yz-executor4" name="/root/syzkaller-testdir696441687/syzkaller.siB441/68/bus" dev="sda1" ino=16569 res=1 21:45:58 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2, &(0x7f0000000340)=0x203, 0x4) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, &(0x7f0000000280), 0x895ff3b0, 0x20000004, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @empty={[0xe000000d2070000]}}, 0x1c) r2 = accept(r0, 0x0, &(0x7f0000000080)=0xfffffffffffffdfd) close(r2) 21:45:58 executing program 2: r0 = socket$kcm(0xa, 0x6, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0xd, 0x22, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000400)='syzkaller\x00', 0x40, 0xd4, &(0x7f00000008c0)=""/212, 0x0, 0x1000002, [], 0x0, 0x3}, 0x48) socket$kcm(0x29, 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000ec0)={&(0x7f0000000e80)='./file0\x00'}, 0x10) r2 = perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0x28, &(0x7f0000000340)}, 0x2e0) r3 = perf_event_open(&(0x7f0000000380)={0x0, 0x70, 0x0, 0x100, 0x0, 0x6, 0x0, 0x100000000, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x6, 0x2, 0x4, 0x75, 0x0, 0xba7c, 0x0, 0x0, 0x0, 0x0, 0x6e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1f, 0x0, 0x2, 0x1000, 0x0, 0x0, 0xd, 0x7, @perf_bp={&(0x7f0000000280)}, 0x1, 0x7, 0x0, 0x6, 0x5, 0x2fd, 0x40}, 0x0, 0x0, 0xffffffffffffffff, 0xb) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cpuset.effective_mems\x00', 0x0, 0x0) r5 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) r6 = openat$cgroup_ro(r4, &(0x7f0000000680)='cpuacct.usage_all\x00', 0x2761, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000500)={0x0, r6, 0x0, 0x16, &(0x7f00000004c0)='cpuset.effective_mems\x00'}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000580)={0xffffffffffffffff, r5, 0x0, 0x1, &(0x7f0000000540)='\x00'}, 0x30) write$cgroup_pid(r4, &(0x7f0000000480)=r7, 0xfffffffffffffffe) ioctl$PERF_EVENT_IOC_QUERY_BPF(r3, 0xc008240a, &(0x7f0000000300)=ANY=[@ANYBLOB="07000000000000000000000000000000000000000000000000ff00000000000000000000"]) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r6, 0x660c, 0x2933) r8 = getpid() write$cgroup_pid(r6, &(0x7f0000000080)=r8, 0x12) write$cgroup_pid(r6, &(0x7f0000000000), 0x12) ioctl$PERF_EVENT_IOC_RESET(r2, 0x2403, 0x8) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0xf, 0x1}, 0x14) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x890c, &(0x7f0000000000)) 21:45:58 executing program 5: r0 = socket$inet6(0xa, 0x803, 0x3) getsockopt$inet6_int(r0, 0x29, 0x4d, &(0x7f0000000200), &(0x7f0000000040)=0xb9a21c09dc218da2) 21:45:58 executing program 4: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = creat(&(0x7f0000000680)='./bus\x00', 0x0) fcntl$setstatus(r1, 0x4, 0x6100) ftruncate(r1, 0x8200) r2 = open(&(0x7f00000000c0)='./bus\x00', 0x101002, 0x0) r3 = open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) sendfile(r1, r3, &(0x7f0000d83ff8), 0x8000fffffffe) write$P9_ROPEN(r2, &(0x7f0000000040)={0x18}, 0x18) [ 332.031657] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 21:45:58 executing program 3: syz_open_procfs(0x0, &(0x7f00000002c0)='oom_score_adj\x00') ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) request_key(&(0x7f0000000240)='pkcs7_test\x00', &(0x7f0000000280)={'syz', 0x0}, &(0x7f0000000300)='/\x00', 0xfffffffffffffffe) request_key(&(0x7f00000000c0)='user\x00', &(0x7f0000000100)={'syz'}, &(0x7f0000000200)='vmnet0&#selfbdev&vboxnet0trust%dselfeth1#c(vmnet0c^\x00', 0x0) [ 332.078504] audit: type=1804 audit(1538430358.943:52): pid=14093 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor4" name="/root/syzkaller-testdir696441687/syzkaller.siB441/69/bus" dev="sda1" ino=16572 res=1 21:45:59 executing program 5: r0 = socket$inet6(0xa, 0x80001, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(r0, 0x29, 0x2a, &(0x7f0000fca000)={0x100000001, {{0xa, 0x0, 0x0, @mcast1}}}, 0x88) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000000300)={0x1, {{0xa, 0x0, 0x0, @mcast2}}}, 0x90) 21:45:59 executing program 2: r0 = socket$kcm(0xa, 0x6, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0xd, 0x22, &(0x7f0000000780)=ANY=[@ANYBLOB="000076ffff0000000000000000730f3800040000000000006124dc79917bae98003f00000000000000000000004b92f8ffffff00ff000000000000000073733800fdffffff00000000000000005d2f5048655300000000000000008653f1425e000c00000000000000000000003f5bfcff08000000124d415e4023f9a60ed6cbbd418640a8fb776b836311fad9b69052faf8f243f64b040de4c3bf5d8aeb0ac0ba2d587716bcee18411fd760458be38a5ca66e076cfe4201e1b0e2df9027f8ca43fe3ee54a7c90e5980ffe2469f7f34f5e76f22942612720954d38d5e3273dfe4558b76933919ed7b3b0feaa1485798e32e242cd339ed23d5cd366d9479034480473c806818e40634b5eef0000000000000000000000"], &(0x7f0000000400)='syzkaller\x00', 0x40, 0xd4, &(0x7f00000008c0)=""/212, 0x0, 0x1000002, [], 0x0, 0x3}, 0x48) socket$kcm(0x29, 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000ec0)={&(0x7f0000000e80)='./file0\x00'}, 0x10) r2 = perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0x28, &(0x7f0000000340)}, 0x2e0) r3 = perf_event_open(&(0x7f0000000380)={0x0, 0x70, 0x0, 0x100, 0x0, 0x6, 0x0, 0x100000000, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x6, 0x2, 0x4, 0x75, 0x0, 0xba7c, 0x0, 0x0, 0x0, 0x0, 0x6e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1f, 0x0, 0x2, 0x1000, 0x0, 0x0, 0xd, 0x7, @perf_bp={&(0x7f0000000280)}, 0x1, 0x7, 0x0, 0x6, 0x5, 0x2fd, 0x40}, 0x0, 0x0, 0xffffffffffffffff, 0xb) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cpuset.effective_mems\x00', 0x0, 0x0) r5 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) r6 = openat$cgroup_ro(r4, &(0x7f0000000680)='cpuacct.usage_all\x00', 0x2761, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000500)={0x0, r6, 0x0, 0x16, &(0x7f00000004c0)='cpuset.effective_mems\x00'}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000580)={0xffffffffffffffff, r5, 0x0, 0x1, &(0x7f0000000540)='\x00'}, 0x30) write$cgroup_pid(r4, &(0x7f0000000480)=r7, 0xfffffffffffffffe) ioctl$PERF_EVENT_IOC_QUERY_BPF(r3, 0xc008240a, &(0x7f0000000300)=ANY=[@ANYBLOB="07000000000000000000000000000000000000000000000000ff00000000000000000000"]) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r6, 0x660c, 0x2933) r8 = getpid() write$cgroup_pid(r6, &(0x7f0000000080)=r8, 0x12) write$cgroup_pid(r6, &(0x7f0000000000), 0x12) ioctl$PERF_EVENT_IOC_RESET(r2, 0x2403, 0x8) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0xf, 0x1}, 0x14) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x890c, &(0x7f0000000000)) 21:45:59 executing program 4: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = creat(&(0x7f0000000680)='./bus\x00', 0x0) fcntl$setstatus(r1, 0x4, 0x6100) ftruncate(r1, 0x8200) r2 = open(&(0x7f00000000c0)='./bus\x00', 0x101002, 0x0) r3 = open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) sendfile(r1, r3, &(0x7f0000d83ff8), 0x8000fffffffe) write$P9_ROPEN(r2, &(0x7f0000000040)={0x18}, 0x18) [ 332.327809] audit: type=1804 audit(1538430359.193:53): pid=14112 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor4" name="/root/syzkaller-testdir696441687/syzkaller.siB441/70/bus" dev="sda1" ino=16547 res=1 21:45:59 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x1100082) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1c, "7001e0f57c8cf6270b24e415e96042aae51d871554c11cd59cc8fb47081025bad6b39d778066f9d1ac8a570e3a42f70a7c0f30f66157a96aae15813f0dceb297", "a8a4cd01e527e6fd3de45387daf7b1ac786d0e8a75e89046550fa2d2d25b60361fe06f308fe6033a61edb75c8d51c055faf7f4fdb16e0cdaa4276939a3410334", "7b8ddcc0c891591c4116893616105829576914e70bfed06d00f97c97644ab8a7"}) 21:45:59 executing program 0: ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000600)) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000500)='/dev/zero\x00', 0x610000, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0xffffffffffffff81) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ppp\x00', 0x2000, 0x0) write$FUSE_DIRENT(r1, &(0x7f0000000940)=ANY=[@ANYBLOB="38000000f4ffddff050000000000000001000000000000000300002f017000000044ded8e8aea02979325421411f6a8c0f3fc3b05385856fee46d10a12b3d8848f2d124e33a3d85b767f678cad1aed2f68f3b4d71d255081e0e30f4ac4dcaa713cca5ab1264c52fd2fbfc285d52f25dbab2868940c302a90ab890df1765cf8b6753d7c7f75a04bc444eef335720735bf88230ba55da82b393ac8cb757e8f0252eccb00000000000000000000004ebe7ba4eb45d8e18d701e2a17353f6e2ce812cb0694e1c271cbd3ad5278e5817a53226e371983efab0b4fcd4756aa30559859c94644702b0a3af431fc031e8f46a2a77e4537b84eaed3189df3de82b41ddec85fb93fbdb35d4660a01b3c60d5e957c43de7f90b0a83a5978136d5e0e83ff3161d7ba4c95c59927c67d312abdc1aaac97d0e481362d2db13806d391fa8ce808be704516fbd9982b67e36c7b2"], 0x14c) ioctl$TIOCGSID(r1, 0x5429, &(0x7f0000000680)=0x0) rt_tgsigqueueinfo(r2, 0x0, 0x0, &(0x7f00000006c0)={0x11, 0x0, 0x4b2d}) r3 = socket$inet6(0xa, 0x2, 0x0) fcntl$setlease(r1, 0x400, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x601, 0x0) setsockopt$inet6_udp_int(r3, 0x11, 0x6f, &(0x7f0000000180)=0x1, 0x4) prctl$setfpexc(0xc, 0x40000) getsockopt$inet6_mreq(r3, 0x29, 0x1c, &(0x7f0000000440)={@mcast1}, &(0x7f0000000480)=0x14) connect$inet6(0xffffffffffffffff, &(0x7f00000001c0)={0xa, 0x2, 0xfffffffffffffffe, @ipv4={[], [], @local}}, 0x1c) ioctl$EVIOCSKEYCODE(r1, 0x40084504, &(0x7f0000000380)=[0xe3, 0x80000001]) r4 = syz_open_dev$sndtimer(&(0x7f0000000000)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r4, 0x40345410, &(0x7f0000000040)={{0x1}}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) write$UHID_SET_REPORT_REPLY(r1, &(0x7f0000000540)=ANY=[@ANYBLOB="0e0000000a00000000013600b5d32cd234d574293c82ae7924d7c219be49e6ee0d072a28ae193cb4c95484c6df6dbd306b3affe9b7ab1646e51b5da0f3ee5555022a58a24a5e427cf400000000000000000000000000"], 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$SNDRV_TIMER_IOCTL_SELECT(r4, 0x40345410, &(0x7f0000000080)={{0x0, 0x2}}) r6 = syz_open_procfs(r2, &(0x7f0000000200)="6e65742f6970365f666c6f776c6162656c006ec03114893458edc1c9d8dc4b0d8dae982640d0e60400d7ff596e1c92de0eaa311f0a4d43697c2bcd77f017365af160acf33bd66432ebe50c0e8bdaf7fc39feff34ef27a1397193227f4733c145e66536c6c275112520e72b3097843b5cdac480c3b1384ebf592505f88589fcd2d7000000") sendfile(r6, r6, &(0x7f00000002c0)=0x202, 0xd9) 21:45:59 executing program 3: syz_open_procfs(0x0, &(0x7f00000002c0)='oom_score_adj\x00') ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) request_key(&(0x7f0000000240)='pkcs7_test\x00', &(0x7f0000000280)={'syz', 0x0}, &(0x7f0000000300)='/\x00', 0xfffffffffffffffe) request_key(&(0x7f00000000c0)='user\x00', &(0x7f0000000100)={'syz'}, &(0x7f0000000200)='vmnet0&#selfbdev&vboxnet0truste-selfeth1#c(vmnet0c^\x00', 0x0) 21:45:59 executing program 1: socketpair$unix(0x1, 0x80000000003, 0x0, &(0x7f0000000940)={0x0, 0x0}) recvmmsg(r0, &(0x7f0000000700)=[{{&(0x7f0000000040)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f0000000340)}}], 0x1, 0x0, &(0x7f0000000780)={0x77359400}) close(r0) sendmmsg(r1, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}], 0x9f, 0x0) 21:45:59 executing program 4: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = creat(&(0x7f0000000680)='./bus\x00', 0x0) fcntl$setstatus(r1, 0x4, 0x6100) ftruncate(r1, 0x8200) r2 = open(&(0x7f00000000c0)='./bus\x00', 0x101002, 0x0) open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) write$P9_ROPEN(r2, &(0x7f0000000040)={0x18}, 0x18) 21:45:59 executing program 2: r0 = socket$kcm(0xa, 0x6, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0xd, 0x22, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000400)='syzkaller\x00', 0x40, 0xd4, &(0x7f00000008c0)=""/212, 0x0, 0x1000002, [], 0x0, 0x3}, 0x48) socket$kcm(0x29, 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000ec0)={&(0x7f0000000e80)='./file0\x00'}, 0x10) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0x28, &(0x7f0000000340)}, 0x2e0) r2 = perf_event_open(&(0x7f0000000380)={0x0, 0x70, 0x0, 0x100, 0x0, 0x6, 0x0, 0x100000000, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x6, 0x2, 0x4, 0x75, 0x0, 0xba7c, 0x0, 0x0, 0x0, 0x0, 0x6e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1f, 0x0, 0x2, 0x1000, 0x0, 0x0, 0xd, 0x7, @perf_bp={&(0x7f0000000280)}, 0x1, 0x7, 0x0, 0x6, 0x5, 0x2fd, 0x40}, 0x0, 0x0, 0xffffffffffffffff, 0xb) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cpuset.effective_mems\x00', 0x0, 0x0) r4 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) r5 = openat$cgroup_ro(r3, &(0x7f0000000680)='cpuacct.usage_all\x00', 0x2761, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000500)={0x0, r5, 0x0, 0x16, &(0x7f00000004c0)='cpuset.effective_mems\x00'}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000580)={0xffffffffffffffff, r4, 0x0, 0x1, &(0x7f0000000540)='\x00'}, 0x30) write$cgroup_pid(r3, &(0x7f0000000480)=r6, 0xfffffffffffffffe) ioctl$PERF_EVENT_IOC_QUERY_BPF(r2, 0xc008240a, &(0x7f0000000300)=ANY=[@ANYBLOB="07000000000000000000000000000000000000000000000000ff00000000000000000000"]) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r5, 0x660c, 0x2933) r7 = getpid() write$cgroup_pid(r5, &(0x7f0000000080)=r7, 0x12) write$cgroup_pid(r5, &(0x7f0000000000), 0x12) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0xf, 0x1}, 0x14) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x890c, &(0x7f0000000000)) 21:45:59 executing program 5: r0 = socket$inet6(0xa, 0x100000002, 0x0) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @dev, 0x6}, 0x1c) sendto$inet6(r0, &(0x7f0000000300), 0xfd90, 0x400806e, &(0x7f00000000c0)={0xa, 0x4e23, 0x0, @ipv4={[], [], @multicast2}}, 0x1c) close(r0) [ 332.702936] audit: type=1804 audit(1538430359.573:54): pid=14126 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor4" name="/root/syzkaller-testdir696441687/syzkaller.siB441/71/bus" dev="sda1" ino=16569 res=1 21:45:59 executing program 3: syz_open_procfs(0x0, &(0x7f00000002c0)='oom_score_adj\x00') ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) request_key(&(0x7f0000000240)='pkcs7_test\x00', &(0x7f0000000280)={'syz', 0x0}, &(0x7f0000000300)='/\x00', 0xfffffffffffffffe) request_key(&(0x7f00000000c0)='user\x00', &(0x7f0000000100)={'syz'}, &(0x7f0000000200)='vmnet0&#selfbdev&vboxnet0trusteXselfeth1#c(vmnet0c^\x00', 0x0) 21:45:59 executing program 4: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = creat(&(0x7f0000000680)='./bus\x00', 0x0) fcntl$setstatus(r1, 0x4, 0x6100) ftruncate(r1, 0x8200) r2 = open(&(0x7f00000000c0)='./bus\x00', 0x101002, 0x0) open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) write$P9_ROPEN(r2, &(0x7f0000000040)={0x18}, 0x18) 21:45:59 executing program 2: r0 = socket$kcm(0xa, 0x6, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0xd, 0x22, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000400)='syzkaller\x00', 0x40, 0xd4, &(0x7f00000008c0)=""/212, 0x0, 0x1000002, [], 0x0, 0x3}, 0x48) socket$kcm(0x29, 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000ec0)={&(0x7f0000000e80)='./file0\x00'}, 0x10) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0x28, &(0x7f0000000340)}, 0x2e0) r2 = perf_event_open(&(0x7f0000000380)={0x0, 0x70, 0x0, 0x100, 0x0, 0x6, 0x0, 0x100000000, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x6, 0x2, 0x4, 0x75, 0x0, 0xba7c, 0x0, 0x0, 0x0, 0x0, 0x6e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1f, 0x0, 0x2, 0x1000, 0x0, 0x0, 0xd, 0x7, @perf_bp={&(0x7f0000000280)}, 0x1, 0x7, 0x0, 0x6, 0x5, 0x2fd, 0x40}, 0x0, 0x0, 0xffffffffffffffff, 0xb) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cpuset.effective_mems\x00', 0x0, 0x0) r4 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) r5 = openat$cgroup_ro(r3, &(0x7f0000000680)='cpuacct.usage_all\x00', 0x2761, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000500)={0x0, r5, 0x0, 0x16, &(0x7f00000004c0)='cpuset.effective_mems\x00'}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000580)={0xffffffffffffffff, r4, 0x0, 0x1, &(0x7f0000000540)='\x00'}, 0x30) write$cgroup_pid(r3, &(0x7f0000000480)=r6, 0xfffffffffffffffe) ioctl$PERF_EVENT_IOC_QUERY_BPF(r2, 0xc008240a, &(0x7f0000000300)=ANY=[@ANYBLOB="07000000000000000000000000000000000000000000000000ff00000000000000000000"]) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r5, 0x660c, 0x2933) r7 = getpid() write$cgroup_pid(r5, &(0x7f0000000080)=r7, 0x12) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0xf, 0x1}, 0x14) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x890c, &(0x7f0000000000)) 21:45:59 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) sendmsg(r0, &(0x7f0000001440)={&(0x7f0000000140)=@in6={0xa, 0x4e21}, 0x80}, 0x0) 21:45:59 executing program 0: sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000040), 0xc, &(0x7f0000000180)={&(0x7f0000000080)=ANY=[@ANYBLOB="5400000030000000000000000000000000000000400001003c00000000000c000100736b6202000000000000000008000400000000001800020000000000000000000000000006"], 0x1}}, 0x0) r0 = socket$packet(0x11, 0x802, 0x300) setsockopt$packet_int(r0, 0x107, 0x20000000001, &(0x7f00000000c0)=0x3, 0x3a) close(r0) [ 332.887626] audit: type=1804 audit(1538430359.753:55): pid=14144 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor4" name="/root/syzkaller-testdir696441687/syzkaller.siB441/72/bus" dev="sda1" ino=16551 res=1 21:45:59 executing program 1: 21:45:59 executing program 5: 21:45:59 executing program 2: r0 = socket$kcm(0xa, 0x6, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0xd, 0x22, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000400)='syzkaller\x00', 0x40, 0xd4, &(0x7f00000008c0)=""/212, 0x0, 0x1000002, [], 0x0, 0x3}, 0x48) socket$kcm(0x29, 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000ec0)={&(0x7f0000000e80)='./file0\x00'}, 0x10) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0x28, &(0x7f0000000340)}, 0x2e0) r2 = perf_event_open(&(0x7f0000000380)={0x0, 0x70, 0x0, 0x100, 0x0, 0x6, 0x0, 0x100000000, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x6, 0x2, 0x4, 0x75, 0x0, 0xba7c, 0x0, 0x0, 0x0, 0x0, 0x6e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1f, 0x0, 0x2, 0x1000, 0x0, 0x0, 0xd, 0x7, @perf_bp={&(0x7f0000000280)}, 0x1, 0x7, 0x0, 0x6, 0x5, 0x2fd, 0x40}, 0x0, 0x0, 0xffffffffffffffff, 0xb) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cpuset.effective_mems\x00', 0x0, 0x0) r4 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) r5 = openat$cgroup_ro(r3, &(0x7f0000000680)='cpuacct.usage_all\x00', 0x2761, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000500)={0x0, r5, 0x0, 0x16, &(0x7f00000004c0)='cpuset.effective_mems\x00'}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000580)={0xffffffffffffffff, r4, 0x0, 0x1, &(0x7f0000000540)='\x00'}, 0x30) write$cgroup_pid(r3, &(0x7f0000000480)=r6, 0xfffffffffffffffe) ioctl$PERF_EVENT_IOC_QUERY_BPF(r2, 0xc008240a, &(0x7f0000000300)=ANY=[@ANYBLOB="07000000000000000000000000000000000000000000000000ff00000000000000000000"]) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r5, 0x660c, 0x2933) getpid() bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0xf, 0x1}, 0x14) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x890c, &(0x7f0000000000)) 21:45:59 executing program 4: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = creat(&(0x7f0000000680)='./bus\x00', 0x0) fcntl$setstatus(r1, 0x4, 0x6100) ftruncate(r1, 0x8200) r2 = open(&(0x7f00000000c0)='./bus\x00', 0x101002, 0x0) open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) write$P9_ROPEN(r2, &(0x7f0000000040)={0x18}, 0x18) 21:45:59 executing program 3: syz_open_procfs(0x0, &(0x7f00000002c0)='oom_score_adj\x00') ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) request_key(&(0x7f0000000240)='pkcs7_test\x00', &(0x7f0000000280)={'syz', 0x0}, &(0x7f0000000300)='/\x00', 0xfffffffffffffffe) request_key(&(0x7f00000000c0)='user\x00', &(0x7f0000000100)={'syz'}, &(0x7f0000000200)='vmnet0&#selfbdev&vboxnet0trustexselfeth1#c(vmnet0c^\x00', 0x0) 21:45:59 executing program 1: 21:46:00 executing program 5: 21:46:00 executing program 0: [ 333.073460] audit: type=1804 audit(1538430359.943:56): pid=14166 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor4" name="/root/syzkaller-testdir696441687/syzkaller.siB441/73/bus" dev="sda1" ino=16554 res=1 21:46:00 executing program 4: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = creat(&(0x7f0000000680)='./bus\x00', 0x0) fcntl$setstatus(r1, 0x4, 0x6100) ftruncate(r1, 0x8200) r2 = open(&(0x7f00000000c0)='./bus\x00', 0x101002, 0x0) sendfile(r1, 0xffffffffffffffff, &(0x7f0000d83ff8), 0x8000fffffffe) write$P9_ROPEN(r2, &(0x7f0000000040)={0x18}, 0x18) 21:46:00 executing program 1: 21:46:00 executing program 5: 21:46:00 executing program 0: 21:46:00 executing program 3: syz_open_procfs(0x0, &(0x7f00000002c0)='oom_score_adj\x00') ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) request_key(&(0x7f0000000240)='pkcs7_test\x00', &(0x7f0000000280)={'syz', 0x0}, &(0x7f0000000300)='/\x00', 0xfffffffffffffffe) request_key(&(0x7f00000000c0)='user\x00', &(0x7f0000000100)={'syz'}, &(0x7f0000000200)='vmnet0&#selfbdev&vboxnet0truste.selfeth1#c(vmnet0c^\x00', 0x0) 21:46:00 executing program 2: r0 = socket$kcm(0xa, 0x6, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0xd, 0x22, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000400)='syzkaller\x00', 0x40, 0xd4, &(0x7f00000008c0)=""/212, 0x0, 0x1000002, [], 0x0, 0x3}, 0x48) socket$kcm(0x29, 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000ec0)={&(0x7f0000000e80)='./file0\x00'}, 0x10) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0x28, &(0x7f0000000340)}, 0x2e0) r2 = perf_event_open(&(0x7f0000000380)={0x0, 0x70, 0x0, 0x100, 0x0, 0x6, 0x0, 0x100000000, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x6, 0x2, 0x4, 0x75, 0x0, 0xba7c, 0x0, 0x0, 0x0, 0x0, 0x6e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1f, 0x0, 0x2, 0x1000, 0x0, 0x0, 0xd, 0x7, @perf_bp={&(0x7f0000000280)}, 0x1, 0x7, 0x0, 0x6, 0x5, 0x2fd, 0x40}, 0x0, 0x0, 0xffffffffffffffff, 0xb) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cpuset.effective_mems\x00', 0x0, 0x0) r4 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) r5 = openat$cgroup_ro(r3, &(0x7f0000000680)='cpuacct.usage_all\x00', 0x2761, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000500)={0x0, r5, 0x0, 0x16, &(0x7f00000004c0)='cpuset.effective_mems\x00'}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000580)={0xffffffffffffffff, r4, 0x0, 0x1, &(0x7f0000000540)='\x00'}, 0x30) write$cgroup_pid(r3, &(0x7f0000000480)=r6, 0xfffffffffffffffe) ioctl$PERF_EVENT_IOC_QUERY_BPF(r2, 0xc008240a, &(0x7f0000000300)=ANY=[@ANYBLOB="07000000000000000000000000000000000000000000000000ff00000000000000000000"]) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r5, 0x660c, 0x2933) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0xf, 0x1}, 0x14) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x890c, &(0x7f0000000000)) 21:46:00 executing program 4: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = creat(&(0x7f0000000680)='./bus\x00', 0x0) fcntl$setstatus(r1, 0x4, 0x6100) ftruncate(r1, 0x8200) r2 = open(&(0x7f00000000c0)='./bus\x00', 0x101002, 0x0) sendfile(r1, 0xffffffffffffffff, &(0x7f0000d83ff8), 0x8000fffffffe) write$P9_ROPEN(r2, &(0x7f0000000040)={0x18}, 0x18) 21:46:00 executing program 5: 21:46:00 executing program 1: 21:46:00 executing program 0: 21:46:00 executing program 5: 21:46:00 executing program 3: syz_open_procfs(0x0, &(0x7f00000002c0)='oom_score_adj\x00') ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) request_key(&(0x7f0000000240)='pkcs7_test\x00', &(0x7f0000000280)={'syz', 0x0}, &(0x7f0000000300)='/\x00', 0xfffffffffffffffe) request_key(&(0x7f00000000c0)='user\x00', &(0x7f0000000100)={'syz'}, &(0x7f0000000200)='vmnet0&#selfbdev&vboxnet0trustecselfeth1#c(vmnet0c^\x00', 0x0) 21:46:00 executing program 2: r0 = socket$kcm(0xa, 0x6, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0xd, 0x22, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000400)='syzkaller\x00', 0x40, 0xd4, &(0x7f00000008c0)=""/212, 0x0, 0x1000002, [], 0x0, 0x3}, 0x48) socket$kcm(0x29, 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000ec0)={&(0x7f0000000e80)='./file0\x00'}, 0x10) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0x28, &(0x7f0000000340)}, 0x2e0) r2 = perf_event_open(&(0x7f0000000380)={0x0, 0x70, 0x0, 0x100, 0x0, 0x6, 0x0, 0x100000000, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x6, 0x2, 0x4, 0x75, 0x0, 0xba7c, 0x0, 0x0, 0x0, 0x0, 0x6e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1f, 0x0, 0x2, 0x1000, 0x0, 0x0, 0xd, 0x7, @perf_bp={&(0x7f0000000280)}, 0x1, 0x7, 0x0, 0x6, 0x5, 0x2fd, 0x40}, 0x0, 0x0, 0xffffffffffffffff, 0xb) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cpuset.effective_mems\x00', 0x0, 0x0) r4 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) r5 = openat$cgroup_ro(r3, &(0x7f0000000680)='cpuacct.usage_all\x00', 0x2761, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000500)={0x0, r5, 0x0, 0x16, &(0x7f00000004c0)='cpuset.effective_mems\x00'}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000580)={0xffffffffffffffff, r4, 0x0, 0x1, &(0x7f0000000540)='\x00'}, 0x30) write$cgroup_pid(r3, &(0x7f0000000480)=r6, 0xfffffffffffffffe) ioctl$PERF_EVENT_IOC_QUERY_BPF(r2, 0xc008240a, &(0x7f0000000300)=ANY=[@ANYBLOB="07000000000000000000000000000000000000000000000000ff00000000000000000000"]) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0xf, 0x1}, 0x14) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x890c, &(0x7f0000000000)) 21:46:00 executing program 4: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = creat(&(0x7f0000000680)='./bus\x00', 0x0) fcntl$setstatus(r1, 0x4, 0x6100) ftruncate(r1, 0x8200) r2 = open(&(0x7f00000000c0)='./bus\x00', 0x101002, 0x0) sendfile(r1, 0xffffffffffffffff, &(0x7f0000d83ff8), 0x8000fffffffe) write$P9_ROPEN(r2, &(0x7f0000000040)={0x18}, 0x18) 21:46:00 executing program 1: 21:46:00 executing program 5: 21:46:00 executing program 0: 21:46:00 executing program 1: 21:46:00 executing program 2: r0 = socket$kcm(0xa, 0x6, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0xd, 0x22, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000400)='syzkaller\x00', 0x40, 0xd4, &(0x7f00000008c0)=""/212, 0x0, 0x1000002, [], 0x0, 0x3}, 0x48) socket$kcm(0x29, 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000ec0)={&(0x7f0000000e80)='./file0\x00'}, 0x10) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0x28, &(0x7f0000000340)}, 0x2e0) r2 = perf_event_open(&(0x7f0000000380)={0x0, 0x70, 0x0, 0x100, 0x0, 0x6, 0x0, 0x100000000, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x6, 0x2, 0x4, 0x75, 0x0, 0xba7c, 0x0, 0x0, 0x0, 0x0, 0x6e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1f, 0x0, 0x2, 0x1000, 0x0, 0x0, 0xd, 0x7, @perf_bp={&(0x7f0000000280)}, 0x1, 0x7, 0x0, 0x6, 0x5, 0x2fd, 0x40}, 0x0, 0x0, 0xffffffffffffffff, 0xb) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cpuset.effective_mems\x00', 0x0, 0x0) r4 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) r5 = openat$cgroup_ro(r3, &(0x7f0000000680)='cpuacct.usage_all\x00', 0x2761, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000500)={0x0, r5, 0x0, 0x16, &(0x7f00000004c0)='cpuset.effective_mems\x00'}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000580)={0xffffffffffffffff, r4, 0x0, 0x1, &(0x7f0000000540)='\x00'}, 0x30) write$cgroup_pid(r3, &(0x7f0000000480)=r6, 0xfffffffffffffffe) ioctl$PERF_EVENT_IOC_QUERY_BPF(r2, 0xc008240a, &(0x7f0000000300)=ANY=[@ANYBLOB="07000000000000000000000000000000000000000000000000ff00000000000000000000"]) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0xf, 0x1}, 0x14) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x890c, &(0x7f0000000000)) 21:46:00 executing program 3: syz_open_procfs(0x0, &(0x7f00000002c0)='oom_score_adj\x00') ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) request_key(&(0x7f0000000240)='pkcs7_test\x00', &(0x7f0000000280)={'syz', 0x0}, &(0x7f0000000300)='/\x00', 0xfffffffffffffffe) request_key(&(0x7f00000000c0)='user\x00', &(0x7f0000000100)={'syz'}, &(0x7f0000000200)='vmnet0&#selfbdev&vboxnet0trustepselfeth1#c(vmnet0c^\x00', 0x0) 21:46:00 executing program 5: 21:46:00 executing program 4: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = creat(&(0x7f0000000680)='./bus\x00', 0x0) fcntl$setstatus(r1, 0x4, 0x6100) ftruncate(r1, 0x8200) r2 = open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) sendfile(r1, r2, &(0x7f0000d83ff8), 0x8000fffffffe) write$P9_ROPEN(0xffffffffffffffff, &(0x7f0000000040)={0x18}, 0x18) 21:46:00 executing program 0: 21:46:00 executing program 1: 21:46:00 executing program 5: 21:46:00 executing program 3: syz_open_procfs(0x0, &(0x7f00000002c0)='oom_score_adj\x00') ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) request_key(&(0x7f0000000240)='pkcs7_test\x00', &(0x7f0000000280)={'syz', 0x0}, &(0x7f0000000300)='/\x00', 0xfffffffffffffffe) request_key(&(0x7f00000000c0)='user\x00', &(0x7f0000000100)={'syz'}, &(0x7f0000000200)='vmnet0&#selfbdev&vboxnet0trustelselfeth1#c(vmnet0c^\x00', 0x0) 21:46:00 executing program 0: 21:46:00 executing program 2: r0 = socket$kcm(0xa, 0x6, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0xd, 0x22, &(0x7f0000000780)=ANY=[@ANYBLOB="000076ffff0000000000000000730f3800040000000000006124dc79917bae98003f00000000000000000000004b92f8ffffff00ff000000000000000073733800fdffffff00000000000000005d2f5048655300000000000000008653f1425e000c00000000000000000000003f5bfcff08000000124d415e4023f9a60ed6cbbd418640a8fb776b836311fad9b69052faf8f243f64b040de4c3bf5d8aeb0ac0ba2d587716bcee18411fd760458be38a5ca66e076cfe4201e1b0e2df9027f8ca43fe3ee54a7c90e5980ffe2469f7f34f5e76f22942612720954d38d5e3273dfe4558b76933919ed7b3b0feaa1485798e32e242cd339ed23d5cd366d9479034480473c806818e40634b5eef0000000000000000000000"], &(0x7f0000000400)='syzkaller\x00', 0x40, 0xd4, &(0x7f00000008c0)=""/212, 0x0, 0x1000002, [], 0x0, 0x3}, 0x48) socket$kcm(0x29, 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000ec0)={&(0x7f0000000e80)='./file0\x00'}, 0x10) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0x28, &(0x7f0000000340)}, 0x2e0) perf_event_open(&(0x7f0000000380)={0x0, 0x70, 0x0, 0x100, 0x0, 0x6, 0x0, 0x100000000, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x6, 0x2, 0x4, 0x75, 0x0, 0xba7c, 0x0, 0x0, 0x0, 0x0, 0x6e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1f, 0x0, 0x2, 0x1000, 0x0, 0x0, 0xd, 0x7, @perf_bp={&(0x7f0000000280)}, 0x1, 0x7, 0x0, 0x6, 0x5, 0x2fd, 0x40}, 0x0, 0x0, 0xffffffffffffffff, 0xb) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cpuset.effective_mems\x00', 0x0, 0x0) r3 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) r4 = openat$cgroup_ro(r2, &(0x7f0000000680)='cpuacct.usage_all\x00', 0x2761, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000500)={0x0, r4, 0x0, 0x16, &(0x7f00000004c0)='cpuset.effective_mems\x00'}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000580)={0xffffffffffffffff, r3, 0x0, 0x1, &(0x7f0000000540)='\x00'}, 0x30) write$cgroup_pid(r2, &(0x7f0000000480)=r5, 0xfffffffffffffffe) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0xf, 0x1}, 0x14) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x890c, &(0x7f0000000000)) 21:46:00 executing program 5: 21:46:00 executing program 4: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = creat(&(0x7f0000000680)='./bus\x00', 0x0) fcntl$setstatus(r1, 0x4, 0x6100) r2 = open(&(0x7f00000000c0)='./bus\x00', 0x101002, 0x0) r3 = open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) sendfile(r1, r3, &(0x7f0000d83ff8), 0x8000fffffffe) write$P9_ROPEN(r2, &(0x7f0000000040)={0x18}, 0x18) 21:46:00 executing program 1: 21:46:00 executing program 5: 21:46:00 executing program 0: 21:46:00 executing program 1: 21:46:00 executing program 4: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = creat(&(0x7f0000000680)='./bus\x00', 0x0) fcntl$setstatus(r1, 0x4, 0x6100) r2 = open(&(0x7f00000000c0)='./bus\x00', 0x101002, 0x0) r3 = open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) sendfile(r1, r3, &(0x7f0000d83ff8), 0x8000fffffffe) write$P9_ROPEN(r2, &(0x7f0000000040)={0x18}, 0x18) 21:46:00 executing program 5: 21:46:00 executing program 3: syz_open_procfs(0x0, &(0x7f00000002c0)='oom_score_adj\x00') ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) request_key(&(0x7f0000000240)='pkcs7_test\x00', &(0x7f0000000280)={'syz', 0x0}, &(0x7f0000000300)='/\x00', 0xfffffffffffffffe) request_key(&(0x7f00000000c0)='user\x00', &(0x7f0000000100)={'syz'}, &(0x7f0000000200)='vmnet0&#selfbdev&vboxnet0truste0selfeth1#c(vmnet0c^\x00', 0x0) 21:46:01 executing program 2: r0 = socket$kcm(0xa, 0x6, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0xd, 0x22, &(0x7f0000000780)=ANY=[@ANYBLOB="000076ffff0000000000000000730f3800040000000000006124dc79917bae98003f00000000000000000000004b92f8ffffff00ff000000000000000073733800fdffffff00000000000000005d2f5048655300000000000000008653f1425e000c00000000000000000000003f5bfcff08000000124d415e4023f9a60ed6cbbd418640a8fb776b836311fad9b69052faf8f243f64b040de4c3bf5d8aeb0ac0ba2d587716bcee18411fd760458be38a5ca66e076cfe4201e1b0e2df9027f8ca43fe3ee54a7c90e5980ffe2469f7f34f5e76f22942612720954d38d5e3273dfe4558b76933919ed7b3b0feaa1485798e32e242cd339ed23d5cd366d9479034480473c806818e40634b5eef0000000000000000000000"], &(0x7f0000000400)='syzkaller\x00', 0x40, 0xd4, &(0x7f00000008c0)=""/212, 0x0, 0x1000002, [], 0x0, 0x3}, 0x48) socket$kcm(0x29, 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000ec0)={&(0x7f0000000e80)='./file0\x00'}, 0x10) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0x28, &(0x7f0000000340)}, 0x2e0) perf_event_open(&(0x7f0000000380)={0x0, 0x70, 0x0, 0x100, 0x0, 0x6, 0x0, 0x100000000, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x6, 0x2, 0x4, 0x75, 0x0, 0xba7c, 0x0, 0x0, 0x0, 0x0, 0x6e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1f, 0x0, 0x2, 0x1000, 0x0, 0x0, 0xd, 0x7, @perf_bp={&(0x7f0000000280)}, 0x1, 0x7, 0x0, 0x6, 0x5, 0x2fd, 0x40}, 0x0, 0x0, 0xffffffffffffffff, 0xb) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cpuset.effective_mems\x00', 0x0, 0x0) r3 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) r4 = openat$cgroup_ro(r2, &(0x7f0000000680)='cpuacct.usage_all\x00', 0x2761, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000500)={0x0, r4, 0x0, 0x16, &(0x7f00000004c0)='cpuset.effective_mems\x00'}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000580)={0xffffffffffffffff, r3, 0x0, 0x1, &(0x7f0000000540)='\x00'}, 0x30) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0xf, 0x1}, 0x14) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x890c, &(0x7f0000000000)) 21:46:01 executing program 1: 21:46:01 executing program 5: 21:46:01 executing program 4: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = creat(&(0x7f0000000680)='./bus\x00', 0x0) fcntl$setstatus(r1, 0x4, 0x6100) r2 = open(&(0x7f00000000c0)='./bus\x00', 0x101002, 0x0) r3 = open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) sendfile(r1, r3, &(0x7f0000d83ff8), 0x8000fffffffe) write$P9_ROPEN(r2, &(0x7f0000000040)={0x18}, 0x18) 21:46:01 executing program 0: 21:46:01 executing program 3: syz_open_procfs(0x0, &(0x7f00000002c0)='oom_score_adj\x00') ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) request_key(&(0x7f0000000240)='pkcs7_test\x00', &(0x7f0000000280)={'syz', 0x0}, &(0x7f0000000300)='/\x00', 0xfffffffffffffffe) request_key(&(0x7f00000000c0)='user\x00', &(0x7f0000000100)={'syz'}, &(0x7f0000000200)='vmnet0&#selfbdev&vboxnet0truste#selfeth1#c(vmnet0c^\x00', 0x0) 21:46:01 executing program 2: r0 = socket$kcm(0xa, 0x6, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0xd, 0x22, &(0x7f0000000780)=ANY=[@ANYBLOB="000076ffff0000000000000000730f3800040000000000006124dc79917bae98003f00000000000000000000004b92f8ffffff00ff000000000000000073733800fdffffff00000000000000005d2f5048655300000000000000008653f1425e000c00000000000000000000003f5bfcff08000000124d415e4023f9a60ed6cbbd418640a8fb776b836311fad9b69052faf8f243f64b040de4c3bf5d8aeb0ac0ba2d587716bcee18411fd760458be38a5ca66e076cfe4201e1b0e2df9027f8ca43fe3ee54a7c90e5980ffe2469f7f34f5e76f22942612720954d38d5e3273dfe4558b76933919ed7b3b0feaa1485798e32e242cd339ed23d5cd366d9479034480473c806818e40634b5eef0000000000000000000000"], &(0x7f0000000400)='syzkaller\x00', 0x40, 0xd4, &(0x7f00000008c0)=""/212, 0x0, 0x1000002, [], 0x0, 0x3}, 0x48) socket$kcm(0x29, 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000ec0)={&(0x7f0000000e80)='./file0\x00'}, 0x10) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0x28, &(0x7f0000000340)}, 0x2e0) perf_event_open(&(0x7f0000000380)={0x0, 0x70, 0x0, 0x100, 0x0, 0x6, 0x0, 0x100000000, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x6, 0x2, 0x4, 0x75, 0x0, 0xba7c, 0x0, 0x0, 0x0, 0x0, 0x6e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1f, 0x0, 0x2, 0x1000, 0x0, 0x0, 0xd, 0x7, @perf_bp={&(0x7f0000000280)}, 0x1, 0x7, 0x0, 0x6, 0x5, 0x2fd, 0x40}, 0x0, 0x0, 0xffffffffffffffff, 0xb) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cpuset.effective_mems\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) r3 = openat$cgroup_ro(r2, &(0x7f0000000680)='cpuacct.usage_all\x00', 0x2761, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000500)={0x0, r3, 0x0, 0x16, &(0x7f00000004c0)='cpuset.effective_mems\x00'}, 0x30) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0xf, 0x1}, 0x14) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x890c, &(0x7f0000000000)) 21:46:01 executing program 5: 21:46:01 executing program 1: 21:46:01 executing program 5: 21:46:01 executing program 4: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r1, 0x8200) r2 = open(&(0x7f00000000c0)='./bus\x00', 0x101002, 0x0) r3 = open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) sendfile(r1, r3, &(0x7f0000d83ff8), 0x8000fffffffe) write$P9_ROPEN(r2, &(0x7f0000000040)={0x18}, 0x18) 21:46:01 executing program 0: 21:46:01 executing program 3: syz_open_procfs(0x0, &(0x7f00000002c0)='oom_score_adj\x00') ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) request_key(&(0x7f0000000240)='pkcs7_test\x00', &(0x7f0000000280)={'syz', 0x0}, &(0x7f0000000300)='/\x00', 0xfffffffffffffffe) request_key(&(0x7f00000000c0)='user\x00', &(0x7f0000000100)={'syz'}, &(0x7f0000000200)='vmnet0&#selfbdev&vboxnet0trustesselfeth1#c(vmnet0c^\x00', 0x0) 21:46:01 executing program 1: 21:46:01 executing program 2: r0 = socket$kcm(0xa, 0x6, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0xd, 0x22, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000400)='syzkaller\x00', 0x40, 0xd4, &(0x7f00000008c0)=""/212, 0x0, 0x1000002, [], 0x0, 0x3}, 0x48) socket$kcm(0x29, 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000ec0)={&(0x7f0000000e80)='./file0\x00'}, 0x10) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0x28, &(0x7f0000000340)}, 0x2e0) perf_event_open(&(0x7f0000000380)={0x0, 0x70, 0x0, 0x100, 0x0, 0x6, 0x0, 0x100000000, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x6, 0x2, 0x4, 0x75, 0x0, 0xba7c, 0x0, 0x0, 0x0, 0x0, 0x6e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1f, 0x0, 0x2, 0x1000, 0x0, 0x0, 0xd, 0x7, @perf_bp={&(0x7f0000000280)}, 0x1, 0x7, 0x0, 0x6, 0x5, 0x2fd, 0x40}, 0x0, 0x0, 0xffffffffffffffff, 0xb) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cpuset.effective_mems\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) openat$cgroup_ro(r2, &(0x7f0000000680)='cpuacct.usage_all\x00', 0x2761, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0xf, 0x1}, 0x14) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x890c, &(0x7f0000000000)) 21:46:01 executing program 5: 21:46:01 executing program 0: 21:46:01 executing program 3: syz_open_procfs(0x0, &(0x7f00000002c0)='oom_score_adj\x00') ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) request_key(&(0x7f0000000240)='pkcs7_test\x00', &(0x7f0000000280)={'syz', 0x0}, &(0x7f0000000300)='/\x00', 0xfffffffffffffffe) request_key(&(0x7f00000000c0)='user\x00', &(0x7f0000000100)={'syz'}, &(0x7f0000000200)='vmnet0&#selfbdev&vboxnet0trusteoselfeth1#c(vmnet0c^\x00', 0x0) 21:46:01 executing program 1: 21:46:01 executing program 4: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r1, 0x8200) r2 = open(&(0x7f00000000c0)='./bus\x00', 0x101002, 0x0) r3 = open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) sendfile(r1, r3, &(0x7f0000d83ff8), 0x8000fffffffe) write$P9_ROPEN(r2, &(0x7f0000000040)={0x18}, 0x18) 21:46:01 executing program 0: 21:46:01 executing program 2: r0 = socket$kcm(0xa, 0x6, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0xd, 0x22, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000400)='syzkaller\x00', 0x40, 0xd4, &(0x7f00000008c0)=""/212, 0x0, 0x1000002, [], 0x0, 0x3}, 0x48) socket$kcm(0x29, 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000ec0)={&(0x7f0000000e80)='./file0\x00'}, 0x10) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0x28, &(0x7f0000000340)}, 0x2e0) perf_event_open(&(0x7f0000000380)={0x0, 0x70, 0x0, 0x100, 0x0, 0x6, 0x0, 0x100000000, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x6, 0x2, 0x4, 0x75, 0x0, 0xba7c, 0x0, 0x0, 0x0, 0x0, 0x6e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1f, 0x0, 0x2, 0x1000, 0x0, 0x0, 0xd, 0x7, @perf_bp={&(0x7f0000000280)}, 0x1, 0x7, 0x0, 0x6, 0x5, 0x2fd, 0x40}, 0x0, 0x0, 0xffffffffffffffff, 0xb) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cpuset.effective_mems\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0xf, 0x1}, 0x14) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x890c, &(0x7f0000000000)) 21:46:01 executing program 5: 21:46:01 executing program 1: 21:46:01 executing program 3: syz_open_procfs(0x0, &(0x7f00000002c0)='oom_score_adj\x00') ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) request_key(&(0x7f0000000240)='pkcs7_test\x00', &(0x7f0000000280)={'syz', 0x0}, &(0x7f0000000300)='/\x00', 0xfffffffffffffffe) request_key(&(0x7f00000000c0)='user\x00', &(0x7f0000000100)={'syz'}, &(0x7f0000000200)='vmnet0&#selfbdev&vboxnet0truste+selfeth1#c(vmnet0c^\x00', 0x0) 21:46:01 executing program 0: 21:46:01 executing program 5: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, &(0x7f0000000400), 0x8) setrlimit(0x400000000000007, &(0x7f0000000140)) bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x5, 0x400000028, 0x7fff, 0x3f}, 0xe) 21:46:01 executing program 4: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r1, 0x8200) r2 = open(&(0x7f00000000c0)='./bus\x00', 0x101002, 0x0) r3 = open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) sendfile(r1, r3, &(0x7f0000d83ff8), 0x8000fffffffe) write$P9_ROPEN(r2, &(0x7f0000000040)={0x18}, 0x18) 21:46:01 executing program 1: r0 = open$dir(&(0x7f0000000040)='.\x00', 0x0, 0x0) symlinkat(&(0x7f0000000280)='./file1/file0\x00', r0, &(0x7f0000000180)='./file0\x00') mkdirat(r0, &(0x7f00000000c0)='./file1\x00', 0x0) renameat2(r0, &(0x7f0000000000)='./file0\x00', r0, &(0x7f0000000200)='./file1/file0\x00', 0x0) 21:46:01 executing program 2: r0 = socket$kcm(0xa, 0x6, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0xd, 0x22, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000400)='syzkaller\x00', 0x40, 0xd4, &(0x7f00000008c0)=""/212, 0x0, 0x1000002, [], 0x0, 0x3}, 0x48) socket$kcm(0x29, 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000ec0)={&(0x7f0000000e80)='./file0\x00'}, 0x10) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0x28, &(0x7f0000000340)}, 0x2e0) perf_event_open(&(0x7f0000000380)={0x0, 0x70, 0x0, 0x100, 0x0, 0x6, 0x0, 0x100000000, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x6, 0x2, 0x4, 0x75, 0x0, 0xba7c, 0x0, 0x0, 0x0, 0x0, 0x6e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1f, 0x0, 0x2, 0x1000, 0x0, 0x0, 0xd, 0x7, @perf_bp={&(0x7f0000000280)}, 0x1, 0x7, 0x0, 0x6, 0x5, 0x2fd, 0x40}, 0x0, 0x0, 0xffffffffffffffff, 0xb) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cpuset.effective_mems\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0xf, 0x1}, 0x14) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x890c, &(0x7f0000000000)) 21:46:01 executing program 3: syz_open_procfs(0x0, &(0x7f00000002c0)='oom_score_adj\x00') ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) request_key(&(0x7f0000000240)='pkcs7_test\x00', &(0x7f0000000280)={'syz', 0x0}, &(0x7f0000000300)='/\x00', 0xfffffffffffffffe) request_key(&(0x7f00000000c0)='user\x00', &(0x7f0000000100)={'syz'}, &(0x7f0000000200)='vmnet0&#selfbdev&vboxnet0trusteiselfeth1#c(vmnet0c^\x00', 0x0) 21:46:01 executing program 0: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000440)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_END_FF_UPLOAD(r0, 0x406855c9, &(0x7f0000000480)={0x48, 0x0, {0x0, 0x0, 0x0, {}, {}, @ramp}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 21:46:01 executing program 4: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x6100) ftruncate(0xffffffffffffffff, 0x8200) r1 = open(&(0x7f00000000c0)='./bus\x00', 0x101002, 0x0) r2 = open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) sendfile(0xffffffffffffffff, r2, &(0x7f0000d83ff8), 0x8000fffffffe) write$P9_ROPEN(r1, &(0x7f0000000040)={0x18}, 0x18) 21:46:01 executing program 2: r0 = socket$kcm(0xa, 0x6, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0xd, 0x22, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000400)='syzkaller\x00', 0x40, 0xd4, &(0x7f00000008c0)=""/212, 0x0, 0x1000002, [], 0x0, 0x3}, 0x48) socket$kcm(0x29, 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000ec0)={&(0x7f0000000e80)='./file0\x00'}, 0x10) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0x28, &(0x7f0000000340)}, 0x2e0) perf_event_open(&(0x7f0000000380)={0x0, 0x70, 0x0, 0x100, 0x0, 0x6, 0x0, 0x100000000, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x6, 0x2, 0x4, 0x75, 0x0, 0xba7c, 0x0, 0x0, 0x0, 0x0, 0x6e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1f, 0x0, 0x2, 0x1000, 0x0, 0x0, 0xd, 0x7, @perf_bp={&(0x7f0000000280)}, 0x1, 0x7, 0x0, 0x6, 0x5, 0x2fd, 0x40}, 0x0, 0x0, 0xffffffffffffffff, 0xb) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cpuset.effective_mems\x00', 0x0, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0xf, 0x1}, 0x14) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x890c, &(0x7f0000000000)) 21:46:01 executing program 0: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGMASK(0xffffffffffffffff, 0x80104592, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)}) close(r0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x10, 0xffffffffffffffff, 0x0) 21:46:01 executing program 5: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000040)={0x0, {0x0, 0x3f}}) 21:46:02 executing program 1: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x201, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x4001, 0x0) setsockopt$inet6_MRT6_ADD_MIF(r1, 0x29, 0xca, &(0x7f0000000240)={0x7, 0x1, 0x4, 0x8, 0x6}, 0xc) socketpair$unix(0x1, 0x7, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = memfd_create(&(0x7f0000000140)="2b8b8a16114fdddf6b284699df92d53e6f4a02759b9461ac", 0x3) write$P9_RFLUSH(r3, &(0x7f0000000200)={0x7, 0x6d, 0x1}, 0xa1) write$binfmt_misc(r3, &(0x7f0000000c40)=ANY=[@ANYRES32], 0xff67) sendfile(r2, r3, &(0x7f0000000000), 0xffff) ioctl$PIO_FONTRESET(r3, 0x4b6d, 0x0) ioctl$TIOCGPGRP(r3, 0x540f, &(0x7f0000000040)=0x0) fcntl$lock(r0, 0x7, &(0x7f00000000c0)={0x1, 0x2, 0x0, 0x2, r4}) clone(0x2102001ffd, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) tee(r0, r2, 0x2, 0x8) inotify_init() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1140, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfdfffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = socket$inet_udp(0x2, 0x2, 0x0) close(r5) socket(0x840100000003, 0x803, 0x40000000000101) connect$inet(r5, &(0x7f0000000100), 0x10) syz_open_procfs(0x0, &(0x7f0000000200)="2f6578650000c10000000000e9ff0700000000000054fa07424adee916d2da75afe70b35a0fd6a1f0200f5ab26d7a071fb35331ce39c5a6568641006d7c0206a74e33326530000000000000000000000") getpid() clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) syz_open_dev$binder(&(0x7f0000d59ff3)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r6 = syz_open_dev$binder(&(0x7f0000000100)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) mmap(&(0x7f0000001000/0x3000)=nil, 0x3000, 0x0, 0x20011, r6, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r6, 0x40046207, 0x0) 21:46:02 executing program 3: syz_open_procfs(0x0, &(0x7f00000002c0)='oom_score_adj\x00') ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) request_key(&(0x7f0000000240)='pkcs7_test\x00', &(0x7f0000000280)={'syz', 0x0}, &(0x7f0000000300)='/\x00', 0xfffffffffffffffe) request_key(&(0x7f00000000c0)='user\x00', &(0x7f0000000100)={'syz'}, &(0x7f0000000200)='vmnet0&#selfbdev&vboxnet0trusteuselfeth1#c(vmnet0c^\x00', 0x0) 21:46:02 executing program 4: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000180)) r0 = creat(&(0x7f0000000680)='./bus\x00', 0x0) fcntl$setstatus(r0, 0x4, 0x6100) ftruncate(r0, 0x8200) r1 = open(&(0x7f00000000c0)='./bus\x00', 0x101002, 0x0) r2 = open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) sendfile(r0, r2, &(0x7f0000d83ff8), 0x8000fffffffe) write$P9_ROPEN(r1, &(0x7f0000000040)={0x18}, 0x18) 21:46:02 executing program 3: syz_open_procfs(0x0, &(0x7f00000002c0)='oom_score_adj\x00') ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) request_key(&(0x7f0000000240)='pkcs7_test\x00', &(0x7f0000000280)={'syz', 0x0}, &(0x7f0000000300)='/\x00', 0xfffffffffffffffe) request_key(&(0x7f00000000c0)='user\x00', &(0x7f0000000100)={'syz'}, &(0x7f0000000200)='vmnet0&#selfbdev&vboxnet0truste%selfeth1#c(vmnet0c^\x00', 0x0) 21:46:02 executing program 2: r0 = socket$kcm(0xa, 0x6, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0xd, 0x22, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000400)='syzkaller\x00', 0x40, 0xd4, &(0x7f00000008c0)=""/212, 0x0, 0x1000002, [], 0x0, 0x3}, 0x48) socket$kcm(0x29, 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000ec0)={&(0x7f0000000e80)='./file0\x00'}, 0x10) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0x28, &(0x7f0000000340)}, 0x2e0) perf_event_open(&(0x7f0000000380)={0x0, 0x70, 0x0, 0x100, 0x0, 0x6, 0x0, 0x100000000, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x6, 0x2, 0x4, 0x75, 0x0, 0xba7c, 0x0, 0x0, 0x0, 0x0, 0x6e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1f, 0x0, 0x2, 0x1000, 0x0, 0x0, 0xd, 0x7, @perf_bp={&(0x7f0000000280)}, 0x1, 0x7, 0x0, 0x6, 0x5, 0x2fd, 0x40}, 0x0, 0x0, 0xffffffffffffffff, 0xb) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0xf, 0x1}, 0x14) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x890c, &(0x7f0000000000)) 21:46:02 executing program 5: 21:46:02 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x3d) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x22, &(0x7f0000039d18)=@raw={"0500000002000200000002000000000018000000030300000000ffffffa400", 0x9, 0x3, 0xfffffffa, 0x0, 0xffffffff, 0xffffffff, 0xd0, 0xffffffff, 0x1b8, 0xffffffff, 0xffffffff, 0x1b8, 0xffffffff, 0x3, &(0x7f0000025000), {[{{@uncond, 0x0, 0xa8, 0x52}, @common=@unspec=@NFQUEUE2={0x28, 'NFQUEUE\x00'}}, {{@uncond, 0x0, 0xa8, 0x110}, @common=@inet=@LOG={0x0, 'LOG\x00', 0x0, {0x0, 0x0, "50345fc21378bc8f6da6263e3715f555f23e413a61787ecaea02755a391d"}}}], {{[], 0x0, 0x252, 0xd0}, {0x29f}}}}, 0x2c) 21:46:02 executing program 4: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000180)) r0 = creat(&(0x7f0000000680)='./bus\x00', 0x0) fcntl$setstatus(r0, 0x4, 0x6100) ftruncate(r0, 0x8200) r1 = open(&(0x7f00000000c0)='./bus\x00', 0x101002, 0x0) r2 = open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) sendfile(r0, r2, &(0x7f0000d83ff8), 0x8000fffffffe) write$P9_ROPEN(r1, &(0x7f0000000040)={0x18}, 0x18) 21:46:02 executing program 0: clone(0x210007fa, 0x0, 0xfffffffffffffffe, &(0x7f00000000c0), 0xffffffffffffffff) r0 = socket(0x11, 0x200000000080002, 0x0) ioctl$sock_SIOCBRDELBR(r0, 0x89a1, &(0x7f0000000140)='team0\x00') r1 = openat$smack_task_current(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/attr/current\x00', 0x2, 0x0) r2 = fcntl$getown(r1, 0x9) ptrace$peek(0x3, r2, &(0x7f0000000180)) write$smack_current(r1, &(0x7f0000000100)="0000020000f4ff1f00", 0x9) r3 = getpid() setsockopt$netlink_NETLINK_BROADCAST_ERROR(r0, 0x10e, 0x4, &(0x7f00000001c0)=0x1, 0x4) sched_setscheduler(r3, 0x5, &(0x7f0000000040)) ioctl$sock_inet_SIOCSARP(r0, 0x8955, &(0x7f0000000080)={{}, {0x0, @random="604d133d5e2e"}, 0xfffffffffffffffc, {0x2, 0x0, @loopback}, "0000020000f4ff1f00"}) 21:46:02 executing program 2: r0 = socket$kcm(0xa, 0x6, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0xd, 0x22, &(0x7f0000000780)=ANY=[@ANYBLOB="000076ffff0000000000000000730f3800040000000000006124dc79917bae98003f00000000000000000000004b92f8ffffff00ff000000000000000073733800fdffffff00000000000000005d2f5048655300000000000000008653f1425e000c00000000000000000000003f5bfcff08000000124d415e4023f9a60ed6cbbd418640a8fb776b836311fad9b69052faf8f243f64b040de4c3bf5d8aeb0ac0ba2d587716bcee18411fd760458be38a5ca66e076cfe4201e1b0e2df9027f8ca43fe3ee54a7c90e5980ffe2469f7f34f5e76f22942612720954d38d5e3273dfe4558b76933919ed7b3b0feaa1485798e32e242cd339ed23d5cd366d9479034480473c806818e40634b5eef0000000000000000000000"], &(0x7f0000000400)='syzkaller\x00', 0x40, 0xd4, &(0x7f00000008c0)=""/212, 0x0, 0x1000002, [], 0x0, 0x3}, 0x48) socket$kcm(0x29, 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000ec0)={&(0x7f0000000e80)='./file0\x00'}, 0x10) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0x28, &(0x7f0000000340)}, 0x2e0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0xf, 0x1}, 0x14) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x890c, &(0x7f0000000000)) 21:46:02 executing program 3: syz_open_procfs(0x0, &(0x7f00000002c0)='oom_score_adj\x00') ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) request_key(&(0x7f0000000240)='pkcs7_test\x00', &(0x7f0000000280)={'syz', 0x0}, &(0x7f0000000300)='/\x00', 0xfffffffffffffffe) request_key(&(0x7f00000000c0)='user\x00', &(0x7f0000000100)={'syz'}, &(0x7f0000000200)='vmnet0&#selfbdev&vboxnet0truste*selfeth1#c(vmnet0c^\x00', 0x0) 21:46:02 executing program 3: syz_open_procfs(0x0, &(0x7f00000002c0)='oom_score_adj\x00') ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) request_key(&(0x7f0000000240)='pkcs7_test\x00', &(0x7f0000000280)={'syz', 0x0}, &(0x7f0000000300)='/\x00', 0xfffffffffffffffe) request_key(&(0x7f00000000c0)='user\x00', &(0x7f0000000100)={'syz'}, &(0x7f0000000200)='vmnet0&#selfbdev&vboxnet0trusteds%lfeth1#c(vmnet0c^\x00', 0x0) 21:46:02 executing program 1: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x201, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x4001, 0x0) setsockopt$inet6_MRT6_ADD_MIF(r1, 0x29, 0xca, &(0x7f0000000240)={0x7, 0x1, 0x4, 0x8, 0x6}, 0xc) socketpair$unix(0x1, 0x7, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = memfd_create(&(0x7f0000000140)="2b8b8a16114fdddf6b284699df92d53e6f4a02759b9461ac", 0x3) write$P9_RFLUSH(r3, &(0x7f0000000200)={0x7, 0x6d, 0x1}, 0xa1) write$binfmt_misc(r3, &(0x7f0000000c40)=ANY=[@ANYRES32], 0xff67) sendfile(r2, r3, &(0x7f0000000000), 0xffff) ioctl$PIO_FONTRESET(r3, 0x4b6d, 0x0) ioctl$TIOCGPGRP(r3, 0x540f, &(0x7f0000000040)=0x0) fcntl$lock(r0, 0x7, &(0x7f00000000c0)={0x1, 0x2, 0x0, 0x2, r4}) clone(0x2102001ffd, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) tee(r0, r2, 0x2, 0x8) inotify_init() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1140, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfdfffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = socket$inet_udp(0x2, 0x2, 0x0) close(r5) socket(0x840100000003, 0x803, 0x40000000000101) connect$inet(r5, &(0x7f0000000100), 0x10) syz_open_procfs(0x0, &(0x7f0000000200)="2f6578650000c10000000000e9ff0700000000000054fa07424adee916d2da75afe70b35a0fd6a1f0200f5ab26d7a071fb35331ce39c5a6568641006d7c0206a74e33326530000000000000000000000") getpid() clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) syz_open_dev$binder(&(0x7f0000d59ff3)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r6 = syz_open_dev$binder(&(0x7f0000000100)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) mmap(&(0x7f0000001000/0x3000)=nil, 0x3000, 0x0, 0x20011, r6, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r6, 0x40046207, 0x0) 21:46:02 executing program 2: r0 = socket$kcm(0xa, 0x6, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0xd, 0x22, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000400)='syzkaller\x00', 0x40, 0xd4, &(0x7f00000008c0)=""/212, 0x0, 0x1000002, [], 0x0, 0x3}, 0x48) socket$kcm(0x29, 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000ec0)={&(0x7f0000000e80)='./file0\x00'}, 0x10) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0xf, 0x1}, 0x14) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x890c, &(0x7f0000000000)) 21:46:02 executing program 4: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000180)) r0 = creat(&(0x7f0000000680)='./bus\x00', 0x0) fcntl$setstatus(r0, 0x4, 0x6100) ftruncate(r0, 0x8200) r1 = open(&(0x7f00000000c0)='./bus\x00', 0x101002, 0x0) r2 = open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) sendfile(r0, r2, &(0x7f0000d83ff8), 0x8000fffffffe) write$P9_ROPEN(r1, &(0x7f0000000040)={0x18}, 0x18) 21:46:02 executing program 3: syz_open_procfs(0x0, &(0x7f00000002c0)='oom_score_adj\x00') ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) request_key(&(0x7f0000000240)='pkcs7_test\x00', &(0x7f0000000280)={'syz', 0x0}, &(0x7f0000000300)='/\x00', 0xfffffffffffffffe) request_key(&(0x7f00000000c0)='user\x00', &(0x7f0000000100)={'syz'}, &(0x7f0000000200)='vmnet0&#selfbdev&vboxnet0trustedself%th1#c(vmnet0c^\x00', 0x0) 21:46:02 executing program 0: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x0) mkdirat$cgroup(0xffffffffffffffff, &(0x7f00000000c0)='syz1\x00', 0x1ff) openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x0, 0x0) r0 = socket$inet6(0xa, 0x3, 0x10000000000007) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000140)=@fragment, 0x8) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @mcast2, 0x4}, 0x1c) sendmmsg(r0, &(0x7f0000000140), 0x7b, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000180)) openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) getpgid(0x0) 21:46:02 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12, 0x0, @thr={&(0x7f0000000040), &(0x7f0000000140)}}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, &(0x7f0000040000)) r2 = socket$inet(0x2, 0x1, 0x0) mmap(&(0x7f000092d000/0x400000)=nil, 0x400000, 0xfffffffffffffffc, 0x8972, 0xffffffffffffffff, 0x0) bind$inet(r2, &(0x7f0000134000)={0x2, 0x4e23, @broadcast}, 0x10) connect$inet(r2, &(0x7f00000e5000)={0x2, 0x4e23, @loopback}, 0x10) connect$inet(r2, &(0x7f00009322c4)={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10) connect$inet(r2, &(0x7f0000000080)={0x2, 0x4e23, @loopback}, 0x10) write$binfmt_aout(r2, &(0x7f0000000140), 0x20) dup2(r0, r2) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000100)='sit0\x00', 0x10) tkill(r1, 0x1000000000016) [ 335.695935] mmap: syz-executor0 (14446) uses deprecated remap_file_pages() syscall. See Documentation/vm/remap_file_pages.rst. 21:46:02 executing program 4: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = creat(&(0x7f0000000680)='./bus\x00', 0x0) fcntl$setstatus(r0, 0x4, 0x6100) ftruncate(r0, 0x8200) r1 = open(&(0x7f00000000c0)='./bus\x00', 0x101002, 0x0) r2 = open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) sendfile(r0, r2, &(0x7f0000d83ff8), 0x8000fffffffe) write$P9_ROPEN(r1, &(0x7f0000000040)={0x18}, 0x18) 21:46:02 executing program 2: r0 = socket$kcm(0xa, 0x6, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0xd, 0x22, &(0x7f0000000780)=ANY=[@ANYBLOB="000076ffff0000000000000000730f3800040000000000006124dc79917bae98003f00000000000000000000004b92f8ffffff00ff000000000000000073733800fdffffff00000000000000005d2f5048655300000000000000008653f1425e000c00000000000000000000003f5bfcff08000000124d415e4023f9a60ed6cbbd418640a8fb776b836311fad9b69052faf8f243f64b040de4c3bf5d8aeb0ac0ba2d587716bcee18411fd760458be38a5ca66e076cfe4201e1b0e2df9027f8ca43fe3ee54a7c90e5980ffe2469f7f34f5e76f22942612720954d38d5e3273dfe4558b76933919ed7b3b0feaa1485798e32e242cd339ed23d5cd366d9479034480473c806818e40634b5eef0000000000000000000000"], &(0x7f0000000400)='syzkaller\x00', 0x40, 0xd4, &(0x7f00000008c0)=""/212, 0x0, 0x1000002, [], 0x0, 0x3}, 0x48) socket$kcm(0x29, 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000ec0)={&(0x7f0000000e80)='./file0\x00'}, 0x10) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0xf, 0x1}, 0x14) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x890c, &(0x7f0000000000)) [ 335.742730] binder: BINDER_SET_CONTEXT_MGR already set 21:46:02 executing program 3: syz_open_procfs(0x0, &(0x7f00000002c0)='oom_score_adj\x00') ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) request_key(&(0x7f0000000240)='pkcs7_test\x00', &(0x7f0000000280)={'syz', 0x0}, &(0x7f0000000300)='/\x00', 0xfffffffffffffffe) request_key(&(0x7f00000000c0)='user\x00', &(0x7f0000000100)={'syz'}, &(0x7f0000000200)='vmnet0&#selfbdev&vboxnet0trustedselfeth1#c(vmn%t0c^\x00', 0x0) [ 335.784476] binder: 14431:14450 ioctl 40046207 0 returned -16 21:46:02 executing program 2: r0 = socket$kcm(0xa, 0x6, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0xd, 0x22, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000400)='syzkaller\x00', 0x40, 0xd4, &(0x7f00000008c0)=""/212, 0x0, 0x1000002, [], 0x0, 0x3}, 0x48) socket$kcm(0x29, 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0xf, 0x1}, 0x14) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x890c, &(0x7f0000000000)) 21:46:02 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x2, 0x0) write$uinput_user_dev(r0, &(0x7f0000000880)={'syz1\x00', {}, 0x53, [], [], [], [0x0, 0x0, 0x3f]}, 0x45c) ioctl$UI_DEV_SETUP(r0, 0x5501, &(0x7f0000000300)={{}, "73797a3000000000000000000000000000000400"}) 21:46:02 executing program 0: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x2, 0x0) write$uinput_user_dev(r0, &(0x7f0000000880)={'syz1\x00', {}, 0x53, [], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80]}, 0x45c) ioctl$UI_DEV_SETUP(r0, 0x5501, &(0x7f0000000300)={{}, "73797a3000000000000000000000000000000400"}) 21:46:02 executing program 4: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = creat(&(0x7f0000000680)='./bus\x00', 0x0) fcntl$setstatus(r0, 0x4, 0x6100) ftruncate(r0, 0x8200) r1 = open(&(0x7f00000000c0)='./bus\x00', 0x101002, 0x0) r2 = open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) sendfile(r0, r2, &(0x7f0000d83ff8), 0x8000fffffffe) write$P9_ROPEN(r1, &(0x7f0000000040)={0x18}, 0x18) 21:46:02 executing program 3: syz_open_procfs(0x0, &(0x7f00000002c0)='oom_score_adj\x00') ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) request_key(&(0x7f0000000240)='pkcs7_test\x00', &(0x7f0000000280)={'syz', 0x0}, &(0x7f0000000300)='/\x00', 0xfffffffffffffffe) request_key(&(0x7f00000000c0)='user\x00', &(0x7f0000000100)={'syz'}, &(0x7f0000000200)='vmnet0&#selfbdev&vboxnet0trustedselfeth1#c(vmnet0c^\x00', 0x0) 21:46:02 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='/group.stat\x00', 0x2761, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000180)="2f67726f75702e73746174003c23fb572a1f0294e6f378b41ad54b4d9d9a1f63f8785ad188a7e1c88875e05b18a4cb3a9cd12dcea440d899c22c652b3a471b4a7fa2f3fdf6e034d804e5f0df4b1dee483b157624c59c0100e89e6a357c000000", 0x2761, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00', 0x0, 0x10}, 0x10) write$cgroup_int(r1, &(0x7f0000000080), 0x4255b) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x7fffff) 21:46:02 executing program 2: r0 = socket$kcm(0xa, 0x6, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0xd, 0x22, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000400)='syzkaller\x00', 0x40, 0xd4, &(0x7f00000008c0)=""/212, 0x0, 0x1000002, [], 0x0, 0x3}, 0x48) socket$kcm(0x29, 0x2, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0xf, 0x1}, 0x14) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x890c, &(0x7f0000000000)) [ 336.033698] input: syz1 as /devices/virtual/input/input21 [ 336.040547] input: syz1 as /devices/virtual/input/input22 [ 336.066872] input: syz1 as /devices/virtual/input/input23 21:46:03 executing program 3: syz_open_procfs(0x0, &(0x7f00000002c0)='oom_score_adj\x00') ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) request_key(&(0x7f0000000240)='pkcs7_test\x00', &(0x7f0000000280)={'syz', 0x0}, &(0x7f0000000300)='/\x00', 0xfffffffffffffffe) request_key(&(0x7f00000000c0)='user\x00', &(0x7f0000000100)={'syz'}, &(0x7f0000000200)='vmnet0&#selfbdev&vboxnet0trustedselfeth1#c(vmnet0c^\x00', 0x0) 21:46:03 executing program 4: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = creat(&(0x7f0000000680)='./bus\x00', 0x0) fcntl$setstatus(r0, 0x4, 0x6100) ftruncate(r0, 0x8200) r1 = open(&(0x7f00000000c0)='./bus\x00', 0x101002, 0x0) r2 = open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) sendfile(r0, r2, &(0x7f0000d83ff8), 0x8000fffffffe) write$P9_ROPEN(r1, &(0x7f0000000040)={0x18}, 0x18) [ 336.138489] input: syz1 as /devices/virtual/input/input24 21:46:03 executing program 2: r0 = socket$kcm(0xa, 0x6, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0xd, 0x22, &(0x7f0000000780)=ANY=[@ANYBLOB="000076ffff0000000000000000730f3800040000000000006124dc79917bae98003f00000000000000000000004b92f8ffffff00ff000000000000000073733800fdffffff00000000000000005d2f5048655300000000000000008653f1425e000c00000000000000000000003f5bfcff08000000124d415e4023f9a60ed6cbbd418640a8fb776b836311fad9b69052faf8f243f64b040de4c3bf5d8aeb0ac0ba2d587716bcee18411fd760458be38a5ca66e076cfe4201e1b0e2df9027f8ca43fe3ee54a7c90e5980ffe2469f7f34f5e76f22942612720954d38d5e3273dfe4558b76933919ed7b3b0feaa1485798e32e242cd339ed23d5cd366d9479034480473c806818e40634b5eef0000000000000000000000"], &(0x7f0000000400)='syzkaller\x00', 0x40, 0xd4, &(0x7f00000008c0)=""/212, 0x0, 0x1000002, [], 0x0, 0x3}, 0x48) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0xf, 0x1}, 0x14) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x890c, &(0x7f0000000000)) 21:46:03 executing program 0: r0 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r0, 0x107, 0xd, &(0x7f00000000c0), 0x44) 21:46:03 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x13, 0x10, 0x0, 0x0, 0x0, 0x1}, 0x2c) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000001500)={0x3, 0x5, &(0x7f0000001280)=@framed={{}, [@map={0x18, 0x0, 0x1, 0x0, r0}]}, &(0x7f0000000140)='syzkaller\x00'}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000980)={0xf, 0x5, &(0x7f0000000300)=@framed={{}, [@map={0x18, 0x0, 0x1, 0x0, r0}]}, &(0x7f0000000040)='GPL\x00', 0xd6, 0xeb, &(0x7f00000003c0)=""/235}, 0x48) gettid() 21:46:03 executing program 2: r0 = socket$kcm(0xa, 0x6, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0xf, 0x1}, 0x14) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x890c, &(0x7f0000000000)) 21:46:03 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081aee4050c00000f00fe070101000000000063dac37b7403242189c609", 0x23}], 0x1, &(0x7f0000000080)}, 0x0) 21:46:03 executing program 4: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = creat(&(0x7f0000000680)='./bus\x00', 0x0) fcntl$setstatus(r1, 0x4, 0x6100) ftruncate(r1, 0x8200) r2 = open(&(0x7f00000000c0)='./bus\x00', 0x101002, 0x0) r3 = open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) sendfile(r1, r3, &(0x7f0000d83ff8), 0x8000fffffffe) write$P9_ROPEN(r2, &(0x7f0000000040)={0x18}, 0x18) 21:46:03 executing program 3: syz_open_procfs(0x0, &(0x7f00000002c0)='oom_score_adj\x00') ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) request_key(&(0x7f0000000240)='pkcs7_test\x00', &(0x7f0000000280)={'syz', 0x0}, &(0x7f0000000300)='/\x00', 0xfffffffffffffffe) request_key(&(0x7f00000000c0)='user\x00', &(0x7f0000000100)={'syz'}, &(0x7f0000000200)='vmnet0&#selfbdev&vboxnet0trustedselfeth1#c(vmnet0c^\x00', 0x0) 21:46:03 executing program 0: r0 = socket$kcm(0xa, 0x1, 0x0) sendmsg(r0, &(0x7f00000002c0)={&(0x7f0000000300)=@in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa]}}, 0x80, &(0x7f00000013c0), 0x0, &(0x7f0000000380)}, 0x2000c4ff) 21:46:03 executing program 2: bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0xf, 0x1}, 0x14) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x890c, &(0x7f0000000000)) [ 336.490697] netlink: 3 bytes leftover after parsing attributes in process `syz-executor1'. 21:46:03 executing program 4: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = creat(&(0x7f0000000680)='./bus\x00', 0x0) fcntl$setstatus(r1, 0x4, 0x6100) ftruncate(r1, 0x8200) r2 = open(&(0x7f00000000c0)='./bus\x00', 0x101002, 0x0) r3 = open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) sendfile(r1, r3, &(0x7f0000d83ff8), 0x8000fffffffe) write$P9_ROPEN(r2, &(0x7f0000000040)={0x18}, 0x18) 21:46:03 executing program 0: r0 = memfd_create(&(0x7f0000000400)="e83779d80efa45bb7f48bebc95870bd0cd39bd2830ee47afe7b33fc778bde252c50d2e", 0x0) syz_open_dev$sndseq(&(0x7f0000000700)='/dev/snd/seq\x00', 0x0, 0x1) write$sndseq(r0, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @connect}], 0xffffff76) mmap(&(0x7f0000011000/0x6000)=nil, 0x6000, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_NAMED_QUEUE(0xffffffffffffffff, 0xc08c5336, &(0x7f0000000480)={0x0, 0x0, 0x0, 'queue0\x00'}) 21:46:03 executing program 3: syz_open_procfs(0x0, &(0x7f00000002c0)='oom_score_adj\x00') ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) request_key(&(0x7f0000000240)='pkcs7_test\x00', &(0x7f0000000280)={'syz', 0x0}, &(0x7f0000000300)='/\x00', 0xfffffffffffffffe) request_key(&(0x7f00000000c0)='user\x00', &(0x7f0000000100)={'syz'}, &(0x7f0000000200)='vmnet0&#selfbdev&vboxnet0trustedselfeth1#c(vmnet0c^\x00', 0x0) 21:46:03 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x13, 0x10, 0x0, 0x0, 0x0, 0x1}, 0x2c) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000001500)={0x3, 0x5, &(0x7f0000001280)=@framed={{}, [@map={0x18, 0x0, 0x1, 0x0, r0}]}, &(0x7f0000000140)='syzkaller\x00'}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000980)={0xf, 0x5, &(0x7f0000000300)=@framed={{}, [@map={0x18, 0x0, 0x1, 0x0, r0}]}, &(0x7f0000000040)='GPL\x00', 0xd6, 0xeb, &(0x7f00000003c0)=""/235}, 0x48) gettid() [ 336.557806] syz-executor0 (14537) used greatest stack depth: 12232 bytes left 21:46:03 executing program 2: bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0xf, 0x1}, 0x14) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x890c, &(0x7f0000000000)) 21:46:03 executing program 4: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = creat(&(0x7f0000000680)='./bus\x00', 0x0) fcntl$setstatus(r1, 0x4, 0x6100) ftruncate(r1, 0x8200) r2 = open(&(0x7f00000000c0)='./bus\x00', 0x101002, 0x0) r3 = open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) sendfile(r1, r3, &(0x7f0000d83ff8), 0x8000fffffffe) write$P9_ROPEN(r2, &(0x7f0000000040)={0x18}, 0x18) [ 336.622130] kauditd_printk_skb: 14 callbacks suppressed [ 336.622144] audit: type=1804 audit(1538430363.493:71): pid=14546 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor4" name="/root/syzkaller-testdir696441687/syzkaller.siB441/92/bus" dev="sda1" ino=16554 res=1 21:46:03 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000480)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00000004c0)) r1 = syz_open_pts(r0, 0x0) ppoll(&(0x7f0000000080)=[{r0}], 0x1, &(0x7f00000000c0)={0x77359400}, &(0x7f0000000100), 0x8) ioctl$TIOCPKT(r0, 0x5420, &(0x7f0000000500)=0xe0) ioctl$TCFLSH(r1, 0x540b, 0x2) 21:46:03 executing program 3: syz_open_procfs(0x0, &(0x7f00000002c0)='oom_score_adj\x00') ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) request_key(&(0x7f0000000240)='pkcs7_test\x00', &(0x7f0000000280)={'syz', 0x0}, &(0x7f0000000300)='/\x00', 0xfffffffffffffffe) request_key(&(0x7f00000000c0)='user\x00', &(0x7f0000000100)={'syz'}, &(0x7f0000000200)="766d6e657430262373656c66626465762676626f786e6574307472757374656473656c6665746831236328766d6e657430635e0f", 0x0) 21:46:03 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x13, 0x10, 0x0, 0x0, 0x0, 0x1}, 0x2c) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000001500)={0x3, 0x5, &(0x7f0000001280)=@framed={{}, [@map={0x18, 0x0, 0x1, 0x0, r0}]}, &(0x7f0000000140)='syzkaller\x00'}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000980)={0xf, 0x5, &(0x7f0000000300)=@framed={{}, [@map={0x18, 0x0, 0x1, 0x0, r0}]}, &(0x7f0000000040)='GPL\x00', 0xd6, 0xeb, &(0x7f00000003c0)=""/235}, 0x48) gettid() 21:46:03 executing program 2: bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0xf, 0x1}, 0x14) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x890c, &(0x7f0000000000)) [ 336.796026] audit: type=1804 audit(1538430363.663:72): pid=14566 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor4" name="/root/syzkaller-testdir696441687/syzkaller.siB441/93/bus" dev="sda1" ino=16539 res=1 21:46:03 executing program 3: syz_open_procfs(0x0, &(0x7f00000002c0)='oom_score_adj\x00') ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) request_key(&(0x7f0000000240)='pkcs7_test\x00', &(0x7f0000000280)={'syz', 0x0}, &(0x7f0000000300)='/\x00', 0xfffffffffffffffe) request_key(&(0x7f00000000c0)='user\x00', &(0x7f0000000100)={'syz'}, &(0x7f0000000200)='vmnet0&#selfbdev&vboxnet0trustedselfeth1#c(vmnet0c^\x00', 0x0) 21:46:03 executing program 4: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000180)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = creat(&(0x7f0000000680)='./bus\x00', 0x0) fcntl$setstatus(r0, 0x4, 0x6100) ftruncate(r0, 0x8200) r1 = open(&(0x7f00000000c0)='./bus\x00', 0x101002, 0x0) r2 = open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) sendfile(r0, r2, &(0x7f0000d83ff8), 0x8000fffffffe) write$P9_ROPEN(r1, &(0x7f0000000040)={0x18}, 0x18) 21:46:03 executing program 2: r0 = socket$kcm(0xa, 0x0, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0xf, 0x1}, 0x14) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x890c, &(0x7f0000000000)) [ 337.029806] audit: type=1804 audit(1538430363.903:73): pid=14588 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor4" name="/root/syzkaller-testdir696441687/syzkaller.siB441/94/bus" dev="sda1" ino=16570 res=1 21:46:04 executing program 3: syz_open_procfs(0x0, &(0x7f00000002c0)='oom_score_adj\x00') ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) request_key(&(0x7f0000000240)='pkcs7_test\x00', &(0x7f0000000280)={'syz', 0x0}, &(0x7f0000000300)='/\x00', 0xfffffffffffffffe) request_key(&(0x7f00000000c0)='user\x00', &(0x7f0000000100)={'syz'}, &(0x7f0000000200)='vmnet0&#selfbdev&vboxnet0trustedselfeth1#c(vmnet0c^\x00', 0x0) 21:46:04 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x13, 0x10, 0x0, 0x0, 0x0, 0x1}, 0x2c) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000001500)={0x3, 0x5, &(0x7f0000001280)=@framed={{}, [@map={0x18, 0x0, 0x1, 0x0, r0}]}, &(0x7f0000000140)='syzkaller\x00'}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000980)={0xf, 0x5, &(0x7f0000000300)=@framed={{}, [@map={0x18, 0x0, 0x1, 0x0, r0}]}, &(0x7f0000000040)='GPL\x00', 0xd6, 0xeb, &(0x7f00000003c0)=""/235}, 0x48) gettid() 21:46:04 executing program 0: socket(0x0, 0x0, 0x0) clone(0x100002102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) sched_setscheduler(0x0, 0x5, &(0x7f0000000000)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x5}]}) setsockopt$IP_VS_SO_SET_TIMEOUT(0xffffffffffffffff, 0x0, 0x48a, &(0x7f00000000c0)={0x0, 0x2}, 0xc) 21:46:04 executing program 2: r0 = socket$kcm(0xa, 0x0, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0xf, 0x1}, 0x14) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x890c, &(0x7f0000000000)) 21:46:04 executing program 4: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000180)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = creat(&(0x7f0000000680)='./bus\x00', 0x0) fcntl$setstatus(r0, 0x4, 0x6100) ftruncate(r0, 0x8200) r1 = open(&(0x7f00000000c0)='./bus\x00', 0x101002, 0x0) r2 = open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) sendfile(r0, r2, &(0x7f0000d83ff8), 0x8000fffffffe) write$P9_ROPEN(r1, &(0x7f0000000040)={0x18}, 0x18) [ 337.251084] audit: type=1804 audit(1538430364.123:74): pid=14606 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor4" name="/root/syzkaller-testdir696441687/syzkaller.siB441/95/bus" dev="sda1" ino=16545 res=1 21:46:04 executing program 3: syz_open_procfs(0x0, &(0x7f00000002c0)='oom_score_adj\x00') ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) request_key(&(0x7f0000000240)='pkcs7_test\x00', &(0x7f0000000280)={'syz', 0x0}, &(0x7f0000000300)='/\x00', 0xfffffffffffffffe) request_key(&(0x7f00000000c0)='user\x00', &(0x7f0000000100)={'syz'}, &(0x7f0000000200)='vmnet0&#selfbdev&vboxnet0trustedselfeth1#c(vmnet0c^\x00', 0x0) 21:46:04 executing program 4: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000180)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = creat(&(0x7f0000000680)='./bus\x00', 0x0) fcntl$setstatus(r0, 0x4, 0x6100) ftruncate(r0, 0x8200) r1 = open(&(0x7f00000000c0)='./bus\x00', 0x101002, 0x0) r2 = open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) sendfile(r0, r2, &(0x7f0000d83ff8), 0x8000fffffffe) write$P9_ROPEN(r1, &(0x7f0000000040)={0x18}, 0x18) 21:46:04 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) connect$inet(r0, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) 21:46:04 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x4}, 0x1c) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @ipv4={[], [], @loopback}}, 0x1c) 21:46:04 executing program 0: perf_event_open(&(0x7f0000aaa000)={0x2, 0x70, 0x85a, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = eventfd2(0x0, 0x0) read$eventfd(r0, &(0x7f00000006c0), 0xfffffea1) r1 = fcntl$dupfd(r0, 0x0, r0) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[@ANYBLOB="00fffffff7000000"], 0x8) 21:46:04 executing program 2: r0 = socket$kcm(0xa, 0x0, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0xf, 0x1}, 0x14) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x890c, &(0x7f0000000000)) 21:46:04 executing program 3: syz_open_procfs(0x0, &(0x7f00000002c0)='oom_score_adj\x00') ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) request_key(&(0x7f0000000240)='pkcs7_test\x00', &(0x7f0000000280)={'syz', 0x0}, &(0x7f0000000300)='/\x00', 0xfffffffffffffffe) request_key(&(0x7f00000000c0)='user\x00', &(0x7f0000000100)={'syz'}, &(0x7f0000000200)='vmnet0&#selfbdev&vboxnet0trustedselfeth1#c(vmnet0c^\x00', 0x0) 21:46:04 executing program 2: r0 = socket$kcm(0xa, 0x6, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x1}, 0x14) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x890c, &(0x7f0000000000)) 21:46:04 executing program 5: r0 = accept4$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x0, 0x0, @loopback}, &(0x7f00000000c0)=0x1c, 0x800) recvmmsg(0xffffffffffffff9c, &(0x7f0000004d40)=[{{0x0, 0x0, &(0x7f0000000340)=[{&(0x7f0000000100)=""/232, 0xe8}, {&(0x7f0000000200)=""/207, 0xcf}, {&(0x7f0000000300)=""/21, 0x15}], 0x3, &(0x7f0000000380)=""/36, 0x24, 0x7f}, 0x8}, {{&(0x7f00000003c0)=@nfc_llcp, 0x80, &(0x7f0000000500)=[{&(0x7f0000000440)=""/155, 0x9b}], 0x1, &(0x7f0000000540)=""/52, 0x34, 0x9}, 0x7fff}, {{&(0x7f0000000580)=@pptp={0x18, 0x2, {0x0, @rand_addr}}, 0x80, &(0x7f0000001800)=[{&(0x7f0000000600)=""/61, 0x3d}, {&(0x7f0000000640)=""/144, 0x90}, {&(0x7f0000000700)=""/4096, 0x1000}, {&(0x7f0000001700)=""/117, 0x75}, {&(0x7f0000001780)=""/121, 0x79}], 0x5, 0x0, 0x0, 0x3}, 0x7}, {{&(0x7f0000001880)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x80, &(0x7f0000002e00)=[{&(0x7f0000001900)=""/195, 0xc3}, {&(0x7f0000001a00)=""/118, 0x76}, {0xffffffffffffffff}, {&(0x7f0000001a80)=""/154, 0x9a}, {&(0x7f0000001b40)=""/78, 0x4e}, {&(0x7f0000001bc0)=""/29, 0x1d}, {&(0x7f0000001c00)=""/4096, 0x1000}, {&(0x7f0000002c00)=""/194, 0xc2}, {&(0x7f0000002d00)=""/41, 0x29}, {&(0x7f0000002d40)=""/184, 0xb8}], 0xa, &(0x7f0000002ec0)=""/234, 0xea, 0x4710}, 0x5}, {{&(0x7f0000002fc0)=@pptp={0x18, 0x2, {0x0, @rand_addr}}, 0x80, &(0x7f0000004340)=[{&(0x7f0000003040)=""/65, 0x41}, {&(0x7f00000030c0)=""/103, 0x67}, {&(0x7f0000003240)=""/4096, 0x1000}, {&(0x7f0000004240)=""/239, 0xef}, {&(0x7f0000003140)=""/181, 0xb5}], 0x5, &(0x7f00000043c0)=""/100, 0x64, 0x2}, 0xd8}, {{&(0x7f0000004440)=@un=@abs, 0x80, &(0x7f00000046c0)=[{&(0x7f00000044c0)=""/32, 0x20}, {&(0x7f0000004500)=""/76, 0x4c}, {&(0x7f0000004580)=""/12, 0xc}, {&(0x7f00000045c0)=""/31, 0x1f}, {&(0x7f0000004600)=""/19, 0x13}, {&(0x7f0000004640)=""/75, 0x4b}], 0x6, &(0x7f0000004740), 0x0, 0xfffffffffffffffe}, 0x100000001}, {{&(0x7f0000004780)=@generic, 0x80, &(0x7f0000004900)=[{&(0x7f0000004800)=""/246, 0xf6}], 0x1, &(0x7f0000004940)=""/246, 0xf6, 0xb89}, 0x6}, {{&(0x7f0000004a40)=@ax25, 0x80, &(0x7f0000004c00)=[{&(0x7f0000004ac0)}, {&(0x7f0000004b00)=""/255, 0xff}], 0x2, &(0x7f0000004c40)=""/242, 0xf2, 0xff}, 0x80000000}], 0x8, 0x21, &(0x7f0000004f40)={0x77359400}) setsockopt$inet6_IPV6_PKTINFO(r0, 0x29, 0x32, &(0x7f0000004f80)={@local, r1}, 0x14) r2 = accept(r0, &(0x7f0000005000)=@pppoe={0x18, 0x0, {0x0, @link_local}}, &(0x7f0000005080)=0x80) ioctl$sock_bt_hidp_HIDPGETCONNLIST(r2, 0x800448d2, &(0x7f00000053c0)={0x5, &(0x7f00000050c0)=[{}, {}, {}, {}, {}]}) r3 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_mtu(r3, 0x0, 0xa, &(0x7f0000000080)=0x2, 0x4) r4 = accept4(r3, &(0x7f0000000000)=@ax25, &(0x7f00000005c0)=0xffffffd6, 0x80000) r5 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) r6 = socket(0x40000000015, 0x5, 0x0) getsockopt$inet_sctp6_SCTP_RECVNXTINFO(r4, 0x84, 0x21, &(0x7f0000000600), &(0x7f00000006c0)=0x4) setsockopt$sock_int(r6, 0x1, 0x23, &(0x7f00000005c0)=0x8a, 0x4) r7 = socket$inet6(0xa, 0x3, 0x800000000000004) ioctl(r7, 0x8912, &(0x7f0000000280)="153f6234488dd25d5c6070") connect$llc(r5, &(0x7f00000000c0)={0x1a, 0x1, 0x5, 0x5, 0xc93, 0x8, @link_local}, 0x10) sendmmsg(r5, &(0x7f0000001380), 0x3fffff1, 0x40) [ 337.642609] audit: type=1804 audit(1538430364.503:75): pid=14640 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor4" name="/root/syzkaller-testdir696441687/syzkaller.siB441/96/bus" dev="sda1" ino=16568 res=1 21:46:04 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000100), 0x18e) bind$inet(r1, &(0x7f0000000080)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r1, &(0x7f0000000000), 0x0, 0x20000802, &(0x7f0000000280)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) 21:46:04 executing program 4: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x0) r1 = creat(&(0x7f0000000680)='./bus\x00', 0x0) fcntl$setstatus(r1, 0x4, 0x6100) ftruncate(r1, 0x8200) r2 = open(&(0x7f00000000c0)='./bus\x00', 0x101002, 0x0) r3 = open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) sendfile(r1, r3, &(0x7f0000d83ff8), 0x8000fffffffe) write$P9_ROPEN(r2, &(0x7f0000000040)={0x18}, 0x18) 21:46:04 executing program 2: r0 = socket$kcm(0xa, 0x6, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x1}, 0x14) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x890c, &(0x7f0000000000)) 21:46:04 executing program 3: syz_open_procfs(0x0, &(0x7f00000002c0)='oom_score_adj\x00') ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) request_key(&(0x7f0000000240)='pkcs7_test\x00', &(0x7f0000000280)={'syz', 0x0}, &(0x7f0000000300)='/\x00', 0xfffffffffffffffe) request_key(&(0x7f00000000c0)='user\x00', &(0x7f0000000100)={'syz'}, &(0x7f0000000200)="766d6e657430262373656c66626465762676626f786e6574307472757374656473656c6665746831236328766d6e657430635e04", 0x0) 21:46:04 executing program 2: r0 = socket$kcm(0xa, 0x6, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x1}, 0x14) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x890c, &(0x7f0000000000)) [ 337.833384] audit: type=1804 audit(1538430364.703:76): pid=14665 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor4" name="/root/syzkaller-testdir696441687/syzkaller.siB441/97/bus" dev="sda1" ino=16555 res=1 21:46:05 executing program 4: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x0) r1 = creat(&(0x7f0000000680)='./bus\x00', 0x0) fcntl$setstatus(r1, 0x4, 0x6100) ftruncate(r1, 0x8200) r2 = open(&(0x7f00000000c0)='./bus\x00', 0x101002, 0x0) r3 = open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) sendfile(r1, r3, &(0x7f0000d83ff8), 0x8000fffffffe) write$P9_ROPEN(r2, &(0x7f0000000040)={0x18}, 0x18) 21:46:05 executing program 2: r0 = socket$kcm(0xa, 0x6, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0xf}, 0x14) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x890c, &(0x7f0000000000)) 21:46:05 executing program 1: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGREP(r0, 0x80084503, &(0x7f0000000200)=""/126) 21:46:05 executing program 3: syz_open_procfs(0x0, &(0x7f00000002c0)='oom_score_adj\x00') ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) request_key(&(0x7f0000000240)='pkcs7_test\x00', &(0x7f0000000280)={'syz', 0x0}, &(0x7f0000000300)='/\x00', 0xfffffffffffffffe) request_key(&(0x7f00000000c0)='user\x00', &(0x7f0000000100)={'syz'}, &(0x7f0000000200)="766d6e657430262373656c66626465762676626f786e6574307472757374656473656c6665746831236328766d6e657430635e06", 0x0) 21:46:05 executing program 2: socket$kcm(0xa, 0x6, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0xf}, 0x14) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x890c, &(0x7f0000000000)) [ 338.468334] audit: type=1804 audit(1538430365.333:77): pid=14684 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor4" name="/root/syzkaller-testdir696441687/syzkaller.siB441/98/bus" dev="sda1" ino=16570 res=1 21:46:05 executing program 4: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x0) r1 = creat(&(0x7f0000000680)='./bus\x00', 0x0) fcntl$setstatus(r1, 0x4, 0x6100) ftruncate(r1, 0x8200) r2 = open(&(0x7f00000000c0)='./bus\x00', 0x101002, 0x0) r3 = open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) sendfile(r1, r3, &(0x7f0000d83ff8), 0x8000fffffffe) write$P9_ROPEN(r2, &(0x7f0000000040)={0x18}, 0x18) [ 338.597580] audit: type=1804 audit(1538430365.463:78): pid=14699 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor4" name="/root/syzkaller-testdir696441687/syzkaller.siB441/99/bus" dev="sda1" ino=16565 res=1 21:46:05 executing program 5: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000280)="0001000000ff000000000000c9030000ecfa0000010008000000000000000000002000000020000000010000000000006e5fbe5c0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)) 21:46:05 executing program 0: prlimit64(0x0, 0x7, &(0x7f0000000100), &(0x7f0000000280)) perf_event_open(&(0x7f0000000140)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 21:46:05 executing program 3: syz_open_procfs(0x0, &(0x7f00000002c0)='oom_score_adj\x00') ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) request_key(&(0x7f0000000240)='pkcs7_test\x00', &(0x7f0000000280)={'syz', 0x0}, &(0x7f0000000300)='/\x00', 0xfffffffffffffffe) request_key(&(0x7f00000000c0)='user\x00', &(0x7f0000000100)={'syz'}, &(0x7f0000000200)='vmnet0&#selfbdev&vboxnet0trustedselfeth1#c(vmnet0c^\x00', 0x0) 21:46:05 executing program 2: socket$kcm(0xa, 0x6, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0xf}, 0x14) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x890c, &(0x7f0000000000)) 21:46:05 executing program 4: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = creat(&(0x7f0000000680)='./bus\x00', 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x6100) ftruncate(r1, 0x8200) r2 = open(&(0x7f00000000c0)='./bus\x00', 0x101002, 0x0) r3 = open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) sendfile(r1, r3, &(0x7f0000d83ff8), 0x8000fffffffe) write$P9_ROPEN(r2, &(0x7f0000000040)={0x18}, 0x18) 21:46:05 executing program 1: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x2) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$SCSI_IOCTL_STOP_UNIT(r0, 0x6) 21:46:05 executing program 2: socket$kcm(0xa, 0x6, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0xf}, 0x14) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x890c, &(0x7f0000000000)) [ 338.715726] EXT4-fs (loop5): bad geometry: block count 65280 exceeds size of device (2 blocks) [ 338.769855] audit: type=1804 audit(1538430365.643:79): pid=14720 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor4" name="/root/syzkaller-testdir696441687/syzkaller.siB441/100/bus" dev="sda1" ino=16551 res=1 21:46:05 executing program 3: syz_open_procfs(0x0, &(0x7f00000002c0)='oom_score_adj\x00') ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) request_key(&(0x7f0000000240)='pkcs7_test\x00', &(0x7f0000000280)={'syz', 0x0}, &(0x7f0000000300)='/\x00', 0xfffffffffffffffe) request_key(&(0x7f00000000c0)='user\x00', &(0x7f0000000100)={'syz'}, &(0x7f0000000200)='vmnet0&#selfbdev&vboxnet0trustedselfeth1#c(vmnet0c^\x00', 0x0) 21:46:05 executing program 4: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = creat(&(0x7f0000000680)='./bus\x00', 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x6100) ftruncate(r1, 0x8200) r2 = open(&(0x7f00000000c0)='./bus\x00', 0x101002, 0x0) r3 = open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) sendfile(r1, r3, &(0x7f0000d83ff8), 0x8000fffffffe) write$P9_ROPEN(r2, &(0x7f0000000040)={0x18}, 0x18) 21:46:05 executing program 2: 21:46:05 executing program 0: [ 338.858411] EXT4-fs (loop5): bad geometry: block count 65280 exceeds size of device (2 blocks) [ 338.861399] program syz-executor1 is using a deprecated SCSI ioctl, please convert it to SG_IO [ 338.917097] sd 0:0:1:0: ioctl_internal_command: ILLEGAL REQUEST asc=0x20 ascq=0x0 21:46:05 executing program 3: syz_open_procfs(0x0, &(0x7f00000002c0)='oom_score_adj\x00') ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) request_key(&(0x7f0000000240)='pkcs7_test\x00', &(0x7f0000000280)={'syz', 0x0}, &(0x7f0000000300)='/\x00', 0xfffffffffffffffe) request_key(&(0x7f00000000c0)='user\x00', &(0x7f0000000100)={'syz'}, &(0x7f0000000200)='vmnet0&#selfbdev&vboxnet0trustedselfeth1#c(vmnet0c^\x00', 0x0) [ 338.953887] audit: type=1804 audit(1538430365.823:80): pid=14734 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor4" name="/root/syzkaller-testdir696441687/syzkaller.siB441/101/bus" dev="sda1" ino=16564 res=1 21:46:05 executing program 2: 21:46:05 executing program 0: 21:46:05 executing program 5: 21:46:05 executing program 1: 21:46:06 executing program 4: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = creat(&(0x7f0000000680)='./bus\x00', 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x6100) ftruncate(r1, 0x8200) r2 = open(&(0x7f00000000c0)='./bus\x00', 0x101002, 0x0) r3 = open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) sendfile(r1, r3, &(0x7f0000d83ff8), 0x8000fffffffe) write$P9_ROPEN(r2, &(0x7f0000000040)={0x18}, 0x18) 21:46:06 executing program 0: 21:46:06 executing program 5: 21:46:06 executing program 3: syz_open_procfs(0x0, &(0x7f00000002c0)='oom_score_adj\x00') ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) request_key(&(0x7f0000000240)='pkcs7_test\x00', &(0x7f0000000280)={'syz', 0x0}, &(0x7f0000000300)='/\x00', 0xfffffffffffffffe) request_key(&(0x7f00000000c0)='user\x00', &(0x7f0000000100)={'syz'}, &(0x7f0000000200)='vmnet0&#selfbdev&vboxnet0trustedselfeth1#c(vmnet0c^\x00', 0x0) 21:46:06 executing program 2: 21:46:06 executing program 1: 21:46:06 executing program 0: 21:46:06 executing program 4: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = creat(&(0x7f0000000680)='./bus\x00', 0x0) fcntl$setstatus(r1, 0x4, 0x0) ftruncate(r1, 0x8200) r2 = open(&(0x7f00000000c0)='./bus\x00', 0x101002, 0x0) r3 = open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) sendfile(r1, r3, &(0x7f0000d83ff8), 0x8000fffffffe) write$P9_ROPEN(r2, &(0x7f0000000040)={0x18}, 0x18) 21:46:06 executing program 5: 21:46:06 executing program 2: 21:46:06 executing program 3: syz_open_procfs(0x0, &(0x7f00000002c0)='oom_score_adj\x00') ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) request_key(&(0x7f0000000240)='pkcs7_test\x00', &(0x7f0000000280)={'syz', 0x0}, &(0x7f0000000300)='/\x00', 0xfffffffffffffffe) request_key(&(0x7f00000000c0)='user\x00', &(0x7f0000000100)={'syz'}, &(0x7f0000000200)='vmnet0&#selfbdev&vboxnet0trustedselfeth1#c(vmnet0c^\x00', 0x0) 21:46:06 executing program 1: 21:46:06 executing program 5: 21:46:06 executing program 0: 21:46:06 executing program 2: 21:46:06 executing program 1: 21:46:06 executing program 5: 21:46:06 executing program 2: 21:46:06 executing program 4: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = creat(&(0x7f0000000680)='./bus\x00', 0x0) fcntl$setstatus(r1, 0x4, 0x0) ftruncate(r1, 0x8200) r2 = open(&(0x7f00000000c0)='./bus\x00', 0x101002, 0x0) r3 = open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) sendfile(r1, r3, &(0x7f0000d83ff8), 0x8000fffffffe) write$P9_ROPEN(r2, &(0x7f0000000040)={0x18}, 0x18) 21:46:06 executing program 0: 21:46:06 executing program 1: 21:46:06 executing program 3: syz_open_procfs(0x0, &(0x7f00000002c0)='oom_score_adj\x00') ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) request_key(&(0x7f0000000240)='pkcs7_test\x00', &(0x7f0000000280)={'syz', 0x0}, &(0x7f0000000300)='/\x00', 0xfffffffffffffffe) request_key(&(0x7f00000000c0)='user\x00', &(0x7f0000000100)={'syz'}, &(0x7f0000000200)='vmnet0&#selfbdev&vboxnet0trustedselfeth1#c(vmnet0c^h', 0x0) 21:46:06 executing program 5: 21:46:06 executing program 0: 21:46:06 executing program 2: 21:46:06 executing program 5: 21:46:06 executing program 3: syz_open_procfs(0x0, &(0x7f00000002c0)='oom_score_adj\x00') ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) request_key(&(0x7f0000000240)='pkcs7_test\x00', &(0x7f0000000280)={'syz', 0x0}, &(0x7f0000000300)='/\x00', 0xfffffffffffffffe) request_key(&(0x7f00000000c0)='user\x00', &(0x7f0000000100)={'syz'}, &(0x7f0000000200)='vmnet0&#selfbdev&vboxnet0trustedselfeth1#c(vmnet0c^\x00', 0x0) 21:46:06 executing program 1: 21:46:06 executing program 4: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = creat(&(0x7f0000000680)='./bus\x00', 0x0) fcntl$setstatus(r1, 0x4, 0x0) ftruncate(r1, 0x8200) r2 = open(&(0x7f00000000c0)='./bus\x00', 0x101002, 0x0) r3 = open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) sendfile(r1, r3, &(0x7f0000d83ff8), 0x8000fffffffe) write$P9_ROPEN(r2, &(0x7f0000000040)={0x18}, 0x18) 21:46:06 executing program 0: 21:46:06 executing program 2: 21:46:06 executing program 5: 21:46:06 executing program 3: syz_open_procfs(0x0, &(0x7f00000002c0)='oom_score_adj\x00') ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) request_key(&(0x7f0000000240)='pkcs7_test\x00', &(0x7f0000000280)={'syz', 0x0}, &(0x7f0000000300)='/\x00', 0xfffffffffffffffe) request_key(&(0x7f00000000c0)='user\x00', &(0x7f0000000100)={'syz'}, &(0x7f0000000200)='vmnet0&#selfbdev&vboxnet0trustedselfeth1#c(vmnet0c^\x00', 0x0) 21:46:06 executing program 0: 21:46:06 executing program 2: 21:46:06 executing program 1: 21:46:06 executing program 4: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = creat(&(0x7f0000000680)='./bus\x00', 0x0) fcntl$setstatus(r1, 0x4, 0x6100) ftruncate(0xffffffffffffffff, 0x8200) r2 = open(&(0x7f00000000c0)='./bus\x00', 0x101002, 0x0) r3 = open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) sendfile(r1, r3, &(0x7f0000d83ff8), 0x8000fffffffe) write$P9_ROPEN(r2, &(0x7f0000000040)={0x18}, 0x18) 21:46:06 executing program 2: 21:46:06 executing program 5: 21:46:06 executing program 1: 21:46:07 executing program 0: 21:46:07 executing program 3: syz_open_procfs(0x0, &(0x7f00000002c0)='oom_score_adj\x00') ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) request_key(&(0x7f0000000240)='pkcs7_test\x00', &(0x7f0000000280)={'syz', 0x0}, &(0x7f0000000300)='/\x00', 0xfffffffffffffffe) request_key(&(0x7f00000000c0)='user\x00', &(0x7f0000000100)={'syz'}, &(0x7f0000000200)='vmnet0&#selfbdev&vboxnet0trustedselfeth1#c(vmnet0c^\x00', 0x0) 21:46:07 executing program 2: 21:46:07 executing program 5: 21:46:07 executing program 4: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = creat(&(0x7f0000000680)='./bus\x00', 0x0) fcntl$setstatus(r1, 0x4, 0x6100) ftruncate(0xffffffffffffffff, 0x8200) r2 = open(&(0x7f00000000c0)='./bus\x00', 0x101002, 0x0) r3 = open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) sendfile(r1, r3, &(0x7f0000d83ff8), 0x8000fffffffe) write$P9_ROPEN(r2, &(0x7f0000000040)={0x18}, 0x18) 21:46:07 executing program 1: 21:46:07 executing program 0: 21:46:07 executing program 5: 21:46:07 executing program 1: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40032, 0xffffffffffffffff, 0x0) mmap(&(0x7f00004e3000/0x400000)=nil, 0x400000, 0x0, 0xa132, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$fou(&(0x7f0000000080)='fou\x00') 21:46:07 executing program 2: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x50001000008912, &(0x7f0000000000)="0a5c2d023c126285718070") mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x3000005, 0x31, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) writev(r1, &(0x7f0000e11ff0)=[{&(0x7f0000000200)}], 0x1) 21:46:07 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, &(0x7f0000a88f88), 0xfffffffffffffe6e, 0x20000000, &(0x7f0000e68000)={0x2, 0x0, @local}, 0x10) shutdown(r0, 0x0) 21:46:07 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_int(r0, 0x1, 0x7, &(0x7f0000ac5000), 0x4) sendmmsg$unix(r0, &(0x7f00000bd000), 0x80, 0x0) connect$unix(r0, &(0x7f00002ffff6)=@file={0x0, './file0\x00'}, 0xa) 21:46:07 executing program 3: syz_open_procfs(0x0, &(0x7f00000002c0)='oom_score_adj\x00') ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) request_key(&(0x7f0000000240)='pkcs7_test\x00', &(0x7f0000000280)={'syz', 0x0}, &(0x7f0000000300)='/\x00', 0xfffffffffffffffe) request_key(&(0x7f00000000c0)='user\x00', &(0x7f0000000100)={'syz'}, &(0x7f0000000200)='vmnet0&#selfbdev&vboxnet0trustedselfeth1#c(vmnet0c^\x00', 0x0) 21:46:07 executing program 4: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = creat(&(0x7f0000000680)='./bus\x00', 0x0) fcntl$setstatus(r1, 0x4, 0x6100) ftruncate(0xffffffffffffffff, 0x8200) r2 = open(&(0x7f00000000c0)='./bus\x00', 0x101002, 0x0) r3 = open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) sendfile(r1, r3, &(0x7f0000d83ff8), 0x8000fffffffe) write$P9_ROPEN(r2, &(0x7f0000000040)={0x18}, 0x18) 21:46:07 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r0, 0x10e, 0x4, &(0x7f0000000040)=0x10004c13, 0x1d9) bind$netlink(r0, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000cecffc), 0x4) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000140)={&(0x7f00000000c0), 0xc, &(0x7f0000000000)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) 21:46:07 executing program 1: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0a5c2d023c126285718070") r1 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_inet_SIOCSIFNETMASK(r1, 0x891c, &(0x7f0000000000)={'veth1_to_team\x00', {0x2, 0x0, @broadcast}}) 21:46:07 executing program 3: syz_open_procfs(0x0, &(0x7f00000002c0)='oom_score_adj\x00') ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) request_key(&(0x7f0000000240)='pkcs7_test\x00', &(0x7f0000000280)={'syz', 0x0}, &(0x7f0000000300)='/\x00', 0xfffffffffffffffe) request_key(&(0x7f00000000c0)='user\x00', &(0x7f0000000100)={'syz'}, &(0x7f0000000200)='vmnet0&#selfbdev&vboxnet0trustedselfeth1#c(vmnet0c^\x00', 0x0) 21:46:07 executing program 4: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = creat(&(0x7f0000000680)='./bus\x00', 0x0) fcntl$setstatus(r1, 0x4, 0x6100) ftruncate(r1, 0x0) r2 = open(&(0x7f00000000c0)='./bus\x00', 0x101002, 0x0) r3 = open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) sendfile(r1, r3, &(0x7f0000d83ff8), 0x8000fffffffe) write$P9_ROPEN(r2, &(0x7f0000000040)={0x18}, 0x18) 21:46:07 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000240)=[{&(0x7f0000000180)="1f0000000203193b000007000000068100023b050900030000004000020058", 0x1f}], 0x1) 21:46:07 executing program 3: syz_open_procfs(0x0, &(0x7f00000002c0)='oom_score_adj\x00') ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) request_key(&(0x7f0000000240)='pkcs7_test\x00', &(0x7f0000000280)={'syz', 0x0}, &(0x7f0000000300)='/\x00', 0xfffffffffffffffe) request_key(&(0x7f00000000c0)='user\x00', &(0x7f0000000100)={'syz'}, &(0x7f0000000200)='vmnet0&#selfbdev&vboxnet0trustedselfeth1#c(vmnet0c^\x00', 0x0) 21:46:07 executing program 0: r0 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000000)={0x10, 0x4}, 0xc, &(0x7f0000000040)={&(0x7f0000000600)=ANY=[@ANYBLOB="00000000000000000800200000000007180012004e6b73608cbd5a228a5fae6c9e00010069703667"], 0x1}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000140)=[{0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000100)}], 0x492492492492805, 0x0) 21:46:07 executing program 3: syz_open_procfs(0x0, &(0x7f00000002c0)='oom_score_adj\x00') ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) request_key(&(0x7f0000000240)='pkcs7_test\x00', &(0x7f0000000280)={'syz', 0x0}, &(0x7f0000000300)='/\x00', 0xfffffffffffffffe) request_key(&(0x7f00000000c0)='user\x00', &(0x7f0000000100)={'syz'}, &(0x7f0000000200)='vmnet0&#selfbdev&vboxnet0trustedselfeth1#c(vmnet0c^\x00', 0x0) 21:46:07 executing program 0: getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000001280)={@remote, @rand_addr}, &(0x7f00000012c0)=0xc) mmap(&(0x7f0000bfd000/0x400000)=nil, 0x400000, 0x1fffffe, 0x8032, 0xffffffffffffffff, 0x0) [ 340.871489] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 21:46:08 executing program 5: r0 = socket$inet6(0xa, 0x803, 0x3) getsockopt$inet6_int(r0, 0x29, 0x4a, &(0x7f0000000200), &(0x7f0000000240)=0x4) 21:46:08 executing program 3: syz_open_procfs(0x0, &(0x7f00000002c0)='oom_score_adj\x00') ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) request_key(&(0x7f0000000240)='pkcs7_test\x00', &(0x7f0000000280)={'syz', 0x0}, &(0x7f0000000300)='/\x00', 0xfffffffffffffffe) request_key(&(0x7f00000000c0)='user\x00', &(0x7f0000000100)={'syz'}, &(0x7f0000000200)='vmnet0&#selfbdev&vboxnet0trustedselfeth1#c(vmnet0c^\x00', 0x0) 21:46:08 executing program 0: r0 = socket$inet(0x10, 0x3, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000100)={'team_slave_1\x00', &(0x7f0000000140)=ANY=[]}) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000180)={'ip6gre0\x00', @ifru_data=&(0x7f00000000c0)="a325d3c91116bf66fed2b246a94500aa6593352d29be1746fd84168b6ef37b32"}) 21:46:08 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'lo\x00@\x00'}) ioctl$EXT4_IOC_GROUP_ADD(0xffffffffffffffff, 0x40286608, &(0x7f0000000040)) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f00000000c0)={'lo\x00', 0xfffffffffffffffb}) 21:46:08 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r0, 0x10e, 0x4, &(0x7f0000000040)=0x10004c13, 0x1d9) bind$netlink(r0, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000cecffc), 0x4) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000140)={&(0x7f00000000c0), 0xc, &(0x7f0000000000)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) 21:46:08 executing program 4: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = creat(&(0x7f0000000680)='./bus\x00', 0x0) fcntl$setstatus(r1, 0x4, 0x6100) ftruncate(r1, 0x0) r2 = open(&(0x7f00000000c0)='./bus\x00', 0x101002, 0x0) r3 = open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) sendfile(r1, r3, &(0x7f0000d83ff8), 0x8000fffffffe) write$P9_ROPEN(r2, &(0x7f0000000040)={0x18}, 0x18) [ 341.390883] device lo left promiscuous mode [ 341.406270] device lo entered promiscuous mode 21:46:08 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$EBT_SO_GET_INFO(r0, 0x0, 0x80, &(0x7f0000000240)={'filter\x00'}, &(0x7f00000002c0)=0x78) 21:46:08 executing program 5: perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x5, 0x108000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) msgrcv(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB], 0xd, 0x0, 0x0) 21:46:08 executing program 3: syz_open_procfs(0x0, &(0x7f00000002c0)='oom_score_adj\x00') ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) request_key(&(0x7f0000000240)='pkcs7_test\x00', &(0x7f0000000280)={'syz', 0x0}, &(0x7f0000000300)='/\x00', 0xfffffffffffffffe) request_key(&(0x7f00000000c0)='user\x00', &(0x7f0000000100)={'syz'}, &(0x7f0000000200)='vmnet0&#selfbdev&vboxnet0trustedselfeth1#c(vmnet0c^\x00', 0x0) 21:46:08 executing program 4: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = creat(&(0x7f0000000680)='./bus\x00', 0x0) fcntl$setstatus(r1, 0x4, 0x6100) ftruncate(r1, 0x0) r2 = open(&(0x7f00000000c0)='./bus\x00', 0x101002, 0x0) r3 = open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) sendfile(r1, r3, &(0x7f0000d83ff8), 0x8000fffffffe) write$P9_ROPEN(r2, &(0x7f0000000040)={0x18}, 0x18) [ 341.431244] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 341.486310] device lo left promiscuous mode 21:46:08 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000080)='/proc/thread-self/attr/current\x00', 0x2, 0x0) write$apparmor_current(r1, &(0x7f0000000280)=ANY=[@ANYBLOB='wtack nodev+*\x00'], 0x1) 21:46:08 executing program 3: syz_open_procfs(0x0, &(0x7f00000002c0)='oom_score_adj\x00') ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) request_key(&(0x7f0000000240)='pkcs7_test\x00', &(0x7f0000000280)={'syz', 0x0}, &(0x7f0000000300)='/\x00', 0xfffffffffffffffe) request_key(&(0x7f00000000c0)='user\x00', &(0x7f0000000100)={'syz'}, &(0x7f0000000200)='vmnet0&#selfbdev&vboxnet0trustedselfeth1#c(vmnet0c^\x00', 0x0) 21:46:08 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r0, 0x10e, 0x4, &(0x7f0000000040)=0x10004c13, 0x1d9) bind$netlink(r0, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000cecffc), 0x4) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000140)={&(0x7f00000000c0), 0xc, &(0x7f0000000000)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) 21:46:08 executing program 3: syz_open_procfs(0x0, &(0x7f00000002c0)='oom_score_adj\x00') ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) request_key(&(0x7f0000000240)='pkcs7_test\x00', &(0x7f0000000280)={'syz', 0x0}, &(0x7f0000000300)='/\x00', 0xfffffffffffffffe) request_key(&(0x7f00000000c0)='user\x00', &(0x7f0000000100)={'syz'}, &(0x7f0000000200)='vmnet0&#selfbdev&vboxnet0trustedselfeth1#c(vmnet0c^\x00', 0x0) 21:46:08 executing program 3: syz_open_procfs(0x0, &(0x7f00000002c0)='oom_score_adj\x00') ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) request_key(&(0x7f0000000240)='pkcs7_test\x00', &(0x7f0000000280)={'syz', 0x0}, &(0x7f0000000300)='/\x00', 0xfffffffffffffffe) request_key(&(0x7f00000000c0)='user\x00', &(0x7f0000000100)={'syz'}, &(0x7f0000000200)='vmnet0&#selfbdev&vboxnet0trustedselfeth1#c(vmnet0c^\x00', 0x0) 21:46:08 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) modify_ldt$write(0x1, &(0x7f0000000040), 0x10) 21:46:08 executing program 3: syz_open_procfs(0x0, &(0x7f00000002c0)='oom_score_adj\x00') ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) request_key(&(0x7f0000000240)='pkcs7_test\x00', &(0x7f0000000280)={'syz', 0x0}, &(0x7f0000000300)='/\x00', 0xfffffffffffffffe) request_key(&(0x7f00000000c0)='user\x00', &(0x7f0000000100)={'syz'}, &(0x7f0000000200)='vmnet0&#selfbdev&vboxnet0trustedselfeth1#c(vmnet0c^\x00', 0x0) 21:46:08 executing program 4: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = creat(&(0x7f0000000680)='./bus\x00', 0x0) fcntl$setstatus(r1, 0x4, 0x6100) ftruncate(r1, 0x8200) r2 = open(&(0x7f00000000c0)='./bus\x00', 0x0, 0x0) r3 = open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) sendfile(r1, r3, &(0x7f0000d83ff8), 0x8000fffffffe) write$P9_ROPEN(r2, &(0x7f0000000040)={0x18}, 0x18) [ 341.887761] device lo entered promiscuous mode [ 341.899603] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 21:46:08 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$EBT_SO_GET_INFO(r0, 0x0, 0x80, &(0x7f0000000240)={'filter\x00'}, &(0x7f00000002c0)=0x26f) [ 342.006143] kauditd_printk_skb: 10 callbacks suppressed [ 342.006159] audit: type=1804 audit(1538430368.873:91): pid=15007 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor4" name="/root/syzkaller-testdir696441687/syzkaller.siB441/112/bus" dev="sda1" ino=16570 res=1 [ 342.036124] audit: type=1804 audit(1538430368.873:92): pid=15007 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor4" name="/root/syzkaller-testdir696441687/syzkaller.siB441/112/bus" dev="sda1" ino=16570 res=1 21:46:09 executing program 5: 21:46:09 executing program 3: syz_open_procfs(0x0, &(0x7f00000002c0)='oom_score_adj\x00') ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) request_key(&(0x7f0000000240)='pkcs7_test\x00', &(0x7f0000000280)={'syz', 0x0}, &(0x7f0000000300)='/\x00', 0xfffffffffffffffe) request_key(&(0x7f00000000c0)='user\x00', &(0x7f0000000100)={'syz'}, &(0x7f0000000200)='vmnet0&#selfbdev&vboxnet0trustedselfeth1#c(vmnet0c^\x00', 0x0) 21:46:09 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r0, 0x10e, 0x4, &(0x7f0000000040)=0x10004c13, 0x1d9) bind$netlink(r0, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000cecffc), 0x4) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000140)={&(0x7f00000000c0), 0xc, &(0x7f0000000000)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) 21:46:09 executing program 1: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x102) write$evdev(r0, &(0x7f0000057fa0)=[{}, {}], 0xfffffd24) close(r0) syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) semctl$IPC_STAT(0x0, 0x0, 0x2, &(0x7f0000000140)) syz_open_dev$evdev(&(0x7f0000000340)='/dev/input/event#\x00', 0x0, 0x0) 21:46:09 executing program 0: 21:46:09 executing program 4: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = creat(&(0x7f0000000680)='./bus\x00', 0x0) fcntl$setstatus(r1, 0x4, 0x6100) ftruncate(r1, 0x8200) r2 = open(&(0x7f00000000c0)='./bus\x00', 0x101002, 0x0) r3 = open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) sendfile(0xffffffffffffffff, r3, &(0x7f0000d83ff8), 0x8000fffffffe) write$P9_ROPEN(r2, &(0x7f0000000040)={0x18}, 0x18) 21:46:09 executing program 0: 21:46:09 executing program 3: syz_open_procfs(0x0, &(0x7f00000002c0)='oom_score_adj\x00') ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) request_key(&(0x7f0000000240)='pkcs7_test\x00', &(0x7f0000000280)={'syz', 0x0}, &(0x7f0000000300)='/\x00', 0xfffffffffffffffe) request_key(&(0x7f00000000c0)='user\x00', &(0x7f0000000100)={'syz'}, &(0x7f0000000200)='vmnet0&#selfbdev&vboxnet0trustedselfeth1#c(vmnet0c^\x00', 0x0) [ 342.402119] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 342.438988] audit: type=1804 audit(1538430369.313:93): pid=15023 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor4" name="/root/syzkaller-testdir696441687/syzkaller.siB441/113/bus" dev="sda1" ino=16573 res=1 21:46:09 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r0) ioctl$BLKBSZGET(0xffffffffffffffff, 0x80081270, &(0x7f0000000200)) ftruncate(0xffffffffffffffff, 0x2081fc) write$P9_RLCREATE(0xffffffffffffffff, &(0x7f0000000000)={0x18}, 0x18) write$P9_RFLUSH(0xffffffffffffffff, &(0x7f0000000040)={0x7, 0x6d, 0x1}, 0x7) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r0, 0x400c6615, &(0x7f0000000240)) r1 = open(&(0x7f0000000480)='./bus\x00', 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x101000, 0x0) bind$inet6(r2, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r2, 0x6) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, &(0x7f0000000440), 0xffffffffffffffba, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) syncfs(0xffffffffffffffff) recvfrom$inet6(r4, &(0x7f0000001840)=""/31, 0xfffffe0e, 0x0, &(0x7f0000001880), 0x1c) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000140), 0xc, &(0x7f0000000280)={&(0x7f0000000300)=ANY=[@ANYBLOB="100000001d00020c2dbd7000ffdbdf2532b23c060000002b38a220187435ab0a15596c152a1f022974c8ff0ae89bffe01ce0c897775b1e82c5dab69d5b9d4646d282b6cfe34fa9170602ef02f2ee9907c886d3f56b3592ccab9203e698f8675163646379e5e7e311b1a45ae1b27bbf41bd840a26cbbfe7572f7af707000000c095f10c016dde62e2817e2baa9ec2f23e1478b25513bfaf080700c855e637c56ec253e57fa514caec344504d816bd747206165d4c721e7612c9a4709057c1f35eea4414c65e2dce411ff534"], 0x1}}, 0x20040854) fcntl$setpipe(r0, 0x407, 0x0) fcntl$getflags(r2, 0x0) r5 = accept4(r2, 0x0, &(0x7f0000000000)=0xfffffffffffffefa, 0x0) ioctl$LOOP_SET_CAPACITY(r3, 0x4c07) sendto$inet6(r5, &(0x7f00000000c0), 0xfffffdda, 0x0, 0x0, 0x1a3) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) write$FUSE_WRITE(r1, &(0x7f0000000080)={0x18}, 0x18) ioctl$sock_inet6_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000400)) 21:46:09 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x35, &(0x7f0000000140)=0x2, 0x4) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000000)=0x178, 0x4) sendto$inet6(r0, &(0x7f0000adb000), 0x0, 0x0, &(0x7f0000809000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) recvfrom$inet6(r0, &(0x7f0000000080)=""/49, 0x31, 0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x0, 0x0, @remote}, 0x709000) 21:46:09 executing program 4: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = creat(&(0x7f0000000680)='./bus\x00', 0x0) fcntl$setstatus(r1, 0x4, 0x6100) ftruncate(r1, 0x8200) r2 = open(&(0x7f00000000c0)='./bus\x00', 0x101002, 0x0) r3 = open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) sendfile(0xffffffffffffffff, r3, &(0x7f0000d83ff8), 0x8000fffffffe) write$P9_ROPEN(r2, &(0x7f0000000040)={0x18}, 0x18) 21:46:09 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r0, 0x10e, 0x4, &(0x7f0000000040)=0x10004c13, 0x1d9) bind$netlink(r0, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000cecffc), 0x4) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f00000000c0), 0xc, &(0x7f0000000000)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) 21:46:09 executing program 3: syz_open_procfs(0x0, &(0x7f00000002c0)='oom_score_adj\x00') ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) request_key(&(0x7f0000000240)='pkcs7_test\x00', &(0x7f0000000280)={'syz', 0x0}, &(0x7f0000000300)='/\x00', 0xfffffffffffffffe) request_key(&(0x7f00000000c0)='user\x00', &(0x7f0000000100)={'syz'}, &(0x7f0000000200)="766d6e657430262373656c66626465762676626f786e6574307472757374656473656c6665746831236328766d6e657430635ea0", 0x0) 21:46:09 executing program 4: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = creat(&(0x7f0000000680)='./bus\x00', 0x0) fcntl$setstatus(r1, 0x4, 0x6100) ftruncate(r1, 0x8200) r2 = open(&(0x7f00000000c0)='./bus\x00', 0x101002, 0x0) r3 = open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) sendfile(0xffffffffffffffff, r3, &(0x7f0000d83ff8), 0x8000fffffffe) write$P9_ROPEN(r2, &(0x7f0000000040)={0x18}, 0x18) [ 342.629453] audit: type=1804 audit(1538430369.493:94): pid=15043 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor4" name="/root/syzkaller-testdir696441687/syzkaller.siB441/114/bus" dev="sda1" ino=16547 res=1 21:46:09 executing program 3: syz_open_procfs(0x0, &(0x7f00000002c0)='oom_score_adj\x00') ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) request_key(&(0x7f0000000240)='pkcs7_test\x00', &(0x7f0000000280)={'syz', 0x0}, &(0x7f0000000300)='/\x00', 0xfffffffffffffffe) request_key(&(0x7f00000000c0)='user\x00', &(0x7f0000000100)={'syz'}, &(0x7f0000000200)='vmnet0&#selfbdev&vboxnet0trustedselfeth1#c(vmnet0c^\n', 0x0) 21:46:09 executing program 1: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x102) write$evdev(r0, &(0x7f0000057fa0)=[{}, {}], 0xfffffd24) close(r0) syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) semctl$IPC_STAT(0x0, 0x0, 0x2, &(0x7f0000000140)) syz_open_dev$evdev(&(0x7f0000000340)='/dev/input/event#\x00', 0x0, 0x0) 21:46:09 executing program 5: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) ioctl$BLKBSZGET(0xffffffffffffffff, 0x80081270, &(0x7f0000000200)) ftruncate(0xffffffffffffffff, 0x2081fc) write$P9_RLCREATE(0xffffffffffffffff, &(0x7f0000000000)={0x18}, 0x18) write$P9_RFLUSH(0xffffffffffffffff, &(0x7f0000000040)={0x7}, 0x7) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r0, 0x400c6615, &(0x7f0000000240)) r1 = open(&(0x7f0000000480)='./bus\x00', 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x101000, 0x0) bind$inet6(r2, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r2, 0x6) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, &(0x7f0000000440), 0xffffffffffffffba, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) syncfs(0xffffffffffffffff) recvfrom$inet6(r4, &(0x7f0000001840)=""/31, 0xfffffe0e, 0x0, &(0x7f0000001880), 0x1c) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000140), 0xc, &(0x7f0000000280)={&(0x7f0000000300)=ANY=[@ANYBLOB="100000001d00020c2dbd7000ffdbdf2532b23c060000002b38a220187435ab0a15596c152a1f022974c8ff0ae89bffe01ce0c897775b1e82c5dab69d5b9d4646d282b6cfe34fa9170602ef02f2ee9907c886d3f56b3592ccab9203e698f8675163646379e5e7e311b1a45ae1b27bbf41bd840a26cbbfe7572f7af707000000c095f10c016dde62e2817e2baa9ec2f23e1478b25513bfaf080700c855e637c56ec253e57fa514caec344504d816bd747206165d4c721e7612c9a4709057c1f35eea4414c65e2dce411ff534c1"], 0x1}}, 0x20040854) fcntl$setpipe(r0, 0x407, 0x1ff000000000) fcntl$getflags(r2, 0x0) r5 = accept4(r2, 0x0, &(0x7f0000000000)=0xfffffffffffffefa, 0x0) ioctl$LOOP_SET_CAPACITY(r3, 0x4c07) sendto$inet6(r5, &(0x7f00000000c0), 0xfffffdda, 0x0, 0x0, 0x1a3) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x3fffa) write$FUSE_WRITE(r1, &(0x7f0000000080)={0x18}, 0x18) ioctl$sock_inet6_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000400)) 21:46:09 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r0, 0x10e, 0x4, &(0x7f0000000040)=0x10004c13, 0x1d9) bind$netlink(r0, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000140)={&(0x7f00000000c0), 0xc, &(0x7f0000000000)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) 21:46:09 executing program 3: syz_open_procfs(0x0, &(0x7f00000002c0)='oom_score_adj\x00') ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) request_key(&(0x7f0000000240)='pkcs7_test\x00', &(0x7f0000000280)={'syz', 0x0}, &(0x7f0000000300)='/\x00', 0xfffffffffffffffe) request_key(&(0x7f00000000c0)='user\x00', &(0x7f0000000100)={'syz'}, &(0x7f0000000200)='vmnet0&#selfbdev&vboxnet0trustedselfeth1#c(vmnet0c^\x00', 0x0) [ 342.796297] audit: type=1804 audit(1538430369.663:95): pid=15067 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor4" name="/root/syzkaller-testdir696441687/syzkaller.siB441/115/bus" dev="sda1" ino=16565 res=1 21:46:09 executing program 4: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = creat(&(0x7f0000000680)='./bus\x00', 0x0) fcntl$setstatus(r1, 0x4, 0x6100) ftruncate(r1, 0x8200) r2 = open(&(0x7f00000000c0)='./bus\x00', 0x101002, 0x0) open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) sendfile(r1, 0xffffffffffffffff, &(0x7f0000d83ff8), 0x8000fffffffe) write$P9_ROPEN(r2, &(0x7f0000000040)={0x18}, 0x18) [ 342.891518] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 342.953241] audit: type=1804 audit(1538430369.823:96): pid=15082 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor4" name="/root/syzkaller-testdir696441687/syzkaller.siB441/116/bus" dev="sda1" ino=16565 res=1 21:46:10 executing program 0: 21:46:10 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r0, 0x10e, 0x4, &(0x7f0000000040)=0x10004c13, 0x1d9) bind$netlink(r0, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000140)={&(0x7f00000000c0), 0xc, &(0x7f0000000000)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) 21:46:10 executing program 4: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = creat(&(0x7f0000000680)='./bus\x00', 0x0) fcntl$setstatus(r1, 0x4, 0x6100) ftruncate(r1, 0x8200) r2 = open(&(0x7f00000000c0)='./bus\x00', 0x101002, 0x0) open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) sendfile(r1, 0xffffffffffffffff, &(0x7f0000d83ff8), 0x8000fffffffe) write$P9_ROPEN(r2, &(0x7f0000000040)={0x18}, 0x18) 21:46:10 executing program 3: syz_open_procfs(0x0, &(0x7f00000002c0)='oom_score_adj\x00') ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) request_key(&(0x7f0000000240)='pkcs7_test\x00', &(0x7f0000000280)={'syz', 0x0}, &(0x7f0000000300)='/\x00', 0xfffffffffffffffe) request_key(&(0x7f00000000c0)='user\x00', &(0x7f0000000100)={'syz'}, &(0x7f0000000200)='vmnet0&#selfbdev&vboxnet0trustedselfeth1#c(vmnet0c^\x00', 0x0) 21:46:10 executing program 1: 21:46:10 executing program 1: 21:46:10 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r0, 0x10e, 0x4, &(0x7f0000000040)=0x10004c13, 0x1d9) bind$netlink(r0, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000140)={&(0x7f00000000c0), 0xc, &(0x7f0000000000)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) [ 343.426130] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 343.447641] audit: type=1804 audit(1538430370.313:97): pid=15106 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor4" name="/root/syzkaller-testdir696441687/syzkaller.siB441/117/bus" dev="sda1" ino=16569 res=1 21:46:10 executing program 0: [ 343.599944] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 21:46:10 executing program 5: 21:46:10 executing program 1: 21:46:10 executing program 4: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = creat(&(0x7f0000000680)='./bus\x00', 0x0) fcntl$setstatus(r1, 0x4, 0x6100) ftruncate(r1, 0x8200) r2 = open(&(0x7f00000000c0)='./bus\x00', 0x101002, 0x0) open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) sendfile(r1, 0xffffffffffffffff, &(0x7f0000d83ff8), 0x8000fffffffe) write$P9_ROPEN(r2, &(0x7f0000000040)={0x18}, 0x18) 21:46:10 executing program 3: syz_open_procfs(0x0, &(0x7f00000002c0)='oom_score_adj\x00') ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) request_key(&(0x7f0000000240)='pkcs7_test\x00', &(0x7f0000000280)={'syz', 0x0}, &(0x7f0000000300)='/\x00', 0xfffffffffffffffe) request_key(&(0x7f00000000c0)='user\x00', &(0x7f0000000100)={'syz'}, &(0x7f0000000200)='vmnet0&#selfbdev&vboxnet0trustedselfeth1#c(vmnet0c^\x00', 0x0) 21:46:10 executing program 0: 21:46:10 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r0, 0x10e, 0x4, &(0x7f0000000040)=0x10004c13, 0x1d9) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000cecffc), 0x4) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000140)={&(0x7f00000000c0), 0xc, &(0x7f0000000000)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) 21:46:10 executing program 0: 21:46:10 executing program 5: [ 343.793134] audit: type=1804 audit(1538430370.663:98): pid=15128 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor4" name="/root/syzkaller-testdir696441687/syzkaller.siB441/118/bus" dev="sda1" ino=16570 res=1 21:46:10 executing program 1: 21:46:10 executing program 4: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = creat(&(0x7f0000000680)='./bus\x00', 0x0) fcntl$setstatus(r1, 0x4, 0x6100) ftruncate(r1, 0x8200) r2 = open(&(0x7f00000000c0)='./bus\x00', 0x101002, 0x0) r3 = open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) sendfile(r1, r3, &(0x7f0000d83ff8), 0x0) write$P9_ROPEN(r2, &(0x7f0000000040)={0x18}, 0x18) [ 343.854420] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 21:46:10 executing program 3: syz_open_procfs(0x0, &(0x7f00000002c0)='oom_score_adj\x00') ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) request_key(&(0x7f0000000240)='pkcs7_test\x00', &(0x7f0000000280)={'syz', 0x0}, &(0x7f0000000300)='/\x00', 0xfffffffffffffffe) request_key(&(0x7f00000000c0)='user\x00', &(0x7f0000000100)={'syz'}, &(0x7f0000000200)='vmnet0&#selfbdev&vboxnet0trustedselfeth1#c(vmnet0c^\x00', 0x0) 21:46:10 executing program 0: 21:46:10 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r0, 0x10e, 0x4, &(0x7f0000000040)=0x10004c13, 0x1d9) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000cecffc), 0x4) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000140)={&(0x7f00000000c0), 0xc, &(0x7f0000000000)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) 21:46:10 executing program 1: [ 343.988638] audit: type=1804 audit(1538430370.863:99): pid=15146 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor4" name="/root/syzkaller-testdir696441687/syzkaller.siB441/119/bus" dev="sda1" ino=16546 res=1 21:46:10 executing program 5: 21:46:10 executing program 4: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = creat(&(0x7f0000000680)='./bus\x00', 0x0) fcntl$setstatus(r1, 0x4, 0x6100) ftruncate(r1, 0x8200) r2 = open(&(0x7f00000000c0)='./bus\x00', 0x101002, 0x0) r3 = open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) sendfile(r1, r3, &(0x7f0000d83ff8), 0x0) write$P9_ROPEN(r2, &(0x7f0000000040)={0x18}, 0x18) 21:46:10 executing program 0: [ 344.064787] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 21:46:11 executing program 3: syz_open_procfs(0x0, &(0x7f00000002c0)='oom_score_adj\x00') ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) request_key(&(0x7f0000000240)='pkcs7_test\x00', &(0x7f0000000280)={'syz', 0x0}, &(0x7f0000000300)='/\x00', 0xfffffffffffffffe) request_key(&(0x7f00000000c0)='user\x00', &(0x7f0000000100)={'syz'}, &(0x7f0000000200)='vmnet0&#selfbdev&vboxnet0trustedselfeth1#c(vmnet0c^\x00', 0x0) 21:46:11 executing program 5: 21:46:11 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r0, 0x10e, 0x4, &(0x7f0000000040)=0x10004c13, 0x1d9) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000cecffc), 0x4) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000140)={&(0x7f00000000c0), 0xc, &(0x7f0000000000)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) 21:46:11 executing program 1: 21:46:11 executing program 3: syz_open_procfs(0x0, &(0x7f00000002c0)='oom_score_adj\x00') ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) request_key(&(0x7f0000000240)='pkcs7_test\x00', &(0x7f0000000280)={'syz', 0x0}, &(0x7f0000000300)='/\x00', 0xfffffffffffffffe) request_key(&(0x7f00000000c0)='user\x00', &(0x7f0000000100)={'syz'}, &(0x7f0000000200)='vmnet0&#selfbdev&vboxnet0trustedselfeth1#c(vmnet0c^\x00', 0x0) 21:46:11 executing program 0: [ 344.217125] audit: type=1804 audit(1538430371.083:100): pid=15168 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor4" name="/root/syzkaller-testdir696441687/syzkaller.siB441/120/bus" dev="sda1" ino=16573 res=1 21:46:11 executing program 5: 21:46:11 executing program 4: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = creat(&(0x7f0000000680)='./bus\x00', 0x0) fcntl$setstatus(r1, 0x4, 0x6100) ftruncate(r1, 0x8200) r2 = open(&(0x7f00000000c0)='./bus\x00', 0x101002, 0x0) r3 = open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) sendfile(r1, r3, &(0x7f0000d83ff8), 0x0) write$P9_ROPEN(r2, &(0x7f0000000040)={0x18}, 0x18) [ 344.309246] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 21:46:11 executing program 1: 21:46:11 executing program 0: 21:46:11 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) bind$netlink(r0, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000cecffc), 0x4) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000140)={&(0x7f00000000c0), 0xc, &(0x7f0000000000)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) 21:46:11 executing program 5: 21:46:11 executing program 3: syz_open_procfs(0x0, &(0x7f00000002c0)='oom_score_adj\x00') ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) request_key(&(0x7f0000000240)='pkcs7_test\x00', &(0x7f0000000280)={'syz', 0x0}, &(0x7f0000000300)='/\x00', 0xfffffffffffffffe) request_key(&(0x7f00000000c0)='user\x00', &(0x7f0000000100)={'syz'}, &(0x7f0000000200)='vmnet0&#selfbdev&vboxnet0trustedselfeth1#c(vmnet0c^\x00', 0x0) 21:46:11 executing program 5: 21:46:11 executing program 0: 21:46:11 executing program 4: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = creat(&(0x7f0000000680)='./bus\x00', 0x0) fcntl$setstatus(r1, 0x4, 0x6100) ftruncate(r1, 0x8200) open(&(0x7f00000000c0)='./bus\x00', 0x101002, 0x0) r2 = open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) sendfile(r1, r2, &(0x7f0000d83ff8), 0x8000fffffffe) write$P9_ROPEN(0xffffffffffffffff, &(0x7f0000000040)={0x18}, 0x18) [ 344.522443] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 21:46:11 executing program 1: 21:46:11 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) bind$netlink(r0, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000cecffc), 0x4) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000140)={&(0x7f00000000c0), 0xc, &(0x7f0000000000)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) 21:46:11 executing program 3: syz_open_procfs(0x0, &(0x7f00000002c0)='oom_score_adj\x00') ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) request_key(&(0x7f0000000240)='pkcs7_test\x00', &(0x7f0000000280)={'syz', 0x0}, &(0x7f0000000300)='/\x00', 0xfffffffffffffffe) request_key(&(0x7f00000000c0)='user\x00', &(0x7f0000000100)={'syz'}, &(0x7f0000000200)="766d6e657430262373656c66626465762676626f786e6574307472757374656473656c6665746831236328766d6e657430635e03", 0x0) 21:46:11 executing program 5: 21:46:11 executing program 0: 21:46:11 executing program 1: 21:46:11 executing program 0: 21:46:11 executing program 5: [ 344.741846] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 21:46:11 executing program 3: syz_open_procfs(0x0, &(0x7f00000002c0)='oom_score_adj\x00') ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) request_key(&(0x7f0000000240)='pkcs7_test\x00', &(0x7f0000000280)={'syz', 0x0}, &(0x7f0000000300)='/\x00', 0xfffffffffffffffe) request_key(&(0x7f00000000c0)='user\x00', &(0x7f0000000100)={'syz'}, &(0x7f0000000200)='vmnet0&#selfbdev&vboxnet0trustedselfeth1#c(vmnet0c^\x00', 0x0) 21:46:11 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) bind$netlink(r0, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000cecffc), 0x4) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000140)={&(0x7f00000000c0), 0xc, &(0x7f0000000000)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) 21:46:11 executing program 4: 21:46:11 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x12, 0x8, &(0x7f0000000140)=ANY=[@ANYBLOB="7a0af8ff00000000bfa100000000000007010000f8ffffffb702000008000000bd120000000000008500000006000000b7000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0xa}, 0x48) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000003c0), 0x4) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000640)={0xffffffffffffff9c, 0x10, &(0x7f0000000600)={&(0x7f0000000580)=""/78, 0x4e}}, 0x10) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00syz1\x00', 0x200002, 0x0) gettid() bpf$BPF_PROG_ATTACH(0x8, &(0x7f00000000c0)={r1, r0, 0xa}, 0x10) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000480)) ioctl$TUNGETIFF(r1, 0x800454d2, &(0x7f0000000440)) close(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000380)) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000340)={0xffffffffffffffff, 0x10, &(0x7f0000000300)={&(0x7f0000000240)=""/141, 0x8d, 0xffffffffffffffff}}, 0x10) 21:46:11 executing program 0: 21:46:11 executing program 4: 21:46:11 executing program 1: [ 344.976868] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 21:46:11 executing program 3: syz_open_procfs(0x0, &(0x7f00000002c0)='oom_score_adj\x00') ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) request_key(&(0x7f0000000240)='pkcs7_test\x00', &(0x7f0000000280)={'syz', 0x0}, &(0x7f0000000300)='/\x00', 0xfffffffffffffffe) request_key(&(0x7f00000000c0)='user\x00', &(0x7f0000000100)={'syz'}, &(0x7f0000000200)="766d6e657430262373656c66626465762676626f786e6574307472757374656473656c6665746831236328766d6e657430635eff", 0x0) 21:46:11 executing program 4: 21:46:12 executing program 0: 21:46:12 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r0) r1 = creat(&(0x7f00000002c0)='./bus\x00', 0x0) ftruncate(r1, 0x2081fc) r2 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x3000)=nil, 0x3000, 0x800002, 0x11, r2, 0x0) r3 = socket$inet6(0xa, 0x1000000000002, 0x0) fstat(r3, &(0x7f0000005000)) 21:46:12 executing program 2: setsockopt$netlink_NETLINK_BROADCAST_ERROR(0xffffffffffffffff, 0x10e, 0x4, &(0x7f0000000040)=0x10004c13, 0x1d9) bind$netlink(0xffffffffffffffff, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x8, &(0x7f0000cecffc), 0x4) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={&(0x7f00000000c0), 0xc, &(0x7f0000000000)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) 21:46:12 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x8) connect$inet6(r0, &(0x7f0000000300), 0x1c) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f00000003c0)="b10b8a86", 0x4}], 0x1, &(0x7f0000000200)}, 0x0) setsockopt$inet6_int(r0, 0x29, 0x4a, &(0x7f0000000000)=0xe2b, 0x4) recvmsg(r0, &(0x7f0000000140)={&(0x7f0000000040)=@can, 0x80, &(0x7f00000037c0), 0x0, &(0x7f0000003880)=""/40, 0x28}, 0x0) 21:46:12 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r1) r2 = creat(&(0x7f0000000080)='./bus\x00', 0x0) fcntl$setstatus(r2, 0x4, 0x6100) ftruncate(r2, 0x8200) r3 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r3, 0x0) ioctl$TCGETS(r2, 0x5401, &(0x7f0000000040)) lstat(&(0x7f0000002b80)='./bus\x00', &(0x7f0000002bc0)) r4 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) sendfile(r2, r5, &(0x7f0000d83ff8), 0x8000ffffffff) 21:46:12 executing program 3: syz_open_procfs(0x0, &(0x7f00000002c0)='oom_score_adj\x00') ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) request_key(&(0x7f0000000240)='pkcs7_test\x00', &(0x7f0000000280)={'syz', 0x0}, &(0x7f0000000300)='/\x00', 0xfffffffffffffffe) request_key(&(0x7f00000000c0)='user\x00', &(0x7f0000000100)={'syz'}, &(0x7f0000000200)='vmnet0&#selfbdev&vboxnet0trustedselfeth1#c(vmnet0c^\x00', 0x0) [ 345.320660] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 21:46:12 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x12, 0x8, &(0x7f0000000140)=ANY=[@ANYBLOB="7a0af8ff00000000bfa100000000000007010000f8ffffffb702000008000000bd120000000000008500000006000000b7000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0xa}, 0x48) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000003c0), 0x4) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000640)={0xffffffffffffff9c, 0x10, &(0x7f0000000600)={&(0x7f0000000580)=""/78, 0x4e}}, 0x10) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00syz1\x00', 0x200002, 0x0) gettid() bpf$BPF_PROG_ATTACH(0x8, &(0x7f00000000c0)={r1, r0, 0xa}, 0x10) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000480)) ioctl$TUNGETIFF(r1, 0x800454d2, &(0x7f0000000440)) close(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000380)) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000340)={0xffffffffffffffff, 0x10, &(0x7f0000000300)={&(0x7f0000000240)=""/141, 0x8d, 0xffffffffffffffff}}, 0x10) 21:46:12 executing program 1: r0 = timerfd_create(0x0, 0x0) r1 = socket$inet6(0xa, 0x803, 0x7) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0a5c2d023c126285718070") clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000240), 0xffffffffffffffff) wait4(0x0, &(0x7f00000003c0), 0x80000000, &(0x7f0000000100)) socket$inet(0x2, 0x0, 0x0) write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000280)=ANY=[], 0x0) timerfd_settime(r0, 0x3, &(0x7f00000000c0)={{0x0, 0x989680}, {0x0, 0x989680}}, &(0x7f0000000000)) read(r0, &(0x7f0000000100)=""/134, 0x86) 21:46:12 executing program 4: clone(0x4, &(0x7f0000000040)="84c4e6260ad4f997c5f0c34b76cccee168c2e0816d1a56098c0942de65c6c22ccf7119ed28c563677cdfecebf9834029", &(0x7f0000000100), &(0x7f0000000140), &(0x7f0000000180)) utimes(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)={{0x0, 0x2710}}) creat(&(0x7f0000000000)='./file0\x00', 0x80) 21:46:12 executing program 2: setsockopt$netlink_NETLINK_BROADCAST_ERROR(0xffffffffffffffff, 0x10e, 0x4, &(0x7f0000000040)=0x10004c13, 0x1d9) bind$netlink(0xffffffffffffffff, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x8, &(0x7f0000cecffc), 0x4) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={&(0x7f00000000c0), 0xc, &(0x7f0000000000)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) [ 345.625876] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 21:46:12 executing program 3: syz_open_procfs(0x0, &(0x7f00000002c0)='oom_score_adj\x00') ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) request_key(&(0x7f0000000240)='pkcs7_test\x00', &(0x7f0000000280)={'syz', 0x0}, &(0x7f0000000300)='/\x00', 0xfffffffffffffffe) request_key(&(0x7f00000000c0)='user\x00', &(0x7f0000000100)={'syz'}, &(0x7f0000000200)='vmnet0&#selfbdev&vboxnet0trustedselfeth1#c(vmnet0c^\a', 0x0) 21:46:12 executing program 0: r0 = perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0xfff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f00000000c0)=0x3) 21:46:12 executing program 5: socket(0x0, 0x0, 0x0) clone(0x210007fa, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) creat(&(0x7f0000000000)='./file0\x00', 0x0) bind(0xffffffffffffffff, &(0x7f00000045c0)=@pppol2tp, 0x80) sched_setscheduler(0x0, 0x5, &(0x7f0000000200)) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x2000000000000072, &(0x7f00000003c0)=@raw=[@jmp={0x9}], &(0x7f0000000180)="170a00eaf43d86d1afd96c158f5efd119fd301015a3f79cc6777658c0ba224ea5918becd1b74a7a7f027696116d1bbb1d7ccbb0c013eec1a32073757c05e50b1c4ace41c8db08f13e892a11120e7de369b827e5b59ca82731176161c9353", 0x5, 0xffffffffffffffd6, &(0x7f0000000480)=""/195}, 0x48) unlink(&(0x7f0000000640)='./file0\x00') setfsuid(0x0) io_setup(0x6, &(0x7f0000000680)) getresuid(&(0x7f0000000400), &(0x7f0000000740), &(0x7f0000000780)) 21:46:12 executing program 0: r0 = perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0xfff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f00000000c0)=0x3) 21:46:12 executing program 2: setsockopt$netlink_NETLINK_BROADCAST_ERROR(0xffffffffffffffff, 0x10e, 0x4, &(0x7f0000000040)=0x10004c13, 0x1d9) bind$netlink(0xffffffffffffffff, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x8, &(0x7f0000cecffc), 0x4) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={&(0x7f00000000c0), 0xc, &(0x7f0000000000)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) 21:46:12 executing program 4: r0 = syz_open_dev$sg(&(0x7f0000000240)='/dev/sg#\x00', 0x0, 0x5) write$binfmt_misc(r0, &(0x7f0000000440)=ANY=[@ANYBLOB="5300000044a6aeabec2e020017000000001415080000000013db98200000000040000000000000006e4cb4a3e4c8a187c3f12f99ec00000000b8188e23061291cdaf72dd9a0000b1c682730e590849d92a873dd3531e60c0"], 0x58) 21:46:12 executing program 0: mkdir(&(0x7f0000000080)='./file0\x00', 0x12) r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0xffffffffffffffff, 0x94011, r0, 0x0) write$P9_RCLUNK(0xffffffffffffffff, &(0x7f0000000040)={0x7}, 0x7) 21:46:12 executing program 3: syz_open_procfs(0x0, &(0x7f00000002c0)='oom_score_adj\x00') ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) request_key(&(0x7f0000000240)='pkcs7_test\x00', &(0x7f0000000280)={'syz', 0x0}, &(0x7f0000000300)='/\x00', 0xfffffffffffffffe) request_key(&(0x7f00000000c0)='user\x00', &(0x7f0000000100)={'syz'}, &(0x7f0000000200)="766d6e657430262373656c66626465762676626f786e6574307472757374656473656c6665746831236328766d6e657430635efe", 0x0) 21:46:12 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x1d) write(r0, &(0x7f0000000040), 0x0) close(r0) [ 345.877346] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 21:46:13 executing program 1: r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000280)='ns/uts\x00') setns(r0, 0x4000000) 21:46:13 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_BROADCAST_ERROR(0xffffffffffffffff, 0x10e, 0x4, &(0x7f0000000040)=0x10004c13, 0x1d9) bind$netlink(r0, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000cecffc), 0x4) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000140)={&(0x7f00000000c0), 0xc, &(0x7f0000000000)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) 21:46:13 executing program 3: syz_open_procfs(0x0, &(0x7f00000002c0)='oom_score_adj\x00') ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) request_key(&(0x7f0000000240)='pkcs7_test\x00', &(0x7f0000000280)={'syz', 0x0}, &(0x7f0000000300)='/\x00', 0xfffffffffffffffe) request_key(&(0x7f00000000c0)='user\x00', &(0x7f0000000100)={'syz'}, &(0x7f0000000200)='vmnet0&#selfbdev&vboxnet0trustedselfeth1#c(vmnet0c^\x00', 0x0) 21:46:13 executing program 0: r0 = socket$inet6(0xa, 0x1080000000002, 0x0) ioctl(r0, 0x4000100000008912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f000014f000)={&(0x7f00003c7ff4), 0xc, &(0x7f00000bfff0)={&(0x7f0000006440)=@updpolicy={0xb8, 0x19, 0x1, 0x0, 0x0, {{@in6=@mcast1, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0xa}}}, 0xb8}}, 0x0) 21:46:13 executing program 5: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x100000c7, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/igmp6\x00') preadv(r0, &(0x7f0000000480), 0x100000000000022c, 0x6c00000000000000) 21:46:13 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket(0xa, 0x1, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'bridge0\x00'}) sendmsg$nl_route(r2, &(0x7f0000000180)={&(0x7f0000000000), 0xc, &(0x7f0000000140)={&(0x7f00000000c0)=ANY=[@ANYBLOB="0000000000000000140012000c000100627269646765000004000200"], 0x1}}, 0x0) 21:46:13 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000010000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0x0, 0xe, 0xd0, &(0x7f0000000140)="7c9048ad8922a2d10b330ae476da", &(0x7f0000000980)=""/208}, 0x28) 21:46:13 executing program 3: syz_open_procfs(0x0, &(0x7f00000002c0)='oom_score_adj\x00') ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) request_key(&(0x7f0000000240)='pkcs7_test\x00', &(0x7f0000000280)={'syz', 0x0}, &(0x7f0000000300)='/\x00', 0xfffffffffffffffe) request_key(&(0x7f00000000c0)='user\x00', &(0x7f0000000100)={'syz'}, &(0x7f0000000200)='vmnet0&#selfbdev&vboxnet0trustedselfeth1#c(vmnet0c^\x00', 0x0) [ 346.413506] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 21:46:13 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_CPUID(r2, 0x4008ae8a, &(0x7f0000000240)={0x1, 0x0, [{0x80000001}]}) set_mempolicy(0x0, &(0x7f0000000100), 0x0) 21:46:13 executing program 0: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0x3e0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) 21:46:13 executing program 3: syz_open_procfs(0x0, &(0x7f00000002c0)='oom_score_adj\x00') ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) request_key(&(0x7f0000000240)='pkcs7_test\x00', &(0x7f0000000280)={'syz', 0x0}, &(0x7f0000000300)='/\x00', 0xfffffffffffffffe) request_key(&(0x7f00000000c0)='user\x00', &(0x7f0000000100)={'syz'}, &(0x7f0000000200)='vmnet0&#selfbdev&vboxnet0trustedselfeth1#c(vmnet0c^\x00', 0x0) 21:46:13 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_BROADCAST_ERROR(0xffffffffffffffff, 0x10e, 0x4, &(0x7f0000000040)=0x10004c13, 0x1d9) bind$netlink(r0, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000cecffc), 0x4) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000140)={&(0x7f00000000c0), 0xc, &(0x7f0000000000)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) 21:46:13 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r1 = socket$inet(0x2, 0x3, 0x800000000000b) setsockopt$EBT_SO_SET_ENTRIES(r1, 0xfc08000000000000, 0x80, &(0x7f0000000180)=@nat={'nat\x00', 0x19, 0x1, 0x138, [0x20000640, 0x0, 0x0, 0x20000670, 0x200006a0], 0x0, &(0x7f0000000140), &(0x7f0000000640)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x38010000}, {}, {0x0, '\x00', 0x0, 0x0, 0x1, [{{{0x19, 0x0, 0x0, 'veth1_to_bond\x00', 'vcan0\x00', 'syzkaller0\x00', 'bpq0\x00', @local, [], @random="fc1cb525cbc8", [], 0x70, 0x70, 0xa8}}, @snat={'snat\x00', 0x10, {{@dev}}}}]}]}, 0x1b0) 21:46:13 executing program 0: socket$inet6(0xa, 0x0, 0x0) r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000400)="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", 0xfc) 21:46:13 executing program 5: r0 = socket$inet6(0xa, 0x202000000802, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000f68000)={@dev, 0x800, 0x0, 0xff, 0x8001}, 0x20) r1 = socket$inet6(0xa, 0x802, 0x0) ioctl$FS_IOC_GETVERSION(0xffffffffffffffff, 0x80087601, &(0x7f0000000100)) r2 = socket$inet6(0xa, 0x803, 0x3) ioctl(r2, 0x1000008912, &(0x7f0000000000)="0a5c3d023c126285718070") connect$inet6(r1, &(0x7f0000000380), 0x1c) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000040)={@loopback, 0x800, 0x2}, 0x20) [ 346.684286] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 21:46:13 executing program 3: syz_open_procfs(0x0, &(0x7f00000002c0)='oom_score_adj\x00') ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) request_key(&(0x7f0000000240)='pkcs7_test\x00', &(0x7f0000000280)={'syz', 0x0}, &(0x7f0000000300)='/\x00', 0xfffffffffffffffe) request_key(&(0x7f00000000c0)='user\x00', &(0x7f0000000100)={'syz'}, &(0x7f0000000200)='vmnet0&#selfbdev&vboxnet0trustedselfeth1#c(vmnet0c^t', 0x0) 21:46:13 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x2a7, &(0x7f00000000c0)=@raw=[@jmp], &(0x7f0000f6bffb)='GPL\x00', 0x3, 0xfb, &(0x7f00001a7f05)=""/251}, 0x48) [ 346.734592] kernel msg: ebtables bug: please report to author: nentries does not equal the nr of entries in the chain 21:46:13 executing program 1: r0 = socket$inet6(0xa, 0x3, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0a5c2d023c126285718070") r1 = socket$inet6(0xa, 0x3, 0x5) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000040)={@mcast2, 0x0, 0x0, 0xff, 0x1}, 0x20) socket$inet6(0xa, 0x0, 0x0) close(r1) 21:46:13 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_BROADCAST_ERROR(0xffffffffffffffff, 0x10e, 0x4, &(0x7f0000000040)=0x10004c13, 0x1d9) bind$netlink(r0, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000cecffc), 0x4) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000140)={&(0x7f00000000c0), 0xc, &(0x7f0000000000)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) 21:46:13 executing program 4: r0 = socket(0x10, 0x802, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000080)={'bond0\x00', &(0x7f0000000040)=@ethtool_cmd={0x49}}) 21:46:13 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={&(0x7f00000000c0), 0xc, &(0x7f0000000040)={&(0x7f0000000200)={0x14, 0x6, 0x1, 0x2000000000000001}, 0x14}}, 0x0) 21:46:13 executing program 0: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f0000000200)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r1, &(0x7f00000bd000), 0x33, 0x403fc) close(r0) [ 346.911888] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 21:46:13 executing program 3: syz_open_procfs(0x0, &(0x7f00000002c0)='oom_score_adj\x00') ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) request_key(&(0x7f0000000240)='pkcs7_test\x00', &(0x7f0000000280)={'syz', 0x0}, &(0x7f0000000300)='/\x00', 0xfffffffffffffffe) request_key(&(0x7f00000000c0)='user\x00', &(0x7f0000000100)={'syz'}, &(0x7f0000000200)="766d6e657430262373656c66626465762676626f786e6574307472757374656473656c6665746831236328766d6e657430635e02", 0x0) 21:46:13 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r0, 0x10e, 0x4, &(0x7f0000000040), 0x1d9) bind$netlink(r0, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000cecffc), 0x4) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000140)={&(0x7f00000000c0), 0xc, &(0x7f0000000000)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) 21:46:13 executing program 1: r0 = socket$inet6(0xa, 0x3, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0a5c2d023c126285718070") r1 = socket$inet6(0xa, 0x3, 0x5) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000040)={@mcast2, 0x0, 0x0, 0xff, 0x1}, 0x20) socket$inet6(0xa, 0x0, 0x0) close(r1) 21:46:13 executing program 4: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x1100082) r1 = memfd_create(&(0x7f0000000080)="74086e750000000000000000008c00", 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, "7001e0f57c8cf6270b24e415e96042aae51d871554c11cd59cc8fb47081025bad6b39d778066f9d1ac8a570e3a42f70a7c0f30f66157a96aae15813f0dceb297", "a8a4cd01e527e6fd3de45387daf7b1ac786d0e8a75e89046550fa2d2d25b60361fe06f308fe6033a61edb75c8d51c055faf7f4fdb16e0cdaa4276939a3410334", "7b8ddcc0c891591c4116893616105829576914e70bfed06d00f97c97644ab8a7"}) 21:46:13 executing program 5: socket$inet_tcp(0x2, 0x1, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) recvfrom$packet(r0, &(0x7f00000000c0)=""/4096, 0x1000, 0x0, &(0x7f00000010c0)={0x11, 0x4, 0x0, 0x1, 0x0, 0x6, @dev}, 0x14) ioctl$sock_SIOCGIFINDEX(r0, 0x8906, &(0x7f0000000080)={"626f6e645f7391a576655f3000"}) 21:46:14 executing program 3: syz_open_procfs(0x0, &(0x7f00000002c0)='oom_score_adj\x00') ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) request_key(&(0x7f0000000240)='pkcs7_test\x00', &(0x7f0000000280)={'syz', 0x0}, &(0x7f0000000300)='/\x00', 0xfffffffffffffffe) request_key(&(0x7f00000000c0)='user\x00', &(0x7f0000000100)={'syz'}, &(0x7f0000000200)='vmnet0&#selfbdev&vboxnet0trustedselfeth1#c(vmnet0c^H', 0x0) 21:46:14 executing program 0: r0 = socket(0x10, 0x3, 0x0) recvmsg(r0, &(0x7f0000000780)={0x0, 0x0, &(0x7f0000000640), 0x260, &(0x7f0000000700)=""/118, 0x76}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000200)={&(0x7f0000000240), 0xc, &(0x7f0000000280)={&(0x7f0000000900)=@getroute={0x14, 0x1a, 0x1c974209d04c2781}, 0x14}}, 0x0) recvfrom$inet(r0, &(0x7f0000000000)=""/67, 0x43, 0x0, 0x0, 0x0) [ 347.147933] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 21:46:14 executing program 1: r0 = socket$inet6(0xa, 0x3, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0a5c2d023c126285718070") r1 = socket$inet6(0xa, 0x3, 0x5) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000040)={@mcast2, 0x0, 0x0, 0xff, 0x1}, 0x20) socket$inet6(0xa, 0x0, 0x0) close(r1) 21:46:14 executing program 4: unshare(0x24020400) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000200)={&(0x7f00000001c0)='./file0\x00', r0}, 0x10) 21:46:14 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r0, 0x10e, 0x4, &(0x7f0000000040), 0x1d9) bind$netlink(r0, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000cecffc), 0x4) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000140)={&(0x7f00000000c0), 0xc, &(0x7f0000000000)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) 21:46:14 executing program 3: syz_open_procfs(0x0, &(0x7f00000002c0)='oom_score_adj\x00') ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) request_key(&(0x7f0000000240)='pkcs7_test\x00', &(0x7f0000000280)={'syz', 0x0}, &(0x7f0000000300)='/\x00', 0xfffffffffffffffe) request_key(&(0x7f00000000c0)='user\x00', &(0x7f0000000100)={'syz'}, &(0x7f0000000200)='vmnet0&#selfbdev&vboxnet0trustedselfeth1#c(vmnet0c^\x00', 0x0) 21:46:14 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0xc7}, 0x2bb) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1}]}, &(0x7f0000f6bffb)='GPL\x00', 0x83, 0xfb, &(0x7f00001a7f05)=""/251}, 0x48) 21:46:14 executing program 3: syz_open_procfs(0x0, &(0x7f00000002c0)='oom_score_adj\x00') ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) request_key(&(0x7f0000000240)='pkcs7_test\x00', &(0x7f0000000280)={'syz', 0x0}, &(0x7f0000000300)='/\x00', 0xfffffffffffffffe) request_key(&(0x7f00000000c0)='user\x00', &(0x7f0000000100)={'syz'}, &(0x7f0000000200)='vmnet0&#selfbdev&vboxnet0trustedselfeth1#c(vmnet0c^\x00', 0x0) 21:46:14 executing program 0: ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000600)) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000500)='/dev/zero\x00', 0x610000, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0xffffffffffffff81) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ppp\x00', 0x2000, 0x0) write$FUSE_DIRENT(r1, &(0x7f0000000940)=ANY=[@ANYBLOB="38000000f4ffddff050000000000000001000000000000000300002f017000000044ded8e8aea02979325421411f6a8c0f3fc3b05385856fee46d10a12b3d8848f2d124e33a3d85b767f678cad1aed2f68f3b4d71d255081e0e30f4ac4dcaa713cca5ab1264c52fd2fbfc285d52f25dbab2868940c302a90ab890df1765cf8b6753d7c7f75a04bc444eef335720735bf88230ba55da82b393ac8cb757e8f0252eccb00000000000000000000004ebe7ba4eb45d8e18d701e2a17353f6e2ce812cb0694e1c271cbd3ad5278e5817a53226e371983efab0b4fcd4756aa30559859c94644702b0a3af431fc031e8f46a2a77e4537b84eaed3189df3de82b41ddec85fb93fbdb35d4660a01b3c60d5e957c43de7f90b0a83a5978136d5e0e83ff3161d7ba4c95c59927c67d312abdc1aaac97d0e481362d2db13806d391fa8ce808be704516fbd9982b67e36c7b2"], 0x14c) ioctl$TIOCGSID(r1, 0x5429, &(0x7f0000000680)=0x0) rt_tgsigqueueinfo(r2, 0x0, 0x0, &(0x7f00000006c0)={0x11, 0x0, 0x4b2d}) r3 = socket$inet6(0xa, 0x2, 0x0) fcntl$setlease(r1, 0x400, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x601, 0x0) setsockopt$inet6_udp_int(r3, 0x11, 0x6f, &(0x7f0000000180)=0x1, 0x4) prctl$setfpexc(0xc, 0x40000) getsockopt$inet6_mreq(r3, 0x29, 0x1c, &(0x7f0000000440)={@mcast1}, &(0x7f0000000480)=0x14) connect$inet6(0xffffffffffffffff, &(0x7f00000001c0)={0xa, 0x2, 0xfffffffffffffffe, @ipv4={[], [], @local}}, 0x1c) ioctl$EVIOCSKEYCODE(r1, 0x40084504, &(0x7f0000000380)=[0xe3, 0x80000001]) r4 = syz_open_dev$sndtimer(&(0x7f0000000000)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r4, 0x40345410, &(0x7f0000000040)={{0x1}}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)) r5 = syz_open_procfs(r2, &(0x7f0000000200)="6e65742f6970365f666c6f776c6162656c006ec03114893458edc1c9d8dc4b0d8dae982640d0e60400d7ff596e1c92de0eaa311f0a4d43697c2bcd77f017365af160acf33bd66432ebe50c0e8bdaf7fc39feff34ef27a1397193227f4733c145e66536c6c275112520e72b3097843b5cdac480c3b1384ebf592505f88589fcd2d7000000") sendfile(r5, r5, &(0x7f00000002c0)=0x202, 0xd9) [ 347.358883] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 21:46:14 executing program 4: mkdir(&(0x7f0000000100)='./control\x00', 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mkdir(&(0x7f0000000040)='./file0/file0\x00', 0x0) rename(&(0x7f0000000080)='./file0/file0\x00', &(0x7f00000000c0)='./control/file0\x00') 21:46:14 executing program 1: r0 = socket$inet6(0xa, 0x3, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0a5c2d023c126285718070") r1 = socket$inet6(0xa, 0x3, 0x5) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000040)={@mcast2, 0x0, 0x0, 0xff, 0x1}, 0x20) socket$inet6(0xa, 0x0, 0x0) close(r1) 21:46:14 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x1100082) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "7001e0f57c8cf6270b24e415e96042aae51d871554c11cd59cc8fb47081025bad6b39d778066f9d1ac8a570e3a42f70a7c0f30f66157a96aae15813f0dceb297", "a8a4cd01e527e6fd3de45387daf7b1ac786d0e8a75e89046550fa2d2d25b60361fe06f308fe6033a61edb75c8d51c055faf7f4fdb16e0cdaa4276939a3410334", "7b8ddcc0c891591c4116893616105829576914e70bfed06d00f97c97644ab8a7"}) mkdir(&(0x7f0000000100)='./file0\x00', 0x80) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) 21:46:14 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r0, 0x10e, 0x4, &(0x7f0000000040), 0x1d9) bind$netlink(r0, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000cecffc), 0x4) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000140)={&(0x7f00000000c0), 0xc, &(0x7f0000000000)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) 21:46:14 executing program 0: r0 = socket$inet6(0xa, 0x802, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2, 0x1}, 0x1c) 21:46:14 executing program 3: syz_open_procfs(0x0, &(0x7f00000002c0)='oom_score_adj\x00') ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) request_key(&(0x7f0000000240)='pkcs7_test\x00', &(0x7f0000000280)={'syz', 0x0}, &(0x7f0000000300)='/\x00', 0xfffffffffffffffe) request_key(&(0x7f00000000c0)='user\x00', &(0x7f0000000100)={'syz'}, &(0x7f0000000200)='vmnet0&#selfbdev&vboxnet0trustedselfeth1#c(vmnet0c^z', 0x0) 21:46:14 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) recvfrom$packet(r0, &(0x7f0000001100)=""/4096, 0x1000, 0x40, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x14) 21:46:14 executing program 1: r0 = socket$inet6(0xa, 0x3, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0a5c2d023c126285718070") r1 = socket$inet6(0xa, 0x3, 0x5) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000040)={@mcast2, 0x0, 0x0, 0xff, 0x1}, 0x20) close(r1) 21:46:14 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r0, 0x10e, 0x1, &(0x7f00000001c0), 0x2) 21:46:14 executing program 3: syz_open_procfs(0x0, &(0x7f00000002c0)='oom_score_adj\x00') ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) request_key(&(0x7f0000000240)='pkcs7_test\x00', &(0x7f0000000280)={'syz', 0x0}, &(0x7f0000000300)='/\x00', 0xfffffffffffffffe) request_key(&(0x7f00000000c0)='user\x00', &(0x7f0000000100)={'syz'}, &(0x7f0000000200)='vmnet0&#selfbdev&vboxnet0trustedselfeth1#c(vmnet0c^\x00', 0x0) 21:46:14 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000002740)={0xa, 0x0, 0x0, @dev, 0x4}, 0x79) sendmmsg(r0, &(0x7f0000007e00), 0x136a88c8311572c, 0x11) socketpair(0x0, 0x0, 0xfffffffffffffffa, &(0x7f0000000000)={0xffffffffffffffff}) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(r1, 0x10e, 0x2, &(0x7f0000000040)=0x2, 0x4) [ 347.672297] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 21:46:14 executing program 1: r0 = socket$inet6(0xa, 0x3, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0a5c2d023c126285718070") r1 = socket$inet6(0xa, 0x3, 0x5) close(r1) 21:46:14 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000002c0)={"0000000000000000000000000200", 0x5101}) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000100)={&(0x7f00000000c0), 0xc, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) write$binfmt_aout(r0, &(0x7f0000000400)=ANY=[@ANYBLOB="0004010000005ac6e4dd50"], 0xb) 21:46:14 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r0, 0x10e, 0x4, &(0x7f0000000040)=0x10004c13, 0x1d9) bind$netlink(0xffffffffffffffff, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000cecffc), 0x4) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000140)={&(0x7f00000000c0), 0xc, &(0x7f0000000000)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) 21:46:14 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000280)='net\x00\b\x00\x00\x00\x00\x00\x00\x00') getdents64(r0, &(0x7f00000002c0)=""/140, 0x11f) 21:46:14 executing program 3: syz_open_procfs(0x0, &(0x7f00000002c0)='oom_score_adj\x00') ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) request_key(&(0x7f0000000240)='pkcs7_test\x00', &(0x7f0000000280)={'syz', 0x0}, &(0x7f0000000300)='/\x00', 0xfffffffffffffffe) request_key(&(0x7f00000000c0)='user\x00', &(0x7f0000000100)={'syz'}, &(0x7f0000000200)='vmnet0&#selfbdev&vboxnet0trustedselfeth1#c(vmnet0c^\x00', 0x0) 21:46:14 executing program 5: mkdir(&(0x7f00000013c0)='./file0/\x00', 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x0, 0x0, 0x32}, 0x2c) mount(&(0x7f0000000200)=ANY=[], &(0x7f0000000140)='./file0/\x00', &(0x7f00000000c0)="70726f63009b6a2c823f92ab1d5b2f50155c21b4ddadd9060079216becc16f47afb3aec6b4d757eac0a6344afd1ce9d561075c31c4142aa5bf61c3ae458640c0ec61baa4c00d684cd95e0be68153c4adca5e45190c3a26a50c41d793a4a983e9", 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0/', 0x0) [ 347.875485] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 347.899137] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 21:46:14 executing program 0: r0 = open$dir(&(0x7f0000000040)='.\x00', 0x0, 0x0) getdents64(r0, &(0x7f0000000000)=""/2, 0xfffffffffffffd11) close(r0) 21:46:14 executing program 3: syz_open_procfs(0x0, &(0x7f00000002c0)='oom_score_adj\x00') ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) request_key(&(0x7f0000000240)='pkcs7_test\x00', &(0x7f0000000280)={'syz', 0x0}, &(0x7f0000000300)='/\x00', 0xfffffffffffffffe) request_key(&(0x7f00000000c0)='user\x00', &(0x7f0000000100)={'syz'}, &(0x7f0000000200)='vmnet0&#selfbdev&vboxnet0trustedselfeth1#c(vmnet0c^\x00', 0x0) 21:46:14 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='\x00\x00\x00') getdents64(r0, &(0x7f0000000080)=""/153, 0x1d) getdents64(r0, &(0x7f0000000000)=""/13, 0x1f) 21:46:14 executing program 0: 21:46:14 executing program 1: r0 = socket$inet6(0xa, 0x3, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0a5c2d023c126285718070") r1 = socket$inet6(0xa, 0x3, 0x5) close(r1) [ 348.030314] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 348.065952] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 21:46:15 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r0, 0x10e, 0x4, &(0x7f0000000040)=0x10004c13, 0x1d9) bind$netlink(0xffffffffffffffff, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000cecffc), 0x4) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000140)={&(0x7f00000000c0), 0xc, &(0x7f0000000000)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) 21:46:15 executing program 3: syz_open_procfs(0x0, &(0x7f00000002c0)='oom_score_adj\x00') ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) request_key(&(0x7f0000000240)='pkcs7_test\x00', &(0x7f0000000280)={'syz', 0x0}, &(0x7f0000000300)='/\x00', 0xfffffffffffffffe) request_key(&(0x7f00000000c0)='user\x00', &(0x7f0000000100)={'syz'}, &(0x7f0000000200)='vmnet0&#selfbdev&vboxnet0trustedselfeth1#c(vmnet0c^\x00', 0x0) [ 348.434913] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 21:46:15 executing program 4: 21:46:15 executing program 0: 21:46:15 executing program 5: 21:46:15 executing program 3: syz_open_procfs(0x0, &(0x7f00000002c0)='oom_score_adj\x00') ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) request_key(&(0x7f0000000240)='pkcs7_test\x00', &(0x7f0000000280)={'syz', 0x0}, &(0x7f0000000300)='/\x00', 0xfffffffffffffffe) request_key(&(0x7f00000000c0)='user\x00', &(0x7f0000000100)={'syz'}, &(0x7f0000000200)='vmnet0&#selfbdev&vboxnet0trustedselfeth1#c(vmnet0c^\x00', 0x0) 21:46:15 executing program 1: r0 = socket$inet6(0xa, 0x3, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0a5c2d023c126285718070") r1 = socket$inet6(0xa, 0x3, 0x5) close(r1) 21:46:15 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r0, 0x10e, 0x4, &(0x7f0000000040)=0x10004c13, 0x1d9) bind$netlink(0xffffffffffffffff, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000cecffc), 0x4) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000140)={&(0x7f00000000c0), 0xc, &(0x7f0000000000)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) 21:46:15 executing program 5: 21:46:15 executing program 0: 21:46:15 executing program 1: r0 = socket$inet6(0xa, 0x3, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0a5c2d023c126285718070") setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, &(0x7f0000000040)={@mcast2, 0x0, 0x0, 0xff, 0x1}, 0x20) close(0xffffffffffffffff) [ 348.575456] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 21:46:15 executing program 4: 21:46:15 executing program 3: syz_open_procfs(0x0, &(0x7f00000002c0)='oom_score_adj\x00') ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) request_key(&(0x7f0000000240)='pkcs7_test\x00', &(0x7f0000000280)={'syz', 0x0}, &(0x7f0000000300)='/\x00', 0xfffffffffffffffe) request_key(&(0x7f00000000c0)='user\x00', &(0x7f0000000100)={'syz'}, &(0x7f0000000200)='vmnet0&#selfbdev&vboxnet0trustedselfeth1#c(vmnet0c^l', 0x0) 21:46:15 executing program 5: 21:46:15 executing program 1: socket$inet6(0xa, 0x3, 0x3) r0 = socket$inet6(0xa, 0x3, 0x5) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000040)={@mcast2, 0x0, 0x0, 0xff, 0x1}, 0x20) close(r0) 21:46:15 executing program 0: 21:46:15 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r0, 0x10e, 0x4, &(0x7f0000000040)=0x10004c13, 0x1d9) bind$netlink(r0, &(0x7f0000514ff4), 0xc) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000cecffc), 0x4) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000140)={&(0x7f00000000c0), 0xc, &(0x7f0000000000)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) 21:46:15 executing program 4: 21:46:15 executing program 5: 21:46:15 executing program 1: r0 = socket$inet6(0xa, 0x3, 0x5) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000040)={@mcast2, 0x0, 0x0, 0xff, 0x1}, 0x20) close(r0) [ 348.838910] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 21:46:15 executing program 0: 21:46:15 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r0, 0x10e, 0x4, &(0x7f0000000040)=0x10004c13, 0x1d9) bind$netlink(r0, &(0x7f0000514ff4), 0xc) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000cecffc), 0x4) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000140)={&(0x7f00000000c0), 0xc, &(0x7f0000000000)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) 21:46:15 executing program 3: syz_open_procfs(0x0, &(0x7f00000002c0)='oom_score_adj\x00') ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) request_key(&(0x7f0000000240)='pkcs7_test\x00', &(0x7f0000000280)={'syz', 0x0}, &(0x7f0000000300)='/\x00', 0xfffffffffffffffe) request_key(&(0x7f00000000c0)='user\x00', &(0x7f0000000100)={'syz'}, &(0x7f0000000200)='vmnet0&#selfbdev&vboxnet0trustedselfeth1#c(vmnet0c^\x00', 0x0) 21:46:15 executing program 4: 21:46:15 executing program 0: 21:46:15 executing program 5: 21:46:15 executing program 1: r0 = socket$inet6(0xa, 0x0, 0x5) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000040)={@mcast2, 0x0, 0x0, 0xff, 0x1}, 0x20) close(r0) [ 349.040097] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 21:46:15 executing program 0: 21:46:16 executing program 3: syz_open_procfs(0x0, &(0x7f00000002c0)='oom_score_adj\x00') ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) request_key(&(0x7f0000000240)='pkcs7_test\x00', &(0x7f0000000280)={'syz', 0x0}, &(0x7f0000000300)='/\x00', 0xfffffffffffffffe) request_key(&(0x7f00000000c0)='user\x00', &(0x7f0000000100)={'syz'}, &(0x7f0000000200)="766d6e657430262373656c66626465762676626f786e6574307472757374656473656c6665746831236328766d6e657430635eff", 0x0) 21:46:16 executing program 4: 21:46:16 executing program 5: 21:46:16 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r0, 0x10e, 0x4, &(0x7f0000000040)=0x10004c13, 0x1d9) bind$netlink(r0, &(0x7f0000514ff4), 0xc) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000cecffc), 0x4) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000140)={&(0x7f00000000c0), 0xc, &(0x7f0000000000)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) 21:46:16 executing program 5: 21:46:16 executing program 4: 21:46:16 executing program 0: 21:46:16 executing program 3: syz_open_procfs(0x0, &(0x7f00000002c0)='oom_score_adj\x00') ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) request_key(&(0x7f0000000240)='pkcs7_test\x00', &(0x7f0000000280)={'syz', 0x0}, &(0x7f0000000300)='/\x00', 0xfffffffffffffffe) request_key(&(0x7f00000000c0)='user\x00', &(0x7f0000000100)={'syz'}, &(0x7f0000000200)='vmnet0&#selfbdev&vboxnet0trustedselfeth1#c(vmnet0c^\x00', 0x0) 21:46:16 executing program 1: r0 = socket$inet6(0xa, 0x3, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000040)={@mcast2, 0x0, 0x0, 0xff, 0x1}, 0x20) close(r0) [ 349.306109] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 21:46:16 executing program 4: 21:46:16 executing program 0: 21:46:16 executing program 5: 21:46:16 executing program 3: syz_open_procfs(0x0, &(0x7f00000002c0)='oom_score_adj\x00') ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) request_key(&(0x7f0000000240)='pkcs7_test\x00', &(0x7f0000000280)={'syz', 0x0}, &(0x7f0000000300)='/\x00', 0xfffffffffffffffe) request_key(&(0x7f00000000c0)='user\x00', &(0x7f0000000100)={'syz'}, &(0x7f0000000200)='vmnet0&#selfbdev&vboxnet0trustedselfeth1#c(vmnet0c^\x00', 0x0) 21:46:16 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r0, 0x10e, 0x4, &(0x7f0000000040)=0x10004c13, 0x1d9) bind$netlink(r0, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x8, &(0x7f0000cecffc), 0x4) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000140)={&(0x7f00000000c0), 0xc, &(0x7f0000000000)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) 21:46:16 executing program 4: 21:46:16 executing program 5: 21:46:16 executing program 1: r0 = socket$inet6(0xa, 0x3, 0x5) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, &(0x7f0000000040)={@mcast2, 0x0, 0x0, 0xff, 0x1}, 0x20) close(r0) 21:46:16 executing program 0: 21:46:16 executing program 3: syz_open_procfs(0x0, &(0x7f00000002c0)='oom_score_adj\x00') ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) request_key(&(0x7f0000000240)='pkcs7_test\x00', &(0x7f0000000280)={'syz', 0x0}, &(0x7f0000000300)='/\x00', 0xfffffffffffffffe) request_key(&(0x7f00000000c0)='user\x00', &(0x7f0000000100)={'syz'}, &(0x7f0000000200)='vmnet0&#selfbdev&vboxnet0trustedselfeth1#c(vmnet0c^\x00', 0x0) 21:46:16 executing program 4: [ 349.599295] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 21:46:16 executing program 5: 21:46:16 executing program 0: 21:46:16 executing program 4: 21:46:16 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r0, 0x10e, 0x4, &(0x7f0000000040)=0x10004c13, 0x1d9) bind$netlink(r0, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x8, &(0x7f0000cecffc), 0x4) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000140)={&(0x7f00000000c0), 0xc, &(0x7f0000000000)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) 21:46:16 executing program 1: r0 = socket$inet6(0xa, 0x3, 0x5) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, &(0x7f0000000040)={@mcast2, 0x0, 0x0, 0xff, 0x1}, 0x20) close(r0) 21:46:16 executing program 3: syz_open_procfs(0x0, &(0x7f00000002c0)='oom_score_adj\x00') ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) request_key(&(0x7f0000000240)='pkcs7_test\x00', &(0x7f0000000280)={'syz', 0x0}, &(0x7f0000000300)='/\x00', 0xfffffffffffffffe) request_key(&(0x7f00000000c0)='user\x00', &(0x7f0000000100)={'syz'}, &(0x7f0000000200)='vmnet0&#selfbdev&vboxnet0trustedselfeth1#c(vmnet0c^L', 0x0) 21:46:16 executing program 5: 21:46:16 executing program 0: 21:46:16 executing program 4: 21:46:16 executing program 1: r0 = socket$inet6(0xa, 0x3, 0x5) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, &(0x7f0000000040)={@mcast2, 0x0, 0x0, 0xff, 0x1}, 0x20) close(r0) [ 349.889050] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 21:46:16 executing program 0: 21:46:16 executing program 3: syz_open_procfs(0x0, &(0x7f00000002c0)='oom_score_adj\x00') ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) request_key(&(0x7f0000000240)='pkcs7_test\x00', &(0x7f0000000280)={'syz', 0x0}, &(0x7f0000000300)='/\x00', 0xfffffffffffffffe) request_key(&(0x7f00000000c0)='user\x00', &(0x7f0000000100)={'syz'}, &(0x7f0000000200)="766d6e657430262373656c66626465762676626f786e6574307472757374656473656c6665746831236328766d6e657430635e05", 0x0) 21:46:16 executing program 5: 21:46:16 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r0, 0x10e, 0x4, &(0x7f0000000040)=0x10004c13, 0x1d9) bind$netlink(r0, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x8, &(0x7f0000cecffc), 0x4) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000140)={&(0x7f00000000c0), 0xc, &(0x7f0000000000)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) 21:46:16 executing program 5: 21:46:16 executing program 4: 21:46:16 executing program 1: r0 = socket$inet6(0xa, 0x3, 0x5) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000040)={@mcast2, 0x0, 0x0, 0x0, 0x1}, 0x20) close(r0) 21:46:17 executing program 3: syz_open_procfs(0x0, &(0x7f00000002c0)='oom_score_adj\x00') ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) request_key(&(0x7f0000000240)='pkcs7_test\x00', &(0x7f0000000280)={'syz', 0x0}, &(0x7f0000000300)='/\x00', 0xfffffffffffffffe) request_key(&(0x7f00000000c0)='user\x00', &(0x7f0000000100)={'syz'}, &(0x7f0000000200)='vmnet0&#selfbdev&vboxnet0trustedselfeth1#c(vmnet0c^\x00', 0x0) 21:46:17 executing program 0: 21:46:17 executing program 5: 21:46:17 executing program 4: [ 350.180246] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 21:46:17 executing program 0: 21:46:17 executing program 5: r0 = socket$inet6(0xa, 0x80001, 0x0) io_setup(0x9, &(0x7f0000000000)=0x0) io_submit(r1, 0x1, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r0, &(0x7f0000000080)}]) io_submit(r1, 0x1, &(0x7f00000003c0)=[&(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, r0, &(0x7f0000000040)}]) 21:46:17 executing program 1: r0 = socket$inet6(0xa, 0x3, 0x5) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000040)={@mcast2, 0x0, 0x0, 0x0, 0x1}, 0x20) close(r0) 21:46:17 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$packet(0x11, 0xa, 0x300) recvmsg(r1, &(0x7f0000000ac0)={&(0x7f0000000300)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f0000000a40)}, 0x0) sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4), 0x1c) 21:46:17 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r0, 0x10e, 0x4, &(0x7f0000000040)=0x10004c13, 0x1d9) bind$netlink(r0, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) setsockopt$sock_int(r0, 0x1, 0x0, &(0x7f0000cecffc), 0x4) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000140)={&(0x7f00000000c0), 0xc, &(0x7f0000000000)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) 21:46:17 executing program 3: syz_open_procfs(0x0, &(0x7f00000002c0)='oom_score_adj\x00') ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) request_key(&(0x7f0000000240)='pkcs7_test\x00', &(0x7f0000000280)={'syz', 0x0}, &(0x7f0000000300)='/\x00', 0xfffffffffffffffe) request_key(&(0x7f00000000c0)='user\x00', &(0x7f0000000100)={'syz'}, &(0x7f0000000200)='vmnet0&#selfbdev&vboxnet0trustedselfeth1#c(vmnet0c^\x00', 0x0) 21:46:17 executing program 0: 21:46:17 executing program 1: r0 = socket$inet6(0xa, 0x3, 0x5) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000040)={@mcast2, 0x0, 0x0, 0x0, 0x1}, 0x20) close(r0) 21:46:17 executing program 0: 21:46:17 executing program 5: 21:46:17 executing program 3: syz_open_procfs(0x0, &(0x7f00000002c0)='oom_score_adj\x00') ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) request_key(&(0x7f0000000240)='pkcs7_test\x00', &(0x7f0000000280)={'syz', 0x0}, &(0x7f0000000300)='/\x00', 0xfffffffffffffffe) request_key(&(0x7f00000000c0)='user\x00', &(0x7f0000000100)={'syz'}, &(0x7f0000000200)='vmnet0&#selfbdev&vboxnet0trustedselfeth1#c(vmnet0c^\x00', 0x0) [ 350.457436] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 21:46:17 executing program 4: 21:46:17 executing program 5: r0 = syz_open_dev$binder(&(0x7f0000008ff3)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f00000002c0)={0x4c, 0x0, &(0x7f0000000300)=[@transaction_sg={0x40486311, {{0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000), &(0x7f0000000040)}}}], 0x0, 0x0, &(0x7f0000000200)}) 21:46:17 executing program 1: r0 = socket$inet6(0xa, 0x3, 0x5) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000040)={@mcast2, 0x0, 0x0, 0xff}, 0x20) close(r0) 21:46:17 executing program 0: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_SET_MSCBIT(r0, 0x40045568, 0x2d) 21:46:17 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='oom_score_adj\x00') ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) fanotify_init(0x18, 0x20000181803) getsockopt$inet_sctp6_SCTP_AUTOCLOSE(r0, 0x84, 0x4, &(0x7f0000000000), &(0x7f0000000040)=0x4) request_key(&(0x7f0000000240)='pkcs7_test\x00', &(0x7f0000000280)={'syz', 0x0}, &(0x7f0000000300)='/\x00', 0xfffffffffffffffe) request_key(&(0x7f00000000c0)='user\x00', &(0x7f0000000100)={'syz'}, &(0x7f0000000200)='vmnet0&#selfbdev&vboxnet0trustedselfeth1#c(vmnet0c^\x00', 0x0) 21:46:17 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r0, 0x10e, 0x4, &(0x7f0000000040)=0x10004c13, 0x1d9) bind$netlink(r0, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) setsockopt$sock_int(r0, 0x1, 0x0, &(0x7f0000cecffc), 0x4) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000140)={&(0x7f00000000c0), 0xc, &(0x7f0000000000)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) 21:46:17 executing program 4: socket$inet6_tcp(0xa, 0x1, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000280)='/dev/zero\x00', 0x0, 0x0) pipe(&(0x7f0000000440)={0xffffffffffffffff}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) [ 350.672407] binder: 15818:15823 got transaction to invalid handle 21:46:17 executing program 1: r0 = socket$inet6(0xa, 0x3, 0x5) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000040)={@mcast2, 0x0, 0x0, 0xff}, 0x20) close(r0) 21:46:17 executing program 0: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x2, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00'}, 0x45c) r1 = dup(r0) ioctl$UI_DEV_SETUP(r0, 0x5501, &(0x7f0000000300)={{}, "73797a3000000000000000000000000000000400"}) ioctl$EVIOCGRAB(0xffffffffffffffff, 0x40044590, &(0x7f0000000040)) ioctl$UI_DEV_DESTROY(r1, 0x5502) [ 350.732590] binder: 15818:15823 transaction failed 29201/-22, size 0-0 line 2855 [ 350.762504] binder: undelivered TRANSACTION_ERROR: 29201 [ 350.776115] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 21:46:17 executing program 5: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000280)='/dev/uinput\x00', 0x2, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00'}, 0x45c) r1 = dup(r0) ioctl$UI_DEV_SETUP(r0, 0x5501, &(0x7f0000000300)={{}, "73797a3000000000000000000000000000000400"}) ioctl$UI_SET_SWBIT(r1, 0x4004556d, 0x0) 21:46:17 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='oom_score_adj\x00') ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x20) request_key(&(0x7f0000000040)="a44066d5", &(0x7f0000000280)={'syz', 0x3}, &(0x7f0000000300)='/\x00', 0xfffffffffffffffe) ioctl$SNDRV_SEQ_IOCTL_RUNNING_MODE(r0, 0xc0105303, &(0x7f0000000000)={0x400, 0x4, 0x7}) request_key(&(0x7f00000000c0)='user\x00', &(0x7f0000000100)={'syz'}, &(0x7f0000000200)="766d6e657430262373656c66626465762676626f786e6574307472757374656473656c6665746831236328765c8fe04f6d6e6574", 0x0) [ 350.809952] input: syz1 as /devices/virtual/input/input26 21:46:17 executing program 1: r0 = socket$inet6(0xa, 0x3, 0x5) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000040)={@mcast2, 0x0, 0x0, 0xff}, 0x20) close(r0) [ 350.855255] input: syz1 as /devices/virtual/input/input27 21:46:17 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r0, 0x10e, 0x4, &(0x7f0000000040)=0x10004c13, 0x1d9) bind$netlink(r0, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) setsockopt$sock_int(r0, 0x1, 0x0, &(0x7f0000cecffc), 0x4) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000140)={&(0x7f00000000c0), 0xc, &(0x7f0000000000)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) 21:46:17 executing program 0: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000280)='/dev/uinput\x00', 0x0, 0x0) readv(r0, &(0x7f0000000040)=[{&(0x7f00000000c0)=""/175, 0xaf}], 0x1) 21:46:17 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='oom_score_adj\x00') ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) request_key(&(0x7f0000000240)='pkcs7_test\x00', &(0x7f0000000280)={'syz', 0x0}, &(0x7f0000000300)='/\x00', 0xfffffffffffffffe) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r0, 0x40106614, &(0x7f0000000000)={0x0, @speck128}) request_key(&(0x7f00000000c0)='user\x00', &(0x7f0000000100)={'syz'}, &(0x7f0000000200)='vmnet0&#selfbdev&vboxnet0trustedselfeth1#c(vmnet0c^\x00', 0x0) getsockopt$inet_sctp_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f0000000040)={0x0, 0xd8e2, 0x4, [0x2, 0x7fffffff, 0x1e14, 0x6]}, &(0x7f0000000080)=0x10) setsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000000140)={r1, 0x568}, 0x8) 21:46:17 executing program 1: r0 = socket$inet6(0xa, 0x3, 0x5) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000040)={@mcast2, 0x0, 0x0, 0xff, 0x1}, 0x20) close(0xffffffffffffffff) [ 350.957512] input: syz1 as /devices/virtual/input/input29 21:46:17 executing program 5: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x2, 0x0) tee(r0, r0, 0x0, 0xe) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00'}, 0x45c) dup(r0) ioctl$UI_DEV_SETUP(r0, 0x5501, &(0x7f0000000300)={{}, "73797a3000000000000000000000000000000400"}) r1 = syz_open_dev$evdev(&(0x7f0000000380)='/dev/input/event#\x00', 0x3, 0x0) ioctl$EVIOCGRAB(r1, 0x40044590, &(0x7f0000000040)) [ 351.051089] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 21:46:18 executing program 0: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_GET_VERSION(r0, 0x8004552d, &(0x7f0000000000)) [ 351.170983] input: syz1 as /devices/virtual/input/input30 [ 351.226133] input: syz1 as /devices/virtual/input/input32 21:46:18 executing program 4: socket$inet6_tcp(0xa, 0x1, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000280)='/dev/zero\x00', 0x0, 0x0) pipe(&(0x7f0000000440)={0xffffffffffffffff}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 21:46:18 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='oom_score_adj\x00') ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000140)={0x0, r0, 0x4, 0x7}) request_key(&(0x7f0000000240)='pkcs7_test\x00', &(0x7f0000000280)={'syz', 0x0}, &(0x7f0000000300)='/\x00', 0xfffffffffffffffe) openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x1, 0x0) request_key(&(0x7f00000000c0)='user\x00', &(0x7f0000000100)={'syz'}, &(0x7f0000000200)='vmnet0&#selfbdev&vboxnet0trustedselfeth1#c(vmnet0c^\x00', 0x0) fsetxattr$security_smack_transmute(r0, &(0x7f0000000040)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000080)='TRUE', 0x4, 0x1) 21:46:18 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) r1 = dup(r0) ioctl$EVIOCREVOKE(r1, 0x40044591, &(0x7f0000000100)) 21:46:18 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r0, 0x10e, 0x4, &(0x7f0000000040)=0x10004c13, 0x1d9) bind$netlink(r0, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000cecffc), 0x4) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f00000000c0), 0xc, &(0x7f0000000000)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) 21:46:18 executing program 0: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000280)='/dev/uinput\x00', 0x0, 0x0) r1 = dup(r0) ioctl$UI_SET_SWBIT(r1, 0x4004556d, 0x0) 21:46:18 executing program 5: r0 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/current\x00', 0x2, 0x0) write$apparmor_current(r0, &(0x7f0000000040)=@hat={'changehat '}, 0x1d) 21:46:18 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x2, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00'}, 0x45c) r1 = dup(r0) ioctl$UI_DEV_SETUP(r0, 0x5501, &(0x7f0000000300)={{}, "73797a3000000000000000000000000000000400"}) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$UI_DEV_DESTROY(r1, 0x5502) [ 351.631662] AppArmor: change_hat: Invalid input, NULL hat and NULL magic 21:46:18 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r0, 0x10e, 0x4, &(0x7f0000000040)=0x10004c13, 0x1d9) bind$netlink(r0, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000cecffc), 0x4) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000140)={&(0x7f00000000c0), 0xc, &(0x7f0000000000)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0x0, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) 21:46:18 executing program 5: keyctl$join(0x1, &(0x7f0000000040)={'syz', 0x1}) 21:46:18 executing program 3: syz_open_procfs(0x0, &(0x7f00000002c0)='oom_score_adj\x00') ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) r0 = request_key(&(0x7f0000000240)='pkcs7_test\x00', &(0x7f0000000280)={'syz', 0x0}, &(0x7f0000000300)='/\x00', 0xfffffffffffffffe) request_key(&(0x7f00000000c0)='user\x00', &(0x7f0000000100)={'syz'}, &(0x7f0000000200)='vmnet0&#selfbdev&vboxnet0trustedselfeth1#c(vmnet0c^\x00', 0x0) keyctl$revoke(0x3, r0) 21:46:18 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, &(0x7f0000a88f88), 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) setsockopt$sock_int(r0, 0x1, 0x7, &(0x7f0000000280), 0x4) sendto$inet(r0, &(0x7f0000004ac0)='~', 0x1, 0x0, &(0x7f0000000180)={0x2, 0x0, @broadcast}, 0x10) [ 351.784258] input: syz1 as /devices/virtual/input/input35 21:46:18 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r0, 0x10e, 0x4, &(0x7f0000000040)=0x10004c13, 0x1d9) bind$netlink(r0, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000cecffc), 0x4) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000140)={&(0x7f00000000c0), 0xc, &(0x7f0000000000)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0x0, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) 21:46:19 executing program 5: perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x5, 0x108000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) move_pages(0x0, 0x1, &(0x7f0000000180)=[&(0x7f0000fee000/0x11000)=nil], &(0x7f00000001c0), &(0x7f0000000200), 0x0) 21:46:19 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r0, 0x10e, 0x4, &(0x7f0000000040)=0x10004c13, 0x1d9) bind$netlink(r0, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000cecffc), 0x4) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000140)={&(0x7f00000000c0), 0xc, &(0x7f0000000000)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0x0, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) 21:46:19 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='oom_score_adj\x00') write$P9_RLINK(r0, &(0x7f0000000040)={0x7, 0x47, 0x2}, 0x7) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) request_key(&(0x7f0000000240)='pkcs7_test\x00', &(0x7f0000000280)={'syz', 0x0}, &(0x7f0000000300)='/\x00', 0xfffffffffffffffe) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000100)={'syz'}, &(0x7f0000000200)='vmnet0&#selfbdev&vboxnet0trustedselfeth1#c(vmnet0c^\x00', 0x0) 21:46:19 executing program 4: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(&(0x7f0000000340)=ANY=[], &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x5, 0x108000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000300), 0x2) 21:46:19 executing program 1: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) semctl$IPC_SET(0x0, 0x0, 0x1, &(0x7f0000000580)) 21:46:19 executing program 1: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x4170000}, 0xc, &(0x7f00000000c0)={&(0x7f0000001040)=@updpolicy={0xb8, 0x19, 0x101, 0x0, 0x0, {{@in=@multicast1, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0xa}}}, 0x24f}}, 0x0) sendmsg$nl_xfrm(r0, &(0x7f0000000340)={&(0x7f0000000080), 0xc, &(0x7f0000000180)={&(0x7f0000000100)=@flushpolicy={0x10, 0x1d, 0x1}, 0x10}}, 0x0) 21:46:19 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r0, 0x10e, 0x4, &(0x7f0000000040)=0x10004c13, 0x1d9) bind$netlink(r0, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000cecffc), 0x4) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000140)={&(0x7f00000000c0), 0xc, &(0x7f0000000000)={&(0x7f0000000180)=@newlink={0x20, 0x10, 0xc362e63b3f31ba5f}, 0x20}}, 0x0) 21:46:19 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='oom_score_adj\x00') ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) request_key(&(0x7f0000000240)='pkcs7_test\x00', &(0x7f0000000280)={'syz', 0x0}, &(0x7f0000000300)='/\x00', 0xfffffffffffffffe) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x20) request_key(&(0x7f00000000c0)='user\x00', &(0x7f0000000100)={'syz'}, &(0x7f0000000200)='vmnet0&#selfbdev&vboxnet0trustedselfeth1#c(vmnet0c^\x00', 0x0) 21:46:19 executing program 5: r0 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000040), 0xc, &(0x7f0000000100)={&(0x7f0000000000)=@mpls_delroute={0x1c, 0x19, 0x503, 0x0, 0x0, {0x1c, 0x14}}, 0x1c}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000140)=[{0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000100)}], 0x6bc, 0x0) 21:46:19 executing program 4: sendmmsg$unix(0xffffffffffffffff, &(0x7f0000000780)=[{&(0x7f0000000100)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000440)=[{&(0x7f0000000340)="e548f0c1f703ba9db4106505a87daca98cfe29e2e2b6b8c13039185f558462b73888fbeda8761ed5eb6278b8bca81428803a59909d1a7de24503870b636aea74ca5de64c8753def25eb46d603228cd01465cb3b65a91cee1c09c554e9518fe4f77be1e057e14b1216340e0a6641479e404a40842bfad340513cdeafbc5c03b1c05f357cf2ae28124a41b720d7f43cf02f3027a47d26e4ba5850228643aeb5777bb3f9edb7cdc8bb711964507893e0f0b32fe55f46dae195d80f862742b53025c939ff5ad38eb45778e9346a828a9edfc0474647998e860168b1fa98f245e72fde558475e816ea0e7", 0xe8}], 0x1, &(0x7f0000000740)}], 0x1, 0x0) poll(&(0x7f0000000040)=[{}], 0x20000000000000f1, 0x0) 21:46:19 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, &(0x7f0000a88f88), 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) setsockopt$sock_int(r0, 0x1, 0x7, &(0x7f0000000280), 0x4) sendto$inet(r0, &(0x7f0000004ac0)='~', 0x1, 0x0, &(0x7f0000000180)={0x2, 0x0, @broadcast}, 0x10) 21:46:19 executing program 1: sendmmsg$unix(0xffffffffffffffff, &(0x7f0000000780)=[{&(0x7f0000000100)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000440)=[{&(0x7f0000000340)="e548f0c1f703ba9db4106505a87daca98cfe29e2e2b6b8c13039185f558462b73888fbeda8761ed5eb6278b8bca81428803a59909d1a7de24503870b636aea74ca5de64c8753def25eb46d603228cd01465cb3b65a91cee1c09c554e9518fe4f77be1e057e14b1216340e0a6641479e404a40842bfad340513cdeafbc5c03b1c05f357cf2ae28124a41b720d7f43cf02f3027a47d26e4ba5850228643aeb5777bb3f9edb7cdc8bb711964507893e0f0b32fe55f46dae195d80f862742b53025c939ff5ad38eb45778e9346a828a9edfc0474647998e860168b1fa98f245e72fde558475e816ea0e72c6118a78f001ab0", 0xf0}], 0x1, &(0x7f0000000740)}], 0x1, 0x0) poll(&(0x7f0000000040)=[{}], 0x20000000000000f1, 0x0) 21:46:19 executing program 3: syz_open_procfs(0x0, &(0x7f0000000000)='eap_files\x00') ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) request_key(&(0x7f0000000240)='pkcs7_test\x00', &(0x7f0000000280)={'syz', 0x0}, &(0x7f0000000300)='/\x00', 0xfffffffffffffffe) request_key(&(0x7f00000000c0)='user\x00', &(0x7f0000000100)={'syz'}, &(0x7f0000000200)='vmnet0&#selfbdev&vboxnet0trustedselfeth1#c(vmnet0c^\x00', 0x0) 21:46:19 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r0, 0x10e, 0x4, &(0x7f0000000040)=0x10004c13, 0x1d9) bind$netlink(r0, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000cecffc), 0x4) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000140)={&(0x7f00000000c0), 0xc, &(0x7f0000000000)={&(0x7f0000000180)=@newlink={0x20, 0x10, 0xc362e63b3f31ba5f}, 0x20}}, 0x0) 21:46:19 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x5, &(0x7f0000001000)=ANY=[@ANYBLOB="bf16000000000000b70700000100e0dd2800000000000000bf700000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x1bd5c7]}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000200)={r0, 0x0, 0x10, 0x51, &(0x7f0000000140)="e07c5c205a3e3105f75cd1916d4e1272", &(0x7f0000000080)=""/81}, 0x28) 21:46:19 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r0, 0x10e, 0x4, &(0x7f0000000040)=0x10004c13, 0x1d9) bind$netlink(r0, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000cecffc), 0x4) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000140)={&(0x7f00000000c0), 0xc, &(0x7f0000000000)={&(0x7f0000000180)=@newlink={0x20, 0x10, 0xc362e63b3f31ba5f}, 0x20}}, 0x0) 21:46:19 executing program 4: r0 = socket$inet6(0xa, 0x1080000000002, 0x0) ioctl(r0, 0x4000100000008912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f00000002c0)={0xa, 0x0, 0x0, @local, 0x3}, 0x1c) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r2, &(0x7f000014f000)={&(0x7f00003c7ff4), 0xc, &(0x7f00000bfff0)={&(0x7f0000006440)=@updpolicy={0xb8, 0x19, 0x0, 0x0, 0x0, {{@in6=@mcast1, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0xa}}}, 0xb8}}, 0x0) setsockopt$inet6_MCAST_MSFILTER(r1, 0x29, 0x48, &(0x7f0000000180)={0x0, {{0xa, 0x0, 0x0, @mcast2}}, 0x1}, 0x90) 21:46:19 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='oom_score_adj\x00') ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) ioctl$KVM_GET_NR_MMU_PAGES(r0, 0xae45, 0x1) request_key(&(0x7f0000000240)='pkcs7_test\x00', &(0x7f0000000280)={'syz', 0x0}, &(0x7f0000000300)='/\x00', 0xfffffffffffffffe) request_key(&(0x7f00000000c0)='user\x00', &(0x7f0000000100)={'syz'}, &(0x7f0000000200)='vmnet0&#selfbdev&vboxnet0trustedselfeth1#c(vmnet0c^\x00', 0x0) 21:46:19 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0xa, 0x3, &(0x7f00000002c0)=ANY=[@ANYBLOB="850000002200000007000000000e00009500004000000000"], &(0x7f0000000400)="73797a6b610000000500f3", 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x0, 0x46, 0x9d, &(0x7f0000000000)="e46001923406080000000a9b86dd6a00000000072febb056601b9056115082553800810000000000e8d50000000100000034000000002089880bd320d98a7bf542832f8d0057", &(0x7f00000001c0)=""/157}, 0x28) 21:46:19 executing program 1: r0 = socket$kcm(0x2, 0x1000000000000805, 0x84) sendmsg$kcm(r0, &(0x7f0000000100)={&(0x7f00000006c0)=@in={0x2, 0x0, @loopback=0xa1414aa}, 0x80, &(0x7f0000000580), 0x0, &(0x7f0000002a40)}, 0x0) 21:46:20 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x12, 0x8, &(0x7f0000000140)=ANY=[@ANYBLOB="7a0af8ff00000000bfa100000000000007010000f8ffffffb702000008000000bd120000000000008500000006000000b7000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0xa}, 0x48) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000003c0), 0x4) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000640)={0xffffffffffffff9c, 0x10, &(0x7f0000000600)={&(0x7f0000000580)=""/78, 0x4e}}, 0x10) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00syz1\x00', 0x200002, 0x0) gettid() bpf$BPF_PROG_ATTACH(0x8, &(0x7f00000000c0)={r1, r0, 0xa}, 0x10) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000480)) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x400, 0x0, 0x64b, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TUNGETIFF(0xffffffffffffffff, 0x800454d2, &(0x7f0000000400)) close(0xffffffffffffffff) openat$cgroup_int(r2, &(0x7f00000004c0)="0300000021a200", 0x2, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000380)) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000340)={0xffffffffffffffff, 0x10, &(0x7f0000000300)={&(0x7f0000000240)=""/141, 0x8d, 0xffffffffffffffff}}, 0x10) 21:46:20 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x12, 0x8, &(0x7f0000000140)=ANY=[@ANYBLOB="7a0af8ff00000000bfa100000000000007010000f8ffffffb702000008000000bd120000000000008500000006000000b7000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0xa}, 0x48) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000640)={0xffffffffffffff9c, 0x10, &(0x7f0000000600)={&(0x7f0000000580)=""/78, 0x4e}}, 0x10) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00syz1\x00', 0x200002, 0x0) gettid() bpf$BPF_PROG_ATTACH(0x8, &(0x7f00000000c0)={r1, r0, 0xa}, 0x10) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000480)) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x9, 0x0, 0x100000001, 0x0, 0x400, 0x0, 0x64b, 0x0, 0x0, 0x0, 0x7, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TUNGETIFF(r1, 0x800454d2, &(0x7f0000000400)) close(0xffffffffffffffff) openat$cgroup_int(r2, &(0x7f00000004c0)="0300000021a200", 0x2, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000380)) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000340)={0xffffffffffffffff, 0x10, &(0x7f0000000300)={&(0x7f0000000240)=""/141, 0x8d, 0xffffffffffffffff}}, 0x10) 21:46:20 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x12, 0x8, &(0x7f0000000140)=ANY=[@ANYBLOB="7a0af8ff00000000bfa100000000000007010000f8ffffffb702000008000000bd120000000000008500000006000000b7000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0xa}, 0x48) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000003c0), 0x4) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000640)={0xffffffffffffff9c, 0x10, &(0x7f0000000600)={&(0x7f0000000580)=""/78, 0x4e}}, 0x10) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00syz1\x00', 0x200002, 0x0) gettid() bpf$BPF_PROG_ATTACH(0x8, &(0x7f00000000c0)={r1, r0, 0xa}, 0x10) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000480)) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x400, 0x0, 0x64b, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TUNGETIFF(0xffffffffffffffff, 0x800454d2, &(0x7f0000000400)) close(0xffffffffffffffff) openat$cgroup_int(r2, &(0x7f00000004c0)="0300000021a200", 0x2, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000380)) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000340)={0xffffffffffffffff, 0x10, &(0x7f0000000300)={&(0x7f0000000240)=""/141, 0x8d, 0xffffffffffffffff}}, 0x10) 21:46:20 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='oom_score_adj\x00') ioctl$RTC_ALM_SET(r0, 0x40247007, &(0x7f0000000000)={0xa, 0xe, 0x8, 0xd, 0x4, 0x8, 0x1, 0x4f, 0x1}) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) getsockopt$bt_sco_SCO_CONNINFO(r0, 0x11, 0x2, &(0x7f0000000340)=""/228, &(0x7f0000000040)=0xe4) r1 = getpgid(0xffffffffffffffff) fcntl$setown(r0, 0x8, r1) request_key(&(0x7f0000000240)='pkcs7_test\x00', &(0x7f0000000280)={'syz', 0x0}, &(0x7f0000000300)='/\x00', 0xfffffffffffffffe) request_key(&(0x7f00000000c0)='user\x00', &(0x7f0000000100)={'syz'}, &(0x7f0000000200)='vmnet0&#selfbdev&vboxnet0trustedselfeth1#c(vmnet0c^\x00', 0x0) 21:46:20 executing program 4: r0 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000680)="0400"}, 0xffe5) bpf$BPF_PROG_DETACH(0x9, &(0x7f00000000c0)={0x0, r0, 0x0, 0x3}, 0x14) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) socketpair$inet_dccp(0x2, 0x6, 0x0, &(0x7f0000000100)) socket$kcm(0x2, 0x3, 0x2) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={r0, 0x50, &(0x7f0000000480)={0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000340)=r2, 0x4) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000380)="6e7230010060a19ef9d2c623d9a1571cb9e1369bcd61ef7e49793ae18712eceb1daa769497800b7fbbd35b170c10751d39aeb660d863e49b8c4f3b3cad48902b5b2d6cfd0abd372c63bcf5d70df3fd4d2e8d443c88c60fd7140fbc0e5637dd82fc3435bed4de5d693c9a781c863e05d8a6f8689a5be29216061f3ff53f8b6b396678e7ba155ef9152d7e43b1eccb2331eb8eb1ed5586dcf8b3b0b999361a44ff2c22c2abbef42dd24eabe6723346a6e46c0499a21442d8d00dcb57f013ff7595edd0ff076930de3675d34117a44eb0e4f832936da44e") r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000040)={"6e72300100", 0x801}) ioctl$TUNSETLINK(r3, 0x400454cd, 0x308) r4 = getpid() perf_event_open(&(0x7f0000000540)={0x0, 0x70, 0xf2, 0x4, 0x400, 0xadb0, 0x0, 0x0, 0x40000001110, 0x0, 0x2, 0x0, 0x0, 0x7, 0x5, 0x3, 0x401, 0x1, 0x5, 0x401, 0xce4, 0x87b, 0x3, 0x2, 0x9212, 0x0, 0x4, 0x40, 0x7ff, 0x100000001, 0x0, 0x6, 0x80000000, 0x6, 0xd7, 0x4, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={&(0x7f0000000500), 0xa}, 0x404c, 0x0, 0xffffffffffffffff}, r4, 0x9, r0, 0xa) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)="2e2f6367726f75702e6e65742f73797a31eb", 0x1ff) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='memory.stat\x00', 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000200)=@ax25={0x3, {"b8738e610d62ed"}}, 0x80, &(0x7f0000000040)}, 0x0) socket$kcm(0x29, 0x2, 0x0) 21:46:20 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x12, 0x8, &(0x7f0000000140)=ANY=[@ANYBLOB="7a0af8ff00000000bfa100000000000007010000f8ffffffb702000008000000bd120000000000008500000006000000b7000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0xa}, 0x48) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000003c0), 0x4) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000640)={0xffffffffffffff9c, 0x10, &(0x7f0000000600)={&(0x7f0000000580)=""/78, 0x4e}}, 0x10) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00syz1\x00', 0x200002, 0x0) gettid() bpf$BPF_PROG_ATTACH(0x8, &(0x7f00000000c0)={r1, r0, 0xa}, 0x10) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000480)) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x9, 0x0, 0x100000001, 0x0, 0x400, 0x0, 0x64b, 0x0, 0x0, 0x0, 0x7, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TUNGETIFF(r1, 0x800454d2, &(0x7f0000000400)) close(0xffffffffffffffff) openat$cgroup_int(r2, &(0x7f00000004c0)="0300000021a200", 0x2, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000380)) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000340)={0xffffffffffffffff, 0x10, &(0x7f0000000300)={&(0x7f0000000240)=""/141, 0x8d, 0xffffffffffffffff}}, 0x10) 21:46:20 executing program 2: socketpair(0x0, 0x0, 0x0, &(0x7f0000000080)) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) socket$kcm(0xa, 0x0, 0x11) sendmsg(0xffffffffffffffff, &(0x7f0000000740)={&(0x7f0000000080)=@un=@abs, 0x80, &(0x7f0000000100), 0x0, &(0x7f0000000100)}, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000006500)={&(0x7f0000004d40)=@can, 0x80, &(0x7f0000006380), 0x0, &(0x7f0000006440)=""/165, 0xa5}, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x8906, &(0x7f0000000000)) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f0000000300)="6c6f00966fd651b959a9c84a2c00d2970403dc0d") ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f0000000680)="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") socketpair(0x0, 0x804, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) gettid() socket$kcm(0x29, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0x28, &(0x7f0000000140)}, 0x5) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000000640)='cgroup.type\x00', 0x2, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/net/tun\x00', 0x0, 0x0) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f00000000c0)) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000540)='cgroup.procs\x00', 0x2, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000500)='/dev/net/tun\x00', 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000600)={r2, 0x0, 0x0, 0x0, &(0x7f0000000400)}, 0x20) 21:46:20 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x12, 0x8, &(0x7f0000000140)=ANY=[@ANYBLOB="7a0af8ff00000000bfa100000000000007010000f8ffffffb702000008000000bd120000000000008500000006000000b7000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0xa}, 0x48) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000003c0), 0x4) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000640)={0xffffffffffffff9c, 0x10, &(0x7f0000000600)={&(0x7f0000000580)=""/78, 0x4e}}, 0x10) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00syz1\x00', 0x200002, 0x0) gettid() bpf$BPF_PROG_ATTACH(0x8, &(0x7f00000000c0)={r1, r0, 0xa}, 0x10) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000480)) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x400, 0x0, 0x64b, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TUNGETIFF(0xffffffffffffffff, 0x800454d2, &(0x7f0000000400)) close(0xffffffffffffffff) openat$cgroup_int(r2, &(0x7f00000004c0)="0300000021a200", 0x2, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000380)) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000340)={0xffffffffffffffff, 0x10, &(0x7f0000000300)={&(0x7f0000000240)=""/141, 0x8d, 0xffffffffffffffff}}, 0x10) 21:46:20 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='oom_score_adj\x00') ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) request_key(&(0x7f0000000240)='pkcs7_test\x00', &(0x7f0000000280)={'syz', 0x0}, &(0x7f0000000300)='/\x00', 0xfffffffffffffffe) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000000)=0x0) ioprio_set$pid(0x1, r1, 0xf1ba) request_key(&(0x7f00000000c0)='user\x00', &(0x7f0000000100)={'syz'}, &(0x7f0000000200)='vmnet0&#selfbdev&vboxnet0trustedselfeth1#c(vmnet0c^\x00', 0x0) 21:46:20 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x12, 0x8, &(0x7f0000000140)=ANY=[@ANYBLOB="7a0af8ff00000000bfa100000000000007010000f8ffffffb702000008000000bd120000000000008500000006000000b7000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0xa}, 0x48) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000003c0), 0x4) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000640)={0xffffffffffffff9c, 0x10, &(0x7f0000000600)={&(0x7f0000000580)=""/78, 0x4e}}, 0x10) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00syz1\x00', 0x200002, 0x0) gettid() bpf$BPF_PROG_ATTACH(0x8, &(0x7f00000000c0)={r1, r0, 0xa}, 0x10) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000480)) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x400, 0x0, 0x64b, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TUNGETIFF(0xffffffffffffffff, 0x800454d2, &(0x7f0000000400)) close(0xffffffffffffffff) openat$cgroup_int(r2, &(0x7f00000004c0)="0300000021a200", 0x2, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000380)) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000340)={0xffffffffffffffff, 0x10, &(0x7f0000000300)={&(0x7f0000000240)=""/141, 0x8d, 0xffffffffffffffff}}, 0x10) 21:46:20 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x12, 0x8, &(0x7f0000000140)=ANY=[@ANYBLOB="7a0af8ff00000000bfa100000000000007010000f8ffffffb702000008000000bd120000000000008500000006000000b7000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0xa}, 0x48) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000003c0), 0x4) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000640)={0xffffffffffffff9c, 0x10, &(0x7f0000000600)={&(0x7f0000000580)=""/78, 0x4e}}, 0x10) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00syz1\x00', 0x200002, 0x0) gettid() bpf$BPF_PROG_ATTACH(0x8, &(0x7f00000000c0)={r1, r0, 0xa}, 0x10) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000480)) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x9, 0x0, 0x100000001, 0x0, 0x400, 0x0, 0x64b, 0x0, 0x0, 0x0, 0x7, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TUNGETIFF(r1, 0x800454d2, &(0x7f0000000400)) close(0xffffffffffffffff) openat$cgroup_int(r2, &(0x7f00000004c0)="0300000021a200", 0x2, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000380)) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000340)={0xffffffffffffffff, 0x10, &(0x7f0000000300)={&(0x7f0000000240)=""/141, 0x8d, 0xffffffffffffffff}}, 0x10) 21:46:20 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='oom_score_adj\x00') ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000480)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x38, 0x50, 0x3f, {"09b9ebbdc11ace2c3cf7cfd5e1bf68594753244a06d623d962624b88890a25df52e8874d0c0a45871cc576bcb8b4913dd34510c34936"}}, {0x0, "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"}}, &(0x7f00000000c0)=""/41, 0x1052, 0x29}, 0x20) write$UHID_CREATE(r0, &(0x7f0000000340)={0x0, 'syz0\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000000)=""/131, 0x83, 0x7, 0x480000000, 0x9, 0x0, 0x3}, 0x120) request_key(&(0x7f0000000240)='pkcs7_test\x00', &(0x7f0000000280)={'syz', 0x0}, &(0x7f0000000140)='syz1\x00', 0xfffffffffffffffe) request_key(&(0x7f0000000180)='user\x00', &(0x7f0000000100)={'syz'}, &(0x7f0000000200)='vmnet0&#selfbdev&vboxnet0trustedselfeth1#c(vmnet0c^\x00', 0x0) 21:46:20 executing program 3: syz_open_procfs(0x0, &(0x7f00000002c0)='oom_score_adj\x00') ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) request_key(&(0x7f0000000240)='pkcs7_test\x00', &(0x7f0000000280)={'syz', 0x0}, &(0x7f0000000300)='/\x00', 0xfffffffffffffffe) request_key(&(0x7f00000000c0)='user\x00', &(0x7f0000000100)={'syz'}, &(0x7f0000000200)='vmnet0&#selfbdev&vboxnet0trustedselfeth1#c(vmnet0c^\x00', 0x0) socket$key(0xf, 0x3, 0x2) 21:46:20 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='oom_score_adj\x00') ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) request_key(&(0x7f0000000240)='pkcs7_test\x00', &(0x7f0000000280)={'syz', 0x0}, &(0x7f0000000300)='/\x00', 0xfffffffffffffffe) r1 = fcntl$getown(r0, 0x9) capget(&(0x7f0000000000)={0x20080522, r1}, &(0x7f0000000040)={0x80000000, 0x400, 0x1, 0x7, 0x2, 0x7}) request_key(&(0x7f00000000c0)='user\x00', &(0x7f0000000100)={'syz'}, &(0x7f0000000200)='vmnet0&#selfbdev&vboxnet0trustedselfeth1#c(vmnet0c^\x00', 0x0) [ 354.122205] device nr0 entered promiscuous mode 21:46:21 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x12, 0x8, &(0x7f0000000140)=ANY=[@ANYBLOB="7a0af8ff00000000bfa100000000000007010000f8ffffffb702000008000000bd120000000000008500000006000000b7000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0xa}, 0x48) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000003c0), 0x4) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000640)={0xffffffffffffff9c, 0x10, &(0x7f0000000600)={&(0x7f0000000580)=""/78, 0x4e}}, 0x10) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00syz1\x00', 0x200002, 0x0) gettid() bpf$BPF_PROG_ATTACH(0x8, &(0x7f00000000c0)={r1, r0, 0xa}, 0x10) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000480)) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x9, 0x0, 0x100000001, 0x0, 0x400, 0x0, 0x64b, 0x0, 0x0, 0x0, 0x7, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TUNGETIFF(r1, 0x800454d2, &(0x7f0000000400)) close(0xffffffffffffffff) openat$cgroup_int(r2, &(0x7f00000004c0)="0300000021a200", 0x2, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000380)) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000340)={0xffffffffffffffff, 0x10, &(0x7f0000000300)={&(0x7f0000000240)=""/141, 0x8d, 0xffffffffffffffff}}, 0x10) 21:46:21 executing program 3: syz_open_procfs(0x0, &(0x7f00000002c0)='oom_score_adj\x00') ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) add_key(&(0x7f0000000140)='.request_key_auth\x00', &(0x7f0000000180)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) r0 = add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000380)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffa) request_key(&(0x7f0000000400)='ceph\x00', &(0x7f0000000440)={'syz', 0x3}, &(0x7f0000000040)="2f0034b872981c046eba8ade5b4d0d86a951a88528a79e3549d0e6cdb7015fd33fc3ecd57031f11bacb0b7c6c7dbba0bb3167fa472149783750f0e0000055e8c0a8e4316a7bafe56052a8b99fbdbb71a50764794015c53fad64a23df8421beace50e87bd6879f498879a32fa7d6f16ff1e1e235e6d14a0c83bb50f", r0) request_key(&(0x7f00000000c0)='user\x00', &(0x7f0000000100)={'syz'}, &(0x7f0000000200)='vmnet0&#selfbdev&vboxnet0trustedselfeth1#c(vmnet0c^\x00', 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x42000, 0x0) 21:46:21 executing program 4: r0 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000680)="0400"}, 0xffe5) bpf$BPF_PROG_DETACH(0x9, &(0x7f00000000c0)={0x0, r0, 0x0, 0x3}, 0x14) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) socketpair$inet_dccp(0x2, 0x6, 0x0, &(0x7f0000000100)) socket$kcm(0x2, 0x3, 0x2) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={r0, 0x50, &(0x7f0000000480)={0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000340)=r2, 0x4) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000380)="6e7230010060a19ef9d2c623d9a1571cb9e1369bcd61ef7e49793ae18712eceb1daa769497800b7fbbd35b170c10751d39aeb660d863e49b8c4f3b3cad48902b5b2d6cfd0abd372c63bcf5d70df3fd4d2e8d443c88c60fd7140fbc0e5637dd82fc3435bed4de5d693c9a781c863e05d8a6f8689a5be29216061f3ff53f8b6b396678e7ba155ef9152d7e43b1eccb2331eb8eb1ed5586dcf8b3b0b999361a44ff2c22c2abbef42dd24eabe6723346a6e46c0499a21442d8d00dcb57f013ff7595edd0ff076930de3675d34117a44eb0e4f832936da44e") r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000040)={"6e72300100", 0x801}) ioctl$TUNSETLINK(r3, 0x400454cd, 0x308) r4 = getpid() perf_event_open(&(0x7f0000000540)={0x0, 0x70, 0xf2, 0x4, 0x400, 0xadb0, 0x0, 0x0, 0x40000001110, 0x0, 0x2, 0x0, 0x0, 0x7, 0x5, 0x3, 0x401, 0x1, 0x5, 0x401, 0xce4, 0x87b, 0x3, 0x2, 0x9212, 0x0, 0x4, 0x40, 0x7ff, 0x100000001, 0x0, 0x6, 0x80000000, 0x6, 0xd7, 0x4, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={&(0x7f0000000500), 0xa}, 0x404c, 0x0, 0xffffffffffffffff}, r4, 0x9, r0, 0xa) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)="2e2f6367726f75702e6e65742f73797a31eb", 0x1ff) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='memory.stat\x00', 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000200)=@ax25={0x3, {"b8738e610d62ed"}}, 0x80, &(0x7f0000000040)}, 0x0) socket$kcm(0x29, 0x2, 0x0) 21:46:21 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x12, 0x8, &(0x7f0000000140)=ANY=[@ANYBLOB="7a0af8ff00000000bfa100000000000007010000f8ffffffb702000008000000bd120000000000008500000006000000b7000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0xa}, 0x48) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000003c0), 0x4) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000640)={0xffffffffffffff9c, 0x10, &(0x7f0000000600)={&(0x7f0000000580)=""/78, 0x4e}}, 0x10) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00syz1\x00', 0x200002, 0x0) gettid() bpf$BPF_PROG_ATTACH(0x8, &(0x7f00000000c0)={r1, r0, 0xa}, 0x10) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000480)) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x9, 0x0, 0x100000001, 0x0, 0x400, 0x0, 0x64b, 0x0, 0x0, 0x0, 0x7, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TUNGETIFF(r1, 0x800454d2, &(0x7f0000000400)) close(0xffffffffffffffff) openat$cgroup_int(r2, &(0x7f00000004c0)="0300000021a200", 0x2, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000380)) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000340)={0xffffffffffffffff, 0x10, &(0x7f0000000300)={&(0x7f0000000240)=""/141, 0x8d, 0xffffffffffffffff}}, 0x10) 21:46:21 executing program 2: r0 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000680)="0400"}, 0xffe5) bpf$BPF_PROG_DETACH(0x9, &(0x7f00000000c0)={0x0, r0, 0x0, 0x3}, 0x14) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) socketpair$inet_dccp(0x2, 0x6, 0x0, &(0x7f0000000100)) socket$kcm(0x2, 0x3, 0x2) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={r0, 0x50, &(0x7f0000000480)={0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000340)=r2, 0x4) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000380)="6e7230010060a19ef9d2c623d9a1571cb9e1369bcd61ef7e49793ae18712eceb1daa769497800b7fbbd35b170c10751d39aeb660d863e49b8c4f3b3cad48902b5b2d6cfd0abd372c63bcf5d70df3fd4d2e8d443c88c60fd7140fbc0e5637dd82fc3435bed4de5d693c9a781c863e05d8a6f8689a5be29216061f3ff53f8b6b396678e7ba155ef9152d7e43b1eccb2331eb8eb1ed5586dcf8b3b0b999361a44ff2c22c2abbef42dd24eabe6723346a6e46c0499a21442d8d00dcb57f013ff7595edd0ff076930de3675d34117a44eb0e4f832936da44e") r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000040)={"6e72300100", 0x801}) ioctl$TUNSETLINK(r3, 0x400454cd, 0x308) r4 = getpid() perf_event_open(&(0x7f0000000540)={0x0, 0x70, 0xf2, 0x4, 0x400, 0xadb0, 0x0, 0x0, 0x40000001110, 0x0, 0x2, 0x0, 0x0, 0x7, 0x5, 0x3, 0x401, 0x1, 0x5, 0x401, 0xce4, 0x87b, 0x3, 0x2, 0x9212, 0x0, 0x4, 0x40, 0x7ff, 0x100000001, 0x0, 0x6, 0x80000000, 0x6, 0xd7, 0x4, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={&(0x7f0000000500), 0xa}, 0x404c, 0x0, 0xffffffffffffffff}, r4, 0x9, r0, 0xa) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)="2e2f6367726f75702e6e65742f73797a31eb", 0x1ff) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='memory.stat\x00', 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000200)=@ax25={0x3, {"b8738e610d62ed"}}, 0x80, &(0x7f0000000040)}, 0x0) socket$kcm(0x29, 0x2, 0x0) 21:46:21 executing program 3: pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80000) setsockopt$inet_sctp6_SCTP_EVENTS(r0, 0x84, 0xb, &(0x7f0000000040)={0x40, 0xfffffffffffffffa, 0x100, 0x2, 0x6, 0x0, 0x6, 0x51c1, 0x0, 0x40, 0xffffffffffffffc1}, 0xb) syz_open_procfs(0x0, &(0x7f00000002c0)='oom_score_adj\x00') ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) request_key(&(0x7f0000000240)='pkcs7_test\x00', &(0x7f0000000280)={'syz', 0x0}, &(0x7f0000000300)='/\x00', 0xfffffffffffffffe) request_key(&(0x7f00000000c0)='user\x00', &(0x7f0000000100)={'syz'}, &(0x7f0000000200)='vmnet0&#selfbdev&vboxnet0trustedselfeth1#c(vmnet0c^\x00', 0x0) 21:46:21 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x12, 0x8, &(0x7f0000000140)=ANY=[@ANYBLOB="7a0af8ff00000000bfa100000000000007010000f8ffffffb702000008000000bd120000000000008500000006000000b7000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0xa}, 0x48) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000003c0), 0x4) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000640)={0xffffffffffffff9c, 0x10, &(0x7f0000000600)={&(0x7f0000000580)=""/78, 0x4e}}, 0x10) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00syz1\x00', 0x200002, 0x0) gettid() bpf$BPF_PROG_ATTACH(0x8, &(0x7f00000000c0)={r1, r0, 0xa}, 0x10) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000480)) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x400, 0x0, 0x64b, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TUNGETIFF(0xffffffffffffffff, 0x800454d2, &(0x7f0000000400)) close(0xffffffffffffffff) openat$cgroup_int(r2, &(0x7f00000004c0)="0300000021a200", 0x2, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000380)) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000340)={0xffffffffffffffff, 0x10, &(0x7f0000000300)={&(0x7f0000000240)=""/141, 0x8d, 0xffffffffffffffff}}, 0x10) 21:46:21 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) close(r0) socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_mtu(r0, 0x29, 0x17, &(0x7f0000000000), 0x4) 21:46:22 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_subtree(r0, &(0x7f00000000c0)='cgroup.subtree_control\x00', 0x2, 0x0) write$cgroup_subtree(r1, &(0x7f0000000140)={[{0x2b, 'io'}]}, 0x4) 21:46:22 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='oom_score_adj\x00') ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) request_key(&(0x7f0000000240)='pkcs7_test\x00', &(0x7f0000000280)={'syz', 0x0}, &(0x7f0000000300)='/\x00', 0xfffffffffffffffe) ioctl$KVM_GET_NESTED_STATE(r0, 0xc080aebe, &(0x7f0000000340)={0x0, 0x0, 0x2080}) request_key(&(0x7f00000000c0)='user\x00', &(0x7f0000000100)={'syz'}, &(0x7f0000000200)='vmnet0&#selfbdev&vboxnet0trustedselfeth1#c(vmnet0c^\x00', 0x0) 21:46:22 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x12, 0x8, &(0x7f0000000140)=ANY=[@ANYBLOB="7a0af8ff00000000bfa100000000000007010000f8ffffffb702000008000000bd120000000000008500000006000000b7000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0xa}, 0x48) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000003c0), 0x4) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000640)={0xffffffffffffff9c, 0x10, &(0x7f0000000600)={&(0x7f0000000580)=""/78, 0x4e}}, 0x10) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00syz1\x00', 0x200002, 0x0) gettid() bpf$BPF_PROG_ATTACH(0x8, &(0x7f00000000c0)={r1, r0, 0xa}, 0x10) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000480)) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x9, 0x0, 0x100000001, 0x0, 0x400, 0x0, 0x64b, 0x0, 0x0, 0x0, 0x7, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TUNGETIFF(r1, 0x800454d2, &(0x7f0000000400)) close(0xffffffffffffffff) openat$cgroup_int(r2, &(0x7f00000004c0)="0300000021a200", 0x2, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000380)) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000340)={0xffffffffffffffff, 0x10, &(0x7f0000000300)={&(0x7f0000000240)=""/141, 0x8d, 0xffffffffffffffff}}, 0x10) 21:46:22 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x12, 0x8, &(0x7f0000000140)=ANY=[@ANYBLOB="7a0af8ff00000000bfa100000000000007010000f8ffffffb702000008000000bd120000000000008500000006000000b7000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0xa}, 0x48) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000003c0), 0x4) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000640)={0xffffffffffffff9c, 0x10, &(0x7f0000000600)={&(0x7f0000000580)=""/78, 0x4e}}, 0x10) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00syz1\x00', 0x200002, 0x0) gettid() bpf$BPF_PROG_ATTACH(0x8, &(0x7f00000000c0)={r1, r0, 0xa}, 0x10) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000480)) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x400, 0x0, 0x64b, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TUNGETIFF(0xffffffffffffffff, 0x800454d2, &(0x7f0000000400)) close(0xffffffffffffffff) openat$cgroup_int(r2, &(0x7f00000004c0)="0300000021a200", 0x2, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000380)) [ 355.257111] device nr0 entered promiscuous mode 21:46:22 executing program 3: syz_open_procfs(0x0, &(0x7f00000002c0)='oom_score_adj\x00') ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) request_key(&(0x7f0000000240)='pkcs7_test\x00', &(0x7f0000000280)={'syz', 0x0}, &(0x7f0000000300)='/\x00', 0xfffffffffffffffe) request_key(&(0x7f00000000c0)='user\x00', &(0x7f0000000100)={'syz'}, &(0x7f0000000200)='vmnet0&#selfbdev&vboxnet0trustedselfeth1#c(vmnet0c^\x00', 0x0) socketpair(0x5, 0x4, 0x916, &(0x7f0000000000)) 21:46:22 executing program 0: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$inet(0x2, 0xa, 0x0, &(0x7f0000000300)) r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000140)={&(0x7f0000000040)='./file0\x00', 0x0, 0x18}, 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, r2) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000180)="2f67726f75702e73746174003c23fb572a1f0294e6f378b41ad54b4d9d9a1f63f8785ad188a7e1c88875e05b18a4cb3a9cd12dcea440d899c22c652b3a471b4a7fa2f3fdf6e034d804e5f0df4b1dee483b157624c59c0100e89e6a357c000000", 0x2761, 0x0) write$cgroup_int(r3, &(0x7f0000000080), 0x297ef) close(r1) socket$kcm(0x2, 0x3, 0x84) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8912, &(0x7f0000000100)='trustedu\x00Pp\x00') socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000580)) [ 355.561493] device nr0 entered promiscuous mode 21:46:23 executing program 4: r0 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000680)="0400"}, 0xffe5) bpf$BPF_PROG_DETACH(0x9, &(0x7f00000000c0)={0x0, r0, 0x0, 0x3}, 0x14) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) socketpair$inet_dccp(0x2, 0x6, 0x0, &(0x7f0000000100)) socket$kcm(0x2, 0x3, 0x2) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={r0, 0x50, &(0x7f0000000480)={0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000340)=r2, 0x4) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000380)="6e7230010060a19ef9d2c623d9a1571cb9e1369bcd61ef7e49793ae18712eceb1daa769497800b7fbbd35b170c10751d39aeb660d863e49b8c4f3b3cad48902b5b2d6cfd0abd372c63bcf5d70df3fd4d2e8d443c88c60fd7140fbc0e5637dd82fc3435bed4de5d693c9a781c863e05d8a6f8689a5be29216061f3ff53f8b6b396678e7ba155ef9152d7e43b1eccb2331eb8eb1ed5586dcf8b3b0b999361a44ff2c22c2abbef42dd24eabe6723346a6e46c0499a21442d8d00dcb57f013ff7595edd0ff076930de3675d34117a44eb0e4f832936da44e") r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000040)={"6e72300100", 0x801}) ioctl$TUNSETLINK(r3, 0x400454cd, 0x308) r4 = getpid() perf_event_open(&(0x7f0000000540)={0x0, 0x70, 0xf2, 0x4, 0x400, 0xadb0, 0x0, 0x0, 0x40000001110, 0x0, 0x2, 0x0, 0x0, 0x7, 0x5, 0x3, 0x401, 0x1, 0x5, 0x401, 0xce4, 0x87b, 0x3, 0x2, 0x9212, 0x0, 0x4, 0x40, 0x7ff, 0x100000001, 0x0, 0x6, 0x80000000, 0x6, 0xd7, 0x4, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={&(0x7f0000000500), 0xa}, 0x404c, 0x0, 0xffffffffffffffff}, r4, 0x9, r0, 0xa) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)="2e2f6367726f75702e6e65742f73797a31eb", 0x1ff) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='memory.stat\x00', 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000200)=@ax25={0x3, {"b8738e610d62ed"}}, 0x80, &(0x7f0000000040)}, 0x0) socket$kcm(0x29, 0x2, 0x0) 21:46:23 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x12, 0x8, &(0x7f0000000140)=ANY=[@ANYBLOB="7a0af8ff00000000bfa100000000000007010000f8ffffffb702000008000000bd120000000000008500000006000000b7000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0xa}, 0x48) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000003c0), 0x4) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000640)={0xffffffffffffff9c, 0x10, &(0x7f0000000600)={&(0x7f0000000580)=""/78, 0x4e}}, 0x10) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00syz1\x00', 0x200002, 0x0) gettid() bpf$BPF_PROG_ATTACH(0x8, &(0x7f00000000c0)={r1, r0, 0xa}, 0x10) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000480)) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x9, 0x0, 0x100000001, 0x0, 0x400, 0x0, 0x64b, 0x0, 0x0, 0x0, 0x7, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TUNGETIFF(r1, 0x800454d2, &(0x7f0000000400)) close(0xffffffffffffffff) openat$cgroup_int(r2, &(0x7f00000004c0)="0300000021a200", 0x2, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000380)) 21:46:23 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='oom_score_adj\x00') ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) request_key(&(0x7f0000000240)='pkcs7_test\x00', &(0x7f0000000280)={'syz', 0x0}, &(0x7f0000000300)='/\x00', 0xfffffffffffffffe) request_key(&(0x7f00000000c0)='user\x00', &(0x7f0000000100)={'syz'}, &(0x7f0000000200)='vmnet0&#selfbdev&vboxnet0trustedselfeth1#c(vmnet0c^\x00', 0x0) ioctl$UI_SET_KEYBIT(r0, 0x40045565, 0x2e) 21:46:23 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x12, 0x8, &(0x7f0000000140)=ANY=[@ANYBLOB="7a0af8ff00000000bfa100000000000007010000f8ffffffb702000008000000bd120000000000008500000006000000b7000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0xa}, 0x48) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000003c0), 0x4) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000640)={0xffffffffffffff9c, 0x10, &(0x7f0000000600)={&(0x7f0000000580)=""/78, 0x4e}}, 0x10) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00syz1\x00', 0x200002, 0x0) gettid() bpf$BPF_PROG_ATTACH(0x8, &(0x7f00000000c0)={r1, r0, 0xa}, 0x10) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000480)) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x400, 0x0, 0x64b, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TUNGETIFF(0xffffffffffffffff, 0x800454d2, &(0x7f0000000400)) close(0xffffffffffffffff) openat$cgroup_int(r2, &(0x7f00000004c0)="0300000021a200", 0x2, 0x0) 21:46:23 executing program 0: r0 = socket$kcm(0xa, 0x2, 0x88) setsockopt$sock_attach_bpf(r0, 0x88, 0xa, &(0x7f0000000100), 0x4) sendmsg$kcm(r0, &(0x7f0000000640)={&(0x7f0000000080)=@in6={0x2, 0x4e24, 0x0, @ipv4={[0xfeffffff], [], @loopback}}, 0x80, &(0x7f00000005c0), 0x43, &(0x7f0000000000)}, 0x0) 21:46:23 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="451fb142a9138fb6f2add6d9ab9d7cd378964a5c4f0f00fe000030"], &(0x7f0000000000)="47504c00bc3047eb525f484f89fc96dd6ca64da40ff023122e66f6", 0x0, 0xce, &(0x7f0000000300)=""/206}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="180000000000000000000000028000006a0a00fffffff6006118"], &(0x7f0000000080)='syzkalleP\x00', 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x12, 0x5, &(0x7f0000000040)=@framed={{}, [@jmp]}, &(0x7f00000002c0)='GPL\x00', 0x80000001, 0x3bd, &(0x7f0000000400)=""/187, 0x0, 0x0, [], 0x0, 0xf}, 0x48) 21:46:23 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x894, 0x20}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xd, 0x5, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x48, 0x1, 0x3c}]}, &(0x7f0000000000)='GPL\x00', 0x0, 0xfb, &(0x7f00001a7f05)=""/251}, 0x14) 21:46:23 executing program 3: r0 = request_key(&(0x7f0000000180)='id_resolver\x00', &(0x7f00000001c0)={'syz', 0x0}, &(0x7f0000000340)='oom_score_adj\x00', 0x0) request_key(&(0x7f00000003c0)='encrypted\x00', &(0x7f00000004c0)={'syz', 0x2}, &(0x7f0000000540)='syz', r0) r1 = syz_open_procfs(0x0, &(0x7f00000002c0)='oom_score_adj\x00') ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) request_key(&(0x7f0000000240)='pkcs7_test\x00', &(0x7f0000000280)={'syz', 0x0}, &(0x7f0000000300)='/\x00', 0xfffffffffffffffe) setsockopt$inet6_tcp_TLS_TX(r1, 0x6, 0x1, &(0x7f0000000000), 0x4) request_key(&(0x7f00000000c0)='user\x00', &(0x7f0000000100)={'syz'}, &(0x7f0000000200)='vmnet0&#selfbdev&vboxnet0trustedselfeth1#c(vmnet0c^\x00', 0x0) 21:46:23 executing program 2: 21:46:23 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x12, 0x8, &(0x7f0000000140)=ANY=[@ANYBLOB="7a0af8ff00000000bfa100000000000007010000f8ffffffb702000008000000bd120000000000008500000006000000b7000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0xa}, 0x48) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000003c0), 0x4) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000640)={0xffffffffffffff9c, 0x10, &(0x7f0000000600)={&(0x7f0000000580)=""/78, 0x4e}}, 0x10) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00syz1\x00', 0x200002, 0x0) gettid() bpf$BPF_PROG_ATTACH(0x8, &(0x7f00000000c0)={r1, r0, 0xa}, 0x10) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000480)) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x400, 0x0, 0x64b, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TUNGETIFF(0xffffffffffffffff, 0x800454d2, &(0x7f0000000400)) close(0xffffffffffffffff) 21:46:23 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x12, 0x8, &(0x7f0000000140)=ANY=[@ANYBLOB="7a0af8ff00000000bfa100000000000007010000f8ffffffb702000008000000bd120000000000008500000006000000b7000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0xa}, 0x48) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000003c0), 0x4) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000640)={0xffffffffffffff9c, 0x10, &(0x7f0000000600)={&(0x7f0000000580)=""/78, 0x4e}}, 0x10) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00syz1\x00', 0x200002, 0x0) gettid() bpf$BPF_PROG_ATTACH(0x8, &(0x7f00000000c0)={r1, r0, 0xa}, 0x10) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000480)) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x9, 0x0, 0x100000001, 0x0, 0x400, 0x0, 0x64b, 0x0, 0x0, 0x0, 0x7, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TUNGETIFF(r1, 0x800454d2, &(0x7f0000000400)) close(0xffffffffffffffff) openat$cgroup_int(r2, &(0x7f00000004c0)="0300000021a200", 0x2, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000380)) 21:46:23 executing program 0: 21:46:23 executing program 4: r0 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000680)="0400"}, 0xffe5) bpf$BPF_PROG_DETACH(0x9, &(0x7f00000000c0)={0x0, r0, 0x0, 0x3}, 0x14) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) socketpair$inet_dccp(0x2, 0x6, 0x0, &(0x7f0000000100)) socket$kcm(0x2, 0x3, 0x2) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={r0, 0x50, &(0x7f0000000480)={0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000340)=r2, 0x4) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000380)="6e7230010060a19ef9d2c623d9a1571cb9e1369bcd61ef7e49793ae18712eceb1daa769497800b7fbbd35b170c10751d39aeb660d863e49b8c4f3b3cad48902b5b2d6cfd0abd372c63bcf5d70df3fd4d2e8d443c88c60fd7140fbc0e5637dd82fc3435bed4de5d693c9a781c863e05d8a6f8689a5be29216061f3ff53f8b6b396678e7ba155ef9152d7e43b1eccb2331eb8eb1ed5586dcf8b3b0b999361a44ff2c22c2abbef42dd24eabe6723346a6e46c0499a21442d8d00dcb57f013ff7595edd0ff076930de3675d34117a44eb0e4f832936da44e") r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000040)={"6e72300100", 0x801}) ioctl$TUNSETLINK(r3, 0x400454cd, 0x308) r4 = getpid() perf_event_open(&(0x7f0000000540)={0x0, 0x70, 0xf2, 0x4, 0x400, 0xadb0, 0x0, 0x0, 0x40000001110, 0x0, 0x2, 0x0, 0x0, 0x7, 0x5, 0x3, 0x401, 0x1, 0x5, 0x401, 0xce4, 0x87b, 0x3, 0x2, 0x9212, 0x0, 0x4, 0x40, 0x7ff, 0x100000001, 0x0, 0x6, 0x80000000, 0x6, 0xd7, 0x4, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={&(0x7f0000000500), 0xa}, 0x404c, 0x0, 0xffffffffffffffff}, r4, 0x9, r0, 0xa) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)="2e2f6367726f75702e6e65742f73797a31eb", 0x1ff) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='memory.stat\x00', 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000200)=@ax25={0x3, {"b8738e610d62ed"}}, 0x80, &(0x7f0000000040)}, 0x0) socket$kcm(0x29, 0x2, 0x0) 21:46:23 executing program 2: 21:46:23 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='oom_score_adj\x00') ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) request_key(&(0x7f0000000240)='pkcs7_test\x00', &(0x7f0000000280)={'syz', 0x0}, &(0x7f0000000300)='/\x00', 0xfffffffffffffffe) request_key(&(0x7f00000000c0)='user\x00', &(0x7f0000000100)={'syz'}, &(0x7f0000000200)='vmnet0&#selfbdev&vboxnet0trustedselfeth1#c(vmnet0c^\x00', 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, &(0x7f0000000000)={'TPROXY\x00'}, &(0x7f0000000040)=0x1e) 21:46:23 executing program 0: 21:46:23 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x12, 0x8, &(0x7f0000000140)=ANY=[@ANYBLOB="7a0af8ff00000000bfa100000000000007010000f8ffffffb702000008000000bd120000000000008500000006000000b7000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0xa}, 0x48) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000003c0), 0x4) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000640)={0xffffffffffffff9c, 0x10, &(0x7f0000000600)={&(0x7f0000000580)=""/78, 0x4e}}, 0x10) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00syz1\x00', 0x200002, 0x0) gettid() bpf$BPF_PROG_ATTACH(0x8, &(0x7f00000000c0)={r1, r0, 0xa}, 0x10) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000480)) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x400, 0x0, 0x64b, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TUNGETIFF(0xffffffffffffffff, 0x800454d2, &(0x7f0000000400)) 21:46:23 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x12, 0x8, &(0x7f0000000140)=ANY=[@ANYBLOB="7a0af8ff00000000bfa100000000000007010000f8ffffffb702000008000000bd120000000000008500000006000000b7000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0xa}, 0x48) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000003c0), 0x4) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000640)={0xffffffffffffff9c, 0x10, &(0x7f0000000600)={&(0x7f0000000580)=""/78, 0x4e}}, 0x10) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00syz1\x00', 0x200002, 0x0) gettid() bpf$BPF_PROG_ATTACH(0x8, &(0x7f00000000c0)={r1, r0, 0xa}, 0x10) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000480)) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x9, 0x0, 0x100000001, 0x0, 0x400, 0x0, 0x64b, 0x0, 0x0, 0x0, 0x7, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TUNGETIFF(r1, 0x800454d2, &(0x7f0000000400)) close(0xffffffffffffffff) openat$cgroup_int(r2, &(0x7f00000004c0)="0300000021a200", 0x2, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000340)={0xffffffffffffffff, 0x10, &(0x7f0000000300)={&(0x7f0000000240)=""/141, 0x8d, 0xffffffffffffffff}}, 0x10) 21:46:23 executing program 0: 21:46:24 executing program 2: 21:46:24 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='oom_score_adj\x00') ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000440)={{{@in6=@mcast2, @in6=@loopback}}, {{@in6=@ipv4={[], [], @rand_addr}}, 0x0, @in=@dev}}, &(0x7f0000000540)=0xe8) r1 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffff9) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000340)={{{@in=@remote, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}, 0x0, @in=@broadcast}}, &(0x7f0000000080)=0xe8) getresgid(&(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)=0x0) keyctl$chown(0x4, r1, r2, r3) request_key(&(0x7f0000000240)='pkcs7_test\x00', &(0x7f0000000280)={'syz', 0x0}, &(0x7f0000000300)='/\x00', 0xfffffffffffffffe) request_key(&(0x7f00000000c0)='user\x00', &(0x7f0000000100)={'syz'}, &(0x7f0000000200)='vmnet0&#selfbdev&vboxnet0trustedselfeth1#c(vmnet0c^\x00', 0x0) 21:46:24 executing program 0: 21:46:24 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x12, 0x8, &(0x7f0000000140)=ANY=[@ANYBLOB="7a0af8ff00000000bfa100000000000007010000f8ffffffb702000008000000bd120000000000008500000006000000b7000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0xa}, 0x48) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000003c0), 0x4) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000640)={0xffffffffffffff9c, 0x10, &(0x7f0000000600)={&(0x7f0000000580)=""/78, 0x4e}}, 0x10) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00syz1\x00', 0x200002, 0x0) gettid() bpf$BPF_PROG_ATTACH(0x8, &(0x7f00000000c0)={r1, r0, 0xa}, 0x10) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000480)) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x9, 0x0, 0x100000001, 0x0, 0x400, 0x0, 0x64b, 0x0, 0x0, 0x0, 0x7, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TUNGETIFF(r1, 0x800454d2, &(0x7f0000000400)) close(0xffffffffffffffff) openat$cgroup_int(r2, &(0x7f00000004c0)="0300000021a200", 0x2, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000340)={0xffffffffffffffff, 0x10, &(0x7f0000000300)={&(0x7f0000000240)=""/141, 0x8d, 0xffffffffffffffff}}, 0x10) 21:46:24 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x12, 0x8, &(0x7f0000000140)=ANY=[@ANYBLOB="7a0af8ff00000000bfa100000000000007010000f8ffffffb702000008000000bd120000000000008500000006000000b7000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0xa}, 0x48) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000003c0), 0x4) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000640)={0xffffffffffffff9c, 0x10, &(0x7f0000000600)={&(0x7f0000000580)=""/78, 0x4e}}, 0x10) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00syz1\x00', 0x200002, 0x0) gettid() bpf$BPF_PROG_ATTACH(0x8, &(0x7f00000000c0)={r1, r0, 0xa}, 0x10) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000480)) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x400, 0x0, 0x64b, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 357.308149] device nr0 entered promiscuous mode 21:46:25 executing program 4: r0 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000680)="0400"}, 0xffe5) bpf$BPF_PROG_DETACH(0x9, &(0x7f00000000c0)={0x0, r0, 0x0, 0x3}, 0x14) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) socketpair$inet_dccp(0x2, 0x6, 0x0, &(0x7f0000000100)) socket$kcm(0x2, 0x3, 0x2) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={r0, 0x50, &(0x7f0000000480)={0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000340)=r2, 0x4) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000380)="6e7230010060a19ef9d2c623d9a1571cb9e1369bcd61ef7e49793ae18712eceb1daa769497800b7fbbd35b170c10751d39aeb660d863e49b8c4f3b3cad48902b5b2d6cfd0abd372c63bcf5d70df3fd4d2e8d443c88c60fd7140fbc0e5637dd82fc3435bed4de5d693c9a781c863e05d8a6f8689a5be29216061f3ff53f8b6b396678e7ba155ef9152d7e43b1eccb2331eb8eb1ed5586dcf8b3b0b999361a44ff2c22c2abbef42dd24eabe6723346a6e46c0499a21442d8d00dcb57f013ff7595edd0ff076930de3675d34117a44eb0e4f832936da44e") r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000040)={"6e72300100", 0x801}) ioctl$TUNSETLINK(r3, 0x400454cd, 0x308) r4 = getpid() perf_event_open(&(0x7f0000000540)={0x0, 0x70, 0xf2, 0x4, 0x400, 0xadb0, 0x0, 0x0, 0x40000001110, 0x0, 0x2, 0x0, 0x0, 0x7, 0x5, 0x3, 0x401, 0x1, 0x5, 0x401, 0xce4, 0x87b, 0x3, 0x2, 0x9212, 0x0, 0x4, 0x40, 0x7ff, 0x100000001, 0x0, 0x6, 0x80000000, 0x6, 0xd7, 0x4, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={&(0x7f0000000500), 0xa}, 0x404c, 0x0, 0xffffffffffffffff}, r4, 0x9, r0, 0xa) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)="2e2f6367726f75702e6e65742f73797a31eb", 0x1ff) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='memory.stat\x00', 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000200)=@ax25={0x3, {"b8738e610d62ed"}}, 0x80, &(0x7f0000000040)}, 0x0) 21:46:25 executing program 2: 21:46:25 executing program 0: 21:46:25 executing program 3: syz_open_procfs(0x0, &(0x7f00000002c0)='oom_score_adj\x00') ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) request_key(&(0x7f0000000240)='pkcs7_test\x00', &(0x7f0000000280)={'syz', 0x0}, &(0x7f0000000300)='/\x00', 0xfffffffffffffffe) request_key(&(0x7f00000000c0)='user\x00', &(0x7f0000000100)={'syz'}, &(0x7f0000000200)='vmnet0&#selfbdev&vboxnet0trustedselfeth1#c(vmnet0c^\x00', 0x0) openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rfkill\x00', 0x585380, 0x0) 21:46:25 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x12, 0x8, &(0x7f0000000140)=ANY=[@ANYBLOB="7a0af8ff00000000bfa100000000000007010000f8ffffffb702000008000000bd120000000000008500000006000000b7000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0xa}, 0x48) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000003c0), 0x4) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000640)={0xffffffffffffff9c, 0x10, &(0x7f0000000600)={&(0x7f0000000580)=""/78, 0x4e}}, 0x10) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00syz1\x00', 0x200002, 0x0) gettid() bpf$BPF_PROG_ATTACH(0x8, &(0x7f00000000c0)={r1, r0, 0xa}, 0x10) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000480)) ioctl$TUNGETIFF(0xffffffffffffffff, 0x800454d2, &(0x7f0000000400)) 21:46:25 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x12, 0x8, &(0x7f0000000140)=ANY=[@ANYBLOB="7a0af8ff00000000bfa100000000000007010000f8ffffffb702000008000000bd120000000000008500000006000000b7000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0xa}, 0x48) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000003c0), 0x4) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000640)={0xffffffffffffff9c, 0x10, &(0x7f0000000600)={&(0x7f0000000580)=""/78, 0x4e}}, 0x10) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00syz1\x00', 0x200002, 0x0) gettid() bpf$BPF_PROG_ATTACH(0x8, &(0x7f00000000c0)={r1, r0, 0xa}, 0x10) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000480)) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x9, 0x0, 0x100000001, 0x0, 0x400, 0x0, 0x64b, 0x0, 0x0, 0x0, 0x7, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TUNGETIFF(r1, 0x800454d2, &(0x7f0000000400)) close(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000380)) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000340)={0xffffffffffffffff, 0x10, &(0x7f0000000300)={&(0x7f0000000240)=""/141, 0x8d, 0xffffffffffffffff}}, 0x10) 21:46:25 executing program 0: 21:46:25 executing program 2: 21:46:25 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x12, 0x8, &(0x7f0000000140)=ANY=[@ANYBLOB="7a0af8ff00000000bfa100000000000007010000f8ffffffb702000008000000bd120000000000008500000006000000b7000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0xa}, 0x48) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000003c0), 0x4) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000640)={0xffffffffffffff9c, 0x10, &(0x7f0000000600)={&(0x7f0000000580)=""/78, 0x4e}}, 0x10) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00syz1\x00', 0x200002, 0x0) gettid() bpf$BPF_PROG_ATTACH(0x8, &(0x7f00000000c0)={r1, r0, 0xa}, 0x10) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) ioctl$TUNGETIFF(0xffffffffffffffff, 0x800454d2, &(0x7f0000000400)) 21:46:25 executing program 3: syz_open_procfs(0x0, &(0x7f00000002c0)='oom_score_adj\x00') ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) r0 = request_key(&(0x7f0000000240)='pkcs7_test\x00', &(0x7f0000000280)={'syz', 0x0}, &(0x7f0000000300)='/\x00', 0xfffffffffffffffe) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000100)={'syz', 0x3}, &(0x7f0000000200)='vmnet0&#selfbdev&vboxnet0trustedselfeth1#c(vmnet0c^\x00', r0) 21:46:25 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x12, 0x8, &(0x7f0000000140)=ANY=[@ANYBLOB="7a0af8ff00000000bfa100000000000007010000f8ffffffb702000008000000bd120000000000008500000006000000b7000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0xa}, 0x48) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000003c0), 0x4) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000640)={0xffffffffffffff9c, 0x10, &(0x7f0000000600)={&(0x7f0000000580)=""/78, 0x4e}}, 0x10) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00syz1\x00', 0x200002, 0x0) gettid() bpf$BPF_PROG_ATTACH(0x8, &(0x7f00000000c0)={r1, r0, 0xa}, 0x10) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000480)) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x9, 0x0, 0x100000001, 0x0, 0x400, 0x0, 0x64b, 0x0, 0x0, 0x0, 0x7, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TUNGETIFF(r1, 0x800454d2, &(0x7f0000000400)) close(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000380)) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000340)={0xffffffffffffffff, 0x10, &(0x7f0000000300)={&(0x7f0000000240)=""/141, 0x8d, 0xffffffffffffffff}}, 0x10) 21:46:25 executing program 2: 21:46:25 executing program 4: r0 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000680)="0400"}, 0xffe5) bpf$BPF_PROG_DETACH(0x9, &(0x7f00000000c0)={0x0, r0, 0x0, 0x3}, 0x14) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) socketpair$inet_dccp(0x2, 0x6, 0x0, &(0x7f0000000100)) socket$kcm(0x2, 0x3, 0x2) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={r0, 0x50, &(0x7f0000000480)={0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000340)=r2, 0x4) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000380)="6e7230010060a19ef9d2c623d9a1571cb9e1369bcd61ef7e49793ae18712eceb1daa769497800b7fbbd35b170c10751d39aeb660d863e49b8c4f3b3cad48902b5b2d6cfd0abd372c63bcf5d70df3fd4d2e8d443c88c60fd7140fbc0e5637dd82fc3435bed4de5d693c9a781c863e05d8a6f8689a5be29216061f3ff53f8b6b396678e7ba155ef9152d7e43b1eccb2331eb8eb1ed5586dcf8b3b0b999361a44ff2c22c2abbef42dd24eabe6723346a6e46c0499a21442d8d00dcb57f013ff7595edd0ff076930de3675d34117a44eb0e4f832936da44e") r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000040)={"6e72300100", 0x801}) ioctl$TUNSETLINK(r3, 0x400454cd, 0x308) r4 = getpid() perf_event_open(&(0x7f0000000540)={0x0, 0x70, 0xf2, 0x4, 0x400, 0xadb0, 0x0, 0x0, 0x40000001110, 0x0, 0x2, 0x0, 0x0, 0x7, 0x5, 0x3, 0x401, 0x1, 0x5, 0x401, 0xce4, 0x87b, 0x3, 0x2, 0x9212, 0x0, 0x4, 0x40, 0x7ff, 0x100000001, 0x0, 0x6, 0x80000000, 0x6, 0xd7, 0x4, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={&(0x7f0000000500), 0xa}, 0x404c, 0x0, 0xffffffffffffffff}, r4, 0x9, r0, 0xa) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)="2e2f6367726f75702e6e65742f73797a31eb", 0x1ff) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='memory.stat\x00', 0x0, 0x0) socket$kcm(0x29, 0x2, 0x0) 21:46:25 executing program 0: r0 = inotify_init1(0x0) fcntl$setown(r0, 0x8, 0xffffffffffffffff) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGSKNS(0xffffffffffffffff, 0x894c, &(0x7f0000000180)) fcntl$getownex(r0, 0x10, &(0x7f0000000080)={0x0, 0x0}) ptrace$setopts(0x4206, r1, 0x0, 0x0) ptrace(0x4207, r1) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={"79616d300001178b00", 0x8001}) ptrace$setregset(0x4209, r1, 0x20000004, &(0x7f0000000040)={&(0x7f0000000040)}) openat$rfkill(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/rfkill\x00', 0x40000, 0x0) 21:46:25 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='oom_score_adj\x00') ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) ioctl$DRM_IOCTL_MAP_BUFS(r0, 0xc0186419, &(0x7f00000004c0)={0x3, &(0x7f0000000000)=""/191, &(0x7f0000000440)=[{0x4, 0x20, 0x4, &(0x7f0000000140)=""/32}, {0xffffffff, 0x46, 0x5, &(0x7f0000000180)=""/70}, {0x2, 0xe9, 0x1, &(0x7f0000000340)=""/233}]}) request_key(&(0x7f0000000240)='pkcs7_test\x00', &(0x7f0000000280)={'syz', 0x0}, &(0x7f0000000300)='/\x00', 0xfffffffffffffffe) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f0000000500)={0x0, 0x897e, 0x100000001, 0x9, 0x0, 0x2e40}, &(0x7f0000000540)=0x14) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f0000000580)={r1, 0x3}, 0x8) request_key(&(0x7f00000000c0)='user\x00', &(0x7f0000000100)={'syz'}, &(0x7f0000000200)='vmnet0&#selfbdev&vboxnet0trustedselfeth1#c(vmnet0c^\x00', 0x0) 21:46:25 executing program 2: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x100000c7, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000280)='net/mcfilter\x00') preadv(r0, &(0x7f0000000480), 0x10000000000002a1, 0x10400003) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_mreqsrc(r1, 0x0, 0x27, &(0x7f0000000080)={@multicast2, @remote, @loopback}, 0xc) 21:46:25 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x12, 0x8, &(0x7f0000000140)=ANY=[@ANYBLOB="7a0af8ff00000000bfa100000000000007010000f8ffffffb702000008000000bd120000000000008500000006000000b7000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0xa}, 0x48) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000003c0), 0x4) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000640)={0xffffffffffffff9c, 0x10, &(0x7f0000000600)={&(0x7f0000000580)=""/78, 0x4e}}, 0x10) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00syz1\x00', 0x200002, 0x0) gettid() bpf$BPF_PROG_ATTACH(0x8, &(0x7f00000000c0)={r1, r0, 0xa}, 0x10) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000480)) ioctl$TUNGETIFF(0xffffffffffffffff, 0x800454d2, &(0x7f0000000400)) 21:46:25 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x12, 0x8, &(0x7f0000000140)=ANY=[@ANYBLOB="7a0af8ff00000000bfa100000000000007010000f8ffffffb702000008000000bd120000000000008500000006000000b7000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0xa}, 0x48) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000003c0), 0x4) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000640)={0xffffffffffffff9c, 0x10, &(0x7f0000000600)={&(0x7f0000000580)=""/78, 0x4e}}, 0x10) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00syz1\x00', 0x200002, 0x0) gettid() bpf$BPF_PROG_ATTACH(0x8, &(0x7f00000000c0)={r1, r0, 0xa}, 0x10) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000480)) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x9, 0x0, 0x100000001, 0x0, 0x400, 0x0, 0x64b, 0x0, 0x0, 0x0, 0x7, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TUNGETIFF(r1, 0x800454d2, &(0x7f0000000400)) close(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000380)) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000340)={0xffffffffffffffff, 0x10, &(0x7f0000000300)={&(0x7f0000000240)=""/141, 0x8d, 0xffffffffffffffff}}, 0x10) 21:46:25 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='oom_score_adj\x00') ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x2) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) request_key(&(0x7f0000000240)='pkcs7_test\x00', &(0x7f0000000280)={'syz', 0x0}, &(0x7f0000000000)='/\x00', 0xfffffffffffffffe) request_key(&(0x7f00000000c0)='user\x00', &(0x7f0000000100)={'syz'}, &(0x7f0000000200)='vmnet0&#selfbdev&vboxnet0trustedselfeth1#c(vmnet0c^\x00', 0x0) 21:46:25 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x12, 0x8, &(0x7f0000000140)=ANY=[@ANYBLOB="7a0af8ff00000000bfa100000000000007010000f8ffffffb702000008000000bd120000000000008500000006000000b7000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0xa}, 0x48) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000003c0), 0x4) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000640)={0xffffffffffffff9c, 0x10, &(0x7f0000000600)={&(0x7f0000000580)=""/78, 0x4e}}, 0x10) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00syz1\x00', 0x200002, 0x0) gettid() bpf$BPF_PROG_ATTACH(0x8, &(0x7f00000000c0)={r1, r0, 0xa}, 0x10) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000480)) ioctl$TUNGETIFF(0xffffffffffffffff, 0x800454d2, &(0x7f0000000400)) 21:46:25 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x12, 0x8, &(0x7f0000000140)=ANY=[@ANYBLOB="7a0af8ff00000000bfa100000000000007010000f8ffffffb702000008000000bd120000000000008500000006000000b7000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0xa}, 0x48) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000003c0), 0x4) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000640)={0xffffffffffffff9c, 0x10, &(0x7f0000000600)={&(0x7f0000000580)=""/78, 0x4e}}, 0x10) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00syz1\x00', 0x200002, 0x0) gettid() bpf$BPF_PROG_ATTACH(0x8, &(0x7f00000000c0)={r1, r0, 0xa}, 0x10) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000480)) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x9, 0x0, 0x100000001, 0x0, 0x400, 0x0, 0x64b, 0x0, 0x0, 0x0, 0x7, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TUNGETIFF(r1, 0x800454d2, &(0x7f0000000400)) openat$cgroup_int(r2, &(0x7f00000004c0)="0300000021a200", 0x2, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000380)) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000340)={0xffffffffffffffff, 0x10, &(0x7f0000000300)={&(0x7f0000000240)=""/141, 0x8d, 0xffffffffffffffff}}, 0x10) 21:46:26 executing program 3: syz_open_procfs(0x0, &(0x7f0000000000)='net/snmp\x00') ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) r0 = add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0x0) request_key(&(0x7f0000000040)='id_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000140)='system\x00', r0) request_key(&(0x7f0000000240)='pkcs7_test\x00', &(0x7f0000000280)={'syz', 0x0}, &(0x7f0000000300)='/\x00', 0xfffffffffffffffe) request_key(&(0x7f00000000c0)='user\x00', &(0x7f0000000100)={'syz'}, &(0x7f0000000200)='vmnet0&#selfbdev&vboxnet0trustedselfeth1#c(vmnet0c^\x00', 0x0) 21:46:26 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x12, 0x8, &(0x7f0000000140)=ANY=[@ANYBLOB="7a0af8ff00000000bfa100000000000007010000f8ffffffb702000008000000bd120000000000008500000006000000b7000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0xa}, 0x48) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000003c0), 0x4) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000640)={0xffffffffffffff9c, 0x10, &(0x7f0000000600)={&(0x7f0000000580)=""/78, 0x4e}}, 0x10) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00syz1\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f00000000c0)={r1, r0, 0xa}, 0x10) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000480)) ioctl$TUNGETIFF(0xffffffffffffffff, 0x800454d2, &(0x7f0000000400)) 21:46:26 executing program 2: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = inotify_init1(0x0) fcntl$setown(r0, 0x8, 0xffffffffffffffff) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$getownex(r0, 0x10, &(0x7f0000000080)={0x0, 0x0}) setsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000008040)={@broadcast, @multicast2, @multicast1}, 0xc) ptrace$setopts(0x4206, r1, 0x0, 0x0) ptrace(0x4207, r1) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={"79616d300001178b00", 0x8001}) ptrace$setregset(0x4209, r1, 0x20000004, &(0x7f0000000040)={&(0x7f0000000040)}) openat$rfkill(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/rfkill\x00', 0x0, 0x0) 21:46:26 executing program 4: r0 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000680)="0400"}, 0xffe5) bpf$BPF_PROG_DETACH(0x9, &(0x7f00000000c0)={0x0, r0, 0x0, 0x3}, 0x14) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) socketpair$inet_dccp(0x2, 0x6, 0x0, &(0x7f0000000100)) socket$kcm(0x2, 0x3, 0x2) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={r0, 0x50, &(0x7f0000000480)={0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000340)=r2, 0x4) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000380)="6e7230010060a19ef9d2c623d9a1571cb9e1369bcd61ef7e49793ae18712eceb1daa769497800b7fbbd35b170c10751d39aeb660d863e49b8c4f3b3cad48902b5b2d6cfd0abd372c63bcf5d70df3fd4d2e8d443c88c60fd7140fbc0e5637dd82fc3435bed4de5d693c9a781c863e05d8a6f8689a5be29216061f3ff53f8b6b396678e7ba155ef9152d7e43b1eccb2331eb8eb1ed5586dcf8b3b0b999361a44ff2c22c2abbef42dd24eabe6723346a6e46c0499a21442d8d00dcb57f013ff7595edd0ff076930de3675d34117a44eb0e4f832936da44e") r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000040)={"6e72300100", 0x801}) ioctl$TUNSETLINK(r3, 0x400454cd, 0x308) r4 = getpid() perf_event_open(&(0x7f0000000540)={0x0, 0x70, 0xf2, 0x4, 0x400, 0xadb0, 0x0, 0x0, 0x40000001110, 0x0, 0x2, 0x0, 0x0, 0x7, 0x5, 0x3, 0x401, 0x1, 0x5, 0x401, 0xce4, 0x87b, 0x3, 0x2, 0x9212, 0x0, 0x4, 0x40, 0x7ff, 0x100000001, 0x0, 0x6, 0x80000000, 0x6, 0xd7, 0x4, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={&(0x7f0000000500), 0xa}, 0x404c, 0x0, 0xffffffffffffffff}, r4, 0x9, r0, 0xa) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)="2e2f6367726f75702e6e65742f73797a31eb", 0x1ff) sendmsg(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000200)=@ax25={0x3, {"b8738e610d62ed"}}, 0x80, &(0x7f0000000040)}, 0x0) socket$kcm(0x29, 0x2, 0x0) 21:46:26 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000780)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, &(0x7f0000000100), 0x1b5, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) shutdown(r1, 0x1) dup3(r1, r0, 0x0) 21:46:26 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x12, 0x8, &(0x7f0000000140)=ANY=[@ANYBLOB="7a0af8ff00000000bfa100000000000007010000f8ffffffb702000008000000bd120000000000008500000006000000b7000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0xa}, 0x48) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000003c0), 0x4) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000640)={0xffffffffffffff9c, 0x10, &(0x7f0000000600)={&(0x7f0000000580)=""/78, 0x4e}}, 0x10) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00syz1\x00', 0x200002, 0x0) gettid() bpf$BPF_PROG_ATTACH(0x8, &(0x7f00000000c0)={r1, r0, 0xa}, 0x10) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000480)) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x9, 0x0, 0x100000001, 0x0, 0x400, 0x0, 0x64b, 0x0, 0x0, 0x0, 0x7, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) openat$cgroup_int(r2, &(0x7f00000004c0)="0300000021a200", 0x2, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000380)) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000340)={0xffffffffffffffff, 0x10, &(0x7f0000000300)={&(0x7f0000000240)=""/141, 0x8d, 0xffffffffffffffff}}, 0x10) 21:46:26 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='oom_score_adj\x00') ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) lstat(&(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x0, 0x0}) getgroups(0x5, &(0x7f0000000640)=[0x0, 0x0, 0xee01, 0xee00, 0xffffffffffffffff]) getgroups(0x4, &(0x7f0000000680)=[0xffffffffffffffff, 0xee00, 0xee01, 0xffffffffffffffff]) fstat(r0, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000740), &(0x7f0000000780)=0x0, &(0x7f00000007c0)) getgroups(0x4, &(0x7f0000000800)=[0xee00, 0xffffffffffffffff, 0xee00, 0x0]) lstat(&(0x7f0000000840)='./file0\x00', &(0x7f0000000880)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r8 = getgid() r9 = getgid() getresgid(&(0x7f0000000900)=0x0, &(0x7f0000000940), &(0x7f0000000980)) fsetxattr$system_posix_acl(r0, &(0x7f0000000540)='system.posix_acl_access\x00', &(0x7f00000009c0)=ANY=[@ANYBLOB="0200000001e104000000000002000500", @ANYRES32=r1, @ANYBLOB="040006000000000008000300", @ANYRES32=r2, @ANYBLOB="08000500", @ANYRES32=r3, @ANYBLOB="08000500", @ANYRES32=r4, @ANYBLOB="08000400", @ANYRES32=r5, @ANYBLOB="08000200", @ANYRES32=r6, @ANYBLOB="08000500", @ANYRES32=r7, @ANYBLOB="08000200", @ANYRES32=r8, @ANYBLOB="08000400", @ANYRES32=r9, @ANYBLOB="08000400", @ANYRES32=r10, @ANYBLOB="10000100000000002000010000000000"], 0x74, 0x3) sendto$inet(r0, &(0x7f0000000140)="37d257171130cf2bca4cc8764e07a34358675822f24a3c82a0de6d92c3e8c9d2ae57ee41fbd41714d44a13f0b1e0f5608a1cd0d8e2eac1defbeeec793709692de79868c24316a2603a6ea2248ec73666fbfc2eb561a152985b2e8588ba3306c8c2f9ace4ab99ea8cfb29a6e5d9e6167b1092fd0d97a1b0501b2ad5ffc59d0b2ba0ee19997664375db3d315755a03238fe30ceb8df92ec2a77a94756c7f1e63977dffb2ab2cd22ddd02b74b39ab2e12ea28273338d35f4a5a4c6499079cb8", 0xbe, 0x4000040, &(0x7f0000000000)={0x2, 0x4e23, @multicast1}, 0x10) request_key(&(0x7f0000000240)='pkcs7_test\x00', &(0x7f0000000280)={'syz', 0x0}, &(0x7f0000000300)='/\x00', 0xfffffffffffffffe) ioctl$KVM_GET_IRQCHIP(r0, 0xc208ae62, &(0x7f0000000440)={0x0, 0x0, @ioapic}) request_key(&(0x7f00000000c0)='user\x00', &(0x7f0000000100)={'syz'}, &(0x7f0000000200)='vmnet0&#selfbdev&vboxnet0trustedselfeth1#c(vmnet0c^\x00', 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000340)={{{@in=@dev, @in=@rand_addr, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in=@dev}}, &(0x7f0000000040)=0xe8) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000080)={'vcan0\x00', r11}) 21:46:26 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x12, 0x8, &(0x7f0000000140)=ANY=[@ANYBLOB="7a0af8ff00000000bfa100000000000007010000f8ffffffb702000008000000bd120000000000008500000006000000b7000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0xa}, 0x48) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000003c0), 0x4) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000640)={0xffffffffffffff9c, 0x10, &(0x7f0000000600)={&(0x7f0000000580)=""/78, 0x4e}}, 0x10) bpf$BPF_PROG_ATTACH(0x8, &(0x7f00000000c0)={0xffffffffffffffff, r0, 0xa}, 0x10) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000480)) ioctl$TUNGETIFF(0xffffffffffffffff, 0x800454d2, &(0x7f0000000400)) [ 359.453871] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 359.493639] device nr0 entered promiscuous mode 21:46:26 executing program 0: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) close(r0) syz_open_procfs(0x0, &(0x7f0000000000)='oom_adj\x00') pread64(r0, &(0x7f0000000080)=""/83, 0x53, 0x0) 21:46:26 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x12, 0x8, &(0x7f0000000140)=ANY=[@ANYBLOB="7a0af8ff00000000bfa100000000000007010000f8ffffffb702000008000000bd120000000000008500000006000000b7000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0xa}, 0x48) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000003c0), 0x4) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00syz1\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f00000000c0)={r1, r0, 0xa}, 0x10) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000480)) ioctl$TUNGETIFF(0xffffffffffffffff, 0x800454d2, &(0x7f0000000400)) 21:46:26 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x12, 0x8, &(0x7f0000000140)=ANY=[@ANYBLOB="7a0af8ff00000000bfa100000000000007010000f8ffffffb702000008000000bd120000000000008500000006000000b7000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0xa}, 0x48) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000003c0), 0x4) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000640)={0xffffffffffffff9c, 0x10, &(0x7f0000000600)={&(0x7f0000000580)=""/78, 0x4e}}, 0x10) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00syz1\x00', 0x200002, 0x0) gettid() bpf$BPF_PROG_ATTACH(0x8, &(0x7f00000000c0)={r1, r0, 0xa}, 0x10) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000480)) ioctl$TUNGETIFF(r1, 0x800454d2, &(0x7f0000000400)) close(0xffffffffffffffff) openat$cgroup_int(r2, &(0x7f00000004c0)="0300000021a200", 0x2, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000380)) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000340)={0xffffffffffffffff, 0x10, &(0x7f0000000300)={&(0x7f0000000240)=""/141, 0x8d, 0xffffffffffffffff}}, 0x10) 21:46:26 executing program 3: r0 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x6, 0x400000) getsockname$packet(r0, &(0x7f0000000040), &(0x7f0000000080)=0x14) syz_open_procfs(0x0, &(0x7f00000002c0)='oom_score_adj\x00') ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) request_key(&(0x7f0000000240)='pkcs7_test\x00', &(0x7f0000000280)={'syz', 0x0}, &(0x7f0000000300)='/\x00', 0xfffffffffffffffe) request_key(&(0x7f00000000c0)='user\x00', &(0x7f0000000100)={'syz'}, &(0x7f0000000200)='vmnet0&#selfbdev&vboxnet0trustedselfeth1#c(vmnet0c^\x00', 0x0) 21:46:26 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x12, 0x8, &(0x7f0000000140)=ANY=[@ANYBLOB="7a0af8ff00000000bfa100000000000007010000f8ffffffb702000008000000bd120000000000008500000006000000b7000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0xa}, 0x48) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000640)={0xffffffffffffff9c, 0x10, &(0x7f0000000600)={&(0x7f0000000580)=""/78, 0x4e}}, 0x10) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00syz1\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f00000000c0)={r1, r0, 0xa}, 0x10) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000480)) ioctl$TUNGETIFF(0xffffffffffffffff, 0x800454d2, &(0x7f0000000400)) 21:46:26 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='oom_score_adj\x00') ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r0) request_key(&(0x7f0000000240)='pkcs7_test\x00', &(0x7f0000000280)={'syz', 0x0}, &(0x7f0000000300)='/\x00', 0xfffffffffffffffe) request_key(&(0x7f00000000c0)='user\x00', &(0x7f0000000100)={'syz'}, &(0x7f0000000200)='vmnet0&#selfbdev&vboxnet0trustedselfeth1#c(vmnet0c^\x00', 0x0) fcntl$getflags(r0, 0x40b) sendfile(r0, r0, &(0x7f0000000000)=0x2a, 0x8) 21:46:26 executing program 0: r0 = socket$packet(0x11, 0x2, 0x300) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$packet_int(r0, 0x107, 0x13, &(0x7f0000000040), 0x4) 21:46:27 executing program 4: r0 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000680)="0400"}, 0xffe5) bpf$BPF_PROG_DETACH(0x9, &(0x7f00000000c0)={0x0, r0, 0x0, 0x3}, 0x14) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) socketpair$inet_dccp(0x2, 0x6, 0x0, &(0x7f0000000100)) socket$kcm(0x2, 0x3, 0x2) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={r0, 0x50, &(0x7f0000000480)={0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000340)=r2, 0x4) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000380)="6e7230010060a19ef9d2c623d9a1571cb9e1369bcd61ef7e49793ae18712eceb1daa769497800b7fbbd35b170c10751d39aeb660d863e49b8c4f3b3cad48902b5b2d6cfd0abd372c63bcf5d70df3fd4d2e8d443c88c60fd7140fbc0e5637dd82fc3435bed4de5d693c9a781c863e05d8a6f8689a5be29216061f3ff53f8b6b396678e7ba155ef9152d7e43b1eccb2331eb8eb1ed5586dcf8b3b0b999361a44ff2c22c2abbef42dd24eabe6723346a6e46c0499a21442d8d00dcb57f013ff7595edd0ff076930de3675d34117a44eb0e4f832936da44e") r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000040)={"6e72300100", 0x801}) ioctl$TUNSETLINK(r3, 0x400454cd, 0x308) r4 = getpid() perf_event_open(&(0x7f0000000540)={0x0, 0x70, 0xf2, 0x4, 0x400, 0xadb0, 0x0, 0x0, 0x40000001110, 0x0, 0x2, 0x0, 0x0, 0x7, 0x5, 0x3, 0x401, 0x1, 0x5, 0x401, 0xce4, 0x87b, 0x3, 0x2, 0x9212, 0x0, 0x4, 0x40, 0x7ff, 0x100000001, 0x0, 0x6, 0x80000000, 0x6, 0xd7, 0x4, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={&(0x7f0000000500), 0xa}, 0x404c, 0x0, 0xffffffffffffffff}, r4, 0x9, r0, 0xa) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)="2e2f6367726f75702e6e65742f73797a31eb", 0x1ff) sendmsg(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000200)=@ax25={0x3, {"b8738e610d62ed"}}, 0x80, &(0x7f0000000040)}, 0x0) socket$kcm(0x29, 0x2, 0x0) 21:46:27 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x12, 0x8, &(0x7f0000000140)=ANY=[@ANYBLOB="7a0af8ff00000000bfa100000000000007010000f8ffffffb702000008000000bd120000000000008500000006000000b7000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0xa}, 0x48) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000003c0), 0x4) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000640)={0xffffffffffffff9c, 0x10, &(0x7f0000000600)={&(0x7f0000000580)=""/78, 0x4e}}, 0x10) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00syz1\x00', 0x200002, 0x0) gettid() bpf$BPF_PROG_ATTACH(0x8, &(0x7f00000000c0)={r1, r0, 0xa}, 0x10) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000480)) ioctl$TUNGETIFF(r1, 0x800454d2, &(0x7f0000000400)) close(0xffffffffffffffff) openat$cgroup_int(r2, &(0x7f00000004c0)="0300000021a200", 0x2, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000380)) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000340)={0xffffffffffffffff, 0x10, &(0x7f0000000300)={&(0x7f0000000240)=""/141, 0x8d, 0xffffffffffffffff}}, 0x10) 21:46:27 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket(0x10, 0x3, 0x0) clock_gettime(0x0, &(0x7f0000000180)={0x0}) recvmmsg(r1, &(0x7f0000001cc0), 0x4000000000002c0, 0x10102, &(0x7f0000001540)={r2}) sendmsg$nl_generic(r1, &(0x7f00000000c0)={&(0x7f0000000000), 0xc, &(0x7f0000000080)={&(0x7f0000000300)=ANY=[@ANYBLOB="140000001a000502000000000000000000000000f79b42c8fda3a9700c8e34f55a5e3ff47d0e7c26bd5a1b839f87825b00fb"], 0x1}}, 0x0) 21:46:27 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='oom_score_adj\x00') ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x8) request_key(&(0x7f0000000240)='pkcs7_test\x00', &(0x7f0000000280)={'syz', 0x0}, &(0x7f0000000300)='/\x00', 0xfffffffffffffffe) personality(0x4000005) setsockopt$inet_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0x4) request_key(&(0x7f00000000c0)='user\x00', &(0x7f0000000100)={'syz'}, &(0x7f0000000200)='vmnet0&#selfbdev&vboxnet0trustedselfeth1#c(vmnet0c^\x00', 0x0) 21:46:27 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000003c0), 0x4) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000640)={0xffffffffffffff9c, 0x10, &(0x7f0000000600)={&(0x7f0000000580)=""/78, 0x4e}}, 0x10) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00syz1\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f00000000c0)={r0, 0xffffffffffffffff, 0xa}, 0x10) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000480)) ioctl$TUNGETIFF(0xffffffffffffffff, 0x800454d2, &(0x7f0000000400)) 21:46:27 executing program 0: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc\x00', 0x0, 0x0) ioctl$sock_inet_tcp_SIOCATMARK(r0, 0x7003, &(0x7f0000000180)) ioctl$RTC_ALM_SET(r0, 0x40247007, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x113, 0xffffffffffffffff}) 21:46:27 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x12, 0x8, &(0x7f0000000140)=ANY=[@ANYBLOB="7a0af8ff00000000bfa100000000000007010000f8ffffffb702000008000000bd120000000000008500000006000000b7000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0xa}, 0x48) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000003c0), 0x4) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000640)={0xffffffffffffff9c, 0x10, &(0x7f0000000600)={&(0x7f0000000580)=""/78, 0x4e}}, 0x10) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00syz1\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f00000000c0)={r1, r0, 0xa}, 0x10) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000480)) ioctl$TUNGETIFF(0xffffffffffffffff, 0x800454d2, &(0x7f0000000400)) 21:46:27 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='oom_score_adj\x00') ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) r1 = request_key(&(0x7f0000000240)='pkcs7_test\x00', &(0x7f0000000280)={'syz', 0x0}, &(0x7f0000000300)='/\x00', 0xfffffffffffffffe) request_key(&(0x7f0000000080)='ceph\x00', &(0x7f0000000140)={'syz', 0x3}, &(0x7f0000000180)='.\'vmnet0\x00', r1) memfd_create(&(0x7f0000000000)='vmnet0&#selfbdev&vboxnet0trustedselfeth1#c(vmnet0c^\x00', 0x0) ioctl$EVIOCREVOKE(r0, 0x40044591, &(0x7f0000000040)=0x5eb0) request_key(&(0x7f00000000c0)='user\x00', &(0x7f0000000100)={'syz'}, &(0x7f0000000200)='vmnet0&#selfbdev&vboxnet0trustedselfeth1#c(vmnet0c^\x00', 0x0) 21:46:27 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x12, 0x8, &(0x7f0000000140)=ANY=[@ANYBLOB="7a0af8ff00000000bfa100000000000007010000f8ffffffb702000008000000bd120000000000008500000006000000b7000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0xa}, 0x48) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000003c0), 0x4) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000640)={0xffffffffffffff9c, 0x10, &(0x7f0000000600)={&(0x7f0000000580)=""/78, 0x4e}}, 0x10) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00syz1\x00', 0x200002, 0x0) gettid() bpf$BPF_PROG_ATTACH(0x8, &(0x7f00000000c0)={r1, r0, 0xa}, 0x10) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000480)) ioctl$TUNGETIFF(r1, 0x800454d2, &(0x7f0000000400)) close(0xffffffffffffffff) openat$cgroup_int(r2, &(0x7f00000004c0)="0300000021a200", 0x2, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000380)) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000340)={0xffffffffffffffff, 0x10, &(0x7f0000000300)={&(0x7f0000000240)=""/141, 0x8d, 0xffffffffffffffff}}, 0x10) [ 360.351643] device nr0 entered promiscuous mode 21:46:27 executing program 0: r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={&(0x7f0000000140), 0xc, &(0x7f00000001c0)={&(0x7f00000002c0)={0x14, 0x4000000000000012, 0x205, 0x0, 0x0, {0x7}}, 0x14}}, 0x0) 21:46:27 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x8, &(0x7f0000000140)=ANY=[@ANYBLOB="7a0af8ff00000000bfa100000000000007010000f8ffffffb702000008000000bd120000000000008500000006000000b7000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0xa}, 0x48) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000003c0), 0x4) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000640)={0xffffffffffffff9c, 0x10, &(0x7f0000000600)={&(0x7f0000000580)=""/78, 0x4e}}, 0x10) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00syz1\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f00000000c0)={r1, r0, 0xa}, 0x10) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000480)) ioctl$TUNGETIFF(0xffffffffffffffff, 0x800454d2, &(0x7f0000000400)) 21:46:27 executing program 3: r0 = fcntl$getown(0xffffffffffffffff, 0x9) syz_open_procfs(r0, &(0x7f0000000340)="001000006400a9154903186eba7431ed2396e91cc7b97c6f49037b73e360b598e68824801828779d5f4a41fde6d9c8adbf350cac2bd8d00513a31d1391ca9a47dc59b5630a3a935efee6b5f4be2ea316a76580b4b346dc65a3a6d0886b4b9283785df18c27b57006d32e1b6fb97d18ff5018fed56e8586b7a1d0954003885ac0ad0f8c343e75fae15b904627aa979b625ad7605adb62903beb9e3fe5d845475036acdd782245e5d6ecd426c99789107ef9d882e5b650ad588f2a9f6358ff62799bcc5ab786") ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) request_key(&(0x7f0000000240)='pkcs7_test\x00', &(0x7f0000000280)={'syz', 0x0}, &(0x7f0000000300)='/\x00', 0xfffffffffffffffe) request_key(&(0x7f00000000c0)='user\x00', &(0x7f0000000100)={'syz'}, &(0x7f0000000200)='vmnet0&#selfbdev&vboxnet0trustedselfeth1#c(vmnet0c^\x00', 0x0) 21:46:28 executing program 4: r0 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000680)="0400"}, 0xffe5) bpf$BPF_PROG_DETACH(0x9, &(0x7f00000000c0)={0x0, r0, 0x0, 0x3}, 0x14) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) socketpair$inet_dccp(0x2, 0x6, 0x0, &(0x7f0000000100)) socket$kcm(0x2, 0x3, 0x2) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={r0, 0x50, &(0x7f0000000480)={0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000340)=r2, 0x4) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000380)="6e7230010060a19ef9d2c623d9a1571cb9e1369bcd61ef7e49793ae18712eceb1daa769497800b7fbbd35b170c10751d39aeb660d863e49b8c4f3b3cad48902b5b2d6cfd0abd372c63bcf5d70df3fd4d2e8d443c88c60fd7140fbc0e5637dd82fc3435bed4de5d693c9a781c863e05d8a6f8689a5be29216061f3ff53f8b6b396678e7ba155ef9152d7e43b1eccb2331eb8eb1ed5586dcf8b3b0b999361a44ff2c22c2abbef42dd24eabe6723346a6e46c0499a21442d8d00dcb57f013ff7595edd0ff076930de3675d34117a44eb0e4f832936da44e") r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000040)={"6e72300100", 0x801}) ioctl$TUNSETLINK(r3, 0x400454cd, 0x308) r4 = getpid() perf_event_open(&(0x7f0000000540)={0x0, 0x70, 0xf2, 0x4, 0x400, 0xadb0, 0x0, 0x0, 0x40000001110, 0x0, 0x2, 0x0, 0x0, 0x7, 0x5, 0x3, 0x401, 0x1, 0x5, 0x401, 0xce4, 0x87b, 0x3, 0x2, 0x9212, 0x0, 0x4, 0x40, 0x7ff, 0x100000001, 0x0, 0x6, 0x80000000, 0x6, 0xd7, 0x4, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={&(0x7f0000000500), 0xa}, 0x404c, 0x0, 0xffffffffffffffff}, r4, 0x9, r0, 0xa) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)="2e2f6367726f75702e6e65742f73797a31eb", 0x1ff) sendmsg(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000200)=@ax25={0x3, {"b8738e610d62ed"}}, 0x80, &(0x7f0000000040)}, 0x0) socket$kcm(0x29, 0x2, 0x0) 21:46:28 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)="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", 0x0, 0x0) fcntl$notify(r1, 0x402, 0x1) 21:46:28 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x12, 0x0, &(0x7f0000000140)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0xa}, 0x48) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000003c0), 0x4) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000640)={0xffffffffffffff9c, 0x10, &(0x7f0000000600)={&(0x7f0000000580)=""/78, 0x4e}}, 0x10) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00syz1\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f00000000c0)={r1, r0, 0xa}, 0x10) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000480)) ioctl$TUNGETIFF(0xffffffffffffffff, 0x800454d2, &(0x7f0000000400)) 21:46:28 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x12, 0x8, &(0x7f0000000140)=ANY=[@ANYBLOB="7a0af8ff00000000bfa100000000000007010000f8ffffffb702000008000000bd120000000000008500000006000000b7000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0xa}, 0x48) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000003c0), 0x4) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000640)={0xffffffffffffff9c, 0x10, &(0x7f0000000600)={&(0x7f0000000580)=""/78, 0x4e}}, 0x10) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00syz1\x00', 0x200002, 0x0) gettid() bpf$BPF_PROG_ATTACH(0x8, &(0x7f00000000c0)={r1, r0, 0xa}, 0x10) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x9, 0x0, 0x100000001, 0x0, 0x400, 0x0, 0x64b, 0x0, 0x0, 0x0, 0x7, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TUNGETIFF(r1, 0x800454d2, &(0x7f0000000400)) close(0xffffffffffffffff) openat$cgroup_int(r2, &(0x7f00000004c0)="0300000021a200", 0x2, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000380)) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000340)={0xffffffffffffffff, 0x10, &(0x7f0000000300)={&(0x7f0000000240)=""/141, 0x8d, 0xffffffffffffffff}}, 0x10) 21:46:28 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @ipv4}, 0x1c) r2 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r2, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") sendto$inet6(r1, &(0x7f0000000280), 0xfffffffffffffcd2, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22}, 0x1c) dup2(r1, r0) 21:46:28 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='oom_score_adj\x00') ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) request_key(&(0x7f0000000240)='pkcs7_test\x00', &(0x7f0000000280)={'syz', 0x0}, &(0x7f0000000300)='/\x00', 0xfffffffffffffffe) request_key(&(0x7f00000000c0)='user\x00', &(0x7f0000000100)={'syz'}, &(0x7f0000000200)='vmnet0&#selfbdev&vboxnet0trustedselfeth1#c(vmnet0c^\x00', 0x0) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000040)='IPVS\x00') getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f0000000180)={0x0, 0x7ff}, &(0x7f00000001c0)=0x8) getsockopt$inet_sctp6_SCTP_STATUS(r0, 0x84, 0xe, &(0x7f0000000540)={0x0, 0x4, 0x5, 0x3f, 0x129, 0x6, 0x3, 0xff, {0x0, @in={{0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x18}}}, 0x10001, 0x9, 0x9, 0x2, 0x4}}, &(0x7f0000000600)=0xb0) getsockopt$inet_sctp_SCTP_STATUS(r0, 0x84, 0xe, &(0x7f0000000640)={r2, 0x2149, 0x3, 0x40, 0x43b4e312, 0x9, 0x6, 0xffffffffffffff01, {r3, @in={{0x2, 0x4e24, @broadcast}}, 0x8, 0x1, 0xfffffffffffffe01, 0x6, 0x100000000}}, &(0x7f0000000700)=0xb0) sendmsg$IPVS_CMD_ZERO(r0, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20410000}, 0xc, &(0x7f0000000080)={&(0x7f0000000340)={0x1d8, r1, 0x210, 0x70bd25, 0x2, {}, [@IPVS_CMD_ATTR_DAEMON={0x3c, 0x3, [@IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @mcast1}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'teql0\x00'}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @multicast1}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x8}]}, @IPVS_CMD_ATTR_SERVICE={0x70, 0x1, [@IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv6=@mcast2}, @IPVS_SVC_ATTR_PROTOCOL={0x8, 0x2, 0x6f}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x6d}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv4=@local}, @IPVS_SVC_ATTR_AF={0x8, 0x1, 0x2}, @IPVS_SVC_ATTR_PROTOCOL={0x8, 0x2, 0x88}, @IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x2, 0x4}}, @IPVS_SVC_ATTR_SCHED_NAME={0x8, 0x6, 'lc\x00'}, @IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x1}, @IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}]}, @IPVS_CMD_ATTR_DAEMON={0x54, 0x3, [@IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x3}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x1}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'bridge_slave_0\x00'}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'veth1\x00'}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x4}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @remote}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0xfffffffffffffffb}, @IPVS_CMD_ATTR_SERVICE={0x24, 0x1, [@IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x2}, @IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}, @IPVS_SVC_ATTR_PORT={0x8, 0x4, 0x4e21}, @IPVS_SVC_ATTR_PORT={0x8, 0x4, 0x4e24}]}, @IPVS_CMD_ATTR_SERVICE={0x38, 0x1, [@IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv6=@ipv4={[], [], @multicast1}}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x61}, @IPVS_SVC_ATTR_PROTOCOL={0x8, 0x2, 0x2c}, @IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}, @IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x20}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8}, @IPVS_CMD_ATTR_DAEMON={0x24, 0x3, [@IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x4}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x1}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e23}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e22}]}, @IPVS_CMD_ATTR_SERVICE={0x34, 0x1, [@IPVS_SVC_ATTR_AF={0x8, 0x1, 0xa}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x34}, @IPVS_SVC_ATTR_SCHED_NAME={0x8, 0x6, 'sed\x00'}, @IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x5}, @IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x5b}, @IPVS_SVC_ATTR_PROTOCOL={0x8, 0x2, 0xff}]}]}, 0x1d8}, 0x1, 0x0, 0x0, 0x800}, 0x44080) 21:46:28 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x12, 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0xa}, 0x48) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000003c0), 0x4) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000640)={0xffffffffffffff9c, 0x10, &(0x7f0000000600)={&(0x7f0000000580)=""/78, 0x4e}}, 0x10) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00syz1\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f00000000c0)={r1, r0, 0xa}, 0x10) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000480)) ioctl$TUNGETIFF(0xffffffffffffffff, 0x800454d2, &(0x7f0000000400)) [ 361.689232] TCP: request_sock_TCP: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 21:46:28 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='oom_score_adj\x00') ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f0000000000)) sendto$inet(r0, &(0x7f0000000340)="28d933d9495ff427a9c8dcc10bc7b631a40358ed814f7694ed38b76922124154af7a0bd396cf516d83f9bc9acf57063f3110b9e2fb122d1120476f5dfb7baa8a6a6099c9228154feaf6c0794b8daa59525f067c426dad9385a8cc0437b7c2addc50ffbe71147c87b1bff774dedc34b98ca03de3de282aab5f7e77c287f9b8551b083d277bbdb2a47d5cb0ff07623f6800105d985a2cbb756ab4143b2afe58230b9ff9a21f7bff81ba37e6bff787c8ec90373777fc2a8618ee4bbd5158b890f24f4923f6ffef44a77405fe71d1056b59b41c376915717fe16ab74e05bf2ef14f33776e1352a0f273e4ec91ad12f3b998492cef46a1c517b", 0xf7, 0x40, &(0x7f0000000040)={0x2, 0x4e23, @remote}, 0x10) request_key(&(0x7f0000000240)='pkcs7_test\x00', &(0x7f0000000280)={'syz', 0x0}, &(0x7f0000000300)='/\x00', 0xfffffffffffffffe) request_key(&(0x7f00000000c0)='user\x00', &(0x7f0000000100)={'syz'}, &(0x7f0000000200)='vmnet0&#selfbdev&vboxnet0trustedselfeth1#c(vmnet0c^\x00', 0x0) 21:46:28 executing program 2: socket$packet(0x11, 0x0, 0x300) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) socketpair$unix(0x1, 0x20000000000002, 0x0, &(0x7f0000000000)) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) socket$packet(0x11, 0x3, 0x300) syz_emit_ethernet(0x11, &(0x7f0000000080)={@dev, @link_local, [], {@llc_tr={0x11, {@llc={0x0, 0x0, "e0"}}}}}, &(0x7f0000000000)) 21:46:28 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x12, 0x8, &(0x7f0000000140)=ANY=[@ANYBLOB="7a0af8ff00000000bfa100000000000007010000f8ffffffb702000008000000bd120000000000008500000006000000b7000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0xa}, 0x48) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000003c0), 0x4) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000640)={0xffffffffffffff9c, 0x10, &(0x7f0000000600)={&(0x7f0000000580)=""/78, 0x4e}}, 0x10) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00syz1\x00', 0x200002, 0x0) gettid() bpf$BPF_PROG_ATTACH(0x8, &(0x7f00000000c0)={r1, r0, 0xa}, 0x10) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000480)) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x9, 0x0, 0x100000001, 0x0, 0x400, 0x0, 0x64b, 0x0, 0x0, 0x0, 0x7, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TUNGETIFF(r1, 0x800454d2, &(0x7f0000000400)) close(0xffffffffffffffff) openat$cgroup_int(0xffffffffffffffff, &(0x7f00000004c0)="0300000021a200", 0x2, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000380)) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000340)={0xffffffffffffffff, 0x10, &(0x7f0000000300)={&(0x7f0000000240)=""/141, 0x8d, 0xffffffffffffffff}}, 0x10) [ 361.813192] device nr0 entered promiscuous mode 21:46:28 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x12, 0x4, &(0x7f0000000140)=ANY=[@ANYBLOB="7a0af8ff00000000bfa100000000000007010000f8ffffffb702000008000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0xa}, 0x48) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000003c0), 0x4) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000640)={0xffffffffffffff9c, 0x10, &(0x7f0000000600)={&(0x7f0000000580)=""/78, 0x4e}}, 0x10) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00syz1\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f00000000c0)={r1, r0, 0xa}, 0x10) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000480)) ioctl$TUNGETIFF(0xffffffffffffffff, 0x800454d2, &(0x7f0000000400)) 21:46:28 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='oom_score_adj\x00') ioctl$TIOCSCTTY(r0, 0x540e, 0x2) fcntl$notify(r0, 0x402, 0x4) request_key(&(0x7f0000000240)='pkcs7_test\x00', &(0x7f0000000280)={'syz', 0x0}, &(0x7f0000000300)='/\x00', 0xfffffffffffffffe) ioctl$SCSI_IOCTL_DOORUNLOCK(r0, 0x5381) request_key(&(0x7f00000000c0)='user\x00', &(0x7f0000000100)={'syz'}, &(0x7f0000000200)='vmnet0&#selfbdev&vboxnet0trustedselfeth1#c(vmnet0c^\x00', 0x0) 21:46:29 executing program 4: r0 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000680)="0400"}, 0xffe5) bpf$BPF_PROG_DETACH(0x9, &(0x7f00000000c0)={0x0, r0, 0x0, 0x3}, 0x14) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) socketpair$inet_dccp(0x2, 0x6, 0x0, &(0x7f0000000100)) socket$kcm(0x2, 0x3, 0x2) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={r0, 0x50, &(0x7f0000000480)={0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000340)=r2, 0x4) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000380)="6e7230010060a19ef9d2c623d9a1571cb9e1369bcd61ef7e49793ae18712eceb1daa769497800b7fbbd35b170c10751d39aeb660d863e49b8c4f3b3cad48902b5b2d6cfd0abd372c63bcf5d70df3fd4d2e8d443c88c60fd7140fbc0e5637dd82fc3435bed4de5d693c9a781c863e05d8a6f8689a5be29216061f3ff53f8b6b396678e7ba155ef9152d7e43b1eccb2331eb8eb1ed5586dcf8b3b0b999361a44ff2c22c2abbef42dd24eabe6723346a6e46c0499a21442d8d00dcb57f013ff7595edd0ff076930de3675d34117a44eb0e4f832936da44e") r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000040)={"6e72300100", 0x801}) ioctl$TUNSETLINK(r3, 0x400454cd, 0x308) r4 = getpid() perf_event_open(&(0x7f0000000540)={0x0, 0x70, 0xf2, 0x4, 0x400, 0xadb0, 0x0, 0x0, 0x40000001110, 0x0, 0x2, 0x0, 0x0, 0x7, 0x5, 0x3, 0x401, 0x1, 0x5, 0x401, 0xce4, 0x87b, 0x3, 0x2, 0x9212, 0x0, 0x4, 0x40, 0x7ff, 0x100000001, 0x0, 0x6, 0x80000000, 0x6, 0xd7, 0x4, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={&(0x7f0000000500), 0xa}, 0x404c, 0x0, 0xffffffffffffffff}, r4, 0x9, r0, 0xa) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='memory.stat\x00', 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000200)=@ax25={0x3, {"b8738e610d62ed"}}, 0x80, &(0x7f0000000040)}, 0x0) socket$kcm(0x29, 0x2, 0x0) 21:46:29 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x12, 0x8, &(0x7f0000000140)=ANY=[@ANYBLOB="7a0af8ff00000000bfa100000000000007010000f8ffffffb702000008000000bd120000000000008500000006000000b7000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0xa}, 0x48) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000003c0), 0x4) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000640)={0xffffffffffffff9c, 0x10, &(0x7f0000000600)={&(0x7f0000000580)=""/78, 0x4e}}, 0x10) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00syz1\x00', 0x200002, 0x0) gettid() bpf$BPF_PROG_ATTACH(0x8, &(0x7f00000000c0)={r1, r0, 0xa}, 0x10) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000480)) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x9, 0x0, 0x100000001, 0x0, 0x400, 0x0, 0x64b, 0x0, 0x0, 0x0, 0x7, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TUNGETIFF(r1, 0x800454d2, &(0x7f0000000400)) close(0xffffffffffffffff) openat$cgroup_int(0xffffffffffffffff, &(0x7f00000004c0)="0300000021a200", 0x2, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000380)) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000340)={0xffffffffffffffff, 0x10, &(0x7f0000000300)={&(0x7f0000000240)=""/141, 0x8d, 0xffffffffffffffff}}, 0x10) 21:46:29 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x12, 0x6, &(0x7f0000000140)=ANY=[@ANYBLOB="7a0af8ff00000000bfa100000000000007010000f8ffffffb702000008000000bd120000000000008500000006000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0xa}, 0x48) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000003c0), 0x4) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000640)={0xffffffffffffff9c, 0x10, &(0x7f0000000600)={&(0x7f0000000580)=""/78, 0x4e}}, 0x10) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00syz1\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f00000000c0)={r1, r0, 0xa}, 0x10) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000480)) ioctl$TUNGETIFF(0xffffffffffffffff, 0x800454d2, &(0x7f0000000400)) [ 362.401736] device nr0 entered promiscuous mode 21:46:29 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pread64(r0, &(0x7f0000003c00)=""/4096, 0x200000, 0x0) 21:46:29 executing program 3: r0 = socket$inet(0x2, 0x3, 0x2) setsockopt$inet_int(r0, 0x0, 0xcb, &(0x7f0000000000)=0x10001, 0x10) r1 = syz_open_procfs(0x0, &(0x7f00000002c0)='oom_score_adj\x00') ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) request_key(&(0x7f0000000240)='pkcs7_test\x00', &(0x7f0000000280)={'syz', 0x0}, &(0x7f0000000300)='/\x00', 0xfffffffffffffffe) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x89e2, &(0x7f0000000080)={r0}) recvmsg$kcm(r1, &(0x7f0000000740)={&(0x7f0000000140)=@can={0x1d, 0x0}, 0x80, &(0x7f00000001c0)=[{&(0x7f0000000340)=""/223, 0xdf}, {&(0x7f0000000440)=""/202, 0xca}, {&(0x7f0000000540)=""/159, 0x9f}, {&(0x7f0000000600)=""/123, 0x7b}], 0x4, &(0x7f0000000680)=""/134, 0x86, 0x8001}, 0x12040) stat(&(0x7f0000000780)='./file0\x00', &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$RTC_AIE_OFF(r1, 0x7002) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000840)={{{@in=@multicast1, @in6=@mcast1, 0x84e24, 0x101, 0x4e22, 0x1, 0x2, 0x80, 0x80, 0xaf, r2, r3}, {0x400, 0x55a5, 0x2a, 0x6, 0x40, 0xfffffffffffffffb, 0x4, 0x7fff}, {0x4, 0x4, 0x0, 0x3}, 0x9, 0x6e6bb8, 0x1, 0x0, 0x1, 0x3}, {{@in6=@mcast1, 0x4d5, 0x7c}, 0x2, @in=@multicast1, 0x3506, 0x4, 0x0, 0x7fff, 0x1, 0x7, 0x1}}, 0xe8) request_key(&(0x7f0000000040)='user\x00', &(0x7f0000000100)={'syz'}, &(0x7f0000000200)='vmnet0&#selfbdev&vboxnet0trustedselfeth1#c(vmnet0c^\x00', 0xfffffffffffffffc) socket$packet(0x11, 0x3, 0x300) 21:46:29 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x12, 0x7, &(0x7f0000000140)=ANY=[@ANYBLOB="7a0af8ff00000000bfa100000000000007010000f8ffffffb702000008000000bd120000000000008500000006000000b700000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0xa}, 0x48) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000003c0), 0x4) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000640)={0xffffffffffffff9c, 0x10, &(0x7f0000000600)={&(0x7f0000000580)=""/78, 0x4e}}, 0x10) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00syz1\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f00000000c0)={r1, r0, 0xa}, 0x10) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000480)) ioctl$TUNGETIFF(0xffffffffffffffff, 0x800454d2, &(0x7f0000000400)) 21:46:29 executing program 2: r0 = memfd_create(&(0x7f0000000040)="00ac3d9dd2dbe6bfb408ed634a8e84d44e129b1f09bd112b865416a3b3ae309f393fef6fa46b01323ea19c86781c9f841935de975f097ef3591222705ec10f", 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x11, r0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000000c0)) 21:46:29 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x12, 0x8, &(0x7f0000000140)=ANY=[@ANYBLOB="7a0af8ff00000000bfa100000000000007010000f8ffffffb702000008000000bd120000000000008500000006000000b7000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0xa}, 0x48) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000003c0), 0x4) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000640)={0xffffffffffffff9c, 0x10, &(0x7f0000000600)={&(0x7f0000000580)=""/78, 0x4e}}, 0x10) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00syz1\x00', 0x200002, 0x0) gettid() bpf$BPF_PROG_ATTACH(0x8, &(0x7f00000000c0)={r1, r0, 0xa}, 0x10) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000480)) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x9, 0x0, 0x100000001, 0x0, 0x400, 0x0, 0x64b, 0x0, 0x0, 0x0, 0x7, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TUNGETIFF(r1, 0x800454d2, &(0x7f0000000400)) close(0xffffffffffffffff) openat$cgroup_int(0xffffffffffffffff, &(0x7f00000004c0)="0300000021a200", 0x2, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000380)) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000340)={0xffffffffffffffff, 0x10, &(0x7f0000000300)={&(0x7f0000000240)=""/141, 0x8d, 0xffffffffffffffff}}, 0x10) 21:46:29 executing program 2: openat$pfkey(0xffffffffffffff9c, &(0x7f0000000280)='/proc/self/net/pfkey\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80}}], 0x1, 0x0, &(0x7f0000003280)) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0x1a1, 0x0) 21:46:29 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x12, 0x8, &(0x7f0000000140)=ANY=[@ANYBLOB="7a0af8ff00000000bfa100000000000007010000f8ffffffb702000008000000bd120000000000008500000006000000b7000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0xa}, 0x48) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000003c0), 0x4) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000640)={0xffffffffffffff9c, 0x10, &(0x7f0000000600)={&(0x7f0000000580)=""/78, 0x4e}}, 0x10) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00syz1\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f00000000c0)={r1, r0, 0xa}, 0x10) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000480)) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x9, 0x0, 0x100000001, 0x0, 0x400, 0x0, 0x64b, 0x0, 0x0, 0x0, 0x7, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TUNGETIFF(r1, 0x800454d2, &(0x7f0000000400)) close(0xffffffffffffffff) openat$cgroup_int(r2, &(0x7f00000004c0)="0300000021a200", 0x2, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000380)) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000340)={0xffffffffffffffff, 0x10, &(0x7f0000000300)={&(0x7f0000000240)=""/141, 0x8d, 0xffffffffffffffff}}, 0x10) 21:46:29 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x12, 0x7, &(0x7f0000000140)=ANY=[@ANYBLOB="7a0af8ff00000000bfa100000000000007010000f8ffffffb702000008000000bd120000000000008500000006000000b70000000000000095000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0xa}, 0x48) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000003c0), 0x4) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000640)={0xffffffffffffff9c, 0x10, &(0x7f0000000600)={&(0x7f0000000580)=""/78, 0x4e}}, 0x10) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00syz1\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f00000000c0)={r1, r0, 0xa}, 0x10) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000480)) ioctl$TUNGETIFF(0xffffffffffffffff, 0x800454d2, &(0x7f0000000400)) 21:46:29 executing program 0: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x4, 0x31, 0xffffffffffffffff, 0x0) futex(&(0x7f0000004000), 0x400000084, 0x0, &(0x7f0000000140)={0x0, 0x1c9c380}, &(0x7f00000000c0), 0x0) 21:46:29 executing program 4: r0 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000680)="0400"}, 0xffe5) bpf$BPF_PROG_DETACH(0x9, &(0x7f00000000c0)={0x0, r0, 0x0, 0x3}, 0x14) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) socketpair$inet_dccp(0x2, 0x6, 0x0, &(0x7f0000000100)) socket$kcm(0x2, 0x3, 0x2) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={r0, 0x50, &(0x7f0000000480)={0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000340)=r2, 0x4) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000380)="6e7230010060a19ef9d2c623d9a1571cb9e1369bcd61ef7e49793ae18712eceb1daa769497800b7fbbd35b170c10751d39aeb660d863e49b8c4f3b3cad48902b5b2d6cfd0abd372c63bcf5d70df3fd4d2e8d443c88c60fd7140fbc0e5637dd82fc3435bed4de5d693c9a781c863e05d8a6f8689a5be29216061f3ff53f8b6b396678e7ba155ef9152d7e43b1eccb2331eb8eb1ed5586dcf8b3b0b999361a44ff2c22c2abbef42dd24eabe6723346a6e46c0499a21442d8d00dcb57f013ff7595edd0ff076930de3675d34117a44eb0e4f832936da44e") r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000040)={"6e72300100", 0x801}) ioctl$TUNSETLINK(r3, 0x400454cd, 0x308) getpid() openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='memory.stat\x00', 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000200)=@ax25={0x3, {"b8738e610d62ed"}}, 0x80, &(0x7f0000000040)}, 0x0) socket$kcm(0x29, 0x2, 0x0) 21:46:29 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x12, 0x7, &(0x7f0000000140)=ANY=[@ANYBLOB="7a0af8ff00000000bfa100000000000007010000f8ffffffb702000008000000bd120000000000008500000006000000b700000000000000950000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0xa}, 0x48) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000003c0), 0x4) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000640)={0xffffffffffffff9c, 0x10, &(0x7f0000000600)={&(0x7f0000000580)=""/78, 0x4e}}, 0x10) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00syz1\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f00000000c0)={r1, r0, 0xa}, 0x10) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000480)) ioctl$TUNGETIFF(0xffffffffffffffff, 0x800454d2, &(0x7f0000000400)) 21:46:29 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x12, 0x8, &(0x7f0000000140)=ANY=[@ANYBLOB="7a0af8ff00000000bfa100000000000007010000f8ffffffb702000008000000bd120000000000008500000006000000b7000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0xa}, 0x48) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000003c0), 0x4) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000640)={0xffffffffffffff9c, 0x10, &(0x7f0000000600)={&(0x7f0000000580)=""/78, 0x4e}}, 0x10) gettid() bpf$BPF_PROG_ATTACH(0x8, &(0x7f00000000c0)={0xffffffffffffffff, r0, 0xa}, 0x10) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000480)) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x9, 0x0, 0x100000001, 0x0, 0x400, 0x0, 0x64b, 0x0, 0x0, 0x0, 0x7, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TUNGETIFF(0xffffffffffffffff, 0x800454d2, &(0x7f0000000400)) close(0xffffffffffffffff) openat$cgroup_int(r1, &(0x7f00000004c0)="0300000021a200", 0x2, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000380)) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000340)={0xffffffffffffffff, 0x10, &(0x7f0000000300)={&(0x7f0000000240)=""/141, 0x8d, 0xffffffffffffffff}}, 0x10) 21:46:29 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCPKT(r0, 0x5420, &(0x7f0000000080)=0x4) r1 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f00000000c0)) ioctl$TCSETS(r0, 0x5402, &(0x7f0000000100)) ppoll(&(0x7f00000001c0)=[{r1}], 0x1, &(0x7f0000000200)={0x0, 0x989680}, &(0x7f0000000240), 0x8) 21:46:30 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='oom_score_adj\x00') ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r0, 0xc0045516, &(0x7f0000000140)=0xfffffefffffffffc) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) request_key(&(0x7f0000000000)='pkcs7_test\x00', &(0x7f0000000280)={'syz', 0x0}, &(0x7f0000000040)='/\x00', 0xfffffffffffffffe) request_key(&(0x7f00000000c0)='user\x00', &(0x7f0000000100)={'syz'}, &(0x7f0000000200)='vmnet0&#selfbdev&vboxnet0trustedselfeth1#c(vmnet0c^\x00', 0x0) 21:46:30 executing program 0: socket$nl_generic(0x10, 0x3, 0x10) r0 = dup(0xffffffffffffffff) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r0, 0x10e, 0x4, &(0x7f0000000580), 0x4) mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000040)='ns/mnt\x00') io_setup(0x0, &(0x7f0000000140)) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0x7, &(0x7f0000000100)={0x0, 0x1, 0xffffffff}, 0x10) clone(0x70024100, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000000), &(0x7f0000000140)) 21:46:30 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x12, 0x7, &(0x7f0000000140)=ANY=[@ANYBLOB="7a0af8ff00000000bfa100000000000007010000f8ffffffb702000008000000bd120000000000008500000006000000b70000000000000095000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0xa}, 0x48) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000003c0), 0x4) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000640)={0xffffffffffffff9c, 0x10, &(0x7f0000000600)={&(0x7f0000000580)=""/78, 0x4e}}, 0x10) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00syz1\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f00000000c0)={r1, r0, 0xa}, 0x10) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000480)) ioctl$TUNGETIFF(0xffffffffffffffff, 0x800454d2, &(0x7f0000000400)) [ 363.154260] IPVS: ftp: loaded support on port[0] = 21 21:46:30 executing program 2: 21:46:30 executing program 2: 21:46:30 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x12, 0x8, &(0x7f0000000140)=ANY=[@ANYBLOB="7a0af8ff00000000bfa100000000000007010000f8ffffffb702000008000000bd120000000000008500000006000000b7000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0xa}, 0x48) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000003c0), 0x4) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00syz1\x00', 0x200002, 0x0) gettid() bpf$BPF_PROG_ATTACH(0x8, &(0x7f00000000c0)={r1, r0, 0xa}, 0x10) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000480)) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x9, 0x0, 0x100000001, 0x0, 0x400, 0x0, 0x64b, 0x0, 0x0, 0x0, 0x7, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TUNGETIFF(r1, 0x800454d2, &(0x7f0000000400)) close(0xffffffffffffffff) openat$cgroup_int(r2, &(0x7f00000004c0)="0300000021a200", 0x2, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000380)) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000340)={0xffffffffffffffff, 0x10, &(0x7f0000000300)={&(0x7f0000000240)=""/141, 0x8d, 0xffffffffffffffff}}, 0x10) 21:46:30 executing program 3: openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vga_arbiter\x00', 0x200000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='oom_score_adj\x00') ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) request_key(&(0x7f0000000240)='pkcs7_test\x00', &(0x7f0000000280)={'syz', 0x0}, &(0x7f0000000300)='/\x00', 0xfffffffffffffffe) symlinkat(&(0x7f0000000000)='./file0\x00', r0, &(0x7f0000000040)='./file0\x00') request_key(&(0x7f00000000c0)='user\x00', &(0x7f0000000100)={'syz'}, &(0x7f0000000200)='vmnet0&#selfbdev&vboxnet0trustedselfeth1#c(vmnet0c^\x00', 0x0) [ 363.322536] device nr0 entered promiscuous mode 21:46:30 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x12, 0x8, &(0x7f0000000140)=ANY=[@ANYBLOB="7a0af8ff00000000bfa100000000000007010000f8ffffffb702000008000000bd120000000000008500000006000000b7000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00'}, 0x48) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000003c0), 0x4) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000640)={0xffffffffffffff9c, 0x10, &(0x7f0000000600)={&(0x7f0000000580)=""/78, 0x4e}}, 0x10) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00syz1\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f00000000c0)={r1, r0, 0xa}, 0x10) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000480)) ioctl$TUNGETIFF(0xffffffffffffffff, 0x800454d2, &(0x7f0000000400)) 21:46:31 executing program 4: r0 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000680)="0400"}, 0xffe5) bpf$BPF_PROG_DETACH(0x9, &(0x7f00000000c0)={0x0, r0, 0x0, 0x3}, 0x14) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) socketpair$inet_dccp(0x2, 0x6, 0x0, &(0x7f0000000100)) socket$kcm(0x2, 0x3, 0x2) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={r0, 0x50, &(0x7f0000000480)={0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000340)=r2, 0x4) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000380)="6e7230010060a19ef9d2c623d9a1571cb9e1369bcd61ef7e49793ae18712eceb1daa769497800b7fbbd35b170c10751d39aeb660d863e49b8c4f3b3cad48902b5b2d6cfd0abd372c63bcf5d70df3fd4d2e8d443c88c60fd7140fbc0e5637dd82fc3435bed4de5d693c9a781c863e05d8a6f8689a5be29216061f3ff53f8b6b396678e7ba155ef9152d7e43b1eccb2331eb8eb1ed5586dcf8b3b0b999361a44ff2c22c2abbef42dd24eabe6723346a6e46c0499a21442d8d00dcb57f013ff7595edd0ff076930de3675d34117a44eb0e4f832936da44e") r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000040)={"6e72300100", 0x801}) ioctl$TUNSETLINK(r3, 0x400454cd, 0x308) getpid() openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='memory.stat\x00', 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000200)=@ax25={0x3, {"b8738e610d62ed"}}, 0x80, &(0x7f0000000040)}, 0x0) socket$kcm(0x29, 0x2, 0x0) 21:46:31 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x12, 0x8, &(0x7f0000000140)=ANY=[@ANYBLOB="7a0af8ff00000000bfa100000000000007010000f8ffffffb702000008000000bd120000000000008500000006000000b7000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0xa}, 0x48) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000003c0), 0x4) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000640)={0xffffffffffffff9c, 0x10, &(0x7f0000000600)={&(0x7f0000000580)=""/78, 0x4e}}, 0x10) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00syz1\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f00000000c0)={0xffffffffffffffff, r0, 0xa}, 0x10) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000480)) ioctl$TUNGETIFF(0xffffffffffffffff, 0x800454d2, &(0x7f0000000400)) 21:46:31 executing program 2: 21:46:31 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x12, 0x8, &(0x7f0000000140)=ANY=[@ANYBLOB="7a0af8ff00000000bfa100000000000007010000f8ffffffb702000008000000bd120000000000008500000006000000b7000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0xa}, 0x48) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000640)={0xffffffffffffff9c, 0x10, &(0x7f0000000600)={&(0x7f0000000580)=""/78, 0x4e}}, 0x10) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00syz1\x00', 0x200002, 0x0) gettid() bpf$BPF_PROG_ATTACH(0x8, &(0x7f00000000c0)={r1, r0, 0xa}, 0x10) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000480)) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x9, 0x0, 0x100000001, 0x0, 0x400, 0x0, 0x64b, 0x0, 0x0, 0x0, 0x7, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TUNGETIFF(r1, 0x800454d2, &(0x7f0000000400)) close(0xffffffffffffffff) openat$cgroup_int(r2, &(0x7f00000004c0)="0300000021a200", 0x2, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000380)) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000340)={0xffffffffffffffff, 0x10, &(0x7f0000000300)={&(0x7f0000000240)=""/141, 0x8d, 0xffffffffffffffff}}, 0x10) 21:46:31 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='oom_score_adj\x00') ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x4000a) request_key(&(0x7f0000000240)='pkcs7_test\x00', &(0x7f0000000280)={'syz', 0x0}, &(0x7f0000000300)='/\x00', 0xfffffffffffffffe) request_key(&(0x7f00000000c0)='user\x00', &(0x7f0000000100)={'syz'}, &(0x7f0000000200)='vmnet0&#selfbdev&vboxnet0trustedselfeth1#c(vmnet0c^\x00', 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f0000000340)={'raw\x00', 0xab, "7627de387dbc414c7faf8bb09c04d207930cb635dc82d414f5fd904b7321a795cc30e0263a9f688855fa3b203d72795b7a687e3044f7849f9d565d188896a5416df13b1b2c69e341ef622baadadffe22de4f54b3e2f8996b2308e15f0441df589e15ecf1d05082f3cb872571f5f746e68ccddf92f470f0071906feceaf029b9ef76c1695eb346c495931b9e724d8649bdfb97d46b8c6639c05bedd86583ad080583edfb239bc3b39328820"}, &(0x7f0000000000)=0xcf) fcntl$getflags(r0, 0x1) 21:46:32 executing program 0: 21:46:32 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x12, 0x8, &(0x7f0000000140)=ANY=[@ANYBLOB="7a0af8ff00000000bfa100000000000007010000f8ffffffb702000008000000bd120000000000008500000006000000b7000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0xa}, 0x48) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000003c0), 0x4) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000640)={0xffffffffffffff9c, 0x10, &(0x7f0000000600)={&(0x7f0000000580)=""/78, 0x4e}}, 0x10) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00syz1\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f00000000c0)={r0, 0xffffffffffffffff, 0xa}, 0x10) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000480)) ioctl$TUNGETIFF(0xffffffffffffffff, 0x800454d2, &(0x7f0000000400)) 21:46:32 executing program 2: 21:46:32 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x12, 0x8, &(0x7f0000000140)=ANY=[@ANYBLOB="7a0af8ff00000000bfa100000000000007010000f8ffffffb702000008000000bd120000000000008500000006000000b7000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0xa}, 0x48) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000640)={0xffffffffffffff9c, 0x10, &(0x7f0000000600)={&(0x7f0000000580)=""/78, 0x4e}}, 0x10) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00syz1\x00', 0x200002, 0x0) gettid() bpf$BPF_PROG_ATTACH(0x8, &(0x7f00000000c0)={r1, r0, 0xa}, 0x10) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000480)) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x9, 0x0, 0x100000001, 0x0, 0x400, 0x0, 0x64b, 0x0, 0x0, 0x0, 0x7, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TUNGETIFF(r1, 0x800454d2, &(0x7f0000000400)) close(0xffffffffffffffff) openat$cgroup_int(r2, &(0x7f00000004c0)="0300000021a200", 0x2, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000380)) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000340)={0xffffffffffffffff, 0x10, &(0x7f0000000300)={&(0x7f0000000240)=""/141, 0x8d, 0xffffffffffffffff}}, 0x10) 21:46:32 executing program 3: syz_open_procfs(0x0, &(0x7f00000002c0)='oom_score_adj\x00') ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) r0 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) request_key(&(0x7f0000000080)='pkcs7_test\x00', &(0x7f0000000280)={'syz', 0x3}, &(0x7f0000000300)='/\x00', r0) request_key(&(0x7f00000000c0)='user\x00', &(0x7f0000000100)={'syz'}, &(0x7f0000000200)='vmnet0&#selfbdev&vboxnet0trustedselfeth1#c(vmnet0c^\x00', 0x0) 21:46:32 executing program 4: r0 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000680)="0400"}, 0xffe5) bpf$BPF_PROG_DETACH(0x9, &(0x7f00000000c0)={0x0, r0, 0x0, 0x3}, 0x14) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) socketpair$inet_dccp(0x2, 0x6, 0x0, &(0x7f0000000100)) socket$kcm(0x2, 0x3, 0x2) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={r0, 0x50, &(0x7f0000000480)={0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000340)=r2, 0x4) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000380)="6e7230010060a19ef9d2c623d9a1571cb9e1369bcd61ef7e49793ae18712eceb1daa769497800b7fbbd35b170c10751d39aeb660d863e49b8c4f3b3cad48902b5b2d6cfd0abd372c63bcf5d70df3fd4d2e8d443c88c60fd7140fbc0e5637dd82fc3435bed4de5d693c9a781c863e05d8a6f8689a5be29216061f3ff53f8b6b396678e7ba155ef9152d7e43b1eccb2331eb8eb1ed5586dcf8b3b0b999361a44ff2c22c2abbef42dd24eabe6723346a6e46c0499a21442d8d00dcb57f013ff7595edd0ff076930de3675d34117a44eb0e4f832936da44e") r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000040)={"6e72300100", 0x801}) ioctl$TUNSETLINK(r3, 0x400454cd, 0x308) perf_event_open(&(0x7f0000000540)={0x0, 0x70, 0xf2, 0x4, 0x400, 0xadb0, 0x0, 0x0, 0x40000001110, 0x0, 0x2, 0x0, 0x0, 0x7, 0x5, 0x3, 0x401, 0x1, 0x5, 0x401, 0xce4, 0x87b, 0x3, 0x2, 0x9212, 0x0, 0x4, 0x40, 0x7ff, 0x100000001, 0x0, 0x6, 0x80000000, 0x6, 0xd7, 0x4, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={&(0x7f0000000500), 0xa}, 0x404c, 0x0, 0xffffffffffffffff}, 0x0, 0x9, r0, 0xa) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='memory.stat\x00', 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000200)=@ax25={0x3, {"b8738e610d62ed"}}, 0x80, &(0x7f0000000040)}, 0x0) socket$kcm(0x29, 0x2, 0x0) 21:46:32 executing program 2: 21:46:32 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='oom_score_adj\x00') ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) write$P9_RVERSION(r0, &(0x7f0000000000)={0x15, 0x65, 0xffff, 0xb8, 0x8, '9P2000.L'}, 0x15) request_key(&(0x7f0000000240)='pkcs7_test\x00', &(0x7f0000000280)={'syz', 0x0}, &(0x7f0000000300)='/\x00', 0xfffffffffffffffe) request_key(&(0x7f00000000c0)='user\x00', &(0x7f0000000100)={'syz'}, &(0x7f0000000200)='vmnet0&#selfbdev&vboxnet0trustedselfeth1#c(vmnet0c^\x00', 0x0) 21:46:33 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x12, 0x8, &(0x7f0000000140)=ANY=[@ANYBLOB="7a0af8ff00000000bfa100000000000007010000f8ffffffb702000008000000bd120000000000008500000006000000b7000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0xa}, 0x48) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000003c0), 0x4) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000640)={0xffffffffffffff9c, 0x10, &(0x7f0000000600)={&(0x7f0000000580)=""/78, 0x4e}}, 0x10) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00syz1\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f00000000c0)={r1, r0}, 0x10) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000480)) ioctl$TUNGETIFF(0xffffffffffffffff, 0x800454d2, &(0x7f0000000400)) 21:46:33 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x40000000000010) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000240)="480000001500197f09004b0101048c590188ffffcf5d3474bc9240e10520613057fff7e07900e0fe5f0028213ee20600d4ff5bffff00c7e5ed5e00000000c8550000000000000000", 0x48}], 0x1) 21:46:33 executing program 0: r0 = socket$inet(0x2, 0x3, 0x7) setsockopt$inet_msfilter(r0, 0x0, 0x29, &(0x7f0000000180)=ANY=[@ANYBLOB="e000ee02ac1414aa000000f901000000ac1414bbac1414aa"], 0x1) 21:46:33 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x12, 0x8, &(0x7f0000000140)=ANY=[@ANYBLOB="7a0af8ff00000000bfa100000000000007010000f8ffffffb702000008000000bd120000000000008500000006000000b7000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0xa}, 0x48) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000640)={0xffffffffffffff9c, 0x10, &(0x7f0000000600)={&(0x7f0000000580)=""/78, 0x4e}}, 0x10) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00syz1\x00', 0x200002, 0x0) gettid() bpf$BPF_PROG_ATTACH(0x8, &(0x7f00000000c0)={r1, r0, 0xa}, 0x10) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000480)) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x9, 0x0, 0x100000001, 0x0, 0x400, 0x0, 0x64b, 0x0, 0x0, 0x0, 0x7, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TUNGETIFF(r1, 0x800454d2, &(0x7f0000000400)) close(0xffffffffffffffff) openat$cgroup_int(r2, &(0x7f00000004c0)="0300000021a200", 0x2, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000380)) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000340)={0xffffffffffffffff, 0x10, &(0x7f0000000300)={&(0x7f0000000240)=""/141, 0x8d, 0xffffffffffffffff}}, 0x10) [ 366.252892] device nr0 entered promiscuous mode 21:46:33 executing program 3: r0 = request_key(&(0x7f0000000000)='.request_key_auth\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000080)='vmnet0&#selfbdev&vboxnet0trustedselfeth1#c(vmnet0c^\x00', 0x0) keyctl$invalidate(0x15, r0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) request_key(&(0x7f0000000240)='pkcs7_test\x00', &(0x7f0000000280)={'syz', 0x0}, &(0x7f0000000300)='/\x00', 0xfffffffffffffffe) request_key(&(0x7f00000000c0)='user\x00', &(0x7f0000000100)={'syz'}, &(0x7f0000000200)='vmnet0&#selfbdev&vboxnet0trustedselfeth1#c(vmnet0c^\x00', 0x0) 21:46:33 executing program 2: syz_emit_ethernet(0x7a, &(0x7f0000000180)={@local, @local, [], {@ipv6={0x86dd, {0x0, 0x6, "bb0bab", 0x44, 0x7f, 0x0, @remote, @dev, {[], @gre}}}}}, &(0x7f0000000580)) 21:46:33 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x12, 0x8, &(0x7f0000000140)=ANY=[@ANYBLOB="7a0af8ff00000000bfa100000000000007010000f8ffffffb702000008000000bd120000000000008500000006000000b7000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0xa}, 0x48) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000003c0), 0x4) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000640)={0xffffffffffffff9c, 0x10, &(0x7f0000000600)={&(0x7f0000000580)=""/78, 0x4e}}, 0x10) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00syz1\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f00000000c0)={r1, r0, 0xa}, 0x10) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000480)) ioctl$TUNGETIFF(0xffffffffffffffff, 0x800454d2, &(0x7f0000000400)) 21:46:33 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='oom_score_adj\x00') ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x0) request_key(&(0x7f0000000240)='pkcs7_test\x00', &(0x7f0000000280)={'syz', 0x0}, &(0x7f0000000300)='/\x00', 0xfffffffffffffffe) request_key(&(0x7f00000000c0)='user\x00', &(0x7f0000000100)={'syz'}, &(0x7f0000000200)='vmnet0&#selfbdev&vboxnet0trustedselfeth1#c(vmnet0c^\x00', 0x0) 21:46:33 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000003c0), 0x4) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000640)={0xffffffffffffff9c, 0x10, &(0x7f0000000600)={&(0x7f0000000580)=""/78, 0x4e}}, 0x10) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00syz1\x00', 0x200002, 0x0) gettid() bpf$BPF_PROG_ATTACH(0x8, &(0x7f00000000c0)={r0, 0xffffffffffffffff, 0xa}, 0x10) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000480)) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x9, 0x0, 0x100000001, 0x0, 0x400, 0x0, 0x64b, 0x0, 0x0, 0x0, 0x7, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TUNGETIFF(r0, 0x800454d2, &(0x7f0000000400)) close(0xffffffffffffffff) openat$cgroup_int(r1, &(0x7f00000004c0)="0300000021a200", 0x2, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000380)) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000340)={0xffffffffffffffff, 0x10, &(0x7f0000000300)={&(0x7f0000000240)=""/141, 0x8d, 0xffffffffffffffff}}, 0x10) 21:46:33 executing program 4: r0 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000680)="0400"}, 0xffe5) bpf$BPF_PROG_DETACH(0x9, &(0x7f00000000c0)={0x0, r0, 0x0, 0x3}, 0x14) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) socketpair$inet_dccp(0x2, 0x6, 0x0, &(0x7f0000000100)) socket$kcm(0x2, 0x3, 0x2) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={r0, 0x50, &(0x7f0000000480)={0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000340)=r2, 0x4) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000380)="6e7230010060a19ef9d2c623d9a1571cb9e1369bcd61ef7e49793ae18712eceb1daa769497800b7fbbd35b170c10751d39aeb660d863e49b8c4f3b3cad48902b5b2d6cfd0abd372c63bcf5d70df3fd4d2e8d443c88c60fd7140fbc0e5637dd82fc3435bed4de5d693c9a781c863e05d8a6f8689a5be29216061f3ff53f8b6b396678e7ba155ef9152d7e43b1eccb2331eb8eb1ed5586dcf8b3b0b999361a44ff2c22c2abbef42dd24eabe6723346a6e46c0499a21442d8d00dcb57f013ff7595edd0ff076930de3675d34117a44eb0e4f832936da44e") r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000040)={"6e72300100", 0x801}) ioctl$TUNSETLINK(r3, 0x400454cd, 0x308) perf_event_open(&(0x7f0000000540)={0x0, 0x70, 0xf2, 0x4, 0x400, 0xadb0, 0x0, 0x0, 0x40000001110, 0x0, 0x2, 0x0, 0x0, 0x7, 0x5, 0x3, 0x401, 0x1, 0x5, 0x401, 0xce4, 0x87b, 0x3, 0x2, 0x9212, 0x0, 0x4, 0x40, 0x7ff, 0x100000001, 0x0, 0x6, 0x80000000, 0x6, 0xd7, 0x4, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={&(0x7f0000000500), 0xa}, 0x404c, 0x0, 0xffffffffffffffff}, 0x0, 0x9, r0, 0xa) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='memory.stat\x00', 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000200)=@ax25={0x3, {"b8738e610d62ed"}}, 0x80, &(0x7f0000000040)}, 0x0) socket$kcm(0x29, 0x2, 0x0) 21:46:33 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000140)="6e65742f6465765f6d6361737400c087ea55011e14c9e347dd1f55a6026a1cb7e067f3c577981c0994a1e80d90d49d68bdbc91fab9c1c7f063e676e83c740e2d647534a1045850a23665d81ca0728d1721c0b8756c4df6ec1e548462eba06c363fce645db3df00000000000000") perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x6, 0x108000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000865ff5)='clear_refs\x00') sendfile(r1, r0, &(0x7f0000000000)=0xf, 0x400d) 21:46:33 executing program 0: perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x5, 0x108000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x40000000002, 0x3, 0x2) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000003840)={{{@in6=@ipv4={[], [], @broadcast}, @in=@dev}}, {{@in6=@mcast2}, 0x0, @in=@rand_addr}}, &(0x7f0000003940)=0xe8) 21:46:33 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000140)="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") fsetxattr(r0, &(0x7f0000000000)=@known='user.syz\x00', &(0x7f00000000c0)='\x00', 0x1, 0x0) 21:46:33 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='oom_score_adj\x00') ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r0, 0x84, 0x72, &(0x7f0000000000)={0x0, 0x5, 0x30}, &(0x7f0000000040)=0xc) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(r0, 0x84, 0x6d, &(0x7f0000000140)={r1, 0x98, "a31a6da363a1e36d9ac75efb811e7f32be8bab8db4a9a3075328fac11a850388acdfbe4a9243193a3f7a8db0a779ade53989abaf8fa97ae1a1af9447bc13d9714b79b69f7c8dee1462972f039a40631b0adc625dbc89fe65bea2bafaa0c05b7b83f50a12f3e2ce2f2efe5ade153161b191b870e75254593eb2137b6653163997cfc2e8f85ce0e34a87bf3de17fedf10173ac7f4e78714fce"}, &(0x7f0000000080)=0xa0) request_key(&(0x7f0000000240)='pkcs7_test\x00', &(0x7f0000000280)={'syz', 0x0}, &(0x7f0000000300)='/\x00', 0xfffffffffffffffe) request_key(&(0x7f00000000c0)='user\x00', &(0x7f0000000100)={'syz'}, &(0x7f0000000200)='vmnet0&#selfbdev&vboxnet0trustedselfeth1#c(vmnet0c^\x00', 0x0) 21:46:33 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x12, 0x8, &(0x7f0000000140)=ANY=[@ANYBLOB="7a0af8ff00000000bfa100000000000007010000f8ffffffb702000008000000bd120000000000008500000006000000b7000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0xa}, 0x48) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000003c0), 0x4) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000640)={0xffffffffffffff9c, 0x10, &(0x7f0000000600)={&(0x7f0000000580)=""/78, 0x4e}}, 0x10) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00syz1\x00', 0x200002, 0x0) gettid() bpf$BPF_PROG_ATTACH(0x8, &(0x7f00000000c0)={r1, r0, 0xa}, 0x10) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000480)) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x9, 0x0, 0x100000001, 0x0, 0x400, 0x0, 0x64b, 0x0, 0x0, 0x0, 0x7, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TUNGETIFF(r1, 0x800454d2, &(0x7f0000000400)) close(0xffffffffffffffff) openat$cgroup_int(r2, &(0x7f00000004c0)="0300000021a200", 0x2, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000380)) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000340)={0xffffffffffffffff, 0x10, &(0x7f0000000300)={&(0x7f0000000240)=""/141, 0x8d, 0xffffffffffffffff}}, 0x10) 21:46:33 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f00000007c0)='cgroup.type\x00', 0x2, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) write$cgroup_type(r1, &(0x7f0000000180)='threaded\x00', 0xffffff5f) recvmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000040)=@ax25, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0xffda}, 0x3f00) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000006c0)={&(0x7f0000000680)='syz_tun\x00'}, 0x10) recvmsg(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000300)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, 0x80, &(0x7f0000000480), 0x0, &(0x7f0000000280)=""/23, 0x17}, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000400)={r1, 0x28, &(0x7f0000000740)}, 0x10) 21:46:33 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='oom_score_adj\x00') ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r0, 0x84, 0x70, &(0x7f0000000580)={0x0, @in={{0x2, 0x4e20, @rand_addr=0x1}}, [0x3b14, 0x72, 0x3ff, 0x0, 0x8000, 0x4, 0x2, 0x8, 0x3800000000000000, 0x100000001, 0x2, 0x401, 0x7ff, 0x3, 0xff38]}, &(0x7f0000000240)=0x100) setsockopt$inet_sctp_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f0000000280)={r1, 0x1000, 0x200, 0x1ff, 0xc1b, 0x1}, 0x14) r2 = request_key(&(0x7f0000000440)='user\x00', &(0x7f0000000480)={'syz', 0x2}, &(0x7f00000004c0)='pkcs7_test\x00', 0xfffffffffffffffd) r3 = request_key(&(0x7f0000000500)='pZcs7_test\x00', &(0x7f0000000540)={'syz', 0x0}, &(0x7f00000001c0)='ghash-generic\x00', r2) keyctl$dh_compute(0x17, &(0x7f0000000000)={r3, r3, r3}, &(0x7f0000000340)=""/207, 0xcf, &(0x7f0000000080)={&(0x7f0000000040)={'ghash-generic\x00'}, &(0x7f0000000140)="21731441c4ab9a0a3eb91ebf50698ca08a9c9a2aa73a53feb23dedd09271fe6616c71487c099d5ee20149ab722e8350bde7ef6b4e83157e750f724f51c002e0aa8bbb916", 0x44}) request_key(&(0x7f00000000c0)='user\x00', &(0x7f0000000100)={'syz'}, &(0x7f0000000200)='vmnet0&#selfbdev&vboxnet0trustedselfeth1#c(vmnet0c^\x00', 0x0) 21:46:33 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x12, 0x8, &(0x7f0000000140)=ANY=[@ANYBLOB="7a0af8ff00000000bfa100000000000007010000f8ffffffb702000008000000bd120000000000008500000006000000b7000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0xa}, 0x48) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000003c0), 0x4) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000640)={0xffffffffffffff9c, 0x10, &(0x7f0000000600)={&(0x7f0000000580)=""/78, 0x4e}}, 0x10) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00syz1\x00', 0x200002, 0x0) gettid() bpf$BPF_PROG_ATTACH(0x8, &(0x7f00000000c0)={r1, r0, 0xa}, 0x10) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000480)) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x9, 0x0, 0x100000001, 0x0, 0x400, 0x0, 0x64b, 0x0, 0x0, 0x0, 0x7, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TUNGETIFF(r1, 0x800454d2, &(0x7f0000000400)) close(0xffffffffffffffff) openat$cgroup_int(r2, &(0x7f00000004c0)="0300000021a200", 0x2, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000380)) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000340)={0xffffffffffffffff, 0x10, &(0x7f0000000300)={&(0x7f0000000240)=""/141, 0x8d, 0xffffffffffffffff}}, 0x10) 21:46:33 executing program 3: ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000040)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000080)={0x0, 0x0}) r1 = syz_open_procfs(r0, &(0x7f00000002c0)='oom_score_adj\x00') ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) ioctl$SNDRV_CTL_IOCTL_PCM_NEXT_DEVICE(r1, 0x80045530, &(0x7f0000000000)=""/24) request_key(&(0x7f0000000240)='pkcs7_test\x00', &(0x7f0000000280)={'syz', 0x0}, &(0x7f0000000300)='/\x00', 0xfffffffffffffffe) getsockopt$bt_BT_SNDMTU(r1, 0x112, 0xc, &(0x7f0000000140)=0x8, &(0x7f0000000180)=0x2) request_key(&(0x7f00000000c0)='user\x00', &(0x7f0000000100)={'syz'}, &(0x7f0000000200)='vmnet0&#selfbdev&vboxnet0trustedselfeth1#c(vmnet0c^\x00', 0x0) 21:46:34 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x12, 0x8, &(0x7f0000000140)=ANY=[@ANYBLOB="7a0af8ff00000000bfa100000000000007010000f8ffffffb702000008000000bd120000000000008500000006000000b7000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0xa}, 0x48) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000003c0), 0x4) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000640)={0xffffffffffffff9c, 0x10, &(0x7f0000000600)={&(0x7f0000000580)=""/78, 0x4e}}, 0x10) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00syz1\x00', 0x200002, 0x0) gettid() bpf$BPF_PROG_ATTACH(0x8, &(0x7f00000000c0)={r1, r0, 0xa}, 0x10) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000480)) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x9, 0x0, 0x100000001, 0x0, 0x400, 0x0, 0x64b, 0x0, 0x0, 0x0, 0x7, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TUNGETIFF(r1, 0x800454d2, &(0x7f0000000400)) close(0xffffffffffffffff) openat$cgroup_int(r2, &(0x7f00000004c0)="0300000021a200", 0x2, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000380)) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000340)={0xffffffffffffffff, 0x10, &(0x7f0000000300)={&(0x7f0000000240)=""/141, 0x8d, 0xffffffffffffffff}}, 0x10) 21:46:34 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='oom_score_adj\x00') clock_gettime(0x0, &(0x7f0000000000)={0x0, 0x0}) clock_gettime(0x0, &(0x7f0000000040)={0x0, 0x0}) write$sndseq(r0, &(0x7f0000000340)=[{0x5, 0x1, 0x8, 0x9, @tick=0x983d, {0x84a, 0x5}, {0x7, 0x80000001}, @raw8={"2a554ebeea3a8f68e706367e"}}, {0x10001, 0x7, 0x2, 0x200, @time, {0x6, 0x8000}, {0x3, 0xdd}, @queue={0xffffffff, {0x5, 0xff}}}, {0x1, 0x15, 0x95, 0x1, @time={r1, r2+30000000}, {0x1000}, {0xfffffffffffff104, 0x7fff}, @time=@time={r3, r4+10000000}}, {0x4, 0xffffffff80000000, 0x80, 0x5, @tick=0x4, {0x9, 0x2}, {0x7, 0x3}, @queue={0x4, {0x8c9, 0x1f}}}, {0x7fffffff, 0x8, 0x5, 0x8, @tick, {0xf768, 0x6}, {0x4}, @raw32={[0x4718, 0x3, 0x800]}}, {0x1, 0x400, 0xedc6, 0x0, @time={0x77359400}, {0x42, 0x40}, {0x80, 0x9}, @raw32={[0x1, 0x42af, 0xf382]}}, {0x6, 0xfffffffffffffff8, 0x8bc, 0xa94, @time, {0x4, 0x1f}, {0x7, 0x2}, @raw8={"bea31a9b0b2b81d88c3f21b9"}}, {0x7, 0x8000000000, 0x7, 0x4, @tick=0xf06, {0xa51, 0x62f}, {0x4, 0x8000}, @quote={{0xfffffffffffffffb, 0x4}, 0x5b84, &(0x7f0000000080)={0xceb5, 0x81, 0x2, 0x63d63710, @tick=0xf810, {0x7, 0xe242}, {0x3, 0x6}, @quote={{0x7, 0x7}, 0x1}}}}], 0x180) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) request_key(&(0x7f0000000240)='pkcs7_test\x00', &(0x7f0000000280)={'syz', 0x0}, &(0x7f0000000300)='/\x00', 0xfffffffffffffffe) request_key(&(0x7f00000000c0)='user\x00', &(0x7f0000000100)={'syz', 0x0}, &(0x7f0000000200)='vmnet0&#selfbdev&vboxnet0trustedselfeth1#c(vmnet0c^\x00', 0x0) 21:46:35 executing program 4: r0 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000680)="0400"}, 0xffe5) bpf$BPF_PROG_DETACH(0x9, &(0x7f00000000c0)={0x0, r0, 0x0, 0x3}, 0x14) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) socketpair$inet_dccp(0x2, 0x6, 0x0, &(0x7f0000000100)) socket$kcm(0x2, 0x3, 0x2) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={r0, 0x50, &(0x7f0000000480)={0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000340)=r2, 0x4) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000380)="6e7230010060a19ef9d2c623d9a1571cb9e1369bcd61ef7e49793ae18712eceb1daa769497800b7fbbd35b170c10751d39aeb660d863e49b8c4f3b3cad48902b5b2d6cfd0abd372c63bcf5d70df3fd4d2e8d443c88c60fd7140fbc0e5637dd82fc3435bed4de5d693c9a781c863e05d8a6f8689a5be29216061f3ff53f8b6b396678e7ba155ef9152d7e43b1eccb2331eb8eb1ed5586dcf8b3b0b999361a44ff2c22c2abbef42dd24eabe6723346a6e46c0499a21442d8d00dcb57f013ff7595edd0ff076930de3675d34117a44eb0e4f832936da44e") r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000040)={"6e72300100", 0x801}) r4 = getpid() perf_event_open(&(0x7f0000000540)={0x0, 0x70, 0xf2, 0x4, 0x400, 0xadb0, 0x0, 0x0, 0x40000001110, 0x0, 0x2, 0x0, 0x0, 0x7, 0x5, 0x3, 0x401, 0x1, 0x5, 0x401, 0xce4, 0x87b, 0x3, 0x2, 0x9212, 0x0, 0x4, 0x40, 0x7ff, 0x100000001, 0x0, 0x6, 0x80000000, 0x6, 0xd7, 0x4, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={&(0x7f0000000500), 0xa}, 0x404c, 0x0, 0xffffffffffffffff}, r4, 0x9, r0, 0xa) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='memory.stat\x00', 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000200)=@ax25={0x3, {"b8738e610d62ed"}}, 0x80, &(0x7f0000000040)}, 0x0) socket$kcm(0x29, 0x2, 0x0) 21:46:35 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='oom_score_adj\x00') ioctl$sock_inet_SIOCGIFNETMASK(r0, 0x891b, &(0x7f0000000000)={'vlan0\x00', {0x2, 0x4e21, @local}}) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) request_key(&(0x7f0000000240)='pkcs7_test\x00', &(0x7f0000000280)={'syz', 0x0}, &(0x7f0000000300)='/\x00', 0xfffffffffffffffe) request_key(&(0x7f00000000c0)='user\x00', &(0x7f0000000100)={'syz'}, &(0x7f0000000200)='vmnet0&#selfbdev&vboxnet0trustedselfeth1#c(vmnet0c^\x00', 0x0) ioctl$EVIOCGRAB(r0, 0x40044590, &(0x7f0000000040)=0x9) fcntl$getown(r0, 0x9) 21:46:35 executing program 1: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x12, 0x8, &(0x7f0000000140)=ANY=[@ANYBLOB="7a0af8ff00000000bfa100000000000007010000f8ffffffb702000008000000bd120000000000008500000006000000b7000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0xa}, 0x48) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000003c0), 0x4) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000640)={0xffffffffffffff9c, 0x10, &(0x7f0000000600)={&(0x7f0000000580)=""/78, 0x4e}}, 0x10) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00syz1\x00', 0x200002, 0x0) gettid() bpf$BPF_PROG_ATTACH(0x8, &(0x7f00000000c0)={r1, r0, 0xa}, 0x10) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000480)) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x9, 0x0, 0x100000001, 0x0, 0x400, 0x0, 0x64b, 0x0, 0x0, 0x0, 0x7, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TUNGETIFF(r1, 0x800454d2, &(0x7f0000000400)) close(0xffffffffffffffff) openat$cgroup_int(r2, &(0x7f00000004c0)="0300000021a200", 0x2, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000380)) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000340)={0xffffffffffffffff, 0x10, &(0x7f0000000300)={&(0x7f0000000240)=""/141, 0x8d, 0xffffffffffffffff}}, 0x10) 21:46:35 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x12, 0x8, &(0x7f0000000140)=ANY=[@ANYBLOB="7a0af8ff00000000bfa100000000000007010000f8ffffffb702000008000000bd120000000000008500000006000000b7000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0xa}, 0x48) r1 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000003c0), 0x4) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000640)={0xffffffffffffff9c, 0x10, &(0x7f0000000600)={&(0x7f0000000580)=""/78, 0x4e, 0x0}}, 0x10) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000006c0)={r1, 0x10, &(0x7f0000000680)={&(0x7f0000000500)=""/66, 0x42, r2}}, 0x10) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00syz1\x00', 0x200002, 0x0) gettid() bpf$BPF_PROG_ATTACH(0x8, &(0x7f00000000c0)={r3, r0, 0xa}, 0x10) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000480)) ioctl$TUNGETIFF(0xffffffffffffffff, 0x800454d2, &(0x7f0000000400)) close(0xffffffffffffffff) openat$cgroup_int(r4, &(0x7f00000004c0)="0300000021a200", 0x2, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000380)) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000340)={0xffffffffffffffff, 0x10, &(0x7f0000000300)={&(0x7f0000000240)=""/141, 0x8d, 0xffffffffffffffff}}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000440), 0x4) 21:46:35 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f00000007c0)='cgroup.type\x00', 0x2, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) write$cgroup_type(r1, &(0x7f0000000180)='threaded\x00', 0xffffff5f) recvmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000040)=@ax25, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0xffda}, 0x3f00) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000006c0)={&(0x7f0000000680)='syz_tun\x00'}, 0x10) recvmsg(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000300)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, 0x80, &(0x7f0000000480), 0x0, &(0x7f0000000280)=""/23, 0x17}, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000400)={r1, 0x28, &(0x7f0000000740)}, 0x10) 21:46:35 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f00000007c0)='cgroup.type\x00', 0x2, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) write$cgroup_type(r1, &(0x7f0000000180)='threaded\x00', 0xffffff5f) recvmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000040)=@ax25, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0xffda}, 0x3f00) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000006c0)={&(0x7f0000000680)='syz_tun\x00'}, 0x10) recvmsg(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000300)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, 0x80, &(0x7f0000000480), 0x0, &(0x7f0000000280)=""/23, 0x17}, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000400)={r1, 0x28, &(0x7f0000000740)}, 0x10) 21:46:35 executing program 1: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x12, 0x8, &(0x7f0000000140)=ANY=[@ANYBLOB="7a0af8ff00000000bfa100000000000007010000f8ffffffb702000008000000bd120000000000008500000006000000b7000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0xa}, 0x48) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000003c0), 0x4) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000640)={0xffffffffffffff9c, 0x10, &(0x7f0000000600)={&(0x7f0000000580)=""/78, 0x4e}}, 0x10) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00syz1\x00', 0x200002, 0x0) gettid() bpf$BPF_PROG_ATTACH(0x8, &(0x7f00000000c0)={r1, r0, 0xa}, 0x10) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000480)) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x9, 0x0, 0x100000001, 0x0, 0x400, 0x0, 0x64b, 0x0, 0x0, 0x0, 0x7, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TUNGETIFF(r1, 0x800454d2, &(0x7f0000000400)) close(0xffffffffffffffff) openat$cgroup_int(r2, &(0x7f00000004c0)="0300000021a200", 0x2, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000380)) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000340)={0xffffffffffffffff, 0x10, &(0x7f0000000300)={&(0x7f0000000240)=""/141, 0x8d, 0xffffffffffffffff}}, 0x10) 21:46:35 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='oom_score_adj\x00') ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) request_key(&(0x7f0000000240)='pkcs7_test\x00', &(0x7f0000000280)={'syz', 0x0}, &(0x7f0000000300)='/\x00', 0xfffffffffffffffe) request_key(&(0x7f00000000c0)='user\x00', &(0x7f0000000100)={'syz'}, &(0x7f0000000200)='vmnet0&#selfbdev&vboxnet0trustedselfeth1#c(vmnet0c^\x00', 0x0) ioctl$EVIOCGABS0(r0, 0x80184540, &(0x7f0000000000)=""/129) [ 368.461135] device nr0 entered promiscuous mode 21:46:35 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='oom_score_adj\x00') r1 = add_key(&(0x7f0000000140)='big_key\x00', &(0x7f0000000180)={'syz', 0x1}, &(0x7f0000000340)="6d11d9023a751ba11b587240109467b43ee50db293922c626571a6ebf11e601caea63307382cac46c13f7c394a98f4737e081b3e9a326cf226e0f0351dd6a4af10ba76ec20ce8fae1bebd7e03adcfe214677ea019d9276b83000dd8bdcf6403631f62eed90897ded871b8953404077f9a06f67c65096ff20b1169cad6f00df46a7813c1f21100c43d546eeec96623bf2fa7b469849952459df03d4cc1bd296160222bb57e5143f7fa4d1bf917ed90ab5de1760855c731e0806574dcbfeb04211988daa32732bf49a9f2a0ce53293a21adae8080bdce3d27feaef6c72015d", 0xde, 0xfffffffffffffffb) r2 = request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000080)='pkcs7_test\x00', r1) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) r3 = mmap$binder(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x1, 0x2012, r0, 0x0) ioctl$BINDER_GET_NODE_DEBUG_INFO(r0, 0xc018620b, &(0x7f00000001c0)={r3}) request_key(&(0x7f0000000240)='pkcs7_test\x00', &(0x7f0000000280)={'syz', 0x0}, &(0x7f0000000300)='/\x00', r1) request_key(&(0x7f0000000440)='asymmetric\x00', &(0x7f0000000480)={'syz', 0x3}, &(0x7f0000000200)='vmnet0&#selfbdev&vboxnet0trustedselfeth1#c(vmnet0c^\x00', r2) 21:46:35 executing program 1: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x12, 0x8, &(0x7f0000000140)=ANY=[@ANYBLOB="7a0af8ff00000000bfa100000000000007010000f8ffffffb702000008000000bd120000000000008500000006000000b7000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0xa}, 0x48) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000003c0), 0x4) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000640)={0xffffffffffffff9c, 0x10, &(0x7f0000000600)={&(0x7f0000000580)=""/78, 0x4e}}, 0x10) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00syz1\x00', 0x200002, 0x0) gettid() bpf$BPF_PROG_ATTACH(0x8, &(0x7f00000000c0)={r1, r0, 0xa}, 0x10) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000480)) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x9, 0x0, 0x100000001, 0x0, 0x400, 0x0, 0x64b, 0x0, 0x0, 0x0, 0x7, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TUNGETIFF(r1, 0x800454d2, &(0x7f0000000400)) close(0xffffffffffffffff) openat$cgroup_int(r2, &(0x7f00000004c0)="0300000021a200", 0x2, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000380)) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000340)={0xffffffffffffffff, 0x10, &(0x7f0000000300)={&(0x7f0000000240)=""/141, 0x8d, 0xffffffffffffffff}}, 0x10) 21:46:35 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x12, 0x8, &(0x7f0000000140)=ANY=[@ANYBLOB="7a0af8ff00000000bfa100000000000007010000f8ffffffb702000008000000bd120000000000008500000006000000b7000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0xa}, 0x48) r1 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000003c0), 0x4) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000640)={0xffffffffffffff9c, 0x10, &(0x7f0000000600)={&(0x7f0000000580)=""/78, 0x4e, 0x0}}, 0x10) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000006c0)={r1, 0x10, &(0x7f0000000680)={&(0x7f0000000500)=""/66, 0x42, r2}}, 0x10) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00syz1\x00', 0x200002, 0x0) gettid() bpf$BPF_PROG_ATTACH(0x8, &(0x7f00000000c0)={r3, r0, 0xa}, 0x10) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000480)) ioctl$TUNGETIFF(0xffffffffffffffff, 0x800454d2, &(0x7f0000000400)) close(0xffffffffffffffff) openat$cgroup_int(r4, &(0x7f00000004c0)="0300000021a200", 0x2, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000380)) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000340)={0xffffffffffffffff, 0x10, &(0x7f0000000300)={&(0x7f0000000240)=""/141, 0x8d, 0xffffffffffffffff}}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000440), 0x4) 21:46:35 executing program 3: ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000040)=0x0) r1 = syz_open_procfs(r0, &(0x7f0000000140)='net/sockstat\x00') ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) request_key(&(0x7f0000000240)='pkcs7_test\x00', &(0x7f0000000280)={'syz', 0x0}, &(0x7f0000000300)='/\x00', 0xfffffffffffffffe) request_key(&(0x7f00000000c0)='user\x00', &(0x7f0000000100)={'syz'}, &(0x7f0000000200)='vmnet0&#selfbdev&vboxnet0trustedselfeth1#c(vmnet0c^\x00', 0x0) accept$inet6(r1, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote}, &(0x7f0000000080)=0x1c) 21:46:36 executing program 4: r0 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000680)="0400"}, 0xffe5) bpf$BPF_PROG_DETACH(0x9, &(0x7f00000000c0)={0x0, r0, 0x0, 0x3}, 0x14) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) socketpair$inet_dccp(0x2, 0x6, 0x0, &(0x7f0000000100)) socket$kcm(0x2, 0x3, 0x2) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={r0, 0x50, &(0x7f0000000480)={0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000340)=r2, 0x4) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000380)="6e7230010060a19ef9d2c623d9a1571cb9e1369bcd61ef7e49793ae18712eceb1daa769497800b7fbbd35b170c10751d39aeb660d863e49b8c4f3b3cad48902b5b2d6cfd0abd372c63bcf5d70df3fd4d2e8d443c88c60fd7140fbc0e5637dd82fc3435bed4de5d693c9a781c863e05d8a6f8689a5be29216061f3ff53f8b6b396678e7ba155ef9152d7e43b1eccb2331eb8eb1ed5586dcf8b3b0b999361a44ff2c22c2abbef42dd24eabe6723346a6e46c0499a21442d8d00dcb57f013ff7595edd0ff076930de3675d34117a44eb0e4f832936da44e") r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000040)={"6e72300100", 0x801}) r4 = getpid() perf_event_open(&(0x7f0000000540)={0x0, 0x70, 0xf2, 0x4, 0x400, 0xadb0, 0x0, 0x0, 0x40000001110, 0x0, 0x2, 0x0, 0x0, 0x7, 0x5, 0x3, 0x401, 0x1, 0x5, 0x401, 0xce4, 0x87b, 0x3, 0x2, 0x9212, 0x0, 0x4, 0x40, 0x7ff, 0x100000001, 0x0, 0x6, 0x80000000, 0x6, 0xd7, 0x4, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={&(0x7f0000000500), 0xa}, 0x404c, 0x0, 0xffffffffffffffff}, r4, 0x9, r0, 0xa) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='memory.stat\x00', 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000200)=@ax25={0x3, {"b8738e610d62ed"}}, 0x80, &(0x7f0000000040)}, 0x0) socket$kcm(0x29, 0x2, 0x0) 21:46:36 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x12, 0x8, &(0x7f0000000140)=ANY=[@ANYBLOB="7a0af8ff00000000bfa100000000000007010000f8ffffffb702000008000000bd120000000000008500000006000000b7000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0xa}, 0x48) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000003c0), 0x4) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000640)={0xffffffffffffff9c, 0x10, &(0x7f0000000600)={&(0x7f0000000580)=""/78, 0x4e}}, 0x10) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00syz1\x00', 0x200002, 0x0) gettid() bpf$BPF_PROG_ATTACH(0x8, &(0x7f00000000c0)={r1, r0, 0xa}, 0x10) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000480)) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x9, 0x0, 0x100000001, 0x0, 0x400, 0x0, 0x64b, 0x0, 0x0, 0x0, 0x7, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TUNGETIFF(r1, 0x800454d2, &(0x7f0000000400)) close(0xffffffffffffffff) openat$cgroup_int(r2, &(0x7f00000004c0)="0300000021a200", 0x2, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000380)) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000340)={0xffffffffffffffff, 0x10, &(0x7f0000000300)={&(0x7f0000000240)=""/141, 0x8d, 0xffffffffffffffff}}, 0x10) 21:46:36 executing program 3: syz_open_procfs(0x0, &(0x7f00000002c0)='oom_score_adj\x00') ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) request_key(&(0x7f0000000240)='pkcs7_test\x00', &(0x7f0000000280)={'syz', 0x0}, &(0x7f0000000300)='/\x00', 0xfffffffffffffffe) request_key(&(0x7f00000000c0)='user\x00', &(0x7f0000000100)={'syz'}, &(0x7f0000000200)='vmnet0&#selfbdev&vboxnet0trustedselfeth1#c(vmnet0c^\x00', 0x0) alarm(0x6) 21:46:36 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x12, 0x8, &(0x7f0000000140)=ANY=[@ANYBLOB="7a0af8ff00000000bfa100000000000007010000f8ffffffb702000008000000bd120000000000008500000006000000b7000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0xa}, 0x48) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000003c0), 0x4) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000640)={0xffffffffffffff9c, 0x10, &(0x7f0000000600)={&(0x7f0000000580)=""/78, 0x4e}}, 0x10) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00syz1\x00', 0x200002, 0x0) gettid() bpf$BPF_PROG_ATTACH(0x8, &(0x7f00000000c0)={r1, r0, 0xa}, 0x10) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000480)) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x9, 0x0, 0x0, 0x0, 0x400, 0x0, 0x64b, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TUNGETIFF(0xffffffffffffffff, 0x800454d2, &(0x7f0000000400)) close(0xffffffffffffffff) openat$cgroup_int(r2, &(0x7f00000004c0)="0300000021a200", 0x2, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000380)) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000340)={0xffffffffffffffff, 0x10, &(0x7f0000000300)={&(0x7f0000000240)=""/141, 0x8d, 0xffffffffffffffff}}, 0x10) 21:46:36 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000001cc0)={&(0x7f0000001a80)=@can, 0x80, &(0x7f0000001c80)}, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)="2e2f6367726f75702e6e65742f73797a3002", 0x1ff) openat$cgroup_type(0xffffffffffffffff, &(0x7f00000007c0)='cgroup.type\x00', 0x2, 0x0) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000980)='threaded\x00', 0x54389001) socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f00000000c0)) socketpair(0x1, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) write$cgroup_type(r1, &(0x7f0000000180)='threaded\x00', 0xffffff5f) ioctl$SIOCSIFHWADDR(r1, 0x8924, &(0x7f00000003c0)={'syz_tun\x00', @dev}) recvmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000040)=@ax25, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0xffda}, 0x3f00) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000006c0)={&(0x7f0000000680)='syz_tun\x00'}, 0x10) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f00000002c0)) recvmsg(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000300)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, 0x80, &(0x7f0000000480), 0x0, &(0x7f0000000280)=""/23, 0x17}, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000400)={r1, 0x28, &(0x7f0000000740)}, 0x10) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000000)=0xfff) 21:46:36 executing program 0: r0 = socket$kcm(0x2, 0x5, 0x0) setsockopt$sock_attach_bpf(r0, 0x84, 0xb, &(0x7f0000000080), 0x4) sendmsg$kcm(r0, &(0x7f0000000ac0)={&(0x7f0000000740)=@in={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x16}}, 0x80, &(0x7f0000001c00)=[{&(0x7f00000000c0)="bb", 0x1}], 0x1, &(0x7f0000001c80)}, 0x0) recvmsg$kcm(r0, &(0x7f0000000a80)={0x0, 0x0, &(0x7f0000000900), 0x0, &(0x7f00000009c0)=""/131, 0x83}, 0x0) 21:46:36 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x12, 0x8, &(0x7f0000000140)=ANY=[@ANYBLOB="7a0af8ff00000000bfa100000000000007010000f8ffffffb702000008000000bd120000000000008500000006000000b7000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0xa}, 0x48) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000003c0), 0x4) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000640)={0xffffffffffffff9c, 0x10, &(0x7f0000000600)={&(0x7f0000000580)=""/78, 0x4e}}, 0x10) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00syz1\x00', 0x200002, 0x0) gettid() bpf$BPF_PROG_ATTACH(0x8, &(0x7f00000000c0)={r1, r0, 0xa}, 0x10) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000480)) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x9, 0x0, 0x100000001, 0x0, 0x400, 0x0, 0x64b, 0x0, 0x0, 0x0, 0x7, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TUNGETIFF(r1, 0x800454d2, &(0x7f0000000400)) close(0xffffffffffffffff) openat$cgroup_int(r2, &(0x7f00000004c0)="0300000021a200", 0x2, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000380)) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000340)={0xffffffffffffffff, 0x10, &(0x7f0000000300)={&(0x7f0000000240)=""/141, 0x8d, 0xffffffffffffffff}}, 0x10) 21:46:36 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='oom_score_adj\x00') ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) request_key(&(0x7f0000000240)='pkcs7_test\x00', &(0x7f0000000280)={'syz', 0x0}, &(0x7f0000000300)='/\x00', 0xfffffffffffffffe) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r0, 0x111, 0x5, 0x40, 0xb588338ff5bf5e9b) request_key(&(0x7f00000000c0)='user\x00', &(0x7f0000000100)={'syz'}, &(0x7f0000000200)='vmnet0&#selfbdev&vboxnet0trustedselfeth1#c(vmnet0c^\x00', 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r0, 0xc0605345, &(0x7f0000000000)={0x0, 0x1, {0x3, 0x1, 0xfffffffffffffffe, 0x2, 0x6}}) 21:46:36 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x12, 0x8, &(0x7f0000000140)=ANY=[@ANYBLOB="7a0af8ff00000000bfa100000000000007010000f8ffffffb702000008000000bd120000000000008500000006000000b7000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0xa}, 0x48) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000003c0), 0x4) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000640)={0xffffffffffffff9c, 0x10, &(0x7f0000000600)={&(0x7f0000000580)=""/78, 0x4e}}, 0x10) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00syz1\x00', 0x200002, 0x0) gettid() bpf$BPF_PROG_ATTACH(0x8, &(0x7f00000000c0)={r1, r0, 0xa}, 0x10) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000480)) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x9, 0x0, 0x0, 0x0, 0x400, 0x0, 0x64b, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TUNGETIFF(0xffffffffffffffff, 0x800454d2, &(0x7f0000000400)) close(0xffffffffffffffff) openat$cgroup_int(r2, &(0x7f00000004c0)="0300000021a200", 0x2, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000380)) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000340)={0xffffffffffffffff, 0x10, &(0x7f0000000300)={&(0x7f0000000240)=""/141, 0x8d, 0xffffffffffffffff}}, 0x10) 21:46:36 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x12, 0x8, &(0x7f0000000140)=ANY=[@ANYBLOB="7a0af8ff00000000bfa100000000000007010000f8ffffffb702000008000000bd120000000000008500000006000000b7000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0xa}, 0x48) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000003c0), 0x4) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000640)={0xffffffffffffff9c, 0x10, &(0x7f0000000600)={&(0x7f0000000580)=""/78, 0x4e}}, 0x10) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00syz1\x00', 0x200002, 0x0) gettid() bpf$BPF_PROG_ATTACH(0x8, &(0x7f00000000c0)={r1, r0, 0xa}, 0x10) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000480)) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x9, 0x0, 0x100000001, 0x0, 0x400, 0x0, 0x64b, 0x0, 0x0, 0x0, 0x7, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TUNGETIFF(r1, 0x800454d2, &(0x7f0000000400)) close(0xffffffffffffffff) openat$cgroup_int(r2, &(0x7f00000004c0)="0300000021a200", 0x2, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000380)) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000340)={0xffffffffffffffff, 0x10, &(0x7f0000000300)={&(0x7f0000000240)=""/141, 0x8d, 0xffffffffffffffff}}, 0x10) [ 369.530735] device nr0 entered promiscuous mode 21:46:36 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='oom_score_adj\x00') ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) request_key(&(0x7f0000000140)='pkcs7_test\x00', &(0x7f0000000280)={'syz', 0x1}, &(0x7f00000001c0)="f0fcd5f1cc74f53dea37d7f8e1e8df5ab37d1de90c9afb7e04000000000000002777a8247d96cfcee8a601", 0xfffffffffffffffe) request_key(&(0x7f00000000c0)='user\x00', &(0x7f0000000100)={'syz'}, &(0x7f0000000200)='vmnet0&#selfbdev&vboxnet0trustedselfeth1#c(vmnet0c^\x00', 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(r0, 0xc0206434, &(0x7f0000000000)={0xffffffffffff8273, 0x0, 0x10001, 0x4}) ioctl$DRM_IOCTL_AGP_UNBIND(r0, 0x40106437, &(0x7f0000000040)={r1, 0x800}) 21:46:36 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x12, 0x8, &(0x7f0000000140)=ANY=[@ANYBLOB="7a0af8ff00000000bfa100000000000007010000f8ffffffb702000008000000bd120000000000008500000006000000b7000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0xa}, 0x48) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000003c0), 0x4) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000640)={0xffffffffffffff9c, 0x10, &(0x7f0000000600)={&(0x7f0000000580)=""/78, 0x4e}}, 0x10) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00syz1\x00', 0x200002, 0x0) gettid() bpf$BPF_PROG_ATTACH(0x8, &(0x7f00000000c0)={r1, r0, 0xa}, 0x10) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000480)) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x9, 0x0, 0x0, 0x0, 0x400, 0x0, 0x64b, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TUNGETIFF(0xffffffffffffffff, 0x800454d2, &(0x7f0000000400)) close(0xffffffffffffffff) openat$cgroup_int(r2, &(0x7f00000004c0)="0300000021a200", 0x2, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000380)) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000340)={0xffffffffffffffff, 0x10, &(0x7f0000000300)={&(0x7f0000000240)=""/141, 0x8d, 0xffffffffffffffff}}, 0x10) 21:46:36 executing program 4: r0 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000680)="0400"}, 0xffe5) bpf$BPF_PROG_DETACH(0x9, &(0x7f00000000c0)={0x0, r0, 0x0, 0x3}, 0x14) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) socketpair$inet_dccp(0x2, 0x6, 0x0, &(0x7f0000000100)) socket$kcm(0x2, 0x3, 0x2) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={r0, 0x50, &(0x7f0000000480)={0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000340)=r2, 0x4) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000380)="6e7230010060a19ef9d2c623d9a1571cb9e1369bcd61ef7e49793ae18712eceb1daa769497800b7fbbd35b170c10751d39aeb660d863e49b8c4f3b3cad48902b5b2d6cfd0abd372c63bcf5d70df3fd4d2e8d443c88c60fd7140fbc0e5637dd82fc3435bed4de5d693c9a781c863e05d8a6f8689a5be29216061f3ff53f8b6b396678e7ba155ef9152d7e43b1eccb2331eb8eb1ed5586dcf8b3b0b999361a44ff2c22c2abbef42dd24eabe6723346a6e46c0499a21442d8d00dcb57f013ff7595edd0ff076930de3675d34117a44eb0e4f832936da44e") r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000040)={"6e72300100", 0x801}) r4 = getpid() perf_event_open(&(0x7f0000000540)={0x0, 0x70, 0xf2, 0x4, 0x400, 0xadb0, 0x0, 0x0, 0x40000001110, 0x0, 0x2, 0x0, 0x0, 0x7, 0x5, 0x3, 0x401, 0x1, 0x5, 0x401, 0xce4, 0x87b, 0x3, 0x2, 0x9212, 0x0, 0x4, 0x40, 0x7ff, 0x100000001, 0x0, 0x6, 0x80000000, 0x6, 0xd7, 0x4, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={&(0x7f0000000500), 0xa}, 0x404c, 0x0, 0xffffffffffffffff}, r4, 0x9, r0, 0xa) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='memory.stat\x00', 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000200)=@ax25={0x3, {"b8738e610d62ed"}}, 0x80, &(0x7f0000000040)}, 0x0) socket$kcm(0x29, 0x2, 0x0) 21:46:36 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x12, 0x8, &(0x7f0000000140)=ANY=[@ANYBLOB="7a0af8ff00000000bfa100000000000007010000f8ffffffb702000008000000bd120000000000008500000006000000b7000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0xa}, 0x48) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000003c0), 0x4) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000640)={0xffffffffffffff9c, 0x10, &(0x7f0000000600)={&(0x7f0000000580)=""/78, 0x4e}}, 0x10) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00syz1\x00', 0x200002, 0x0) gettid() bpf$BPF_PROG_ATTACH(0x8, &(0x7f00000000c0)={r1, r0, 0xa}, 0x10) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000480)) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x9, 0x0, 0x100000001, 0x0, 0x400, 0x0, 0x64b, 0x0, 0x0, 0x0, 0x7, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TUNGETIFF(r1, 0x800454d2, &(0x7f0000000400)) close(0xffffffffffffffff) openat$cgroup_int(r2, &(0x7f00000004c0)="0300000021a200", 0x2, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000380)) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000340)={0xffffffffffffffff, 0x10, &(0x7f0000000300)={&(0x7f0000000240)=""/141, 0x8d, 0xffffffffffffffff}}, 0x10) 21:46:36 executing program 3: syz_open_procfs(0x0, &(0x7f00000002c0)='oom_score_adj\x00') ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) r0 = add_key(&(0x7f0000000140)='dns_resolver\x00', &(0x7f0000000180)={'syz', 0x2}, &(0x7f00000001c0)="59ab4fd7d70d75", 0x7, 0xfffffffffffffffa) request_key(&(0x7f0000000000)='syzkaller\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000080)='eth0[\x00', r0) request_key(&(0x7f0000000240)='pkcs7_test\x00', &(0x7f0000000280)={'syz', 0x0}, &(0x7f0000000300)='/\x00', 0xfffffffffffffffe) request_key(&(0x7f00000000c0)='user\x00', &(0x7f0000000100)={'syz'}, &(0x7f0000000200)='vmnet0&#selfbdev&vboxnet0trustedselfeth1#c(vmnet0c^\x00', 0x0) 21:46:36 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x12, 0x8, &(0x7f0000000140)=ANY=[@ANYBLOB="7a0af8ff00000000bfa100000000000007010000f8ffffffb702000008000000bd120000000000008500000006000000b7000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0xa}, 0x48) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000003c0), 0x4) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000640)={0xffffffffffffff9c, 0x10, &(0x7f0000000600)={&(0x7f0000000580)=""/78, 0x4e}}, 0x10) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00syz1\x00', 0x200002, 0x0) gettid() bpf$BPF_PROG_ATTACH(0x8, &(0x7f00000000c0)={r1, r0, 0xa}, 0x10) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000480)) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x9, 0x0, 0x0, 0x0, 0x400, 0x0, 0x64b, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TUNGETIFF(0xffffffffffffffff, 0x800454d2, &(0x7f0000000400)) close(0xffffffffffffffff) openat$cgroup_int(r2, &(0x7f00000004c0)="0300000021a200", 0x2, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000380)) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000340)={0xffffffffffffffff, 0x10, &(0x7f0000000300)={&(0x7f0000000240)=""/141, 0x8d, 0xffffffffffffffff}}, 0x10) [ 370.172323] device nr0 entered promiscuous mode 21:46:37 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x12, 0x8, &(0x7f0000000140)=ANY=[@ANYBLOB="7a0af8ff00000000bfa100000000000007010000f8ffffffb702000008000000bd120000000000008500000006000000b7000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0xa}, 0x48) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000003c0), 0x4) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000640)={0xffffffffffffff9c, 0x10, &(0x7f0000000600)={&(0x7f0000000580)=""/78, 0x4e}}, 0x10) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00syz1\x00', 0x200002, 0x0) gettid() bpf$BPF_PROG_ATTACH(0x8, &(0x7f00000000c0)={r1, r0, 0xa}, 0x10) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000480)) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x9, 0x0, 0x100000001, 0x0, 0x400, 0x0, 0x64b, 0x0, 0x0, 0x0, 0x7, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TUNGETIFF(r1, 0x800454d2, &(0x7f0000000400)) close(0xffffffffffffffff) openat$cgroup_int(r2, &(0x7f00000004c0)="0300000021a200", 0x2, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000380)) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000340)={0xffffffffffffffff, 0x10, &(0x7f0000000300)={&(0x7f0000000240)=""/141, 0x8d, 0xffffffffffffffff}}, 0x10) 21:46:37 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='oom_score_adj\x00') ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x800000000000) r1 = add_key(&(0x7f0000000000)='logon\x00', &(0x7f0000000040)={'syz', 0x1}, &(0x7f0000000300)="983a5633aaf31f29a5641500e16ac85f6dd4d11dc12ec4cbab5c57b44b32effcf12a4ebfb857645687b5f60fb02a106a06784d69b2a48db2b10a90785b134f5ffff1afeb440c3ecda6a24a6f222bd101f1a0a14d501926a7a95e4d3e2ae57ebb44a6dd4a4ae51683d81990efd1cb6ab20cb338968543d5bb518de567e6c53cc926a4ac26f8279c7905f4bbdbfa95dc382f4e4486c7384710fcf09df3f297d8d8b8149074fff16dab70e455786ccb4e49c295f5bfd1ecea090c83f2da89e9791e8d6ffe6529071c6824c5394cda13f6b46b2a04b43b", 0xd5, 0xfffffffffffffffa) ioctl$FITRIM(r0, 0xc0185879, &(0x7f0000000080)={0x3, 0x6, 0x8000}) request_key(&(0x7f00000000c0)='user\x00', &(0x7f0000000100)={'syz', 0x0}, &(0x7f0000000140)='vmnet0&#selfbdev&vboxnet0trustedselfeth1#c(vmnet0c^\x00', r1) 21:46:37 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x12, 0x8, &(0x7f0000000140)=ANY=[@ANYBLOB="7a0af8ff00000000bfa100000000000007010000f8ffffffb702000008000000bd120000000000008500000006000000b7000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0xa}, 0x48) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000003c0), 0x4) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000640)={0xffffffffffffff9c, 0x10, &(0x7f0000000600)={&(0x7f0000000580)=""/78, 0x4e}}, 0x10) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00syz1\x00', 0x200002, 0x0) gettid() bpf$BPF_PROG_ATTACH(0x8, &(0x7f00000000c0)={r1, r0, 0xa}, 0x10) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000480)) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x9, 0x0, 0x0, 0x0, 0x400, 0x0, 0x64b, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TUNGETIFF(0xffffffffffffffff, 0x800454d2, &(0x7f0000000400)) close(0xffffffffffffffff) openat$cgroup_int(r2, &(0x7f00000004c0)="0300000021a200", 0x2, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000380)) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000340)={0xffffffffffffffff, 0x10, &(0x7f0000000300)={&(0x7f0000000240)=""/141, 0x8d, 0xffffffffffffffff}}, 0x10) 21:46:37 executing program 2: r0 = socket$inet6(0xa, 0x1080000000002, 0x0) ioctl(r0, 0x4000100000008912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f00000002c0)={0xa, 0x0, 0x0, @local, 0x3}, 0x1c) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r2, &(0x7f000014f000)={&(0x7f00003c7ff4), 0xc, &(0x7f00000bfff0)={&(0x7f0000006440)=@updpolicy={0xb8, 0x19, 0x1, 0x0, 0x0, {{@in6=@mcast1, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0xa}}}, 0xb8}}, 0x0) setsockopt$inet6_MCAST_MSFILTER(r1, 0x29, 0x4, &(0x7f0000000180)={0x0, {{0xa, 0x0, 0x0, @mcast2}}}, 0x90) 21:46:37 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x12, 0x8, &(0x7f0000000140)=ANY=[@ANYBLOB="7a0af8ff00000000bfa100000000000007010000f8ffffffb702000008000000bd120000000000008500000006000000b7000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0xa}, 0x48) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000003c0), 0x4) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000640)={0xffffffffffffff9c, 0x10, &(0x7f0000000600)={&(0x7f0000000580)=""/78, 0x4e}}, 0x10) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00syz1\x00', 0x200002, 0x0) gettid() bpf$BPF_PROG_ATTACH(0x8, &(0x7f00000000c0)={r1, r0, 0xa}, 0x10) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000480)) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x9, 0x0, 0x0, 0x0, 0x400, 0x0, 0x64b, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TUNGETIFF(0xffffffffffffffff, 0x800454d2, &(0x7f0000000400)) close(0xffffffffffffffff) openat$cgroup_int(r2, &(0x7f00000004c0)="0300000021a200", 0x2, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000380)) 21:46:37 executing program 3: r0 = dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x80000) ioctl$KVM_GET_SREGS(r0, 0x8138ae83, &(0x7f0000000340)) r1 = syz_open_procfs(0x0, &(0x7f00000002c0)='oom_score_adj\x00') ioctl$EVIOCGBITSW(r1, 0x80404525, &(0x7f00000001c0)=""/17) getsockopt$inet_sctp6_SCTP_CONTEXT(r1, 0x84, 0x11, &(0x7f0000000040)={0x0, 0xffffffff}, &(0x7f0000000080)=0x8) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r1, 0x84, 0x66, &(0x7f0000000140)={r2, 0x7fff}, &(0x7f0000000180)=0x8) recvmsg(r1, &(0x7f0000000cc0)={&(0x7f00000006c0)=@hci={0x1f, 0x0}, 0x80, &(0x7f0000000b40)=[{&(0x7f0000000740)=""/235, 0xeb}, {&(0x7f0000000840)}, {&(0x7f0000000880)=""/198, 0xc6}, {&(0x7f0000000980)=""/103, 0x67}, {&(0x7f0000000a00)=""/106, 0x6a}, {&(0x7f0000000a80)=""/92, 0x5c}, {&(0x7f0000000b00)=""/57, 0x39}], 0x7, &(0x7f0000000bc0)=""/222, 0xde, 0x7fff}, 0x0) setsockopt$packet_add_memb(r1, 0x107, 0x1, &(0x7f0000000d00)={r4, 0x1, 0x6}, 0x10) setsockopt$inet_sctp_SCTP_EVENTS(r1, 0x84, 0xb, &(0x7f0000000480)={0x6, 0x1f, 0x3, 0x8, 0x5, 0x2d06, 0xff, 0x1ff, 0xfffffffffffffffa, 0x8001, 0x4060}, 0xb) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(r0, 0x84, 0x1b, &(0x7f0000000d40)=ANY=[@ANYRES32=r3, @ANYBLOB="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"], &(0x7f00000005c0)=0xe6) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) ioctl$IOC_PR_REGISTER(r0, 0x401870c8, &(0x7f0000000600)={0x200, 0x400, 0x1}) request_key(&(0x7f0000000240)='pkcs7_test\x00', &(0x7f0000000000)={'syz', 0x0}, &(0x7f0000000300)='/\x00', 0xfffffffffffffffe) request_key(&(0x7f00000000c0)='user\x00', &(0x7f0000000100)={'syz'}, &(0x7f0000000200)='vmnet0&#selfbdev&vboxnet0trustedselfeth1#c(vmnet0c^\x00', 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000280)={'veth1_to_bond\x00', 0x20}) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(r1, 0x10e, 0x2, &(0x7f0000000640)=0x18, 0x4) 21:46:37 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x12, 0x8, &(0x7f0000000140)=ANY=[@ANYBLOB="7a0af8ff00000000bfa100000000000007010000f8ffffffb702000008000000bd120000000000008500000006000000b7000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0xa}, 0x48) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000003c0), 0x4) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000640)={0xffffffffffffff9c, 0x10, &(0x7f0000000600)={&(0x7f0000000580)=""/78, 0x4e}}, 0x10) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00syz1\x00', 0x200002, 0x0) gettid() bpf$BPF_PROG_ATTACH(0x8, &(0x7f00000000c0)={r1, r0, 0xa}, 0x10) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000480)) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x9, 0x0, 0x0, 0x0, 0x400, 0x0, 0x64b, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TUNGETIFF(0xffffffffffffffff, 0x800454d2, &(0x7f0000000400)) close(0xffffffffffffffff) openat$cgroup_int(r2, &(0x7f00000004c0)="0300000021a200", 0x2, 0x0) 21:46:37 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x12, 0x8, &(0x7f0000000140)=ANY=[@ANYBLOB="7a0af8ff00000000bfa100000000000007010000f8ffffffb702000008000000bd120000000000008500000006000000b7000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0xa}, 0x48) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000003c0), 0x4) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000640)={0xffffffffffffff9c, 0x10, &(0x7f0000000600)={&(0x7f0000000580)=""/78, 0x4e}}, 0x10) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00syz1\x00', 0x200002, 0x0) gettid() bpf$BPF_PROG_ATTACH(0x8, &(0x7f00000000c0)={r1, r0, 0xa}, 0x10) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000480)) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x9, 0x0, 0x100000001, 0x0, 0x400, 0x0, 0x64b, 0x0, 0x0, 0x0, 0x7, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TUNGETIFF(r1, 0x800454d2, &(0x7f0000000400)) close(0xffffffffffffffff) openat$cgroup_int(r2, &(0x7f00000004c0)="0300000021a200", 0x2, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000380)) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000340)={0xffffffffffffffff, 0x10, &(0x7f0000000300)={&(0x7f0000000240)=""/141, 0x8d, 0xffffffffffffffff}}, 0x10) 21:46:37 executing program 4: r0 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000680)="0400"}, 0xffe5) bpf$BPF_PROG_DETACH(0x9, &(0x7f00000000c0)={0x0, r0, 0x0, 0x3}, 0x14) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) socketpair$inet_dccp(0x2, 0x6, 0x0, &(0x7f0000000100)) socket$kcm(0x2, 0x3, 0x2) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={r0, 0x50, &(0x7f0000000480)={0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000340)=r2, 0x4) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000380)="6e7230010060a19ef9d2c623d9a1571cb9e1369bcd61ef7e49793ae18712eceb1daa769497800b7fbbd35b170c10751d39aeb660d863e49b8c4f3b3cad48902b5b2d6cfd0abd372c63bcf5d70df3fd4d2e8d443c88c60fd7140fbc0e5637dd82fc3435bed4de5d693c9a781c863e05d8a6f8689a5be29216061f3ff53f8b6b396678e7ba155ef9152d7e43b1eccb2331eb8eb1ed5586dcf8b3b0b999361a44ff2c22c2abbef42dd24eabe6723346a6e46c0499a21442d8d00dcb57f013ff7595edd0ff076930de3675d34117a44eb0e4f832936da44e") r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETLINK(r3, 0x400454cd, 0x308) r4 = getpid() perf_event_open(&(0x7f0000000540)={0x0, 0x70, 0xf2, 0x4, 0x400, 0xadb0, 0x0, 0x0, 0x40000001110, 0x0, 0x2, 0x0, 0x0, 0x7, 0x5, 0x3, 0x401, 0x1, 0x5, 0x401, 0xce4, 0x87b, 0x3, 0x2, 0x9212, 0x0, 0x4, 0x40, 0x7ff, 0x100000001, 0x0, 0x6, 0x80000000, 0x6, 0xd7, 0x4, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={&(0x7f0000000500), 0xa}, 0x404c, 0x0, 0xffffffffffffffff}, r4, 0x9, r0, 0xa) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='memory.stat\x00', 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000200)=@ax25={0x3, {"b8738e610d62ed"}}, 0x80, &(0x7f0000000040)}, 0x0) socket$kcm(0x29, 0x2, 0x0) 21:46:37 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='oom_score_adj\x00') ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) request_key(&(0x7f0000000240)='pkcs7_test\x00', &(0x7f0000000280)={'syz', 0x0}, &(0x7f0000000300)='/\x00', 0xfffffffffffffffe) mlock(&(0x7f0000ffc000/0x4000)=nil, 0x4000) accept4$llc(r0, &(0x7f0000000000)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, &(0x7f0000000040)=0x10, 0x80800) request_key(&(0x7f00000000c0)='user\x00', &(0x7f0000000100)={'syz'}, &(0x7f0000000200)='vmnet0&#selfbdev&vboxnet0trustedselfeth1#c(vmnet0c^\x00', 0x0) 21:46:37 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x12, 0x8, &(0x7f0000000140)=ANY=[@ANYBLOB="7a0af8ff00000000bfa100000000000007010000f8ffffffb702000008000000bd120000000000008500000006000000b7000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0xa}, 0x48) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000003c0), 0x4) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000640)={0xffffffffffffff9c, 0x10, &(0x7f0000000600)={&(0x7f0000000580)=""/78, 0x4e}}, 0x10) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00syz1\x00', 0x200002, 0x0) gettid() bpf$BPF_PROG_ATTACH(0x8, &(0x7f00000000c0)={r1, r0, 0xa}, 0x10) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000480)) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x9, 0x0, 0x0, 0x0, 0x400, 0x0, 0x64b, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TUNGETIFF(0xffffffffffffffff, 0x800454d2, &(0x7f0000000400)) close(0xffffffffffffffff) openat$cgroup_int(r2, &(0x7f00000004c0)="0300000021a200", 0x2, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000380)) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000340)={0xffffffffffffffff, 0x10, &(0x7f0000000300)={&(0x7f0000000240)=""/141, 0x8d, 0xffffffffffffffff}}, 0x10) 21:46:37 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x12, 0x8, &(0x7f0000000140)=ANY=[@ANYBLOB="7a0af8ff00000000bfa100000000000007010000f8ffffffb702000008000000bd120000000000008500000006000000b7000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0xa}, 0x48) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000003c0), 0x4) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000640)={0xffffffffffffff9c, 0x10, &(0x7f0000000600)={&(0x7f0000000580)=""/78, 0x4e}}, 0x10) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00syz1\x00', 0x200002, 0x0) gettid() bpf$BPF_PROG_ATTACH(0x8, &(0x7f00000000c0)={r1, r0, 0xa}, 0x10) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000480)) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x9, 0x0, 0x0, 0x0, 0x400, 0x0, 0x64b, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TUNGETIFF(0xffffffffffffffff, 0x800454d2, &(0x7f0000000400)) close(0xffffffffffffffff) 21:46:37 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x8, &(0x7f0000000140)=ANY=[@ANYBLOB="7a0af8ff00000000bfa100000000000007010000f8ffffffb702000008000000bd120000000000008500000006000000b7000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0xa}, 0x48) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000003c0), 0x4) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000640)={0xffffffffffffff9c, 0x10, &(0x7f0000000600)={&(0x7f0000000580)=""/78, 0x4e}}, 0x10) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00syz1\x00', 0x200002, 0x0) gettid() bpf$BPF_PROG_ATTACH(0x8, &(0x7f00000000c0)={r1, r0, 0xa}, 0x10) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000480)) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x9, 0x0, 0x100000001, 0x0, 0x400, 0x0, 0x64b, 0x0, 0x0, 0x0, 0x7, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TUNGETIFF(r1, 0x800454d2, &(0x7f0000000400)) close(0xffffffffffffffff) openat$cgroup_int(r2, &(0x7f00000004c0)="0300000021a200", 0x2, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000380)) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000340)={0xffffffffffffffff, 0x10, &(0x7f0000000300)={&(0x7f0000000240)=""/141, 0x8d, 0xffffffffffffffff}}, 0x10) 21:46:37 executing program 2: r0 = socket$inet6(0xa, 0x1080000000002, 0x0) ioctl(r0, 0x4000100000008912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f00000002c0)={0xa, 0x0, 0x0, @local, 0x3}, 0x1c) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r2, &(0x7f000014f000)={&(0x7f00003c7ff4), 0xc, &(0x7f00000bfff0)={&(0x7f0000006440)=@updpolicy={0xb8, 0x19, 0x1, 0x0, 0x0, {{@in6=@mcast1, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0xa}}}, 0xb8}}, 0x0) setsockopt$inet6_MCAST_MSFILTER(r1, 0x29, 0x4, &(0x7f0000000180)={0x0, {{0xa, 0x0, 0x0, @mcast2}}}, 0x90) 21:46:37 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) sendmsg$IPVS_CMD_DEL_DEST(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000040), 0xc, &(0x7f0000000240)={&(0x7f0000000180)={0x14}, 0x14}}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000ab9ff0)={0x2, &(0x7f000039a000)=[{0x20, 0x0, 0x0, 0xfffffffffffff00c}, {0x6}]}, 0x10) sendmmsg(r1, &(0x7f0000000040), 0x324fad809d5a9cf, 0x0) 21:46:37 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='oom_score_adj\x00') ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) request_key(&(0x7f0000000240)='pkcs7_test\x00', &(0x7f0000000280)={'syz', 0x0}, &(0x7f0000000300)='/\x00', 0xfffffffffffffffe) getsockopt$sock_buf(r0, 0x1, 0x37, &(0x7f0000000040)=""/24, &(0x7f0000000080)=0x18) request_key(&(0x7f00000000c0)='user\x00', &(0x7f0000000100)={'syz'}, &(0x7f0000000200)='vmnet0&#selfbdev&vboxnet0trustedselfeth1#c(vmnet0c^\x00', 0x0) ioctl$SNDRV_RAWMIDI_IOCTL_DROP(r0, 0x40045730, &(0x7f0000000000)=0xfffffffffffffff9) 21:46:37 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x12, 0x0, &(0x7f0000000140)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0xa}, 0x48) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000003c0), 0x4) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000640)={0xffffffffffffff9c, 0x10, &(0x7f0000000600)={&(0x7f0000000580)=""/78, 0x4e}}, 0x10) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00syz1\x00', 0x200002, 0x0) gettid() bpf$BPF_PROG_ATTACH(0x8, &(0x7f00000000c0)={r1, r0, 0xa}, 0x10) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000480)) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x9, 0x0, 0x100000001, 0x0, 0x400, 0x0, 0x64b, 0x0, 0x0, 0x0, 0x7, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TUNGETIFF(r1, 0x800454d2, &(0x7f0000000400)) close(0xffffffffffffffff) openat$cgroup_int(r2, &(0x7f00000004c0)="0300000021a200", 0x2, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000380)) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000340)={0xffffffffffffffff, 0x10, &(0x7f0000000300)={&(0x7f0000000240)=""/141, 0x8d, 0xffffffffffffffff}}, 0x10) 21:46:37 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x12, 0x8, &(0x7f0000000140)=ANY=[@ANYBLOB="7a0af8ff00000000bfa100000000000007010000f8ffffffb702000008000000bd120000000000008500000006000000b7000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0xa}, 0x48) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000003c0), 0x4) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000640)={0xffffffffffffff9c, 0x10, &(0x7f0000000600)={&(0x7f0000000580)=""/78, 0x4e}}, 0x10) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00syz1\x00', 0x200002, 0x0) gettid() bpf$BPF_PROG_ATTACH(0x8, &(0x7f00000000c0)={r1, r0, 0xa}, 0x10) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000480)) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x9, 0x0, 0x0, 0x0, 0x400, 0x0, 0x64b, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TUNGETIFF(0xffffffffffffffff, 0x800454d2, &(0x7f0000000400)) openat$cgroup_int(r2, &(0x7f00000004c0)="0300000021a200", 0x2, 0x0) 21:46:37 executing program 0: recvfrom(0xffffffffffffffff, &(0x7f0000000080)=""/126, 0x7e, 0x0, &(0x7f0000000140)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x80) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_LAPIC(r3, 0x4400ae8f, &(0x7f0000000680)={"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"}) ioctl$KVM_SET_IRQCHIP(r1, 0x8208ae63, &(0x7f0000000280)={0x2, 0x0, @ioapic={0x0, 0x0, 0x0, 0xffffffffffff0001, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x9, 0x0, [], 0x7f}]}}) 21:46:37 executing program 4: r0 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000680)="0400"}, 0xffe5) bpf$BPF_PROG_DETACH(0x9, &(0x7f00000000c0)={0x0, r0, 0x0, 0x3}, 0x14) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) socketpair$inet_dccp(0x2, 0x6, 0x0, &(0x7f0000000100)) socket$kcm(0x2, 0x3, 0x2) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={r0, 0x50, &(0x7f0000000480)={0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000340)=r2, 0x4) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000380)="6e7230010060a19ef9d2c623d9a1571cb9e1369bcd61ef7e49793ae18712eceb1daa769497800b7fbbd35b170c10751d39aeb660d863e49b8c4f3b3cad48902b5b2d6cfd0abd372c63bcf5d70df3fd4d2e8d443c88c60fd7140fbc0e5637dd82fc3435bed4de5d693c9a781c863e05d8a6f8689a5be29216061f3ff53f8b6b396678e7ba155ef9152d7e43b1eccb2331eb8eb1ed5586dcf8b3b0b999361a44ff2c22c2abbef42dd24eabe6723346a6e46c0499a21442d8d00dcb57f013ff7595edd0ff076930de3675d34117a44eb0e4f832936da44e") ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000040)={"6e72300100", 0x801}) ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x308) r3 = getpid() perf_event_open(&(0x7f0000000540)={0x0, 0x70, 0xf2, 0x4, 0x400, 0xadb0, 0x0, 0x0, 0x40000001110, 0x0, 0x2, 0x0, 0x0, 0x7, 0x5, 0x3, 0x401, 0x1, 0x5, 0x401, 0xce4, 0x87b, 0x3, 0x2, 0x9212, 0x0, 0x4, 0x40, 0x7ff, 0x100000001, 0x0, 0x6, 0x80000000, 0x6, 0xd7, 0x4, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={&(0x7f0000000500), 0xa}, 0x404c, 0x0, 0xffffffffffffffff}, r3, 0x9, r0, 0xa) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='memory.stat\x00', 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000200)=@ax25={0x3, {"b8738e610d62ed"}}, 0x80, &(0x7f0000000040)}, 0x0) socket$kcm(0x29, 0x2, 0x0) 21:46:37 executing program 3: fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000040)) r0 = getpgrp(0x0) r1 = syz_open_procfs(r0, &(0x7f00000001c0)="6f6fb557c26d5f73636f72655f71646a00") ioctl$SCSI_IOCTL_BENCHMARK_COMMAND(r1, 0x3) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) request_key(&(0x7f0000000240)='pkcs7_test\x00', &(0x7f0000000280)={'syz', 0x0}, &(0x7f0000000300)='/\x00', 0xfffffffffffffffe) request_key(&(0x7f00000000c0)='user\x00', &(0x7f0000000100)={'syz'}, &(0x7f0000000200)='vmnet0&#selfbdev&vboxnet0trustedselfeth1#c(vmnet0c^\x00', 0x0) fsync(r1) setsockopt$inet6_tcp_TLS_RX(r1, 0x6, 0x2, &(0x7f0000000000), 0x4) 21:46:38 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x12, 0x8, &(0x7f0000000140)=ANY=[@ANYBLOB="7a0af8ff00000000bfa100000000000007010000f8ffffffb702000008000000bd120000000000008500000006000000b7000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0xa}, 0x48) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000003c0), 0x4) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000640)={0xffffffffffffff9c, 0x10, &(0x7f0000000600)={&(0x7f0000000580)=""/78, 0x4e}}, 0x10) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00syz1\x00', 0x200002, 0x0) gettid() bpf$BPF_PROG_ATTACH(0x8, &(0x7f00000000c0)={r1, r0, 0xa}, 0x10) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000480)) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x9, 0x0, 0x0, 0x0, 0x400, 0x0, 0x64b, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) openat$cgroup_int(r2, &(0x7f00000004c0)="0300000021a200", 0x2, 0x0) 21:46:38 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x12, 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0xa}, 0x48) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000003c0), 0x4) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000640)={0xffffffffffffff9c, 0x10, &(0x7f0000000600)={&(0x7f0000000580)=""/78, 0x4e}}, 0x10) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00syz1\x00', 0x200002, 0x0) gettid() bpf$BPF_PROG_ATTACH(0x8, &(0x7f00000000c0)={r1, r0, 0xa}, 0x10) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000480)) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x9, 0x0, 0x100000001, 0x0, 0x400, 0x0, 0x64b, 0x0, 0x0, 0x0, 0x7, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TUNGETIFF(r1, 0x800454d2, &(0x7f0000000400)) close(0xffffffffffffffff) openat$cgroup_int(r2, &(0x7f00000004c0)="0300000021a200", 0x2, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000380)) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000340)={0xffffffffffffffff, 0x10, &(0x7f0000000300)={&(0x7f0000000240)=""/141, 0x8d, 0xffffffffffffffff}}, 0x10) 21:46:38 executing program 3: gettid() ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) request_key(&(0x7f0000000240)='pkcs7_test\x00', &(0x7f0000000280)={'syz', 0x0}, &(0x7f0000000300)='/\x00', 0xfffffffffffffffe) request_key(&(0x7f00000000c0)='user\x00', &(0x7f0000000100)={'syz'}, &(0x7f0000000200)='vmnet0&#selfbdev&vboxnet0trustedselfeth1#c(vmnet0c^\x00', 0x0) socket$key(0xf, 0x3, 0x2) 21:46:38 executing program 0: recvfrom(0xffffffffffffffff, &(0x7f0000000080)=""/126, 0x7e, 0x0, &(0x7f0000000140)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x80) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_LAPIC(r3, 0x4400ae8f, &(0x7f0000000680)={"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"}) ioctl$KVM_SET_IRQCHIP(r1, 0x8208ae63, &(0x7f0000000280)={0x2, 0x0, @ioapic={0x0, 0x0, 0x0, 0xffffffffffff0001, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x9, 0x0, [], 0x7f}]}}) 21:46:38 executing program 4: r0 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000680)="0400"}, 0xffe5) bpf$BPF_PROG_DETACH(0x9, &(0x7f00000000c0)={0x0, r0, 0x0, 0x3}, 0x14) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) socketpair$inet_dccp(0x2, 0x6, 0x0, &(0x7f0000000100)) socket$kcm(0x2, 0x3, 0x2) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={r0, 0x50, &(0x7f0000000480)}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000380)="6e7230010060a19ef9d2c623d9a1571cb9e1369bcd61ef7e49793ae18712eceb1daa769497800b7fbbd35b170c10751d39aeb660d863e49b8c4f3b3cad48902b5b2d6cfd0abd372c63bcf5d70df3fd4d2e8d443c88c60fd7140fbc0e5637dd82fc3435bed4de5d693c9a781c863e05d8a6f8689a5be29216061f3ff53f8b6b396678e7ba155ef9152d7e43b1eccb2331eb8eb1ed5586dcf8b3b0b999361a44ff2c22c2abbef42dd24eabe6723346a6e46c0499a21442d8d00dcb57f013ff7595edd0ff076930de3675d34117a44eb0e4f832936da44e") r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000040)={"6e72300100", 0x801}) ioctl$TUNSETLINK(r2, 0x400454cd, 0x308) r3 = getpid() perf_event_open(&(0x7f0000000540)={0x0, 0x70, 0xf2, 0x4, 0x400, 0xadb0, 0x0, 0x0, 0x40000001110, 0x0, 0x2, 0x0, 0x0, 0x7, 0x5, 0x3, 0x401, 0x1, 0x5, 0x401, 0xce4, 0x87b, 0x3, 0x2, 0x9212, 0x0, 0x4, 0x40, 0x7ff, 0x100000001, 0x0, 0x6, 0x80000000, 0x6, 0xd7, 0x4, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={&(0x7f0000000500), 0xa}, 0x404c, 0x0, 0xffffffffffffffff}, r3, 0x9, r0, 0xa) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='memory.stat\x00', 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000200)=@ax25={0x3, {"b8738e610d62ed"}}, 0x80, &(0x7f0000000040)}, 0x0) socket$kcm(0x29, 0x2, 0x0) 21:46:38 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) sendmsg$IPVS_CMD_DEL_DEST(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000040), 0xc, &(0x7f0000000240)={&(0x7f0000000180)={0x14}, 0x14}}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000ab9ff0)={0x2, &(0x7f000039a000)=[{0x20, 0x0, 0x0, 0xfffffffffffff00c}, {0x6}]}, 0x10) sendmmsg(r1, &(0x7f0000000040), 0x324fad809d5a9cf, 0x0) 21:46:38 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x12, 0x8, &(0x7f0000000140)=ANY=[@ANYBLOB="7a0af8ff00000000bfa100000000000007010000f8ffffffb702000008000000bd120000000000008500000006000000b7000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0xa}, 0x48) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000003c0), 0x4) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000640)={0xffffffffffffff9c, 0x10, &(0x7f0000000600)={&(0x7f0000000580)=""/78, 0x4e}}, 0x10) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00syz1\x00', 0x200002, 0x0) gettid() bpf$BPF_PROG_ATTACH(0x8, &(0x7f00000000c0)={r1, r0, 0xa}, 0x10) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000480)) close(0xffffffffffffffff) openat$cgroup_int(r2, &(0x7f00000004c0)="0300000021a200", 0x2, 0x0) 21:46:38 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x12, 0x4, &(0x7f0000000140)=ANY=[@ANYBLOB="7a0af8ff00000000bfa100000000000007010000f8ffffffb702000008000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0xa}, 0x48) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000003c0), 0x4) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000640)={0xffffffffffffff9c, 0x10, &(0x7f0000000600)={&(0x7f0000000580)=""/78, 0x4e}}, 0x10) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00syz1\x00', 0x200002, 0x0) gettid() bpf$BPF_PROG_ATTACH(0x8, &(0x7f00000000c0)={r1, r0, 0xa}, 0x10) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000480)) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x9, 0x0, 0x100000001, 0x0, 0x400, 0x0, 0x64b, 0x0, 0x0, 0x0, 0x7, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TUNGETIFF(r1, 0x800454d2, &(0x7f0000000400)) close(0xffffffffffffffff) openat$cgroup_int(r2, &(0x7f00000004c0)="0300000021a200", 0x2, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000380)) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000340)={0xffffffffffffffff, 0x10, &(0x7f0000000300)={&(0x7f0000000240)=""/141, 0x8d, 0xffffffffffffffff}}, 0x10) 21:46:38 executing program 3: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x44441, 0x0) ioctl$KVM_GET_IRQCHIP(r0, 0xc208ae62, &(0x7f0000000340)={0x0, 0x0, @ioapic}) syz_open_procfs(0x0, &(0x7f00000002c0)='oom_score_adj\x00') ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) request_key(&(0x7f0000000240)='pkcs7_test\x00', &(0x7f0000000280)={'syz', 0x0}, &(0x7f0000000300)='/\x00', 0xfffffffffffffffe) request_key(&(0x7f00000000c0)='user\x00', &(0x7f0000000100)={'syz'}, &(0x7f0000000200)='vmnet0&#selfbdev&vboxnet0trustedselfeth1#c(vmnet0c^\x00', 0x0) 21:46:38 executing program 0: recvfrom(0xffffffffffffffff, &(0x7f0000000080)=""/126, 0x7e, 0x0, &(0x7f0000000140)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x80) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_LAPIC(r3, 0x4400ae8f, &(0x7f0000000680)={"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"}) ioctl$KVM_SET_IRQCHIP(r1, 0x8208ae63, &(0x7f0000000280)={0x2, 0x0, @ioapic={0x0, 0x0, 0x0, 0xffffffffffff0001, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x9, 0x0, [], 0x7f}]}}) [ 371.508163] device nr0 entered promiscuous mode 21:46:38 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x12, 0x8, &(0x7f0000000140)=ANY=[@ANYBLOB="7a0af8ff00000000bfa100000000000007010000f8ffffffb702000008000000bd120000000000008500000006000000b7000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0xa}, 0x48) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000003c0), 0x4) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000640)={0xffffffffffffff9c, 0x10, &(0x7f0000000600)={&(0x7f0000000580)=""/78, 0x4e}}, 0x10) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00syz1\x00', 0x200002, 0x0) gettid() bpf$BPF_PROG_ATTACH(0x8, &(0x7f00000000c0)={r1, r0, 0xa}, 0x10) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) close(0xffffffffffffffff) openat$cgroup_int(r2, &(0x7f00000004c0)="0300000021a200", 0x2, 0x0) 21:46:38 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x12, 0x6, &(0x7f0000000140)=ANY=[@ANYBLOB="7a0af8ff00000000bfa100000000000007010000f8ffffffb702000008000000bd120000000000008500000006000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0xa}, 0x48) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000003c0), 0x4) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000640)={0xffffffffffffff9c, 0x10, &(0x7f0000000600)={&(0x7f0000000580)=""/78, 0x4e}}, 0x10) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00syz1\x00', 0x200002, 0x0) gettid() bpf$BPF_PROG_ATTACH(0x8, &(0x7f00000000c0)={r1, r0, 0xa}, 0x10) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000480)) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x9, 0x0, 0x100000001, 0x0, 0x400, 0x0, 0x64b, 0x0, 0x0, 0x0, 0x7, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TUNGETIFF(r1, 0x800454d2, &(0x7f0000000400)) close(0xffffffffffffffff) openat$cgroup_int(r2, &(0x7f00000004c0)="0300000021a200", 0x2, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000380)) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000340)={0xffffffffffffffff, 0x10, &(0x7f0000000300)={&(0x7f0000000240)=""/141, 0x8d, 0xffffffffffffffff}}, 0x10) 21:46:38 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x12, 0x8, &(0x7f0000000140)=ANY=[@ANYBLOB="7a0af8ff00000000bfa100000000000007010000f8ffffffb702000008000000bd120000000000008500000006000000b7000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0xa}, 0x48) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000003c0), 0x4) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000640)={0xffffffffffffff9c, 0x10, &(0x7f0000000600)={&(0x7f0000000580)=""/78, 0x4e}}, 0x10) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00syz1\x00', 0x200002, 0x0) gettid() bpf$BPF_PROG_ATTACH(0x8, &(0x7f00000000c0)={r1, r0, 0xa}, 0x10) close(0xffffffffffffffff) openat$cgroup_int(0xffffffffffffffff, &(0x7f00000004c0)="0300000021a200", 0x2, 0x0) 21:46:38 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='oom_score_adj\x00') ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) request_key(&(0x7f0000000240)='pkcs7_test\x00', &(0x7f0000000280)={'syz', 0x0}, &(0x7f0000000300)='/\x00', 0xfffffffffffffffe) request_key(&(0x7f00000000c0)='user\x00', &(0x7f0000000100)={'syz'}, &(0x7f0000000200)='vmnet0&#selfbdev&vboxnet0trustedselfeth1#c(vmnet0c^\x00', 0x0) clock_gettime(0x0, &(0x7f0000000000)={0x0, 0x0}) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_STATUS(r0, 0xc05c5340, &(0x7f0000000040)={0x10000, 0x2, 0x80, {r1, r2+30000000}, 0x1, 0x10000}) 21:46:38 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x12, 0x7, &(0x7f0000000140)=ANY=[@ANYBLOB="7a0af8ff00000000bfa100000000000007010000f8ffffffb702000008000000bd120000000000008500000006000000b700000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0xa}, 0x48) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000003c0), 0x4) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000640)={0xffffffffffffff9c, 0x10, &(0x7f0000000600)={&(0x7f0000000580)=""/78, 0x4e}}, 0x10) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00syz1\x00', 0x200002, 0x0) gettid() bpf$BPF_PROG_ATTACH(0x8, &(0x7f00000000c0)={r1, r0, 0xa}, 0x10) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000480)) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x9, 0x0, 0x100000001, 0x0, 0x400, 0x0, 0x64b, 0x0, 0x0, 0x0, 0x7, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TUNGETIFF(r1, 0x800454d2, &(0x7f0000000400)) close(0xffffffffffffffff) openat$cgroup_int(r2, &(0x7f00000004c0)="0300000021a200", 0x2, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000380)) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000340)={0xffffffffffffffff, 0x10, &(0x7f0000000300)={&(0x7f0000000240)=""/141, 0x8d, 0xffffffffffffffff}}, 0x10) 21:46:38 executing program 0: recvfrom(0xffffffffffffffff, &(0x7f0000000080)=""/126, 0x7e, 0x0, &(0x7f0000000140)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x80) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_LAPIC(r3, 0x4400ae8f, &(0x7f0000000680)={"6cdd4237dd245c8404721efdc9c8dc1964125fa96f3a40c8a4d4412a763b00040000000000003c5ca206c047ecee377abaece6b88378e3d63a98fc191f361d264ffa8b46485f02baee1ab6b8154252066178868d1ef4b5365c5dc26ca097ddda7c21a984c2b9ca4bbb7a87165c0c1dbc75d7ea4df10010174a3ac8694525952f44500a1f0db509c32cc7ace842c28f37f06e4ea9f1e5f0c6c379f9cc58bf69fcde317fad4825aa1b6a83384e48cc41bb5a6baa41d614f6c8941bee805954a62d196a4e8d4bf6b21224b57f530d0000c1ff53bf79a1f5c5dc34b2262d66ae793b6304a30b97077f1c131045cbc11c4562d22db88d0edc55aee171cc04d96d9ec2db07478f3485dbd6404923ad4a5672b1b285c7988c4ec0922c655ff600000000c00dc290d936d93236051fadfb4b95d02c0bda7ce38d63cd717a6ff8df8d46099b1f58e0689d6afbbc19db161c6df3e7c9c71bc08a282fc2c142856b5e4caff4c0a4f72445ef10dcd204000000000000008d5b00000000364673dcfa9235ea5a2ff23c4bb5c5acb290e8976dcac779ff00000000c3b7c12b4e185afe28a774b99d3890bd37428617de4cdd6f53c419ce31054182fd098af7b7f1b1152c691611f897558d4b755cb783978d9859b0537b05b623dcb5c4ca931749036ad349ef0c8694c4395fd59be3c3fe7aeb8af4929ce7d346ca62b25d48fda5d10146702f78b233b5208752726ed9f0c340d494b92d19cc930bb8a5f8b4da8f4603ac0c3b698384e17a570dc8524823ed15af4ecfabb4b254770000007bba1ca0a845c9cf0d1cc24aba47e30f558b2246ad95dd62ac2b0cc0ab26f08336ea1a33b79cf35b898837016eb211a1734c7af076e15451e33519fc978f66df7df4557c91024a8dc130a28ef5f63ad07b39c8d23b85cf434e065e8a29a80047fe17dee6f6347b4951f97b5703dc78b1ca9d74ea6a9ae12ab367c0de2659cc38d2f33ddd86e0597d33361eada119b5132145fa4525c488c7fffd6ceda6e9a02ebd97ced6b0161f2cc84615ceb8b18883299c636e9e46724a9a0608a8bb02f3e489631d522019a35fe12a33caf9dd8768ddbc02a484c345c3eff254297b1dbb04989c3f9f387b3c985c39b1d312018068d3809bac8c657e39f4f692613e28387e955722908dd88b56163be8312ff67c5b6f280472935af74e97a5a8110a4d74496f4c8ec82ddb56d9b962d2fc43fa01a047526865c888c9ff36056cc4ac258021e1581d43badaaec6cc5a2ef989de9801fed6d4be2bfcfe07a69c46bffbe9dd03970800000000000000d372bdd6d89dc1ecf63c23d506114d0fba2bd1c69e8f7e3fccdcda85ce975ec1381b1cec6ddaa76e186719d809164300"}) ioctl$KVM_SET_IRQCHIP(r1, 0x8208ae63, &(0x7f0000000280)={0x2, 0x0, @ioapic={0x0, 0x0, 0x0, 0xffffffffffff0001, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x9, 0x0, [], 0x7f}]}}) 21:46:39 executing program 4: r0 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000680)="0400"}, 0xffe5) bpf$BPF_PROG_DETACH(0x9, &(0x7f00000000c0)={0x0, r0, 0x0, 0x3}, 0x14) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) socketpair$inet_dccp(0x2, 0x6, 0x0, &(0x7f0000000100)) socket$kcm(0x2, 0x3, 0x2) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={r0, 0x50, &(0x7f0000000480)}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000380)="6e7230010060a19ef9d2c623d9a1571cb9e1369bcd61ef7e49793ae18712eceb1daa769497800b7fbbd35b170c10751d39aeb660d863e49b8c4f3b3cad48902b5b2d6cfd0abd372c63bcf5d70df3fd4d2e8d443c88c60fd7140fbc0e5637dd82fc3435bed4de5d693c9a781c863e05d8a6f8689a5be29216061f3ff53f8b6b396678e7ba155ef9152d7e43b1eccb2331eb8eb1ed5586dcf8b3b0b999361a44ff2c22c2abbef42dd24eabe6723346a6e46c0499a21442d8d00dcb57f013ff7595edd0ff076930de3675d34117a44eb0e4f832936da44e") r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000040)={"6e72300100", 0x801}) ioctl$TUNSETLINK(r2, 0x400454cd, 0x308) r3 = getpid() perf_event_open(&(0x7f0000000540)={0x0, 0x70, 0xf2, 0x4, 0x400, 0xadb0, 0x0, 0x0, 0x40000001110, 0x0, 0x2, 0x0, 0x0, 0x7, 0x5, 0x3, 0x401, 0x1, 0x5, 0x401, 0xce4, 0x87b, 0x3, 0x2, 0x9212, 0x0, 0x4, 0x40, 0x7ff, 0x100000001, 0x0, 0x6, 0x80000000, 0x6, 0xd7, 0x4, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={&(0x7f0000000500), 0xa}, 0x404c, 0x0, 0xffffffffffffffff}, r3, 0x9, r0, 0xa) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='memory.stat\x00', 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000200)=@ax25={0x3, {"b8738e610d62ed"}}, 0x80, &(0x7f0000000040)}, 0x0) socket$kcm(0x29, 0x2, 0x0) 21:46:39 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x12, 0x8, &(0x7f0000000140)=ANY=[@ANYBLOB="7a0af8ff00000000bfa100000000000007010000f8ffffffb702000008000000bd120000000000008500000006000000b7000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0xa}, 0x48) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000003c0), 0x4) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000640)={0xffffffffffffff9c, 0x10, &(0x7f0000000600)={&(0x7f0000000580)=""/78, 0x4e}}, 0x10) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00syz1\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f00000000c0)={r1, r0, 0xa}, 0x10) close(0xffffffffffffffff) openat$cgroup_int(0xffffffffffffffff, &(0x7f00000004c0)="0300000021a200", 0x2, 0x0) 21:46:39 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='oom_score_adj\x00') ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) getpgid(0xffffffffffffffff) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000000)=0x0) r2 = getpgid(r1) tgkill(r2, 0x0, 0x3e) request_key(&(0x7f0000000240)='pkcs7_test\x00', &(0x7f0000000280)={'syz', 0x0}, &(0x7f0000000300)='/\x00', 0xfffffffffffffffe) request_key(&(0x7f00000000c0)='user\x00', &(0x7f0000000100)={'syz'}, &(0x7f0000000200)='vmnet0&#selfbdev&vboxnet0trustedselfeth1#c(vmnet0c^\x00', 0x0) 21:46:39 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x12, 0x7, &(0x7f0000000140)=ANY=[@ANYBLOB="7a0af8ff00000000bfa100000000000007010000f8ffffffb702000008000000bd120000000000008500000006000000b70000000000000095000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0xa}, 0x48) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000003c0), 0x4) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000640)={0xffffffffffffff9c, 0x10, &(0x7f0000000600)={&(0x7f0000000580)=""/78, 0x4e}}, 0x10) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00syz1\x00', 0x200002, 0x0) gettid() bpf$BPF_PROG_ATTACH(0x8, &(0x7f00000000c0)={r1, r0, 0xa}, 0x10) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000480)) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x9, 0x0, 0x100000001, 0x0, 0x400, 0x0, 0x64b, 0x0, 0x0, 0x0, 0x7, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TUNGETIFF(r1, 0x800454d2, &(0x7f0000000400)) close(0xffffffffffffffff) openat$cgroup_int(r2, &(0x7f00000004c0)="0300000021a200", 0x2, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000380)) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000340)={0xffffffffffffffff, 0x10, &(0x7f0000000300)={&(0x7f0000000240)=""/141, 0x8d, 0xffffffffffffffff}}, 0x10) 21:46:39 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) sendmsg$IPVS_CMD_DEL_DEST(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000040), 0xc, &(0x7f0000000240)={&(0x7f0000000180)={0x14}, 0x14}}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000ab9ff0)={0x2, &(0x7f000039a000)=[{0x20, 0x0, 0x0, 0xfffffffffffff00c}, {0x6}]}, 0x10) sendmmsg(r1, &(0x7f0000000040), 0x324fad809d5a9cf, 0x0) 21:46:39 executing program 0: 21:46:39 executing program 0: 21:46:39 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='oom_score_adj\x00') ioctl$SNDRV_TIMER_IOCTL_INFO(r0, 0x80e85411, &(0x7f0000000340)=""/212) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) request_key(&(0x7f0000000240)='pkcs7_test\x00', &(0x7f0000000280)={'syz', 0x0}, &(0x7f0000000300)='/\x00', 0xfffffffffffffffe) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer\x00', 0x3, 0x0) ioctl$KDGKBMODE(r1, 0x4b44, &(0x7f0000000080)) openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x400, 0x0) request_key(&(0x7f0000000040)='user\x00', &(0x7f0000000100)={'syz'}, &(0x7f0000000000)='vmnet0&#selfbdev&vboxnet0trustedselfeth1#c(vmnet0c^\x00', 0x0) 21:46:39 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x12, 0x7, &(0x7f0000000140)=ANY=[@ANYBLOB="7a0af8ff00000000bfa100000000000007010000f8ffffffb702000008000000bd120000000000008500000006000000b700000000000000950000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0xa}, 0x48) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000003c0), 0x4) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000640)={0xffffffffffffff9c, 0x10, &(0x7f0000000600)={&(0x7f0000000580)=""/78, 0x4e}}, 0x10) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00syz1\x00', 0x200002, 0x0) gettid() bpf$BPF_PROG_ATTACH(0x8, &(0x7f00000000c0)={r1, r0, 0xa}, 0x10) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000480)) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x9, 0x0, 0x100000001, 0x0, 0x400, 0x0, 0x64b, 0x0, 0x0, 0x0, 0x7, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TUNGETIFF(r1, 0x800454d2, &(0x7f0000000400)) close(0xffffffffffffffff) openat$cgroup_int(r2, &(0x7f00000004c0)="0300000021a200", 0x2, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000380)) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000340)={0xffffffffffffffff, 0x10, &(0x7f0000000300)={&(0x7f0000000240)=""/141, 0x8d, 0xffffffffffffffff}}, 0x10) 21:46:39 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x12, 0x8, &(0x7f0000000140)=ANY=[@ANYBLOB="7a0af8ff00000000bfa100000000000007010000f8ffffffb702000008000000bd120000000000008500000006000000b7000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0xa}, 0x48) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000003c0), 0x4) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000640)={0xffffffffffffff9c, 0x10, &(0x7f0000000600)={&(0x7f0000000580)=""/78, 0x4e}}, 0x10) gettid() bpf$BPF_PROG_ATTACH(0x8, &(0x7f00000000c0)={0xffffffffffffffff, r0, 0xa}, 0x10) close(0xffffffffffffffff) openat$cgroup_int(0xffffffffffffffff, &(0x7f00000004c0)="0300000021a200", 0x2, 0x0) 21:46:39 executing program 0: [ 372.592667] device nr0 entered promiscuous mode 21:46:39 executing program 3: syz_open_procfs(0x0, &(0x7f00000002c0)='oom_score_adj\x00') ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) request_key(&(0x7f0000000240)='pkcs7_test\x00', &(0x7f0000000280)={'syz', 0x0}, &(0x7f0000000300)='/\x00', 0xfffffffffffffffe) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_SIGNAL_MASK(0xffffffffffffffff, 0x4004ae8b, &(0x7f0000001000)=ANY=[@ANYBLOB="47c3"]) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000fe7000/0x18000)=nil, &(0x7f0000000440)=[@textreal={0x8, &(0x7f0000000000)="0f01c8f20f35ba2000b000ee0f2336360fc76df20f2054440f20c0663504000000440f22c064f3e10a660f3a63a63c6700baf80c66b8bd08428766efbafc0cb066ee", 0x42}], 0x1, 0x0, &(0x7f0000000400), 0x100000000000000c) recvmmsg(0xffffffffffffffff, &(0x7f0000006080)=[{{0x0, 0x0, &(0x7f0000000c80), 0x0, &(0x7f0000000cc0)=""/103, 0x67}, 0x401}, {{&(0x7f0000000080)=@xdp, 0x80, &(0x7f0000002040)=[{&(0x7f0000000dc0)=""/52, 0x34}], 0x1, &(0x7f00000020c0)=""/4096, 0x1000}}], 0x2, 0x0, &(0x7f0000006340)) ioctl$KVM_NMI(r2, 0xae9a) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x2000, &(0x7f0000001000/0x2000)=nil}) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000680), &(0x7f00000006c0)=0xc) fstat(r1, &(0x7f0000000ac0)) getgroups(0x0, &(0x7f0000000c00)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$sock_void(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) request_key(&(0x7f00000000c0)='user\x00', &(0x7f0000000100)={'syz'}, &(0x7f0000000200)='vmnet0&#selfbdev&vboxnet0trustedselfeth1#c(vmnet0c^\x00', 0x0) 21:46:40 executing program 4: r0 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000680)="0400"}, 0xffe5) bpf$BPF_PROG_DETACH(0x9, &(0x7f00000000c0)={0x0, r0, 0x0, 0x3}, 0x14) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) socketpair$inet_dccp(0x2, 0x6, 0x0, &(0x7f0000000100)) socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000380)="6e7230010060a19ef9d2c623d9a1571cb9e1369bcd61ef7e49793ae18712eceb1daa769497800b7fbbd35b170c10751d39aeb660d863e49b8c4f3b3cad48902b5b2d6cfd0abd372c63bcf5d70df3fd4d2e8d443c88c60fd7140fbc0e5637dd82fc3435bed4de5d693c9a781c863e05d8a6f8689a5be29216061f3ff53f8b6b396678e7ba155ef9152d7e43b1eccb2331eb8eb1ed5586dcf8b3b0b999361a44ff2c22c2abbef42dd24eabe6723346a6e46c0499a21442d8d00dcb57f013ff7595edd0ff076930de3675d34117a44eb0e4f832936da44e") r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000040)={"6e72300100", 0x801}) ioctl$TUNSETLINK(r2, 0x400454cd, 0x308) r3 = getpid() perf_event_open(&(0x7f0000000540)={0x0, 0x70, 0xf2, 0x4, 0x400, 0xadb0, 0x0, 0x0, 0x40000001110, 0x0, 0x2, 0x0, 0x0, 0x7, 0x5, 0x3, 0x401, 0x1, 0x5, 0x401, 0xce4, 0x87b, 0x3, 0x2, 0x9212, 0x0, 0x4, 0x40, 0x7ff, 0x100000001, 0x0, 0x6, 0x80000000, 0x6, 0xd7, 0x4, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={&(0x7f0000000500), 0xa}, 0x404c, 0x0, 0xffffffffffffffff}, r3, 0x9, r0, 0xa) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='memory.stat\x00', 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000200)=@ax25={0x3, {"b8738e610d62ed"}}, 0x80, &(0x7f0000000040)}, 0x0) socket$kcm(0x29, 0x2, 0x0) 21:46:40 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x12, 0x7, &(0x7f0000000140)=ANY=[@ANYBLOB="7a0af8ff00000000bfa100000000000007010000f8ffffffb702000008000000bd120000000000008500000006000000b70000000000000095000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0xa}, 0x48) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000003c0), 0x4) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000640)={0xffffffffffffff9c, 0x10, &(0x7f0000000600)={&(0x7f0000000580)=""/78, 0x4e}}, 0x10) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00syz1\x00', 0x200002, 0x0) gettid() bpf$BPF_PROG_ATTACH(0x8, &(0x7f00000000c0)={r1, r0, 0xa}, 0x10) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000480)) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x9, 0x0, 0x100000001, 0x0, 0x400, 0x0, 0x64b, 0x0, 0x0, 0x0, 0x7, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TUNGETIFF(r1, 0x800454d2, &(0x7f0000000400)) close(0xffffffffffffffff) openat$cgroup_int(r2, &(0x7f00000004c0)="0300000021a200", 0x2, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000380)) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000340)={0xffffffffffffffff, 0x10, &(0x7f0000000300)={&(0x7f0000000240)=""/141, 0x8d, 0xffffffffffffffff}}, 0x10) 21:46:40 executing program 0: 21:46:40 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x12, 0x8, &(0x7f0000000140)=ANY=[@ANYBLOB="7a0af8ff00000000bfa100000000000007010000f8ffffffb702000008000000bd120000000000008500000006000000b7000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0xa}, 0x48) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000003c0), 0x4) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00syz1\x00', 0x200002, 0x0) gettid() bpf$BPF_PROG_ATTACH(0x8, &(0x7f00000000c0)={r1, r0, 0xa}, 0x10) close(0xffffffffffffffff) openat$cgroup_int(0xffffffffffffffff, &(0x7f00000004c0)="0300000021a200", 0x2, 0x0) 21:46:40 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) sendmsg$IPVS_CMD_DEL_DEST(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000040), 0xc, &(0x7f0000000240)={&(0x7f0000000180)={0x14}, 0x14}}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000ab9ff0)={0x2, &(0x7f000039a000)=[{0x20, 0x0, 0x0, 0xfffffffffffff00c}, {0x6}]}, 0x10) sendmmsg(r1, &(0x7f0000000040), 0x324fad809d5a9cf, 0x0) 21:46:40 executing program 3: getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000300)={{{@in=@multicast1, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in=@broadcast}}, &(0x7f0000000080)=0xe8) lstat(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f0000000240)='./file0\x00', &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fstat(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r4 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000700)='/proc/self/net/pfkey\x00', 0x400000, 0x0) ioctl$sock_inet_tcp_SIOCATMARK(r4, 0x8905, &(0x7f0000000740)) getresgid(&(0x7f0000000280), &(0x7f0000000500)=0x0, &(0x7f0000000540)) getgroups(0x1, &(0x7f0000000580)=[0xee01]) lstat(&(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='system.posix_acl_default\x00', &(0x7f0000000680)={{}, {0x1, 0x1}, [{0x2, 0x1, r0}, {0x2, 0x1, r1}], {0x4, 0x2}, [{0x8, 0x1, r2}, {0x8, 0x4, r3}, {0x8, 0x6, r5}, {0x8, 0x5, r6}, {0x8, 0x3, r7}], {0x10, 0x2}}, 0x5c, 0x3) r8 = syz_open_procfs(0x0, &(0x7f00000002c0)='oom_score_adj\x00') ioctl$SNDRV_CTL_IOCTL_POWER_STATE(r8, 0x800455d1, &(0x7f0000000780)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) request_key(&(0x7f00000000c0)='user\x00', &(0x7f0000000100)={'syz'}, &(0x7f0000000200)='vmnet0&#selfbdev&vboxnet0trustedselfeth1#c(vmnet0c^\x00', 0x0) 21:46:40 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x0, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendmmsg(r0, &(0x7f0000007e00), 0x136a88c8311572c, 0xe0ff) 21:46:40 executing program 3: io_setup(0x2, &(0x7f0000000000)=0x0) io_submit(r0, 0x0, &(0x7f0000000040)) syz_open_procfs(0x0, &(0x7f00000002c0)='oom_score_adj\x00') ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) request_key(&(0x7f0000000240)='pkcs7_test\x00', &(0x7f0000000280)={'syz', 0x0}, &(0x7f0000000300)='/\x00', 0xfffffffffffffffe) request_key(&(0x7f00000000c0)='user\x00', &(0x7f0000000100)={'syz'}, &(0x7f0000000200)='vmnet0&#selfbdev&vboxnet0trustedselfeth1#c(vmnet0c^\x00', 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000040)={&(0x7f0000000340)=ANY=[@ANYBLOB="9feb01001800000000000000540000006c00000000000000912a3dbd5760fe88b450eebd14dfa66a238dfe850f69852bd670a9f0a7d4a2d51b049ee8778c311beb360a5b0b79e0a4239c6e55542ecad43a99d9b5944e4f9c9eb22f718c21d4a451634aaed5d12cfd2cbf774100eb0bbc4369e929e8b98c8463880660053f98d09466f735ad7cbe83c982474066c7c10188018638704e641e3e7b041acafc988f8eeedb0182f6e954b6ad6a30e4f06f9c06c85b037369d8d09da3ba169ef86b0256ac54dbd009475bf794bae8eb794fc7e6c559be8a09d0a5b4b5fdfebaf3a11c4a9c09eb2e8f00"], &(0x7f0000000140)=""/191, 0xe7, 0xbf, 0x1}, 0x20) 21:46:40 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x12, 0x8, &(0x7f0000000140)=ANY=[@ANYBLOB="7a0af8ff00000000bfa100000000000007010000f8ffffffb702000008000000bd120000000000008500000006000000b7000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0xa}, 0x48) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000640)={0xffffffffffffff9c, 0x10, &(0x7f0000000600)={&(0x7f0000000580)=""/78, 0x4e}}, 0x10) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00syz1\x00', 0x200002, 0x0) gettid() bpf$BPF_PROG_ATTACH(0x8, &(0x7f00000000c0)={r1, r0, 0xa}, 0x10) close(0xffffffffffffffff) openat$cgroup_int(0xffffffffffffffff, &(0x7f00000004c0)="0300000021a200", 0x2, 0x0) 21:46:40 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x12, 0x8, &(0x7f0000000140)=ANY=[@ANYBLOB="7a0af8ff00000000bfa100000000000007010000f8ffffffb702000008000000bd120000000000008500000006000000b7000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00'}, 0x48) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000003c0), 0x4) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000640)={0xffffffffffffff9c, 0x10, &(0x7f0000000600)={&(0x7f0000000580)=""/78, 0x4e}}, 0x10) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00syz1\x00', 0x200002, 0x0) gettid() bpf$BPF_PROG_ATTACH(0x8, &(0x7f00000000c0)={r1, r0, 0xa}, 0x10) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000480)) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x9, 0x0, 0x100000001, 0x0, 0x400, 0x0, 0x64b, 0x0, 0x0, 0x0, 0x7, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TUNGETIFF(r1, 0x800454d2, &(0x7f0000000400)) close(0xffffffffffffffff) openat$cgroup_int(r2, &(0x7f00000004c0)="0300000021a200", 0x2, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000380)) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000340)={0xffffffffffffffff, 0x10, &(0x7f0000000300)={&(0x7f0000000240)=""/141, 0x8d, 0xffffffffffffffff}}, 0x10) [ 374.140680] device nr0 entered promiscuous mode 21:46:41 executing program 3: syz_open_procfs(0x0, &(0x7f00000002c0)='oom_score_adj\x00') ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) r0 = request_key(&(0x7f0000000240)='pkcs7_test\x00', &(0x7f0000000280)={'syz', 0x0}, &(0x7f0000000300)='/\x00', 0xfffffffffffffffe) request_key(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000200)='vmnet0&#selfbdev&vboxnet0trustedselfeth1#c(vmnet0c^\x00', r0) 21:46:41 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000640)={0xffffffffffffff9c, 0x10, &(0x7f0000000600)={&(0x7f0000000580)=""/78, 0x4e}}, 0x10) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00syz1\x00', 0x200002, 0x0) gettid() bpf$BPF_PROG_ATTACH(0x8, &(0x7f00000000c0)={r0, 0xffffffffffffffff, 0xa}, 0x10) close(0xffffffffffffffff) openat$cgroup_int(0xffffffffffffffff, &(0x7f00000004c0)="0300000021a200", 0x2, 0x0) 21:46:41 executing program 4: r0 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000680)="0400"}, 0xffe5) bpf$BPF_PROG_DETACH(0x9, &(0x7f00000000c0)={0x0, r0, 0x0, 0x3}, 0x14) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) socketpair$inet_dccp(0x2, 0x6, 0x0, &(0x7f0000000100)) socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000380)="6e7230010060a19ef9d2c623d9a1571cb9e1369bcd61ef7e49793ae18712eceb1daa769497800b7fbbd35b170c10751d39aeb660d863e49b8c4f3b3cad48902b5b2d6cfd0abd372c63bcf5d70df3fd4d2e8d443c88c60fd7140fbc0e5637dd82fc3435bed4de5d693c9a781c863e05d8a6f8689a5be29216061f3ff53f8b6b396678e7ba155ef9152d7e43b1eccb2331eb8eb1ed5586dcf8b3b0b999361a44ff2c22c2abbef42dd24eabe6723346a6e46c0499a21442d8d00dcb57f013ff7595edd0ff076930de3675d34117a44eb0e4f832936da44e") r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000040)={"6e72300100", 0x801}) ioctl$TUNSETLINK(r2, 0x400454cd, 0x308) r3 = getpid() perf_event_open(&(0x7f0000000540)={0x0, 0x70, 0xf2, 0x4, 0x400, 0xadb0, 0x0, 0x0, 0x40000001110, 0x0, 0x2, 0x0, 0x0, 0x7, 0x5, 0x3, 0x401, 0x1, 0x5, 0x401, 0xce4, 0x87b, 0x3, 0x2, 0x9212, 0x0, 0x4, 0x40, 0x7ff, 0x100000001, 0x0, 0x6, 0x80000000, 0x6, 0xd7, 0x4, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={&(0x7f0000000500), 0xa}, 0x404c, 0x0, 0xffffffffffffffff}, r3, 0x9, r0, 0xa) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='memory.stat\x00', 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000200)=@ax25={0x3, {"b8738e610d62ed"}}, 0x80, &(0x7f0000000040)}, 0x0) socket$kcm(0x29, 0x2, 0x0) 21:46:41 executing program 0: close(0xffffffffffffffff) socket$kcm(0x2, 0x0, 0x2) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) clone(0x210007fa, 0x0, 0xfffffffffffffffe, &(0x7f00000000c0), 0xffffffffffffffff) ioctl$SG_SET_KEEP_ORPHAN(0xffffffffffffffff, 0x2287, &(0x7f0000000100)) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000000)={0x0, 'lo\x00'}, 0x18) ioctl(r0, 0x800000000008982, &(0x7f0000000000)) 21:46:41 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x12, 0x8, &(0x7f0000000140)=ANY=[@ANYBLOB="7a0af8ff00000000bfa100000000000007010000f8ffffffb702000008000000bd120000000000008500000006000000b7000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0xa}, 0x48) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000640)={0xffffffffffffff9c, 0x10, &(0x7f0000000600)={&(0x7f0000000580)=""/78, 0x4e}}, 0x10) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00syz1\x00', 0x200002, 0x0) gettid() bpf$BPF_PROG_ATTACH(0x8, &(0x7f00000000c0)={r1, r0, 0xa}, 0x10) close(0xffffffffffffffff) openat$cgroup_int(0xffffffffffffffff, &(0x7f00000004c0)="0300000021a200", 0x2, 0x0) 21:46:41 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) sendmsg$IPVS_CMD_DEL_DEST(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000040), 0xc, &(0x7f0000000240)={&(0x7f0000000180)={0x14}, 0x14}}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) sendmmsg(r1, &(0x7f0000000040), 0x324fad809d5a9cf, 0x0) 21:46:41 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x12, 0x8, &(0x7f0000000140)=ANY=[@ANYBLOB="7a0af8ff00000000bfa100000000000007010000f8ffffffb702000008000000bd120000000000008500000006000000b7000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0xa}, 0x48) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000003c0), 0x4) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000640)={0xffffffffffffff9c, 0x10, &(0x7f0000000600)={&(0x7f0000000580)=""/78, 0x4e}}, 0x10) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00syz1\x00', 0x200002, 0x0) gettid() bpf$BPF_PROG_ATTACH(0x8, &(0x7f00000000c0)={0xffffffffffffffff, r0, 0xa}, 0x10) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000480)) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x9, 0x0, 0x100000001, 0x0, 0x400, 0x0, 0x64b, 0x0, 0x0, 0x0, 0x7, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TUNGETIFF(r1, 0x800454d2, &(0x7f0000000400)) close(0xffffffffffffffff) openat$cgroup_int(r2, &(0x7f00000004c0)="0300000021a200", 0x2, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000380)) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000340)={0xffffffffffffffff, 0x10, &(0x7f0000000300)={&(0x7f0000000240)=""/141, 0x8d, 0xffffffffffffffff}}, 0x10) 21:46:41 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='oom_score_adj\x00') ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) request_key(&(0x7f0000000240)='pkcs7_test\x00', &(0x7f0000000280)={'syz', 0x0}, &(0x7f0000000300)='/\x00', 0xfffffffffffffffe) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000001480)={{{@in6=@remote, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@rand_addr}, 0x0, @in=@dev}}, &(0x7f0000001580)=0xe8) syz_mount_image$reiserfs(&(0x7f0000000000)='reiserfs\x00', &(0x7f00000000c0)='./file0\x00', 0x4, 0x4, &(0x7f0000001400)=[{&(0x7f0000000340)="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", 0x1000, 0x583}, {&(0x7f0000000100)="6a1c7a12e2c407adcdbfb4a2fed2207f2cb1f6259ae64162a40e4f036002db75294964f9e8d4520b174fa6f137a8d3c96b99994882625d38efd260d357cbc83c2993e8e2e2aeac134d06d0fa4ace4d57b58b025c814914dbcc221866fc4240174674de816f3a26681b1904718f6e59a3ad2443376650e64f742cefd362cc83bb4508f17d7386ebac548b01eb481916", 0x8f, 0x26da}, {&(0x7f00000001c0)="f3a32887a1c529c1628d1480e54dfc1818bee79c79e9f100ecc6fb5411728c6f0ef09c314e9edc80790efef474618ba4", 0x30, 0x1}, {&(0x7f0000001340)="ebc26255e134d6d3958e0da8adc9188d1926a74dea6f31b608f41f3cc571b5d7c911f54c3da98f79e64b225015ea85a1866336d23de73b881265685d2f42747424e30354efccca1b8dd712ce0fb9027a33c2ee62057086a6ff02af2d87601f6cc4e8a8f6b0967c022034fc11809a71b3b11a46ce1871bb8b606244fceb14d650e3a382ab4efd3a427a88a01baba54e8eeb4d55f4cc3b3fbd93279b34c7711e6f09ee89d42c350f7f7f", 0xa9, 0x7ff}], 0x4000, &(0x7f00000015c0)={[{@data_journal='data=journal'}, {@usrquota='usrquota'}, {@tails_small='tails=small'}], [{@obj_type={'obj_type', 0x3d, 'oom_score_adj\x00'}}, {@uid_gt={'uid>', r1}}]}) request_key(&(0x7f0000000040)='id_legacy\x00', &(0x7f0000000080)={'syz'}, &(0x7f0000000200)='vmnet0&#selfbdev&vboxnet0trustedselfeth1#c(vmnet0c^\x00', 0x0) 21:46:41 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00', 0x0}) connect$can_bcm(r0, &(0x7f0000001ff0)={0x1d, r1}, 0x10) sendmsg$can_raw(r0, &(0x7f0000001fc8)={&(0x7f0000000200)={0x1d, 0x0, 0x200000000000000}, 0x10, &(0x7f0000000140)={&(0x7f000000a000)=@canfd={{0x1}, 0x0, 0x0, 0x0, 0x0, "0327e1b22b5fcef7739c699f5ff986ca08990039576a7d5cb2bdac3fa80acf584ecb5fee496e6866856b76b5f700000000000000004e2f9663a918fa1efd9b0b"}, 0x48}}, 0x0) [ 374.764460] 8021q: VLANs not supported on lo [ 374.775571] REISERFS warning (device loop3): super-6502 reiserfs_getopt: unknown mount option "obj_type=oom_score_adj" 21:46:41 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x8, &(0x7f0000000140)=ANY=[@ANYBLOB="7a0af8ff00000000bfa100000000000007010000f8ffffffb702000008000000bd120000000000008500000006000000b7000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0xa}, 0x48) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000640)={0xffffffffffffff9c, 0x10, &(0x7f0000000600)={&(0x7f0000000580)=""/78, 0x4e}}, 0x10) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00syz1\x00', 0x200002, 0x0) gettid() bpf$BPF_PROG_ATTACH(0x8, &(0x7f00000000c0)={r1, r0, 0xa}, 0x10) close(0xffffffffffffffff) openat$cgroup_int(0xffffffffffffffff, &(0x7f00000004c0)="0300000021a200", 0x2, 0x0) 21:46:41 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x12, 0x8, &(0x7f0000000140)=ANY=[@ANYBLOB="7a0af8ff00000000bfa100000000000007010000f8ffffffb702000008000000bd120000000000008500000006000000b7000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0xa}, 0x48) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000003c0), 0x4) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000640)={0xffffffffffffff9c, 0x10, &(0x7f0000000600)={&(0x7f0000000580)=""/78, 0x4e}}, 0x10) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00syz1\x00', 0x200002, 0x0) gettid() bpf$BPF_PROG_ATTACH(0x8, &(0x7f00000000c0)={r0, 0xffffffffffffffff, 0xa}, 0x10) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000480)) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x9, 0x0, 0x100000001, 0x0, 0x400, 0x0, 0x64b, 0x0, 0x0, 0x0, 0x7, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TUNGETIFF(r0, 0x800454d2, &(0x7f0000000400)) close(0xffffffffffffffff) openat$cgroup_int(r1, &(0x7f00000004c0)="0300000021a200", 0x2, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000380)) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000340)={0xffffffffffffffff, 0x10, &(0x7f0000000300)={&(0x7f0000000240)=""/141, 0x8d, 0xffffffffffffffff}}, 0x10) 21:46:41 executing program 0: syz_mount_image$ntfs(&(0x7f0000000580)='ntfs\x00', &(0x7f00000005c0)='./file0\x00', 0x0, 0x0, &(0x7f0000001600), 0x0, &(0x7f00000016c0)={[{@gid={'gid'}}, {@disable_sparse_no='disable_sparse=no'}]}) [ 374.958305] REISERFS warning (device loop3): super-6502 reiserfs_getopt: unknown mount option "obj_type=oom_score_adj" [ 374.973419] device nr0 entered promiscuous mode 21:46:41 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x12, 0x0, &(0x7f0000000140)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0xa}, 0x48) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000640)={0xffffffffffffff9c, 0x10, &(0x7f0000000600)={&(0x7f0000000580)=""/78, 0x4e}}, 0x10) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00syz1\x00', 0x200002, 0x0) gettid() bpf$BPF_PROG_ATTACH(0x8, &(0x7f00000000c0)={r1, r0, 0xa}, 0x10) close(0xffffffffffffffff) openat$cgroup_int(0xffffffffffffffff, &(0x7f00000004c0)="0300000021a200", 0x2, 0x0) 21:46:42 executing program 0: syz_mount_image$f2fs(&(0x7f00000001c0)='f2fs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000000)="1020f5f20100070009000000030000000c00000009", 0x15, 0x1400}], 0x0, &(0x7f0000000280)) 21:46:42 executing program 4: r0 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000680)="0400"}, 0xffe5) bpf$BPF_PROG_DETACH(0x9, &(0x7f00000000c0)={0x0, r0, 0x0, 0x3}, 0x14) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) socketpair$inet_dccp(0x2, 0x6, 0x0, &(0x7f0000000100)) socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000380)="6e7230010060a19ef9d2c623d9a1571cb9e1369bcd61ef7e49793ae18712eceb1daa769497800b7fbbd35b170c10751d39aeb660d863e49b8c4f3b3cad48902b5b2d6cfd0abd372c63bcf5d70df3fd4d2e8d443c88c60fd7140fbc0e5637dd82fc3435bed4de5d693c9a781c863e05d8a6f8689a5be29216061f3ff53f8b6b396678e7ba155ef9152d7e43b1eccb2331eb8eb1ed5586dcf8b3b0b999361a44ff2c22c2abbef42dd24eabe6723346a6e46c0499a21442d8d00dcb57f013ff7595edd0ff076930de3675d34117a44eb0e4f832936da44e") r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000040)={"6e72300100", 0x801}) ioctl$TUNSETLINK(r2, 0x400454cd, 0x308) r3 = getpid() perf_event_open(&(0x7f0000000540)={0x0, 0x70, 0xf2, 0x4, 0x400, 0xadb0, 0x0, 0x0, 0x40000001110, 0x0, 0x2, 0x0, 0x0, 0x7, 0x5, 0x3, 0x401, 0x1, 0x5, 0x401, 0xce4, 0x87b, 0x3, 0x2, 0x9212, 0x0, 0x4, 0x40, 0x7ff, 0x100000001, 0x0, 0x6, 0x80000000, 0x6, 0xd7, 0x4, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={&(0x7f0000000500), 0xa}, 0x404c, 0x0, 0xffffffffffffffff}, r3, 0x9, r0, 0xa) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='memory.stat\x00', 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000200)=@ax25={0x3, {"b8738e610d62ed"}}, 0x80, &(0x7f0000000040)}, 0x0) socket$kcm(0x29, 0x2, 0x0) 21:46:42 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='oom_score_adj\x00') ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) request_key(&(0x7f0000000240)='pkcs7_test\x00', &(0x7f0000000280)={'syz', 0x0}, &(0x7f0000000300)='/\x00', 0xfffffffffffffffe) request_key(&(0x7f00000000c0)='user\x00', &(0x7f0000000100)={'syz', 0x0}, &(0x7f0000000200)='vmnet0&#selfbdev&vboxnet0trustedselfeth1#c(vmnet0c^\x00', 0x0) getsockopt$inet_sctp_SCTP_AUTOCLOSE(r0, 0x84, 0x4, &(0x7f0000000000), &(0x7f0000000040)=0x4) fsetxattr$trusted_overlay_redirect(r0, &(0x7f0000000080)='trusted.overlay.redirect\x00', &(0x7f0000000140)='./file0\x00', 0x8, 0x1) 21:46:42 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x12, 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0xa}, 0x48) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000640)={0xffffffffffffff9c, 0x10, &(0x7f0000000600)={&(0x7f0000000580)=""/78, 0x4e}}, 0x10) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00syz1\x00', 0x200002, 0x0) gettid() bpf$BPF_PROG_ATTACH(0x8, &(0x7f00000000c0)={r1, r0, 0xa}, 0x10) close(0xffffffffffffffff) openat$cgroup_int(0xffffffffffffffff, &(0x7f00000004c0)="0300000021a200", 0x2, 0x0) 21:46:42 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x12, 0x8, &(0x7f0000000140)=ANY=[@ANYBLOB="7a0af8ff00000000bfa100000000000007010000f8ffffffb702000008000000bd120000000000008500000006000000b7000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0xa}, 0x48) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000003c0), 0x4) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000640)={0xffffffffffffff9c, 0x10, &(0x7f0000000600)={&(0x7f0000000580)=""/78, 0x4e}}, 0x10) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00syz1\x00', 0x200002, 0x0) gettid() bpf$BPF_PROG_ATTACH(0x8, &(0x7f00000000c0)={r1, r0}, 0x10) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000480)) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x9, 0x0, 0x100000001, 0x0, 0x400, 0x0, 0x64b, 0x0, 0x0, 0x0, 0x7, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TUNGETIFF(r1, 0x800454d2, &(0x7f0000000400)) close(0xffffffffffffffff) openat$cgroup_int(r2, &(0x7f00000004c0)="0300000021a200", 0x2, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000380)) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000340)={0xffffffffffffffff, 0x10, &(0x7f0000000300)={&(0x7f0000000240)=""/141, 0x8d, 0xffffffffffffffff}}, 0x10) 21:46:42 executing program 0: r0 = socket$inet(0x10, 0x80003, 0xc) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000000)="2400000001020700000000000000090020200a0009000100001d85680c1baba20400ff7e", 0x24}], 0x1}, 0x0) 21:46:42 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) sendmsg$IPVS_CMD_DEL_DEST(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000040), 0xc, &(0x7f0000000240)={&(0x7f0000000180)={0x14}, 0x14}}, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000ab9ff0)={0x2, &(0x7f000039a000)=[{0x20, 0x0, 0x0, 0xfffffffffffff00c}, {0x6}]}, 0x10) sendmmsg(0xffffffffffffffff, &(0x7f0000000040), 0x324fad809d5a9cf, 0x0) [ 376.129919] netlink: 5 bytes leftover after parsing attributes in process `syz-executor0'. 21:46:43 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000ab9ff0)={0x2, &(0x7f000039a000)=[{0x20, 0x0, 0x0, 0xfffffffffffff00c}, {0x6}]}, 0x10) sendmmsg(r1, &(0x7f0000000040), 0x324fad809d5a9cf, 0x0) 21:46:43 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x12, 0x4, &(0x7f0000000140)=ANY=[@ANYBLOB="7a0af8ff00000000bfa100000000000007010000f8ffffffb702000008000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0xa}, 0x48) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000640)={0xffffffffffffff9c, 0x10, &(0x7f0000000600)={&(0x7f0000000580)=""/78, 0x4e}}, 0x10) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00syz1\x00', 0x200002, 0x0) gettid() bpf$BPF_PROG_ATTACH(0x8, &(0x7f00000000c0)={r1, r0, 0xa}, 0x10) close(0xffffffffffffffff) openat$cgroup_int(0xffffffffffffffff, &(0x7f00000004c0)="0300000021a200", 0x2, 0x0) 21:46:43 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='oom_score_adj\x00') ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) request_key(&(0x7f0000000240)='pkcs7_test\x00', &(0x7f0000000280)={'syz', 0x0}, &(0x7f0000000300)='/\x00', 0xfffffffffffffffe) request_key(&(0x7f00000000c0)='user\x00', &(0x7f0000000100)={'syz'}, &(0x7f0000000200)='vmnet0&#selfbdev&vboxnet0trustedselfeth1#c(vmnet0c^\x00', 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000000)={'nr0\x00', {0x2, 0x4e24, @multicast2}}) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f0000000140)=[@in6={0xa, 0x4e23, 0x6, @remote, 0xff}, @in6={0xa, 0x4e24, 0x5, @dev={0xfe, 0x80, [], 0x19}, 0xad}, @in6={0xa, 0x4e22, 0x7, @dev={0xfe, 0x80, [], 0x1a}, 0x5}, @in6={0xa, 0x4e20, 0x8, @local, 0xa802}, @in={0x2, 0x4e23, @broadcast}, @in={0x2, 0x4e23, @local}], 0x90) ioctl$KVM_SET_TSC_KHZ(r0, 0xaea2, 0x0) 21:46:43 executing program 0: 21:46:43 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x12, 0x8, &(0x7f0000000140)=ANY=[@ANYBLOB="7a0af8ff00000000bfa100000000000007010000f8ffffffb702000008000000bd120000000000008500000006000000b7000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0xa}, 0x48) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000003c0), 0x4) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000640)={0xffffffffffffff9c, 0x10, &(0x7f0000000600)={&(0x7f0000000580)=""/78, 0x4e}}, 0x10) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00syz1\x00', 0x200002, 0x0) gettid() bpf$BPF_PROG_ATTACH(0x8, &(0x7f00000000c0)={r1, r0, 0xa}, 0x10) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000480)) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x9, 0x0, 0x100000001, 0x0, 0x400, 0x0, 0x64b, 0x0, 0x0, 0x0, 0x7, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TUNGETIFF(r1, 0x800454d2, &(0x7f0000000400)) close(0xffffffffffffffff) openat$cgroup_int(r2, &(0x7f00000004c0)="0300000021a200", 0x2, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000380)) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000340)={0xffffffffffffffff, 0x10, &(0x7f0000000300)={&(0x7f0000000240)=""/141, 0x8d, 0xffffffffffffffff}}, 0x10) [ 376.328256] device nr0 entered promiscuous mode 21:46:43 executing program 0: 21:46:44 executing program 4: r0 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000680)="0400"}, 0xffe5) bpf$BPF_PROG_DETACH(0x9, &(0x7f00000000c0)={0x0, r0, 0x0, 0x3}, 0x14) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) socketpair$inet_dccp(0x2, 0x6, 0x0, &(0x7f0000000100)) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={r0, 0x50, &(0x7f0000000480)}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000380)="6e7230010060a19ef9d2c623d9a1571cb9e1369bcd61ef7e49793ae18712eceb1daa769497800b7fbbd35b170c10751d39aeb660d863e49b8c4f3b3cad48902b5b2d6cfd0abd372c63bcf5d70df3fd4d2e8d443c88c60fd7140fbc0e5637dd82fc3435bed4de5d693c9a781c863e05d8a6f8689a5be29216061f3ff53f8b6b396678e7ba155ef9152d7e43b1eccb2331eb8eb1ed5586dcf8b3b0b999361a44ff2c22c2abbef42dd24eabe6723346a6e46c0499a21442d8d00dcb57f013ff7595edd0ff076930de3675d34117a44eb0e4f832936da44e") r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000040)={"6e72300100", 0x801}) ioctl$TUNSETLINK(r2, 0x400454cd, 0x308) r3 = getpid() perf_event_open(&(0x7f0000000540)={0x0, 0x70, 0xf2, 0x4, 0x400, 0xadb0, 0x0, 0x0, 0x40000001110, 0x0, 0x2, 0x0, 0x0, 0x7, 0x5, 0x3, 0x401, 0x1, 0x5, 0x401, 0xce4, 0x87b, 0x3, 0x2, 0x9212, 0x0, 0x4, 0x40, 0x7ff, 0x100000001, 0x0, 0x6, 0x80000000, 0x6, 0xd7, 0x4, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={&(0x7f0000000500), 0xa}, 0x404c, 0x0, 0xffffffffffffffff}, r3, 0x9, r0, 0xa) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='memory.stat\x00', 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000200)=@ax25={0x3, {"b8738e610d62ed"}}, 0x80, &(0x7f0000000040)}, 0x0) socket$kcm(0x29, 0x2, 0x0) 21:46:44 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x12, 0x6, &(0x7f0000000140)=ANY=[@ANYBLOB="7a0af8ff00000000bfa100000000000007010000f8ffffffb702000008000000bd120000000000008500000006000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0xa}, 0x48) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000640)={0xffffffffffffff9c, 0x10, &(0x7f0000000600)={&(0x7f0000000580)=""/78, 0x4e}}, 0x10) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00syz1\x00', 0x200002, 0x0) gettid() bpf$BPF_PROG_ATTACH(0x8, &(0x7f00000000c0)={r1, r0, 0xa}, 0x10) close(0xffffffffffffffff) openat$cgroup_int(0xffffffffffffffff, &(0x7f00000004c0)="0300000021a200", 0x2, 0x0) 21:46:44 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x12, 0x8, &(0x7f0000000140)=ANY=[@ANYBLOB="7a0af8ff00000000bfa100000000000007010000f8ffffffb702000008000000bd120000000000008500000006000000b7000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0xa}, 0x48) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000003c0), 0x4) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000640)={0xffffffffffffff9c, 0x10, &(0x7f0000000600)={&(0x7f0000000580)=""/78, 0x4e}}, 0x10) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00syz1\x00', 0x200002, 0x0) gettid() bpf$BPF_PROG_ATTACH(0x8, &(0x7f00000000c0)={r1, r0, 0xa}, 0x10) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000480)) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x9, 0x0, 0x100000001, 0x0, 0x400, 0x0, 0x64b, 0x0, 0x0, 0x0, 0x7, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TUNGETIFF(r1, 0x800454d2, &(0x7f0000000400)) close(0xffffffffffffffff) openat$cgroup_int(r2, &(0x7f00000004c0)="0300000021a200", 0x2, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000380)) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000340)={0xffffffffffffffff, 0x10, &(0x7f0000000300)={&(0x7f0000000240)=""/141, 0x8d, 0xffffffffffffffff}}, 0x10) 21:46:44 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='oom_score_adj\x00') ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) request_key(&(0x7f0000000240)='pkcs7_test\x00', &(0x7f0000000280)={'syz', 0x0}, &(0x7f0000000300)='/\x00', 0xfffffffffffffffe) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000200)='vmnet0&#selfbdev&vboxnet0trustedselfeth1#c(vmnet0c^\x00', 0x0) ioctl$SG_GET_SG_TABLESIZE(r0, 0x227f, &(0x7f0000000080)) mmap(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2, 0x70, r0, 0x2) socket$kcm(0x29, 0x2, 0x0) 21:46:44 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000ab9ff0)={0x2, &(0x7f000039a000)=[{0x20, 0x0, 0x0, 0xfffffffffffff00c}, {0x6}]}, 0x10) sendmmsg(r1, &(0x7f0000000040), 0x324fad809d5a9cf, 0x0) 21:46:44 executing program 0: 21:46:44 executing program 0: 21:46:44 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x12, 0x7, &(0x7f0000000140)=ANY=[@ANYBLOB="7a0af8ff00000000bfa100000000000007010000f8ffffffb702000008000000bd120000000000008500000006000000b700000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0xa}, 0x48) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000640)={0xffffffffffffff9c, 0x10, &(0x7f0000000600)={&(0x7f0000000580)=""/78, 0x4e}}, 0x10) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00syz1\x00', 0x200002, 0x0) gettid() bpf$BPF_PROG_ATTACH(0x8, &(0x7f00000000c0)={r1, r0, 0xa}, 0x10) close(0xffffffffffffffff) openat$cgroup_int(0xffffffffffffffff, &(0x7f00000004c0)="0300000021a200", 0x2, 0x0) 21:46:44 executing program 3: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x4000, 0x0) setsockopt$inet_udp_int(r0, 0x11, 0xa, &(0x7f0000000040)=0x95e9, 0x4) syz_open_procfs(0x0, &(0x7f00000002c0)='oom_score_adj\x00') ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) request_key(&(0x7f0000000240)='pkcs7_test\x00', &(0x7f0000000280)={'syz', 0x0}, &(0x7f0000000300)='/\x00', 0xfffffffffffffffe) request_key(&(0x7f00000000c0)='user\x00', &(0x7f0000000100)={'syz'}, &(0x7f0000000200)='vmnet0&#selfbdev&vboxnet0trustedselfeth1#c(vmnet0c^\x00', 0x0) 21:46:44 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x12, 0x8, &(0x7f0000000140)=ANY=[@ANYBLOB="7a0af8ff00000000bfa100000000000007010000f8ffffffb702000008000000bd120000000000008500000006000000b7000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0xa}, 0x48) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000003c0), 0x4) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000640)={0xffffffffffffff9c, 0x10, &(0x7f0000000600)={&(0x7f0000000580)=""/78, 0x4e}}, 0x10) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00syz1\x00', 0x200002, 0x0) gettid() bpf$BPF_PROG_ATTACH(0x8, &(0x7f00000000c0)={r1, r0, 0xa}, 0x10) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000480)) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x9, 0x0, 0x100000001, 0x0, 0x400, 0x0, 0x64b, 0x0, 0x0, 0x0, 0x7, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TUNGETIFF(r1, 0x800454d2, &(0x7f0000000400)) close(0xffffffffffffffff) openat$cgroup_int(r2, &(0x7f00000004c0)="0300000021a200", 0x2, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000380)) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000340)={0xffffffffffffffff, 0x10, &(0x7f0000000300)={&(0x7f0000000240)=""/141, 0x8d, 0xffffffffffffffff}}, 0x10) 21:46:44 executing program 0: 21:46:44 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x12, 0x7, &(0x7f0000000140)=ANY=[@ANYBLOB="7a0af8ff00000000bfa100000000000007010000f8ffffffb702000008000000bd120000000000008500000006000000b70000000000000095000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0xa}, 0x48) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000640)={0xffffffffffffff9c, 0x10, &(0x7f0000000600)={&(0x7f0000000580)=""/78, 0x4e}}, 0x10) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00syz1\x00', 0x200002, 0x0) gettid() bpf$BPF_PROG_ATTACH(0x8, &(0x7f00000000c0)={r1, r0, 0xa}, 0x10) close(0xffffffffffffffff) openat$cgroup_int(0xffffffffffffffff, &(0x7f00000004c0)="0300000021a200", 0x2, 0x0) 21:46:44 executing program 4: r0 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000680)="0400"}, 0xffe5) bpf$BPF_PROG_DETACH(0x9, &(0x7f00000000c0)={0x0, r0, 0x0, 0x3}, 0x14) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) socket$kcm(0x2, 0x3, 0x2) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={r0, 0x50, &(0x7f0000000480)}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000380)="6e7230010060a19ef9d2c623d9a1571cb9e1369bcd61ef7e49793ae18712eceb1daa769497800b7fbbd35b170c10751d39aeb660d863e49b8c4f3b3cad48902b5b2d6cfd0abd372c63bcf5d70df3fd4d2e8d443c88c60fd7140fbc0e5637dd82fc3435bed4de5d693c9a781c863e05d8a6f8689a5be29216061f3ff53f8b6b396678e7ba155ef9152d7e43b1eccb2331eb8eb1ed5586dcf8b3b0b999361a44ff2c22c2abbef42dd24eabe6723346a6e46c0499a21442d8d00dcb57f013ff7595edd0ff076930de3675d34117a44eb0e4f832936da44e") r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000040)={"6e72300100", 0x801}) ioctl$TUNSETLINK(r2, 0x400454cd, 0x308) r3 = getpid() perf_event_open(&(0x7f0000000540)={0x0, 0x70, 0xf2, 0x4, 0x400, 0xadb0, 0x0, 0x0, 0x40000001110, 0x0, 0x2, 0x0, 0x0, 0x7, 0x5, 0x3, 0x401, 0x1, 0x5, 0x401, 0xce4, 0x87b, 0x3, 0x2, 0x9212, 0x0, 0x4, 0x40, 0x7ff, 0x100000001, 0x0, 0x6, 0x80000000, 0x6, 0xd7, 0x4, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={&(0x7f0000000500), 0xa}, 0x404c, 0x0, 0xffffffffffffffff}, r3, 0x9, r0, 0xa) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='memory.stat\x00', 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000200)=@ax25={0x3, {"b8738e610d62ed"}}, 0x80, &(0x7f0000000040)}, 0x0) socket$kcm(0x29, 0x2, 0x0) 21:46:44 executing program 3: ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000180)=0x0) r1 = syz_open_procfs(r0, &(0x7f00000002c0)='net/dev\x00') ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) ptrace$setregs(0xf, r0, 0x2, &(0x7f0000000300)="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") r2 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0x0) ioctl$RTC_IRQP_READ(r1, 0x8008700b, &(0x7f00000001c0)) request_key(&(0x7f0000000240)='pkcs7_test\x00', &(0x7f0000000140)={'syz', 0x0}, &(0x7f0000000080)='/\x00', r2) ppoll(&(0x7f0000000280)=[{r1}, {r1, 0x117e}, {r1, 0x1}, {r1, 0x642c}, {r1, 0x2000}, {r1, 0x40}, {r1, 0x8}], 0x7, &(0x7f0000001300)={0x0, 0x989680}, &(0x7f0000001340)={0x6}, 0x8) request_key(&(0x7f00000000c0)='user\x00', &(0x7f0000000100)={'syz'}, &(0x7f0000000200)='vmnet0&#selfbdev&vboxnet0trustedselfeth1#c(vmnet0c^\x00', 0x0) 21:46:44 executing program 0: 21:46:44 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000ab9ff0)={0x2, &(0x7f000039a000)=[{0x20, 0x0, 0x0, 0xfffffffffffff00c}, {0x6}]}, 0x10) sendmmsg(r1, &(0x7f0000000040), 0x324fad809d5a9cf, 0x0) 21:46:44 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x12, 0x7, &(0x7f0000000140)=ANY=[@ANYBLOB="7a0af8ff00000000bfa100000000000007010000f8ffffffb702000008000000bd120000000000008500000006000000b700000000000000950000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0xa}, 0x48) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000640)={0xffffffffffffff9c, 0x10, &(0x7f0000000600)={&(0x7f0000000580)=""/78, 0x4e}}, 0x10) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00syz1\x00', 0x200002, 0x0) gettid() bpf$BPF_PROG_ATTACH(0x8, &(0x7f00000000c0)={r1, r0, 0xa}, 0x10) close(0xffffffffffffffff) openat$cgroup_int(0xffffffffffffffff, &(0x7f00000004c0)="0300000021a200", 0x2, 0x0) 21:46:44 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x12, 0x8, &(0x7f0000000140)=ANY=[@ANYBLOB="7a0af8ff00000000bfa100000000000007010000f8ffffffb702000008000000bd120000000000008500000006000000b7000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0xa}, 0x48) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000003c0), 0x4) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000640)={0xffffffffffffff9c, 0x10, &(0x7f0000000600)={&(0x7f0000000580)=""/78, 0x4e}}, 0x10) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00syz1\x00', 0x200002, 0x0) gettid() bpf$BPF_PROG_ATTACH(0x8, &(0x7f00000000c0)={r1, r0, 0xa}, 0x10) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000480)) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x9, 0x0, 0x100000001, 0x0, 0x400, 0x0, 0x64b, 0x0, 0x0, 0x0, 0x7, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TUNGETIFF(r1, 0x800454d2, &(0x7f0000000400)) close(0xffffffffffffffff) openat$cgroup_int(r2, &(0x7f00000004c0)="0300000021a200", 0x2, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000380)) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000340)={0xffffffffffffffff, 0x10, &(0x7f0000000300)={&(0x7f0000000240)=""/141, 0x8d, 0xffffffffffffffff}}, 0x10) 21:46:44 executing program 0: 21:46:45 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x12, 0x7, &(0x7f0000000140)=ANY=[@ANYBLOB="7a0af8ff00000000bfa100000000000007010000f8ffffffb702000008000000bd120000000000008500000006000000b70000000000000095000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0xa}, 0x48) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000640)={0xffffffffffffff9c, 0x10, &(0x7f0000000600)={&(0x7f0000000580)=""/78, 0x4e}}, 0x10) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00syz1\x00', 0x200002, 0x0) gettid() bpf$BPF_PROG_ATTACH(0x8, &(0x7f00000000c0)={r1, r0, 0xa}, 0x10) close(0xffffffffffffffff) openat$cgroup_int(0xffffffffffffffff, &(0x7f00000004c0)="0300000021a200", 0x2, 0x0) 21:46:45 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='oom_score_adj\x00') ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x0) r1 = request_key(&(0x7f0000000240)='asymmetric\x00', &(0x7f0000000280)={'syz', 0x0}, &(0x7f0000000080)='/\x00', 0xfffffffffffffffe) request_key(&(0x7f0000000040)='user\x00', &(0x7f0000000100)={'syz'}, &(0x7f0000000000)='vmnet0&#selfbdev&vboxnet0trustedselfeth1#c(vmnet0c^\x00', r1) ioctl$RTC_PLL_SET(r0, 0x40207012, &(0x7f00000000c0)={0x1f, 0x2, 0x90, 0x7, 0x5, 0xfffffffffffffc01, 0x4}) 21:46:45 executing program 0: 21:46:45 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x12, 0x8, &(0x7f0000000140)=ANY=[@ANYBLOB="7a0af8ff00000000bfa100000000000007010000f8ffffffb702000008000000bd120000000000008500000006000000b7000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0xa}, 0x48) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000003c0), 0x4) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000640)={0xffffffffffffff9c, 0x10, &(0x7f0000000600)={&(0x7f0000000580)=""/78, 0x4e}}, 0x10) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00syz1\x00', 0x200002, 0x0) gettid() bpf$BPF_PROG_ATTACH(0x8, &(0x7f00000000c0)={r1, r0, 0xa}, 0x10) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000480)) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x9, 0x0, 0x100000001, 0x0, 0x400, 0x0, 0x64b, 0x0, 0x0, 0x0, 0x7, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TUNGETIFF(r1, 0x800454d2, &(0x7f0000000400)) close(0xffffffffffffffff) openat$cgroup_int(r2, &(0x7f00000004c0)="0300000021a200", 0x2, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000380)) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000340)={0xffffffffffffffff, 0x10, &(0x7f0000000300)={&(0x7f0000000240)=""/141, 0x8d, 0xffffffffffffffff}}, 0x10) 21:46:45 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x12, 0x8, &(0x7f0000000140)=ANY=[@ANYBLOB="7a0af8ff00000000bfa100000000000007010000f8ffffffb702000008000000bd120000000000008500000006000000b7000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00'}, 0x48) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000640)={0xffffffffffffff9c, 0x10, &(0x7f0000000600)={&(0x7f0000000580)=""/78, 0x4e}}, 0x10) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00syz1\x00', 0x200002, 0x0) gettid() bpf$BPF_PROG_ATTACH(0x8, &(0x7f00000000c0)={r1, r0, 0xa}, 0x10) close(0xffffffffffffffff) openat$cgroup_int(0xffffffffffffffff, &(0x7f00000004c0)="0300000021a200", 0x2, 0x0) [ 378.237570] device nr0 entered promiscuous mode 21:46:45 executing program 4: r0 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000680)="0400"}, 0xffe5) bpf$BPF_PROG_DETACH(0x9, &(0x7f00000000c0)={0x0, r0, 0x0, 0x3}, 0x14) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0x2, 0x3, 0x2) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={r0, 0x50, &(0x7f0000000480)}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000380)="6e7230010060a19ef9d2c623d9a1571cb9e1369bcd61ef7e49793ae18712eceb1daa769497800b7fbbd35b170c10751d39aeb660d863e49b8c4f3b3cad48902b5b2d6cfd0abd372c63bcf5d70df3fd4d2e8d443c88c60fd7140fbc0e5637dd82fc3435bed4de5d693c9a781c863e05d8a6f8689a5be29216061f3ff53f8b6b396678e7ba155ef9152d7e43b1eccb2331eb8eb1ed5586dcf8b3b0b999361a44ff2c22c2abbef42dd24eabe6723346a6e46c0499a21442d8d00dcb57f013ff7595edd0ff076930de3675d34117a44eb0e4f832936da44e") r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000040)={"6e72300100", 0x801}) ioctl$TUNSETLINK(r2, 0x400454cd, 0x308) r3 = getpid() perf_event_open(&(0x7f0000000540)={0x0, 0x70, 0xf2, 0x4, 0x400, 0xadb0, 0x0, 0x0, 0x40000001110, 0x0, 0x2, 0x0, 0x0, 0x7, 0x5, 0x3, 0x401, 0x1, 0x5, 0x401, 0xce4, 0x87b, 0x3, 0x2, 0x9212, 0x0, 0x4, 0x40, 0x7ff, 0x100000001, 0x0, 0x6, 0x80000000, 0x6, 0xd7, 0x4, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={&(0x7f0000000500), 0xa}, 0x404c, 0x0, 0xffffffffffffffff}, r3, 0x9, r0, 0xa) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='memory.stat\x00', 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000200)=@ax25={0x3, {"b8738e610d62ed"}}, 0x80, &(0x7f0000000040)}, 0x0) socket$kcm(0x29, 0x2, 0x0) 21:46:45 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x12, 0x8, &(0x7f0000000140)=ANY=[@ANYBLOB="7a0af8ff00000000bfa100000000000007010000f8ffffffb702000008000000bd120000000000008500000006000000b7000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0xa}, 0x48) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000003c0), 0x4) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000640)={0xffffffffffffff9c, 0x10, &(0x7f0000000600)={&(0x7f0000000580)=""/78, 0x4e}}, 0x10) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00syz1\x00', 0x200002, 0x0) gettid() bpf$BPF_PROG_ATTACH(0x8, &(0x7f00000000c0)={r1, r0, 0xa}, 0x10) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000480)) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x9, 0x0, 0x100000001, 0x0, 0x400, 0x0, 0x64b, 0x0, 0x0, 0x0, 0x7, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TUNGETIFF(r1, 0x800454d2, &(0x7f0000000400)) close(0xffffffffffffffff) openat$cgroup_int(r2, &(0x7f00000004c0)="0300000021a200", 0x2, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000380)) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000340)={0xffffffffffffffff, 0x10, &(0x7f0000000300)={&(0x7f0000000240)=""/141, 0x8d, 0xffffffffffffffff}}, 0x10) 21:46:45 executing program 3: syz_open_procfs(0x0, &(0x7f00000002c0)='oom_score_adj\x00') ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) request_key(&(0x7f0000000240)='pkcs7_test\x00', &(0x7f0000000280)={'syz', 0x0}, &(0x7f0000000000)='/\x00', 0xfffffffffffffffe) request_key(&(0x7f00000000c0)='user\x00', &(0x7f0000000100)={'syz'}, &(0x7f0000000200)='vmnet0&#selfbdev&vboxnet0trustedselfeth1#c(vmnet0c^\x00', 0x0) mq_open(&(0x7f0000000040)='\x00', 0x800, 0x100, &(0x7f0000000080)={0x40, 0x25c, 0xffff, 0x1, 0xffffffffffffffff, 0xe0c, 0x6, 0x6}) 21:46:45 executing program 0: 21:46:45 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)) sendmsg$IPVS_CMD_DEL_DEST(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000040), 0xc, &(0x7f0000000240)={&(0x7f0000000180)={0x14}, 0x14}}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000ab9ff0)={0x2, &(0x7f000039a000)=[{0x20, 0x0, 0x0, 0xfffffffffffff00c}, {0x6}]}, 0x10) sendmmsg(r0, &(0x7f0000000040), 0x324fad809d5a9cf, 0x0) 21:46:45 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x12, 0x8, &(0x7f0000000140)=ANY=[@ANYBLOB="7a0af8ff00000000bfa100000000000007010000f8ffffffb702000008000000bd120000000000008500000006000000b7000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0xa}, 0x48) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000640)={0xffffffffffffff9c, 0x10, &(0x7f0000000600)={&(0x7f0000000580)=""/78, 0x4e}}, 0x10) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00syz1\x00', 0x200002, 0x0) gettid() bpf$BPF_PROG_ATTACH(0x8, &(0x7f00000000c0)={0xffffffffffffffff, r0, 0xa}, 0x10) close(0xffffffffffffffff) openat$cgroup_int(0xffffffffffffffff, &(0x7f00000004c0)="0300000021a200", 0x2, 0x0) 21:46:45 executing program 0: 21:46:45 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x12, 0x8, &(0x7f0000000140)=ANY=[@ANYBLOB="7a0af8ff00000000bfa100000000000007010000f8ffffffb702000008000000bd120000000000008500000006000000b7000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0xa}, 0x48) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000640)={0xffffffffffffff9c, 0x10, &(0x7f0000000600)={&(0x7f0000000580)=""/78, 0x4e}}, 0x10) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00syz1\x00', 0x200002, 0x0) gettid() bpf$BPF_PROG_ATTACH(0x8, &(0x7f00000000c0)={r0, 0xffffffffffffffff, 0xa}, 0x10) close(0xffffffffffffffff) openat$cgroup_int(0xffffffffffffffff, &(0x7f00000004c0)="0300000021a200", 0x2, 0x0) 21:46:45 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='oom_score_adj\x00') ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) r1 = add_key(&(0x7f0000000000)='logon\x00', &(0x7f0000000040)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffff9) request_key(&(0x7f0000000240)='pkcs7_test\x00', &(0x7f0000000280)={'syz', 0x0}, &(0x7f0000000300)='/\x00', r1) socket$inet_sctp(0x2, 0x1, 0x84) request_key(&(0x7f00000000c0)='user\x00', &(0x7f0000000100)={'syz'}, &(0x7f0000000200)='vmnet0&#selfbdev&vboxnet0trustedselfeth1#c(vmnet0c^\x00', 0x0) fdatasync(r0) 21:46:45 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x12, 0x8, &(0x7f0000000140)=ANY=[@ANYBLOB="7a0af8ff00000000bfa100000000000007010000f8ffffffb702000008000000bd120000000000008500000006000000b7000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0xa}, 0x48) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000003c0), 0x4) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000640)={0xffffffffffffff9c, 0x10, &(0x7f0000000600)={&(0x7f0000000580)=""/78, 0x4e}}, 0x10) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00syz1\x00', 0x200002, 0x0) gettid() bpf$BPF_PROG_ATTACH(0x8, &(0x7f00000000c0)={r1, r0, 0xa}, 0x10) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000480)) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x100000001, 0x0, 0x400, 0x0, 0x64b, 0x0, 0x0, 0x0, 0x7, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TUNGETIFF(r1, 0x800454d2, &(0x7f0000000400)) close(0xffffffffffffffff) openat$cgroup_int(r2, &(0x7f00000004c0)="0300000021a200", 0x2, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000380)) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000340)={0xffffffffffffffff, 0x10, &(0x7f0000000300)={&(0x7f0000000240)=""/141, 0x8d, 0xffffffffffffffff}}, 0x10) 21:46:45 executing program 0: 21:46:45 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x12, 0x8, &(0x7f0000000140)=ANY=[@ANYBLOB="7a0af8ff00000000bfa100000000000007010000f8ffffffb702000008000000bd120000000000008500000006000000b7000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0xa}, 0x48) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000640)={0xffffffffffffff9c, 0x10, &(0x7f0000000600)={&(0x7f0000000580)=""/78, 0x4e}}, 0x10) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00syz1\x00', 0x200002, 0x0) gettid() bpf$BPF_PROG_ATTACH(0x8, &(0x7f00000000c0)={r1, r0}, 0x10) close(0xffffffffffffffff) openat$cgroup_int(0xffffffffffffffff, &(0x7f00000004c0)="0300000021a200", 0x2, 0x0) 21:46:46 executing program 4: r0 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000680)="0400"}, 0xffe5) bpf$BPF_PROG_DETACH(0x9, &(0x7f00000000c0)={0x0, r0, 0x0, 0x3}, 0x14) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) socket$kcm(0x2, 0x3, 0x2) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={r0, 0x50, &(0x7f0000000480)}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, &(0x7f0000000380)="6e7230010060a19ef9d2c623d9a1571cb9e1369bcd61ef7e49793ae18712eceb1daa769497800b7fbbd35b170c10751d39aeb660d863e49b8c4f3b3cad48902b5b2d6cfd0abd372c63bcf5d70df3fd4d2e8d443c88c60fd7140fbc0e5637dd82fc3435bed4de5d693c9a781c863e05d8a6f8689a5be29216061f3ff53f8b6b396678e7ba155ef9152d7e43b1eccb2331eb8eb1ed5586dcf8b3b0b999361a44ff2c22c2abbef42dd24eabe6723346a6e46c0499a21442d8d00dcb57f013ff7595edd0ff076930de3675d34117a44eb0e4f832936da44e") r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={"6e72300100", 0x801}) ioctl$TUNSETLINK(r1, 0x400454cd, 0x308) r2 = getpid() perf_event_open(&(0x7f0000000540)={0x0, 0x70, 0xf2, 0x4, 0x400, 0xadb0, 0x0, 0x0, 0x40000001110, 0x0, 0x2, 0x0, 0x0, 0x7, 0x5, 0x3, 0x401, 0x1, 0x5, 0x401, 0xce4, 0x87b, 0x3, 0x2, 0x9212, 0x0, 0x4, 0x40, 0x7ff, 0x100000001, 0x0, 0x6, 0x80000000, 0x6, 0xd7, 0x4, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={&(0x7f0000000500), 0xa}, 0x404c, 0x0, 0xffffffffffffffff}, r2, 0x9, r0, 0xa) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='memory.stat\x00', 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000200)=@ax25={0x3, {"b8738e610d62ed"}}, 0x80, &(0x7f0000000040)}, 0x0) socket$kcm(0x29, 0x2, 0x0) 21:46:46 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='oom_score_adj\x00') ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) r1 = add_key$user(&(0x7f00000001c0)='user\x00', &(0x7f0000000340)={'syz', 0x3}, &(0x7f0000000380)="3340f9bd6b677f739073fcb37c4416a78ed91c0f8452f8c36e281d0ed66e6ff8bd6377d0a3bd753715b3ae12f5cfd6e144a5a48eef0364d7fdc6b0c2d0d3915f97e58cd557841710914dcb74acf4b77c76144e94f786fd5d0adbecde01e5417c250cf5686fea10ab72b1ce9c98315459e1f09cc5062bd56b2cdd8e7d26a68a0f7d78d71a72ac67d9151e6f36029ff41c38f89f05bd39a42649001190d59fc520", 0xa0, 0xfffffffffffffffa) r2 = add_key(&(0x7f00000004c0)='id_resolver\x00', &(0x7f0000000500)={'syz', 0x0}, &(0x7f0000000540)="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", 0x1000, 0xfffffffffffffffe) keyctl$search(0xa, r1, &(0x7f0000000440)='id_legacy\x00', &(0x7f0000000480)={'syz', 0x2}, r2) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000000000)={0x0, 0x1}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r0, 0x84, 0x72, &(0x7f0000000080)={r3, 0x7, 0x30}, 0xc) request_key(&(0x7f0000000240)='pkcs7_test\x00', &(0x7f0000000280)={'syz', 0x0}, &(0x7f0000000300)='/\x00', 0xfffffffffffffffe) request_key(&(0x7f00000000c0)='user\x00', &(0x7f0000000100)={'syz'}, &(0x7f0000000200)='vmnet0&#selfbdev&vboxnet0trustedselfeth1#c(vmnet0c^\x00', 0x0) ioctl$sock_inet_SIOCRTMSG(r0, 0x890d, &(0x7f0000000140)={0x6, {0x2, 0x4e20, @multicast1}, {0x2, 0x4e20, @remote}, {0x2, 0x4e22, @broadcast}, 0x220, 0x3, 0x9, 0x0, 0x400, 0x0, 0x1000, 0x6, 0x7}) 21:46:46 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x12, 0x8, &(0x7f0000000140)=ANY=[@ANYBLOB="7a0af8ff00000000bfa100000000000007010000f8ffffffb702000008000000bd120000000000008500000006000000b7000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0xa}, 0x48) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000003c0), 0x4) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000640)={0xffffffffffffff9c, 0x10, &(0x7f0000000600)={&(0x7f0000000580)=""/78, 0x4e}}, 0x10) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00syz1\x00', 0x200002, 0x0) gettid() bpf$BPF_PROG_ATTACH(0x8, &(0x7f00000000c0)={r1, r0, 0xa}, 0x10) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000480)) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x100000001, 0x0, 0x400, 0x0, 0x64b, 0x0, 0x0, 0x0, 0x7, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TUNGETIFF(r1, 0x800454d2, &(0x7f0000000400)) close(0xffffffffffffffff) openat$cgroup_int(r2, &(0x7f00000004c0)="0300000021a200", 0x2, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000380)) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000340)={0xffffffffffffffff, 0x10, &(0x7f0000000300)={&(0x7f0000000240)=""/141, 0x8d, 0xffffffffffffffff}}, 0x10) 21:46:46 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)) sendmsg$IPVS_CMD_DEL_DEST(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000040), 0xc, &(0x7f0000000240)={&(0x7f0000000180)={0x14}, 0x14}}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000ab9ff0)={0x2, &(0x7f000039a000)=[{0x20, 0x0, 0x0, 0xfffffffffffff00c}, {0x6}]}, 0x10) sendmmsg(r0, &(0x7f0000000040), 0x324fad809d5a9cf, 0x0) 21:46:46 executing program 0: 21:46:46 executing program 5: 21:46:46 executing program 5: 21:46:46 executing program 0: 21:46:46 executing program 3: ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000000080)) fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f0000000180)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000002c0)={0x0, 0x0}) syz_open_procfs(r0, &(0x7f0000000640)='net/rt6_stats\x00') ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) request_key(&(0x7f0000000240)='pkcs7_test\x00', &(0x7f0000000280)={'syz', 0x0}, &(0x7f0000000300)='/\x00', 0xfffffffffffffffe) request_key(&(0x7f00000000c0)='user\x00', &(0x7f0000000100)={'syz'}, &(0x7f0000000200)='vmnet0&#selfbdev&vboxnet0trustedselfeth1#c(vmnet0c^\x00', 0x0) 21:46:46 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x12, 0x8, &(0x7f0000000140)=ANY=[@ANYBLOB="7a0af8ff00000000bfa100000000000007010000f8ffffffb702000008000000bd120000000000008500000006000000b7000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0xa}, 0x48) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000003c0), 0x4) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000640)={0xffffffffffffff9c, 0x10, &(0x7f0000000600)={&(0x7f0000000580)=""/78, 0x4e}}, 0x10) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00syz1\x00', 0x200002, 0x0) gettid() bpf$BPF_PROG_ATTACH(0x8, &(0x7f00000000c0)={r1, r0, 0xa}, 0x10) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000480)) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x100000001, 0x0, 0x400, 0x0, 0x64b, 0x0, 0x0, 0x0, 0x7, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TUNGETIFF(r1, 0x800454d2, &(0x7f0000000400)) close(0xffffffffffffffff) openat$cgroup_int(r2, &(0x7f00000004c0)="0300000021a200", 0x2, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000380)) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000340)={0xffffffffffffffff, 0x10, &(0x7f0000000300)={&(0x7f0000000240)=""/141, 0x8d, 0xffffffffffffffff}}, 0x10) 21:46:46 executing program 5: 21:46:46 executing program 0: 21:46:47 executing program 4: r0 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000680)="0400"}, 0xffe5) bpf$BPF_PROG_DETACH(0x9, &(0x7f00000000c0)={0x0, r0, 0x0, 0x3}, 0x14) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) socket$kcm(0x2, 0x3, 0x2) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={r0, 0x50, &(0x7f0000000480)}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000380)="6e7230010060a19ef9d2c623d9a1571cb9e1369bcd61ef7e49793ae18712eceb1daa769497800b7fbbd35b170c10751d39aeb660d863e49b8c4f3b3cad48902b5b2d6cfd0abd372c63bcf5d70df3fd4d2e8d443c88c60fd7140fbc0e5637dd82fc3435bed4de5d693c9a781c863e05d8a6f8689a5be29216061f3ff53f8b6b396678e7ba155ef9152d7e43b1eccb2331eb8eb1ed5586dcf8b3b0b999361a44ff2c22c2abbef42dd24eabe6723346a6e46c0499a21442d8d00dcb57f013ff7595edd0ff076930de3675d34117a44eb0e4f832936da44e") r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000040)={"6e72300100", 0x801}) ioctl$TUNSETLINK(r2, 0x400454cd, 0x308) r3 = getpid() perf_event_open(&(0x7f0000000540)={0x0, 0x70, 0xf2, 0x4, 0x400, 0xadb0, 0x0, 0x0, 0x40000001110, 0x0, 0x2, 0x0, 0x0, 0x7, 0x5, 0x3, 0x401, 0x1, 0x5, 0x401, 0xce4, 0x87b, 0x3, 0x2, 0x9212, 0x0, 0x4, 0x40, 0x7ff, 0x100000001, 0x0, 0x6, 0x80000000, 0x6, 0xd7, 0x4, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={&(0x7f0000000500), 0xa}, 0x404c, 0x0, 0xffffffffffffffff}, r3, 0x9, r0, 0xa) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='memory.stat\x00', 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000200)=@ax25={0x3, {"b8738e610d62ed"}}, 0x80, &(0x7f0000000040)}, 0x0) socket$kcm(0x29, 0x2, 0x0) 21:46:47 executing program 5: 21:46:47 executing program 0: ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000300)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040)={0x0}, &(0x7f00000000c0)=0xc) syz_open_procfs(r0, &(0x7f0000000100)='attr/keycreate\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000080)={@multicast2, @remote, @loopback}, 0xc) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x100000c7, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000280)='net/mcfilter\x00') preadv(r1, &(0x7f0000000480), 0x100000000000022c, 0x6c00000000000000) clock_gettime(0x0, &(0x7f0000000140)) 21:46:47 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='oom_score_adj\x00') ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) request_key(&(0x7f0000000240)='pkcs7_test\x00', &(0x7f0000000280)={'syz', 0x2}, &(0x7f0000000040)="2f00bf608dd1b7311644d6dd520f63eee589d84b19766c0b226bb15126cfdf9d8cbd1793374c06d2f3c79d682a6e7ccfde3402", 0xfffffffffffffffe) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r0, 0x10e, 0x4, &(0x7f0000000000)=0x7, 0x4) request_key(&(0x7f00000000c0)='user\x00', &(0x7f0000000100)={'syz'}, &(0x7f0000000200)='vmnet0&#selfbdev&vboxnet0trustedselfeth1#c(vmnet0c^\x00', 0x0) 21:46:47 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)) sendmsg$IPVS_CMD_DEL_DEST(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000040), 0xc, &(0x7f0000000240)={&(0x7f0000000180)={0x14}, 0x14}}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000ab9ff0)={0x2, &(0x7f000039a000)=[{0x20, 0x0, 0x0, 0xfffffffffffff00c}, {0x6}]}, 0x10) sendmmsg(r0, &(0x7f0000000040), 0x324fad809d5a9cf, 0x0) 21:46:47 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x12, 0x8, &(0x7f0000000140)=ANY=[@ANYBLOB="7a0af8ff00000000bfa100000000000007010000f8ffffffb702000008000000bd120000000000008500000006000000b7000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0xa}, 0x48) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000003c0), 0x4) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000640)={0xffffffffffffff9c, 0x10, &(0x7f0000000600)={&(0x7f0000000580)=""/78, 0x4e}}, 0x10) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00syz1\x00', 0x200002, 0x0) gettid() bpf$BPF_PROG_ATTACH(0x8, &(0x7f00000000c0)={r1, r0, 0xa}, 0x10) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000480)) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x100000001, 0x0, 0x400, 0x0, 0x64b, 0x0, 0x0, 0x0, 0x7, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TUNGETIFF(r1, 0x800454d2, &(0x7f0000000400)) close(0xffffffffffffffff) openat$cgroup_int(r2, &(0x7f00000004c0)="0300000021a200", 0x2, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000380)) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000340)={0xffffffffffffffff, 0x10, &(0x7f0000000300)={&(0x7f0000000240)=""/141, 0x8d, 0xffffffffffffffff}}, 0x10) 21:46:47 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x100000c7, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='io\x00') preadv(r0, &(0x7f0000000480), 0x100000000000022c, 0x0) 21:46:47 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='oom_score_adj\x00') ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) request_key(&(0x7f0000000240)='pkcs7_test\x00', &(0x7f0000000280)={'syz', 0x0}, &(0x7f0000000300)='/\x00', 0xfffffffffffffffe) request_key(&(0x7f00000000c0)='user\x00', &(0x7f0000000100)={'syz'}, &(0x7f0000000200)='vmnet0&#selfbdev&vboxnet0trustedselfeth1#c(vmnet0c^\x00', 0x0) write$FUSE_STATFS(r0, &(0x7f0000000000)={0x60, 0x0, 0x7, {{0xcab, 0x0, 0x64, 0x60, 0x9, 0x5, 0x2, 0x80}}}, 0x60) [ 380.443383] device nr0 entered promiscuous mode 21:46:47 executing program 3: syz_open_procfs(0x0, &(0x7f0000000000)="6f6f6d5f73636f72655f61646a000fb5013bb86ebf72ddc64f17884a06ae4a4067ae3ce25a6775ab5257e2daf8171f0cc8353a0d2be77020be6501") ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) request_key(&(0x7f0000000240)='pkcs7_test\x00', &(0x7f0000000280)={'syz', 0x0}, &(0x7f0000000300)='/\x00', 0xfffffffffffffffe) request_key(&(0x7f00000000c0)='user\x00', &(0x7f0000000100)={'syz'}, &(0x7f0000000200)='vmnet0&#selfbdev&vboxnet0trustedselfeth1#c(vmnet0c^\x00', 0x0) 21:46:47 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x12, 0x8, &(0x7f0000000140)=ANY=[@ANYBLOB="7a0af8ff00000000bfa100000000000007010000f8ffffffb702000008000000bd120000000000008500000006000000b7000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0xa}, 0x48) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000003c0), 0x4) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000640)={0xffffffffffffff9c, 0x10, &(0x7f0000000600)={&(0x7f0000000580)=""/78, 0x4e}}, 0x10) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00syz1\x00', 0x200002, 0x0) gettid() bpf$BPF_PROG_ATTACH(0x8, &(0x7f00000000c0)={r1, r0, 0xa}, 0x10) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000480)) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x9, 0x0, 0x0, 0x0, 0x400, 0x0, 0x64b, 0x0, 0x0, 0x0, 0x7, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TUNGETIFF(r1, 0x800454d2, &(0x7f0000000400)) close(0xffffffffffffffff) openat$cgroup_int(r2, &(0x7f00000004c0)="0300000021a200", 0x2, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000380)) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000340)={0xffffffffffffffff, 0x10, &(0x7f0000000300)={&(0x7f0000000240)=""/141, 0x8d, 0xffffffffffffffff}}, 0x10) 21:46:47 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x100000c7, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='io\x00') preadv(r0, &(0x7f0000000480), 0x100000000000022c, 0x0) 21:46:47 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='oom_score_adj\x00') getsockopt$llc_int(r0, 0x10c, 0x9, &(0x7f0000000000), &(0x7f0000000040)=0x4) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) ioctl$sock_inet_SIOCSIFDSTADDR(r0, 0x8918, &(0x7f0000000080)={'dummy0\x00', {0x2, 0x4e24, @rand_addr=0x7}}) request_key(&(0x7f0000000240)='pkcs7_test\x00', &(0x7f0000000280)={'syz', 0x0}, &(0x7f0000000300)='/\x00', 0xfffffffffffffffe) mmap(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x2000000, 0xc010, r0, 0x0) write$FUSE_STATFS(r0, &(0x7f0000000180)={0x60, 0xfffffffffffffffe, 0x7, {{0x1000, 0x1, 0x5, 0x4, 0x4, 0x1e395b9d, 0x40, 0xffffffffffffff81}}}, 0x60) request_key(&(0x7f00000000c0)='user\x00', &(0x7f0000000100)={'syz'}, &(0x7f0000000200)='vmnet0&#selfbdev&vboxnet0trustedselfeth1#c(vmnet0c^\x00', 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000340)=@raw={'raw\x00', 0x9, 0x3, 0x318, 0x158, 0x0, 0x0, 0x158, 0x158, 0x248, 0x248, 0x248, 0x248, 0x248, 0x3, &(0x7f0000000140), {[{{@uncond, 0x0, 0xf0, 0x158, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00'}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x4, 0x8, 0x1b08000000, 0x9, 'netbios-ns\x00', 'syz0\x00', 0x6}}}, {{@ipv6={@ipv4={[], [], @broadcast}, @empty, [0x0, 0xffffffff, 0xff, 0xffffffff], [0xffffffff, 0xffffffff, 0xffffffff, 0xffffff00], 'ip6gre0\x00', 'team_slave_1\x00', {0xff}, {}, 0x7f, 0x7fffffff, 0x7, 0x6}, 0x0, 0xc8, 0xf0}, @common=@inet=@SET1={0x28, 'SET\x00', 0x1, {{0x401, 0x45, 0x1}, {0x4, 0x3ff, 0x81}}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x378) 21:46:47 executing program 4: r0 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000680)="0400"}, 0xffe5) bpf$BPF_PROG_DETACH(0x9, &(0x7f00000000c0)={0x0, r0, 0x0, 0x3}, 0x14) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) socket$kcm(0x2, 0x3, 0x2) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={r0, 0x50, &(0x7f0000000480)}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000380)="6e7230010060a19ef9d2c623d9a1571cb9e1369bcd61ef7e49793ae18712eceb1daa769497800b7fbbd35b170c10751d39aeb660d863e49b8c4f3b3cad48902b5b2d6cfd0abd372c63bcf5d70df3fd4d2e8d443c88c60fd7140fbc0e5637dd82fc3435bed4de5d693c9a781c863e05d8a6f8689a5be29216061f3ff53f8b6b396678e7ba155ef9152d7e43b1eccb2331eb8eb1ed5586dcf8b3b0b999361a44ff2c22c2abbef42dd24eabe6723346a6e46c0499a21442d8d00dcb57f013ff7595edd0ff076930de3675d34117a44eb0e4f832936da44e") r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000040)={"6e72300100", 0x801}) ioctl$TUNSETLINK(r2, 0x400454cd, 0x308) r3 = getpid() perf_event_open(&(0x7f0000000540)={0x0, 0x70, 0xf2, 0x4, 0x400, 0xadb0, 0x0, 0x0, 0x40000001110, 0x0, 0x2, 0x0, 0x0, 0x7, 0x5, 0x3, 0x401, 0x1, 0x5, 0x401, 0xce4, 0x87b, 0x3, 0x2, 0x9212, 0x0, 0x4, 0x40, 0x7ff, 0x100000001, 0x0, 0x6, 0x80000000, 0x6, 0xd7, 0x4, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={&(0x7f0000000500), 0xa}, 0x404c, 0x0, 0xffffffffffffffff}, r3, 0x9, r0, 0xa) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='memory.stat\x00', 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000200)=@ax25={0x3, {"b8738e610d62ed"}}, 0x80, &(0x7f0000000040)}, 0x0) socket$kcm(0x29, 0x2, 0x0) 21:46:47 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x12, 0x8, &(0x7f0000000140)=ANY=[@ANYBLOB="7a0af8ff00000000bfa100000000000007010000f8ffffffb702000008000000bd120000000000008500000006000000b7000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0xa}, 0x48) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000003c0), 0x4) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000640)={0xffffffffffffff9c, 0x10, &(0x7f0000000600)={&(0x7f0000000580)=""/78, 0x4e}}, 0x10) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00syz1\x00', 0x200002, 0x0) gettid() bpf$BPF_PROG_ATTACH(0x8, &(0x7f00000000c0)={r1, r0, 0xa}, 0x10) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000480)) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x9, 0x0, 0x0, 0x0, 0x400, 0x0, 0x64b, 0x0, 0x0, 0x0, 0x7, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TUNGETIFF(r1, 0x800454d2, &(0x7f0000000400)) close(0xffffffffffffffff) openat$cgroup_int(r2, &(0x7f00000004c0)="0300000021a200", 0x2, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000380)) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000340)={0xffffffffffffffff, 0x10, &(0x7f0000000300)={&(0x7f0000000240)=""/141, 0x8d, 0xffffffffffffffff}}, 0x10) 21:46:47 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x100000c7, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='io\x00') preadv(r0, &(0x7f0000000480), 0x100000000000022c, 0x0) 21:46:47 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='oom_score_adj\x00') ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) request_key(&(0x7f0000000240)='pkcs7_test\x00', &(0x7f0000000280)={'syz', 0x0}, &(0x7f0000000080)="ec2d2e292b6b657972696e6700", 0xfffffffffffffffe) request_key(&(0x7f00000000c0)='user\x00', &(0x7f0000000100)={'syz'}, &(0x7f0000000200)='vmnet0&#selfbdev&vboxnet0trustedselfeth1#c(vmnet0c^\x00', 0x0) ioctl$sock_inet_SIOCGIFPFLAGS(r0, 0x8935, &(0x7f0000000000)={'bond_slave_1\x00', 0x1f}) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f0000000040)={&(0x7f0000ffd000/0x3000)=nil, 0x3000}, &(0x7f0000000140)=0x10) ioctl$DRM_IOCTL_SET_MASTER(r0, 0x641e) 21:46:47 executing program 2: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) sendmsg$IPVS_CMD_DEL_DEST(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000040), 0xc, &(0x7f0000000240)={&(0x7f0000000180)={0x14}, 0x14}}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000ab9ff0)={0x2, &(0x7f000039a000)=[{0x20, 0x0, 0x0, 0xfffffffffffff00c}, {0x6}]}, 0x10) sendmmsg(r0, &(0x7f0000000040), 0x324fad809d5a9cf, 0x0) 21:46:47 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x100000c7, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='oom_score_adj\x00') preadv(r0, &(0x7f0000000480), 0x100000000000022c, 0x6c00000000000000) 21:46:48 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='oom_score_adj\x00') ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x0) request_key(&(0x7f0000000240)='pkcs7_test\x00', &(0x7f0000000280)={'syz', 0x0}, &(0x7f0000000300)='/\x00', 0xfffffffffffffffe) request_key(&(0x7f00000000c0)='user\x00', &(0x7f0000000100)={'syz'}, &(0x7f0000000200)='vmnet0&#selfbdev&vboxnet0trustedselfeth1#c(vmnet0c^\x00', 0x0) getsockopt$inet6_dccp_buf(r0, 0x21, 0xcf, &(0x7f0000000000)=""/113, &(0x7f0000000080)=0x71) 21:46:48 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x12, 0x8, &(0x7f0000000140)=ANY=[@ANYBLOB="7a0af8ff00000000bfa100000000000007010000f8ffffffb702000008000000bd120000000000008500000006000000b7000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0xa}, 0x48) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000003c0), 0x4) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000640)={0xffffffffffffff9c, 0x10, &(0x7f0000000600)={&(0x7f0000000580)=""/78, 0x4e}}, 0x10) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00syz1\x00', 0x200002, 0x0) gettid() bpf$BPF_PROG_ATTACH(0x8, &(0x7f00000000c0)={r1, r0, 0xa}, 0x10) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000480)) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x9, 0x0, 0x100000001, 0x0, 0x0, 0x0, 0x64b, 0x0, 0x0, 0x0, 0x7, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TUNGETIFF(r1, 0x800454d2, &(0x7f0000000400)) close(0xffffffffffffffff) openat$cgroup_int(r2, &(0x7f00000004c0)="0300000021a200", 0x2, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000380)) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000340)={0xffffffffffffffff, 0x10, &(0x7f0000000300)={&(0x7f0000000240)=""/141, 0x8d, 0xffffffffffffffff}}, 0x10) 21:46:48 executing program 0: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x100000c7, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000280)='net/mcfilter\x00') preadv(r0, &(0x7f0000000480), 0x100000000000022c, 0x6c00000000000000) 21:46:48 executing program 4: r0 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000680)="0400"}, 0xffe5) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) socket$kcm(0x2, 0x3, 0x2) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={r0, 0x50, &(0x7f0000000480)}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000380)="6e7230010060a19ef9d2c623d9a1571cb9e1369bcd61ef7e49793ae18712eceb1daa769497800b7fbbd35b170c10751d39aeb660d863e49b8c4f3b3cad48902b5b2d6cfd0abd372c63bcf5d70df3fd4d2e8d443c88c60fd7140fbc0e5637dd82fc3435bed4de5d693c9a781c863e05d8a6f8689a5be29216061f3ff53f8b6b396678e7ba155ef9152d7e43b1eccb2331eb8eb1ed5586dcf8b3b0b999361a44ff2c22c2abbef42dd24eabe6723346a6e46c0499a21442d8d00dcb57f013ff7595edd0ff076930de3675d34117a44eb0e4f832936da44e") r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000040)={"6e72300100", 0x801}) ioctl$TUNSETLINK(r2, 0x400454cd, 0x308) r3 = getpid() perf_event_open(&(0x7f0000000540)={0x0, 0x70, 0xf2, 0x4, 0x400, 0xadb0, 0x0, 0x0, 0x40000001110, 0x0, 0x2, 0x0, 0x0, 0x7, 0x5, 0x3, 0x401, 0x1, 0x5, 0x401, 0xce4, 0x87b, 0x3, 0x2, 0x9212, 0x0, 0x4, 0x40, 0x7ff, 0x100000001, 0x0, 0x6, 0x80000000, 0x6, 0xd7, 0x4, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={&(0x7f0000000500), 0xa}, 0x404c, 0x0, 0xffffffffffffffff}, r3, 0x9, r0, 0xa) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='memory.stat\x00', 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000200)=@ax25={0x3, {"b8738e610d62ed"}}, 0x80, &(0x7f0000000040)}, 0x0) socket$kcm(0x29, 0x2, 0x0) 21:46:48 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='oom_score_adj\x00') ppoll(&(0x7f0000000000)=[{r0, 0x122}, {r0, 0x40}, {r0, 0x40a0}, {r0, 0x10}], 0x4, &(0x7f0000000040)={0x0, 0x1c9c380}, &(0x7f0000000080), 0x8) setsockopt$inet6_MRT6_DEL_MFC_PROXY(r0, 0x29, 0xd3, &(0x7f0000000180)={{0xa, 0x4e23, 0x10001, @local, 0x5}, {0xa, 0x4e20, 0x332, @mcast2, 0x2}, 0x7, [0x2, 0x0, 0xf519, 0x3, 0x8, 0xb0, 0x5]}, 0x5c) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) getsockopt$inet_sctp_SCTP_RECVNXTINFO(r0, 0x84, 0x21, &(0x7f0000000280), &(0x7f00000003c0)=0x4) r1 = getpgid(0xffffffffffffffff) syz_open_procfs(r1, &(0x7f0000000340)='cgroup\x00') request_key(&(0x7f0000000240)='pkcs7_test\x00', &(0x7f0000000380)={'syz', 0x0}, &(0x7f0000000300)='/\x00', 0xfffffffffffffffd) request_key(&(0x7f00000000c0)='user\x00', &(0x7f0000000100)={'syz'}, &(0x7f0000000200)='vmnet0&#selfbdev&vboxnet0trustedselfeth1#c(vmnet0c^\x00', 0x0) setsockopt$inet_mreqsrc(r0, 0x0, 0x27, &(0x7f0000000140)={@broadcast, @dev={0xac, 0x14, 0x14, 0x1b}, @multicast2}, 0xc) 21:46:48 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x100000c7, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='io\x00') preadv(r0, &(0x7f0000000480), 0x100000000000022c, 0x0) 21:46:48 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x12, 0x8, &(0x7f0000000140)=ANY=[@ANYBLOB="7a0af8ff00000000bfa100000000000007010000f8ffffffb702000008000000bd120000000000008500000006000000b7000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0xa}, 0x48) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000003c0), 0x4) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000640)={0xffffffffffffff9c, 0x10, &(0x7f0000000600)={&(0x7f0000000580)=""/78, 0x4e}}, 0x10) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00syz1\x00', 0x200002, 0x0) gettid() bpf$BPF_PROG_ATTACH(0x8, &(0x7f00000000c0)={r1, r0, 0xa}, 0x10) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000480)) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x9, 0x0, 0x100000001, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TUNGETIFF(r1, 0x800454d2, &(0x7f0000000400)) close(0xffffffffffffffff) openat$cgroup_int(r2, &(0x7f00000004c0)="0300000021a200", 0x2, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000380)) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000340)={0xffffffffffffffff, 0x10, &(0x7f0000000300)={&(0x7f0000000240)=""/141, 0x8d, 0xffffffffffffffff}}, 0x10) [ 381.504308] device nr0 entered promiscuous mode 21:46:48 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='oom_score_adj\x00') ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) request_key(&(0x7f0000000240)='pkcs7_test\x00', &(0x7f0000000280)={'syz', 0x0}, &(0x7f0000000300)='/\x00', 0xfffffffffffffffe) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000000)={0x0}, &(0x7f0000000040)=0xc) sched_setscheduler(r1, 0x3, &(0x7f0000000080)=0x7) request_key(&(0x7f00000000c0)='user\x00', &(0x7f0000000100)={'syz'}, &(0x7f0000000200)="766d6e807430262373656c6662646576757374656473656c6665746831236328766d6e657430635e00", 0x0) 21:46:48 executing program 2: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) sendmsg$IPVS_CMD_DEL_DEST(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000040), 0xc, &(0x7f0000000240)={&(0x7f0000000180)={0x14}, 0x14}}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000ab9ff0)={0x2, &(0x7f000039a000)=[{0x20, 0x0, 0x0, 0xfffffffffffff00c}, {0x6}]}, 0x10) sendmmsg(r0, &(0x7f0000000040), 0x324fad809d5a9cf, 0x0) 21:46:48 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x100000c7, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='attr/keycreate\x00') preadv(r0, &(0x7f0000000480), 0x100000000000022c, 0x0) 21:46:48 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x12, 0x8, &(0x7f0000000140)=ANY=[@ANYBLOB="7a0af8ff00000000bfa100000000000007010000f8ffffffb702000008000000bd120000000000008500000006000000b7000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0xa}, 0x48) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000003c0), 0x4) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000640)={0xffffffffffffff9c, 0x10, &(0x7f0000000600)={&(0x7f0000000580)=""/78, 0x4e}}, 0x10) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00syz1\x00', 0x200002, 0x0) gettid() bpf$BPF_PROG_ATTACH(0x8, &(0x7f00000000c0)={r1, r0, 0xa}, 0x10) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000480)) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x9, 0x0, 0x100000001, 0x0, 0x400, 0x0, 0x64b, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TUNGETIFF(r1, 0x800454d2, &(0x7f0000000400)) close(0xffffffffffffffff) openat$cgroup_int(r2, &(0x7f00000004c0)="0300000021a200", 0x2, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000380)) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000340)={0xffffffffffffffff, 0x10, &(0x7f0000000300)={&(0x7f0000000240)=""/141, 0x8d, 0xffffffffffffffff}}, 0x10) 21:46:48 executing program 3: syz_open_procfs(0x0, &(0x7f00000002c0)='oom_score_adj\x00') ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) request_key(&(0x7f0000000240)='pkcs7_test\x00', &(0x7f0000000280)={'syz', 0x0}, &(0x7f0000000300)='/\x00', 0xfffffffffffffffe) request_key(&(0x7f0000000040)='id_legacy\x00', &(0x7f0000000100)={'syz', 0x3}, &(0x7f0000000080)='vmnev0&#selfbdev&vboxnet0trustedselfeth1#c(vmnet0c^\x00', 0x0) 21:46:48 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='ns\x00') fstat(r0, &(0x7f0000000140)) 21:46:48 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='oom_score_adj\x00') ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x2, 0xa}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r0, &(0x7f0000000080)={0x4, 0xfcda, 0xfa00, {r1, 0x5}}, 0x10) request_key(&(0x7f0000000240)='pkcs7_test\x00', &(0x7f0000000280)={'syz', 0x0}, &(0x7f0000000300)='/\x00', 0xfffffffffffffffe) ioctl$EVIOCGKEYCODE_V2(r0, 0x80284504, &(0x7f0000000140)=""/70) fcntl$getflags(r0, 0x0) request_key(&(0x7f00000000c0)='user\x00', &(0x7f0000000100)={'syz'}, &(0x7f0000000200)='vmnet0&#selfbdev&vboxnet0trustedselfeth1#c(vmnet0c^\x00', 0x0) 21:46:48 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x100000c7, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000480), 0x100000000000022c, 0x0) 21:46:49 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000080)='tunl0\x00', 0x27d) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) 21:46:49 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x12, 0x8, &(0x7f0000000140)=ANY=[@ANYBLOB="7a0af8ff00000000bfa100000000000007010000f8ffffffb702000008000000bd120000000000008500000006000000b7000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0xa}, 0x48) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000003c0), 0x4) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000640)={0xffffffffffffff9c, 0x10, &(0x7f0000000600)={&(0x7f0000000580)=""/78, 0x4e}}, 0x10) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00syz1\x00', 0x200002, 0x0) gettid() bpf$BPF_PROG_ATTACH(0x8, &(0x7f00000000c0)={r1, r0, 0xa}, 0x10) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000480)) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x9, 0x0, 0x100000001, 0x0, 0x400, 0x0, 0x64b, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TUNGETIFF(r1, 0x800454d2, &(0x7f0000000400)) close(0xffffffffffffffff) openat$cgroup_int(r2, &(0x7f00000004c0)="0300000021a200", 0x2, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000380)) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000340)={0xffffffffffffffff, 0x10, &(0x7f0000000300)={&(0x7f0000000240)=""/141, 0x8d, 0xffffffffffffffff}}, 0x10) 21:46:49 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='oom_score_adj\x00') ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f00000004c0)=0x0) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000500)={{{@in, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in=@broadcast}}, &(0x7f0000000600)=0xe8) ioctl$DRM_IOCTL_GET_CLIENT(r0, 0xc0286405, &(0x7f0000000640)={0x93b7, 0x3, r1, 0x100, r2, 0x8, 0x8, 0x2}) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) request_key(&(0x7f0000000240)='pkcs7_test\x00', &(0x7f0000000280)={'syz', 0x0}, &(0x7f0000000300)='/\x00', 0xfffffffffffffffe) getsockopt$inet_sctp_SCTP_STATUS(r0, 0x84, 0xe, &(0x7f0000000000)={0x0, 0x100000001, 0x4, 0x100000000, 0x6c, 0xffffffff00000000, 0x9, 0x7, {0x0, @in6={{0xa, 0x4e23, 0x1000, @ipv4={[], [], @rand_addr}, 0x80000000}}, 0x1, 0x100000000, 0x1a, 0xe9a7}}, &(0x7f0000000140)=0xb0) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000000180)={r3, 0x100000000}, &(0x7f00000001c0)=0x8) request_key(&(0x7f00000000c0)='user\x00', &(0x7f0000000100)={'syz'}, &(0x7f0000000200)='vmnet0&#selfbdev&vboxnet0trustedselfeth1#c(vmnet0c^\x00', 0x0) fgetxattr(r0, &(0x7f0000000340)=@known='system.advise\x00', &(0x7f0000000380)=""/78, 0x4e) 21:46:49 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='io\x00') preadv(r0, &(0x7f0000000480), 0x100000000000022c, 0x0) 21:46:49 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) socket$kcm(0x2, 0x3, 0x2) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0x50, &(0x7f0000000480)}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f0000000380)="6e7230010060a19ef9d2c623d9a1571cb9e1369bcd61ef7e49793ae18712eceb1daa769497800b7fbbd35b170c10751d39aeb660d863e49b8c4f3b3cad48902b5b2d6cfd0abd372c63bcf5d70df3fd4d2e8d443c88c60fd7140fbc0e5637dd82fc3435bed4de5d693c9a781c863e05d8a6f8689a5be29216061f3ff53f8b6b396678e7ba155ef9152d7e43b1eccb2331eb8eb1ed5586dcf8b3b0b999361a44ff2c22c2abbef42dd24eabe6723346a6e46c0499a21442d8d00dcb57f013ff7595edd0ff076930de3675d34117a44eb0e4f832936da44e") r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={"6e72300100", 0x801}) ioctl$TUNSETLINK(r1, 0x400454cd, 0x308) r2 = getpid() perf_event_open(&(0x7f0000000540)={0x0, 0x70, 0xf2, 0x4, 0x400, 0xadb0, 0x0, 0x0, 0x40000001110, 0x0, 0x2, 0x0, 0x0, 0x7, 0x5, 0x3, 0x401, 0x1, 0x5, 0x401, 0xce4, 0x87b, 0x3, 0x2, 0x9212, 0x0, 0x4, 0x40, 0x7ff, 0x100000001, 0x0, 0x6, 0x80000000, 0x6, 0xd7, 0x4, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={&(0x7f0000000500), 0xa}, 0x404c, 0x0, 0xffffffffffffffff}, r2, 0x9, 0xffffffffffffffff, 0xa) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='memory.stat\x00', 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000200)=@ax25={0x3, {"b8738e610d62ed"}}, 0x80, &(0x7f0000000040)}, 0x0) socket$kcm(0x29, 0x2, 0x0) 21:46:49 executing program 2: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) sendmsg$IPVS_CMD_DEL_DEST(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000040), 0xc, &(0x7f0000000240)={&(0x7f0000000180)={0x14}, 0x14}}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000ab9ff0)={0x2, &(0x7f000039a000)=[{0x20, 0x0, 0x0, 0xfffffffffffff00c}, {0x6}]}, 0x10) sendmmsg(r0, &(0x7f0000000040), 0x324fad809d5a9cf, 0x0) 21:46:50 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='io\x00') preadv(r0, &(0x7f0000000480), 0x100000000000022c, 0x0) 21:46:50 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='oom_score_adj\x00') ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r0, 0x40046207, 0x0) request_key(&(0x7f0000000240)='pkcs7_test\x00', &(0x7f0000000280)={'syz', 0x0}, &(0x7f0000000300)='/\x00', 0xfffffffffffffffe) request_key(&(0x7f00000000c0)='user\x00', &(0x7f0000000100)={'syz'}, &(0x7f0000000200)='vmnet0&#selfbdev&vboxnet0trustedselfeth1#c(vmnet0c^\x00', 0x0) [ 383.122244] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. 21:46:50 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x12, 0x8, &(0x7f0000000140)=ANY=[@ANYBLOB="7a0af8ff00000000bfa100000000000007010000f8ffffffb702000008000000bd120000000000008500000006000000b7000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0xa}, 0x48) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000003c0), 0x4) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000640)={0xffffffffffffff9c, 0x10, &(0x7f0000000600)={&(0x7f0000000580)=""/78, 0x4e}}, 0x10) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00syz1\x00', 0x200002, 0x0) gettid() bpf$BPF_PROG_ATTACH(0x8, &(0x7f00000000c0)={r1, r0, 0xa}, 0x10) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000480)) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x9, 0x0, 0x100000001, 0x0, 0x400, 0x0, 0x64b, 0x0, 0x0, 0x0, 0x7, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TUNGETIFF(0xffffffffffffffff, 0x800454d2, &(0x7f0000000400)) close(0xffffffffffffffff) openat$cgroup_int(r2, &(0x7f00000004c0)="0300000021a200", 0x2, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000380)) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000340)={0xffffffffffffffff, 0x10, &(0x7f0000000300)={&(0x7f0000000240)=""/141, 0x8d, 0xffffffffffffffff}}, 0x10) 21:46:50 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='oom_score_adj\x00') accept4$packet(r0, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000040)=0x14, 0x800) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) ioctl$VHOST_SET_VRING_ADDR(r0, 0x4028af11, &(0x7f0000000440)={0x3, 0x0, &(0x7f0000000340)=""/243, &(0x7f0000000140)=""/142, &(0x7f0000000080)=""/8, 0xf000}) request_key(&(0x7f0000000240)='pkcs7_test\x00', &(0x7f0000000280)={'syz', 0x0}, &(0x7f0000000300)='/\x00', 0xfffffffffffffffe) ioctl$EVIOCSABS0(r0, 0x401845c0, &(0x7f0000000540)={0x6, 0x6, 0x1000, 0x5, 0x1, 0x80000000}) request_key(&(0x7f00000000c0)='user\x00', &(0x7f0000000100)={'syz'}, &(0x7f0000000200)='vmnet0&#selfbdev&vboxnet0trustedselfeth1#c(vmnet0c^\x00', 0x0) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f0000000480)={0x3, 0xffffffff00000001, 0x4, 0x1, 0x2, [{0xffffffffffff0000, 0x66de, 0x7ff}, {0x8, 0x1, 0x2, 0x0, 0x0, 0x2000}]}) 21:46:50 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='io\x00') preadv(r0, &(0x7f0000000480), 0x100000000000022c, 0x0) [ 383.306194] device nr0 entered promiscuous mode 21:46:50 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000480)="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") ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x8c5a3) request_key(&(0x7f0000000240)='pkcs7_test\x00', &(0x7f0000000280)={'syz', 0x0}, &(0x7f0000000300)='/\x00', 0xfffffffffffffffe) request_key(&(0x7f00000000c0)='user\x00', &(0x7f0000000100)={'syz'}, &(0x7f0000000200)='vmnet0&#selfbdev&vboxnet0trustedselfeth1#c(vmnet0c^\x00', 0x0) 21:46:50 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000080)='tunl0\x00', 0x27d) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1}, 0x10) r1 = socket$inet6(0xa, 0x80003, 0x4) ioctl(r1, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) 21:46:50 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x12, 0x8, &(0x7f0000000140)=ANY=[@ANYBLOB="7a0af8ff00000000bfa100000000000007010000f8ffffffb702000008000000bd120000000000008500000006000000b7000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0xa}, 0x48) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000003c0), 0x4) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000640)={0xffffffffffffff9c, 0x10, &(0x7f0000000600)={&(0x7f0000000580)=""/78, 0x4e}}, 0x10) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00syz1\x00', 0x200002, 0x0) gettid() bpf$BPF_PROG_ATTACH(0x8, &(0x7f00000000c0)={r1, r0, 0xa}, 0x10) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000480)) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x9, 0x0, 0x100000001, 0x0, 0x400, 0x0, 0x64b, 0x0, 0x0, 0x0, 0x7, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TUNGETIFF(0xffffffffffffffff, 0x800454d2, &(0x7f0000000400)) close(0xffffffffffffffff) openat$cgroup_int(0xffffffffffffffff, &(0x7f00000004c0)="0300000021a200", 0x2, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000380)) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000340)={0xffffffffffffffff, 0x10, &(0x7f0000000300)={&(0x7f0000000240)=""/141, 0x8d, 0xffffffffffffffff}}, 0x10) 21:46:50 executing program 5: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x100000c7, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='io\x00') preadv(r0, &(0x7f0000000480), 0x100000000000022c, 0x0) 21:46:50 executing program 2: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) sendmsg$IPVS_CMD_DEL_DEST(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000040), 0xc, &(0x7f0000000240)={&(0x7f0000000180)={0x14}, 0x14}}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000ab9ff0)={0x2, &(0x7f000039a000)=[{0x20, 0x0, 0x0, 0xfffffffffffff00c}, {0x6}]}, 0x10) sendmmsg(r1, &(0x7f0000000040), 0x324fad809d5a9cf, 0x0) 21:46:50 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f00000004c0)="9d258bebc9cebebf5eac6f0600000000000000c9f55dd06625db3e2a5daf4461a7deb6d4a4be40f81c8cee781c050032b9acb352f5ad447fdd24") ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) request_key(&(0x7f0000000240)='pkcs7_test\x00', &(0x7f0000000280)={'syz', 0x3}, &(0x7f0000000340)="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", 0xfffffffffffffffe) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) write$UHID_INPUT2(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="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"], 0x1006) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) close(r2) write$UHID_INPUT(r0, &(0x7f0000001540)={0x8, "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", 0x1000}, 0x1006) ioctl$TUNGETIFF(r0, 0x800454d2, &(0x7f0000000200)) setsockopt$inet6_mtu(r0, 0x29, 0x17, &(0x7f0000000080), 0x4) ioctl$TUNGETIFF(r0, 0x800454d2, &(0x7f00000001c0)) openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) socketpair(0xb, 0xa, 0x7, &(0x7f0000000000)) syz_kvm_setup_cpu$x86(r2, r3, &(0x7f000001e000/0x18000)=nil, &(0x7f0000000100)=[@text32={0x20, &(0x7f0000000140)="b805000700b9008000000f01c1f080a4b000600000000fc3180f09c744240000000000c744240200080000c7442406000000000f0114240f08f3a5650f050f20da0f01cf", 0x44}], 0x1, 0x0, &(0x7f0000000380), 0x78) request_key(&(0x7f0000000300)='user\x00', &(0x7f0000000100)={'syz'}, &(0x7f00000002c0)='vmnet0&#selfbdev&vboxnet0trustedselfeth1#c(vmnet0c^\x00', 0x0) 21:46:50 executing program 4: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) socket$kcm(0x2, 0x3, 0x2) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0x50, &(0x7f0000000480)}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f0000000380)="6e7230010060a19ef9d2c623d9a1571cb9e1369bcd61ef7e49793ae18712eceb1daa769497800b7fbbd35b170c10751d39aeb660d863e49b8c4f3b3cad48902b5b2d6cfd0abd372c63bcf5d70df3fd4d2e8d443c88c60fd7140fbc0e5637dd82fc3435bed4de5d693c9a781c863e05d8a6f8689a5be29216061f3ff53f8b6b396678e7ba155ef9152d7e43b1eccb2331eb8eb1ed5586dcf8b3b0b999361a44ff2c22c2abbef42dd24eabe6723346a6e46c0499a21442d8d00dcb57f013ff7595edd0ff076930de3675d34117a44eb0e4f832936da44e") r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={"6e72300100", 0x801}) ioctl$TUNSETLINK(r1, 0x400454cd, 0x308) r2 = getpid() perf_event_open(&(0x7f0000000540)={0x0, 0x70, 0xf2, 0x4, 0x400, 0xadb0, 0x0, 0x0, 0x40000001110, 0x0, 0x2, 0x0, 0x0, 0x7, 0x5, 0x3, 0x401, 0x1, 0x5, 0x401, 0xce4, 0x87b, 0x3, 0x2, 0x9212, 0x0, 0x4, 0x40, 0x7ff, 0x100000001, 0x0, 0x6, 0x80000000, 0x6, 0xd7, 0x4, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={&(0x7f0000000500), 0xa}, 0x404c, 0x0, 0xffffffffffffffff}, r2, 0x9, 0xffffffffffffffff, 0xa) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='memory.stat\x00', 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000200)=@ax25={0x3, {"b8738e610d62ed"}}, 0x80, &(0x7f0000000040)}, 0x0) socket$kcm(0x29, 0x2, 0x0) 21:46:50 executing program 5: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x100000c7, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='io\x00') preadv(r0, &(0x7f0000000480), 0x100000000000022c, 0x0) 21:46:50 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f00000000c0)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$inet_tcp_int(r1, 0x6, 0x20000000000a, &(0x7f00000001c0)=0xcba8, 0x4) sendto$inet(r1, &(0x7f0000a88f88), 0xfffffffffffffea0, 0x20000800, &(0x7f0000e68000)={0x2, 0x4e23}, 0x10) setsockopt$inet6_tcp_int(r1, 0x6, 0xa, &(0x7f0000000000)=0x29a, 0x4) readv(r1, &(0x7f0000000100)=[{&(0x7f00000018c0)=""/177, 0x33}], 0x1) [ 384.054021] device nr0 entered promiscuous mode 21:46:51 executing program 5: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x100000c7, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='io\x00') preadv(r0, &(0x7f0000000480), 0x100000000000022c, 0x0) 21:46:51 executing program 2: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) sendmsg$IPVS_CMD_DEL_DEST(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000040), 0xc, &(0x7f0000000240)={&(0x7f0000000180)={0x14}, 0x14}}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000ab9ff0)={0x2, &(0x7f000039a000)=[{0x20, 0x0, 0x0, 0xfffffffffffff00c}, {0x6}]}, 0x10) sendmmsg(r1, &(0x7f0000000040), 0x324fad809d5a9cf, 0x0) 21:46:51 executing program 5: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x100000c7, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='io\x00') preadv(r0, &(0x7f0000000480), 0x100000000000022c, 0x0) 21:46:51 executing program 5: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x100000c7, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='io\x00') preadv(r0, &(0x7f0000000480), 0x100000000000022c, 0x0) 21:46:52 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000080)='tunl0\x00', 0x27d) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1}, 0x10) r1 = socket$inet6(0xa, 0x80003, 0x4) ioctl(r1, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) 21:46:52 executing program 5: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x100000c7, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='io\x00') preadv(r0, &(0x7f0000000480), 0x100000000000022c, 0x0) 21:46:52 executing program 2: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) sendmsg$IPVS_CMD_DEL_DEST(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000040), 0xc, &(0x7f0000000240)={&(0x7f0000000180)={0x14}, 0x14}}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000ab9ff0)={0x2, &(0x7f000039a000)=[{0x20, 0x0, 0x0, 0xfffffffffffff00c}, {0x6}]}, 0x10) sendmmsg(r1, &(0x7f0000000040), 0x324fad809d5a9cf, 0x0) 21:46:52 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r1, &(0x7f0000000040)={&(0x7f0000000140)=@alg, 0x80, &(0x7f0000000300), 0x0, &(0x7f00000007c0)=""/22, 0x16}, 0x0) sendmsg(r0, &(0x7f0000000000)={&(0x7f00000001c0)=@un=@abs, 0x80, &(0x7f00000000c0), 0x0, &(0x7f0000000080)=[{0x18, 0x1, 0x1, "01"}], 0x18}, 0x0) 21:46:52 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='oom_score_adj\x00') ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) getsockopt$bt_BT_SNDMTU(r0, 0x112, 0xc, &(0x7f0000000240)=0x5, &(0x7f0000000280)=0x2) r1 = request_key(&(0x7f0000000080)='id_legacy\x00', &(0x7f00000001c0)={'syz', 0x0}, &(0x7f0000003580)='vmnet0\x00', 0xfffffffffffffff8) r2 = request_key(&(0x7f0000003600)="706b6373375f746573740046079b7b3abdd5892a3f2f9a8a532537a9142b31c34c374487aa20fe37940ed500bccd240e53c817b3", &(0x7f00000035c0)={'syz', 0x0}, &(0x7f0000000300)='/\x00', r1) request_key(&(0x7f00000000c0)='user\x00', &(0x7f0000000100)={'syz'}, &(0x7f0000000200)='vmnet0&#selfbdev&vboxnet0trustedselfeth1#c(vmnet0c^\x00', 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_PORT_INFO(r0, 0xc0a85322, &(0x7f00000034c0)) keyctl$instantiate_iov(0x14, r2, &(0x7f0000003440)=[{&(0x7f0000000000)="a42997683c84cb0b32d95df4d31141fd3aa09c964798564bff3e1fffded85c9632a2928253d774e60b337c6d031129fad91be893267ef61f2c2da690a221737cd68dba60a52fc6d2eb7eb29f4c4e09f0512418859bbc235053a6b3354bf4a5450b4f33bcc82461a92cf2d52a70ef2ecd", 0x70}, {&(0x7f0000000140)="ef50f1675be37beb52c038e664a8da9cc671ef91113a37dc1b266b004e652a202e34f73a2552ed409d0605478c324f2cdcb1af5645ce03fec7eeaff0932da481568a5c7c4f2e78918e11914dd813fcd84c39a9972a8a747ac4e1069bcbc4b247ff75f6f3e17d224ed4f527afa5df9bda44fafe3b536481b3ffc9adf5", 0x7c}, {&(0x7f0000000340)="bd2e0e7b7c7ecc1bfbda6eaa66fa352be95b09e96cfdec05f611d0ddfc1cb378a79fea7eb26abadf75109a067924f16e5432a1285a37ef8b2cfc9a6b82b70ce0491e89bac5d465d9191c260ad7c6507745ad7f668c941b6f81627529722f6896d8714f51558f3e95b4c6355f62169839cab003d315a3d840eda267d77e899194af1d754df92a407e87cfc8fb3dd7e4b9864e18b6d34cb867f1102a396255e3b9d43094f0e83105681aa03775dea8d38378a4ae87856ed203ae6cec4dd396ce40b23eb92867c5e309ee3fe35e22dee30f3c6ab96c47bed8be5c1c3e5fe86a8865e024ec12da199d0a0e38fba4bf4b96fe6d5877", 0xf3}, {&(0x7f0000000440)="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", 0x1000}, {&(0x7f0000001440)="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", 0x1000}, {&(0x7f0000002440)="c25a1bd36bdf622f9fccfa160d773e4e1475fb7fc8998cddbd0901615948e6cc9cfb9ff56c0160afdb410c996cacf8e32a0f432548c6dab97ed3021cb689a784aad31bbda9f12c541b39e1d0afed7b589e05aac88fe565b7c7c4dd723361dede49fd7fde3228e1170c148cc3a2b8ae7df9a3deaa6b2d644c93a3873af5375fe526318e3ce963273c0089009ad31186d56b46822f2f6dd1790077cfb19049bd1d739ed651bbef8ae3e2dec5a25de17cac15e290437d446803cc0f577e3b4db0daf1172ac6a2156965005f43627bd577ef6bb2138aff37090338ff5b6c7bc7a66777b2ecb85e68adfabe99f50f0a6e90201781942e123a69bd62caed71070ce8412e464fda68077fcd8c8cdf93b19908f73fe23861bb150ac3944bb3bfe05c89a5c6d0a44cf7d5c833c3dbd3c19785ccd8cb11f7385f25c9abc72654fb9919b0a54e76ac4bba4aee5852019f82186b4afe8992ee8174431702fcba4dc8fb247ba0f2293d6b2fa4034b4ed2d7c5ac75c9c409449c01775eda4aabcdc4d26e1b1b9d4ed8484f8f7705261fc019d74dc96708ffbac3ae5a7ed3e363ab58085f3ac37e47f964dd1784bf3a8d862f44b3298dbdc7c1279c20302bbd05a217c35a5d6b8a56dbb12cbc6232fdd65fcbe45f31bac820d8403ac6dd86fe701e89341ea134954a618b4f40736e0f793da4456a6167c4a060d3806d3571be144f9ed8d220d3d3f45a9946df3d742427de751b9e5d59ce7e8dac65f43b27981dd9bc014899c216c5cab43b593d5e27bc8d0db1acbf797df652a1e9290cd27703163496f39a58e8c0dabc746e5cb0214b3f244b6d89e54819d479d1eb727cfce3290734adab250d58a4665960d672b7cff6d15a3f39729015eea80504bb82c0554f34300d924165c0a9390903d80eb58bb767317e67fe45ac91fe9115693083f921ddcf60f44d11db1b786da087d2ee1d457c08f6db936184f2c2f3c37d3b87fe6bf963a59207d7ba479f5ac5014738d19265ba7c09db652d34851c5921aec5a15e9ac01cbf16e0f9af142a9dee19878871b95d45a4769fdccd91babd12ed6f8649ee348f287fdb6277b18f70f818539ddaf2fbba4fcce9b6849d168b484141347e5cb1694f374be6a8534f7b5ea127f8603c37d6c0892dc9d855b3726341962617f988795327f030e30aff51d7079111f8263f0483ba70695408cfaed81a13ec38b02c5755ca138f69afe2d86b400988c2bcb9cdb6a265ef9006226e6b99070382b6b1b6c8df3961ba3aa0dbccef459c2811cbb6d96b0d77b8e2982fcc84d5dbdfb3004a2f0d4dbc59ddb8db04c1838499a4f63aabf2d7a4c99cecb1b789cfa86a0d772c717b868ac15df197c6c88a5ad530a6d86f57111b574817b99f4bf2069664d4d598a6293e768314935e47ce86ba35e78a83c7169bbd5d6fa971d27d33e17a19980822be9940aaa83f7d4c7af6b68da25d1de5469c8a13d1bf9bb51ef5b59e4c5926d922c567b05979bd4618a1ff63bce32317572426e21a2c025c114681945ad90b56d48f54289627e172bad4ca5d64e9e017c85004637835c2951be1afd1f95fd857afca039be80d23fc41f262544f89b12449a03bcea31e00045de245c4055290cd6830a3cc6060cd925694103462713046d68c02a363acae44f25cd1be04660fc22be7342c50f5e0eecf15ff2b208a2f772622362ac92b5700a4ac8ccd52a160b84b7b0a22fdc3236f59c579c54cb09f02917433c762ad1a871eda8e063e391ad518bb54604befc854d7aa6dc7e23cd4de52bb3c07997ec4e141f0648996dcd894a231132bfdf77b5fefc3afea70f42c6aa7b15b346d267a044be5ef19333565f4a08d3ce5d9d306d486b05b6f1a55348b07574a84097b2882e7763bc07f7cf904110639508008468ae583ffdfdaff4faa32a1200fe5a91451f803c3ffec8c68bb7a3f0293d3704e1633f6d3ab8b482bc20d33681926304e6431c04f13bd9ec1fd0af1f48a4a01bf27fcbe1e7d9bc5dbbd964186573fc3a163b86d8e98adb6992076b99702f53bb33f55ea8310c388217f2c80f004db290ff4db08c52c83755443068fd11903346b61896768459b0844c6a8dc812c91695d2b72dc7b2b7c1590d9634baed3a22e9c5f2447eb5abc18a4284cd09ded8f18739d2fb65d6e121149229aac98f4e29e3f4766db955ac341cfaf396cce00dcb5814b085ad02716e270b2f5680f4dcc34ef045f211696f1a28d770ff7d6539e791ef9da1c142f45b2fc5ec97ddb5f1768c3f608a1ac234b0243109fcf64a8f9f1dbc4bdc7fd1978e3220e44724cc94e63f58e47ae91665d0a71af580453d3526f266c0be8942004b2224e8774e3c292e377660630230cf7e1b6192130d40eb74c5ed16e7e537956a61baf4deb6a1c7e21355c3883caf2828dcd62717a1c0f37b7d1cf2004bb7c6f9cdfd04a2f1cd811fe2651e63d5d15b634999de4425e75370338c843cf2b6d982bd5adf64ca9e28d5efbb3c08210de9dac5b666565ee128050728ebcf605efc0cbdad01080fdeee26f0743b32fe17df841897044d0d7611f3a9ee4f3f2a9e7fc24fa1b2b438fcbc30025da1082201dd7b6e40126292f71fae6bc0ddeee2754cf0c77a5326457214266cef6a348e4f66b19904e19058575dedc4905e66d2a42002397e642b2fa62a07551ca876db16e0da44ec9bfa0a7baefc968407437c8c59cc3fe123d94e92da65943ac1c6658ae76393d29a6d2f8ed3dba665edd41f1a288f0e5c7205a805417fdd744546e5e2e79a6514d506efb50c693722e60fc83b77fea4948a1730ef08086cd04c5f4af47c59b5eed03b24942096063571135511bb47732a38fd9cca876f72b3587624cc63373e96cef7da3e8a52ec2b4204e1bbd9437cdd21ffc67e34d3490c8783f06c978e14b07510084d817f263e24b785c65f24d85900016e9da968a9b284c5c3844f040eaa3f8ad702134202b97b68cae9c32688f484cd5fcd2a09645e154ca49e46c7434c476cf51e73ab604fead01b6f608b53b2bfbb2fa68131e24b0e07bc7ee84d0d3d05210b2d71721c05a255894c8507d564332ceed73eedecec7618acdba67293a0e0913e888a6c5521ec931969d61729807a78132105500b16fff89653ca5cb01849784037a46f2c2950b5287d6119bb495c09c384ab3bb21b9ddf162e0c1f19aa24df547615fa6f3d9ed5a14b4f9e7eae661e674db2680c76988354248fc6a9153d463e783f5d4c899b3dadba36d4e233758599a2209db8afb38eb419d4b62993f4d3c0c9f9b1e03b1cc34bb766557b296376dd896d73e434a1fa88e12998ceb6ad35e8b21decf53dff778cad070c5eee1efa18ffd7f30d4eb1ac66a4c498ecef5ad3be77d23132402d75ab909b04744444573bd345741f9b72e8f7faf38922680fbd2131aa3b10218a38963c4127febfe14e2dc76d73cfcd1dd45756c7e357e7d6d6240e759abecadb689df9cc6dfcf6d7261342aef75bbf666ae2802b7f2c1b20d2cf610ed9f0598dc2acc65603db1433791e6a4ef98bd4902bdc0947b60657335685628141bfc96f0a6b6ffa4c003d7363622edbaa353104046088bed371090b95ad3b2968ddea4ab7ad7ca39e132b1ae54b7ff81cc191d0812085549be9c73a554aa60b57b0aebf7bba3c08894aa3ab25b2c8c256923c9a67c7c8012c444b54980afe1f63a96558071c34289cc2f7a439f0701180904da41433ffd445a32dd5e938a342c42e5f43a3583ff831761eef1151e34b1b4db9d41de2332ebfc4f9545c94cd526bb2344308af472fcbe232696e5adaaa53eda4f74dbce5304fd22e4ab8503119703d4b25d8ce2a8d40e7dcb526934e07d9f8d4077ff6e4c10fba4453cc4496fe1f37469f81ca430b8f31dbc6408940a2e114fe613a4185035330d0453ea68fec5b0f2e2a197851012d2a3984222db4507e2e35e21be601e29dece0cea1ebfc9b30cc11d41d6e36afd863fb712eb6a29b348fcde2e10b77d953b66c936b2cffef14361256f8fe91af1fd535d10dd9e5d1bd735e8dc5a9c65b12237f72ff9bc8c3319431023bb307567fcaba69cbe5cd662bda31f8ac2bac0ac1b2003de2b23fcd6e1a3b8b51de7ac4c67918a37f8b69310b73d1de07bd3cf621c56ae2afeb5ba53b566a7d1fc54898a9d9286021d6023146a0543edbe9c8efee728f68522068b79f81ed1c73eac3e18f3de12853a8382416befee79c8d82b37a3032b0639e658f3a2a1649a31091f945540e9b9faf9a0b0daaba2f877cbdcc3de73188f782237bb3129f26f76682bcf213122e63060403bc181d02817030446914f11fa820935f1f38f99e8005a26fef84b416e1f49ae3e6f0327cb69d99b5cbf384de409fc58c8b8e0d908fa7617ba477e9d5a1d56be96af8d64e22f24647a567188c56705b279186d268e93594025b5f96d2e52e7772f872983562c461ead788d64007070f26340624e99628cf3a1deccce58962aa5c9f0feabcabd72306ae8db37dee1586c0f1aa235d9833c5b640c57080a578bdb23767e0c244d7d664ece53dc06b2ff565daac085b5b101265a2e626b958c241e957dd36015063cf0994bd03ca60f6fafc527602924fdc85b429891f540256e970cce3fe342be63f51be3eb85b305d01f5bd41fdb2cece9c89ae6040afd3c22c77696809ece3dca6d28f205dda7e941f8430f74de5c0ac0d812c35ca27a2f6387d57e340799564c6b21a23e8806b78e2ba1b2d8fb436f9a918e797c9d5578132a69179ef37d214bac4ac84bd287c31b1c6e89912ffb684036361eeeb3aba0ad0c955c768fe4eeb2831ff3c2e38ced1b9b83f0a56a5a3a9744a5ec2f9f506b99233a5f1f905f50df222e08a8028127941ce82b156e3bb3d8642dbe45ec147d3f744344027f8f75e8ee7d9b048602c6e3bef46687a2c755c3e563fa75ef9a6388611401c94a486f71ad417a324097b989fa003836897dfcb288572ad607355da37f67024440a5f7cc2a779847bcf4f5dfc24c727611e09748ed93ae6aeea21328e48a61180c9ac97ae8b0c3dc8a2c04c79cc0946747dd7a7ce26007058b172a6c836332feeda73436f77c16ee63dc6187562a77e2ce38a276e1c1628cf782ff573e054d55d0720f4c5d6f01920b1677b0cf5b930a0e6ae54c1acd7cea3202e70356ddf059ba46ff6c86c8862fe936b5d69e0025f65e8f3f15b07b6a353002d69c5a0a871770d433d5f403dd3914a84cc462dc1a38278bd5689969ada50220d7e62bcb768ff79e5f1852ba9f460a531a30b88cb16a9112e9b60ea3770832d8ea3d13461de9decf0e74705df05e765f0b56eca2765063acd463138c0e498bd6c15e52ebfee40147f02d1d713361b4e98dc9b29a09371ec4e1533036cfa151137fd00239cb7f9b5f5dfd96bce68a71a0a26a868e4ae7cdbe9bf0d416122f721650225c1994f57d4e196a152e3144ab9a87da31aac35b22ea6f8f78900d0c2f884bf99425695a258d9c9791c4ace73ffc531eb313242882bc5cd7e743740b9047393f2765dc31d84c3453750dd359921b43e0466652cfb5c407d87f4a2428a918993cab1d342c8fb5dcaa3753b9f33be891013e0de3825be06ec4636e7f7b8e8dbb772d797b0eb648d681b261b57f2cc63cf455b45da58b5fdf964f70a952f2ab0127c51502404e7fc46cd502655a9520f485c103eb8843186652195d8d8fafe2f92f914bc106afb38cf7911c3411cab26bdd477e006d1fb41f545adbb61f763228020df79d88c794add0d0cb3a55a417f73ec468c06e46f02342619032d525d4", 0x1000}], 0x6, r2) 21:46:52 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x100000c7, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='io\x00') preadv(r0, &(0x7f0000000480), 0x100000000000022c, 0x0) 21:46:52 executing program 4: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) socket$kcm(0x2, 0x3, 0x2) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0x50, &(0x7f0000000480)}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f0000000380)="6e7230010060a19ef9d2c623d9a1571cb9e1369bcd61ef7e49793ae18712eceb1daa769497800b7fbbd35b170c10751d39aeb660d863e49b8c4f3b3cad48902b5b2d6cfd0abd372c63bcf5d70df3fd4d2e8d443c88c60fd7140fbc0e5637dd82fc3435bed4de5d693c9a781c863e05d8a6f8689a5be29216061f3ff53f8b6b396678e7ba155ef9152d7e43b1eccb2331eb8eb1ed5586dcf8b3b0b999361a44ff2c22c2abbef42dd24eabe6723346a6e46c0499a21442d8d00dcb57f013ff7595edd0ff076930de3675d34117a44eb0e4f832936da44e") r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={"6e72300100", 0x801}) ioctl$TUNSETLINK(r1, 0x400454cd, 0x308) r2 = getpid() perf_event_open(&(0x7f0000000540)={0x0, 0x70, 0xf2, 0x4, 0x400, 0xadb0, 0x0, 0x0, 0x40000001110, 0x0, 0x2, 0x0, 0x0, 0x7, 0x5, 0x3, 0x401, 0x1, 0x5, 0x401, 0xce4, 0x87b, 0x3, 0x2, 0x9212, 0x0, 0x4, 0x40, 0x7ff, 0x100000001, 0x0, 0x6, 0x80000000, 0x6, 0xd7, 0x4, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={&(0x7f0000000500), 0xa}, 0x404c, 0x0, 0xffffffffffffffff}, r2, 0x9, 0xffffffffffffffff, 0xa) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='memory.stat\x00', 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000200)=@ax25={0x3, {"b8738e610d62ed"}}, 0x80, &(0x7f0000000040)}, 0x0) socket$kcm(0x29, 0x2, 0x0) 21:46:52 executing program 1: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040)={0x0}, &(0x7f00000000c0)=0xc) syz_open_procfs(r0, &(0x7f0000000100)='attr/keycreate\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000080)={@multicast2, @remote, @loopback}, 0xc) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x100000c7, 0x0) r1 = syz_open_procfs(r0, &(0x7f00000002c0)='attr/keycreate\x00') preadv(r1, &(0x7f0000000480), 0x100000000000022c, 0x6c00000000000000) 21:46:52 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) sendmsg$IPVS_CMD_DEL_DEST(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000040), 0xc, &(0x7f0000000240)={&(0x7f0000000180)={0x14}, 0x14}}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000ab9ff0)={0x2, &(0x7f000039a000)=[{0x20, 0x0, 0x0, 0xfffffffffffff00c}, {0x6}]}, 0x10) sendmmsg(r0, &(0x7f0000000040), 0x324fad809d5a9cf, 0x0) 21:46:52 executing program 3: syz_open_procfs(0x0, &(0x7f00000002c0)='oom_score_adj\x00') openat$apparmor_task_current(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/attr/current\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) request_key(&(0x7f0000000240)='pkcs7_test\x00', &(0x7f0000000280)={'syz', 0x0}, &(0x7f0000000300)='/\x00', 0xfffffffffffffffe) delete_module(&(0x7f0000000040)='^+(%\x00', 0x0) openat$apparmor_task_current(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/attr/current\x00', 0x2, 0x0) request_key(&(0x7f00000000c0)='user\x00', &(0x7f0000000100)={'syz'}, &(0x7f0000000200)='vmnet0&#selfbdev&vboxnet0trustedselfeth1#c(vmnet0c^\x00', 0x0) 21:46:52 executing program 1: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x100000c7, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/psched\x00') preadv(r0, &(0x7f0000000480), 0x100000000000022c, 0x0) [ 385.789842] device nr0 entered promiscuous mode 21:46:52 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x100000c7, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='io\x00') preadv(r0, &(0x7f0000000480), 0x100000000000022c, 0x0) 21:46:53 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000080)='tunl0\x00', 0x27d) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1}, 0x10) r1 = socket$inet6(0xa, 0x80003, 0x4) ioctl(r1, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) 21:46:53 executing program 1: 21:46:53 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='oom_score_adj\x00') getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r0, 0x84, 0x1a, &(0x7f00000004c0)=ANY=[@ANYRES32=0x0, @ANYBLOB="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"], &(0x7f0000000040)=0x9a) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f0000000340)={r1, @in={{0x2, 0x4e22}}}, &(0x7f0000000080)=0x84) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000480)='IPVS\x00') request_key(&(0x7f0000000240)='pkcs7_test\x00', &(0x7f0000000280)={'syz', 0x0}, &(0x7f0000000300)='/\x00', 0xfffffffffffffffe) r2 = request_key(&(0x7f00000000c0)='user\x00', &(0x7f0000000100)={'syz'}, &(0x7f0000000200)='vmnet0&#selfbdev&vboxnet0trustedselfeth1#c(vmnet0c^\x00', 0x0) ioctl$TIOCSCTTY(r0, 0x540e, 0x6) request_key(&(0x7f00000002c0)='rxrpc\x00', &(0x7f0000000400)={'syz', 0x1}, &(0x7f0000000440)='.,\x00', r2) 21:46:53 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x100000c7, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='io\x00') preadv(r0, &(0x7f0000000480), 0x100000000000022c, 0x0) 21:46:53 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) sendmsg$IPVS_CMD_DEL_DEST(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000040), 0xc, &(0x7f0000000240)={&(0x7f0000000180)={0x14}, 0x14}}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000ab9ff0)={0x2, &(0x7f000039a000)=[{0x20, 0x0, 0x0, 0xfffffffffffff00c}, {0x6}]}, 0x10) sendmmsg(r0, &(0x7f0000000040), 0x324fad809d5a9cf, 0x0) 21:46:53 executing program 4: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) socket$kcm(0x2, 0x3, 0x2) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0x50, &(0x7f0000000480)}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f0000000380)="6e7230010060a19ef9d2c623d9a1571cb9e1369bcd61ef7e49793ae18712eceb1daa769497800b7fbbd35b170c10751d39aeb660d863e49b8c4f3b3cad48902b5b2d6cfd0abd372c63bcf5d70df3fd4d2e8d443c88c60fd7140fbc0e5637dd82fc3435bed4de5d693c9a781c863e05d8a6f8689a5be29216061f3ff53f8b6b396678e7ba155ef9152d7e43b1eccb2331eb8eb1ed5586dcf8b3b0b999361a44ff2c22c2abbef42dd24eabe6723346a6e46c0499a21442d8d00dcb57f013ff7595edd0ff076930de3675d34117a44eb0e4f832936da44e") r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={"6e72300100", 0x801}) ioctl$TUNSETLINK(r1, 0x400454cd, 0x308) r2 = getpid() perf_event_open(&(0x7f0000000540)={0x0, 0x70, 0xf2, 0x4, 0x400, 0xadb0, 0x0, 0x0, 0x40000001110, 0x0, 0x2, 0x0, 0x0, 0x7, 0x5, 0x3, 0x401, 0x1, 0x5, 0x401, 0xce4, 0x87b, 0x3, 0x2, 0x9212, 0x0, 0x4, 0x40, 0x7ff, 0x100000001, 0x0, 0x6, 0x80000000, 0x6, 0xd7, 0x4, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={&(0x7f0000000500), 0xa}, 0x404c, 0x0, 0xffffffffffffffff}, r2, 0x9, 0xffffffffffffffff, 0xa) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='memory.stat\x00', 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000200)=@ax25={0x3, {"b8738e610d62ed"}}, 0x80, &(0x7f0000000040)}, 0x0) socket$kcm(0x29, 0x2, 0x0) 21:46:53 executing program 1: 21:46:53 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x100000c7, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='io\x00') preadv(r0, &(0x7f0000000480), 0x100000000000022c, 0x0) 21:46:53 executing program 3: r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080)='/dev/hwrng\x00', 0x127580, 0x0) write$P9_RLCREATE(r0, &(0x7f0000000040)={0x18, 0xf, 0x1, {{0x1, 0x0, 0x6}, 0x67}}, 0x18) syz_open_procfs(0x0, &(0x7f00000002c0)='oom_score_adj\x00') ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) request_key(&(0x7f0000000240)='pkcs7_test\x00', &(0x7f0000000280)={'syz', 0x0}, &(0x7f0000000300)='/\x00', 0xfffffffffffffffe) request_key(&(0x7f00000000c0)='user\x00', &(0x7f0000000100)={'syz'}, &(0x7f0000000200)='vmnet0&#selfbdev&vboxnet0trustedselfeth1#c(vmnet0c^\x00', 0x0) [ 386.421758] device nr0 entered promiscuous mode 21:46:53 executing program 1: 21:46:53 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) sendmsg$IPVS_CMD_DEL_DEST(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000040), 0xc, &(0x7f0000000240)={&(0x7f0000000180)={0x14}, 0x14}}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000ab9ff0)={0x2, &(0x7f000039a000)=[{0x20, 0x0, 0x0, 0xfffffffffffff00c}, {0x6}]}, 0x10) sendmmsg(r0, &(0x7f0000000040), 0x324fad809d5a9cf, 0x0) 21:46:53 executing program 3: 21:46:54 executing program 3: 21:46:54 executing program 1: 21:46:54 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380), 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='io\x00') preadv(r0, &(0x7f0000000480), 0x100000000000022c, 0x0) 21:46:54 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000080)='tunl0\x00', 0x27d) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1}, 0x10) r1 = socket$inet6(0xa, 0x80003, 0x4) ioctl(r1, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) 21:46:54 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x0) sendmsg$IPVS_CMD_DEL_DEST(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000040), 0xc, &(0x7f0000000240)={&(0x7f0000000180)={0x14}, 0x14}}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000ab9ff0)={0x2, &(0x7f000039a000)=[{0x20, 0x0, 0x0, 0xfffffffffffff00c}, {0x6}]}, 0x10) sendmmsg(r1, &(0x7f0000000040), 0x324fad809d5a9cf, 0x0) 21:46:54 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) socket$kcm(0x2, 0x3, 0x2) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0x50, &(0x7f0000000480)}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f0000000380)="6e7230010060a19ef9d2c623d9a1571cb9e1369bcd61ef7e49793ae18712eceb1daa769497800b7fbbd35b170c10751d39aeb660d863e49b8c4f3b3cad48902b5b2d6cfd0abd372c63bcf5d70df3fd4d2e8d443c88c60fd7140fbc0e5637dd82fc3435bed4de5d693c9a781c863e05d8a6f8689a5be29216061f3ff53f8b6b396678e7ba155ef9152d7e43b1eccb2331eb8eb1ed5586dcf8b3b0b999361a44ff2c22c2abbef42dd24eabe6723346a6e46c0499a21442d8d00dcb57f013ff7595edd0ff076930de3675d34117a44eb0e4f832936da44e") r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={"6e72300100", 0x801}) ioctl$TUNSETLINK(r1, 0x400454cd, 0x308) r2 = getpid() perf_event_open(&(0x7f0000000540)={0x0, 0x70, 0xf2, 0x4, 0x400, 0xadb0, 0x0, 0x0, 0x40000001110, 0x0, 0x2, 0x0, 0x0, 0x7, 0x5, 0x3, 0x401, 0x1, 0x5, 0x401, 0xce4, 0x87b, 0x3, 0x2, 0x9212, 0x0, 0x4, 0x40, 0x7ff, 0x100000001, 0x0, 0x6, 0x80000000, 0x6, 0xd7, 0x4, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={&(0x7f0000000500), 0xa}, 0x404c, 0x0, 0xffffffffffffffff}, r2, 0x9, 0xffffffffffffffff, 0xa) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='memory.stat\x00', 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000200)=@ax25={0x3, {"b8738e610d62ed"}}, 0x80, &(0x7f0000000040)}, 0x0) socket$kcm(0x29, 0x2, 0x0) 21:46:54 executing program 1: 21:46:54 executing program 3: 21:46:54 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380), 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='io\x00') preadv(r0, &(0x7f0000000480), 0x100000000000022c, 0x0) [ 387.318199] device nr0 entered promiscuous mode 21:46:54 executing program 1: 21:46:54 executing program 3: 21:46:54 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380), 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='io\x00') preadv(r0, &(0x7f0000000480), 0x100000000000022c, 0x0) 21:46:54 executing program 1: 21:46:54 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x0) sendmsg$IPVS_CMD_DEL_DEST(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000040), 0xc, &(0x7f0000000240)={&(0x7f0000000180)={0x14}, 0x14}}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000ab9ff0)={0x2, &(0x7f000039a000)=[{0x20, 0x0, 0x0, 0xfffffffffffff00c}, {0x6}]}, 0x10) sendmmsg(r1, &(0x7f0000000040), 0x324fad809d5a9cf, 0x0) 21:46:54 executing program 3: 21:46:54 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000080)='tunl0\x00', 0x27d) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1}, 0x10) socket$inet6(0xa, 0x80003, 0x4) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) 21:46:54 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x100000c7, 0x0) syz_open_procfs(0x0, &(0x7f0000000140)='io\x00') preadv(0xffffffffffffffff, &(0x7f0000000480), 0x100000000000022c, 0x0) 21:46:54 executing program 1: 21:46:54 executing program 3: 21:46:54 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x0) sendmsg$IPVS_CMD_DEL_DEST(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000040), 0xc, &(0x7f0000000240)={&(0x7f0000000180)={0x14}, 0x14}}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000ab9ff0)={0x2, &(0x7f000039a000)=[{0x20, 0x0, 0x0, 0xfffffffffffff00c}, {0x6}]}, 0x10) sendmmsg(r1, &(0x7f0000000040), 0x324fad809d5a9cf, 0x0) 21:46:54 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) socket$kcm(0x2, 0x3, 0x2) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0x50, &(0x7f0000000480)}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f0000000380)="6e7230010060a19ef9d2c623d9a1571cb9e1369bcd61ef7e49793ae18712eceb1daa769497800b7fbbd35b170c10751d39aeb660d863e49b8c4f3b3cad48902b5b2d6cfd0abd372c63bcf5d70df3fd4d2e8d443c88c60fd7140fbc0e5637dd82fc3435bed4de5d693c9a781c863e05d8a6f8689a5be29216061f3ff53f8b6b396678e7ba155ef9152d7e43b1eccb2331eb8eb1ed5586dcf8b3b0b999361a44ff2c22c2abbef42dd24eabe6723346a6e46c0499a21442d8d00dcb57f013ff7595edd0ff076930de3675d34117a44eb0e4f832936da44e") r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={"6e72300100", 0x801}) ioctl$TUNSETLINK(r1, 0x400454cd, 0x308) r2 = getpid() perf_event_open(&(0x7f0000000540)={0x0, 0x70, 0xf2, 0x4, 0x400, 0xadb0, 0x0, 0x0, 0x40000001110, 0x0, 0x2, 0x0, 0x0, 0x7, 0x5, 0x3, 0x401, 0x1, 0x5, 0x401, 0xce4, 0x87b, 0x3, 0x2, 0x9212, 0x0, 0x4, 0x40, 0x7ff, 0x100000001, 0x0, 0x6, 0x80000000, 0x6, 0xd7, 0x4, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={&(0x7f0000000500), 0xa}, 0x404c, 0x0, 0xffffffffffffffff}, r2, 0x9, 0xffffffffffffffff, 0xa) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='memory.stat\x00', 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000200)=@ax25={0x3, {"b8738e610d62ed"}}, 0x80, &(0x7f0000000040)}, 0x0) socket$kcm(0x29, 0x2, 0x0) 21:46:55 executing program 3: 21:46:55 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x100000c7, 0x0) syz_open_procfs(0x0, &(0x7f0000000140)='io\x00') preadv(0xffffffffffffffff, &(0x7f0000000480), 0x100000000000022c, 0x0) 21:46:55 executing program 1: 21:46:55 executing program 3: [ 388.242271] device nr0 entered promiscuous mode 21:46:55 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x100000c7, 0x0) syz_open_procfs(0x0, &(0x7f0000000140)='io\x00') preadv(0xffffffffffffffff, &(0x7f0000000480), 0x100000000000022c, 0x0) 21:46:55 executing program 3: 21:46:55 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000080)='tunl0\x00', 0x27d) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1}, 0x10) socket$inet6(0xa, 0x80003, 0x4) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) 21:46:55 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000002740)={0xa, 0x0, 0x0, @dev, 0x4}, 0x79) sendmmsg(r0, &(0x7f0000007e00), 0x136a88c8311572c, 0x11) 21:46:55 executing program 5: r0 = syz_open_dev$dri(&(0x7f0000000080)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r0, 0xc00c642e, &(0x7f0000000040)) 21:46:55 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) sendmsg$IPVS_CMD_DEL_DEST(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000040), 0xc, &(0x7f0000000240)={&(0x7f0000000180)={0x14}, 0x14}}, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000ab9ff0)={0x2, &(0x7f000039a000)=[{0x20, 0x0, 0x0, 0xfffffffffffff00c}, {0x6}]}, 0x10) sendmmsg(r1, &(0x7f0000000040), 0x324fad809d5a9cf, 0x0) 21:46:55 executing program 3: r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGLED(r0, 0x80404519, &(0x7f0000000100)=""/191) 21:46:56 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000002740)={0xa, 0x0, 0x0, @dev, 0x4}, 0x79) setsockopt$inet6_IPV6_PKTINFO(r0, 0x29, 0x32, &(0x7f0000000540)={@ipv4={[], [], @loopback}}, 0x14) 21:46:56 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) socket$kcm(0x2, 0x3, 0x2) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0x50, &(0x7f0000000480)}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f0000000380)="6e7230010060a19ef9d2c623d9a1571cb9e1369bcd61ef7e49793ae18712eceb1daa769497800b7fbbd35b170c10751d39aeb660d863e49b8c4f3b3cad48902b5b2d6cfd0abd372c63bcf5d70df3fd4d2e8d443c88c60fd7140fbc0e5637dd82fc3435bed4de5d693c9a781c863e05d8a6f8689a5be29216061f3ff53f8b6b396678e7ba155ef9152d7e43b1eccb2331eb8eb1ed5586dcf8b3b0b999361a44ff2c22c2abbef42dd24eabe6723346a6e46c0499a21442d8d00dcb57f013ff7595edd0ff076930de3675d34117a44eb0e4f832936da44e") r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={"6e72300100", 0x801}) ioctl$TUNSETLINK(r1, 0x400454cd, 0x308) r2 = getpid() perf_event_open(&(0x7f0000000540)={0x0, 0x70, 0xf2, 0x4, 0x400, 0xadb0, 0x0, 0x0, 0x40000001110, 0x0, 0x2, 0x0, 0x0, 0x7, 0x5, 0x3, 0x401, 0x1, 0x5, 0x401, 0xce4, 0x87b, 0x3, 0x2, 0x9212, 0x0, 0x4, 0x40, 0x7ff, 0x100000001, 0x0, 0x6, 0x80000000, 0x6, 0xd7, 0x4, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={&(0x7f0000000500), 0xa}, 0x404c, 0x0, 0xffffffffffffffff}, r2, 0x9, 0xffffffffffffffff, 0xa) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='memory.stat\x00', 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000200)=@ax25={0x3, {"b8738e610d62ed"}}, 0x80, &(0x7f0000000040)}, 0x0) socket$kcm(0x29, 0x2, 0x0) 21:46:56 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000300)='projid_map\x00') preadv(r0, &(0x7f00000000c0)=[{&(0x7f00000001c0)=""/158, 0x2c}], 0x1, 0x3) 21:46:56 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) sendmsg$IPVS_CMD_DEL_DEST(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000040), 0xc, &(0x7f0000000240)={&(0x7f0000000180)={0x14}, 0x14}}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000ab9ff0)={0x2, &(0x7f000039a000)=[{0x20, 0x0, 0x0, 0xfffffffffffff00c}, {0x6}]}, 0x10) sendmmsg(r1, &(0x7f0000000040), 0x324fad809d5a9cf, 0x0) 21:46:56 executing program 5: r0 = syz_open_dev$dri(&(0x7f0000000080)='/dev/dri/card#\x00', 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) pread64(r0, &(0x7f00000000c0)=""/165, 0xa5, 0x0) 21:46:56 executing program 3: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000000)='\v', 0x1) r2 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r2, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) connect$inet(r2, &(0x7f0000000040)={0x2, 0x0, @multicast2}, 0x10) splice(r0, 0x0, r2, 0x0, 0x3, 0x0) 21:46:56 executing program 1: pipe(&(0x7f00000007c0)={0xffffffffffffffff, 0xffffffffffffffff}) tee(r0, 0xffffffffffffffff, 0x8, 0x0) [ 389.668763] device nr0 entered promiscuous mode 21:46:56 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000080)='tunl0\x00', 0x27d) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1}, 0x10) socket$inet6(0xa, 0x80003, 0x4) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) 21:46:56 executing program 1: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xfffffef3) read(r0, &(0x7f0000000200)=""/250, 0x50c7e3e3) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001440)='cgroup.stat\x00', 0x0, 0x0) socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r3, 0x8946, &(0x7f00000001c0)={'ip6_vti0\x00', &(0x7f0000000140)=@ethtool_stats}) ioctl(r1, 0x8, &(0x7f0000000380)) connect$inet6(r2, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) ioctl$BLKROSET(r1, 0x125d, &(0x7f0000000380)=0x6) sendmmsg(r2, &(0x7f00000092c0), 0x4ff, 0x0) read$eventfd(0xffffffffffffffff, &(0x7f0000000180), 0x8) dup3(r3, r3, 0x80000) 21:46:56 executing program 3: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xfffffef3) read(r0, &(0x7f0000000200)=""/250, 0x50c7e3e3) setsockopt$ARPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x61, &(0x7f00000003c0)={'filter\x00', 0x4}, 0x68) r2 = socket$inet6(0xa, 0x2, 0x0) getsockopt$inet_opts(r0, 0x0, 0x0, &(0x7f0000000300)=""/111, &(0x7f0000000000)=0x6f) r3 = socket$netlink(0x10, 0x3, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001440)='cgroup.stat\x00', 0x0, 0x0) socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r3, 0x8946, &(0x7f00000001c0)={'ip6_vti0\x00', &(0x7f0000000140)=@ethtool_stats}) ioctl(r1, 0x8, &(0x7f0000000380)) connect$inet6(r2, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) ioctl$BLKROSET(r1, 0x125d, &(0x7f0000000380)=0x6) sendmmsg(r2, &(0x7f00000092c0), 0x4ff, 0x0) read$eventfd(0xffffffffffffffff, &(0x7f0000000180), 0x8) dup3(r3, r3, 0x80000) 21:46:57 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) socket$kcm(0x2, 0x3, 0x2) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0x50, &(0x7f0000000480)}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f0000000380)="6e7230010060a19ef9d2c623d9a1571cb9e1369bcd61ef7e49793ae18712eceb1daa769497800b7fbbd35b170c10751d39aeb660d863e49b8c4f3b3cad48902b5b2d6cfd0abd372c63bcf5d70df3fd4d2e8d443c88c60fd7140fbc0e5637dd82fc3435bed4de5d693c9a781c863e05d8a6f8689a5be29216061f3ff53f8b6b396678e7ba155ef9152d7e43b1eccb2331eb8eb1ed5586dcf8b3b0b999361a44ff2c22c2abbef42dd24eabe6723346a6e46c0499a21442d8d00dcb57f013ff7595edd0ff076930de3675d34117a44eb0e4f832936da44e") r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={"6e72300100", 0x801}) ioctl$TUNSETLINK(r1, 0x400454cd, 0x308) r2 = getpid() perf_event_open(&(0x7f0000000540)={0x0, 0x70, 0xf2, 0x4, 0x400, 0xadb0, 0x0, 0x0, 0x40000001110, 0x0, 0x2, 0x0, 0x0, 0x7, 0x5, 0x3, 0x401, 0x1, 0x5, 0x401, 0xce4, 0x87b, 0x3, 0x2, 0x9212, 0x0, 0x4, 0x40, 0x7ff, 0x100000001, 0x0, 0x6, 0x80000000, 0x6, 0xd7, 0x4, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={&(0x7f0000000500), 0xa}, 0x404c, 0x0, 0xffffffffffffffff}, r2, 0x9, 0xffffffffffffffff, 0xa) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='memory.stat\x00', 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000200)=@ax25={0x3, {"b8738e610d62ed"}}, 0x80, &(0x7f0000000040)}, 0x0) socket$kcm(0x29, 0x2, 0x0) [ 390.441475] device nr0 entered promiscuous mode 21:46:57 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) sendmsg$IPVS_CMD_DEL_DEST(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000040), 0xc, &(0x7f0000000240)={&(0x7f0000000180)={0x14}, 0x14}}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000ab9ff0)={0x1, &(0x7f000039a000)=[{0x20, 0x0, 0x0, 0xfffffffffffff00c}]}, 0x10) sendmmsg(r1, &(0x7f0000000040), 0x324fad809d5a9cf, 0x0) 21:46:57 executing program 5: r0 = socket$inet(0x2, 0x200000002, 0x88) bind$inet(r0, &(0x7f0000000000)={0x2, 0x24e21, @local}, 0x10) r1 = dup2(r0, r0) sendto$inet(r0, &(0x7f00000000c0), 0x0, 0x8000, &(0x7f0000000100)={0x2, 0x4e21}, 0x10) sendto$inet(r1, &(0x7f00000001c0), 0x0, 0x0, &(0x7f0000000200)={0x2, 0x0, @broadcast}, 0x10) 21:46:57 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000080)='tunl0\x00', 0x27d) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1}, 0x10) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) 21:46:57 executing program 3: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000700)='./bus\x00', 0x0) fcntl$setstatus(r1, 0x4, 0x6100) ftruncate(r1, 0x48204) r2 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) sendfile(r1, r2, &(0x7f0000d83ff8), 0x8000fffffffe) 21:46:57 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$inet_buf(r0, 0x0, 0x20, &(0x7f0000000080), 0x0) 21:46:57 executing program 5: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040), &(0x7f00000000c0)=0xc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x100000c7, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000280)='net/mcfilter\x00') preadv(r0, &(0x7f0000000480), 0x100000000000022c, 0x0) 21:46:57 executing program 1: ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000300)) creat(&(0x7f00000002c0)='./file0\x00', 0x8) unshare(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040)={0x0}, &(0x7f00000000c0)=0xc) syz_open_procfs(r0, &(0x7f0000000100)='attr/keycreate\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_mreqsrc(r1, 0x0, 0x27, &(0x7f0000000080)={@multicast2, @remote, @loopback}, 0xc) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x100000c7, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000280)='net/mcfilter\x00') fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000200)) preadv(r2, &(0x7f0000000480), 0x100000000000022c, 0x6c00000000000000) clock_gettime(0x0, &(0x7f0000000140)) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000240), &(0x7f00000002c0)=0xc) socket$nl_route(0x10, 0x3, 0x0) socket$inet(0x2, 0x0, 0x2) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000640), &(0x7f0000000680)=0xc) 21:46:57 executing program 3: syz_open_dev$binder(&(0x7f0000d59ff3)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) execveat(0xffffffffffffffff, &(0x7f0000000000)='\x00', &(0x7f00000001c0), &(0x7f00000001c0), 0x1000) add_key(&(0x7f0000000340)='asymmetric\x00', &(0x7f0000000380)={'syz'}, &(0x7f00000004c0), 0x0, 0xfffffffffffffffc) 21:46:57 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCFLSH(r0, 0x540b, 0x0) 21:46:57 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = perf_event_open(&(0x7f000025c000)={0x1, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$int_in(r1, 0x5452, &(0x7f0000000040)=0xe9) clone(0x0, &(0x7f0000000040), &(0x7f0000000100), &(0x7f0000000140), &(0x7f0000000180)) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 21:46:57 executing program 5: r0 = syz_open_dev$binder(&(0x7f0000d59ff3)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000200)={0x4, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="0f630c40"], 0x0, 0x0, &(0x7f0000000140)}) [ 391.124543] binder: 17802:17803 BC_CLEAR_DEATH_NOTIFICATION invalid ref 0 21:46:58 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) socket$kcm(0x2, 0x3, 0x2) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0x50, &(0x7f0000000480)}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f0000000380)="6e7230010060a19ef9d2c623d9a1571cb9e1369bcd61ef7e49793ae18712eceb1daa769497800b7fbbd35b170c10751d39aeb660d863e49b8c4f3b3cad48902b5b2d6cfd0abd372c63bcf5d70df3fd4d2e8d443c88c60fd7140fbc0e5637dd82fc3435bed4de5d693c9a781c863e05d8a6f8689a5be29216061f3ff53f8b6b396678e7ba155ef9152d7e43b1eccb2331eb8eb1ed5586dcf8b3b0b999361a44ff2c22c2abbef42dd24eabe6723346a6e46c0499a21442d8d00dcb57f013ff7595edd0ff076930de3675d34117a44eb0e4f832936da44e") r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={"6e72300100", 0x801}) ioctl$TUNSETLINK(r1, 0x400454cd, 0x308) r2 = getpid() perf_event_open(&(0x7f0000000540)={0x0, 0x70, 0xf2, 0x4, 0x400, 0xadb0, 0x0, 0x0, 0x40000001110, 0x0, 0x2, 0x0, 0x0, 0x7, 0x5, 0x3, 0x401, 0x1, 0x5, 0x401, 0xce4, 0x87b, 0x3, 0x2, 0x9212, 0x0, 0x4, 0x40, 0x7ff, 0x100000001, 0x0, 0x6, 0x80000000, 0x6, 0xd7, 0x4, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={&(0x7f0000000500), 0xa}, 0x404c, 0x0, 0xffffffffffffffff}, r2, 0x9, 0xffffffffffffffff, 0xa) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='memory.stat\x00', 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000200)=@ax25={0x3, {"b8738e610d62ed"}}, 0x80, &(0x7f0000000040)}, 0x0) socket$kcm(0x29, 0x2, 0x0) 21:46:58 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_mreqsrc(r0, 0x0, 0x27, &(0x7f0000000080)={@multicast2, @remote, @loopback}, 0xc) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x100000c7, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000280)='net/mcfilter\x00') preadv(r1, &(0x7f0000000480), 0x100000000000022c, 0x6c00000000000000) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000940)={{{@in6=@ipv4={[], [], @rand_addr}, @in6=@loopback}}, {{@in6=@remote}, 0x0, @in6}}, &(0x7f0000000600)=0xe8) 21:46:58 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000001280)='net/tcp6\x00') close(r0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) read(r1, &(0x7f0000000140)=""/11, 0x238) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000200)) clone(0x1102001bfc, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) ioctl$KDSKBSENT(r0, 0x4b49, &(0x7f00000002c0)) 21:46:58 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000080)='tunl0\x00', 0x27d) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1}, 0x10) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) 21:46:58 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='cgroup\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendfile(r1, r0, &(0x7f00000000c0)=0x2000000, 0x80000002) 21:46:58 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) sendmsg$IPVS_CMD_DEL_DEST(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000040), 0xc, &(0x7f0000000240)={&(0x7f0000000180)={0x14}, 0x14}}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000ab9ff0)={0x2, &(0x7f000039a000)=[{0x20, 0x0, 0x0, 0xfffffffffffff00c}, {}]}, 0x10) sendmmsg(r1, &(0x7f0000000040), 0x324fad809d5a9cf, 0x0) 21:46:59 executing program 3: r0 = signalfd4(0xffffffffffffffff, &(0x7f0000000000), 0x8, 0x0) r1 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f000001bff4)) signalfd(r0, &(0x7f0000000080), 0x8) epoll_pwait(r1, &(0x7f0000000100)=[{}], 0x1, 0x0, &(0x7f0000000180), 0x8) [ 392.325934] device nr0 entered promiscuous mode 21:46:59 executing program 3: ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000300)) creat(&(0x7f00000002c0)='./file0\x00', 0x8) unshare(0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_mreqsrc(r0, 0x0, 0x27, &(0x7f0000000080)={@multicast2, @remote, @loopback}, 0xc) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x100000c7, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000280)='net/mcfilter\x00') preadv(r1, &(0x7f0000000480), 0x100000000000022c, 0x6c00000000000000) 21:46:59 executing program 1: r0 = syz_open_dev$binder(&(0x7f0000d59ff3)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000200)={0x9, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="0f630c400400000001"], 0x0, 0x0, &(0x7f0000000140)}) 21:46:59 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000080)='tunl0\x00', 0x27d) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1}, 0x10) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) 21:46:59 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) sendmsg$IPVS_CMD_DEL_DEST(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000040), 0xc, &(0x7f0000000240)={&(0x7f0000000180)={0x14}, 0x14}}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000ab9ff0)={0x1, &(0x7f000039a000)=[{0x6}]}, 0x10) sendmmsg(r1, &(0x7f0000000040), 0x324fad809d5a9cf, 0x0) [ 392.992366] binder: 17848:17849 BC_CLEAR_DEATH_NOTIFICATION invalid ref 4 21:46:59 executing program 1: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x100000c7, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000280)='net/mcfilter\x00') preadv(r0, &(0x7f0000000480), 0x100000000000022c, 0x6c00000000000000) 21:47:00 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) socket$kcm(0x2, 0x3, 0x2) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0x50, &(0x7f0000000480)}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f0000000380)="6e7230010060a19ef9d2c623d9a1571cb9e1369bcd61ef7e49793ae18712eceb1daa769497800b7fbbd35b170c10751d39aeb660d863e49b8c4f3b3cad48902b5b2d6cfd0abd372c63bcf5d70df3fd4d2e8d443c88c60fd7140fbc0e5637dd82fc3435bed4de5d693c9a781c863e05d8a6f8689a5be29216061f3ff53f8b6b396678e7ba155ef9152d7e43b1eccb2331eb8eb1ed5586dcf8b3b0b999361a44ff2c22c2abbef42dd24eabe6723346a6e46c0499a21442d8d00dcb57f013ff7595edd0ff076930de3675d34117a44eb0e4f832936da44e") r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={"6e72300100", 0x801}) ioctl$TUNSETLINK(r1, 0x400454cd, 0x308) r2 = getpid() perf_event_open(&(0x7f0000000540)={0x0, 0x70, 0xf2, 0x4, 0x400, 0xadb0, 0x0, 0x0, 0x40000001110, 0x0, 0x2, 0x0, 0x0, 0x7, 0x5, 0x3, 0x401, 0x1, 0x5, 0x401, 0xce4, 0x87b, 0x3, 0x2, 0x9212, 0x0, 0x4, 0x40, 0x7ff, 0x100000001, 0x0, 0x6, 0x80000000, 0x6, 0xd7, 0x4, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={&(0x7f0000000500), 0xa}, 0x404c, 0x0, 0xffffffffffffffff}, r2, 0x9, 0xffffffffffffffff, 0xa) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='memory.stat\x00', 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000200)=@ax25={0x3, {"b8738e610d62ed"}}, 0x80, &(0x7f0000000040)}, 0x0) socket$kcm(0x29, 0x2, 0x0) 21:47:00 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_mreqsrc(r0, 0x0, 0x27, &(0x7f0000000080)={@multicast2, @remote, @loopback}, 0xc) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x100000c7, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000280)='net/mcfilter\x00') fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000200)) preadv(r1, &(0x7f0000000480), 0x100000000000022c, 0x6c00000000000000) clock_gettime(0x0, &(0x7f0000000140)) syncfs(0xffffffffffffffff) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000640), &(0x7f0000000680)=0xc) 21:47:00 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_mreqsrc(r0, 0x0, 0x27, &(0x7f0000000080)={@multicast2, @remote, @loopback}, 0xc) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x100000c7, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000280)='net/mcfilter\x00') preadv(r1, &(0x7f0000000480), 0x100000000000022c, 0x6c00000000000000) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000940)={{{@in6=@ipv4={[], [], @rand_addr}, @in6=@loopback}}, {{@in6=@remote}, 0x0, @in6}}, &(0x7f0000000600)=0xe8) 21:47:00 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) sendmsg$IPVS_CMD_DEL_DEST(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000040), 0xc, &(0x7f0000000240)={&(0x7f0000000180)={0x14}, 0x14}}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000ab9ff0)={0x1, &(0x7f000039a000)=[{0x6}]}, 0x10) sendmmsg(r1, &(0x7f0000000040), 0x324fad809d5a9cf, 0x0) 21:47:00 executing program 3: ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000300)) creat(&(0x7f00000002c0)='./file0\x00', 0x8) unshare(0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_mreqsrc(r0, 0x0, 0x27, &(0x7f0000000080)={@multicast2, @remote, @loopback}, 0xc) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x100000c7, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000280)='net/mcfilter\x00') preadv(r1, &(0x7f0000000480), 0x100000000000022c, 0x6c00000000000000) 21:47:00 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000080)='tunl0\x00', 0x27d) r1 = socket$inet6(0xa, 0x80003, 0x4) ioctl(r1, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) 21:47:00 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_mreqsrc(r0, 0x0, 0x27, &(0x7f0000000080)={@multicast2, @remote, @loopback}, 0xc) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x100000c7, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000280)='net/mcfilter\x00') preadv(r1, &(0x7f0000000480), 0x100000000000022c, 0x6c00000000000000) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000940)={{{@in6=@ipv4={[], [], @rand_addr}, @in6=@loopback}}, {{@in6=@remote}, 0x0, @in6}}, &(0x7f0000000600)=0xe8) [ 394.118014] device nr0 entered promiscuous mode 21:47:01 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) sendmsg$IPVS_CMD_DEL_DEST(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000040), 0xc, &(0x7f0000000240)={&(0x7f0000000180)={0x14}, 0x14}}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000ab9ff0)={0x1, &(0x7f000039a000)=[{0x6}]}, 0x10) sendmmsg(r1, &(0x7f0000000040), 0x324fad809d5a9cf, 0x0) 21:47:01 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000080)='tunl0\x00', 0x27d) r1 = socket$inet6(0xa, 0x80003, 0x4) ioctl(r1, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) 21:47:02 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_mreqsrc(r0, 0x0, 0x27, &(0x7f0000000080)={@multicast2, @remote, @loopback}, 0xc) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x100000c7, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000280)='net/mcfilter\x00') fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000200)) preadv(r1, &(0x7f0000000480), 0x100000000000022c, 0x6c00000000000000) clock_gettime(0x0, &(0x7f0000000140)) syncfs(0xffffffffffffffff) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000640), &(0x7f0000000680)=0xc) 21:47:02 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) sendmsg$IPVS_CMD_DEL_DEST(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000040), 0xc, &(0x7f0000000240)={&(0x7f0000000180)={0x14}, 0x14}}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000ab9ff0)={0x2, &(0x7f000039a000)=[{0x0, 0x0, 0x0, 0xfffffffffffff00c}, {0x6}]}, 0x10) sendmmsg(r1, &(0x7f0000000040), 0x324fad809d5a9cf, 0x0) 21:47:02 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_mreqsrc(r0, 0x0, 0x27, &(0x7f0000000080)={@multicast2, @remote, @loopback}, 0xc) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x100000c7, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000280)='net/mcfilter\x00') preadv(r1, &(0x7f0000000480), 0x100000000000022c, 0x6c00000000000000) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000940)={{{@in6=@ipv4={[], [], @rand_addr}, @in6=@loopback}}, {{@in6=@remote}, 0x0, @in6}}, &(0x7f0000000600)=0xe8) 21:47:02 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) socket$kcm(0x2, 0x3, 0x2) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0x50, &(0x7f0000000480)}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f0000000380)="6e7230010060a19ef9d2c623d9a1571cb9e1369bcd61ef7e49793ae18712eceb1daa769497800b7fbbd35b170c10751d39aeb660d863e49b8c4f3b3cad48902b5b2d6cfd0abd372c63bcf5d70df3fd4d2e8d443c88c60fd7140fbc0e5637dd82fc3435bed4de5d693c9a781c863e05d8a6f8689a5be29216061f3ff53f8b6b396678e7ba155ef9152d7e43b1eccb2331eb8eb1ed5586dcf8b3b0b999361a44ff2c22c2abbef42dd24eabe6723346a6e46c0499a21442d8d00dcb57f013ff7595edd0ff076930de3675d34117a44eb0e4f832936da44e") r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={"6e72300100", 0x801}) ioctl$TUNSETLINK(r1, 0x400454cd, 0x308) r2 = getpid() perf_event_open(&(0x7f0000000540)={0x0, 0x70, 0xf2, 0x4, 0x400, 0xadb0, 0x0, 0x0, 0x40000001110, 0x0, 0x2, 0x0, 0x0, 0x7, 0x5, 0x3, 0x401, 0x1, 0x5, 0x401, 0xce4, 0x87b, 0x3, 0x2, 0x9212, 0x0, 0x4, 0x40, 0x7ff, 0x100000001, 0x0, 0x6, 0x80000000, 0x6, 0xd7, 0x4, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={&(0x7f0000000500), 0xa}, 0x404c, 0x0, 0xffffffffffffffff}, r2, 0x9, 0xffffffffffffffff, 0xa) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='memory.stat\x00', 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000200)=@ax25={0x3, {"b8738e610d62ed"}}, 0x80, &(0x7f0000000040)}, 0x0) socket$kcm(0x29, 0x2, 0x0) 21:47:02 executing program 5: r0 = syz_open_dev$binder(&(0x7f0000d59ff3)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000200)={0xc, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="056304400000000001634040"], 0x0, 0x0, &(0x7f0000000140)}) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000007000)={0x1, 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="11"], 0x0, 0x0, &(0x7f0000002000)}) 21:47:02 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000080)='tunl0\x00', 0x27d) r1 = socket$inet6(0xa, 0x80003, 0x4) ioctl(r1, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) [ 395.742652] binder: 17905:17906 got reply transaction with no transaction stack [ 395.798239] binder: 17905:17906 transaction failed 29201/-71, size 0-0 line 2762 [ 395.838873] binder: 17905:17906 got reply transaction with no transaction stack [ 395.839475] binder: 17905:17914 unknown command 17 [ 395.899992] binder: 17905:17906 transaction failed 29201/-71, size 0-0 line 2762 [ 395.936141] device nr0 entered promiscuous mode [ 395.959547] binder: 17905:17914 ioctl c0306201 20007000 returned -22 21:47:02 executing program 5: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_mreqsrc(r0, 0x0, 0x27, &(0x7f0000000080)={@multicast2, @remote, @loopback}, 0xc) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x100000c7, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000280)='net/mcfilter\x00') preadv(r1, &(0x7f0000000480), 0x100000000000022c, 0x6c00000000000000) 21:47:03 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) sendmsg$IPVS_CMD_DEL_DEST(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000040), 0xc, &(0x7f0000000240)={&(0x7f0000000180)={0x14}, 0x14}}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000ab9ff0)={0x2, &(0x7f000039a000)=[{0x0, 0x0, 0x0, 0xfffffffffffff00c}, {0x6}]}, 0x10) sendmmsg(r1, &(0x7f0000000040), 0x324fad809d5a9cf, 0x0) 21:47:03 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1}, 0x10) r1 = socket$inet6(0xa, 0x80003, 0x4) ioctl(r1, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) 21:47:03 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) sendmsg$IPVS_CMD_DEL_DEST(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000040), 0xc, &(0x7f0000000240)={&(0x7f0000000180)={0x14}, 0x14}}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000ab9ff0)={0x2, &(0x7f000039a000)=[{0x0, 0x0, 0x0, 0xfffffffffffff00c}, {0x6}]}, 0x10) sendmmsg(r1, &(0x7f0000000040), 0x324fad809d5a9cf, 0x0) 21:47:03 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_mreqsrc(r0, 0x0, 0x27, &(0x7f0000000080)={@multicast2, @remote, @loopback}, 0xc) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x100000c7, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000280)='net/mcfilter\x00') fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000200)) preadv(r1, &(0x7f0000000480), 0x100000000000022c, 0x6c00000000000000) clock_gettime(0x0, &(0x7f0000000140)) syncfs(0xffffffffffffffff) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000640), &(0x7f0000000680)=0xc) 21:47:03 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$inet_buf(r0, 0x0, 0x20, &(0x7f0000000080)="7444548a75ddb3a31a73410b", 0xc) 21:47:03 executing program 3: mmap(&(0x7f0000000000/0xf82000)=nil, 0xf82000, 0x3, 0x31, 0xffffffffffffffff, 0x0) r0 = gettid() ioctl$KDADDIO(0xffffffffffffffff, 0x4b34, 0x0) timer_create(0x0, &(0x7f0000ee4000)={0x0, 0x12}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f0000e04000)={{0x0, 0x989680}, {0x0, 0x989680}}, &(0x7f0000d64000)) futex(&(0x7f00000000c0), 0x0, 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x14) syz_open_dev$mice(&(0x7f0000000080)='/dev/input/mice\x00', 0x0, 0x0) 21:47:03 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1}, 0x10) r1 = socket$inet6(0xa, 0x80003, 0x4) ioctl(r1, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) 21:47:03 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) socket$kcm(0x2, 0x3, 0x2) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0x50, &(0x7f0000000480)}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f0000000380)="6e7230010060a19ef9d2c623d9a1571cb9e1369bcd61ef7e49793ae18712eceb1daa769497800b7fbbd35b170c10751d39aeb660d863e49b8c4f3b3cad48902b5b2d6cfd0abd372c63bcf5d70df3fd4d2e8d443c88c60fd7140fbc0e5637dd82fc3435bed4de5d693c9a781c863e05d8a6f8689a5be29216061f3ff53f8b6b396678e7ba155ef9152d7e43b1eccb2331eb8eb1ed5586dcf8b3b0b999361a44ff2c22c2abbef42dd24eabe6723346a6e46c0499a21442d8d00dcb57f013ff7595edd0ff076930de3675d34117a44eb0e4f832936da44e") r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={"6e72300100", 0x801}) ioctl$TUNSETLINK(r1, 0x400454cd, 0x308) r2 = getpid() perf_event_open(&(0x7f0000000540)={0x0, 0x70, 0xf2, 0x4, 0x400, 0xadb0, 0x0, 0x0, 0x40000001110, 0x0, 0x2, 0x0, 0x0, 0x7, 0x5, 0x3, 0x401, 0x1, 0x5, 0x401, 0xce4, 0x87b, 0x3, 0x2, 0x9212, 0x0, 0x4, 0x40, 0x7ff, 0x100000001, 0x0, 0x6, 0x80000000, 0x6, 0xd7, 0x4, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={&(0x7f0000000500), 0xa}, 0x404c, 0x0, 0xffffffffffffffff}, r2, 0x9, 0xffffffffffffffff, 0xa) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='memory.stat\x00', 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000200)=@ax25={0x3, {"b8738e610d62ed"}}, 0x80, &(0x7f0000000040)}, 0x0) socket$kcm(0x29, 0x2, 0x0) 21:47:04 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000004c0)={&(0x7f0000000040), 0xc, &(0x7f0000000480)={&(0x7f00000003c0)=@setneightbl={0x14, 0x43, 0x301}, 0x14}}, 0x0) 21:47:04 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1}, 0x10) r1 = socket$inet6(0xa, 0x80003, 0x4) ioctl(r1, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) 21:47:04 executing program 5: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r1, 0x8000001) r2 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r1, r2, &(0x7f0000d83ff8), 0x8000fffffffe) creat(&(0x7f00000001c0)='./bus\x00', 0x0) lseek(r1, 0x4000, 0x4) readlink(&(0x7f00000000c0)='./bus\x00', &(0x7f0000000140)=""/49, 0x31) [ 397.256728] device nr0 entered promiscuous mode 21:47:04 executing program 0: setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000080)='tunl0\x00', 0x27d) bind$inet(0xffffffffffffffff, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1}, 0x10) r0 = socket$inet6(0xa, 0x80003, 0x4) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") connect$inet(0xffffffffffffffff, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) 21:47:04 executing program 5: mknod(&(0x7f0000f80000)='./file0\x00', 0x1040, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x0, 0x0) read(r0, &(0x7f0000000540)=""/11, 0x485) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000200)) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, &(0x7f0000000140), 0xffffffffffffffff) openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x4000, 0x0) ioctl$BLKDISCARD(r0, 0x1277, &(0x7f0000000000)) open$dir(&(0x7f0000000240)='./file0\x00', 0x841, 0x0) 21:47:04 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) sendmsg$IPVS_CMD_DEL_DEST(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000040), 0xc, &(0x7f0000000240)={&(0x7f0000000180)={0x14}, 0x14}}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000ab9ff0)={0x2, &(0x7f000039a000)=[{0x20}, {0x6}]}, 0x10) sendmmsg(r1, &(0x7f0000000040), 0x324fad809d5a9cf, 0x0) 21:47:04 executing program 0: setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000080)='tunl0\x00', 0x27d) bind$inet(0xffffffffffffffff, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1}, 0x10) r0 = socket$inet6(0xa, 0x80003, 0x4) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") connect$inet(0xffffffffffffffff, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) [ 398.405360] binder: undelivered TRANSACTION_ERROR: 29201 [ 398.411083] binder: undelivered TRANSACTION_ERROR: 29201 21:47:05 executing program 1: r0 = socket$inet6(0xa, 0x100800000000002, 0x0) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={[], [], @loopback}}, 0x1c) 21:47:05 executing program 3: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) close(r0) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$sock_inet_tcp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000740)) 21:47:05 executing program 5: r0 = socket$kcm(0x2, 0x5, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)=@nfc_llcp={0x27, 0x0, 0x2, 0x0, 0x0, 0x0, "b6bc8fda04ae1bf1a1e4431ff3e4e210a9ad83a2709b87b524875076871471eb7b6e745475d5febe321ff3eb7a90f27b92d384bf15cacfa784201efd3d604b"}, 0x80, &(0x7f0000000300)}, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x890c, &(0x7f0000000000)) 21:47:05 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) sendmsg$IPVS_CMD_DEL_DEST(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000040), 0xc, &(0x7f0000000240)={&(0x7f0000000180)={0x14}, 0x14}}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000ab9ff0)={0x2, &(0x7f000039a000)=[{0x20}, {0x6}]}, 0x10) sendmmsg(r1, &(0x7f0000000040), 0x324fad809d5a9cf, 0x0) 21:47:05 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) socket$kcm(0x2, 0x3, 0x2) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0x50, &(0x7f0000000480)}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f0000000380)="6e7230010060a19ef9d2c623d9a1571cb9e1369bcd61ef7e49793ae18712eceb1daa769497800b7fbbd35b170c10751d39aeb660d863e49b8c4f3b3cad48902b5b2d6cfd0abd372c63bcf5d70df3fd4d2e8d443c88c60fd7140fbc0e5637dd82fc3435bed4de5d693c9a781c863e05d8a6f8689a5be29216061f3ff53f8b6b396678e7ba155ef9152d7e43b1eccb2331eb8eb1ed5586dcf8b3b0b999361a44ff2c22c2abbef42dd24eabe6723346a6e46c0499a21442d8d00dcb57f013ff7595edd0ff076930de3675d34117a44eb0e4f832936da44e") r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={"6e72300100", 0x801}) ioctl$TUNSETLINK(r1, 0x400454cd, 0x308) r2 = getpid() perf_event_open(&(0x7f0000000540)={0x0, 0x70, 0xf2, 0x4, 0x400, 0xadb0, 0x0, 0x0, 0x40000001110, 0x0, 0x2, 0x0, 0x0, 0x7, 0x5, 0x3, 0x401, 0x1, 0x5, 0x401, 0xce4, 0x87b, 0x3, 0x2, 0x9212, 0x0, 0x4, 0x40, 0x7ff, 0x100000001, 0x0, 0x6, 0x80000000, 0x6, 0xd7, 0x4, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={&(0x7f0000000500), 0xa}, 0x404c, 0x0, 0xffffffffffffffff}, r2, 0x9, 0xffffffffffffffff, 0xa) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='memory.stat\x00', 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000200)=@ax25={0x3, {"b8738e610d62ed"}}, 0x80, &(0x7f0000000040)}, 0x0) socket$kcm(0x29, 0x2, 0x0) 21:47:05 executing program 0: setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000080)='tunl0\x00', 0x27d) bind$inet(0xffffffffffffffff, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1}, 0x10) r0 = socket$inet6(0xa, 0x80003, 0x4) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") connect$inet(0xffffffffffffffff, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) 21:47:05 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000080)='tunl0\x00', 0x27d) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1}, 0x10) r1 = socket$inet6(0xa, 0x80003, 0x4) ioctl(r1, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) 21:47:05 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000540)={&(0x7f0000000000), 0xc, &(0x7f0000000500)={&(0x7f0000000140)=ANY=[@ANYBLOB="00000000000000000c00150000000000000000001239325f8b7257ad178ced49aee7de66dbd6871c3340ebfa4db153a86bd85e6cd9bc50669a8df7ed847bce2258d55f12a22759a33fcd8c948decc7ba6d1c9a434accb601a0baace75f4a12b1adc82c70184325315e2b78cf633b0be904fc4d43b099de70d21da5803d846dd1bddc873d995ddd75237a030ce7f1d3c2e2c888da50595deaa4d56a4aacc79e0ae1a6e65cf25faac09fbec6e0d0b717"], 0x1}}, 0x0) 21:47:05 executing program 1: add_key$keyring(&(0x7f0000000200)='keyring\x00', &(0x7f0000000240)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) 21:47:05 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x3, @broadcast}, 0x10) sendto$inet(r0, &(0x7f00000001c0), 0x0, 0x200007ff, &(0x7f0000deaff0)={0x2, 0x3, @loopback}, 0x10) sendto(r0, &(0x7f0000000380)="80", 0x1, 0x1, &(0x7f0000000040)=@un=@abs, 0x80) sendto$inet(r0, &(0x7f00000002c0)=' ', 0x1, 0x1, &(0x7f0000000200)={0x2, 0x0, @dev}, 0x10) 21:47:05 executing program 5: socket$inet6_udp(0xa, 0x2, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @mcast2, 0x4}, 0x1c) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400218) getsockopt$inet6_opts(r0, 0x29, 0x18, &(0x7f0000000000)=""/180, &(0x7f00000000c0)=0xb4) munmap(&(0x7f000000c000/0x2000)=nil, 0x2000) readlinkat(0xffffffffffffffff, &(0x7f0000000400)='./file0\x00', &(0x7f00000005c0)=""/161, 0xa1) madvise(&(0x7f000000a000/0x3000)=nil, 0x3000, 0x1) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x400000, 0x0) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x80000000000002, &(0x7f0000000140)=0x78, 0x4) setsockopt$inet_tcp_TCP_MD5SIG(r3, 0x6, 0xe, &(0x7f0000000280)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x2, 0x0, "a77760f5a7645bc43c241d69912dda0c63c2a66726f8cfafd6c8fe2c98de7ba44947a79015f0fe57917cb62a93987a938fdedfce7bbba4fec2d8a09c41fb233245f2604b9e07b8ab79ec15ef2818a179"}, 0xd8) bind$inet(r3, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r3, &(0x7f0000a88f88), 0x29f, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) openat$full(0xffffffffffffff9c, &(0x7f0000000380)='/dev/full\x00', 0x0, 0x0) ioctl$TUNSETVNETLE(0xffffffffffffffff, 0x400454dc, &(0x7f00000003c0)) fcntl$setlease(0xffffffffffffffff, 0x400, 0x0) socket(0x0, 0xfffffffffffffffe, 0x4) getsockopt$IPT_SO_GET_REVISION_TARGET(r3, 0x0, 0x43, &(0x7f0000000000)={'HL\x00'}, &(0x7f00000000c0)=0x1e) prctl$seccomp(0x16, 0x4, &(0x7f0000000140)={0x0, &(0x7f0000000700)}) syz_open_procfs(0x0, &(0x7f0000000080)="2f65786500000000000409004bddd9de91be10eebf000ee9a90f798058439ed554fa07424adee901d2da75af1f02acc7edbcd7a071fb35331ce39c5a") setsockopt$sock_int(r3, 0x1, 0x8, &(0x7f0000000100), 0x921b527a62bfd8af) recvmsg(r3, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0x80, &(0x7f00000001c0)=[{&(0x7f0000003ac0)=""/4096, 0x1000}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x100) r4 = socket(0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_TIMEOUT(0xffffffffffffffff, 0x0, 0x48a, &(0x7f0000000440)={0x1000}, 0xc) ioctl$TIOCOUTQ(r2, 0x5411, &(0x7f0000000740)) getsockopt$inet6_opts(r4, 0x29, 0x3b, &(0x7f0000000480)=""/201, &(0x7f0000000680)=0xc9) write$binfmt_elf64(r3, &(0x7f0000002300)=ANY=[], 0xa37cf698) 21:47:05 executing program 1: perf_event_open(&(0x7f0000aaa000)={0x2, 0x70, 0x85a, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x891b, &(0x7f0000000040)={'vcan0\x00', {0x2, 0x0, @multicast1}}) setsockopt$inet_MCAST_JOIN_GROUP(r0, 0x0, 0x2a, &(0x7f0000008000)={0x1, {{0x2, 0x0, @multicast2}}}, 0x90) setsockopt$inet_MCAST_JOIN_GROUP(r0, 0x0, 0x30, &(0x7f0000678f70)={0x1, {{0x2, 0x0, @multicast2}}}, 0x3100) [ 399.049633] device nr0 entered promiscuous mode 21:47:06 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000080)='tunl0\x00', 0x27d) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1}, 0x10) r1 = socket$inet6(0xa, 0x80003, 0x4) ioctl(r1, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) 21:47:06 executing program 3: r0 = socket$packet(0x11, 0x1000000000002, 0x300) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x2, 0x32, 0xffffffffffffffff, 0x0) getsockopt$packet_int(r0, 0x107, 0xb, &(0x7f0000000000), &(0x7f00000041c0)=0x4) 21:47:06 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) sendmsg$IPVS_CMD_DEL_DEST(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000040), 0xc, &(0x7f0000000240)={&(0x7f0000000180)={0x14}, 0x14}}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000ab9ff0)={0x2, &(0x7f000039a000)=[{0x20}, {0x6}]}, 0x10) sendmmsg(r1, &(0x7f0000000040), 0x324fad809d5a9cf, 0x0) 21:47:06 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000080)='tunl0\x00', 0x27d) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1}, 0x10) r1 = socket$inet6(0xa, 0x80003, 0x4) ioctl(r1, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) 21:47:06 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000140)=0x75, 0x4) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, &(0x7f0000a88f88), 0xfffffffffffffe6e, 0x20000000, &(0x7f0000e68000)={0x2, 0x4004e23, @local}, 0x10) recvmsg(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0x80, &(0x7f00000001c0)=[{&(0x7f0000003ac0)=""/4096, 0x1000}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x0) 21:47:06 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000080)='tunl0\x00', 0x27d) bind$inet(0xffffffffffffffff, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1}, 0x10) r1 = socket$inet6(0xa, 0x80003, 0x4) ioctl(r1, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) 21:47:06 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) sendmsg$IPVS_CMD_DEL_DEST(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000040), 0xc, &(0x7f0000000240)={&(0x7f0000000180)={0x14}, 0x14}}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000ab9ff0)={0x2, &(0x7f000039a000)=[{0x20, 0x0, 0x0, 0xfffffffffffff00c}, {0x6}]}, 0x10) sendmmsg(0xffffffffffffffff, &(0x7f0000000040), 0x324fad809d5a9cf, 0x0) 21:47:06 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) socket$kcm(0x2, 0x3, 0x2) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0x50, &(0x7f0000000480)}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f0000000380)="6e7230010060a19ef9d2c623d9a1571cb9e1369bcd61ef7e49793ae18712eceb1daa769497800b7fbbd35b170c10751d39aeb660d863e49b8c4f3b3cad48902b5b2d6cfd0abd372c63bcf5d70df3fd4d2e8d443c88c60fd7140fbc0e5637dd82fc3435bed4de5d693c9a781c863e05d8a6f8689a5be29216061f3ff53f8b6b396678e7ba155ef9152d7e43b1eccb2331eb8eb1ed5586dcf8b3b0b999361a44ff2c22c2abbef42dd24eabe6723346a6e46c0499a21442d8d00dcb57f013ff7595edd0ff076930de3675d34117a44eb0e4f832936da44e") r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={"6e72300100", 0x801}) ioctl$TUNSETLINK(r1, 0x400454cd, 0x308) r2 = getpid() perf_event_open(&(0x7f0000000540)={0x0, 0x70, 0xf2, 0x4, 0x400, 0xadb0, 0x0, 0x0, 0x40000001110, 0x0, 0x2, 0x0, 0x0, 0x7, 0x5, 0x3, 0x401, 0x1, 0x5, 0x401, 0xce4, 0x87b, 0x3, 0x2, 0x9212, 0x0, 0x4, 0x40, 0x7ff, 0x100000001, 0x0, 0x6, 0x80000000, 0x6, 0xd7, 0x4, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={&(0x7f0000000500), 0xa}, 0x404c, 0x0, 0xffffffffffffffff}, r2, 0x9, 0xffffffffffffffff, 0xa) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='memory.stat\x00', 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000200)=@ax25={0x3, {"b8738e610d62ed"}}, 0x80, &(0x7f0000000040)}, 0x0) socket$kcm(0x29, 0x2, 0x0) 21:47:06 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'hash\x00', 0x0, 0x0, 'hmac(sha256-generic)\x00'}, 0x58) accept(r0, 0x0, &(0x7f0000000840)=0xffffffffffffff95) close(r0) 21:47:06 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000440), 0xfeef, 0x20000007, &(0x7f0000000040)={0xa, 0x2}, 0x1c) close(r0) [ 399.926862] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. 21:47:06 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) r1 = socket$inet6(0xa, 0x803, 0x3) ioctl$FS_IOC_GETFSMAP(r0, 0xc0c0583b, &(0x7f00000001c0)={0x0, 0x0, 0x1, 0x0, [], [{0x6, 0xca2, 0x4, 0x32b, 0xd42, 0x7}, {0x5, 0x8, 0x108e, 0xfffffffffffff667, 0x4, 0x6}], [[]]}) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0a5c2d023c126285718070") socket$inet_udp(0x2, 0x2, 0x0) r2 = socket$inet6(0xa, 0x3, 0xf7) getsockopt$inet6_opts(r1, 0x29, 0x36, &(0x7f0000000140)=""/42, &(0x7f0000000180)=0x2a) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000040)={'bond0\x00'}) 21:47:07 executing program 1: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0a5c2d023c126285718070") r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) setsockopt$inet6_int(r1, 0x29, 0x3e, &(0x7f0000000080), 0x4) 21:47:07 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$sock_SIOCBRADDBR(0xffffffffffffffff, 0x89a0, &(0x7f0000000340)='ip6tnl0\x00') ioctl$sock_netdev_private(r0, 0x89fe, &(0x7f0000000340)) 21:47:07 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000080)='tunl0\x00', 0x27d) bind$inet(0xffffffffffffffff, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1}, 0x10) r1 = socket$inet6(0xa, 0x80003, 0x4) ioctl(r1, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) 21:47:07 executing program 3: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r0 = gettid() socketpair(0x11, 0x2, 0x0, &(0x7f0000000140)) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x8000000000000014) wait4(0x0, &(0x7f0000000040), 0x0, &(0x7f0000000280)) 21:47:07 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='dctcp\x00', 0x6) 21:47:07 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) socket$kcm(0x2, 0x3, 0x2) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0x50, &(0x7f0000000480)}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f0000000380)="6e7230010060a19ef9d2c623d9a1571cb9e1369bcd61ef7e49793ae18712eceb1daa769497800b7fbbd35b170c10751d39aeb660d863e49b8c4f3b3cad48902b5b2d6cfd0abd372c63bcf5d70df3fd4d2e8d443c88c60fd7140fbc0e5637dd82fc3435bed4de5d693c9a781c863e05d8a6f8689a5be29216061f3ff53f8b6b396678e7ba155ef9152d7e43b1eccb2331eb8eb1ed5586dcf8b3b0b999361a44ff2c22c2abbef42dd24eabe6723346a6e46c0499a21442d8d00dcb57f013ff7595edd0ff076930de3675d34117a44eb0e4f832936da44e") r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={"6e72300100", 0x801}) ioctl$TUNSETLINK(r1, 0x400454cd, 0x308) r2 = getpid() perf_event_open(&(0x7f0000000540)={0x0, 0x70, 0xf2, 0x4, 0x400, 0xadb0, 0x0, 0x0, 0x40000001110, 0x0, 0x2, 0x0, 0x0, 0x7, 0x5, 0x3, 0x401, 0x1, 0x5, 0x401, 0xce4, 0x87b, 0x3, 0x2, 0x9212, 0x0, 0x4, 0x40, 0x7ff, 0x100000001, 0x0, 0x6, 0x80000000, 0x6, 0xd7, 0x4, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={&(0x7f0000000500), 0xa}, 0x404c, 0x0, 0xffffffffffffffff}, r2, 0x9, 0xffffffffffffffff, 0xa) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='memory.stat\x00', 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000200)=@ax25={0x3, {"b8738e610d62ed"}}, 0x80, &(0x7f0000000040)}, 0x0) socket$kcm(0x29, 0x2, 0x0) 21:47:07 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$inet6(0xa, 0x803, 0x5) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0a5c2d023c126285718070") setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) 21:47:07 executing program 5: r0 = socket(0xa, 0x2, 0x0) setsockopt$inet_int(r0, 0x0, 0x15, &(0x7f0000000040)=0x2501396f, 0x4) 21:47:07 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000040)={'lo\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000140)={&(0x7f0000000080), 0xc, &(0x7f00000001c0)={&(0x7f00000000c0)=@ipv4_deladdr={0x18, 0x15, 0x1, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, r1}}, 0x18}}, 0x0) 21:47:08 executing program 5: 21:47:08 executing program 2: 21:47:08 executing program 5: 21:47:08 executing program 2: 21:47:08 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = perf_event_open(&(0x7f000025c000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0xffffffffffffffff, 0x11, r1, 0x0) request_key(&(0x7f0000000600)='user\x00', &(0x7f0000000640), &(0x7f0000000680)='\x00', 0xfffffffffffffffc) [ 401.410242] device nr0 entered promiscuous mode 21:47:08 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000080)='tunl0\x00', 0x27d) bind$inet(0xffffffffffffffff, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1}, 0x10) r1 = socket$inet6(0xa, 0x80003, 0x4) ioctl(r1, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) 21:47:10 executing program 1: 21:47:10 executing program 3: 21:47:10 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000080)='tunl0\x00', 0x27d) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x0, @multicast1}, 0x10) r1 = socket$inet6(0xa, 0x80003, 0x4) ioctl(r1, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) 21:47:10 executing program 5: 21:47:10 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) socket$kcm(0x2, 0x3, 0x2) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0x50, &(0x7f0000000480)}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f0000000380)="6e7230010060a19ef9d2c623d9a1571cb9e1369bcd61ef7e49793ae18712eceb1daa769497800b7fbbd35b170c10751d39aeb660d863e49b8c4f3b3cad48902b5b2d6cfd0abd372c63bcf5d70df3fd4d2e8d443c88c60fd7140fbc0e5637dd82fc3435bed4de5d693c9a781c863e05d8a6f8689a5be29216061f3ff53f8b6b396678e7ba155ef9152d7e43b1eccb2331eb8eb1ed5586dcf8b3b0b999361a44ff2c22c2abbef42dd24eabe6723346a6e46c0499a21442d8d00dcb57f013ff7595edd0ff076930de3675d34117a44eb0e4f832936da44e") r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={"6e72300100", 0x801}) ioctl$TUNSETLINK(r1, 0x400454cd, 0x308) r2 = getpid() perf_event_open(&(0x7f0000000540)={0x0, 0x70, 0xf2, 0x4, 0x400, 0xadb0, 0x0, 0x0, 0x40000001110, 0x0, 0x2, 0x0, 0x0, 0x7, 0x5, 0x3, 0x401, 0x1, 0x5, 0x401, 0xce4, 0x87b, 0x3, 0x2, 0x9212, 0x0, 0x4, 0x40, 0x7ff, 0x100000001, 0x0, 0x6, 0x80000000, 0x6, 0xd7, 0x4, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={&(0x7f0000000500), 0xa}, 0x404c, 0x0, 0xffffffffffffffff}, r2, 0x9, 0xffffffffffffffff, 0xa) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='memory.stat\x00', 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000200)=@ax25={0x3, {"b8738e610d62ed"}}, 0x80, &(0x7f0000000040)}, 0x0) socket$kcm(0x29, 0x2, 0x0) 21:47:10 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000dc9ff0)={0x2, 0x4e20, @broadcast}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000000900)=0x1, 0x4) sendto$inet(r0, &(0x7f0000000100), 0x0, 0x20000000, &(0x7f0000000080)={0x2, 0x4e20}, 0x10) sendto$inet(r0, &(0x7f00000001c0)="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", 0x5b0, 0x8000, &(0x7f00000011c0), 0x10) sendto$inet(r0, &(0x7f0000000000)="dc", 0x1, 0x4008000, &(0x7f0000000100)={0x2, 0x0, @dev}, 0x10) sendmmsg(r0, &(0x7f0000004cc0)=[{{&(0x7f00000042c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @loopback}}}, 0x80, &(0x7f0000001180), 0x0, &(0x7f0000004440)=[{0x10}], 0x10, 0x40}, 0x9}], 0x1, 0x4000) 21:47:10 executing program 5: 21:47:10 executing program 1: 21:47:10 executing program 3: [ 404.028479] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. 21:47:11 executing program 3: 21:47:11 executing program 1: 21:47:11 executing program 5: 21:47:11 executing program 2: [ 404.169701] device nr0 entered promiscuous mode 21:47:11 executing program 1: 21:47:11 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000080)='tunl0\x00', 0x27d) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x0, @multicast1}, 0x10) r1 = socket$inet6(0xa, 0x80003, 0x4) ioctl(r1, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) 21:47:11 executing program 5: 21:47:11 executing program 2: 21:47:11 executing program 3: 21:47:11 executing program 1: 21:47:11 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) socket$kcm(0x2, 0x3, 0x2) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0x50, &(0x7f0000000480)}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f0000000380)="6e7230010060a19ef9d2c623d9a1571cb9e1369bcd61ef7e49793ae18712eceb1daa769497800b7fbbd35b170c10751d39aeb660d863e49b8c4f3b3cad48902b5b2d6cfd0abd372c63bcf5d70df3fd4d2e8d443c88c60fd7140fbc0e5637dd82fc3435bed4de5d693c9a781c863e05d8a6f8689a5be29216061f3ff53f8b6b396678e7ba155ef9152d7e43b1eccb2331eb8eb1ed5586dcf8b3b0b999361a44ff2c22c2abbef42dd24eabe6723346a6e46c0499a21442d8d00dcb57f013ff7595edd0ff076930de3675d34117a44eb0e4f832936da44e") r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={"6e72300100", 0x801}) ioctl$TUNSETLINK(r1, 0x400454cd, 0x308) r2 = getpid() perf_event_open(&(0x7f0000000540)={0x0, 0x70, 0xf2, 0x4, 0x400, 0xadb0, 0x0, 0x0, 0x40000001110, 0x0, 0x2, 0x0, 0x0, 0x7, 0x5, 0x3, 0x401, 0x1, 0x5, 0x401, 0xce4, 0x87b, 0x3, 0x2, 0x9212, 0x0, 0x4, 0x40, 0x7ff, 0x100000001, 0x0, 0x6, 0x80000000, 0x6, 0xd7, 0x4, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={&(0x7f0000000500), 0xa}, 0x404c, 0x0, 0xffffffffffffffff}, r2, 0x9, 0xffffffffffffffff, 0xa) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='memory.stat\x00', 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000200)=@ax25={0x3, {"b8738e610d62ed"}}, 0x80, &(0x7f0000000040)}, 0x0) socket$kcm(0x29, 0x2, 0x0) 21:47:11 executing program 2: 21:47:11 executing program 5: 21:47:11 executing program 1: 21:47:11 executing program 3: 21:47:11 executing program 1: 21:47:11 executing program 5: [ 405.018930] device nr0 entered promiscuous mode 21:47:12 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000080)='tunl0\x00', 0x27d) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x0, @multicast1}, 0x10) r1 = socket$inet6(0xa, 0x80003, 0x4) ioctl(r1, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) 21:47:12 executing program 2: 21:47:12 executing program 3: 21:47:12 executing program 5: 21:47:12 executing program 1: 21:47:12 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) socket$kcm(0x2, 0x3, 0x2) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0x50, &(0x7f0000000480)}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f0000000380)="6e7230010060a19ef9d2c623d9a1571cb9e1369bcd61ef7e49793ae18712eceb1daa769497800b7fbbd35b170c10751d39aeb660d863e49b8c4f3b3cad48902b5b2d6cfd0abd372c63bcf5d70df3fd4d2e8d443c88c60fd7140fbc0e5637dd82fc3435bed4de5d693c9a781c863e05d8a6f8689a5be29216061f3ff53f8b6b396678e7ba155ef9152d7e43b1eccb2331eb8eb1ed5586dcf8b3b0b999361a44ff2c22c2abbef42dd24eabe6723346a6e46c0499a21442d8d00dcb57f013ff7595edd0ff076930de3675d34117a44eb0e4f832936da44e") r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={"6e72300100", 0x801}) ioctl$TUNSETLINK(r1, 0x400454cd, 0x308) r2 = getpid() perf_event_open(&(0x7f0000000540)={0x0, 0x70, 0xf2, 0x4, 0x400, 0xadb0, 0x0, 0x0, 0x40000001110, 0x0, 0x2, 0x0, 0x0, 0x7, 0x5, 0x3, 0x401, 0x1, 0x5, 0x401, 0xce4, 0x87b, 0x3, 0x2, 0x9212, 0x0, 0x4, 0x40, 0x7ff, 0x100000001, 0x0, 0x6, 0x80000000, 0x6, 0xd7, 0x4, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={&(0x7f0000000500), 0xa}, 0x404c, 0x0, 0xffffffffffffffff}, r2, 0x9, 0xffffffffffffffff, 0xa) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='memory.stat\x00', 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000200)=@ax25={0x3, {"b8738e610d62ed"}}, 0x80, &(0x7f0000000040)}, 0x0) socket$kcm(0x29, 0x2, 0x0) 21:47:12 executing program 3: 21:47:12 executing program 1: 21:47:12 executing program 5: 21:47:12 executing program 2: [ 405.899362] device nr0 entered promiscuous mode 21:47:12 executing program 1: 21:47:12 executing program 5: 21:47:13 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000080)='tunl0\x00', 0x27d) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1}, 0x10) r1 = socket$inet6(0xa, 0x0, 0x4) ioctl(r1, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) 21:47:13 executing program 3: 21:47:13 executing program 1: 21:47:13 executing program 2: 21:47:13 executing program 5: 21:47:14 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) socket$kcm(0x2, 0x3, 0x2) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0x50, &(0x7f0000000480)}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f0000000380)="6e7230010060a19ef9d2c623d9a1571cb9e1369bcd61ef7e49793ae18712eceb1daa769497800b7fbbd35b170c10751d39aeb660d863e49b8c4f3b3cad48902b5b2d6cfd0abd372c63bcf5d70df3fd4d2e8d443c88c60fd7140fbc0e5637dd82fc3435bed4de5d693c9a781c863e05d8a6f8689a5be29216061f3ff53f8b6b396678e7ba155ef9152d7e43b1eccb2331eb8eb1ed5586dcf8b3b0b999361a44ff2c22c2abbef42dd24eabe6723346a6e46c0499a21442d8d00dcb57f013ff7595edd0ff076930de3675d34117a44eb0e4f832936da44e") r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={"6e72300100", 0x801}) ioctl$TUNSETLINK(r1, 0x400454cd, 0x308) r2 = getpid() perf_event_open(&(0x7f0000000540)={0x0, 0x70, 0xf2, 0x4, 0x400, 0xadb0, 0x0, 0x0, 0x40000001110, 0x0, 0x2, 0x0, 0x0, 0x7, 0x5, 0x3, 0x401, 0x1, 0x5, 0x401, 0xce4, 0x87b, 0x3, 0x2, 0x9212, 0x0, 0x4, 0x40, 0x7ff, 0x100000001, 0x0, 0x6, 0x80000000, 0x6, 0xd7, 0x4, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={&(0x7f0000000500), 0xa}, 0x404c, 0x0, 0xffffffffffffffff}, r2, 0x9, 0xffffffffffffffff, 0xa) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='memory.stat\x00', 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000200)=@ax25={0x3, {"b8738e610d62ed"}}, 0x80, &(0x7f0000000040)}, 0x0) socket$kcm(0x29, 0x2, 0x0) 21:47:14 executing program 2: 21:47:14 executing program 3: 21:47:14 executing program 5: 21:47:14 executing program 1: 21:47:14 executing program 2: 21:47:14 executing program 5: [ 407.353284] device nr0 entered promiscuous mode 21:47:14 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000080)='tunl0\x00', 0x27d) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1}, 0x10) r1 = socket$inet6(0xa, 0x0, 0x4) ioctl(r1, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) 21:47:14 executing program 1: 21:47:14 executing program 3: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1d, 0x3, 0x400000001, &(0x7f00000006c0)={0xffffffffffffffff}) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={0xffffffffffffffff, r0, 0x0, 0x1, &(0x7f00000000c0)='\x00'}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000200)={r2, r1, 0x0, 0x1, &(0x7f0000000140)='\x00'}, 0x30) 21:47:14 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x3, 0x4, 0x4, 0x40, 0x0, 0xffffffffffffff9c}, 0x2c) r0 = bpf$MAP_CREATE(0x4, &(0x7f0000000880)={0x3, 0x0, 0x0, 0x0, 0x20000000, 0x0}, 0x2c) r1 = socket$kcm(0x2, 0x1, 0x0) setsockopt$sock_attach_bpf(r1, 0x6, 0xa, &(0x7f0000000140)=r0, 0x4) 21:47:14 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1d, 0x3, 0x400000001, &(0x7f00000006c0)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x3) 21:47:14 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) socket$kcm(0x2, 0x3, 0x2) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0x50, &(0x7f0000000480)}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f0000000380)="6e7230010060a19ef9d2c623d9a1571cb9e1369bcd61ef7e49793ae18712eceb1daa769497800b7fbbd35b170c10751d39aeb660d863e49b8c4f3b3cad48902b5b2d6cfd0abd372c63bcf5d70df3fd4d2e8d443c88c60fd7140fbc0e5637dd82fc3435bed4de5d693c9a781c863e05d8a6f8689a5be29216061f3ff53f8b6b396678e7ba155ef9152d7e43b1eccb2331eb8eb1ed5586dcf8b3b0b999361a44ff2c22c2abbef42dd24eabe6723346a6e46c0499a21442d8d00dcb57f013ff7595edd0ff076930de3675d34117a44eb0e4f832936da44e") r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={"6e72300100", 0x801}) ioctl$TUNSETLINK(r1, 0x400454cd, 0x308) r2 = getpid() perf_event_open(&(0x7f0000000540)={0x0, 0x70, 0xf2, 0x4, 0x400, 0xadb0, 0x0, 0x0, 0x40000001110, 0x0, 0x2, 0x0, 0x0, 0x7, 0x5, 0x3, 0x401, 0x1, 0x5, 0x401, 0xce4, 0x87b, 0x3, 0x2, 0x9212, 0x0, 0x4, 0x40, 0x7ff, 0x100000001, 0x0, 0x6, 0x80000000, 0x6, 0xd7, 0x4, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={&(0x7f0000000500), 0xa}, 0x404c, 0x0, 0xffffffffffffffff}, r2, 0x9, 0xffffffffffffffff, 0xa) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='memory.stat\x00', 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000200)=@ax25={0x3, {"b8738e610d62ed"}}, 0x80, &(0x7f0000000040)}, 0x0) socket$kcm(0x29, 0x2, 0x0) 21:47:14 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) socket$kcm(0x2, 0x7, 0x2) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x12, 0x8, &(0x7f0000000140)=ANY=[@ANYBLOB="7a0af8ff00000000bfa100000000000007010000f8ffffffb702000008000000bd120000000000008500000006000000b7000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0xa}, 0x48) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) openat$cgroup_procs(r2, &(0x7f00000001c0)='tasks\x00', 0x2, 0x0) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00syz1\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f00000000c0)={r3, r1, 0xa}, 0x10) 21:47:14 executing program 2: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x615, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x11, 0x3, 0x0) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000180)=0x1, 0x4) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x16d3f06e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x4, 0x7f, 0xbc, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff, 0x0, 0x5, 0x0, 0x2c6a, 0x0, 0x0, 0x0, 0x0, 0x140, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x1}, 0x0, 0x7f, 0x7ff, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(r1, 0x107, 0x2, &(0x7f0000001640), 0x22) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000280)={&(0x7f0000000240)='./file0\x00'}, 0x10) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r0, 0x4008240b, &(0x7f00000001c0)={0x7, 0x70, 0x0, 0x1, 0x0, 0x38d2, 0x0, 0x1, 0x8010, 0x4, 0x6, 0x0, 0x3, 0x2, 0xffffffff, 0x0, 0xc0000000000, 0x6, 0x8e5, 0x28a, 0x8ee, 0xfffffffffffffeff, 0x7, 0x21, 0x9, 0x0, 0x6, 0x2, 0xc0, 0x0, 0x1, 0x2, 0x0, 0x3, 0x0, 0x80, 0x6, 0x8, 0x0, 0x80000000, 0x1, @perf_config_ext={0x0, 0x101}, 0x800, 0x8, 0x3, 0x6, 0x1, 0x9, 0x101}) 21:47:14 executing program 3: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1d, 0x3, 0x400000001, &(0x7f00000006c0)={0xffffffffffffffff}) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={0xffffffffffffffff, r0, 0x0, 0x1, &(0x7f00000000c0)='\x00'}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000200)={r2, r1, 0x0, 0x1, &(0x7f0000000140)='\x00'}, 0x30) 21:47:14 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1d, 0x3, 0x400000001, &(0x7f00000006c0)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x3) 21:47:14 executing program 5: r0 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000640)={&(0x7f0000000600)='./file0\x00', 0x0, 0x18}, 0x10) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000680)="0400", r0}, 0xffe5) bpf$BPF_PROG_DETACH(0x9, &(0x7f00000000c0)={0x0, r1, 0xf, 0x3}, 0x14) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r2) socket$kcm(0x2, 0x3, 0x2) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={r1, 0x50, &(0x7f0000000480)={0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000340)=r3, 0x4) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000380)="6e7230010060a19ef9d2c623d9a1571cb9e1369bcd61ef7e49793ae18712eceb1daa769497800b7fbbd35b170c10751d39aeb660d863e49b8c4f3b3cad48902b5b2d6cfd0abd372c63bcf5d70df3fd4d2e8d443c88c60fd7140fbc0e5637dd82fc3435bed4de5d693c9a781c863e05d8a6f8689a5be29216061f3ff53f8b6b396678e7ba155ef9152d7e43b1eccb2331eb8eb1ed5586dcf8b3b0b999361a44ff2c22c2abbef42dd24eabe6723346a6e46c0499a21442d8d00dcb57f013ff7595edd0ff076930de3675d34117a44eb0e4f832936da44e") r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000040)={"6e72300100", 0x801}) ioctl$TUNSETLINK(r4, 0x400454cd, 0x308) ioctl$TUNSETOFFLOAD(r4, 0x400454d0, 0x10) r5 = getpid() perf_event_open(&(0x7f0000000540)={0x0, 0x70, 0xf2, 0x4, 0x400, 0xadb0, 0x0, 0xd3, 0x40000001110, 0x0, 0x2, 0x0, 0x1bb, 0x7, 0x5, 0x3, 0x401, 0x1, 0x5, 0x401, 0xce4, 0x0, 0x3, 0x2, 0x9212, 0x0, 0x4, 0x40, 0x0, 0x100000001, 0x0, 0x6, 0x0, 0x6, 0xd7, 0x0, 0x0, 0x0, 0x0, 0x9b3, 0x4, @perf_bp={&(0x7f0000000500), 0xa}, 0x404c, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x1}, r5, 0x0, r1, 0xa) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)="2e2f6367726f75702e6e65742f73797a31eb", 0x1ff) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='memory.stat\x00', 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000200)=@ax25={0x3, {"b8738e610d62ed"}}, 0x80, &(0x7f0000000040)}, 0x0) socket$kcm(0x29, 0x2, 0x0) 21:47:14 executing program 3: syz_emit_ethernet(0x1, &(0x7f00000003c0)=ANY=[@ANYBLOB="aaaaaaaaaaaa00000000000086dd60ea80e900100090daef83c5449bc298b7408a00ff0200000000000002000000000000010000000000000000000000000000000000000000"], &(0x7f0000000200)) [ 408.021452] device nr0 entered promiscuous mode [ 408.227616] device nr0 entered promiscuous mode 21:47:15 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000080)='tunl0\x00', 0x27d) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1}, 0x10) r1 = socket$inet6(0xa, 0x0, 0x4) ioctl(r1, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) 21:47:15 executing program 2: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x615, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x11, 0x3, 0x0) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000180)=0x1, 0x4) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x16d3f06e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x4, 0x7f, 0xbc, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff, 0x0, 0x5, 0x0, 0x2c6a, 0x0, 0x0, 0x0, 0x0, 0x140, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x1}, 0x0, 0x7f, 0x7ff, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(r1, 0x107, 0x2, &(0x7f0000001640), 0x22) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000280)={&(0x7f0000000240)='./file0\x00'}, 0x10) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r0, 0x4008240b, &(0x7f00000001c0)={0x7, 0x70, 0x0, 0x1, 0x0, 0x38d2, 0x0, 0x1, 0x8010, 0x4, 0x6, 0x0, 0x3, 0x2, 0xffffffff, 0x0, 0xc0000000000, 0x6, 0x8e5, 0x28a, 0x8ee, 0xfffffffffffffeff, 0x7, 0x21, 0x9, 0x0, 0x6, 0x2, 0xc0, 0x0, 0x1, 0x2, 0x0, 0x3, 0x0, 0x80, 0x6, 0x8, 0x0, 0x80000000, 0x1, @perf_config_ext={0x0, 0x101}, 0x800, 0x8, 0x3, 0x6, 0x1, 0x9, 0x101}) 21:47:15 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000027c0)=[{&(0x7f0000000140)="24000000220007031dfffd946f610500000000000000fd21fe1c4095421ba3a20400ff7e280000001100ffffba16a0aa1ce208b3ef090000000000008e3141eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 21:47:15 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) socket$kcm(0x2, 0x7, 0x2) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x12, 0x8, &(0x7f0000000140)=ANY=[@ANYBLOB="7a0af8ff00000000bfa100000000000007010000f8ffffffb702000008000000bd120000000000008500000006000000b7000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0xa}, 0x48) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) openat$cgroup_procs(r2, &(0x7f00000001c0)='tasks\x00', 0x2, 0x0) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00syz1\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f00000000c0)={r3, r1, 0xa}, 0x10) 21:47:16 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000080)='tunl0\x00', 0x27d) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1}, 0x10) r1 = socket$inet6(0xa, 0x80003, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) [ 409.290266] netlink: 8 bytes leftover after parsing attributes in process `syz-executor3'. [ 409.309718] netlink: 8 bytes leftover after parsing attributes in process `syz-executor3'. 21:47:16 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) socket$kcm(0x2, 0x3, 0x2) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0x50, &(0x7f0000000480)}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f0000000380)="6e7230010060a19ef9d2c623d9a1571cb9e1369bcd61ef7e49793ae18712eceb1daa769497800b7fbbd35b170c10751d39aeb660d863e49b8c4f3b3cad48902b5b2d6cfd0abd372c63bcf5d70df3fd4d2e8d443c88c60fd7140fbc0e5637dd82fc3435bed4de5d693c9a781c863e05d8a6f8689a5be29216061f3ff53f8b6b396678e7ba155ef9152d7e43b1eccb2331eb8eb1ed5586dcf8b3b0b999361a44ff2c22c2abbef42dd24eabe6723346a6e46c0499a21442d8d00dcb57f013ff7595edd0ff076930de3675d34117a44eb0e4f832936da44e") r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={"6e72300100", 0x801}) ioctl$TUNSETLINK(r1, 0x400454cd, 0x308) r2 = getpid() perf_event_open(&(0x7f0000000540)={0x0, 0x70, 0xf2, 0x4, 0x400, 0xadb0, 0x0, 0x0, 0x40000001110, 0x0, 0x2, 0x0, 0x0, 0x7, 0x5, 0x3, 0x401, 0x1, 0x5, 0x401, 0xce4, 0x87b, 0x3, 0x2, 0x9212, 0x0, 0x4, 0x40, 0x7ff, 0x100000001, 0x0, 0x6, 0x80000000, 0x6, 0xd7, 0x4, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={&(0x7f0000000500), 0xa}, 0x404c, 0x0, 0xffffffffffffffff}, r2, 0x9, 0xffffffffffffffff, 0xa) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='memory.stat\x00', 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000200)=@ax25={0x3, {"b8738e610d62ed"}}, 0x80, &(0x7f0000000040)}, 0x0) socket$kcm(0x29, 0x2, 0x0) 21:47:16 executing program 3: setsockopt$IP_VS_SO_SET_TIMEOUT(0xffffffffffffffff, 0x0, 0x48a, &(0x7f0000000140)={0x0, 0x7ffd, 0x80000002}, 0xc) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, &(0x7f0000000100)={&(0x7f0000ffb000/0x4000)=nil, 0x4000}, &(0x7f0000000180)=0x10) pipe(&(0x7f00000007c0)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r0, &(0x7f0000000000), 0x12c, 0x0) 21:47:16 executing program 3: recvmmsg(0xffffffffffffffff, &(0x7f0000002500)=[{{&(0x7f0000002040)=@generic, 0x80, &(0x7f00000023c0), 0x0, &(0x7f0000002440)=""/73, 0x49}}], 0x1, 0x0, &(0x7f0000002640)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='attr/keycreate\x00') pwritev(r1, &(0x7f0000001400), 0x2a6, 0x0) socket$nl_route(0x10, 0x3, 0x0) 21:47:16 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) socket$kcm(0x2, 0x7, 0x2) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x12, 0x8, &(0x7f0000000140)=ANY=[@ANYBLOB="7a0af8ff00000000bfa100000000000007010000f8ffffffb702000008000000bd120000000000008500000006000000b7000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0xa}, 0x48) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) openat$cgroup_procs(r2, &(0x7f00000001c0)='tasks\x00', 0x2, 0x0) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00syz1\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f00000000c0)={r3, r1, 0xa}, 0x10) 21:47:17 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000080)='tunl0\x00', 0x27d) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1}, 0x10) r1 = socket$inet6(0xa, 0x80003, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) 21:47:17 executing program 5: r0 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000640)={&(0x7f0000000600)='./file0\x00', 0x0, 0x18}, 0x10) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000680)="0400", r0}, 0xffe5) bpf$BPF_PROG_DETACH(0x9, &(0x7f00000000c0)={0x0, r1, 0xf, 0x3}, 0x14) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r2) socket$kcm(0x2, 0x3, 0x2) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={r1, 0x50, &(0x7f0000000480)={0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000340)=r3, 0x4) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000380)="6e7230010060a19ef9d2c623d9a1571cb9e1369bcd61ef7e49793ae18712eceb1daa769497800b7fbbd35b170c10751d39aeb660d863e49b8c4f3b3cad48902b5b2d6cfd0abd372c63bcf5d70df3fd4d2e8d443c88c60fd7140fbc0e5637dd82fc3435bed4de5d693c9a781c863e05d8a6f8689a5be29216061f3ff53f8b6b396678e7ba155ef9152d7e43b1eccb2331eb8eb1ed5586dcf8b3b0b999361a44ff2c22c2abbef42dd24eabe6723346a6e46c0499a21442d8d00dcb57f013ff7595edd0ff076930de3675d34117a44eb0e4f832936da44e") r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000040)={"6e72300100", 0x801}) ioctl$TUNSETLINK(r4, 0x400454cd, 0x308) ioctl$TUNSETOFFLOAD(r4, 0x400454d0, 0x10) r5 = getpid() perf_event_open(&(0x7f0000000540)={0x0, 0x70, 0xf2, 0x4, 0x400, 0xadb0, 0x0, 0xd3, 0x40000001110, 0x0, 0x2, 0x0, 0x1bb, 0x7, 0x5, 0x3, 0x401, 0x1, 0x5, 0x401, 0xce4, 0x0, 0x3, 0x2, 0x9212, 0x0, 0x4, 0x40, 0x0, 0x100000001, 0x0, 0x6, 0x0, 0x6, 0xd7, 0x0, 0x0, 0x0, 0x0, 0x9b3, 0x4, @perf_bp={&(0x7f0000000500), 0xa}, 0x404c, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x1}, r5, 0x0, r1, 0xa) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)="2e2f6367726f75702e6e65742f73797a31eb", 0x1ff) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='memory.stat\x00', 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000200)=@ax25={0x3, {"b8738e610d62ed"}}, 0x80, &(0x7f0000000040)}, 0x0) socket$kcm(0x29, 0x2, 0x0) 21:47:17 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f00000000c0)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$inet_tcp_int(r1, 0x6, 0x20000000000a, &(0x7f00000001c0)=0xcba8, 0x4) sendto$inet(r1, &(0x7f0000a88f88), 0xfffffffffffffea0, 0x20000800, &(0x7f0000e68000)={0x2, 0x4e23}, 0x10) setsockopt$inet6_tcp_int(r1, 0x6, 0xa, &(0x7f0000000000)=0x29a, 0x4) readv(r1, &(0x7f0000000100)=[{&(0x7f00000018c0)=""/177, 0x33}], 0x1) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000140), 0x0) 21:47:17 executing program 1: r0 = socket$inet6(0xa, 0x1080000000002, 0x0) ioctl(r0, 0x4000100000008912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f00000002c0)={0xa, 0x0, 0x0, @local, 0x3}, 0x1c) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r2, &(0x7f000014f000)={&(0x7f00003c7ff4), 0xc, &(0x7f00000bfff0)={&(0x7f0000006440)=@updpolicy={0xb8, 0x19, 0x1, 0x0, 0x0, {{@in6=@mcast1, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0xa}}}, 0xb8}}, 0x0) setsockopt$inet6_MCAST_MSFILTER(r1, 0x29, 0x30, &(0x7f0000000180)={0x0, {{0xa, 0x0, 0x0, @mcast2}}, 0x1}, 0x90) 21:47:17 executing program 2: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x615, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x11, 0x3, 0x0) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000180)=0x1, 0x4) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x16d3f06e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x4, 0x7f, 0xbc, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff, 0x0, 0x5, 0x0, 0x2c6a, 0x0, 0x0, 0x0, 0x0, 0x140, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x1}, 0x0, 0x7f, 0x7ff, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(r1, 0x107, 0x2, &(0x7f0000001640), 0x22) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000280)={&(0x7f0000000240)='./file0\x00'}, 0x10) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r0, 0x4008240b, &(0x7f00000001c0)={0x7, 0x70, 0x0, 0x1, 0x0, 0x38d2, 0x0, 0x1, 0x8010, 0x4, 0x6, 0x0, 0x3, 0x2, 0xffffffff, 0x0, 0xc0000000000, 0x6, 0x8e5, 0x28a, 0x8ee, 0xfffffffffffffeff, 0x7, 0x21, 0x9, 0x0, 0x6, 0x2, 0xc0, 0x0, 0x1, 0x2, 0x0, 0x3, 0x0, 0x80, 0x6, 0x8, 0x0, 0x80000000, 0x1, @perf_config_ext={0x0, 0x101}, 0x800, 0x8, 0x3, 0x6, 0x1, 0x9, 0x101}) 21:47:17 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) socket$kcm(0x2, 0x3, 0x2) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0x50, &(0x7f0000000480)}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f0000000380)="6e7230010060a19ef9d2c623d9a1571cb9e1369bcd61ef7e49793ae18712eceb1daa769497800b7fbbd35b170c10751d39aeb660d863e49b8c4f3b3cad48902b5b2d6cfd0abd372c63bcf5d70df3fd4d2e8d443c88c60fd7140fbc0e5637dd82fc3435bed4de5d693c9a781c863e05d8a6f8689a5be29216061f3ff53f8b6b396678e7ba155ef9152d7e43b1eccb2331eb8eb1ed5586dcf8b3b0b999361a44ff2c22c2abbef42dd24eabe6723346a6e46c0499a21442d8d00dcb57f013ff7595edd0ff076930de3675d34117a44eb0e4f832936da44e") r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={"6e72300100", 0x801}) ioctl$TUNSETLINK(r1, 0x400454cd, 0x308) r2 = getpid() perf_event_open(&(0x7f0000000540)={0x0, 0x70, 0xf2, 0x4, 0x400, 0xadb0, 0x0, 0x0, 0x40000001110, 0x0, 0x2, 0x0, 0x0, 0x7, 0x5, 0x3, 0x401, 0x1, 0x5, 0x401, 0xce4, 0x87b, 0x3, 0x2, 0x9212, 0x0, 0x4, 0x40, 0x7ff, 0x100000001, 0x0, 0x6, 0x80000000, 0x6, 0xd7, 0x4, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={&(0x7f0000000500), 0xa}, 0x404c, 0x0, 0xffffffffffffffff}, r2, 0x9, 0xffffffffffffffff, 0xa) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='memory.stat\x00', 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000200)=@ax25={0x3, {"b8738e610d62ed"}}, 0x80, &(0x7f0000000040)}, 0x0) socket$kcm(0x29, 0x2, 0x0) 21:47:17 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) fcntl$getflags(r0, 0x1) 21:47:17 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000100)=[@text32={0x20, &(0x7f0000000000)="6601669b0f35c4e1fe16846ba49e0000b9940200000f32c4c23dad78e0b9670900000f32660f38827f95b0040f01d10fc71a", 0x32}], 0x1, 0x0, &(0x7f0000000080), 0x0) syz_kvm_setup_cpu$x86(r1, r3, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000180)=[@text32={0x20, &(0x7f0000000880)="b805000000b98b9400000f01c19a01000000b0000f43d1b8000000000f23d80f21f835800000900f23f80f060f2140b9800000c00f3235000800000f3066ba4300b8f1ffffffefb9800000c00f3235002000000f30c4c3295f4da400", 0x5c}], 0x1, 0x0, &(0x7f0000000140), 0x0) [ 410.884635] device nr0 entered promiscuous mode 21:47:17 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$inet_MCAST_MSFILTER(r1, 0x0, 0x30, &(0x7f0000000100)={0x0, {{0x2, 0x0, @broadcast}}, 0x0, 0x1, [{{0x2, 0x0, @multicast1}}]}, 0x110) 21:47:17 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000080)='tunl0\x00', 0x27d) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1}, 0x10) r1 = socket$inet6(0xa, 0x80003, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) 21:47:18 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000000c0)=0x65, 0x4) bind$inet(r0, &(0x7f0000000200)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0x3f8, 0x4) sendto$inet(r0, &(0x7f0000a88f88), 0xfffffffffffffe6e, 0x20000000, &(0x7f0000e68000)={0x2, 0x4004e23, @local}, 0x10) shutdown(r0, 0x1) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 21:47:18 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = socket$inet6(0xa, 0x400000801, 0x0) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0a5c2d023c126285718070") connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) 21:47:18 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000080)='tunl0\x00', 0x27d) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1}, 0x10) socket$inet6(0xa, 0x80003, 0x4) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) 21:47:19 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) socket$kcm(0x2, 0x3, 0x2) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0x50, &(0x7f0000000480)}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f0000000380)="6e7230010060a19ef9d2c623d9a1571cb9e1369bcd61ef7e49793ae18712eceb1daa769497800b7fbbd35b170c10751d39aeb660d863e49b8c4f3b3cad48902b5b2d6cfd0abd372c63bcf5d70df3fd4d2e8d443c88c60fd7140fbc0e5637dd82fc3435bed4de5d693c9a781c863e05d8a6f8689a5be29216061f3ff53f8b6b396678e7ba155ef9152d7e43b1eccb2331eb8eb1ed5586dcf8b3b0b999361a44ff2c22c2abbef42dd24eabe6723346a6e46c0499a21442d8d00dcb57f013ff7595edd0ff076930de3675d34117a44eb0e4f832936da44e") r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={"6e72300100", 0x801}) ioctl$TUNSETLINK(r1, 0x400454cd, 0x308) r2 = getpid() perf_event_open(&(0x7f0000000540)={0x0, 0x70, 0xf2, 0x4, 0x400, 0xadb0, 0x0, 0x0, 0x40000001110, 0x0, 0x2, 0x0, 0x0, 0x7, 0x5, 0x3, 0x401, 0x1, 0x5, 0x401, 0xce4, 0x87b, 0x3, 0x2, 0x9212, 0x0, 0x4, 0x40, 0x7ff, 0x100000001, 0x0, 0x6, 0x80000000, 0x6, 0xd7, 0x4, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={&(0x7f0000000500), 0xa}, 0x404c, 0x0, 0xffffffffffffffff}, r2, 0x9, 0xffffffffffffffff, 0xa) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='memory.stat\x00', 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000200)=@ax25={0x3, {"b8738e610d62ed"}}, 0x80, &(0x7f0000000040)}, 0x0) socket$kcm(0x29, 0x2, 0x0) 21:47:19 executing program 3: r0 = gettid() timer_create(0x0, &(0x7f0000000000)={0x0, 0x12}, &(0x7f0000000180)) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x5, 0x0) write(r1, &(0x7f0000c34fff), 0xffffff0b) timer_settime(0x0, 0x0, &(0x7f0000000040)={{0x0, 0x8}, {0x0, 0x989680}}, &(0x7f0000040000)) tkill(r0, 0x1000000000016) 21:47:19 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x6, &(0x7f0000000080)=0x32, 0x4) poll(&(0x7f0000000000)=[{r0}], 0x1, 0x7e) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f00000000c0)=0x3, 0x4) connect$inet(r0, &(0x7f0000000040)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r0, &(0x7f0000004e00)=[{{0x0, 0x0, &(0x7f0000001f80), 0x0, &(0x7f0000001fc0)}}], 0x400000000000047, 0x0) 21:47:19 executing program 5: r0 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000640)={&(0x7f0000000600)='./file0\x00', 0x0, 0x18}, 0x10) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000680)="0400", r0}, 0xffe5) bpf$BPF_PROG_DETACH(0x9, &(0x7f00000000c0)={0x0, r1, 0xf, 0x3}, 0x14) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r2) socket$kcm(0x2, 0x3, 0x2) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={r1, 0x50, &(0x7f0000000480)={0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000340)=r3, 0x4) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000380)="6e7230010060a19ef9d2c623d9a1571cb9e1369bcd61ef7e49793ae18712eceb1daa769497800b7fbbd35b170c10751d39aeb660d863e49b8c4f3b3cad48902b5b2d6cfd0abd372c63bcf5d70df3fd4d2e8d443c88c60fd7140fbc0e5637dd82fc3435bed4de5d693c9a781c863e05d8a6f8689a5be29216061f3ff53f8b6b396678e7ba155ef9152d7e43b1eccb2331eb8eb1ed5586dcf8b3b0b999361a44ff2c22c2abbef42dd24eabe6723346a6e46c0499a21442d8d00dcb57f013ff7595edd0ff076930de3675d34117a44eb0e4f832936da44e") r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000040)={"6e72300100", 0x801}) ioctl$TUNSETLINK(r4, 0x400454cd, 0x308) ioctl$TUNSETOFFLOAD(r4, 0x400454d0, 0x10) r5 = getpid() perf_event_open(&(0x7f0000000540)={0x0, 0x70, 0xf2, 0x4, 0x400, 0xadb0, 0x0, 0xd3, 0x40000001110, 0x0, 0x2, 0x0, 0x1bb, 0x7, 0x5, 0x3, 0x401, 0x1, 0x5, 0x401, 0xce4, 0x0, 0x3, 0x2, 0x9212, 0x0, 0x4, 0x40, 0x0, 0x100000001, 0x0, 0x6, 0x0, 0x6, 0xd7, 0x0, 0x0, 0x0, 0x0, 0x9b3, 0x4, @perf_bp={&(0x7f0000000500), 0xa}, 0x404c, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x1}, r5, 0x0, r1, 0xa) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)="2e2f6367726f75702e6e65742f73797a31eb", 0x1ff) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='memory.stat\x00', 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000200)=@ax25={0x3, {"b8738e610d62ed"}}, 0x80, &(0x7f0000000040)}, 0x0) socket$kcm(0x29, 0x2, 0x0) 21:47:19 executing program 1: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) write$nbd(r1, &(0x7f00000001c0)=ANY=[@ANYBLOB], 0x1) close(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) sendto$inet6(r2, &(0x7f0000000040)="fc", 0x1, 0x20000004, &(0x7f0000000180)={0xa, 0x4e22}, 0x1c) splice(r0, 0x0, r1, 0x0, 0x3, 0x0) 21:47:19 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$sock_int(r0, 0x1, 0x2d, &(0x7f0000000040), 0x4) 21:47:19 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000080)='tunl0\x00', 0x27d) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1}, 0x10) socket$inet6(0xa, 0x80003, 0x4) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) [ 412.925159] device nr0 entered promiscuous mode 21:47:19 executing program 1: r0 = socket(0xa, 0x2, 0x0) setsockopt$inet_int(r0, 0x0, 0x15, &(0x7f0000000080), 0x4) 21:47:19 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000000c0)={"62906e643000"}) 21:47:19 executing program 2: unshare(0x24020400) mknod(&(0x7f00000056c0)='./file0\x00', 0x1040, 0x0) execve(&(0x7f0000f8aff8)='./file0\x00', &(0x7f0000000180), &(0x7f00000002c0)) r0 = syz_open_procfs(0x0, &(0x7f0000002680)='syscall\x00') read(r0, &(0x7f0000000780)=""/234, 0xea) sendfile(r0, r0, &(0x7f0000000080)=0x800000100, 0x4000000000200) open(&(0x7f0000000000)='./file0\x00', 0x401, 0x0) 21:47:20 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000140)=0x75, 0x4) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, &(0x7f0000a88f88), 0xfffffffffffffe6e, 0x20000000, &(0x7f0000e68000)={0x2, 0x4004e23, @local}, 0x10) 21:47:20 executing program 2: unshare(0x24020400) mknod(&(0x7f00000056c0)='./file0\x00', 0x1040, 0x0) execve(&(0x7f0000f8aff8)='./file0\x00', &(0x7f0000000180), &(0x7f00000002c0)) r0 = syz_open_procfs(0x0, &(0x7f0000002680)='syscall\x00') read(r0, &(0x7f0000000780)=""/234, 0xea) sendfile(r0, r0, &(0x7f0000000080)=0x800000100, 0x4000000000200) open(&(0x7f0000000000)='./file0\x00', 0x401, 0x0) 21:47:21 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) socket$kcm(0x2, 0x0, 0x2) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0x50, &(0x7f0000000480)}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f0000000380)="6e7230010060a19ef9d2c623d9a1571cb9e1369bcd61ef7e49793ae18712eceb1daa769497800b7fbbd35b170c10751d39aeb660d863e49b8c4f3b3cad48902b5b2d6cfd0abd372c63bcf5d70df3fd4d2e8d443c88c60fd7140fbc0e5637dd82fc3435bed4de5d693c9a781c863e05d8a6f8689a5be29216061f3ff53f8b6b396678e7ba155ef9152d7e43b1eccb2331eb8eb1ed5586dcf8b3b0b999361a44ff2c22c2abbef42dd24eabe6723346a6e46c0499a21442d8d00dcb57f013ff7595edd0ff076930de3675d34117a44eb0e4f832936da44e") r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={"6e72300100", 0x801}) ioctl$TUNSETLINK(r1, 0x400454cd, 0x308) r2 = getpid() perf_event_open(&(0x7f0000000540)={0x0, 0x70, 0xf2, 0x4, 0x400, 0xadb0, 0x0, 0x0, 0x40000001110, 0x0, 0x2, 0x0, 0x0, 0x7, 0x5, 0x3, 0x401, 0x1, 0x5, 0x401, 0xce4, 0x87b, 0x3, 0x2, 0x9212, 0x0, 0x4, 0x40, 0x7ff, 0x100000001, 0x0, 0x6, 0x80000000, 0x6, 0xd7, 0x4, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={&(0x7f0000000500), 0xa}, 0x404c, 0x0, 0xffffffffffffffff}, r2, 0x9, 0xffffffffffffffff, 0xa) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='memory.stat\x00', 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000200)=@ax25={0x3, {"b8738e610d62ed"}}, 0x80, &(0x7f0000000040)}, 0x0) socket$kcm(0x29, 0x2, 0x0) 21:47:21 executing program 2: unshare(0x24020400) mknod(&(0x7f00000056c0)='./file0\x00', 0x1040, 0x0) execve(&(0x7f0000f8aff8)='./file0\x00', &(0x7f0000000180), &(0x7f00000002c0)) r0 = syz_open_procfs(0x0, &(0x7f0000002680)='syscall\x00') read(r0, &(0x7f0000000780)=""/234, 0xea) sendfile(r0, r0, &(0x7f0000000080)=0x800000100, 0x4000000000200) open(&(0x7f0000000000)='./file0\x00', 0x401, 0x0) 21:47:21 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000080)='tunl0\x00', 0x27d) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1}, 0x10) socket$inet6(0xa, 0x80003, 0x4) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) 21:47:21 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) r1 = socket$inet6(0xa, 0x803, 0x7) ioctl$FS_IOC_GETFLAGS(r0, 0x80086601, &(0x7f0000000100)) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0a5c2d023c126285718070") bind$inet(r0, &(0x7f0000deb000)={0x2, 0x3, @broadcast}, 0x10) sendto$inet(r0, &(0x7f00000001c0), 0x0, 0x200007ff, &(0x7f0000deaff0)={0x2, 0x3, @loopback}, 0x10) sendto(r0, &(0x7f0000000380)="80", 0x1, 0x1, &(0x7f0000000040)=@un=@abs, 0x80) recvmsg(r0, &(0x7f00000003c0)={&(0x7f00000004c0)=@in6={0xa, 0x0, 0x0, @remote}, 0x80, &(0x7f00000009c0)=[{&(0x7f00000006c0)=""/227, 0xe3}], 0x1, &(0x7f0000000a40)=""/207, 0xcf}, 0x2) sendto$inet(r0, &(0x7f00000002c0)=' ', 0x1, 0x1, &(0x7f0000000200)={0x2, 0x0, @dev}, 0x10) 21:47:21 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) recvmsg(r0, &(0x7f00000003c0)={&(0x7f00000004c0)=@in6={0xa, 0x0, 0x0, @remote}, 0x80, &(0x7f00000009c0), 0x0, &(0x7f0000000a40)=""/207, 0xcf}, 0x2) 21:47:21 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000000)={@local}, 0xfdf7) 21:47:21 executing program 3: socketpair$packet(0x11, 0x3, 0x300, &(0x7f0000000000)) 21:47:21 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_mtu(r1, 0x29, 0x17, &(0x7f0000000140)=0x3, 0x4) sendto$inet6(r1, &(0x7f0000000280), 0x895ff3b0, 0x20000004, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @empty={[0xe000000d2070000]}}, 0x1c) r2 = accept(r0, 0x0, &(0x7f0000000080)=0xfffffffffffffdfd) close(r2) 21:47:21 executing program 2: unshare(0x24020400) mknod(&(0x7f00000056c0)='./file0\x00', 0x1040, 0x0) execve(&(0x7f0000f8aff8)='./file0\x00', &(0x7f0000000180), &(0x7f00000002c0)) r0 = syz_open_procfs(0x0, &(0x7f0000002680)='syscall\x00') read(r0, &(0x7f0000000780)=""/234, 0xea) sendfile(r0, r0, &(0x7f0000000080)=0x800000100, 0x4000000000200) open(&(0x7f0000000000)='./file0\x00', 0x401, 0x0) 21:47:21 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) socket$kcm(0x2, 0x3, 0x2) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0x50, &(0x7f0000000480)}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, &(0x7f0000000380)="6e7230010060a19ef9d2c623d9a1571cb9e1369bcd61ef7e49793ae18712eceb1daa769497800b7fbbd35b170c10751d39aeb660d863e49b8c4f3b3cad48902b5b2d6cfd0abd372c63bcf5d70df3fd4d2e8d443c88c60fd7140fbc0e5637dd82fc3435bed4de5d693c9a781c863e05d8a6f8689a5be29216061f3ff53f8b6b396678e7ba155ef9152d7e43b1eccb2331eb8eb1ed5586dcf8b3b0b999361a44ff2c22c2abbef42dd24eabe6723346a6e46c0499a21442d8d00dcb57f013ff7595edd0ff076930de3675d34117a44eb0e4f832936da44e") r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={"6e72300100", 0x801}) ioctl$TUNSETLINK(r1, 0x400454cd, 0x308) r2 = getpid() perf_event_open(&(0x7f0000000540)={0x0, 0x70, 0xf2, 0x4, 0x400, 0xadb0, 0x0, 0x0, 0x40000001110, 0x0, 0x2, 0x0, 0x0, 0x7, 0x5, 0x3, 0x401, 0x1, 0x5, 0x401, 0xce4, 0x87b, 0x3, 0x2, 0x9212, 0x0, 0x4, 0x40, 0x7ff, 0x100000001, 0x0, 0x6, 0x80000000, 0x6, 0xd7, 0x4, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={&(0x7f0000000500), 0xa}, 0x404c, 0x0, 0xffffffffffffffff}, r2, 0x9, 0xffffffffffffffff, 0xa) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='memory.stat\x00', 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000200)=@ax25={0x3, {"b8738e610d62ed"}}, 0x80, &(0x7f0000000040)}, 0x0) socket$kcm(0x29, 0x2, 0x0) [ 414.476090] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 21:47:21 executing program 3: 21:47:21 executing program 2: unshare(0x24020400) mknod(&(0x7f00000056c0)='./file0\x00', 0x1040, 0x0) execve(&(0x7f0000f8aff8)='./file0\x00', &(0x7f0000000180), &(0x7f00000002c0)) r0 = syz_open_procfs(0x0, &(0x7f0000002680)='syscall\x00') read(r0, &(0x7f0000000780)=""/234, 0xea) sendfile(r0, r0, &(0x7f0000000080)=0x800000100, 0x4000000000200) 21:47:21 executing program 1: 21:47:21 executing program 3: 21:47:22 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000080)='tunl0\x00', 0x27d) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1}, 0x10) r1 = socket$inet6(0xa, 0x80003, 0x4) ioctl(r1, 0x0, &(0x7f0000000280)="153f6234488dd25d766070") connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) 21:47:22 executing program 5: 21:47:22 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) socket$kcm(0x2, 0x3, 0x2) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0x50, &(0x7f0000000480)}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f0000000380)="6e7230010060a19ef9d2c623d9a1571cb9e1369bcd61ef7e49793ae18712eceb1daa769497800b7fbbd35b170c10751d39aeb660d863e49b8c4f3b3cad48902b5b2d6cfd0abd372c63bcf5d70df3fd4d2e8d443c88c60fd7140fbc0e5637dd82fc3435bed4de5d693c9a781c863e05d8a6f8689a5be29216061f3ff53f8b6b396678e7ba155ef9152d7e43b1eccb2331eb8eb1ed5586dcf8b3b0b999361a44ff2c22c2abbef42dd24eabe6723346a6e46c0499a21442d8d00dcb57f013ff7595edd0ff076930de3675d34117a44eb0e4f832936da44e") r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000040)={"6e72300100", 0x801}) ioctl$TUNSETLINK(r1, 0x400454cd, 0x308) r2 = getpid() perf_event_open(&(0x7f0000000540)={0x0, 0x70, 0xf2, 0x4, 0x400, 0xadb0, 0x0, 0x0, 0x40000001110, 0x0, 0x2, 0x0, 0x0, 0x7, 0x5, 0x3, 0x401, 0x1, 0x5, 0x401, 0xce4, 0x87b, 0x3, 0x2, 0x9212, 0x0, 0x4, 0x40, 0x7ff, 0x100000001, 0x0, 0x6, 0x80000000, 0x6, 0xd7, 0x4, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={&(0x7f0000000500), 0xa}, 0x404c, 0x0, 0xffffffffffffffff}, r2, 0x9, 0xffffffffffffffff, 0xa) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='memory.stat\x00', 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000200)=@ax25={0x3, {"b8738e610d62ed"}}, 0x80, &(0x7f0000000040)}, 0x0) socket$kcm(0x29, 0x2, 0x0) 21:47:22 executing program 1: 21:47:22 executing program 3: 21:47:22 executing program 3: 21:47:22 executing program 1: 21:47:22 executing program 5: 21:47:22 executing program 5: 21:47:22 executing program 2: unshare(0x24020400) mknod(&(0x7f00000056c0)='./file0\x00', 0x1040, 0x0) execve(&(0x7f0000f8aff8)='./file0\x00', &(0x7f0000000180), &(0x7f00000002c0)) r0 = syz_open_procfs(0x0, &(0x7f0000002680)='syscall\x00') sendfile(r0, r0, &(0x7f0000000080)=0x800000100, 0x4000000000200) 21:47:22 executing program 1: 21:47:22 executing program 3: 21:47:22 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000080)='tunl0\x00', 0x27d) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1}, 0x10) r1 = socket$inet6(0xa, 0x80003, 0x4) ioctl(r1, 0x0, &(0x7f0000000280)="153f6234488dd25d766070") connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) 21:47:22 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) socket$kcm(0x2, 0x3, 0x2) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0x50, &(0x7f0000000480)}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f0000000380)="6e7230010060a19ef9d2c623d9a1571cb9e1369bcd61ef7e49793ae18712eceb1daa769497800b7fbbd35b170c10751d39aeb660d863e49b8c4f3b3cad48902b5b2d6cfd0abd372c63bcf5d70df3fd4d2e8d443c88c60fd7140fbc0e5637dd82fc3435bed4de5d693c9a781c863e05d8a6f8689a5be29216061f3ff53f8b6b396678e7ba155ef9152d7e43b1eccb2331eb8eb1ed5586dcf8b3b0b999361a44ff2c22c2abbef42dd24eabe6723346a6e46c0499a21442d8d00dcb57f013ff7595edd0ff076930de3675d34117a44eb0e4f832936da44e") r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={"6e72300100"}) ioctl$TUNSETLINK(r1, 0x400454cd, 0x308) r2 = getpid() perf_event_open(&(0x7f0000000540)={0x0, 0x70, 0xf2, 0x4, 0x400, 0xadb0, 0x0, 0x0, 0x40000001110, 0x0, 0x2, 0x0, 0x0, 0x7, 0x5, 0x3, 0x401, 0x1, 0x5, 0x401, 0xce4, 0x87b, 0x3, 0x2, 0x9212, 0x0, 0x4, 0x40, 0x7ff, 0x100000001, 0x0, 0x6, 0x80000000, 0x6, 0xd7, 0x4, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={&(0x7f0000000500), 0xa}, 0x404c, 0x0, 0xffffffffffffffff}, r2, 0x9, 0xffffffffffffffff, 0xa) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='memory.stat\x00', 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000200)=@ax25={0x3, {"b8738e610d62ed"}}, 0x80, &(0x7f0000000040)}, 0x0) socket$kcm(0x29, 0x2, 0x0) 21:47:22 executing program 5: 21:47:22 executing program 3: 21:47:22 executing program 1: 21:47:22 executing program 5: 21:47:22 executing program 1: 21:47:22 executing program 3: 21:47:22 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000029000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg(r0, &(0x7f0000003b80)=[{{&(0x7f0000000700)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, 0x80, &(0x7f0000001c00), 0x0, &(0x7f0000001c80)=[{0x10, 0x1}], 0x10}}], 0x1, 0x40000) 21:47:23 executing program 2: unshare(0x24020400) mknod(&(0x7f00000056c0)='./file0\x00', 0x1040, 0x0) execve(&(0x7f0000f8aff8)='./file0\x00', &(0x7f0000000180), &(0x7f00000002c0)) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000080)=0x800000100, 0x4000000000200) 21:47:23 executing program 3: socketpair(0x1, 0x20000000000001, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f0000000300)="6c6f00966fd651b959a9c84a2c00d297c00edc0d") perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000000380)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000340)}}) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000002c0)={0xffffffffffffffff, &(0x7f0000000300), &(0x7f0000000040)}, 0x20) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000005c0)='memory.current\x00', 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000980)={0xffffffffffffffff, 0x28, &(0x7f0000000100)}, 0x10) 21:47:23 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x3}, 0x1c) r1 = fcntl$dupfd(r0, 0x0, r0) recvfrom$packet(r1, &(0x7f0000000340)=""/251, 0xfb, 0x0, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x14) shutdown(r1, 0x0) 21:47:23 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000080)='tunl0\x00', 0x27d) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1}, 0x10) r1 = socket$inet6(0xa, 0x80003, 0x4) ioctl(r1, 0x0, &(0x7f0000000280)="153f6234488dd25d766070") connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) 21:47:23 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) socket$kcm(0x2, 0x3, 0x2) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0x50, &(0x7f0000000480)}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f0000000380)="6e7230010060a19ef9d2c623d9a1571cb9e1369bcd61ef7e49793ae18712eceb1daa769497800b7fbbd35b170c10751d39aeb660d863e49b8c4f3b3cad48902b5b2d6cfd0abd372c63bcf5d70df3fd4d2e8d443c88c60fd7140fbc0e5637dd82fc3435bed4de5d693c9a781c863e05d8a6f8689a5be29216061f3ff53f8b6b396678e7ba155ef9152d7e43b1eccb2331eb8eb1ed5586dcf8b3b0b999361a44ff2c22c2abbef42dd24eabe6723346a6e46c0499a21442d8d00dcb57f013ff7595edd0ff076930de3675d34117a44eb0e4f832936da44e") r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={"6e72300100", 0x801}) ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x308) r2 = getpid() perf_event_open(&(0x7f0000000540)={0x0, 0x70, 0xf2, 0x4, 0x400, 0xadb0, 0x0, 0x0, 0x40000001110, 0x0, 0x2, 0x0, 0x0, 0x7, 0x5, 0x3, 0x401, 0x1, 0x5, 0x401, 0xce4, 0x87b, 0x3, 0x2, 0x9212, 0x0, 0x4, 0x40, 0x7ff, 0x100000001, 0x0, 0x6, 0x80000000, 0x6, 0xd7, 0x4, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={&(0x7f0000000500), 0xa}, 0x404c, 0x0, 0xffffffffffffffff}, r2, 0x9, 0xffffffffffffffff, 0xa) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='memory.stat\x00', 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000200)=@ax25={0x3, {"b8738e610d62ed"}}, 0x80, &(0x7f0000000040)}, 0x0) socket$kcm(0x29, 0x2, 0x0) 21:47:23 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0x2, 0x120, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 21:47:23 executing program 5: r0 = syz_open_dev$evdev(&(0x7f0000002340)='/dev/input/event#\x00', 0x20000000000000, 0x0) ioctl$EVIOCGREP(r0, 0x80084503, &(0x7f0000000040)=""/217) 21:47:23 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = memfd_create(&(0x7f0000000380)="6b657972696e676c6f00f9e33210d477f0fbca82bfc24b1c95aa5076be6e8bd7af0c6eddf0182722feff2b9a00cef0fb6984e56060deb090815d9ef9fbc9febcd2657d98065f630f14bce0d32e2c81a5bf34f60344d5d17455fd1b7f26602b74c3463c13bfbdc263e8e6c0e4fdb0b353d96e05f4afdaa5e9a2311e0b0437b3d7794fd33ecc811f6db806da54ef2b3ac66cdb41bdb6422d389ef53b016cb127cbae7c676758e1997524ea6f57fe8e3158a0b89339f54d6d86b3f1d5eb4e932e4a22b6da0d1d3eaff939d9312019fc9882c37b64cc3ff3e001281c7623c89116a7dd8aef6a2110b5c822717d7f9d03016128ea6e95a66f6bb417583bf0dd54d1cd015b30f296d8f6e5ee438b267cf4039a905f6a8309927696e6dcfba61b16107585a2a188ba10ea576bd699bc9078d3edeccfbdbfc55f43dd89399ed35844e77bf95ba79f17bb93bf85e16cf62a13b52c25c252b7e4514f011c9da6b2cb7f1908fe58ce657216b2a5190e0a727099ab0d83ccdddbaa6792f2bebf9a8b716b3dd88d1590c1d4fcc1e818dc823246d6d59e449fcff4970ff888ef63c1277d76c859f6eba08c013d2bba0d79187403bfe45d22a2b8dcb5ff679e748156c57b3265256f7397f6c18c9122db5bdfb67076ee1a04dccfd32699aad47199bde505", 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0, 0x11, r1, 0x0) fstat(r1, &(0x7f0000000940)) 21:47:23 executing program 1: r0 = gettid() timer_create(0x0, &(0x7f0000ec5000)={0x0, 0x12}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x1c9c380}}, &(0x7f0000040000)) getrandom(&(0x7f0000000040)=""/108, 0x6c, 0x2) tkill(r0, 0x1000000000013) 21:47:23 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ptmx\x00', 0x0, 0x0) read(r0, &(0x7f0000000080)=""/11, 0xb) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000000)) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x0, 0x0) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0xfffffffffffffffe, 0xffffffffffffffff) dup3(r0, r1, 0x0) ioctl$KIOCSOUND(r1, 0x4b2f, 0x0) 21:47:23 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ptmx\x00', 0x0, 0x0) read(r0, &(0x7f0000000080)=""/11, 0xb) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000000)) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000012c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmmsg(r2, &(0x7f0000004380)=[{{&(0x7f00000002c0)=@sco, 0x80, &(0x7f0000000500), 0x0, &(0x7f0000000580)=""/246, 0xfffffffffffffeb7}}], 0x1, 0x0, &(0x7f00000044c0)) sendmsg$nl_generic(r2, &(0x7f0000000340)={&(0x7f0000000040), 0xc, &(0x7f0000000440)={&(0x7f00000003c0)=ANY=[]}}, 0x0) r3 = dup2(r0, r1) ioctl$KDSIGACCEPT(r3, 0x4b4e, 0x35) 21:47:23 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x3}, 0x1c) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f00000001c0), 0xffffffffffffffff) recvmmsg(r0, &(0x7f0000001940)=[{{&(0x7f0000000100)=@sco, 0x80, &(0x7f0000000080)=[{&(0x7f0000000280)=""/4096, 0x1000}], 0x1, &(0x7f0000001400)=""/201, 0xc9}}], 0x1, 0x0, &(0x7f0000001a00)) mknod(&(0x7f0000f80000)='./file0\x00', 0x1040, 0x0) execve(&(0x7f0000000240)='./file0\x00', &(0x7f0000001680), &(0x7f0000000180)) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000680)='/dev/ptmx\x00', 0x0, 0x0) read(r1, &(0x7f0000000000)=""/11, 0xb) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000200)) r2 = fcntl$dupfd(r1, 0x0, r0) open$dir(&(0x7f0000000040)='./file0\x00', 0x841, 0x0) ioctl$EVIOCGABS3F(r2, 0x8018457f, &(0x7f0000001340)=""/174) shutdown(r0, 0x0) 21:47:24 executing program 2: unshare(0x24020400) mknod(&(0x7f00000056c0)='./file0\x00', 0x1040, 0x0) execve(&(0x7f0000f8aff8)='./file0\x00', &(0x7f0000000180), &(0x7f00000002c0)) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000080)=0x800000100, 0x4000000000200) 21:47:24 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) socket$kcm(0x2, 0x3, 0x2) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0x50, &(0x7f0000000480)}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f0000000380)="6e7230010060a19ef9d2c623d9a1571cb9e1369bcd61ef7e49793ae18712eceb1daa769497800b7fbbd35b170c10751d39aeb660d863e49b8c4f3b3cad48902b5b2d6cfd0abd372c63bcf5d70df3fd4d2e8d443c88c60fd7140fbc0e5637dd82fc3435bed4de5d693c9a781c863e05d8a6f8689a5be29216061f3ff53f8b6b396678e7ba155ef9152d7e43b1eccb2331eb8eb1ed5586dcf8b3b0b999361a44ff2c22c2abbef42dd24eabe6723346a6e46c0499a21442d8d00dcb57f013ff7595edd0ff076930de3675d34117a44eb0e4f832936da44e") r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={"6e72300100", 0x801}) ioctl$TUNSETLINK(r1, 0x400454cd, 0x0) r2 = getpid() perf_event_open(&(0x7f0000000540)={0x0, 0x70, 0xf2, 0x4, 0x400, 0xadb0, 0x0, 0x0, 0x40000001110, 0x0, 0x2, 0x0, 0x0, 0x7, 0x5, 0x3, 0x401, 0x1, 0x5, 0x401, 0xce4, 0x87b, 0x3, 0x2, 0x9212, 0x0, 0x4, 0x40, 0x7ff, 0x100000001, 0x0, 0x6, 0x80000000, 0x6, 0xd7, 0x4, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={&(0x7f0000000500), 0xa}, 0x404c, 0x0, 0xffffffffffffffff}, r2, 0x9, 0xffffffffffffffff, 0xa) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='memory.stat\x00', 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000200)=@ax25={0x3, {"b8738e610d62ed"}}, 0x80, &(0x7f0000000040)}, 0x0) socket$kcm(0x29, 0x2, 0x0) 21:47:24 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f000000d700)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0xe7, &(0x7f000000d940)}, 0x0) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x615, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) socketpair(0x1, 0x3, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0xc0045878, &(0x7f00000001c0)='bond0\x00') close(r0) socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f0000000780)="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") ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f00000000c0)='./file0\x00', 0x0, 0x10}, 0x10) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000300)={"6e72300100", 0x1132}) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x11, 0x0, 0x300) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000640)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000940)=ANY=[@ANYBLOB="9feb01001800000000000000840000009c0000007a9cd55d5d73d5c5e8ca68fe859cc4968ffb119e6601000000612c7f30179e88dadefc8e76b27c2b0c3b2c54ad642eabd4b764b9ba3cd757ca1277e0c9e316f3fee0ad21a28643a4769a3361faed4c3b2bf53d4f0ec7805b93b1cfac382f9498187600005c56b54db6cc1c452d2f5cc2cc0beb24fcbe7c16ca6084e6d35517603f831c11c111058a9500d8b0416cfc99012c573fcb571b6bb30959c59958f52f782048b9275ab83c8062e19a826364bac9abc2051c00c84cee1488c8bff16f14db4aaea8d1e82ab6057d77904d3c025d8a4a9dbf7faf279b61286ad2bc2666ab5e2a202353289b4ee1dc3f6a021349c590af04ba5ee2de25695a2aee2a65ef7421a17d4531593c22839444e36e459ce718c85d78b016757a41215b2dbfd472e44bfc2b8206820a4c6bf090f550d8d0f02a99e9685679bea8e46b952bff414a0176e6eb8018cdd2b1d1bafd7329a809680a4ff0e11b4e658a0e00c293362c8f74168d0cdbbe6ed252f0fe15e2bca79334fed19032610c629d253200f5e50000000000"], &(0x7f0000000040)=""/23, 0x196, 0x17}, 0x20) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='cpu.stat\x00', 0x0, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000340)={&(0x7f0000000140)='./file0\x00'}, 0x10) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000000100)) write$cgroup_int(r3, &(0x7f0000000000), 0x12) ioctl$PERF_EVENT_IOC_REFRESH(0xffffffffffffffff, 0x2402, 0x923) 21:47:24 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000080)='tunl0\x00', 0x27d) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1}, 0x10) r1 = socket$inet6(0xa, 0x80003, 0x4) ioctl(r1, 0x8912, &(0x7f0000000280)) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) 21:47:24 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f000000d700)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0xe7, &(0x7f000000d940)}, 0x0) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x615, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) socketpair(0x1, 0x3, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0xc0045878, &(0x7f00000001c0)='bond0\x00') close(r0) socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f0000000780)="6e7230010060a19ef9d2c673d9a1571cb9e1369bcd61ef7e49793ae18712eceb1daa769497800b7fbbd35b170c10751d39aeb660d863e49b8c4f3b3dad48902b5b2d6cfd0abd372c63bcf5d70df3fd4d2e8d443c88bc0e5637dd82fc3435bed4de5d693c9a781c863e05d8a6f8689a5be29216061f3ff53f8b6b396678e7ba155ef9152d7e43b1eccb2331eb8eb1ed5586dcf8b3b0b999361a44ff2c22c2abbef42dd24eabe6723346a6e46c0499a21442d8d00dcb57f013ff7595edd0ff076930de3675d34117a44eb0e4f832936da44e57e43a3e36bd48d2a85bf4fd4a804e83f2f3cf378a435af5e287d4e27337b4ada11b26219832ec6b2b38446b3b95fe3771e9f42ca30fb21e12f0a3d8bc2d85454af9fcc0232d8fd909448b01f46c593d31ea1c926465e35a4199079c3ca41128b17cb01fbf5b522be0fd02022ada37fecc14b6c8c8831883b85a1106f2f867020d529f17a350f20dd3bf51a98cfda70c2e3638a483fd3f87940bb478b07c4c110394c0093d17955089f2ca97bbe075124c9b1ff6500d536a95d96f03d48596e008bf0a028b539cec796cec9bf585eb80fe3e0d26") ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f00000000c0)='./file0\x00', 0x0, 0x10}, 0x10) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000300)={"6e72300100", 0x1132}) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x11, 0x0, 0x300) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000640)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000940)=ANY=[@ANYBLOB="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"], &(0x7f0000000040)=""/23, 0x196, 0x17}, 0x20) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='cpu.stat\x00', 0x0, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000340)={&(0x7f0000000140)='./file0\x00'}, 0x10) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000000100)) write$cgroup_int(r3, &(0x7f0000000000), 0x12) ioctl$PERF_EVENT_IOC_REFRESH(0xffffffffffffffff, 0x2402, 0x923) 21:47:24 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) socket$kcm(0x2, 0x3, 0x2) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0x50, &(0x7f0000000480)}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f0000000380)="6e7230010060a19ef9d2c623d9a1571cb9e1369bcd61ef7e49793ae18712eceb1daa769497800b7fbbd35b170c10751d39aeb660d863e49b8c4f3b3cad48902b5b2d6cfd0abd372c63bcf5d70df3fd4d2e8d443c88c60fd7140fbc0e5637dd82fc3435bed4de5d693c9a781c863e05d8a6f8689a5be29216061f3ff53f8b6b396678e7ba155ef9152d7e43b1eccb2331eb8eb1ed5586dcf8b3b0b999361a44ff2c22c2abbef42dd24eabe6723346a6e46c0499a21442d8d00dcb57f013ff7595edd0ff076930de3675d34117a44eb0e4f832936da44e") r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={"6e72300100", 0x801}) ioctl$TUNSETLINK(r1, 0x400454cd, 0x308) r2 = getpid() perf_event_open(&(0x7f0000000540)={0x0, 0x70, 0x0, 0x4, 0x400, 0xadb0, 0x0, 0x0, 0x40000001110, 0x0, 0x2, 0x0, 0x0, 0x7, 0x5, 0x3, 0x401, 0x1, 0x5, 0x401, 0xce4, 0x87b, 0x3, 0x2, 0x9212, 0x0, 0x4, 0x40, 0x7ff, 0x100000001, 0x0, 0x6, 0x80000000, 0x6, 0xd7, 0x4, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={&(0x7f0000000500), 0xa}, 0x404c, 0x0, 0xffffffffffffffff}, r2, 0x9, 0xffffffffffffffff, 0xa) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='memory.stat\x00', 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000200)=@ax25={0x3, {"b8738e610d62ed"}}, 0x80, &(0x7f0000000040)}, 0x0) socket$kcm(0x29, 0x2, 0x0) 21:47:24 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f000000d700)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0xe7, &(0x7f000000d940)}, 0x0) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x615, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) socketpair(0x1, 0x3, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0xc0045878, &(0x7f00000001c0)='bond0\x00') close(r0) socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f0000000780)="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") ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f00000000c0)='./file0\x00', 0x0, 0x10}, 0x10) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000300)={"6e72300100", 0x1132}) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x11, 0x0, 0x300) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000640)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000940)=ANY=[@ANYBLOB="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"], &(0x7f0000000040)=""/23, 0x196, 0x17}, 0x20) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='cpu.stat\x00', 0x0, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000340)={&(0x7f0000000140)='./file0\x00'}, 0x10) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000000100)) write$cgroup_int(r3, &(0x7f0000000000), 0x12) ioctl$PERF_EVENT_IOC_REFRESH(0xffffffffffffffff, 0x2402, 0x923) 21:47:24 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) socket$kcm(0x2, 0x3, 0x2) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0x50, &(0x7f0000000480)}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f0000000380)="6e7230010060a19ef9d2c623d9a1571cb9e1369bcd61ef7e49793ae18712eceb1daa769497800b7fbbd35b170c10751d39aeb660d863e49b8c4f3b3cad48902b5b2d6cfd0abd372c63bcf5d70df3fd4d2e8d443c88c60fd7140fbc0e5637dd82fc3435bed4de5d693c9a781c863e05d8a6f8689a5be29216061f3ff53f8b6b396678e7ba155ef9152d7e43b1eccb2331eb8eb1ed5586dcf8b3b0b999361a44ff2c22c2abbef42dd24eabe6723346a6e46c0499a21442d8d00dcb57f013ff7595edd0ff076930de3675d34117a44eb0e4f832936da44e") r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={"6e72300100", 0x801}) ioctl$TUNSETLINK(r1, 0x400454cd, 0x308) r2 = getpid() perf_event_open(&(0x7f0000000540)={0x0, 0x70, 0xf2, 0x0, 0x400, 0xadb0, 0x0, 0x0, 0x40000001110, 0x0, 0x2, 0x0, 0x0, 0x7, 0x5, 0x3, 0x401, 0x1, 0x5, 0x401, 0xce4, 0x87b, 0x3, 0x2, 0x9212, 0x0, 0x4, 0x40, 0x7ff, 0x100000001, 0x0, 0x6, 0x80000000, 0x6, 0xd7, 0x4, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={&(0x7f0000000500), 0xa}, 0x404c, 0x0, 0xffffffffffffffff}, r2, 0x9, 0xffffffffffffffff, 0xa) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='memory.stat\x00', 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000200)=@ax25={0x3, {"b8738e610d62ed"}}, 0x80, &(0x7f0000000040)}, 0x0) socket$kcm(0x29, 0x2, 0x0) 21:47:24 executing program 5: socketpair(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x20000400000034}, 0xfffffffffffffd6a) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8946, &(0x7f0000000100)="6c6f00966fd651b159a9c84a2c60d29800000020") 21:47:24 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f000000d700)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0xe7, &(0x7f000000d940)}, 0x0) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x615, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) socketpair(0x1, 0x3, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0xc0045878, &(0x7f00000001c0)='bond0\x00') close(r0) socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f0000000780)="6e7230010060a19ef9d2c673d9a1571cb9e1369bcd61ef7e49793ae18712eceb1daa769497800b7fbbd35b170c10751d39aeb660d863e49b8c4f3b3dad48902b5b2d6cfd0abd372c63bcf5d70df3fd4d2e8d443c88bc0e5637dd82fc3435bed4de5d693c9a781c863e05d8a6f8689a5be29216061f3ff53f8b6b396678e7ba155ef9152d7e43b1eccb2331eb8eb1ed5586dcf8b3b0b999361a44ff2c22c2abbef42dd24eabe6723346a6e46c0499a21442d8d00dcb57f013ff7595edd0ff076930de3675d34117a44eb0e4f832936da44e57e43a3e36bd48d2a85bf4fd4a804e83f2f3cf378a435af5e287d4e27337b4ada11b26219832ec6b2b38446b3b95fe3771e9f42ca30fb21e12f0a3d8bc2d85454af9fcc0232d8fd909448b01f46c593d31ea1c926465e35a4199079c3ca41128b17cb01fbf5b522be0fd02022ada37fecc14b6c8c8831883b85a1106f2f867020d529f17a350f20dd3bf51a98cfda70c2e3638a483fd3f87940bb478b07c4c110394c0093d17955089f2ca97bbe075124c9b1ff6500d536a95d96f03d48596e008bf0a028b539cec796cec9bf585eb80fe3e0d26") ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f00000000c0)='./file0\x00', 0x0, 0x10}, 0x10) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000300)={"6e72300100", 0x1132}) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x11, 0x0, 0x300) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000640)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000940)=ANY=[@ANYBLOB="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"], &(0x7f0000000040)=""/23, 0x196, 0x17}, 0x20) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='cpu.stat\x00', 0x0, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000340)={&(0x7f0000000140)='./file0\x00'}, 0x10) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000000100)) write$cgroup_int(r3, &(0x7f0000000000), 0x12) ioctl$PERF_EVENT_IOC_REFRESH(0xffffffffffffffff, 0x2402, 0x923) 21:47:24 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000001680)='net/arp\x00') preadv(r0, &(0x7f00000000c0), 0x3f5, 0x10420001) 21:47:24 executing program 3: r0 = socket$inet(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f000000d000)=[{&(0x7f0000008000)="4c0000001200ff09fffefd956fa283b724a6008000000000000000683540150024001d001fc41180b598bc593ab6821148a730de33a49868c62b2ca654a6613b6aabf35d0f1cbc882b079881", 0x4c}], 0x1}, 0x0) recvmmsg(r0, &(0x7f0000001b40)=[{{0x0, 0x118, &(0x7f0000000240), 0x0, 0x0, 0xffffffffffffff9a}}], 0x4000056, 0x3a, &(0x7f0000000200)={0x77359400}) [ 418.042267] netlink: 'syz-executor3': attribute type 29 has an invalid length. [ 418.062151] device nr0 entered promiscuous mode [ 418.103483] netlink: 8 bytes leftover after parsing attributes in process `syz-executor3'. 21:47:25 executing program 2: unshare(0x24020400) mknod(&(0x7f00000056c0)='./file0\x00', 0x1040, 0x0) execve(&(0x7f0000f8aff8)='./file0\x00', &(0x7f0000000180), &(0x7f00000002c0)) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000080)=0x800000100, 0x4000000000200) 21:47:25 executing program 5: r0 = socket$inet6(0xa, 0x100000000002, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @local, 0x6}, 0x1c) sendto$inet6(r0, &(0x7f0000000300), 0xfd90, 0x0, &(0x7f00000000c0)={0xa, 0x4e23, 0x0, @ipv4={[], [], @multicast2}}, 0x1c) 21:47:25 executing program 5: pipe2(&(0x7f00000000c0), 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ptype\x00') sendfile(r0, r0, &(0x7f0000000040), 0x80000001) [ 418.255376] device nr0 entered promiscuous mode [ 418.270868] netlink: 'syz-executor3': attribute type 29 has an invalid length. [ 418.281176] netlink: 8 bytes leftover after parsing attributes in process `syz-executor3'. 21:47:25 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000080)='tunl0\x00', 0x27d) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1}, 0x10) r1 = socket$inet6(0xa, 0x80003, 0x4) ioctl(r1, 0x8912, &(0x7f0000000280)) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) 21:47:25 executing program 5: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) [ 418.605729] netlink: 'syz-executor3': attribute type 29 has an invalid length. [ 418.615981] netlink: 8 bytes leftover after parsing attributes in process `syz-executor3'. [ 418.834876] netlink: 'syz-executor3': attribute type 29 has an invalid length. [ 418.845894] netlink: 8 bytes leftover after parsing attributes in process `syz-executor3'. 21:47:25 executing program 2: unshare(0x24020400) mknod(&(0x7f00000056c0)='./file0\x00', 0x1040, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000002680)='syscall\x00') sendfile(r0, r0, &(0x7f0000000080)=0x800000100, 0x4000000000200) 21:47:26 executing program 2: unshare(0x24020400) r0 = syz_open_procfs(0x0, &(0x7f0000002680)='syscall\x00') sendfile(r0, r0, &(0x7f0000000080)=0x800000100, 0x4000000000200) 21:47:26 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) socket$kcm(0x2, 0x3, 0x2) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0x50, &(0x7f0000000480)}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f0000000380)="6e7230010060a19ef9d2c623d9a1571cb9e1369bcd61ef7e49793ae18712eceb1daa769497800b7fbbd35b170c10751d39aeb660d863e49b8c4f3b3cad48902b5b2d6cfd0abd372c63bcf5d70df3fd4d2e8d443c88c60fd7140fbc0e5637dd82fc3435bed4de5d693c9a781c863e05d8a6f8689a5be29216061f3ff53f8b6b396678e7ba155ef9152d7e43b1eccb2331eb8eb1ed5586dcf8b3b0b999361a44ff2c22c2abbef42dd24eabe6723346a6e46c0499a21442d8d00dcb57f013ff7595edd0ff076930de3675d34117a44eb0e4f832936da44e") r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={"6e72300100", 0x801}) ioctl$TUNSETLINK(r1, 0x400454cd, 0x308) r2 = getpid() perf_event_open(&(0x7f0000000540)={0x0, 0x70, 0xf2, 0x0, 0x0, 0xadb0, 0x0, 0x0, 0x40000001110, 0x0, 0x2, 0x0, 0x0, 0x7, 0x5, 0x3, 0x401, 0x1, 0x5, 0x401, 0xce4, 0x87b, 0x3, 0x2, 0x9212, 0x0, 0x4, 0x40, 0x7ff, 0x100000001, 0x0, 0x6, 0x80000000, 0x6, 0xd7, 0x4, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={&(0x7f0000000500), 0xa}, 0x404c, 0x0, 0xffffffffffffffff}, r2, 0x9, 0xffffffffffffffff, 0xa) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='memory.stat\x00', 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000200)=@ax25={0x3, {"b8738e610d62ed"}}, 0x80, &(0x7f0000000040)}, 0x0) socket$kcm(0x29, 0x2, 0x0) 21:47:26 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000002680)='syscall\x00') sendfile(r0, r0, &(0x7f0000000080)=0x800000100, 0x4000000000200) [ 419.846142] netlink: 'syz-executor3': attribute type 29 has an invalid length. [ 419.855117] netlink: 8 bytes leftover after parsing attributes in process `syz-executor3'. [ 419.865167] netlink: 'syz-executor3': attribute type 29 has an invalid length. [ 419.872933] netlink: 8 bytes leftover after parsing attributes in process `syz-executor3'. [ 419.884273] netlink: 'syz-executor3': attribute type 29 has an invalid length. [ 419.913321] netlink: 8 bytes leftover after parsing attributes in process `syz-executor3'. [ 419.927241] netlink: 'syz-executor3': attribute type 29 has an invalid length. [ 419.935608] netlink: 8 bytes leftover after parsing attributes in process `syz-executor3'. [ 419.947767] netlink: 'syz-executor3': attribute type 29 has an invalid length. 21:47:26 executing program 1: 21:47:26 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'eql\x00', 0x803}) perf_event_open(&(0x7f0000aaa000)={0x2, 0x70, 0x85a, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r0, 0x8914, &(0x7f00000000c0)={"65716c000000a95b00", @ifru_mtu=0x1}) [ 419.968291] netlink: 8 bytes leftover after parsing attributes in process `syz-executor3'. [ 419.980367] netlink: 'syz-executor3': attribute type 29 has an invalid length. [ 420.002638] netlink: 8 bytes leftover after parsing attributes in process `syz-executor3'. 21:47:26 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000080)='tunl0\x00', 0x27d) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1}, 0x10) r1 = socket$inet6(0xa, 0x80003, 0x4) ioctl(r1, 0x8912, &(0x7f0000000280)) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) 21:47:26 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000002680)='syscall\x00') sendfile(0xffffffffffffffff, r0, &(0x7f0000000080)=0x800000100, 0x4000000000200) 21:47:26 executing program 3: 21:47:26 executing program 1: [ 420.047866] device nr0 entered promiscuous mode 21:47:27 executing program 1: 21:47:27 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000002680)='syscall\x00') sendfile(0xffffffffffffffff, r0, &(0x7f0000000080)=0x800000100, 0x4000000000200) 21:47:27 executing program 3: 21:47:27 executing program 3: 21:47:27 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000002680)='syscall\x00') sendfile(0xffffffffffffffff, r0, &(0x7f0000000080)=0x800000100, 0x4000000000200) 21:47:27 executing program 1: 21:47:27 executing program 3: 21:47:27 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) socket$kcm(0x2, 0x3, 0x2) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0x50, &(0x7f0000000480)}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f0000000380)="6e7230010060a19ef9d2c623d9a1571cb9e1369bcd61ef7e49793ae18712eceb1daa769497800b7fbbd35b170c10751d39aeb660d863e49b8c4f3b3cad48902b5b2d6cfd0abd372c63bcf5d70df3fd4d2e8d443c88c60fd7140fbc0e5637dd82fc3435bed4de5d693c9a781c863e05d8a6f8689a5be29216061f3ff53f8b6b396678e7ba155ef9152d7e43b1eccb2331eb8eb1ed5586dcf8b3b0b999361a44ff2c22c2abbef42dd24eabe6723346a6e46c0499a21442d8d00dcb57f013ff7595edd0ff076930de3675d34117a44eb0e4f832936da44e") r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={"6e72300100", 0x801}) ioctl$TUNSETLINK(r1, 0x400454cd, 0x308) r2 = getpid() perf_event_open(&(0x7f0000000540)={0x0, 0x70, 0xf2, 0x0, 0x0, 0xadb0, 0x0, 0x0, 0x40000001110, 0x0, 0x2, 0x0, 0x0, 0x7, 0x5, 0x3, 0x401, 0x1, 0x5, 0x401, 0xce4, 0x87b, 0x3, 0x2, 0x9212, 0x0, 0x4, 0x40, 0x7ff, 0x100000001, 0x0, 0x6, 0x80000000, 0x6, 0xd7, 0x4, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={&(0x7f0000000500), 0xa}, 0x404c, 0x0, 0xffffffffffffffff}, r2, 0x9, 0xffffffffffffffff, 0xa) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='memory.stat\x00', 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000200)=@ax25={0x3, {"b8738e610d62ed"}}, 0x80, &(0x7f0000000040)}, 0x0) socket$kcm(0x29, 0x2, 0x0) 21:47:27 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000080)='tunl0\x00', 0x27d) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1}, 0x10) r1 = socket$inet6(0xa, 0x80003, 0x4) ioctl(r1, 0x8912, &(0x7f0000000280)="153f6234488d") connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) 21:47:27 executing program 5: 21:47:27 executing program 3: 21:47:27 executing program 1: 21:47:27 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000002680)='syscall\x00') sendfile(r0, 0xffffffffffffffff, &(0x7f0000000080)=0x800000100, 0x4000000000200) 21:47:27 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) socket$kcm(0x2, 0x3, 0x2) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0x50, &(0x7f0000000480)}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f0000000380)="6e7230010060a19ef9d2c623d9a1571cb9e1369bcd61ef7e49793ae18712eceb1daa769497800b7fbbd35b170c10751d39aeb660d863e49b8c4f3b3cad48902b5b2d6cfd0abd372c63bcf5d70df3fd4d2e8d443c88c60fd7140fbc0e5637dd82fc3435bed4de5d693c9a781c863e05d8a6f8689a5be29216061f3ff53f8b6b396678e7ba155ef9152d7e43b1eccb2331eb8eb1ed5586dcf8b3b0b999361a44ff2c22c2abbef42dd24eabe6723346a6e46c0499a21442d8d00dcb57f013ff7595edd0ff076930de3675d34117a44eb0e4f832936da44e") r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={"6e72300100", 0x801}) ioctl$TUNSETLINK(r1, 0x400454cd, 0x308) r2 = getpid() perf_event_open(&(0x7f0000000540)={0x0, 0x70, 0xf2, 0x0, 0x400, 0x0, 0x0, 0x0, 0x40000001110, 0x0, 0x2, 0x0, 0x0, 0x7, 0x5, 0x3, 0x401, 0x1, 0x5, 0x401, 0xce4, 0x87b, 0x3, 0x2, 0x9212, 0x0, 0x4, 0x40, 0x7ff, 0x100000001, 0x0, 0x6, 0x80000000, 0x6, 0xd7, 0x4, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={&(0x7f0000000500), 0xa}, 0x404c, 0x0, 0xffffffffffffffff}, r2, 0x9, 0xffffffffffffffff, 0xa) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='memory.stat\x00', 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000200)=@ax25={0x3, {"b8738e610d62ed"}}, 0x80, &(0x7f0000000040)}, 0x0) socket$kcm(0x29, 0x2, 0x0) 21:47:27 executing program 3: 21:47:27 executing program 5: 21:47:27 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000002680)='syscall\x00') sendfile(r0, 0xffffffffffffffff, &(0x7f0000000080)=0x800000100, 0x4000000000200) 21:47:27 executing program 1: 21:47:27 executing program 3: 21:47:28 executing program 1: [ 421.113828] device nr0 entered promiscuous mode 21:47:28 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000080)='tunl0\x00', 0x27d) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1}, 0x10) r1 = socket$inet6(0xa, 0x80003, 0x4) ioctl(r1, 0x8912, &(0x7f0000000280)="153f6234488d") connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) 21:47:28 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000002680)='syscall\x00') sendfile(r0, 0xffffffffffffffff, &(0x7f0000000080)=0x800000100, 0x4000000000200) 21:47:28 executing program 5: 21:47:28 executing program 3: 21:47:28 executing program 1: 21:47:28 executing program 5: 21:47:28 executing program 3: 21:47:28 executing program 1: 21:47:28 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000002680)='syscall\x00') sendfile(r0, r0, &(0x7f0000000080), 0x4000000000200) 21:47:28 executing program 1: 21:47:28 executing program 5: 21:47:28 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) socket$kcm(0x2, 0x3, 0x2) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0x50, &(0x7f0000000480)}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f0000000380)="6e7230010060a19ef9d2c623d9a1571cb9e1369bcd61ef7e49793ae18712eceb1daa769497800b7fbbd35b170c10751d39aeb660d863e49b8c4f3b3cad48902b5b2d6cfd0abd372c63bcf5d70df3fd4d2e8d443c88c60fd7140fbc0e5637dd82fc3435bed4de5d693c9a781c863e05d8a6f8689a5be29216061f3ff53f8b6b396678e7ba155ef9152d7e43b1eccb2331eb8eb1ed5586dcf8b3b0b999361a44ff2c22c2abbef42dd24eabe6723346a6e46c0499a21442d8d00dcb57f013ff7595edd0ff076930de3675d34117a44eb0e4f832936da44e") r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={"6e72300100", 0x801}) ioctl$TUNSETLINK(r1, 0x400454cd, 0x308) r2 = getpid() perf_event_open(&(0x7f0000000540)={0x0, 0x70, 0xf2, 0x0, 0x400, 0x0, 0x0, 0x0, 0x40000001110, 0x0, 0x2, 0x0, 0x0, 0x7, 0x5, 0x3, 0x401, 0x1, 0x5, 0x401, 0xce4, 0x87b, 0x3, 0x2, 0x9212, 0x0, 0x4, 0x40, 0x7ff, 0x100000001, 0x0, 0x6, 0x80000000, 0x6, 0xd7, 0x4, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={&(0x7f0000000500), 0xa}, 0x404c, 0x0, 0xffffffffffffffff}, r2, 0x9, 0xffffffffffffffff, 0xa) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='memory.stat\x00', 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000200)=@ax25={0x3, {"b8738e610d62ed"}}, 0x80, &(0x7f0000000040)}, 0x0) socket$kcm(0x29, 0x2, 0x0) 21:47:29 executing program 1: 21:47:29 executing program 3: 21:47:29 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000002680)='syscall\x00') sendfile(r0, r0, &(0x7f0000000080), 0x4000000000200) 21:47:29 executing program 5: 21:47:29 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000080)='tunl0\x00', 0x27d) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1}, 0x10) r1 = socket$inet6(0xa, 0x80003, 0x4) ioctl(r1, 0x8912, &(0x7f0000000280)="153f6234488d") connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) 21:47:29 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) socket$kcm(0x2, 0x3, 0x2) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0x50, &(0x7f0000000480)}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f0000000380)="6e7230010060a19ef9d2c623d9a1571cb9e1369bcd61ef7e49793ae18712eceb1daa769497800b7fbbd35b170c10751d39aeb660d863e49b8c4f3b3cad48902b5b2d6cfd0abd372c63bcf5d70df3fd4d2e8d443c88c60fd7140fbc0e5637dd82fc3435bed4de5d693c9a781c863e05d8a6f8689a5be29216061f3ff53f8b6b396678e7ba155ef9152d7e43b1eccb2331eb8eb1ed5586dcf8b3b0b999361a44ff2c22c2abbef42dd24eabe6723346a6e46c0499a21442d8d00dcb57f013ff7595edd0ff076930de3675d34117a44eb0e4f832936da44e") r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={"6e72300100", 0x801}) ioctl$TUNSETLINK(r1, 0x400454cd, 0x308) r2 = getpid() perf_event_open(&(0x7f0000000540)={0x0, 0x70, 0xf2, 0x0, 0x400, 0xadb0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x7, 0x5, 0x3, 0x401, 0x1, 0x5, 0x401, 0xce4, 0x87b, 0x3, 0x2, 0x9212, 0x0, 0x4, 0x40, 0x7ff, 0x100000001, 0x0, 0x6, 0x80000000, 0x6, 0xd7, 0x4, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={&(0x7f0000000500), 0xa}, 0x404c, 0x0, 0xffffffffffffffff}, r2, 0x9, 0xffffffffffffffff, 0xa) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='memory.stat\x00', 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000200)=@ax25={0x3, {"b8738e610d62ed"}}, 0x80, &(0x7f0000000040)}, 0x0) socket$kcm(0x29, 0x2, 0x0) 21:47:29 executing program 1: 21:47:29 executing program 3: 21:47:29 executing program 5: 21:47:29 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000002680)='syscall\x00') sendfile(r0, r0, &(0x7f0000000080), 0x4000000000200) 21:47:29 executing program 3: add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffb) 21:47:29 executing program 1: r0 = add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffb) r1 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000000)={'syz'}, 0x0, 0x0, r0) add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz'}, 0x0, 0x0, r1) [ 422.857679] device nr0 entered promiscuous mode 21:47:29 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000002680)='syscall\x00') sendfile(r0, r0, &(0x7f0000000080)=0x800000100, 0x0) 21:47:29 executing program 5: unshare(0x24020400) mknod(&(0x7f00000056c0)='./file0\x00', 0x1040, 0x0) execve(&(0x7f0000f8aff8)='./file0\x00', &(0x7f0000000380), &(0x7f00000001c0)) syz_open_procfs(0x0, &(0x7f0000000300)='smaps\x00') open(&(0x7f0000000200)='./file0\x00', 0x80000401, 0x0) 21:47:29 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt(r0, 0x8000000000000001, 0x9, &(0x7f0000479000)="890528e4", 0x4) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @local, 0x400000000000004}, 0x1c) setsockopt$inet6_tcp_int(r0, 0x6, 0x4, &(0x7f0000000040)=0x2be, 0xa) 21:47:29 executing program 3: add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffb) 21:47:30 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000080)='tunl0\x00', 0x27d) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1}, 0x10) r1 = socket$inet6(0xa, 0x80003, 0x4) ioctl(r1, 0x8912, &(0x7f0000000280)="153f6234488dd25d76") connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) 21:47:30 executing program 2: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x82) r1 = memfd_create(&(0x7f0000000140)="000000000000000000000000000000768e05f7c155ad7dc6947c573e5a69244e76382c0aa63d575ea3597f8b1728277ef76b30544d7ba92dcf978f1f81dc1b7f8f7b3451dada02ecb4f1ddcc8b5241da8945666e0073c25a6287c64dbea37a", 0x0) pwritev(0xffffffffffffffff, &(0x7f0000000380)=[{&(0x7f00000007c0)="17ddc1ccb94fb4665770c424e8b75681339507ed493ecf0160a82b6fdbdb5147634dd3f79478fce7d366fae23b8f33f469b9438a0db0a5f9c7bf0d6fdb11f3394ff570efe474e065308daf3b9afee3bab30c5be8678924ea5521e656cd7ff9dc4d2944e7363ed842333c3b2319bf4d484a0fb14eca3a8e572e158f591a65ee2d042914327633e4da3423bbefb6c5370a2429e7b4113ec726e5edf07f86203c720560e98bd128", 0xa6}], 0x1, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_CAPACITY(r0, 0x4c07) write$binfmt_misc(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="7c828c68ebc3347f530080731f2eb47d03ceb0f989233bf7068ae07bc5b42400000000000000000000000000000000000000000000000000"], 0x38) sendfile(r0, r0, &(0x7f0000000000), 0x20000102000007) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000180)={0x40000008}) 21:47:30 executing program 3: socket$inet6(0xa, 0x2000008080f, 0x7f) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = memfd_create(&(0x7f00000002c0)='filter\x00', 0x0) socket$inet6(0xa, 0x0, 0xfffffffffffffffe) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000280)) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$int_out(0xffffffffffffffff, 0x0, &(0x7f0000000600)) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000000)={0x0, {0x2, 0x0, @loopback}, {0x2, 0x0, @loopback}, {0x2, 0x0, @multicast1}}) flock(0xffffffffffffffff, 0x0) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000040)={'filter\x00'}, &(0x7f00000000c0)=0x54) mknod$loop(&(0x7f00000005c0)='./file0\x00', 0x0, 0xffffffffffffffff) r1 = socket$inet(0x2, 0x1, 0x0) pipe(&(0x7f0000000340)) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, 0xffffffffffffffff) iopl(0x0) bind$inet(r1, &(0x7f0000000000)={0x2, 0x4e23, @local}, 0x10) getitimer(0x1, &(0x7f0000000240)) ioctl$TCSETSW(r0, 0x5403, &(0x7f00000001c0)={0x8001, 0x8, 0x7, 0x7, 0x31fe, 0x8001, 0x8, 0x9, 0x1, 0x5, 0x0, 0x3}) sendto$inet(r1, &(0x7f0000000280), 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23}, 0x10) bind$unix(0xffffffffffffffff, &(0x7f0000000380)=@file={0x0, './file0\x00'}, 0xfffffffffffffff8) setsockopt$sock_int(r1, 0x1, 0x9, &(0x7f0000000040)=0x3, 0x4) r2 = request_key(&(0x7f0000000480)='trusted\x00', &(0x7f0000000440), &(0x7f0000000700)='user\x00', 0x0) syz_extract_tcp_res$synack(&(0x7f0000000280), 0x1, 0x0) add_key$user(&(0x7f0000000140)='user\x00', &(0x7f0000000180), &(0x7f00000004c0)="f155638335ddf4a050b48f6f4b2be8871daee6e126e5a327bedc97f1f3a784504bf91834c1a2264bdc097fe1798d9378735b4c7270c96bbdacddfa517b184a9c477f4b6d6bca5d4489f0eac3034bae2eda365d61111fce648a0100000027ccf1d23c2d6f0368d74d41bd579e902113ee1dd6328125e33c6b56531933a5d809002613bf91a4d5773f000000000000000000000000000000000000000000000000", 0xa0, r2) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f00000006c0)={'nr0\x00', &(0x7f0000000bc0)=ANY=[]}) sendto$inet6(0xffffffffffffffff, &(0x7f00000004c0), 0x0, 0x0, &(0x7f0000000640)={0xa, 0x0, 0x0, @dev}, 0x1c) timerfd_gettime(0xffffffffffffffff, &(0x7f0000000680)) fgetxattr(0xffffffffffffffff, &(0x7f0000000400)=@known='com.apple.system.Security\x00', &(0x7f0000000740)=""/206, 0xce) r3 = syz_open_procfs(0x0, &(0x7f0000000100)='net/tcp\x00') sendfile(r1, r3, &(0x7f0000000080), 0x80000003) 21:47:30 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = socket$inet6(0xa, 0x803, 0x7) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0a5c2d023c126285718070") bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, &(0x7f0000000040), 0x0, 0x8001, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @mcast2}, 0x1c) write$binfmt_misc(r0, &(0x7f0000000200)=ANY=[], 0xffdc) read(r0, &(0x7f0000000140)=""/165, 0x1000000eb) 21:47:30 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) socket$kcm(0x2, 0x3, 0x2) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0x50, &(0x7f0000000480)}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f0000000380)="6e7230010060a19ef9d2c623d9a1571cb9e1369bcd61ef7e49793ae18712eceb1daa769497800b7fbbd35b170c10751d39aeb660d863e49b8c4f3b3cad48902b5b2d6cfd0abd372c63bcf5d70df3fd4d2e8d443c88c60fd7140fbc0e5637dd82fc3435bed4de5d693c9a781c863e05d8a6f8689a5be29216061f3ff53f8b6b396678e7ba155ef9152d7e43b1eccb2331eb8eb1ed5586dcf8b3b0b999361a44ff2c22c2abbef42dd24eabe6723346a6e46c0499a21442d8d00dcb57f013ff7595edd0ff076930de3675d34117a44eb0e4f832936da44e") r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={"6e72300100", 0x801}) ioctl$TUNSETLINK(r1, 0x400454cd, 0x308) r2 = getpid() perf_event_open(&(0x7f0000000540)={0x0, 0x70, 0xf2, 0x0, 0x400, 0xadb0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x7, 0x5, 0x3, 0x401, 0x1, 0x5, 0x401, 0xce4, 0x87b, 0x3, 0x2, 0x9212, 0x0, 0x4, 0x40, 0x7ff, 0x100000001, 0x0, 0x6, 0x80000000, 0x6, 0xd7, 0x4, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={&(0x7f0000000500), 0xa}, 0x404c, 0x0, 0xffffffffffffffff}, r2, 0x9, 0xffffffffffffffff, 0xa) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='memory.stat\x00', 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000200)=@ax25={0x3, {"b8738e610d62ed"}}, 0x80, &(0x7f0000000040)}, 0x0) socket$kcm(0x29, 0x2, 0x0) 21:47:30 executing program 5: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket(0xa, 0x3, 0x1000000000ff) setsockopt$inet6_opts(r1, 0x29, 0x3b, &(0x7f0000000000)=ANY=[@ANYBLOB="8100000000000000"], 0x1) sendto$unix(r1, &(0x7f0000000000), 0x5a4, 0x0, &(0x7f0000000080)=@abs, 0x6e) 21:47:30 executing program 2: socketpair(0x11, 0x3, 0x5, &(0x7f0000000140)) 21:47:30 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) socket$kcm(0x2, 0x3, 0x2) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0x50, &(0x7f0000000480)}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f0000000380)="6e7230010060a19ef9d2c623d9a1571cb9e1369bcd61ef7e49793ae18712eceb1daa769497800b7fbbd35b170c10751d39aeb660d863e49b8c4f3b3cad48902b5b2d6cfd0abd372c63bcf5d70df3fd4d2e8d443c88c60fd7140fbc0e5637dd82fc3435bed4de5d693c9a781c863e05d8a6f8689a5be29216061f3ff53f8b6b396678e7ba155ef9152d7e43b1eccb2331eb8eb1ed5586dcf8b3b0b999361a44ff2c22c2abbef42dd24eabe6723346a6e46c0499a21442d8d00dcb57f013ff7595edd0ff076930de3675d34117a44eb0e4f832936da44e") r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={"6e72300100", 0x801}) ioctl$TUNSETLINK(r1, 0x400454cd, 0x308) r2 = getpid() perf_event_open(&(0x7f0000000540)={0x0, 0x70, 0xf2, 0x0, 0x400, 0xadb0, 0x0, 0x0, 0x40000001110, 0x0, 0x0, 0x0, 0x0, 0x7, 0x5, 0x3, 0x401, 0x1, 0x5, 0x401, 0xce4, 0x87b, 0x3, 0x2, 0x9212, 0x0, 0x4, 0x40, 0x7ff, 0x100000001, 0x0, 0x6, 0x80000000, 0x6, 0xd7, 0x4, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={&(0x7f0000000500), 0xa}, 0x404c, 0x0, 0xffffffffffffffff}, r2, 0x9, 0xffffffffffffffff, 0xa) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='memory.stat\x00', 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000200)=@ax25={0x3, {"b8738e610d62ed"}}, 0x80, &(0x7f0000000040)}, 0x0) socket$kcm(0x29, 0x2, 0x0) 21:47:30 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, &(0x7f00004e8000), 0x0, 0x20000004, &(0x7f0000b63fe4), 0x1c) 21:47:30 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$inet_int(r0, 0x0, 0x32, &(0x7f0000000240), &(0x7f0000000280)=0x4) [ 423.896988] device nr0 entered promiscuous mode 21:47:30 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000000000)=0x5, 0x4) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22, 0x0, @ipv4={[], [], @local}}, 0x1c) 21:47:30 executing program 2: pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_inet_SIOCSIFNETMASK(r1, 0x891c, 0xfffffffffffffffd) write$nbd(r1, &(0x7f00000002c0)=ANY=[@ANYBLOB], 0x1) close(r0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r2, 0x8916, &(0x7f0000000080)={'team_slave_1\x00', {0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xc}}}) getsockopt$EBT_SO_GET_INFO(r0, 0x0, 0x80, &(0x7f00000000c0)={'nat\x00'}, &(0x7f0000000140)=0x78) sendto$inet6(r2, &(0x7f00004e8000), 0x0, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x4e22}, 0x1c) close(r2) accept4(r3, &(0x7f0000000240)=@hci, &(0x7f0000000200)=0x80, 0x80800) splice(r0, 0x0, r1, 0x0, 0x3, 0x0) [ 424.052224] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 21:47:31 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000080)='tunl0\x00', 0x27d) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1}, 0x10) r1 = socket$inet6(0xa, 0x80003, 0x4) ioctl(r1, 0x8912, &(0x7f0000000280)="153f6234488dd25d76") connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) 21:47:31 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$inet_int(r0, 0x0, 0x32, &(0x7f0000000240), &(0x7f0000000280)=0x4) 21:47:31 executing program 3: socket$inet6(0xa, 0x2000008080f, 0x7f) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = memfd_create(&(0x7f00000002c0)='filter\x00', 0x0) socket$inet6(0xa, 0x0, 0xfffffffffffffffe) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000280)) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$int_out(0xffffffffffffffff, 0x0, &(0x7f0000000600)) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000000)={0x0, {0x2, 0x0, @loopback}, {0x2, 0x0, @loopback}, {0x2, 0x0, @multicast1}}) flock(0xffffffffffffffff, 0x0) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000040)={'filter\x00'}, &(0x7f00000000c0)=0x54) mknod$loop(&(0x7f00000005c0)='./file0\x00', 0x0, 0xffffffffffffffff) r1 = socket$inet(0x2, 0x1, 0x0) pipe(&(0x7f0000000340)) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, 0xffffffffffffffff) iopl(0x0) bind$inet(r1, &(0x7f0000000000)={0x2, 0x4e23, @local}, 0x10) getitimer(0x1, &(0x7f0000000240)) ioctl$TCSETSW(r0, 0x5403, &(0x7f00000001c0)={0x8001, 0x8, 0x7, 0x7, 0x31fe, 0x8001, 0x8, 0x9, 0x1, 0x5, 0x0, 0x3}) sendto$inet(r1, &(0x7f0000000280), 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23}, 0x10) bind$unix(0xffffffffffffffff, &(0x7f0000000380)=@file={0x0, './file0\x00'}, 0xfffffffffffffff8) setsockopt$sock_int(r1, 0x1, 0x9, &(0x7f0000000040)=0x3, 0x4) r2 = request_key(&(0x7f0000000480)='trusted\x00', &(0x7f0000000440), &(0x7f0000000700)='user\x00', 0x0) syz_extract_tcp_res$synack(&(0x7f0000000280), 0x1, 0x0) add_key$user(&(0x7f0000000140)='user\x00', &(0x7f0000000180), &(0x7f00000004c0)="f155638335ddf4a050b48f6f4b2be8871daee6e126e5a327bedc97f1f3a784504bf91834c1a2264bdc097fe1798d9378735b4c7270c96bbdacddfa517b184a9c477f4b6d6bca5d4489f0eac3034bae2eda365d61111fce648a0100000027ccf1d23c2d6f0368d74d41bd579e902113ee1dd6328125e33c6b56531933a5d809002613bf91a4d5773f000000000000000000000000000000000000000000000000", 0xa0, r2) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f00000006c0)={'nr0\x00', &(0x7f0000000bc0)=ANY=[]}) sendto$inet6(0xffffffffffffffff, &(0x7f00000004c0), 0x0, 0x0, &(0x7f0000000640)={0xa, 0x0, 0x0, @dev}, 0x1c) timerfd_gettime(0xffffffffffffffff, &(0x7f0000000680)) fgetxattr(0xffffffffffffffff, &(0x7f0000000400)=@known='com.apple.system.Security\x00', &(0x7f0000000740)=""/206, 0xce) r3 = syz_open_procfs(0x0, &(0x7f0000000100)='net/tcp\x00') sendfile(r1, r3, &(0x7f0000000080), 0x80000003) 21:47:31 executing program 1: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0a5c2d023c126285718070") r1 = socket$inet6(0xa, 0x80803, 0x1) mmap(&(0x7f0000000000/0x1000)=nil, 0x1000, 0xffffffffffffffff, 0x100032, 0xffffffffffffffff, 0x0) getsockopt$inet6_int(r1, 0x29, 0x4e, &(0x7f0000000000), &(0x7f0000001380)=0x4) 21:47:31 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$inet_int(r0, 0x0, 0x32, &(0x7f0000000240), &(0x7f0000000280)=0x4) 21:47:31 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$inet_int(r0, 0x0, 0x32, &(0x7f0000000240), &(0x7f0000000280)=0x4) 21:47:31 executing program 5: getsockopt$inet_int(0xffffffffffffffff, 0x0, 0x32, &(0x7f0000000240), &(0x7f0000000280)=0x4) 21:47:32 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) socket$kcm(0x2, 0x3, 0x2) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0x50, &(0x7f0000000480)}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f0000000380)="6e7230010060a19ef9d2c623d9a1571cb9e1369bcd61ef7e49793ae18712eceb1daa769497800b7fbbd35b170c10751d39aeb660d863e49b8c4f3b3cad48902b5b2d6cfd0abd372c63bcf5d70df3fd4d2e8d443c88c60fd7140fbc0e5637dd82fc3435bed4de5d693c9a781c863e05d8a6f8689a5be29216061f3ff53f8b6b396678e7ba155ef9152d7e43b1eccb2331eb8eb1ed5586dcf8b3b0b999361a44ff2c22c2abbef42dd24eabe6723346a6e46c0499a21442d8d00dcb57f013ff7595edd0ff076930de3675d34117a44eb0e4f832936da44e") r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={"6e72300100", 0x801}) ioctl$TUNSETLINK(r1, 0x400454cd, 0x308) r2 = getpid() perf_event_open(&(0x7f0000000540)={0x0, 0x70, 0xf2, 0x0, 0x400, 0xadb0, 0x0, 0x0, 0x40000001110, 0x0, 0x0, 0x0, 0x0, 0x7, 0x5, 0x3, 0x401, 0x1, 0x5, 0x401, 0xce4, 0x87b, 0x3, 0x2, 0x9212, 0x0, 0x4, 0x40, 0x7ff, 0x100000001, 0x0, 0x6, 0x80000000, 0x6, 0xd7, 0x4, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={&(0x7f0000000500), 0xa}, 0x404c, 0x0, 0xffffffffffffffff}, r2, 0x9, 0xffffffffffffffff, 0xa) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='memory.stat\x00', 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000200)=@ax25={0x3, {"b8738e610d62ed"}}, 0x80, &(0x7f0000000040)}, 0x0) socket$kcm(0x29, 0x2, 0x0) 21:47:32 executing program 5: socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0x32, &(0x7f0000000240), &(0x7f0000000280)=0x4) 21:47:32 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) syz_emit_ethernet(0x1, &(0x7f0000000700)=ANY=[@ANYBLOB="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"], &(0x7f0000001780)) 21:47:32 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSARP(r0, 0x8955, &(0x7f0000000000)={{0x2, 0x0, @dev}, {0x0, @broadcast}, 0x0, {0x2, 0x0, @broadcast}, 'syzkaller1\x00'}) 21:47:32 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$inet_int(r0, 0x0, 0x0, &(0x7f0000000240), &(0x7f0000000280)=0x4) 21:47:32 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000080)='tunl0\x00', 0x27d) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1}, 0x10) r1 = socket$inet6(0xa, 0x80003, 0x4) ioctl(r1, 0x8912, &(0x7f0000000280)="153f6234488dd25d76") connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) 21:47:32 executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x200000000001, 0x1f, 0x2, 0x20000000000001}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000001c0)={r0, &(0x7f0000000080), &(0x7f0000000040)}, 0x20) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000d0f000)={r0, &(0x7f0000999fe5)}, 0x10) [ 425.340631] device nr0 entered promiscuous mode 21:47:32 executing program 3: socket$inet6(0xa, 0x2000008080f, 0x7f) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = memfd_create(&(0x7f00000002c0)='filter\x00', 0x0) socket$inet6(0xa, 0x0, 0xfffffffffffffffe) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000280)) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$int_out(0xffffffffffffffff, 0x0, &(0x7f0000000600)) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000000)={0x0, {0x2, 0x0, @loopback}, {0x2, 0x0, @loopback}, {0x2, 0x0, @multicast1}}) flock(0xffffffffffffffff, 0x0) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000040)={'filter\x00'}, &(0x7f00000000c0)=0x54) mknod$loop(&(0x7f00000005c0)='./file0\x00', 0x0, 0xffffffffffffffff) r1 = socket$inet(0x2, 0x1, 0x0) pipe(&(0x7f0000000340)) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, 0xffffffffffffffff) iopl(0x0) bind$inet(r1, &(0x7f0000000000)={0x2, 0x4e23, @local}, 0x10) getitimer(0x1, &(0x7f0000000240)) ioctl$TCSETSW(r0, 0x5403, &(0x7f00000001c0)={0x8001, 0x8, 0x7, 0x7, 0x31fe, 0x8001, 0x8, 0x9, 0x1, 0x5, 0x0, 0x3}) sendto$inet(r1, &(0x7f0000000280), 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23}, 0x10) bind$unix(0xffffffffffffffff, &(0x7f0000000380)=@file={0x0, './file0\x00'}, 0xfffffffffffffff8) setsockopt$sock_int(r1, 0x1, 0x9, &(0x7f0000000040)=0x3, 0x4) r2 = request_key(&(0x7f0000000480)='trusted\x00', &(0x7f0000000440), &(0x7f0000000700)='user\x00', 0x0) syz_extract_tcp_res$synack(&(0x7f0000000280), 0x1, 0x0) add_key$user(&(0x7f0000000140)='user\x00', &(0x7f0000000180), &(0x7f00000004c0)="f155638335ddf4a050b48f6f4b2be8871daee6e126e5a327bedc97f1f3a784504bf91834c1a2264bdc097fe1798d9378735b4c7270c96bbdacddfa517b184a9c477f4b6d6bca5d4489f0eac3034bae2eda365d61111fce648a0100000027ccf1d23c2d6f0368d74d41bd579e902113ee1dd6328125e33c6b56531933a5d809002613bf91a4d5773f000000000000000000000000000000000000000000000000", 0xa0, r2) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f00000006c0)={'nr0\x00', &(0x7f0000000bc0)=ANY=[]}) sendto$inet6(0xffffffffffffffff, &(0x7f00000004c0), 0x0, 0x0, &(0x7f0000000640)={0xa, 0x0, 0x0, @dev}, 0x1c) timerfd_gettime(0xffffffffffffffff, &(0x7f0000000680)) fgetxattr(0xffffffffffffffff, &(0x7f0000000400)=@known='com.apple.system.Security\x00', &(0x7f0000000740)=""/206, 0xce) r3 = syz_open_procfs(0x0, &(0x7f0000000100)='net/tcp\x00') sendfile(r1, r3, &(0x7f0000000080), 0x80000003) 21:47:32 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) mmap(&(0x7f0000000000/0x8000)=nil, 0x8000, 0x4, 0x800000032, 0xffffffffffffffff, 0x0) setsockopt$packet_int(r0, 0x107, 0x13, &(0x7f0000000640), 0x4) 21:47:32 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) sendmsg$unix(r0, &(0x7f0000002c80)={&(0x7f0000000240)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000002b40), 0x0, &(0x7f0000002c00)=[@rights={0x18, 0x1, 0x1, [r3]}, @rights={0x18, 0x1, 0x1, [r4]}], 0x30}, 0x0) 21:47:32 executing program 1: r0 = socket$inet6(0xa, 0x100800000000002, 0x0) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c) r1 = syz_open_procfs(0x0, &(0x7f00000003c0)='net/raw\x00') sendfile(r0, r1, &(0x7f00000000c0), 0x20000087ffe) 21:47:32 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$inet_mtu(r0, 0x0, 0xa, &(0x7f0000000200), 0x210) sendto$inet(r0, &(0x7f0000000000), 0x0, 0x20000802, &(0x7f0000000000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000100)='syz_tun\x00', 0x10) sendto$inet(r0, &(0x7f0000000040), 0xfe65, 0x0, &(0x7f0000893ff0), 0x10) 21:47:33 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) socket$kcm(0x2, 0x3, 0x2) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0x50, &(0x7f0000000480)}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f0000000380)="6e7230010060a19ef9d2c623d9a1571cb9e1369bcd61ef7e49793ae18712eceb1daa769497800b7fbbd35b170c10751d39aeb660d863e49b8c4f3b3cad48902b5b2d6cfd0abd372c63bcf5d70df3fd4d2e8d443c88c60fd7140fbc0e5637dd82fc3435bed4de5d693c9a781c863e05d8a6f8689a5be29216061f3ff53f8b6b396678e7ba155ef9152d7e43b1eccb2331eb8eb1ed5586dcf8b3b0b999361a44ff2c22c2abbef42dd24eabe6723346a6e46c0499a21442d8d00dcb57f013ff7595edd0ff076930de3675d34117a44eb0e4f832936da44e") r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={"6e72300100", 0x801}) ioctl$TUNSETLINK(r1, 0x400454cd, 0x308) r2 = getpid() perf_event_open(&(0x7f0000000540)={0x0, 0x70, 0xf2, 0x0, 0x400, 0xadb0, 0x0, 0x0, 0x40000001110, 0x0, 0x0, 0x0, 0x0, 0x7, 0x5, 0x3, 0x401, 0x1, 0x5, 0x401, 0xce4, 0x87b, 0x3, 0x2, 0x9212, 0x0, 0x4, 0x40, 0x7ff, 0x100000001, 0x0, 0x6, 0x80000000, 0x6, 0xd7, 0x4, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={&(0x7f0000000500), 0xa}, 0x404c, 0x0, 0xffffffffffffffff}, r2, 0x9, 0xffffffffffffffff, 0xa) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='memory.stat\x00', 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000200)=@ax25={0x3, {"b8738e610d62ed"}}, 0x80, &(0x7f0000000040)}, 0x0) socket$kcm(0x29, 0x2, 0x0) 21:47:33 executing program 2: r0 = socket$packet(0x11, 0x40000000000002, 0x300) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000903000)={0x1, 0x22, &(0x7f0000000200)=ANY=[@ANYBLOB="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"], &(0x7f0000000040)='GPL\x00', 0xfffffffffffffffa, 0x1000, &(0x7f00009ab000)=""/4096}, 0x48) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000140)=r1, 0x4) r2 = socket$inet6(0xa, 0x802, 0x0) sendto$inet6(r2, &(0x7f0000000000), 0x0, 0x0, &(0x7f0000001000)={0xa, 0x4e23, 0x0, @mcast2}, 0x1c) 21:47:33 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000080)='tunl0\x00', 0x27d) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1}, 0x10) r1 = socket$inet6(0xa, 0x80003, 0x4) ioctl(r1, 0x8912, &(0x7f0000000280)="153f6234488dd25d7660") connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) 21:47:33 executing program 3: socket$inet6(0xa, 0x2000008080f, 0x7f) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = memfd_create(&(0x7f00000002c0)='filter\x00', 0x0) socket$inet6(0xa, 0x0, 0xfffffffffffffffe) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000280)) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$int_out(0xffffffffffffffff, 0x0, &(0x7f0000000600)) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000000)={0x0, {0x2, 0x0, @loopback}, {0x2, 0x0, @loopback}, {0x2, 0x0, @multicast1}}) flock(0xffffffffffffffff, 0x0) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000040)={'filter\x00'}, &(0x7f00000000c0)=0x54) mknod$loop(&(0x7f00000005c0)='./file0\x00', 0x0, 0xffffffffffffffff) r1 = socket$inet(0x2, 0x1, 0x0) pipe(&(0x7f0000000340)) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, 0xffffffffffffffff) iopl(0x0) bind$inet(r1, &(0x7f0000000000)={0x2, 0x4e23, @local}, 0x10) getitimer(0x1, &(0x7f0000000240)) ioctl$TCSETSW(r0, 0x5403, &(0x7f00000001c0)={0x8001, 0x8, 0x7, 0x7, 0x31fe, 0x8001, 0x8, 0x9, 0x1, 0x5, 0x0, 0x3}) sendto$inet(r1, &(0x7f0000000280), 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23}, 0x10) bind$unix(0xffffffffffffffff, &(0x7f0000000380)=@file={0x0, './file0\x00'}, 0xfffffffffffffff8) setsockopt$sock_int(r1, 0x1, 0x9, &(0x7f0000000040)=0x3, 0x4) r2 = request_key(&(0x7f0000000480)='trusted\x00', &(0x7f0000000440), &(0x7f0000000700)='user\x00', 0x0) syz_extract_tcp_res$synack(&(0x7f0000000280), 0x1, 0x0) add_key$user(&(0x7f0000000140)='user\x00', &(0x7f0000000180), &(0x7f00000004c0)="f155638335ddf4a050b48f6f4b2be8871daee6e126e5a327bedc97f1f3a784504bf91834c1a2264bdc097fe1798d9378735b4c7270c96bbdacddfa517b184a9c477f4b6d6bca5d4489f0eac3034bae2eda365d61111fce648a0100000027ccf1d23c2d6f0368d74d41bd579e902113ee1dd6328125e33c6b56531933a5d809002613bf91a4d5773f000000000000000000000000000000000000000000000000", 0xa0, r2) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f00000006c0)={'nr0\x00', &(0x7f0000000bc0)=ANY=[]}) sendto$inet6(0xffffffffffffffff, &(0x7f00000004c0), 0x0, 0x0, &(0x7f0000000640)={0xa, 0x0, 0x0, @dev}, 0x1c) timerfd_gettime(0xffffffffffffffff, &(0x7f0000000680)) fgetxattr(0xffffffffffffffff, &(0x7f0000000400)=@known='com.apple.system.Security\x00', &(0x7f0000000740)=""/206, 0xce) r3 = syz_open_procfs(0x0, &(0x7f0000000100)='net/tcp\x00') sendfile(r1, r3, &(0x7f0000000080), 0x80000003) 21:47:33 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = syz_open_procfs(0x0, &(0x7f0000000000)="2f657865000000000004ebff4bddd9de91be10eebf000ee9a90f798058439ed554fa07424adee901d2da75af29e8e2e05272931371fb35331ce39c5a") fchown(r1, 0x0, 0x0) 21:47:33 executing program 1: r0 = epoll_create1(0x0) r1 = epoll_create1(0x0) r2 = timerfd_create(0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f00000000c0)={0x20000001}) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000000)) timerfd_settime(r2, 0x0, &(0x7f0000005000)={{}, {0x0, 0x989680}}, &(0x7f0000000fe0)) epoll_pwait(r1, &(0x7f00008c9fc4)=[{}], 0x1, 0xfffffffffffffff7, &(0x7f00009d2000), 0x8) dup3(r2, r1, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r2, &(0x7f0000021ff4)={0x2001}) 21:47:33 executing program 5: 21:47:33 executing program 5: 21:47:33 executing program 2: 21:47:33 executing program 1: 21:47:33 executing program 2: 21:47:33 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) socket$kcm(0x2, 0x3, 0x2) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0x50, &(0x7f0000000480)}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f0000000380)="6e7230010060a19ef9d2c623d9a1571cb9e1369bcd61ef7e49793ae18712eceb1daa769497800b7fbbd35b170c10751d39aeb660d863e49b8c4f3b3cad48902b5b2d6cfd0abd372c63bcf5d70df3fd4d2e8d443c88c60fd7140fbc0e5637dd82fc3435bed4de5d693c9a781c863e05d8a6f8689a5be29216061f3ff53f8b6b396678e7ba155ef9152d7e43b1eccb2331eb8eb1ed5586dcf8b3b0b999361a44ff2c22c2abbef42dd24eabe6723346a6e46c0499a21442d8d00dcb57f013ff7595edd0ff076930de3675d34117a44eb0e4f832936da44e") r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={"6e72300100", 0x801}) ioctl$TUNSETLINK(r1, 0x400454cd, 0x308) r2 = getpid() perf_event_open(&(0x7f0000000540)={0x0, 0x70, 0xf2, 0x0, 0x400, 0xadb0, 0x0, 0x0, 0x40000001110, 0x0, 0x2, 0x0, 0x0, 0x0, 0x5, 0x3, 0x401, 0x1, 0x5, 0x401, 0xce4, 0x87b, 0x3, 0x2, 0x9212, 0x0, 0x4, 0x40, 0x7ff, 0x100000001, 0x0, 0x6, 0x80000000, 0x6, 0xd7, 0x4, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={&(0x7f0000000500), 0xa}, 0x404c, 0x0, 0xffffffffffffffff}, r2, 0x9, 0xffffffffffffffff, 0xa) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='memory.stat\x00', 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000200)=@ax25={0x3, {"b8738e610d62ed"}}, 0x80, &(0x7f0000000040)}, 0x0) socket$kcm(0x29, 0x2, 0x0) 21:47:33 executing program 5: 21:47:33 executing program 2: 21:47:34 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000080)='tunl0\x00', 0x27d) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1}, 0x10) r1 = socket$inet6(0xa, 0x80003, 0x4) ioctl(r1, 0x8912, &(0x7f0000000280)="153f6234488dd25d7660") connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) 21:47:34 executing program 3: socket$inet6(0xa, 0x2000008080f, 0x7f) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = memfd_create(&(0x7f00000002c0)='filter\x00', 0x0) socket$inet6(0xa, 0x0, 0xfffffffffffffffe) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000280)) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$int_out(0xffffffffffffffff, 0x0, &(0x7f0000000600)) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000000)={0x0, {0x2, 0x0, @loopback}, {0x2, 0x0, @loopback}, {0x2, 0x0, @multicast1}}) flock(0xffffffffffffffff, 0x0) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000040)={'filter\x00'}, &(0x7f00000000c0)=0x54) mknod$loop(&(0x7f00000005c0)='./file0\x00', 0x0, 0xffffffffffffffff) r1 = socket$inet(0x2, 0x1, 0x0) pipe(&(0x7f0000000340)) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, 0xffffffffffffffff) iopl(0x0) bind$inet(r1, &(0x7f0000000000)={0x2, 0x4e23, @local}, 0x10) getitimer(0x1, &(0x7f0000000240)) ioctl$TCSETSW(r0, 0x5403, &(0x7f00000001c0)={0x8001, 0x8, 0x7, 0x7, 0x31fe, 0x8001, 0x8, 0x9, 0x1, 0x5, 0x0, 0x3}) sendto$inet(r1, &(0x7f0000000280), 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23}, 0x10) bind$unix(0xffffffffffffffff, &(0x7f0000000380)=@file={0x0, './file0\x00'}, 0xfffffffffffffff8) setsockopt$sock_int(r1, 0x1, 0x9, &(0x7f0000000040)=0x3, 0x4) r2 = request_key(&(0x7f0000000480)='trusted\x00', &(0x7f0000000440), &(0x7f0000000700)='user\x00', 0x0) syz_extract_tcp_res$synack(&(0x7f0000000280), 0x1, 0x0) add_key$user(&(0x7f0000000140)='user\x00', &(0x7f0000000180), &(0x7f00000004c0)="f155638335ddf4a050b48f6f4b2be8871daee6e126e5a327bedc97f1f3a784504bf91834c1a2264bdc097fe1798d9378735b4c7270c96bbdacddfa517b184a9c477f4b6d6bca5d4489f0eac3034bae2eda365d61111fce648a0100000027ccf1d23c2d6f0368d74d41bd579e902113ee1dd6328125e33c6b56531933a5d809002613bf91a4d5773f000000000000000000000000000000000000000000000000", 0xa0, r2) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f00000006c0)={'nr0\x00', &(0x7f0000000bc0)=ANY=[]}) sendto$inet6(0xffffffffffffffff, &(0x7f00000004c0), 0x0, 0x0, &(0x7f0000000640)={0xa, 0x0, 0x0, @dev}, 0x1c) timerfd_gettime(0xffffffffffffffff, &(0x7f0000000680)) fgetxattr(0xffffffffffffffff, &(0x7f0000000400)=@known='com.apple.system.Security\x00', &(0x7f0000000740)=""/206, 0xce) syz_open_procfs(0x0, &(0x7f0000000100)='net/tcp\x00') 21:47:34 executing program 5: 21:47:34 executing program 1: 21:47:34 executing program 2: 21:47:34 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) socket$kcm(0x2, 0x3, 0x2) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0x50, &(0x7f0000000480)}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f0000000380)="6e7230010060a19ef9d2c623d9a1571cb9e1369bcd61ef7e49793ae18712eceb1daa769497800b7fbbd35b170c10751d39aeb660d863e49b8c4f3b3cad48902b5b2d6cfd0abd372c63bcf5d70df3fd4d2e8d443c88c60fd7140fbc0e5637dd82fc3435bed4de5d693c9a781c863e05d8a6f8689a5be29216061f3ff53f8b6b396678e7ba155ef9152d7e43b1eccb2331eb8eb1ed5586dcf8b3b0b999361a44ff2c22c2abbef42dd24eabe6723346a6e46c0499a21442d8d00dcb57f013ff7595edd0ff076930de3675d34117a44eb0e4f832936da44e") r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={"6e72300100", 0x801}) ioctl$TUNSETLINK(r1, 0x400454cd, 0x308) r2 = getpid() perf_event_open(&(0x7f0000000540)={0x0, 0x70, 0xf2, 0x0, 0x400, 0xadb0, 0x0, 0x0, 0x40000001110, 0x0, 0x2, 0x0, 0x0, 0x7, 0x0, 0x3, 0x401, 0x1, 0x5, 0x401, 0xce4, 0x87b, 0x3, 0x2, 0x9212, 0x0, 0x4, 0x40, 0x7ff, 0x100000001, 0x0, 0x6, 0x80000000, 0x6, 0xd7, 0x4, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={&(0x7f0000000500), 0xa}, 0x404c, 0x0, 0xffffffffffffffff}, r2, 0x9, 0xffffffffffffffff, 0xa) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='memory.stat\x00', 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000200)=@ax25={0x3, {"b8738e610d62ed"}}, 0x80, &(0x7f0000000040)}, 0x0) socket$kcm(0x29, 0x2, 0x0) 21:47:34 executing program 2: 21:47:34 executing program 5: 21:47:34 executing program 1: 21:47:34 executing program 2: 21:47:34 executing program 5: [ 427.823117] device nr0 entered promiscuous mode 21:47:34 executing program 1: 21:47:35 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000080)='tunl0\x00', 0x27d) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1}, 0x10) r1 = socket$inet6(0xa, 0x80003, 0x4) ioctl(r1, 0x8912, &(0x7f0000000280)="153f6234488dd25d7660") connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) 21:47:35 executing program 3: socket$inet6(0xa, 0x2000008080f, 0x7f) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = memfd_create(&(0x7f00000002c0)='filter\x00', 0x0) socket$inet6(0xa, 0x0, 0xfffffffffffffffe) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000280)) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$int_out(0xffffffffffffffff, 0x0, &(0x7f0000000600)) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000000)={0x0, {0x2, 0x0, @loopback}, {0x2, 0x0, @loopback}, {0x2, 0x0, @multicast1}}) flock(0xffffffffffffffff, 0x0) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000040)={'filter\x00'}, &(0x7f00000000c0)=0x54) mknod$loop(&(0x7f00000005c0)='./file0\x00', 0x0, 0xffffffffffffffff) r1 = socket$inet(0x2, 0x1, 0x0) pipe(&(0x7f0000000340)) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, 0xffffffffffffffff) iopl(0x0) bind$inet(r1, &(0x7f0000000000)={0x2, 0x4e23, @local}, 0x10) getitimer(0x1, &(0x7f0000000240)) ioctl$TCSETSW(r0, 0x5403, &(0x7f00000001c0)={0x8001, 0x8, 0x7, 0x7, 0x31fe, 0x8001, 0x8, 0x9, 0x1, 0x5, 0x0, 0x3}) sendto$inet(r1, &(0x7f0000000280), 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23}, 0x10) bind$unix(0xffffffffffffffff, &(0x7f0000000380)=@file={0x0, './file0\x00'}, 0xfffffffffffffff8) setsockopt$sock_int(r1, 0x1, 0x9, &(0x7f0000000040)=0x3, 0x4) r2 = request_key(&(0x7f0000000480)='trusted\x00', &(0x7f0000000440), &(0x7f0000000700)='user\x00', 0x0) syz_extract_tcp_res$synack(&(0x7f0000000280), 0x1, 0x0) add_key$user(&(0x7f0000000140)='user\x00', &(0x7f0000000180), &(0x7f00000004c0)="f155638335ddf4a050b48f6f4b2be8871daee6e126e5a327bedc97f1f3a784504bf91834c1a2264bdc097fe1798d9378735b4c7270c96bbdacddfa517b184a9c477f4b6d6bca5d4489f0eac3034bae2eda365d61111fce648a0100000027ccf1d23c2d6f0368d74d41bd579e902113ee1dd6328125e33c6b56531933a5d809002613bf91a4d5773f000000000000000000000000000000000000000000000000", 0xa0, r2) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f00000006c0)={'nr0\x00', &(0x7f0000000bc0)=ANY=[]}) sendto$inet6(0xffffffffffffffff, &(0x7f00000004c0), 0x0, 0x0, &(0x7f0000000640)={0xa, 0x0, 0x0, @dev}, 0x1c) timerfd_gettime(0xffffffffffffffff, &(0x7f0000000680)) fgetxattr(0xffffffffffffffff, &(0x7f0000000400)=@known='com.apple.system.Security\x00', &(0x7f0000000740)=""/206, 0xce) 21:47:35 executing program 5: 21:47:35 executing program 2: 21:47:35 executing program 1: 21:47:35 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) socket$kcm(0x2, 0x3, 0x2) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0x50, &(0x7f0000000480)}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f0000000380)="6e7230010060a19ef9d2c623d9a1571cb9e1369bcd61ef7e49793ae18712eceb1daa769497800b7fbbd35b170c10751d39aeb660d863e49b8c4f3b3cad48902b5b2d6cfd0abd372c63bcf5d70df3fd4d2e8d443c88c60fd7140fbc0e5637dd82fc3435bed4de5d693c9a781c863e05d8a6f8689a5be29216061f3ff53f8b6b396678e7ba155ef9152d7e43b1eccb2331eb8eb1ed5586dcf8b3b0b999361a44ff2c22c2abbef42dd24eabe6723346a6e46c0499a21442d8d00dcb57f013ff7595edd0ff076930de3675d34117a44eb0e4f832936da44e") r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={"6e72300100", 0x801}) ioctl$TUNSETLINK(r1, 0x400454cd, 0x308) r2 = getpid() perf_event_open(&(0x7f0000000540)={0x0, 0x70, 0xf2, 0x0, 0x400, 0xadb0, 0x0, 0x0, 0x40000001110, 0x0, 0x2, 0x0, 0x0, 0x7, 0x0, 0x3, 0x401, 0x1, 0x5, 0x401, 0xce4, 0x87b, 0x3, 0x2, 0x9212, 0x0, 0x4, 0x40, 0x7ff, 0x100000001, 0x0, 0x6, 0x80000000, 0x6, 0xd7, 0x4, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={&(0x7f0000000500), 0xa}, 0x404c, 0x0, 0xffffffffffffffff}, r2, 0x9, 0xffffffffffffffff, 0xa) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='memory.stat\x00', 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000200)=@ax25={0x3, {"b8738e610d62ed"}}, 0x80, &(0x7f0000000040)}, 0x0) socket$kcm(0x29, 0x2, 0x0) 21:47:35 executing program 5: 21:47:35 executing program 1: 21:47:35 executing program 2: [ 428.589626] device nr0 entered promiscuous mode 21:47:35 executing program 5: 21:47:35 executing program 2: 21:47:35 executing program 1: 21:47:36 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000080)='tunl0\x00', 0x27d) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1}, 0x10) r1 = socket$inet6(0xa, 0x80003, 0x4) ioctl(r1, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") connect$inet(0xffffffffffffffff, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) 21:47:36 executing program 2: 21:47:36 executing program 5: 21:47:36 executing program 1: 21:47:36 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000080)='tunl0\x00', 0x27d) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1}, 0x10) r1 = socket$inet6(0xa, 0x80003, 0x4) ioctl(r1, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") connect$inet(0xffffffffffffffff, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) 21:47:36 executing program 3: socket$inet6(0xa, 0x2000008080f, 0x7f) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = memfd_create(&(0x7f00000002c0)='filter\x00', 0x0) socket$inet6(0xa, 0x0, 0xfffffffffffffffe) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000280)) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$int_out(0xffffffffffffffff, 0x0, &(0x7f0000000600)) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000000)={0x0, {0x2, 0x0, @loopback}, {0x2, 0x0, @loopback}, {0x2, 0x0, @multicast1}}) flock(0xffffffffffffffff, 0x0) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000040)={'filter\x00'}, &(0x7f00000000c0)=0x54) mknod$loop(&(0x7f00000005c0)='./file0\x00', 0x0, 0xffffffffffffffff) r1 = socket$inet(0x2, 0x1, 0x0) pipe(&(0x7f0000000340)) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, 0xffffffffffffffff) iopl(0x0) bind$inet(r1, &(0x7f0000000000)={0x2, 0x4e23, @local}, 0x10) getitimer(0x1, &(0x7f0000000240)) ioctl$TCSETSW(r0, 0x5403, &(0x7f00000001c0)={0x8001, 0x8, 0x7, 0x7, 0x31fe, 0x8001, 0x8, 0x9, 0x1, 0x5, 0x0, 0x3}) sendto$inet(r1, &(0x7f0000000280), 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23}, 0x10) bind$unix(0xffffffffffffffff, &(0x7f0000000380)=@file={0x0, './file0\x00'}, 0xfffffffffffffff8) setsockopt$sock_int(r1, 0x1, 0x9, &(0x7f0000000040)=0x3, 0x4) r2 = request_key(&(0x7f0000000480)='trusted\x00', &(0x7f0000000440), &(0x7f0000000700)='user\x00', 0x0) syz_extract_tcp_res$synack(&(0x7f0000000280), 0x1, 0x0) add_key$user(&(0x7f0000000140)='user\x00', &(0x7f0000000180), &(0x7f00000004c0)="f155638335ddf4a050b48f6f4b2be8871daee6e126e5a327bedc97f1f3a784504bf91834c1a2264bdc097fe1798d9378735b4c7270c96bbdacddfa517b184a9c477f4b6d6bca5d4489f0eac3034bae2eda365d61111fce648a0100000027ccf1d23c2d6f0368d74d41bd579e902113ee1dd6328125e33c6b56531933a5d809002613bf91a4d5773f000000000000000000000000000000000000000000000000", 0xa0, r2) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f00000006c0)={'nr0\x00', &(0x7f0000000bc0)=ANY=[]}) sendto$inet6(0xffffffffffffffff, &(0x7f00000004c0), 0x0, 0x0, &(0x7f0000000640)={0xa, 0x0, 0x0, @dev}, 0x1c) timerfd_gettime(0xffffffffffffffff, &(0x7f0000000680)) 21:47:36 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) socket$kcm(0x2, 0x3, 0x2) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0x50, &(0x7f0000000480)}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f0000000380)="6e7230010060a19ef9d2c623d9a1571cb9e1369bcd61ef7e49793ae18712eceb1daa769497800b7fbbd35b170c10751d39aeb660d863e49b8c4f3b3cad48902b5b2d6cfd0abd372c63bcf5d70df3fd4d2e8d443c88c60fd7140fbc0e5637dd82fc3435bed4de5d693c9a781c863e05d8a6f8689a5be29216061f3ff53f8b6b396678e7ba155ef9152d7e43b1eccb2331eb8eb1ed5586dcf8b3b0b999361a44ff2c22c2abbef42dd24eabe6723346a6e46c0499a21442d8d00dcb57f013ff7595edd0ff076930de3675d34117a44eb0e4f832936da44e") r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={"6e72300100", 0x801}) ioctl$TUNSETLINK(r1, 0x400454cd, 0x308) r2 = getpid() perf_event_open(&(0x7f0000000540)={0x0, 0x70, 0xf2, 0x0, 0x400, 0xadb0, 0x0, 0x0, 0x40000001110, 0x0, 0x2, 0x0, 0x0, 0x7, 0x0, 0x3, 0x401, 0x1, 0x5, 0x401, 0xce4, 0x87b, 0x3, 0x2, 0x9212, 0x0, 0x4, 0x40, 0x7ff, 0x100000001, 0x0, 0x6, 0x80000000, 0x6, 0xd7, 0x4, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={&(0x7f0000000500), 0xa}, 0x404c, 0x0, 0xffffffffffffffff}, r2, 0x9, 0xffffffffffffffff, 0xa) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='memory.stat\x00', 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000200)=@ax25={0x3, {"b8738e610d62ed"}}, 0x80, &(0x7f0000000040)}, 0x0) socket$kcm(0x29, 0x2, 0x0) 21:47:36 executing program 1: 21:47:36 executing program 5: 21:47:36 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) preadv(r0, &(0x7f0000000240), 0x0, 0x0) 21:47:36 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000080)='tunl0\x00', 0x27d) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1}, 0x10) r1 = socket$inet6(0xa, 0x80003, 0x4) ioctl(r1, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") connect$inet(0xffffffffffffffff, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) 21:47:36 executing program 2: unshare(0x0) [ 430.036780] device nr0 entered promiscuous mode 21:47:36 executing program 1: syz_emit_ethernet(0x1, &(0x7f0000000000)=ANY=[@ANYBLOB="aaaaaaaaaaaaaaaaaaaaaaaa08060006080006040001fffffffffffffeffffffaaaaaaaaaa00ac1414aa"], &(0x7f0000000040)) 21:47:36 executing program 5: unshare(0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000000)={0x1, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) setsockopt$inet6_MCAST_JOIN_GROUP(r0, 0x29, 0x2a, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast2}}}, 0x88) getsockname$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000240)=0x14) getsockopt$inet6_buf(r0, 0x29, 0x30, &(0x7f0000000000)=""/40, &(0x7f0000001000)=0xfffffffffffffff9) 21:47:37 executing program 3: socket$inet6(0xa, 0x2000008080f, 0x7f) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = memfd_create(&(0x7f00000002c0)='filter\x00', 0x0) socket$inet6(0xa, 0x0, 0xfffffffffffffffe) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000280)) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$int_out(0xffffffffffffffff, 0x0, &(0x7f0000000600)) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000000)={0x0, {0x2, 0x0, @loopback}, {0x2, 0x0, @loopback}, {0x2, 0x0, @multicast1}}) flock(0xffffffffffffffff, 0x0) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000040)={'filter\x00'}, &(0x7f00000000c0)=0x54) mknod$loop(&(0x7f00000005c0)='./file0\x00', 0x0, 0xffffffffffffffff) r1 = socket$inet(0x2, 0x1, 0x0) pipe(&(0x7f0000000340)) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, 0xffffffffffffffff) iopl(0x0) bind$inet(r1, &(0x7f0000000000)={0x2, 0x4e23, @local}, 0x10) getitimer(0x1, &(0x7f0000000240)) ioctl$TCSETSW(r0, 0x5403, &(0x7f00000001c0)={0x8001, 0x8, 0x7, 0x7, 0x31fe, 0x8001, 0x8, 0x9, 0x1, 0x5, 0x0, 0x3}) sendto$inet(r1, &(0x7f0000000280), 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23}, 0x10) bind$unix(0xffffffffffffffff, &(0x7f0000000380)=@file={0x0, './file0\x00'}, 0xfffffffffffffff8) setsockopt$sock_int(r1, 0x1, 0x9, &(0x7f0000000040)=0x3, 0x4) r2 = request_key(&(0x7f0000000480)='trusted\x00', &(0x7f0000000440), &(0x7f0000000700)='user\x00', 0x0) syz_extract_tcp_res$synack(&(0x7f0000000280), 0x1, 0x0) add_key$user(&(0x7f0000000140)='user\x00', &(0x7f0000000180), &(0x7f00000004c0)="f155638335ddf4a050b48f6f4b2be8871daee6e126e5a327bedc97f1f3a784504bf91834c1a2264bdc097fe1798d9378735b4c7270c96bbdacddfa517b184a9c477f4b6d6bca5d4489f0eac3034bae2eda365d61111fce648a0100000027ccf1d23c2d6f0368d74d41bd579e902113ee1dd6328125e33c6b56531933a5d809002613bf91a4d5773f000000000000000000000000000000000000000000000000", 0xa0, r2) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f00000006c0)={'nr0\x00', &(0x7f0000000bc0)=ANY=[]}) sendto$inet6(0xffffffffffffffff, &(0x7f00000004c0), 0x0, 0x0, &(0x7f0000000640)={0xa, 0x0, 0x0, @dev}, 0x1c) 21:47:37 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) poll(&(0x7f00000003c0)=[{r0}], 0x1, 0x1f) 21:47:37 executing program 2: r0 = epoll_create(0x3fa) writev(r0, &(0x7f0000000440), 0x0) 21:47:37 executing program 1: poll(&(0x7f00000003c0), 0x2000000000000066, 0x23) 21:47:37 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) socket$kcm(0x2, 0x3, 0x2) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0x50, &(0x7f0000000480)}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f0000000380)="6e7230010060a19ef9d2c623d9a1571cb9e1369bcd61ef7e49793ae18712eceb1daa769497800b7fbbd35b170c10751d39aeb660d863e49b8c4f3b3cad48902b5b2d6cfd0abd372c63bcf5d70df3fd4d2e8d443c88c60fd7140fbc0e5637dd82fc3435bed4de5d693c9a781c863e05d8a6f8689a5be29216061f3ff53f8b6b396678e7ba155ef9152d7e43b1eccb2331eb8eb1ed5586dcf8b3b0b999361a44ff2c22c2abbef42dd24eabe6723346a6e46c0499a21442d8d00dcb57f013ff7595edd0ff076930de3675d34117a44eb0e4f832936da44e") r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={"6e72300100", 0x801}) ioctl$TUNSETLINK(r1, 0x400454cd, 0x308) r2 = getpid() perf_event_open(&(0x7f0000000540)={0x0, 0x70, 0xf2, 0x0, 0x400, 0xadb0, 0x0, 0x0, 0x40000001110, 0x0, 0x2, 0x0, 0x0, 0x7, 0x5, 0x0, 0x401, 0x1, 0x5, 0x401, 0xce4, 0x87b, 0x3, 0x2, 0x9212, 0x0, 0x4, 0x40, 0x7ff, 0x100000001, 0x0, 0x6, 0x80000000, 0x6, 0xd7, 0x4, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={&(0x7f0000000500), 0xa}, 0x404c, 0x0, 0xffffffffffffffff}, r2, 0x9, 0xffffffffffffffff, 0xa) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='memory.stat\x00', 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000200)=@ax25={0x3, {"b8738e610d62ed"}}, 0x80, &(0x7f0000000040)}, 0x0) socket$kcm(0x29, 0x2, 0x0) 21:47:37 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000080)='tunl0\x00', 0x27d) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1}, 0x10) r1 = socket$inet6(0xa, 0x80003, 0x4) ioctl(r1, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") connect$inet(r0, &(0x7f0000ccb000), 0x10) 21:47:37 executing program 3: socket$inet6(0xa, 0x2000008080f, 0x7f) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = memfd_create(&(0x7f00000002c0)='filter\x00', 0x0) socket$inet6(0xa, 0x0, 0xfffffffffffffffe) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000280)) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$int_out(0xffffffffffffffff, 0x0, &(0x7f0000000600)) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000000)={0x0, {0x2, 0x0, @loopback}, {0x2, 0x0, @loopback}, {0x2, 0x0, @multicast1}}) flock(0xffffffffffffffff, 0x0) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000040)={'filter\x00'}, &(0x7f00000000c0)=0x54) mknod$loop(&(0x7f00000005c0)='./file0\x00', 0x0, 0xffffffffffffffff) r1 = socket$inet(0x2, 0x1, 0x0) pipe(&(0x7f0000000340)) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, 0xffffffffffffffff) iopl(0x0) bind$inet(r1, &(0x7f0000000000)={0x2, 0x4e23, @local}, 0x10) getitimer(0x1, &(0x7f0000000240)) ioctl$TCSETSW(r0, 0x5403, &(0x7f00000001c0)={0x8001, 0x8, 0x7, 0x7, 0x31fe, 0x8001, 0x8, 0x9, 0x1, 0x5, 0x0, 0x3}) sendto$inet(r1, &(0x7f0000000280), 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23}, 0x10) bind$unix(0xffffffffffffffff, &(0x7f0000000380)=@file={0x0, './file0\x00'}, 0xfffffffffffffff8) setsockopt$sock_int(r1, 0x1, 0x9, &(0x7f0000000040)=0x3, 0x4) r2 = request_key(&(0x7f0000000480)='trusted\x00', &(0x7f0000000440), &(0x7f0000000700)='user\x00', 0x0) syz_extract_tcp_res$synack(&(0x7f0000000280), 0x1, 0x0) add_key$user(&(0x7f0000000140)='user\x00', &(0x7f0000000180), &(0x7f00000004c0)="f155638335ddf4a050b48f6f4b2be8871daee6e126e5a327bedc97f1f3a784504bf91834c1a2264bdc097fe1798d9378735b4c7270c96bbdacddfa517b184a9c477f4b6d6bca5d4489f0eac3034bae2eda365d61111fce648a0100000027ccf1d23c2d6f0368d74d41bd579e902113ee1dd6328125e33c6b56531933a5d809002613bf91a4d5773f000000000000000000000000000000000000000000000000", 0xa0, r2) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f00000006c0)={'nr0\x00', &(0x7f0000000bc0)=ANY=[]}) 21:47:37 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2, &(0x7f0000000340)=0x1ff, 0x4) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, &(0x7f0000000280), 0x895ff3b0, 0x20000004, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @empty={[0xe000000d2070000]}}, 0x1c) r2 = accept(r0, 0x0, &(0x7f0000000080)=0xfffffffffffffdfd) close(r2) 21:47:37 executing program 1: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000180)=[{&(0x7f0000000240)="b7", 0x1}], 0x1, 0x0) write(r1, &(0x7f0000001200)="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", 0x150) r2 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r2, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) connect$inet(r2, &(0x7f0000000040)={0x2, 0x0, @multicast2}, 0x10) r3 = socket$inet6(0xa, 0x10000000803, 0x5) ioctl(r3, 0x1000008912, &(0x7f0000000000)="0a5c2d023c126285718070") write(r1, &(0x7f00000027c0)="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", 0x1000) splice(r0, 0x0, r2, 0x0, 0x20000000003, 0x0) 21:47:37 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) setsockopt$inet6_int(r0, 0x29, 0x33, &(0x7f00000000c0)=0x9, 0x4) sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) 21:47:37 executing program 1: r0 = socket$packet(0x11, 0x1000000000002, 0x300) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000200)={0x0, 0x1, 0x6, @random="e99ba5bf4a98"}, 0x10) [ 430.709486] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 430.725590] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. 21:47:37 executing program 5: r0 = socket$inet6(0xa, 0x803, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0a5c2d023c126285718070") r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) setsockopt$sock_int(r1, 0x1, 0x6, &(0x7f0000000200)=0x100000abd, 0x4) connect$inet(r1, &(0x7f0000000040)={0x2, 0x0, @broadcast}, 0x10) setsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000000340)={{{@in=@dev, @in=@multicast1}}, {{@in=@dev}, 0x0, @in6=@ipv4={[], [], @local}}}, 0xe8) 21:47:37 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) write$cgroup_subtree(r0, &(0x7f0000000000)=ANY=[@ANYRESDEC], 0xfffffdd1) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x100000, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000040)) 21:47:37 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000002e40)={0x12, 0xf0, 0x4, 0x6c, 0x0, 0x1}, 0x2c) 21:47:37 executing program 1: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000240)='/dev/net////\x00', 0x400610002, 0x0) 21:47:37 executing program 5: r0 = perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000012000)={0xe, 0x100000004, 0x4, 0x8}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f000000e000)={r1, &(0x7f0000000000), &(0x7f000000c000)="02"}, 0x20) [ 431.647367] kauditd_printk_skb: 2 callbacks suppressed [ 431.647382] audit: type=1804 audit(1538430458.513:103): pid=19187 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor2" name="/root/syzkaller-testdir188716757/syzkaller.mm6ySa/474/memory.events" dev="sda1" ino=16578 res=1 [ 431.688144] audit: type=1804 audit(1538430458.553:104): pid=19192 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor2" name="/root/syzkaller-testdir188716757/syzkaller.mm6ySa/474/memory.events" dev="sda1" ino=16578 res=1 [ 431.741052] audit: type=1800 audit(1538430458.603:105): pid=19187 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor2" name="memory.events" dev="sda1" ino=16578 res=0 [ 431.777031] audit: type=1800 audit(1538430458.603:106): pid=19192 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor2" name="memory.events" dev="sda1" ino=16578 res=0 21:47:39 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) socket$kcm(0x2, 0x3, 0x2) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0x50, &(0x7f0000000480)}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f0000000380)="6e7230010060a19ef9d2c623d9a1571cb9e1369bcd61ef7e49793ae18712eceb1daa769497800b7fbbd35b170c10751d39aeb660d863e49b8c4f3b3cad48902b5b2d6cfd0abd372c63bcf5d70df3fd4d2e8d443c88c60fd7140fbc0e5637dd82fc3435bed4de5d693c9a781c863e05d8a6f8689a5be29216061f3ff53f8b6b396678e7ba155ef9152d7e43b1eccb2331eb8eb1ed5586dcf8b3b0b999361a44ff2c22c2abbef42dd24eabe6723346a6e46c0499a21442d8d00dcb57f013ff7595edd0ff076930de3675d34117a44eb0e4f832936da44e") r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={"6e72300100", 0x801}) ioctl$TUNSETLINK(r1, 0x400454cd, 0x308) r2 = getpid() perf_event_open(&(0x7f0000000540)={0x0, 0x70, 0xf2, 0x0, 0x400, 0xadb0, 0x0, 0x0, 0x40000001110, 0x0, 0x2, 0x0, 0x0, 0x7, 0x5, 0x3, 0x0, 0x1, 0x5, 0x401, 0xce4, 0x87b, 0x3, 0x2, 0x9212, 0x0, 0x4, 0x40, 0x7ff, 0x100000001, 0x0, 0x6, 0x80000000, 0x6, 0xd7, 0x4, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={&(0x7f0000000500), 0xa}, 0x404c, 0x0, 0xffffffffffffffff}, r2, 0x9, 0xffffffffffffffff, 0xa) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='memory.stat\x00', 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000200)=@ax25={0x3, {"b8738e610d62ed"}}, 0x80, &(0x7f0000000040)}, 0x0) socket$kcm(0x29, 0x2, 0x0) 21:47:39 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000080)='tunl0\x00', 0x27d) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1}, 0x10) r1 = socket$inet6(0xa, 0x80003, 0x4) ioctl(r1, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") connect$inet(r0, &(0x7f0000ccb000), 0x10) 21:47:39 executing program 3: socket$inet6(0xa, 0x2000008080f, 0x7f) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = memfd_create(&(0x7f00000002c0)='filter\x00', 0x0) socket$inet6(0xa, 0x0, 0xfffffffffffffffe) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000280)) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$int_out(0xffffffffffffffff, 0x0, &(0x7f0000000600)) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000000)={0x0, {0x2, 0x0, @loopback}, {0x2, 0x0, @loopback}, {0x2, 0x0, @multicast1}}) flock(0xffffffffffffffff, 0x0) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000040)={'filter\x00'}, &(0x7f00000000c0)=0x54) mknod$loop(&(0x7f00000005c0)='./file0\x00', 0x0, 0xffffffffffffffff) r1 = socket$inet(0x2, 0x1, 0x0) pipe(&(0x7f0000000340)) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, 0xffffffffffffffff) iopl(0x0) bind$inet(r1, &(0x7f0000000000)={0x2, 0x4e23, @local}, 0x10) getitimer(0x1, &(0x7f0000000240)) ioctl$TCSETSW(r0, 0x5403, &(0x7f00000001c0)={0x8001, 0x8, 0x7, 0x7, 0x31fe, 0x8001, 0x8, 0x9, 0x1, 0x5, 0x0, 0x3}) sendto$inet(r1, &(0x7f0000000280), 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23}, 0x10) bind$unix(0xffffffffffffffff, &(0x7f0000000380)=@file={0x0, './file0\x00'}, 0xfffffffffffffff8) setsockopt$sock_int(r1, 0x1, 0x9, &(0x7f0000000040)=0x3, 0x4) r2 = request_key(&(0x7f0000000480)='trusted\x00', &(0x7f0000000440), &(0x7f0000000700)='user\x00', 0x0) syz_extract_tcp_res$synack(&(0x7f0000000280), 0x1, 0x0) add_key$user(&(0x7f0000000140)='user\x00', &(0x7f0000000180), &(0x7f00000004c0)="f155638335ddf4a050b48f6f4b2be8871daee6e126e5a327bedc97f1f3a784504bf91834c1a2264bdc097fe1798d9378735b4c7270c96bbdacddfa517b184a9c477f4b6d6bca5d4489f0eac3034bae2eda365d61111fce648a0100000027ccf1d23c2d6f0368d74d41bd579e902113ee1dd6328125e33c6b56531933a5d809002613bf91a4d5773f000000000000000000000000000000000000000000000000", 0xa0, r2) 21:47:39 executing program 2: socket$kcm(0xa, 0x5, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x4, 0x4, 0x4, 0xd}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={r0, &(0x7f0000000080), &(0x7f00000000c0)="04"}, 0x20) close(r0) 21:47:39 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='memory.events\x00', 0x0, 0x0) close(0xffffffffffffffff) r1 = getpid() getpid() r2 = perf_event_open(&(0x7f0000000480)={0x3, 0x70, 0xffffffffffff7fff, 0x1, 0x8000, 0x1, 0x0, 0x3f, 0x10000, 0x6, 0x5, 0x1, 0x5, 0x3, 0x7fffffff, 0x5, 0x1, 0x6, 0x40, 0x9, 0x3, 0x7, 0x9, 0x7fff, 0x10000, 0x3e000000, 0x5, 0x80, 0x4, 0x24, 0x2, 0x4, 0x1, 0xc740, 0x0, 0x6, 0x0, 0x0, 0x0, 0x3, 0x4, @perf_bp={&(0x7f0000000440), 0x9}, 0x800, 0x400, 0x1, 0x4, 0x147660000, 0x6, 0x985}, r1, 0x7, r0, 0xb) r3 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x0, 0x7, 0x8000, &(0x7f0000000140)={0xffffffffffffffff}) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x8914, &(0x7f0000000300)="6c6f00966fd651b959a9c84a2c00d297c00edc0d") ioctl$PERF_EVENT_IOC_PERIOD(r5, 0x40082404, &(0x7f0000000940)=0x2) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000280), 0x12) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x8914, &(0x7f0000000680)="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") perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r6, 0x4008240b, &(0x7f0000000380)={0x5, 0x70, 0x1, 0x8001, 0x0, 0x20, 0x0, 0x0, 0x200, 0x0, 0x9, 0x10000, 0x3, 0x0, 0x0, 0x0, 0x6, 0x0, 0x5, 0x0, 0x797, 0x6, 0xfffffffffffffffd, 0x5, 0x0, 0x3, 0xdba4, 0x7fff, 0x0, 0x0, 0xffffffff80000000, 0x9, 0x40, 0x1000, 0x39, 0xe91, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000340), 0x2}, 0x8, 0x8, 0x2, 0x0, 0x0, 0x36}) ioctl$TUNSETVNETBE(r4, 0x400454de, &(0x7f0000000600)=0x1) r7 = gettid() bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000002c0)={0xffffffffffffffff, &(0x7f0000000300), &(0x7f0000000040)="b3b35b5f4509d757c100a2574817f6ce90d716d9d2b4ae08b80d29e301e120512b89aab2cd615d27db32e2c9d5fbc1cad8bd2736bbbf8a815471e9e8e415faf537a498c4cb1fe8ce1a19ed29167aea2c60f0d929aa7585b34d99a7b0"}, 0x20) perf_event_open(&(0x7f0000000540)={0x0, 0x70, 0xa21, 0x5, 0xffffffffffff3cfd, 0x5, 0x0, 0x5, 0x8100, 0xf, 0x10001, 0x5, 0x1, 0x20, 0x4, 0x7, 0x0, 0x3, 0x400, 0xffffffffffff7fff, 0x8, 0x6, 0x4052, 0x7, 0x0, 0x9fcb, 0x0, 0xaf9b, 0x2, 0xe27f, 0x800, 0xe8, 0xfffffffffffffffe, 0xffff, 0x1ff, 0x6, 0xff, 0x8, 0x0, 0x2c78, 0x4, @perf_bp={&(0x7f0000000500), 0x1}, 0x40, 0x401, 0x0, 0x0, 0x1f, 0x800, 0x981}, r7, 0xe, r3, 0x8) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000900)='./cgroup.net/syz0\x00', 0x200002, 0x0) socketpair(0x10, 0x0, 0x0, &(0x7f0000000400)={0xffffffffffffffff}) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000008c0)='cpuacct.usage_percpu\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40042409, 0x4) openat$cgroup_ro(r8, &(0x7f00000005c0)='memory.current\x00', 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000980)={r0, 0x28, &(0x7f0000000100)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000009c0)={r9, 0x7, 0x10}, 0xc) 21:47:39 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000300)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000700)='./bus\x00', 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000002000)=ANY=[], &(0x7f0000003ff6)='syzkaller\x00', 0x0, 0xc3, &(0x7f0000386000)=""/195}, 0x48) r2 = open(&(0x7f00000000c0)='./bus\x00', 0x141042, 0x0) write$P9_RVERSION(r2, &(0x7f00000003c0)=ANY=[@ANYBLOB="13"], 0x1) ioctl$BLKDISCARD(r1, 0x1277, &(0x7f0000000000)) [ 432.329540] device lo left promiscuous mode 21:47:39 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) unshare(0x40000000) r2 = getpgid(0x0) fcntl$lock(r0, 0x6, &(0x7f0000000040)={0x3, 0x3, 0x7, 0xd1, r2}) fcntl$getown(r0, 0x9) 21:47:39 executing program 2: r0 = memfd_create(&(0x7f0000000240)="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", 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000180)={0x0, 0x4}) 21:47:39 executing program 3: socket$inet6(0xa, 0x2000008080f, 0x7f) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = memfd_create(&(0x7f00000002c0)='filter\x00', 0x0) socket$inet6(0xa, 0x0, 0xfffffffffffffffe) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000280)) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$int_out(0xffffffffffffffff, 0x0, &(0x7f0000000600)) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000000)={0x0, {0x2, 0x0, @loopback}, {0x2, 0x0, @loopback}, {0x2, 0x0, @multicast1}}) flock(0xffffffffffffffff, 0x0) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000040)={'filter\x00'}, &(0x7f00000000c0)=0x54) mknod$loop(&(0x7f00000005c0)='./file0\x00', 0x0, 0xffffffffffffffff) r1 = socket$inet(0x2, 0x1, 0x0) pipe(&(0x7f0000000340)) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, 0xffffffffffffffff) iopl(0x0) bind$inet(r1, &(0x7f0000000000)={0x2, 0x4e23, @local}, 0x10) getitimer(0x1, &(0x7f0000000240)) ioctl$TCSETSW(r0, 0x5403, &(0x7f00000001c0)={0x8001, 0x8, 0x7, 0x7, 0x31fe, 0x8001, 0x8, 0x9, 0x1, 0x5, 0x0, 0x3}) sendto$inet(r1, &(0x7f0000000280), 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23}, 0x10) bind$unix(0xffffffffffffffff, &(0x7f0000000380)=@file={0x0, './file0\x00'}, 0xfffffffffffffff8) setsockopt$sock_int(r1, 0x1, 0x9, &(0x7f0000000040)=0x3, 0x4) request_key(&(0x7f0000000480)='trusted\x00', &(0x7f0000000440), &(0x7f0000000700)='user\x00', 0x0) syz_extract_tcp_res$synack(&(0x7f0000000280), 0x1, 0x0) 21:47:39 executing program 2: r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$cgroup_type(r0, &(0x7f00000009c0)='threaded\x00', 0xced423) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f00000001c0), 0xffffffffffffffff) lseek(r0, 0x0, 0x0) write$P9_RLOCK(r0, &(0x7f0000000200)={0x7}, 0x8) fsetxattr(0xffffffffffffffff, &(0x7f0000000080)=@known='user.syz\x00', &(0x7f00000000c0)='./cgroup.cpu\x00', 0xd, 0x0) [ 432.536220] IPVS: ftp: loaded support on port[0] = 21 21:47:39 executing program 3: socket$inet6(0xa, 0x2000008080f, 0x7f) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = memfd_create(&(0x7f00000002c0)='filter\x00', 0x0) socket$inet6(0xa, 0x0, 0xfffffffffffffffe) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000280)) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$int_out(0xffffffffffffffff, 0x0, &(0x7f0000000600)) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000000)={0x0, {0x2, 0x0, @loopback}, {0x2, 0x0, @loopback}, {0x2, 0x0, @multicast1}}) flock(0xffffffffffffffff, 0x0) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000040)={'filter\x00'}, &(0x7f00000000c0)=0x54) mknod$loop(&(0x7f00000005c0)='./file0\x00', 0x0, 0xffffffffffffffff) r1 = socket$inet(0x2, 0x1, 0x0) pipe(&(0x7f0000000340)) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, 0xffffffffffffffff) iopl(0x0) bind$inet(r1, &(0x7f0000000000)={0x2, 0x4e23, @local}, 0x10) getitimer(0x1, &(0x7f0000000240)) ioctl$TCSETSW(r0, 0x5403, &(0x7f00000001c0)={0x8001, 0x8, 0x7, 0x7, 0x31fe, 0x8001, 0x8, 0x9, 0x1, 0x5, 0x0, 0x3}) sendto$inet(r1, &(0x7f0000000280), 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23}, 0x10) bind$unix(0xffffffffffffffff, &(0x7f0000000380)=@file={0x0, './file0\x00'}, 0xfffffffffffffff8) setsockopt$sock_int(r1, 0x1, 0x9, &(0x7f0000000040)=0x3, 0x4) request_key(&(0x7f0000000480)='trusted\x00', &(0x7f0000000440), &(0x7f0000000700)='user\x00', 0x0) 21:47:39 executing program 3: socket$inet6(0xa, 0x2000008080f, 0x7f) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = memfd_create(&(0x7f00000002c0)='filter\x00', 0x0) socket$inet6(0xa, 0x0, 0xfffffffffffffffe) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000280)) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$int_out(0xffffffffffffffff, 0x0, &(0x7f0000000600)) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000000)={0x0, {0x2, 0x0, @loopback}, {0x2, 0x0, @loopback}, {0x2, 0x0, @multicast1}}) flock(0xffffffffffffffff, 0x0) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000040)={'filter\x00'}, &(0x7f00000000c0)=0x54) mknod$loop(&(0x7f00000005c0)='./file0\x00', 0x0, 0xffffffffffffffff) r1 = socket$inet(0x2, 0x1, 0x0) pipe(&(0x7f0000000340)) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, 0xffffffffffffffff) iopl(0x0) bind$inet(r1, &(0x7f0000000000)={0x2, 0x4e23, @local}, 0x10) getitimer(0x1, &(0x7f0000000240)) ioctl$TCSETSW(r0, 0x5403, &(0x7f00000001c0)={0x8001, 0x8, 0x7, 0x7, 0x31fe, 0x8001, 0x8, 0x9, 0x1, 0x5, 0x0, 0x3}) sendto$inet(r1, &(0x7f0000000280), 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23}, 0x10) bind$unix(0xffffffffffffffff, &(0x7f0000000380)=@file={0x0, './file0\x00'}, 0xfffffffffffffff8) request_key(&(0x7f0000000480)='trusted\x00', &(0x7f0000000440), &(0x7f0000000700)='user\x00', 0x0) [ 433.279444] IPVS: ftp: loaded support on port[0] = 21 [ 433.417338] device lo entered promiscuous mode [ 433.431803] device lo left promiscuous mode 21:47:40 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) socket$kcm(0x2, 0x3, 0x2) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0x50, &(0x7f0000000480)}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f0000000380)="6e7230010060a19ef9d2c623d9a1571cb9e1369bcd61ef7e49793ae18712eceb1daa769497800b7fbbd35b170c10751d39aeb660d863e49b8c4f3b3cad48902b5b2d6cfd0abd372c63bcf5d70df3fd4d2e8d443c88c60fd7140fbc0e5637dd82fc3435bed4de5d693c9a781c863e05d8a6f8689a5be29216061f3ff53f8b6b396678e7ba155ef9152d7e43b1eccb2331eb8eb1ed5586dcf8b3b0b999361a44ff2c22c2abbef42dd24eabe6723346a6e46c0499a21442d8d00dcb57f013ff7595edd0ff076930de3675d34117a44eb0e4f832936da44e") r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={"6e72300100", 0x801}) ioctl$TUNSETLINK(r1, 0x400454cd, 0x308) r2 = getpid() perf_event_open(&(0x7f0000000540)={0x0, 0x70, 0xf2, 0x0, 0x400, 0xadb0, 0x0, 0x0, 0x40000001110, 0x0, 0x2, 0x0, 0x0, 0x7, 0x5, 0x3, 0x401, 0x0, 0x5, 0x401, 0xce4, 0x87b, 0x3, 0x2, 0x9212, 0x0, 0x4, 0x40, 0x7ff, 0x100000001, 0x0, 0x6, 0x80000000, 0x6, 0xd7, 0x4, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={&(0x7f0000000500), 0xa}, 0x404c, 0x0, 0xffffffffffffffff}, r2, 0x9, 0xffffffffffffffff, 0xa) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='memory.stat\x00', 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000200)=@ax25={0x3, {"b8738e610d62ed"}}, 0x80, &(0x7f0000000040)}, 0x0) socket$kcm(0x29, 0x2, 0x0) 21:47:40 executing program 3: socket$inet6(0xa, 0x2000008080f, 0x7f) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = memfd_create(&(0x7f00000002c0)='filter\x00', 0x0) socket$inet6(0xa, 0x0, 0xfffffffffffffffe) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000280)) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$int_out(0xffffffffffffffff, 0x0, &(0x7f0000000600)) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000000)={0x0, {0x2, 0x0, @loopback}, {0x2, 0x0, @loopback}, {0x2, 0x0, @multicast1}}) flock(0xffffffffffffffff, 0x0) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000040)={'filter\x00'}, &(0x7f00000000c0)=0x54) mknod$loop(&(0x7f00000005c0)='./file0\x00', 0x0, 0xffffffffffffffff) r1 = socket$inet(0x2, 0x1, 0x0) pipe(&(0x7f0000000340)) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, 0xffffffffffffffff) iopl(0x0) bind$inet(r1, &(0x7f0000000000)={0x2, 0x4e23, @local}, 0x10) getitimer(0x1, &(0x7f0000000240)) ioctl$TCSETSW(r0, 0x5403, &(0x7f00000001c0)={0x8001, 0x8, 0x7, 0x7, 0x31fe, 0x8001, 0x8, 0x9, 0x1, 0x5, 0x0, 0x3}) sendto$inet(r1, &(0x7f0000000280), 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23}, 0x10) request_key(&(0x7f0000000480)='trusted\x00', &(0x7f0000000440), &(0x7f0000000700)='user\x00', 0x0) 21:47:40 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000080)='tunl0\x00', 0x27d) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1}, 0x10) r1 = socket$inet6(0xa, 0x80003, 0x4) ioctl(r1, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") connect$inet(r0, &(0x7f0000ccb000), 0x10) [ 433.641754] device lo entered promiscuous mode 21:47:40 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_GET_MSR_INDEX_LIST(r1, 0xc004ae02, &(0x7f0000000000)={0x7e}) 21:47:40 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmmsg(r0, &(0x7f0000005280)=[{{&(0x7f0000001dc0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @mcast1}}}, 0x80, &(0x7f0000002000), 0x0, &(0x7f0000002040)=[{0x10, 0x1}], 0x10}}], 0x1, 0x4004804) 21:47:40 executing program 2: [ 433.866220] device nr0 entered promiscuous mode 21:47:43 executing program 1: 21:47:43 executing program 3: socket$inet6(0xa, 0x2000008080f, 0x7f) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = memfd_create(&(0x7f00000002c0)='filter\x00', 0x0) socket$inet6(0xa, 0x0, 0xfffffffffffffffe) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000280)) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$int_out(0xffffffffffffffff, 0x0, &(0x7f0000000600)) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000000)={0x0, {0x2, 0x0, @loopback}, {0x2, 0x0, @loopback}, {0x2, 0x0, @multicast1}}) flock(0xffffffffffffffff, 0x0) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000040)={'filter\x00'}, &(0x7f00000000c0)=0x54) mknod$loop(&(0x7f00000005c0)='./file0\x00', 0x0, 0xffffffffffffffff) r1 = socket$inet(0x2, 0x1, 0x0) pipe(&(0x7f0000000340)) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, 0xffffffffffffffff) iopl(0x0) bind$inet(r1, &(0x7f0000000000)={0x2, 0x4e23, @local}, 0x10) getitimer(0x1, &(0x7f0000000240)) ioctl$TCSETSW(r0, 0x5403, &(0x7f00000001c0)={0x8001, 0x8, 0x7, 0x7, 0x31fe, 0x8001, 0x8, 0x9, 0x1, 0x5, 0x0, 0x3}) request_key(&(0x7f0000000480)='trusted\x00', &(0x7f0000000440), &(0x7f0000000700)='user\x00', 0x0) 21:47:43 executing program 5: 21:47:43 executing program 2: 21:47:43 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) socket$kcm(0x2, 0x3, 0x2) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0x50, &(0x7f0000000480)}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f0000000380)="6e7230010060a19ef9d2c623d9a1571cb9e1369bcd61ef7e49793ae18712eceb1daa769497800b7fbbd35b170c10751d39aeb660d863e49b8c4f3b3cad48902b5b2d6cfd0abd372c63bcf5d70df3fd4d2e8d443c88c60fd7140fbc0e5637dd82fc3435bed4de5d693c9a781c863e05d8a6f8689a5be29216061f3ff53f8b6b396678e7ba155ef9152d7e43b1eccb2331eb8eb1ed5586dcf8b3b0b999361a44ff2c22c2abbef42dd24eabe6723346a6e46c0499a21442d8d00dcb57f013ff7595edd0ff076930de3675d34117a44eb0e4f832936da44e") r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={"6e72300100", 0x801}) ioctl$TUNSETLINK(r1, 0x400454cd, 0x308) r2 = getpid() perf_event_open(&(0x7f0000000540)={0x0, 0x70, 0xf2, 0x0, 0x400, 0xadb0, 0x0, 0x0, 0x40000001110, 0x0, 0x2, 0x0, 0x0, 0x7, 0x5, 0x3, 0x401, 0x0, 0x0, 0x401, 0xce4, 0x87b, 0x3, 0x2, 0x9212, 0x0, 0x4, 0x40, 0x7ff, 0x100000001, 0x0, 0x6, 0x80000000, 0x6, 0xd7, 0x4, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={&(0x7f0000000500), 0xa}, 0x404c, 0x0, 0xffffffffffffffff}, r2, 0x9, 0xffffffffffffffff, 0xa) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='memory.stat\x00', 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000200)=@ax25={0x3, {"b8738e610d62ed"}}, 0x80, &(0x7f0000000040)}, 0x0) socket$kcm(0x29, 0x2, 0x0) 21:47:43 executing program 0: 21:47:43 executing program 2: 21:47:43 executing program 0: 21:47:43 executing program 5: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000000)={&(0x7f0000000000)=@nl=@unspec={0x0, 0x0, 0x4c00000000000000}, 0x80, &(0x7f0000000280)=[{&(0x7f0000000140)="5500000020007fafb72d13b2a4a226236925000400fe7f0000bd2dca8a9848a3c728f1c46b7b31cedc1338d509000000000000005ae583de448daa7227c43ab8220000bf0cec6bab91d40000000000006052000000", 0x55}], 0x1, &(0x7f0000000080)}, 0x0) 21:47:43 executing program 1: r0 = socket(0x40000000002, 0x3, 0x2) setsockopt$inet_int(r0, 0x0, 0x14, &(0x7f0000000100)=0x5, 0x4) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000012c0)='syz_tun\x00', 0x269) sendto$unix(r0, &(0x7f0000000280), 0x0, 0x8000, &(0x7f0000000d00)=@abs={0x0, 0x0, 0x10000e0}, 0x6e) readv(r0, &(0x7f0000000500)=[{&(0x7f0000000140)=""/175, 0xaf}], 0x1) sendto$inet(r0, &(0x7f0000001300)="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", 0x5c5, 0xc000, &(0x7f0000000040)={0x2, 0x0, @multicast2}, 0x10) sendmmsg$unix(r0, &(0x7f0000005dc0)=[{&(0x7f0000000280)=@abs={0x0, 0x0, 0x4e20}, 0x6e, &(0x7f0000000980)=[{&(0x7f0000000300)="0b770ce2", 0x4}], 0x1, &(0x7f0000000e80)}], 0x1, 0x0) 21:47:43 executing program 3: socket$inet6(0xa, 0x2000008080f, 0x7f) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) memfd_create(&(0x7f00000002c0)='filter\x00', 0x0) socket$inet6(0xa, 0x0, 0xfffffffffffffffe) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000280)) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$int_out(0xffffffffffffffff, 0x0, &(0x7f0000000600)) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000000)={0x0, {0x2, 0x0, @loopback}, {0x2, 0x0, @loopback}, {0x2, 0x0, @multicast1}}) flock(0xffffffffffffffff, 0x0) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000040)={'filter\x00'}, &(0x7f00000000c0)=0x54) mknod$loop(&(0x7f00000005c0)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x1, 0x0) pipe(&(0x7f0000000340)) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, 0xffffffffffffffff) iopl(0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @local}, 0x10) getitimer(0x1, &(0x7f0000000240)) request_key(&(0x7f0000000480)='trusted\x00', &(0x7f0000000440), &(0x7f0000000700)='user\x00', 0x0) [ 436.436240] device nr0 entered promiscuous mode 21:47:43 executing program 2: unshare(0x60020200) r0 = socket(0x15, 0x7, 0x7fffffff) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcc, &(0x7f0000000400)={{0xa, 0x0, 0x6, @ipv4={[], [], @multicast2}, 0x1}, {0xa, 0x0, 0x0, @ipv4={[], [], @multicast1}, 0x4}, 0x4, [0x5, 0x1, 0x4, 0x7ff, 0x1, 0x9, 0xe6, 0x9]}, 0x5c) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000200)) 21:47:43 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockname(0xffffffffffffffff, &(0x7f0000000200)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @dev}}}, &(0x7f0000000280)=0x80) ioctl$sock_inet6_tcp_SIOCATMARK(r0, 0x8905, &(0x7f00000001c0)) 21:47:43 executing program 3: socket$inet6(0xa, 0x2000008080f, 0x7f) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) memfd_create(&(0x7f00000002c0)='filter\x00', 0x0) socket$inet6(0xa, 0x0, 0xfffffffffffffffe) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000280)) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$int_out(0xffffffffffffffff, 0x0, &(0x7f0000000600)) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000000)={0x0, {0x2, 0x0, @loopback}, {0x2, 0x0, @loopback}, {0x2, 0x0, @multicast1}}) flock(0xffffffffffffffff, 0x0) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000040)={'filter\x00'}, &(0x7f00000000c0)=0x54) mknod$loop(&(0x7f00000005c0)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x1, 0x0) pipe(&(0x7f0000000340)) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, 0xffffffffffffffff) iopl(0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @local}, 0x10) request_key(&(0x7f0000000480)='trusted\x00', &(0x7f0000000440), &(0x7f0000000700)='user\x00', 0x0) 21:47:43 executing program 1: r0 = socket(0x40000000002, 0x3, 0x2) setsockopt$inet_int(r0, 0x0, 0x14, &(0x7f0000000100)=0x5, 0x4) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000012c0)='syz_tun\x00', 0x269) sendto$unix(r0, &(0x7f0000000280), 0x0, 0x8000, &(0x7f0000000d00)=@abs={0x0, 0x0, 0x10000e0}, 0x6e) readv(r0, &(0x7f0000000500)=[{&(0x7f0000000140)=""/175, 0xaf}], 0x1) sendto$inet(r0, &(0x7f0000001300)="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", 0x5c5, 0xc000, &(0x7f0000000040)={0x2, 0x0, @multicast2}, 0x10) sendmmsg$unix(r0, &(0x7f0000005dc0)=[{&(0x7f0000000280)=@abs={0x0, 0x0, 0x4e20}, 0x6e, &(0x7f0000000980)=[{&(0x7f0000000300)="0b770ce2", 0x4}], 0x1, &(0x7f0000000e80)}], 0x1, 0x0) [ 436.633311] IPVS: ftp: loaded support on port[0] = 21 [ 436.687248] ================================================================== [ 436.694846] BUG: KASAN: use-after-free in ip_cmsg_recv_offset+0x12be/0x1390 [ 436.701963] Read of size 4 at addr ffff88018af815e0 by task syz-executor1/19321 [ 436.709409] [ 436.711050] CPU: 1 PID: 19321 Comm: syz-executor1 Not tainted 4.19.0-rc6+ #262 [ 436.718421] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 436.727783] Call Trace: [ 436.730386] dump_stack+0x1c4/0x2b4 [ 436.734045] ? dump_stack_print_info.cold.2+0x52/0x52 [ 436.739387] ? printk+0xa7/0xcf [ 436.742690] ? kmsg_dump_rewind_nolock+0xe4/0xe4 [ 436.747467] print_address_description.cold.8+0x9/0x1ff [ 436.752848] kasan_report.cold.9+0x242/0x309 [ 436.757264] ? ip_cmsg_recv_offset+0x12be/0x1390 [ 436.762030] __asan_report_load4_noabort+0x14/0x20 [ 436.766959] ip_cmsg_recv_offset+0x12be/0x1390 [ 436.771549] ? ip_send_unicast_reply+0x1770/0x1770 [ 436.776500] ? _copy_to_iter+0x1540/0x1540 [ 436.780747] ? rcu_lockdep_current_cpu_online+0x1f0/0x2d0 [ 436.786289] ? rcu_dynticks_curr_cpu_in_eqs+0x9f/0x160 [ 436.791794] ? rcu_pm_notify+0xc0/0xc0 [ 436.795703] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 436.801309] ? skb_copy_datagram_iter+0x26e/0xc10 [ 436.806182] ? __sk_queue_drop_skb+0x1f0/0x1f0 [ 436.810778] ? rcu_read_unlock_special.part.39+0x11f0/0x11f0 [ 436.816590] ? kasan_check_read+0x11/0x20 [ 436.820768] raw_recvmsg+0x71d/0x8b0 [ 436.824498] ? raw_abort+0xa0/0xa0 [ 436.828104] ? aa_file_perm+0x490/0x1060 [ 436.832185] inet_recvmsg+0x181/0x6d0 [ 436.835987] ? aa_path_link+0x5e0/0x5e0 [ 436.839969] ? inet_sendpage+0x740/0x740 [ 436.844037] ? aa_sock_msg_perm.isra.12+0xba/0x160 [ 436.848977] ? apparmor_socket_recvmsg+0x29/0x30 [ 436.853735] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 436.859277] ? security_socket_recvmsg+0x9c/0xc0 [ 436.864039] ? inet_sendpage+0x740/0x740 [ 436.868149] sock_recvmsg+0xd0/0x110 [ 436.871904] sock_read_iter+0x39b/0x570 [ 436.875904] ? sock_recvmsg+0x110/0x110 [ 436.879944] do_iter_readv_writev+0x77c/0xa80 [ 436.884457] ? vfs_dedupe_file_range+0x670/0x670 [ 436.889236] ? rw_verify_area+0x118/0x360 [ 436.893387] do_iter_read+0x26e/0x650 [ 436.897224] ? dup_iter+0x270/0x270 [ 436.900870] vfs_readv+0x175/0x1c0 [ 436.904417] ? compat_rw_copy_check_uvector+0x440/0x440 [ 436.909789] ? lock_release+0x970/0x970 [ 436.913773] ? arch_local_save_flags+0x40/0x40 [ 436.918364] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 436.924353] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 436.929898] ? __fdget_pos+0xde/0x200 [ 436.933701] ? __fdget_raw+0x20/0x20 [ 436.937418] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 436.942996] ? put_timespec64+0x10f/0x1b0 [ 436.947159] do_readv+0x11a/0x310 [ 436.950626] ? vfs_readv+0x1c0/0x1c0 [ 436.954361] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 436.959820] __x64_sys_readv+0x75/0xb0 [ 436.963716] do_syscall_64+0x1b9/0x820 [ 436.967606] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 436.972975] ? syscall_return_slowpath+0x5e0/0x5e0 [ 436.977908] ? trace_hardirqs_on_caller+0x310/0x310 [ 436.982927] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 436.987952] ? recalc_sigpending_tsk+0x180/0x180 [ 436.992707] ? kasan_check_write+0x14/0x20 [ 436.996948] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 437.001801] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 437.006988] RIP: 0033:0x457579 [ 437.010186] Code: 1d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 437.029088] RSP: 002b:00007f58cf0fcc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000013 [ 437.036803] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000457579 [ 437.044071] RDX: 0000000000000001 RSI: 0000000020000500 RDI: 0000000000000003 [ 437.051342] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 437.058618] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f58cf0fd6d4 [ 437.065885] R13: 00000000004c30b8 R14: 00000000004d4d10 R15: 00000000ffffffff [ 437.073172] [ 437.074794] Allocated by task 19321: [ 437.078514] save_stack+0x43/0xd0 [ 437.081962] kasan_kmalloc+0xc7/0xe0 [ 437.085678] __kmalloc_node_track_caller+0x47/0x70 [ 437.090607] __kmalloc_reserve.isra.39+0x41/0xe0 [ 437.095363] __alloc_skb+0x155/0x770 [ 437.099081] __ip_append_data.isra.47+0x21d6/0x29b0 [ 437.104102] ip_append_data.part.48+0xef/0x170 [ 437.108682] ip_append_data+0x6d/0x90 [ 437.112482] raw_sendmsg+0x1220/0x4380 [ 437.116366] inet_sendmsg+0x1a1/0x690 [ 437.120163] sock_sendmsg+0xd5/0x120 [ 437.123879] __sys_sendto+0x3d7/0x670 [ 437.127681] __x64_sys_sendto+0xe1/0x1a0 [ 437.131746] do_syscall_64+0x1b9/0x820 [ 437.135633] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 437.140813] [ 437.142433] Freed by task 19321: [ 437.145795] save_stack+0x43/0xd0 [ 437.149248] __kasan_slab_free+0x102/0x150 [ 437.153492] kasan_slab_free+0xe/0x10 [ 437.157292] kfree+0xcf/0x230 [ 437.160395] skb_free_head+0x99/0xc0 [ 437.164117] pskb_expand_head+0x3bb/0x10f0 [ 437.168354] __pskb_pull_tail+0x156/0x1890 [ 437.172596] ip_cmsg_recv_offset+0x113b/0x1390 [ 437.177192] raw_recvmsg+0x71d/0x8b0 [ 437.180906] inet_recvmsg+0x181/0x6d0 [ 437.184706] sock_recvmsg+0xd0/0x110 [ 437.188416] sock_read_iter+0x39b/0x570 [ 437.192408] do_iter_readv_writev+0x77c/0xa80 [ 437.196901] do_iter_read+0x26e/0x650 [ 437.200700] vfs_readv+0x175/0x1c0 [ 437.204237] do_readv+0x11a/0x310 [ 437.207736] __x64_sys_readv+0x75/0xb0 [ 437.211626] do_syscall_64+0x1b9/0x820 [ 437.215511] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 437.220689] [ 437.222317] The buggy address belongs to the object at ffff88018af815c0 [ 437.222317] which belongs to the cache kmalloc-512 of size 512 [ 437.234976] The buggy address is located 32 bytes inside of [ 437.234976] 512-byte region [ffff88018af815c0, ffff88018af817c0) [ 437.246766] The buggy address belongs to the page: [ 437.251693] page:ffffea00062be040 count:1 mapcount:0 mapping:ffff8801da800940 index:0x0 [ 437.259938] flags: 0x2fffc0000000100(slab) [ 437.264177] raw: 02fffc0000000100 ffffea0006f4b088 ffffea000720c4c8 ffff8801da800940 [ 437.272060] raw: 0000000000000000 ffff88018af810c0 0000000100000006 0000000000000000 [ 437.279940] page dumped because: kasan: bad access detected [ 437.285669] [ 437.287287] Memory state around the buggy address: [ 437.292225] ffff88018af81480: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 437.299587] ffff88018af81500: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 437.306944] >ffff88018af81580: fc fc fc fc fc fc fc fc fb fb fb fb fb fb fb fb [ 437.314294] ^ [ 437.320781] ffff88018af81600: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 437.328137] ffff88018af81680: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb 21:47:43 executing program 3: socket$inet6(0xa, 0x2000008080f, 0x7f) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) memfd_create(&(0x7f00000002c0)='filter\x00', 0x0) socket$inet6(0xa, 0x0, 0xfffffffffffffffe) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000280)) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$int_out(0xffffffffffffffff, 0x0, &(0x7f0000000600)) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000000)={0x0, {0x2, 0x0, @loopback}, {0x2, 0x0, @loopback}, {0x2, 0x0, @multicast1}}) flock(0xffffffffffffffff, 0x0) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000040)={'filter\x00'}, &(0x7f00000000c0)=0x54) mknod$loop(&(0x7f00000005c0)='./file0\x00', 0x0, 0xffffffffffffffff) socket$inet(0x2, 0x1, 0x0) pipe(&(0x7f0000000340)) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, 0xffffffffffffffff) iopl(0x0) request_key(&(0x7f0000000480)='trusted\x00', &(0x7f0000000440), &(0x7f0000000700)='user\x00', 0x0) [ 437.335484] ================================================================== [ 437.342832] Disabling lock debugging due to kernel taint [ 437.358252] Kernel panic - not syncing: panic_on_warn set ... [ 437.358252] [ 437.362132] kobject: 'loop5' (00000000a450c925): kobject_uevent_env [ 437.365653] CPU: 0 PID: 19321 Comm: syz-executor1 Tainted: G B 4.19.0-rc6+ #262 [ 437.365662] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 437.365667] Call Trace: [ 437.365695] dump_stack+0x1c4/0x2b4 [ 437.383630] kobject: 'loop5' (00000000a450c925): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 437.390183] ? dump_stack_print_info.cold.2+0x52/0x52 [ 437.390287] panic+0x238/0x4e7 [ 437.390306] ? add_taint.cold.5+0x16/0x16 [ 437.418431] ? preempt_schedule+0x4d/0x60 [ 437.422593] ? ___preempt_schedule+0x16/0x18 [ 437.427003] ? trace_hardirqs_on+0xb4/0x310 [ 437.431326] kasan_end_report+0x47/0x4f [ 437.435298] kasan_report.cold.9+0x76/0x309 [ 437.439617] ? ip_cmsg_recv_offset+0x12be/0x1390 [ 437.444373] __asan_report_load4_noabort+0x14/0x20 [ 437.449299] ip_cmsg_recv_offset+0x12be/0x1390 [ 437.453881] ? ip_send_unicast_reply+0x1770/0x1770 [ 437.458815] ? _copy_to_iter+0x1540/0x1540 [ 437.463053] ? rcu_lockdep_current_cpu_online+0x1f0/0x2d0 [ 437.468598] ? rcu_dynticks_curr_cpu_in_eqs+0x9f/0x160 [ 437.473873] ? rcu_pm_notify+0xc0/0xc0 [ 437.477767] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 437.483306] ? skb_copy_datagram_iter+0x26e/0xc10 [ 437.488155] ? __sk_queue_drop_skb+0x1f0/0x1f0 [ 437.492749] ? rcu_read_unlock_special.part.39+0x11f0/0x11f0 [ 437.498543] ? kasan_check_read+0x11/0x20 [ 437.502704] raw_recvmsg+0x71d/0x8b0 [ 437.506424] ? raw_abort+0xa0/0xa0 [ 437.509964] ? aa_file_perm+0x490/0x1060 [ 437.514028] inet_recvmsg+0x181/0x6d0 [ 437.517824] ? aa_path_link+0x5e0/0x5e0 [ 437.521801] ? inet_sendpage+0x740/0x740 [ 437.525862] ? aa_sock_msg_perm.isra.12+0xba/0x160 [ 437.530795] ? apparmor_socket_recvmsg+0x29/0x30 [ 437.535553] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 437.541100] ? security_socket_recvmsg+0x9c/0xc0 [ 437.545855] ? inet_sendpage+0x740/0x740 [ 437.549919] sock_recvmsg+0xd0/0x110 [ 437.553634] sock_read_iter+0x39b/0x570 [ 437.557612] ? sock_recvmsg+0x110/0x110 [ 437.561610] do_iter_readv_writev+0x77c/0xa80 [ 437.566107] ? vfs_dedupe_file_range+0x670/0x670 [ 437.570868] ? rw_verify_area+0x118/0x360 [ 437.575014] do_iter_read+0x26e/0x650 [ 437.578812] ? dup_iter+0x270/0x270 [ 437.582443] vfs_readv+0x175/0x1c0 [ 437.585987] ? compat_rw_copy_check_uvector+0x440/0x440 [ 437.591356] ? lock_release+0x970/0x970 [ 437.595328] ? arch_local_save_flags+0x40/0x40 [ 437.599908] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 437.605370] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 437.610906] ? __fdget_pos+0xde/0x200 [ 437.614704] ? __fdget_raw+0x20/0x20 [ 437.618417] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 437.623950] ? put_timespec64+0x10f/0x1b0 [ 437.628104] do_readv+0x11a/0x310 [ 437.631558] ? vfs_readv+0x1c0/0x1c0 [ 437.635290] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 437.640742] __x64_sys_readv+0x75/0xb0 [ 437.644634] do_syscall_64+0x1b9/0x820 [ 437.648523] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 437.653883] ? syscall_return_slowpath+0x5e0/0x5e0 [ 437.658816] ? trace_hardirqs_on_caller+0x310/0x310 [ 437.663834] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 437.668851] ? recalc_sigpending_tsk+0x180/0x180 [ 437.673606] ? kasan_check_write+0x14/0x20 [ 437.677846] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 437.682694] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 437.687880] RIP: 0033:0x457579 [ 437.691075] Code: 1d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 437.709972] RSP: 002b:00007f58cf0fcc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000013 [ 437.717676] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000457579 [ 437.724939] RDX: 0000000000000001 RSI: 0000000020000500 RDI: 0000000000000003 [ 437.732201] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 437.739465] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f58cf0fd6d4 [ 437.746728] R13: 00000000004c30b8 R14: 00000000004d4d10 R15: 00000000ffffffff [ 437.754998] Kernel Offset: disabled [ 437.758624] Rebooting in 86400 seconds..