c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}], "", [[], []]}, 0x278) 03:44:18 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) r1 = dup(r0) bind$rds(0xffffffffffffffff, 0x0, 0x0) sendmsg$rds(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, 0x0}, 0x4000000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_tcp_SIOCINQ(r1, 0x4c81, 0xfffffffffffffffe) 03:44:18 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454ca, &(0x7f0000000040)={'\x00', 0x2}) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f00000000c0)={0x0, 0x0}) 03:44:18 executing program 2: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) r1 = dup(r0) bind$rds(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet6_tcp_SIOCINQ(r1, 0x4c81, 0xfffffffffffffffe) 03:44:18 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x400007) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0x32600) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xb4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000040)='cpuset') write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000700)=ANY=[@ANYBLOB="006d176df3384ed3ddbcf3be0e26fd017529253262b78ee8b9d470"], 0x1b) ioctl$TUNSETCARRIER(0xffffffffffffffff, 0x400454e2, &(0x7f0000000080)=0x1) write$cgroup_int(r0, &(0x7f0000000380), 0x12) write$cgroup_int(r1, &(0x7f0000000400), 0xd) r2 = gettid() write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000000)=r2, 0x12) r3 = socket$kcm(0x2b, 0x0, 0x0) socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r3, 0x0, 0x0) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000280)=r2, 0x12) r4 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) close(r5) write$cgroup_type(r5, &(0x7f0000000080)='threaded\x00', 0xfffffc61) r6 = bpf$MAP_CREATE(0x2, &(0x7f0000009280), 0x3c) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x17, 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB], &(0x7f0000000200)='syzkaller\x00', 0xfa1, 0x0, 0x0, 0x41100, 0x2, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, &(0x7f0000000240), 0x8, 0x10, 0x0}, 0x78) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000008740)={0x0, 0x0, &(0x7f0000008700)=[{0x0}, {&(0x7f0000008680)=""/23, 0x17}, {&(0x7f00000086c0)=""/38, 0x26}], 0x3}, 0x8000) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x6, 0x2, 0x2e15579, 0x3f, 0x1, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffffff, 0x0, 0x5}, 0x3c) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0xb, [], 0x0, 0xc, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r7}, 0x7e) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r8, &(0x7f0000000000)=ANY=[], 0x50c000) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x18, 0x8, &(0x7f0000000a00)=ANY=[@ANYBLOB="0000752c0000000000000000ffffffff9500000000000000181400006200ed587c1ba87fb23af22b6cf03fb851054ce322d4b3a5894516c0c1479e1cfbf3061ad7aef6d6c36e4e74a8219f8441192ab16361719f26a1e543525c94027f7a5f275546d8cacee044fc20d858e268019caeb1633cc4888faa05d02cd44de32962e022697754125edcfb3477c4e122a0e97ab43de94a7a94efd527400e2c2ff4468fd6e773773f089b268fddef712ab174487ae9049f64895522be3862156a1af15513c3ff285844c9aae255d74c0dacf6c47d6809ce69ee6e41a03a03b29152ee43afabd82aa883f260995238aa70895dc3aee59a119dc82fb5fd00af56ded09336e2df6a0bb41bd191d57b35eb262a1aa8d5fec51b24500685f8c0adaf3639790fdbd7cb2ac3af37a802a6ac7265a819c91986c45e7c54d91c5ced552d96c04a80c063fee16b3a52bc603deebe32e4e0dfdfe9d03658daad65606e175041076684110e66f74db9509b1a29e765c9208ddba13e3b42b3963dce5432c4fb7844a9b64c518820c9c0198fadb6ea6a350f89a1eb1a3c1e20527ce574c3514f9ad62be70eee070faa267d83564e6db87e4d16ccd118397c2e4825140e6b46c35edb77df7b9a3334ad3f8cb70b73f4b9d8b29eb50b2c2dfc8d82841a6251fcfcb978ce90873ddcfa0125800302f5ed70c724e0253fb45955750f1e7c94ca05a91ec592ee3a52fad94c89205ece2d1d96afbfa0b59f9bd6c1161c638fff8696973fedca3f3ddf5bbb1023", @ANYRES32=r6, @ANYBLOB="00000000000000000c72c0fff6ffffff850000005b0000009500000000000000"], &(0x7f0000000040)='GPL\x00', 0x3ff, 0xd5, &(0x7f0000000080)=""/213, 0x61800, 0xab6c50112a8dd52c, [], 0x0, 0x16, 0xffffffffffffffff, 0x8, &(0x7f0000000180)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000001c0)={0x2, 0x6, 0x6, 0x5}, 0x10, 0x0, r8}, 0x78) bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x11, 0x5, 0x81, 0x0, 0x100, r5, 0x3, [], 0x0, 0xffffffffffffffff, 0x4, 0x3}, 0x3c) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r9, &(0x7f0000000200), 0x806000) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, r4, 0x0, 0x2a8, &(0x7f0000000440)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\a\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83CZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x98\x86\"R\x06\x00\x00\x00\x00\x00\x00\x00\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&\x014\x01\xf4\xb7\x83\x9a\xfa*\xa6\x06\xb7Pk7N\xc2\xd9\xee\xd0\xb0M\x00\xab\xc3\t\fc\xd8dx\xd5\x1dU*s)\x12[\x14\xb1\xc0\xd7\x1a\xa0\x16\xa2z\x9e\x93 \xddeF>29\v\x02\xa2b\x13R\xef\xffA,\xb9.$\xfa\x9f\xde[\x80\xd1=\xce\x1b\xeb\xf6\xf4\xe3z\x1f\x9dz\xa3\xc0\xe2\xa2\xb1\xeeq\xf5\xec0\x8e\xf4\xfb\xd9\x87\xf03\xdb\xae|\x10&V5c\xa6\xce\xcd\x8a\xdf\xe1\x89\"\xea\xde\xe7\xa3\xbe\xe7\xff\xf9 \x11\xfdY\xc6\xa1\xe8\xda\v\\?\xcb\x87\bn\x9b\x01\x1f\xf8\xe8\x1eV\xfaC\xdf\xc3Vv\x9b\x1a\xfc\x14.c\x94\xc9=\xb0\x0f!d\b\x18*@m\x7f\xaal\x17G\xd6?\x81\x16P\x03\x10e\xc3\xcd\xb1B\xeb\x01B\\\x91A\xa1\x8an\xb4#\xadr\x1e\x81v\xa2\x0e6x\xca\x8b\xa6\xd8\x81\x10:\x0e(\xdd\xfc\xc9\xc6\xb4\xf0\'f:\xbd\xfe\x11\xf8\xc8W\x81s^\xd9W\xf1\x94\xaf\xc5\x8a\xb4f\x1b\x17E\xb23\x12\xb0\xeb\xef\x8c\xb24h\xd7}\x7f\x92Hgej\x957\xe2A'}, 0x30) [ 737.930613][T31528] IPVS: ftp: loaded support on port[0] = 21 03:44:18 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) r1 = dup(r0) bind$rds(0xffffffffffffffff, 0x0, 0x0) sendmsg$rds(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, 0x0}, 0x4000000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_tcp_SIOCINQ(r1, 0x4c81, 0xfffffffffffffffe) 03:44:19 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454ca, &(0x7f0000000040)={'\x00', 0x2}) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f00000000c0)={0x0, 0x0}) 03:44:19 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x238) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) writev(r0, &(0x7f0000000540)=[{&(0x7f0000000140)="cedbddea5b67f4290aa7fd7c0cc7e2e613891a59fd3dc2e8a3c6e7c9fa96", 0x1e}, {&(0x7f0000000340)="e4bc7c957b83ba155edae525e00f76c76056ac3fe8a5de5ccfba604ac6b0d4a0fd42802b43143a32d703bd21baddda61ba1cb78758f519c19a06193e8bfc0d1f1fad3be6885359773264bd153a2bf50591662cca307c7a22f8a9e70629a1beac22b823bfee7fec832958c20007e0", 0x6e}, {&(0x7f00000004c0)="4b8043af3b13f04c3ee02ee028e584b538cfb06be329d5ca0649880187b5cd5ff601bf73", 0x24}, {&(0x7f0000000800)="87cfb3bd1ada6e425bdd5aaccdafa6e4ea74", 0x12}], 0x4) sendto$inet(r0, &(0x7f00000012c0)="0c268a927f1f6588b967481241ba7860005cf65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95425a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x27) 03:44:19 executing program 2: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) r1 = dup(r0) bind$rds(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet6_tcp_SIOCINQ(r1, 0x4c81, 0xfffffffffffffffe) 03:44:19 executing program 5: openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) ioctl$RNDADDENTROPY(0xffffffffffffffff, 0x40085203, &(0x7f0000000100)={0x6, 0xbc, "56f80f8d7c9ad684157765ee68815e033b7b2972a2d067318db9ac518603e0dbae813e160bd3f15b30c226056579cf64ac2525dd44c15e56204f1e3f1b8c03b31f4281605682d4b39a61b89636b3a2a5ea0bd3f5e8bd40d8c0406969d18fed78e4f4108902b5959ec383c40036f5262e703d6ad6a7a486302c382e45645bfe4c472249b482a28e9519e744cdbe884985d913612a17250eab7e4f0bf4b35aab9f7b923116a8d30baf612ca3bc2ef9b3f8d1c6b570cb60bd8d5b6805ce"}) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_sctp(0x2, 0x5, 0x84) dup3(0xffffffffffffffff, r0, 0x0) socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp_SCTP_AUTH_DEACTIVATE_KEY(0xffffffffffffffff, 0x84, 0x23, 0x0, 0x0) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f00000000c0)={0x51, 0xfffc, 0x0, {0x103, 0xf1}, {0x9}, @ramp={0x2, 0x3, {0x7fff, 0x0, 0x7}}}) r1 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r1, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @bcast, @rose, @rose, @null]}, 0x48) listen(r1, 0x0) unshare(0x40000000) r2 = accept(r1, 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r3, 0xffffffffffffffff) write$binfmt_elf64(r2, &(0x7f00000002c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}], "", [[], []]}, 0x278) 03:44:19 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) r1 = dup(r0) bind$rds(0xffffffffffffffff, 0x0, 0x0) sendmsg$rds(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, 0x0}, 0x4000000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_tcp_SIOCINQ(r1, 0x4c81, 0xfffffffffffffffe) 03:44:19 executing program 1: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) socketpair(0x0, 0x0, 0x6, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0x0) 03:44:19 executing program 2: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) r1 = dup(r0) sendmsg$rds(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, 0x0}, 0x4000000) ioctl$sock_inet6_tcp_SIOCINQ(r1, 0x4c81, 0xfffffffffffffffe) 03:44:19 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x400007) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0x32600) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xb4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000040)='cpuset') write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000700)=ANY=[@ANYBLOB="006d176df3384ed3ddbcf3be0e26fd017529253262b78ee8b9d470"], 0x1b) ioctl$TUNSETCARRIER(0xffffffffffffffff, 0x400454e2, &(0x7f0000000080)=0x1) write$cgroup_int(r0, &(0x7f0000000380), 0x12) write$cgroup_int(r1, &(0x7f0000000400), 0xd) r2 = gettid() write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000000)=r2, 0x12) r3 = socket$kcm(0x2b, 0x0, 0x0) socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r3, 0x0, 0x0) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000280)=r2, 0x12) r4 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) close(r5) write$cgroup_type(r5, &(0x7f0000000080)='threaded\x00', 0xfffffc61) r6 = bpf$MAP_CREATE(0x2, &(0x7f0000009280), 0x3c) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x17, 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB], &(0x7f0000000200)='syzkaller\x00', 0xfa1, 0x0, 0x0, 0x41100, 0x2, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, &(0x7f0000000240), 0x8, 0x10, 0x0}, 0x78) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000008740)={0x0, 0x0, &(0x7f0000008700)=[{0x0}, {&(0x7f0000008680)=""/23, 0x17}, {&(0x7f00000086c0)=""/38, 0x26}], 0x3}, 0x8000) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x6, 0x2, 0x2e15579, 0x3f, 0x1, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffffff, 0x0, 0x5}, 0x3c) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0xb, [], 0x0, 0xc, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r7}, 0x7e) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r8, &(0x7f0000000000)=ANY=[], 0x50c000) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x18, 0x8, &(0x7f0000000a00)=ANY=[@ANYBLOB="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", @ANYRES32=r6, @ANYBLOB="00000000000000000c72c0fff6ffffff850000005b0000009500000000000000"], &(0x7f0000000040)='GPL\x00', 0x3ff, 0xd5, &(0x7f0000000080)=""/213, 0x61800, 0xab6c50112a8dd52c, [], 0x0, 0x16, 0xffffffffffffffff, 0x8, &(0x7f0000000180)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000001c0)={0x2, 0x6, 0x6, 0x5}, 0x10, 0x0, r8}, 0x78) bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x11, 0x5, 0x81, 0x0, 0x100, r5, 0x3, [], 0x0, 0xffffffffffffffff, 0x4, 0x3}, 0x3c) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r9, &(0x7f0000000200), 0x806000) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, r4, 0x0, 0x2a8, &(0x7f0000000440)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\a\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83CZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x98\x86\"R\x06\x00\x00\x00\x00\x00\x00\x00\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&\x014\x01\xf4\xb7\x83\x9a\xfa*\xa6\x06\xb7Pk7N\xc2\xd9\xee\xd0\xb0M\x00\xab\xc3\t\fc\xd8dx\xd5\x1dU*s)\x12[\x14\xb1\xc0\xd7\x1a\xa0\x16\xa2z\x9e\x93 \xddeF>29\v\x02\xa2b\x13R\xef\xffA,\xb9.$\xfa\x9f\xde[\x80\xd1=\xce\x1b\xeb\xf6\xf4\xe3z\x1f\x9dz\xa3\xc0\xe2\xa2\xb1\xeeq\xf5\xec0\x8e\xf4\xfb\xd9\x87\xf03\xdb\xae|\x10&V5c\xa6\xce\xcd\x8a\xdf\xe1\x89\"\xea\xde\xe7\xa3\xbe\xe7\xff\xf9 \x11\xfdY\xc6\xa1\xe8\xda\v\\?\xcb\x87\bn\x9b\x01\x1f\xf8\xe8\x1eV\xfaC\xdf\xc3Vv\x9b\x1a\xfc\x14.c\x94\xc9=\xb0\x0f!d\b\x18*@m\x7f\xaal\x17G\xd6?\x81\x16P\x03\x10e\xc3\xcd\xb1B\xeb\x01B\\\x91A\xa1\x8an\xb4#\xadr\x1e\x81v\xa2\x0e6x\xca\x8b\xa6\xd8\x81\x10:\x0e(\xdd\xfc\xc9\xc6\xb4\xf0\'f:\xbd\xfe\x11\xf8\xc8W\x81s^\xd9W\xf1\x94\xaf\xc5\x8a\xb4f\x1b\x17E\xb23\x12\xb0\xeb\xef\x8c\xb24h\xd7}\x7f\x92Hgej\x957\xe2A'}, 0x30) 03:44:19 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) dup(r0) bind$rds(0xffffffffffffffff, 0x0, 0x0) sendmsg$rds(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, 0x0}, 0x4000000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 738.473047][T31549] IPVS: ftp: loaded support on port[0] = 21 03:44:19 executing program 1: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) socketpair(0x0, 0x0, 0x6, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0x0) 03:44:19 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x238) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) writev(r0, &(0x7f0000000540)=[{&(0x7f0000000140)="cedbddea5b67f4290aa7fd7c0cc7e2e613891a59fd3dc2e8a3c6e7c9fa96", 0x1e}, {&(0x7f0000000340)="e4bc7c957b83ba155edae525e00f76c76056ac3fe8a5de5ccfba604ac6b0d4a0fd42802b43143a32d703bd21baddda61ba1cb78758f519c19a06193e8bfc0d1f1fad3be6885359773264bd153a2bf50591662cca307c7a22f8a9e70629a1beac22b823bfee7fec832958c20007e0", 0x6e}, {&(0x7f00000004c0)="4b8043af3b13f04c3ee02ee028e584b538cfb06be329d5ca0649880187b5cd5ff601bf73", 0x24}, {&(0x7f0000000800)="87cfb3bd1ada6e425bdd5aaccdafa6e4ea74", 0x12}], 0x4) sendto$inet(r0, &(0x7f00000012c0)="0c268a927f1f6588b967481241ba7860005cf65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95425a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x27) 03:44:19 executing program 2: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) r1 = dup(r0) sendmsg$rds(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, 0x0}, 0x4000000) ioctl$sock_inet6_tcp_SIOCINQ(r1, 0x4c81, 0xfffffffffffffffe) 03:44:19 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) dup(r0) bind$rds(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:44:19 executing program 2: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) r1 = dup(r0) sendmsg$rds(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, 0x0}, 0x4000000) ioctl$sock_inet6_tcp_SIOCINQ(r1, 0x4c81, 0xfffffffffffffffe) 03:44:19 executing program 5: openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) ioctl$RNDADDENTROPY(0xffffffffffffffff, 0x40085203, &(0x7f0000000100)={0x6, 0xbc, "56f80f8d7c9ad684157765ee68815e033b7b2972a2d067318db9ac518603e0dbae813e160bd3f15b30c226056579cf64ac2525dd44c15e56204f1e3f1b8c03b31f4281605682d4b39a61b89636b3a2a5ea0bd3f5e8bd40d8c0406969d18fed78e4f4108902b5959ec383c40036f5262e703d6ad6a7a486302c382e45645bfe4c472249b482a28e9519e744cdbe884985d913612a17250eab7e4f0bf4b35aab9f7b923116a8d30baf612ca3bc2ef9b3f8d1c6b570cb60bd8d5b6805ce"}) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_sctp(0x2, 0x5, 0x84) dup3(0xffffffffffffffff, r0, 0x0) socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp_SCTP_AUTH_DEACTIVATE_KEY(0xffffffffffffffff, 0x84, 0x23, 0x0, 0x0) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f00000000c0)={0x51, 0xfffc, 0x0, {0x103, 0xf1}, {0x9}, @ramp={0x2, 0x3, {0x7fff, 0x0, 0x7, 0x7}}}) r1 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(0xffffffffffffffff, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @bcast, @rose, @rose, @null]}, 0x48) listen(r1, 0x0) unshare(0x40000000) r2 = accept(r1, 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r3, 0xffffffffffffffff) write$binfmt_elf64(r2, &(0x7f00000002c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}], "", [[], []]}, 0x278) 03:44:19 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x400007) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0x32600) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xb4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000040)='cpuset') write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000700)=ANY=[@ANYBLOB="006d176df3384ed3ddbcf3be0e26fd017529253262b78ee8b9d470"], 0x1b) ioctl$TUNSETCARRIER(0xffffffffffffffff, 0x400454e2, &(0x7f0000000080)=0x1) write$cgroup_int(r0, &(0x7f0000000380), 0x12) write$cgroup_int(r1, &(0x7f0000000400), 0xd) r2 = gettid() write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000000)=r2, 0x12) r3 = socket$kcm(0x2b, 0x0, 0x0) socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r3, 0x0, 0x0) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000280)=r2, 0x12) r4 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) close(r5) write$cgroup_type(r5, &(0x7f0000000080)='threaded\x00', 0xfffffc61) r6 = bpf$MAP_CREATE(0x2, &(0x7f0000009280), 0x3c) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x17, 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB], &(0x7f0000000200)='syzkaller\x00', 0xfa1, 0x0, 0x0, 0x41100, 0x2, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, &(0x7f0000000240), 0x8, 0x10, 0x0}, 0x78) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000008740)={0x0, 0x0, &(0x7f0000008700)=[{0x0}, {&(0x7f0000008680)=""/23, 0x17}, {&(0x7f00000086c0)=""/38, 0x26}], 0x3}, 0x8000) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x6, 0x2, 0x2e15579, 0x3f, 0x1, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffffff, 0x0, 0x5}, 0x3c) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0xb, [], 0x0, 0xc, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r7}, 0x7e) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r8, &(0x7f0000000000)=ANY=[], 0x50c000) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x18, 0x8, &(0x7f0000000a00)=ANY=[@ANYBLOB="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", @ANYRES32=r6, @ANYBLOB="00000000000000000c72c0fff6ffffff850000005b0000009500000000000000"], &(0x7f0000000040)='GPL\x00', 0x3ff, 0xd5, &(0x7f0000000080)=""/213, 0x61800, 0xab6c50112a8dd52c, [], 0x0, 0x16, 0xffffffffffffffff, 0x8, &(0x7f0000000180)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000001c0)={0x2, 0x6, 0x6, 0x5}, 0x10, 0x0, r8}, 0x78) bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x11, 0x5, 0x81, 0x0, 0x100, r5, 0x3, [], 0x0, 0xffffffffffffffff, 0x4, 0x3}, 0x3c) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r9, &(0x7f0000000200), 0x806000) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, r4, 0x0, 0x2a8, &(0x7f0000000440)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\a\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83CZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x98\x86\"R\x06\x00\x00\x00\x00\x00\x00\x00\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&\x014\x01\xf4\xb7\x83\x9a\xfa*\xa6\x06\xb7Pk7N\xc2\xd9\xee\xd0\xb0M\x00\xab\xc3\t\fc\xd8dx\xd5\x1dU*s)\x12[\x14\xb1\xc0\xd7\x1a\xa0\x16\xa2z\x9e\x93 \xddeF>29\v\x02\xa2b\x13R\xef\xffA,\xb9.$\xfa\x9f\xde[\x80\xd1=\xce\x1b\xeb\xf6\xf4\xe3z\x1f\x9dz\xa3\xc0\xe2\xa2\xb1\xeeq\xf5\xec0\x8e\xf4\xfb\xd9\x87\xf03\xdb\xae|\x10&V5c\xa6\xce\xcd\x8a\xdf\xe1\x89\"\xea\xde\xe7\xa3\xbe\xe7\xff\xf9 \x11\xfdY\xc6\xa1\xe8\xda\v\\?\xcb\x87\bn\x9b\x01\x1f\xf8\xe8\x1eV\xfaC\xdf\xc3Vv\x9b\x1a\xfc\x14.c\x94\xc9=\xb0\x0f!d\b\x18*@m\x7f\xaal\x17G\xd6?\x81\x16P\x03\x10e\xc3\xcd\xb1B\xeb\x01B\\\x91A\xa1\x8an\xb4#\xadr\x1e\x81v\xa2\x0e6x\xca\x8b\xa6\xd8\x81\x10:\x0e(\xdd\xfc\xc9\xc6\xb4\xf0\'f:\xbd\xfe\x11\xf8\xc8W\x81s^\xd9W\xf1\x94\xaf\xc5\x8a\xb4f\x1b\x17E\xb23\x12\xb0\xeb\xef\x8c\xb24h\xd7}\x7f\x92Hgej\x957\xe2A'}, 0x30) 03:44:19 executing program 1: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) socketpair(0x0, 0x0, 0x6, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0x0) 03:44:19 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) dup(r0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:44:19 executing program 2: openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) bind$rds(0xffffffffffffffff, 0x0, 0x0) sendmsg$rds(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, 0x0}, 0x4000000) ioctl$sock_inet6_tcp_SIOCINQ(0xffffffffffffffff, 0x4c81, 0xfffffffffffffffe) [ 739.086030][T31572] IPVS: ftp: loaded support on port[0] = 21 03:44:20 executing program 0: openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:44:20 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x238) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) writev(r0, &(0x7f0000000540)=[{&(0x7f0000000140)="cedbddea5b67f4290aa7fd7c0cc7e2e613891a59fd3dc2e8a3c6e7c9fa96", 0x1e}, {&(0x7f0000000340)="e4bc7c957b83ba155edae525e00f76c76056ac3fe8a5de5ccfba604ac6b0d4a0fd42802b43143a32d703bd21baddda61ba1cb78758f519c19a06193e8bfc0d1f1fad3be6885359773264bd153a2bf50591662cca307c7a22f8a9e70629a1beac22b823bfee7fec832958c20007e0", 0x6e}, {&(0x7f00000004c0)="4b8043af3b13f04c3ee02ee028e584b538cfb06be329d5ca0649880187b5cd5ff601bf73", 0x24}, {&(0x7f0000000800)="87cfb3bd1ada6e425bdd5aaccdafa6e4ea74", 0x12}], 0x4) sendto$inet(r0, &(0x7f00000012c0)="0c268a927f1f6588b967481241ba7860005cf65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95425a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x27) 03:44:20 executing program 1: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) socketpair(0x0, 0x0, 0x6, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0x0) 03:44:20 executing program 2: openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) bind$rds(0xffffffffffffffff, 0x0, 0x0) sendmsg$rds(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, 0x0}, 0x4000000) ioctl$sock_inet6_tcp_SIOCINQ(0xffffffffffffffff, 0x4c81, 0xfffffffffffffffe) 03:44:20 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x400007) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0x32600) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xb4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000040)='cpuset') write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000700)=ANY=[@ANYBLOB="006d176df3384ed3ddbcf3be0e26fd017529253262b78ee8b9d470"], 0x1b) ioctl$TUNSETCARRIER(0xffffffffffffffff, 0x400454e2, &(0x7f0000000080)=0x1) write$cgroup_int(r0, &(0x7f0000000380), 0x12) write$cgroup_int(r1, &(0x7f0000000400), 0xd) r2 = gettid() write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000000)=r2, 0x12) r3 = socket$kcm(0x2b, 0x0, 0x0) socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r3, 0x0, 0x0) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000280)=r2, 0x12) r4 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) close(r5) write$cgroup_type(r5, &(0x7f0000000080)='threaded\x00', 0xfffffc61) r6 = bpf$MAP_CREATE(0x2, &(0x7f0000009280), 0x3c) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x17, 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB], &(0x7f0000000200)='syzkaller\x00', 0xfa1, 0x0, 0x0, 0x41100, 0x2, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, &(0x7f0000000240), 0x8, 0x10, 0x0}, 0x78) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000008740)={0x0, 0x0, &(0x7f0000008700)=[{0x0}, {&(0x7f0000008680)=""/23, 0x17}, {&(0x7f00000086c0)=""/38, 0x26}], 0x3}, 0x8000) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x6, 0x2, 0x2e15579, 0x3f, 0x1, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffffff, 0x0, 0x5}, 0x3c) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0xb, [], 0x0, 0xc, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r7}, 0x7e) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r8, &(0x7f0000000000)=ANY=[], 0x50c000) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x18, 0x8, &(0x7f0000000a00)=ANY=[@ANYBLOB="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", @ANYRES32=r6, @ANYBLOB="00000000000000000c72c0fff6ffffff850000005b0000009500000000000000"], &(0x7f0000000040)='GPL\x00', 0x3ff, 0xd5, &(0x7f0000000080)=""/213, 0x61800, 0xab6c50112a8dd52c, [], 0x0, 0x16, 0xffffffffffffffff, 0x8, &(0x7f0000000180)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000001c0)={0x2, 0x6, 0x6, 0x5}, 0x10, 0x0, r8}, 0x78) bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x11, 0x5, 0x81, 0x2, 0x0, r5, 0x3, [], 0x0, 0xffffffffffffffff, 0x4, 0x3}, 0x3c) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r9, &(0x7f0000000200), 0x806000) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, r4, 0x0, 0x2a8, &(0x7f0000000440)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\a\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83CZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x98\x86\"R\x06\x00\x00\x00\x00\x00\x00\x00\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&\x014\x01\xf4\xb7\x83\x9a\xfa*\xa6\x06\xb7Pk7N\xc2\xd9\xee\xd0\xb0M\x00\xab\xc3\t\fc\xd8dx\xd5\x1dU*s)\x12[\x14\xb1\xc0\xd7\x1a\xa0\x16\xa2z\x9e\x93 \xddeF>29\v\x02\xa2b\x13R\xef\xffA,\xb9.$\xfa\x9f\xde[\x80\xd1=\xce\x1b\xeb\xf6\xf4\xe3z\x1f\x9dz\xa3\xc0\xe2\xa2\xb1\xeeq\xf5\xec0\x8e\xf4\xfb\xd9\x87\xf03\xdb\xae|\x10&V5c\xa6\xce\xcd\x8a\xdf\xe1\x89\"\xea\xde\xe7\xa3\xbe\xe7\xff\xf9 \x11\xfdY\xc6\xa1\xe8\xda\v\\?\xcb\x87\bn\x9b\x01\x1f\xf8\xe8\x1eV\xfaC\xdf\xc3Vv\x9b\x1a\xfc\x14.c\x94\xc9=\xb0\x0f!d\b\x18*@m\x7f\xaal\x17G\xd6?\x81\x16P\x03\x10e\xc3\xcd\xb1B\xeb\x01B\\\x91A\xa1\x8an\xb4#\xadr\x1e\x81v\xa2\x0e6x\xca\x8b\xa6\xd8\x81\x10:\x0e(\xdd\xfc\xc9\xc6\xb4\xf0\'f:\xbd\xfe\x11\xf8\xc8W\x81s^\xd9W\xf1\x94\xaf\xc5\x8a\xb4f\x1b\x17E\xb23\x12\xb0\xeb\xef\x8c\xb24h\xd7}\x7f\x92Hgej\x957\xe2A'}, 0x30) 03:44:20 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:44:20 executing program 2: openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) bind$rds(0xffffffffffffffff, 0x0, 0x0) sendmsg$rds(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, 0x0}, 0x4000000) ioctl$sock_inet6_tcp_SIOCINQ(0xffffffffffffffff, 0x4c81, 0xfffffffffffffffe) 03:44:20 executing program 5: openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) ioctl$RNDADDENTROPY(0xffffffffffffffff, 0x40085203, &(0x7f0000000100)={0x6, 0xbc, "56f80f8d7c9ad684157765ee68815e033b7b2972a2d067318db9ac518603e0dbae813e160bd3f15b30c226056579cf64ac2525dd44c15e56204f1e3f1b8c03b31f4281605682d4b39a61b89636b3a2a5ea0bd3f5e8bd40d8c0406969d18fed78e4f4108902b5959ec383c40036f5262e703d6ad6a7a486302c382e45645bfe4c472249b482a28e9519e744cdbe884985d913612a17250eab7e4f0bf4b35aab9f7b923116a8d30baf612ca3bc2ef9b3f8d1c6b570cb60bd8d5b6805ce"}) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_sctp(0x2, 0x5, 0x84) dup3(0xffffffffffffffff, r0, 0x0) socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp_SCTP_AUTH_DEACTIVATE_KEY(0xffffffffffffffff, 0x84, 0x23, 0x0, 0x0) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f00000000c0)={0x51, 0xfffc, 0x0, {0x103, 0xf1}, {0x9}, @ramp={0x2, 0x3, {0x7fff, 0x0, 0x7, 0x7}}}) r1 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(0xffffffffffffffff, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @bcast, @rose, @rose, @null]}, 0x48) listen(r1, 0x0) unshare(0x40000000) r2 = accept(r1, 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r3, 0xffffffffffffffff) write$binfmt_elf64(r2, &(0x7f00000002c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}], "", [[], []]}, 0x278) 03:44:20 executing program 1: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) socketpair(0x0, 0x0, 0x6, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0x0) 03:44:20 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:44:20 executing program 2: r0 = dup(0xffffffffffffffff) bind$rds(0xffffffffffffffff, 0x0, 0x0) sendmsg$rds(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, 0x0}, 0x4000000) ioctl$sock_inet6_tcp_SIOCINQ(r0, 0x4c81, 0xfffffffffffffffe) 03:44:20 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x238) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) writev(r0, &(0x7f0000000540)=[{&(0x7f0000000140)="cedbddea5b67f4290aa7fd7c0cc7e2e613891a59fd3dc2e8a3c6e7c9fa96", 0x1e}, {&(0x7f0000000340)="e4bc7c957b83ba155edae525e00f76c76056ac3fe8a5de5ccfba604ac6b0d4a0fd42802b43143a32d703bd21baddda61ba1cb78758f519c19a06193e8bfc0d1f1fad3be6885359773264bd153a2bf50591662cca307c7a22f8a9e70629a1beac22b823bfee7fec832958c20007e0b8707c6a", 0x72}, {&(0x7f00000004c0)="4b8043af3b13f04c3ee02ee028e584b538cfb06be329d5ca0649880187b5cd5ff601bf73", 0x24}, {&(0x7f0000000800)="87cfb3bd1ada6e425bdd5aaccdafa6e4ea74", 0x12}], 0x4) sendto$inet(r0, &(0x7f00000012c0)="0c268a927f1f6588b967481241ba7860005cf65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95425a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x27) 03:44:20 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x400007) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0x32600) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xb4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000040)='cpuset') write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000700)=ANY=[@ANYBLOB="006d176df3384ed3ddbcf3be0e26fd017529253262b78ee8b9d470"], 0x1b) ioctl$TUNSETCARRIER(0xffffffffffffffff, 0x400454e2, &(0x7f0000000080)=0x1) write$cgroup_int(r0, &(0x7f0000000380), 0x12) write$cgroup_int(r1, &(0x7f0000000400), 0xd) r2 = gettid() write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000000)=r2, 0x12) r3 = socket$kcm(0x2b, 0x0, 0x0) socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r3, 0x0, 0x0) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000280)=r2, 0x12) r4 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) close(r5) write$cgroup_type(r5, &(0x7f0000000080)='threaded\x00', 0xfffffc61) r6 = bpf$MAP_CREATE(0x2, &(0x7f0000009280), 0x3c) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x17, 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB], &(0x7f0000000200)='syzkaller\x00', 0xfa1, 0x0, 0x0, 0x41100, 0x2, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, &(0x7f0000000240), 0x8, 0x10, 0x0}, 0x78) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000008740)={0x0, 0x0, &(0x7f0000008700)=[{0x0}, {&(0x7f0000008680)=""/23, 0x17}, {&(0x7f00000086c0)=""/38, 0x26}], 0x3}, 0x8000) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x6, 0x2, 0x2e15579, 0x3f, 0x1, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffffff, 0x0, 0x5}, 0x3c) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0xb, [], 0x0, 0xc, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r7}, 0x7e) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r8, &(0x7f0000000000)=ANY=[], 0x50c000) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x18, 0x8, &(0x7f0000000a00)=ANY=[@ANYBLOB="0000752c0000000000000000ffffffff9500000000000000181400006200ed587c1ba87fb23af22b6cf03fb851054ce322d4b3a5894516c0c1479e1cfbf3061ad7aef6d6c36e4e74a8219f8441192ab16361719f26a1e543525c94027f7a5f275546d8cacee044fc20d858e268019caeb1633cc4888faa05d02cd44de32962e022697754125edcfb3477c4e122a0e97ab43de94a7a94efd527400e2c2ff4468fd6e773773f089b268fddef712ab174487ae9049f64895522be3862156a1af15513c3ff285844c9aae255d74c0dacf6c47d6809ce69ee6e41a03a03b29152ee43afabd82aa883f260995238aa70895dc3aee59a119dc82fb5fd00af56ded09336e2df6a0bb41bd191d57b35eb262a1aa8d5fec51b24500685f8c0adaf3639790fdbd7cb2ac3af37a802a6ac7265a819c91986c45e7c54d91c5ced552d96c04a80c063fee16b3a52bc603deebe32e4e0dfdfe9d03658daad65606e175041076684110e66f74db9509b1a29e765c9208ddba13e3b42b3963dce5432c4fb7844a9b64c518820c9c0198fadb6ea6a350f89a1eb1a3c1e20527ce574c3514f9ad62be70eee070faa267d83564e6db87e4d16ccd118397c2e4825140e6b46c35edb77df7b9a3334ad3f8cb70b73f4b9d8b29eb50b2c2dfc8d82841a6251fcfcb978ce90873ddcfa0125800302f5ed70c724e0253fb45955750f1e7c94ca05a91ec592ee3a52fad94c89205ece2d1d96afbfa0b59f9bd6c1161c638fff8696973fedca3f3ddf5bbb1023", @ANYRES32=r6, @ANYBLOB="00000000000000000c72c0fff6ffffff850000005b0000009500000000000000"], &(0x7f0000000040)='GPL\x00', 0x3ff, 0xd5, &(0x7f0000000080)=""/213, 0x61800, 0xab6c50112a8dd52c, [], 0x0, 0x16, 0xffffffffffffffff, 0x8, &(0x7f0000000180)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000001c0)={0x2, 0x6, 0x6, 0x5}, 0x10, 0x0, r8}, 0x78) bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x11, 0x5, 0x81, 0x2, 0x0, r5, 0x3, [], 0x0, 0xffffffffffffffff, 0x4, 0x3}, 0x3c) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r9, &(0x7f0000000200), 0x806000) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, r4, 0x0, 0x2a8, &(0x7f0000000440)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\a\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83CZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x98\x86\"R\x06\x00\x00\x00\x00\x00\x00\x00\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&\x014\x01\xf4\xb7\x83\x9a\xfa*\xa6\x06\xb7Pk7N\xc2\xd9\xee\xd0\xb0M\x00\xab\xc3\t\fc\xd8dx\xd5\x1dU*s)\x12[\x14\xb1\xc0\xd7\x1a\xa0\x16\xa2z\x9e\x93 \xddeF>29\v\x02\xa2b\x13R\xef\xffA,\xb9.$\xfa\x9f\xde[\x80\xd1=\xce\x1b\xeb\xf6\xf4\xe3z\x1f\x9dz\xa3\xc0\xe2\xa2\xb1\xeeq\xf5\xec0\x8e\xf4\xfb\xd9\x87\xf03\xdb\xae|\x10&V5c\xa6\xce\xcd\x8a\xdf\xe1\x89\"\xea\xde\xe7\xa3\xbe\xe7\xff\xf9 \x11\xfdY\xc6\xa1\xe8\xda\v\\?\xcb\x87\bn\x9b\x01\x1f\xf8\xe8\x1eV\xfaC\xdf\xc3Vv\x9b\x1a\xfc\x14.c\x94\xc9=\xb0\x0f!d\b\x18*@m\x7f\xaal\x17G\xd6?\x81\x16P\x03\x10e\xc3\xcd\xb1B\xeb\x01B\\\x91A\xa1\x8an\xb4#\xadr\x1e\x81v\xa2\x0e6x\xca\x8b\xa6\xd8\x81\x10:\x0e(\xdd\xfc\xc9\xc6\xb4\xf0\'f:\xbd\xfe\x11\xf8\xc8W\x81s^\xd9W\xf1\x94\xaf\xc5\x8a\xb4f\x1b\x17E\xb23\x12\xb0\xeb\xef\x8c\xb24h\xd7}\x7f\x92Hgej\x957\xe2A'}, 0x30) 03:44:20 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:44:20 executing program 2: r0 = dup(0xffffffffffffffff) bind$rds(0xffffffffffffffff, 0x0, 0x0) sendmsg$rds(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, 0x0}, 0x4000000) ioctl$sock_inet6_tcp_SIOCINQ(r0, 0x4c81, 0xfffffffffffffffe) [ 740.041546][T31608] IPVS: ftp: loaded support on port[0] = 21 03:44:21 executing program 1: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) socketpair(0x0, 0x0, 0x6, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) 03:44:21 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x400007) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0x32600) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xb4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000040)='cpuset') write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000700)=ANY=[@ANYBLOB="006d176df3384ed3ddbcf3be0e26fd017529253262b78ee8b9d470"], 0x1b) ioctl$TUNSETCARRIER(0xffffffffffffffff, 0x400454e2, &(0x7f0000000080)=0x1) write$cgroup_int(r0, &(0x7f0000000380), 0x12) write$cgroup_int(r1, &(0x7f0000000400), 0xd) r2 = gettid() write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000000)=r2, 0x12) r3 = socket$kcm(0x2b, 0x0, 0x0) socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r3, 0x0, 0x0) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000280)=r2, 0x12) r4 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) close(r5) write$cgroup_type(r5, &(0x7f0000000080)='threaded\x00', 0xfffffc61) r6 = bpf$MAP_CREATE(0x2, &(0x7f0000009280), 0x3c) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x17, 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB], &(0x7f0000000200)='syzkaller\x00', 0xfa1, 0x0, 0x0, 0x41100, 0x2, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, &(0x7f0000000240), 0x8, 0x10, 0x0}, 0x78) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000008740)={0x0, 0x0, &(0x7f0000008700)=[{0x0}, {&(0x7f0000008680)=""/23, 0x17}, {&(0x7f00000086c0)=""/38, 0x26}], 0x3}, 0x8000) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x6, 0x2, 0x2e15579, 0x3f, 0x1, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffffff, 0x0, 0x5}, 0x3c) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0xb, [], 0x0, 0xc, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r7}, 0x7e) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r8, &(0x7f0000000000)=ANY=[], 0x50c000) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x18, 0x8, &(0x7f0000000a00)=ANY=[@ANYBLOB="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", @ANYRES32=r6, @ANYBLOB="00000000000000000c72c0fff6ffffff850000005b0000009500000000000000"], &(0x7f0000000040)='GPL\x00', 0x3ff, 0xd5, &(0x7f0000000080)=""/213, 0x61800, 0xab6c50112a8dd52c, [], 0x0, 0x16, 0xffffffffffffffff, 0x8, &(0x7f0000000180)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000001c0)={0x2, 0x6, 0x6, 0x5}, 0x10, 0x0, r8}, 0x78) bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x11, 0x5, 0x81, 0x2, 0x0, r5, 0x3, [], 0x0, 0xffffffffffffffff, 0x4, 0x3}, 0x3c) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r9, &(0x7f0000000200), 0x806000) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, r4, 0x0, 0x2a8, &(0x7f0000000440)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\a\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83CZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x98\x86\"R\x06\x00\x00\x00\x00\x00\x00\x00\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&\x014\x01\xf4\xb7\x83\x9a\xfa*\xa6\x06\xb7Pk7N\xc2\xd9\xee\xd0\xb0M\x00\xab\xc3\t\fc\xd8dx\xd5\x1dU*s)\x12[\x14\xb1\xc0\xd7\x1a\xa0\x16\xa2z\x9e\x93 \xddeF>29\v\x02\xa2b\x13R\xef\xffA,\xb9.$\xfa\x9f\xde[\x80\xd1=\xce\x1b\xeb\xf6\xf4\xe3z\x1f\x9dz\xa3\xc0\xe2\xa2\xb1\xeeq\xf5\xec0\x8e\xf4\xfb\xd9\x87\xf03\xdb\xae|\x10&V5c\xa6\xce\xcd\x8a\xdf\xe1\x89\"\xea\xde\xe7\xa3\xbe\xe7\xff\xf9 \x11\xfdY\xc6\xa1\xe8\xda\v\\?\xcb\x87\bn\x9b\x01\x1f\xf8\xe8\x1eV\xfaC\xdf\xc3Vv\x9b\x1a\xfc\x14.c\x94\xc9=\xb0\x0f!d\b\x18*@m\x7f\xaal\x17G\xd6?\x81\x16P\x03\x10e\xc3\xcd\xb1B\xeb\x01B\\\x91A\xa1\x8an\xb4#\xadr\x1e\x81v\xa2\x0e6x\xca\x8b\xa6\xd8\x81\x10:\x0e(\xdd\xfc\xc9\xc6\xb4\xf0\'f:\xbd\xfe\x11\xf8\xc8W\x81s^\xd9W\xf1\x94\xaf\xc5\x8a\xb4f\x1b\x17E\xb23\x12\xb0\xeb\xef\x8c\xb24h\xd7}\x7f\x92Hgej\x957\xe2A'}, 0x30) 03:44:21 executing program 2: r0 = dup(0xffffffffffffffff) bind$rds(0xffffffffffffffff, 0x0, 0x0) sendmsg$rds(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, 0x0}, 0x4000000) ioctl$sock_inet6_tcp_SIOCINQ(r0, 0x4c81, 0xfffffffffffffffe) 03:44:21 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:44:21 executing program 5: openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) ioctl$RNDADDENTROPY(0xffffffffffffffff, 0x40085203, &(0x7f0000000100)={0x6, 0xbc, "56f80f8d7c9ad684157765ee68815e033b7b2972a2d067318db9ac518603e0dbae813e160bd3f15b30c226056579cf64ac2525dd44c15e56204f1e3f1b8c03b31f4281605682d4b39a61b89636b3a2a5ea0bd3f5e8bd40d8c0406969d18fed78e4f4108902b5959ec383c40036f5262e703d6ad6a7a486302c382e45645bfe4c472249b482a28e9519e744cdbe884985d913612a17250eab7e4f0bf4b35aab9f7b923116a8d30baf612ca3bc2ef9b3f8d1c6b570cb60bd8d5b6805ce"}) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_sctp(0x2, 0x5, 0x84) dup3(0xffffffffffffffff, r0, 0x0) socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp_SCTP_AUTH_DEACTIVATE_KEY(0xffffffffffffffff, 0x84, 0x23, 0x0, 0x0) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f00000000c0)={0x51, 0xfffc, 0x0, {0x103, 0xf1}, {0x9}, @ramp={0x2, 0x3, {0x7fff, 0x0, 0x7, 0x7}}}) r1 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(0xffffffffffffffff, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @bcast, @rose, @rose, @null]}, 0x48) listen(r1, 0x0) unshare(0x40000000) r2 = accept(r1, 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r3, 0xffffffffffffffff) write$binfmt_elf64(r2, &(0x7f00000002c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}], "", [[], []]}, 0x278) 03:44:21 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x238) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) writev(r0, &(0x7f0000000540)=[{&(0x7f0000000140)="cedbddea5b67f4290aa7fd7c0cc7e2e613891a59fd3dc2e8a3c6e7c9fa96", 0x1e}, {&(0x7f0000000340)="e4bc7c957b83ba155edae525e00f76c76056ac3fe8a5de5ccfba604ac6b0d4a0fd42802b43143a32d703bd21baddda61ba1cb78758f519c19a06193e8bfc0d1f1fad3be6885359773264bd153a2bf50591662cca307c7a22f8a9e70629a1beac22b823bfee7fec832958c20007e0b8707c6a", 0x72}, {&(0x7f00000004c0)="4b8043af3b13f04c3ee02ee028e584b538cfb06be329d5ca0649880187b5cd5ff601bf73", 0x24}, {&(0x7f0000000800)="87cfb3bd1ada6e425bdd5aaccdafa6e4ea74", 0x12}], 0x4) sendto$inet(r0, &(0x7f00000012c0)="0c268a927f1f6588b967481241ba7860005cf65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95425a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x27) 03:44:21 executing program 1: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) socketpair(0x0, 0x0, 0x6, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) 03:44:21 executing program 2: r0 = openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = dup(r0) bind$rds(0xffffffffffffffff, 0x0, 0x0) sendmsg$rds(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, 0x0}, 0x4000000) ioctl$sock_inet6_tcp_SIOCINQ(r1, 0x4c81, 0xfffffffffffffffe) 03:44:21 executing program 0: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:44:21 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x400007) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0x32600) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xb4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000040)='cpuset') write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000700)=ANY=[@ANYBLOB="006d176df3384ed3ddbcf3be0e26fd017529253262b78ee8b9d470"], 0x1b) ioctl$TUNSETCARRIER(0xffffffffffffffff, 0x400454e2, &(0x7f0000000080)=0x1) write$cgroup_int(r0, &(0x7f0000000380), 0x12) write$cgroup_int(r1, &(0x7f0000000400), 0xd) r2 = gettid() write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000000)=r2, 0x12) r3 = socket$kcm(0x2b, 0x0, 0x0) socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r3, 0x0, 0x0) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000280)=r2, 0x12) r4 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) close(r5) write$cgroup_type(r5, &(0x7f0000000080)='threaded\x00', 0xfffffc61) r6 = bpf$MAP_CREATE(0x2, &(0x7f0000009280), 0x3c) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x17, 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB], &(0x7f0000000200)='syzkaller\x00', 0xfa1, 0x0, 0x0, 0x41100, 0x2, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, &(0x7f0000000240), 0x8, 0x10, 0x0}, 0x78) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000008740)={0x0, 0x0, &(0x7f0000008700)=[{0x0}, {&(0x7f0000008680)=""/23, 0x17}, {&(0x7f00000086c0)=""/38, 0x26}], 0x3}, 0x8000) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x6, 0x2, 0x2e15579, 0x3f, 0x1, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffffff, 0x0, 0x5}, 0x3c) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0xb, [], 0x0, 0xc, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r7}, 0x7e) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r8, &(0x7f0000000000)=ANY=[], 0x50c000) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x18, 0x8, &(0x7f0000000a00)=ANY=[@ANYBLOB="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", @ANYRES32=r6, @ANYBLOB="00000000000000000c72c0fff6ffffff850000005b0000009500000000000000"], &(0x7f0000000040)='GPL\x00', 0x3ff, 0xd5, &(0x7f0000000080)=""/213, 0x61800, 0xab6c50112a8dd52c, [], 0x0, 0x16, 0xffffffffffffffff, 0x8, &(0x7f0000000180)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000001c0)={0x2, 0x6, 0x6, 0x5}, 0x10, 0x0, r8}, 0x78) bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x11, 0x5, 0x81, 0x2, 0x100, 0xffffffffffffffff, 0x3, [], 0x0, 0xffffffffffffffff, 0x4, 0x3}, 0x3c) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r9, &(0x7f0000000200), 0x806000) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, r4, 0x0, 0x2a8, &(0x7f0000000440)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\a\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83CZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x98\x86\"R\x06\x00\x00\x00\x00\x00\x00\x00\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&\x014\x01\xf4\xb7\x83\x9a\xfa*\xa6\x06\xb7Pk7N\xc2\xd9\xee\xd0\xb0M\x00\xab\xc3\t\fc\xd8dx\xd5\x1dU*s)\x12[\x14\xb1\xc0\xd7\x1a\xa0\x16\xa2z\x9e\x93 \xddeF>29\v\x02\xa2b\x13R\xef\xffA,\xb9.$\xfa\x9f\xde[\x80\xd1=\xce\x1b\xeb\xf6\xf4\xe3z\x1f\x9dz\xa3\xc0\xe2\xa2\xb1\xeeq\xf5\xec0\x8e\xf4\xfb\xd9\x87\xf03\xdb\xae|\x10&V5c\xa6\xce\xcd\x8a\xdf\xe1\x89\"\xea\xde\xe7\xa3\xbe\xe7\xff\xf9 \x11\xfdY\xc6\xa1\xe8\xda\v\\?\xcb\x87\bn\x9b\x01\x1f\xf8\xe8\x1eV\xfaC\xdf\xc3Vv\x9b\x1a\xfc\x14.c\x94\xc9=\xb0\x0f!d\b\x18*@m\x7f\xaal\x17G\xd6?\x81\x16P\x03\x10e\xc3\xcd\xb1B\xeb\x01B\\\x91A\xa1\x8an\xb4#\xadr\x1e\x81v\xa2\x0e6x\xca\x8b\xa6\xd8\x81\x10:\x0e(\xdd\xfc\xc9\xc6\xb4\xf0\'f:\xbd\xfe\x11\xf8\xc8W\x81s^\xd9W\xf1\x94\xaf\xc5\x8a\xb4f\x1b\x17E\xb23\x12\xb0\xeb\xef\x8c\xb24h\xd7}\x7f\x92Hgej\x957\xe2A'}, 0x30) 03:44:21 executing program 2: r0 = openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = dup(r0) bind$rds(0xffffffffffffffff, 0x0, 0x0) sendmsg$rds(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, 0x0}, 0x4000000) ioctl$sock_inet6_tcp_SIOCINQ(r1, 0x4c81, 0xfffffffffffffffe) 03:44:21 executing program 1: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) socketpair(0x0, 0x0, 0x6, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:44:21 executing program 0: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:44:21 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x400007) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0x32600) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xb4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000040)='cpuset') write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000700)=ANY=[@ANYBLOB="006d176df3384ed3ddbcf3be0e26fd017529253262b78ee8b9d470"], 0x1b) ioctl$TUNSETCARRIER(0xffffffffffffffff, 0x400454e2, &(0x7f0000000080)=0x1) write$cgroup_int(r0, &(0x7f0000000380), 0x12) write$cgroup_int(r1, &(0x7f0000000400), 0xd) r2 = gettid() write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000000)=r2, 0x12) r3 = socket$kcm(0x2b, 0x0, 0x0) socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r3, 0x0, 0x0) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000280)=r2, 0x12) r4 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) close(r5) write$cgroup_type(r5, &(0x7f0000000080)='threaded\x00', 0xfffffc61) r6 = bpf$MAP_CREATE(0x2, &(0x7f0000009280), 0x3c) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x17, 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB], &(0x7f0000000200)='syzkaller\x00', 0xfa1, 0x0, 0x0, 0x41100, 0x2, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, &(0x7f0000000240), 0x8, 0x10, 0x0}, 0x78) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000008740)={0x0, 0x0, &(0x7f0000008700)=[{0x0}, {&(0x7f0000008680)=""/23, 0x17}, {&(0x7f00000086c0)=""/38, 0x26}], 0x3}, 0x8000) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x6, 0x2, 0x2e15579, 0x3f, 0x1, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffffff, 0x0, 0x5}, 0x3c) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0xb, [], 0x0, 0xc, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r7}, 0x7e) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r8, &(0x7f0000000000)=ANY=[], 0x50c000) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x18, 0x8, &(0x7f0000000a00)=ANY=[@ANYBLOB="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", @ANYRES32=r6, @ANYBLOB="00000000000000000c72c0fff6ffffff850000005b0000009500000000000000"], &(0x7f0000000040)='GPL\x00', 0x3ff, 0xd5, &(0x7f0000000080)=""/213, 0x61800, 0xab6c50112a8dd52c, [], 0x0, 0x16, 0xffffffffffffffff, 0x8, &(0x7f0000000180)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000001c0)={0x2, 0x6, 0x6, 0x5}, 0x10, 0x0, r8}, 0x78) bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x11, 0x5, 0x81, 0x2, 0x100, 0xffffffffffffffff, 0x3, [], 0x0, 0xffffffffffffffff, 0x4, 0x3}, 0x3c) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r9, &(0x7f0000000200), 0x806000) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, r4, 0x0, 0x2a8, &(0x7f0000000440)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\a\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83CZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x98\x86\"R\x06\x00\x00\x00\x00\x00\x00\x00\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&\x014\x01\xf4\xb7\x83\x9a\xfa*\xa6\x06\xb7Pk7N\xc2\xd9\xee\xd0\xb0M\x00\xab\xc3\t\fc\xd8dx\xd5\x1dU*s)\x12[\x14\xb1\xc0\xd7\x1a\xa0\x16\xa2z\x9e\x93 \xddeF>29\v\x02\xa2b\x13R\xef\xffA,\xb9.$\xfa\x9f\xde[\x80\xd1=\xce\x1b\xeb\xf6\xf4\xe3z\x1f\x9dz\xa3\xc0\xe2\xa2\xb1\xeeq\xf5\xec0\x8e\xf4\xfb\xd9\x87\xf03\xdb\xae|\x10&V5c\xa6\xce\xcd\x8a\xdf\xe1\x89\"\xea\xde\xe7\xa3\xbe\xe7\xff\xf9 \x11\xfdY\xc6\xa1\xe8\xda\v\\?\xcb\x87\bn\x9b\x01\x1f\xf8\xe8\x1eV\xfaC\xdf\xc3Vv\x9b\x1a\xfc\x14.c\x94\xc9=\xb0\x0f!d\b\x18*@m\x7f\xaal\x17G\xd6?\x81\x16P\x03\x10e\xc3\xcd\xb1B\xeb\x01B\\\x91A\xa1\x8an\xb4#\xadr\x1e\x81v\xa2\x0e6x\xca\x8b\xa6\xd8\x81\x10:\x0e(\xdd\xfc\xc9\xc6\xb4\xf0\'f:\xbd\xfe\x11\xf8\xc8W\x81s^\xd9W\xf1\x94\xaf\xc5\x8a\xb4f\x1b\x17E\xb23\x12\xb0\xeb\xef\x8c\xb24h\xd7}\x7f\x92Hgej\x957\xe2A'}, 0x30) [ 740.942733][T31835] IPVS: ftp: loaded support on port[0] = 21 03:44:22 executing program 0: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:44:22 executing program 1: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) socketpair(0x0, 0x0, 0x6, 0x0) [ 741.267685][T31847] ================================================================== [ 741.275839][T31847] BUG: KCSAN: data-race in __blk_queue_split / bio_endio [ 741.282850][T31847] [ 741.285270][T31847] read to 0xffff88811ee026d4 of 2 bytes by interrupt on cpu 1: [ 741.292819][T31847] bio_endio+0x3e/0x400 [ 741.296977][T31847] blk_update_request+0x427/0x7b0 [ 741.302011][T31847] scsi_end_request+0x6b/0x360 [ 741.306779][T31847] scsi_io_completion+0x11d/0xc80 [ 741.311802][T31847] scsi_finish_command+0x283/0x380 [ 741.316951][T31847] scsi_softirq_done+0x259/0x280 [ 741.321916][T31847] blk_done_softirq+0x1eb/0x250 [ 741.326788][T31847] __do_softirq+0x115/0x33f [ 741.331294][T31847] irq_exit+0xbb/0xe0 [ 741.335278][T31847] do_IRQ+0x81/0x130 [ 741.339271][T31847] ret_from_intr+0x0/0x21 [ 741.343608][T31847] __sanitizer_cov_trace_pc+0x20/0x50 [ 741.349004][T31847] idr_get_free+0x18e/0x630 [ 741.353647][T31847] idr_alloc_u32+0xf4/0x1c0 [ 741.358182][T31847] idr_alloc_cyclic+0xc0/0x1b0 [ 741.362960][T31847] __kernfs_new_node+0xd7/0x400 [ 741.367941][T31847] kernfs_new_node+0x79/0xd0 [ 741.372535][T31847] __kernfs_create_file+0x5a/0x1c0 [ 741.377664][T31847] sysfs_add_file_mode_ns+0x16c/0x320 [ 741.383052][T31847] sysfs_merge_group+0xf0/0x1d0 [ 741.387922][T31847] dpm_sysfs_add+0x1de/0x200 [ 741.392519][T31847] device_add+0x6ab/0x1040 [ 741.397109][T31847] netdev_register_kobject+0xf5/0x240 [ 741.402484][T31847] register_netdevice+0x34e/0xad0 [ 741.407510][T31847] __ip_tunnel_create+0x214/0x400 [ 741.412535][T31847] ip_tunnel_init_net+0x24d/0x3d1 [ 741.417555][T31847] vti_init_net+0x57/0x160 [ 741.421965][T31847] ops_init+0x8c/0x240 [ 741.426036][T31847] setup_net+0x191/0x4b0 [ 741.430387][T31847] copy_net_ns+0x1e7/0x400 [ 741.434804][T31847] create_new_namespaces+0x2e2/0x550 [ 741.440086][T31847] unshare_nsproxy_namespaces+0xb9/0x170 [ 741.445731][T31847] ksys_unshare+0x2dc/0x710 [ 741.450241][T31847] __x64_sys_unshare+0x28/0x40 [ 741.455004][T31847] do_syscall_64+0xcc/0x3a0 [ 741.459507][T31847] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 741.465381][T31847] [ 741.467712][T31847] write to 0xffff88811ee026d4 of 2 bytes by task 31847 on cpu 0: [ 741.475526][T31847] __blk_queue_split+0x738/0xc40 [ 741.480457][T31847] blk_mq_make_request+0x104/0xf60 [ 741.485735][T31847] generic_make_request+0x196/0x700 [ 741.490947][T31847] submit_bio+0x96/0x3c0 [ 741.495187][T31847] iomap_dio_submit_bio.isra.0+0xfc/0x120 [ 741.500910][T31847] iomap_dio_bio_actor+0x40a/0x960 [ 741.506012][T31847] iomap_dio_actor+0x87/0x3a0 [ 741.510692][T31847] iomap_apply+0x20d/0x6a0 [ 741.515106][T31847] iomap_dio_rw+0x67e/0x9a0 [ 741.519602][T31847] ext4_file_write_iter+0xc38/0xd40 [ 741.524792][T31847] new_sync_write+0x388/0x4a0 [ 741.529467][T31847] __vfs_write+0xb1/0xc0 [ 741.533704][T31847] vfs_write+0x18a/0x390 [ 741.537938][T31847] ksys_write+0xd5/0x1b0 [ 741.542298][T31847] __x64_sys_write+0x4c/0x60 [ 741.546883][T31847] do_syscall_64+0xcc/0x3a0 [ 741.551384][T31847] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 741.557260][T31847] [ 741.559572][T31847] Reported by Kernel Concurrency Sanitizer on: [ 741.565716][T31847] CPU: 0 PID: 31847 Comm: syz-executor.4 Not tainted 5.5.0-rc1-syzkaller #0 [ 741.574805][T31847] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 741.584848][T31847] ================================================================== [ 741.592905][T31847] Kernel panic - not syncing: panic_on_warn set ... [ 741.599501][T31847] CPU: 0 PID: 31847 Comm: syz-executor.4 Not tainted 5.5.0-rc1-syzkaller #0 [ 741.608164][T31847] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 741.618221][T31847] Call Trace: [ 741.621513][T31847] dump_stack+0x11d/0x181 [ 741.625843][T31847] panic+0x210/0x640 [ 741.629745][T31847] ? vprintk_func+0x8d/0x140 [ 741.634335][T31847] kcsan_report.cold+0xc/0xd [ 741.638923][T31847] kcsan_setup_watchpoint+0x3fe/0x460 [ 741.644301][T31847] __tsan_unaligned_write2+0xc7/0x110 [ 741.649682][T31847] __blk_queue_split+0x738/0xc40 [ 741.654773][T31847] blk_mq_make_request+0x104/0xf60 [ 741.659879][T31847] ? blk_queue_enter+0x532/0x570 [ 741.664816][T31847] generic_make_request+0x196/0x700 [ 741.670016][T31847] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 741.676268][T31847] submit_bio+0x96/0x3c0 [ 741.680514][T31847] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 741.686768][T31847] ? bio_iov_iter_get_pages+0x44a/0x5a0 [ 741.692313][T31847] iomap_dio_submit_bio.isra.0+0xfc/0x120 [ 741.698031][T31847] iomap_dio_bio_actor+0x40a/0x960 [ 741.703140][T31847] iomap_dio_actor+0x87/0x3a0 [ 741.707850][T31847] iomap_apply+0x20d/0x6a0 [ 741.712380][T31847] ? iomap_dio_bio_actor+0x960/0x960 [ 741.717678][T31847] iomap_dio_rw+0x67e/0x9a0 [ 741.722180][T31847] ? iomap_dio_bio_actor+0x960/0x960 [ 741.727496][T31847] ext4_file_write_iter+0xc38/0xd40 [ 741.732689][T31847] ? ext4_file_write_iter+0xc38/0xd40 [ 741.738073][T31847] ? iov_iter_init+0xe2/0x120 [ 741.742748][T31847] new_sync_write+0x388/0x4a0 [ 741.747423][T31847] ? __rcu_read_unlock+0x66/0x3d0 [ 741.752447][T31847] __vfs_write+0xb1/0xc0 [ 741.756688][T31847] vfs_write+0x18a/0x390 [ 741.760968][T31847] ksys_write+0xd5/0x1b0 [ 741.765212][T31847] __x64_sys_write+0x4c/0x60 [ 741.769815][T31847] do_syscall_64+0xcc/0x3a0 [ 741.774331][T31847] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 741.780217][T31847] RIP: 0033:0x45af49 [ 741.784113][T31847] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 741.803711][T31847] RSP: 002b:00007f138b7f6c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 741.812130][T31847] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 000000000045af49 [ 741.820093][T31847] RDX: 0000000000806000 RSI: 0000000020000200 RDI: 0000000000000009 [ 741.828058][T31847] RBP: 000000000075bfc8 R08: 0000000000000000 R09: 0000000000000000 [ 741.836386][T31847] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f138b7f76d4 [ 741.844350][T31847] R13: 00000000004ccce2 R14: 00000000004e7e70 R15: 00000000ffffffff [ 741.853763][T31847] Kernel Offset: disabled [ 741.858087][T31847] Rebooting in 86400 seconds..