ting program 4: syz_emit_ethernet(0x3e, &(0x7f00000000c0)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x30, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x223}, @dev}, @icmp=@parameter_prob={0x4, 0x4, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x223}, @dev}}}}}}, 0x0) 03:53:01 executing program 5: getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffff9c, 0x84, 0x13, 0x0, 0x0) r0 = syz_open_dev$swradio(&(0x7f0000000000)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$radio(0x0, 0xffffffffffffffff, 0x2) r1 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) getdents64(r1, 0x0, 0x0) r2 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r2, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(0xffffffffffffffff, 0x8) r3 = socket$inet6_sctp(0xa, 0x805, 0x84) r4 = accept4(r2, 0x0, 0x0, 0x0) prctl$PR_SET_ENDIAN(0x14, 0x1) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r3, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) epoll_pwait(0xffffffffffffffff, &(0x7f0000000040)=[{}, {}], 0x2, 0x0, &(0x7f0000000080), 0x8) getpgid(0x0) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r4, 0x84, 0x9, &(0x7f0000000280)={0x0, @in={{0x2, 0x0, @empty}}, 0x0, 0xac14142400000000, 0x0, 0x0, 0x54}, 0x98) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000780)={{{@in=@dev, @in6=@local}}, {{@in6=@mcast2}, 0x0, @in6=@dev}}, 0x0) ioctl$SIOCAX25ADDFWD(r0, 0x89ea, 0x0) syz_mount_image$gfs2(&(0x7f00000003c0)='gfs2\x00', 0x0, 0x87, 0x0, &(0x7f00000005c0), 0x1040040, 0x0) readv(r1, &(0x7f0000000500)=[{&(0x7f0000000400)=""/217, 0xd9}], 0x1) 03:53:01 executing program 3: 03:53:01 executing program 1: bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={0xffffffffffffffff, 0xdb, &(0x7f0000000200)={0x0, 0x0}}, 0x393) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='cgroup.events\x00', 0x0, 0x0) write$cgroup_int(r1, &(0x7f00000007c0)=0x6, 0x12) r2 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000002c0), 0x4) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz1\x00', 0x1ff) r3 = perf_event_open$cgroup(&(0x7f0000000600)={0x0, 0x70, 0x9, 0x6, 0x8, 0x6, 0x0, 0xfffffffffffff49f, 0x2, 0x6, 0x3ff, 0x0, 0x20, 0x0, 0x1, 0x81, 0x1, 0x400, 0x4, 0xfac, 0x4, 0x1, 0x10000, 0xf1, 0xd3, 0x92b, 0x200, 0x1, 0x100000000, 0x2, 0x100000000, 0xfff, 0xfff, 0xffff, 0x3, 0xfffffffffffffffd, 0x0, 0x6, 0x0, 0x50, 0x0, @perf_config_ext={0x3f, 0x9}, 0x20000, 0x8, 0xef3, 0x7, 0x100000000, 0x8, 0xfff}, 0xffffffffffffffff, 0x2, 0xffffffffffffffff, 0x8) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000b40)='cgroup.subtree_control\x00') ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0x1) r4 = getpid() socketpair$unix(0x1, 0x7, 0x0, &(0x7f0000000540)={0xffffffffffffffff}) setsockopt$sock_attach_bpf(r5, 0x1, 0x32, &(0x7f00000005c0)=r2, 0x4) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={0x0, 0xffffffffffffffff, 0x0, 0x12, &(0x7f0000000480)='./cgroup.cpu/syz1\x00', r0}, 0x30) perf_event_open(&(0x7f0000000300)={0x5, 0x70, 0xff, 0x4, 0x1000, 0xe5af, 0x0, 0x8000, 0xd0440, 0x2, 0xffff, 0x1, 0x4, 0x1f, 0x3, 0xfffffffffffffffa, 0x5, 0x9, 0x8, 0x1, 0x3, 0x400, 0x6, 0x5, 0x401, 0x10000, 0xff, 0xb24, 0xffffffffffff8000, 0xc8a, 0x3f, 0xfffffffffffffffa, 0xffffffffffff8001, 0x200, 0x5, 0x3, 0x2, 0x93a, 0x0, 0x7fff, 0x2, @perf_bp={&(0x7f0000000100), 0x1}, 0x0, 0x0, 0xffffffffffffff4e, 0x6, 0x0, 0x4, 0xfffffffffffffffd}, r4, 0x0, r6, 0x8) r7 = openat$tun(0xffffffffffffff9c, &(0x7f0000000580)='/dev/net/tun\x00', 0x40000, 0x0) ioctl$TUNSETPERSIST(r7, 0x400454cb, 0x1) r8 = socket$kcm(0x29, 0x5, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000800)={0x0, 0xffffffffffffffff, 0x1, 0x2}, 0x14) ioctl$sock_kcm_SIOCKCMUNATTACH(r8, 0x89e1, &(0x7f0000000900)={r1}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r2, 0x0, 0x8b, 0x0, &(0x7f0000000680)="3ce41f426b7dd449ae14b08e1868c456d4fe9c7993884cf18f4dd5a0bc57250243da4203e0640859184bc4c4690afefd7736e8842cd88030448e918bdb5bd9bbbd680a51261557c0477c18049c832005ebb5b185c6f233df73a21d3b3ddad8426fba2d5f8aac5df904d5e5f2e7dc4a517079e08d5b2175a276f2a5c49cc2957cb367f269898570852dd63a", 0x0, 0x5}, 0x28) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000500)='./cgroup/syz0\x00', 0x200002, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000740)={r2, 0x50, &(0x7f00000003c0)}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r1, 0x50, &(0x7f0000000840)}, 0x10) openat$cgroup_subtree(r1, &(0x7f0000000940)='cgroup.subtree_control\x00', 0x2, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x1ff, 0x0, 0x0, 0x0, 0x200000, 0xffffffffffffffff, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280), 0x2}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r9 = socket$kcm(0xa, 0x400000000002, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffc59) ioctl$sock_kcm_SIOCKCMCLONE(r9, 0x890b, &(0x7f0000000000)) ioctl$sock_kcm_SIOCKCMCLONE(r9, 0x890c, &(0x7f0000000000)) 03:53:01 executing program 0: 03:53:01 executing program 2: 03:53:01 executing program 3: 03:53:01 executing program 0: 03:53:02 executing program 2: 03:53:02 executing program 4: 03:53:02 executing program 0: 03:53:02 executing program 1: bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={0xffffffffffffffff, 0xdb, &(0x7f0000000200)={0x0, 0x0}}, 0x393) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='cgroup.events\x00', 0x0, 0x0) write$cgroup_int(r1, &(0x7f00000007c0)=0x6, 0x12) r2 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000002c0), 0x4) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz1\x00', 0x1ff) r3 = perf_event_open$cgroup(&(0x7f0000000600)={0x0, 0x70, 0x9, 0x6, 0x8, 0x6, 0x0, 0xfffffffffffff49f, 0x2, 0x6, 0x3ff, 0x0, 0x20, 0x0, 0x1, 0x81, 0x1, 0x400, 0x4, 0xfac, 0x4, 0x1, 0x10000, 0xf1, 0xd3, 0x92b, 0x200, 0x1, 0x100000000, 0x2, 0x100000000, 0xfff, 0xfff, 0xffff, 0x3, 0xfffffffffffffffd, 0x0, 0x6, 0x0, 0x50, 0x0, @perf_config_ext={0x3f, 0x9}, 0x20000, 0x8, 0xef3, 0x7, 0x100000000, 0x8, 0xfff}, 0xffffffffffffffff, 0x2, 0xffffffffffffffff, 0x8) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000b40)='cgroup.subtree_control\x00') ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0x1) r4 = getpid() socketpair$unix(0x1, 0x7, 0x0, &(0x7f0000000540)={0xffffffffffffffff}) setsockopt$sock_attach_bpf(r5, 0x1, 0x32, &(0x7f00000005c0)=r2, 0x4) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={0x0, 0xffffffffffffffff, 0x0, 0x12, &(0x7f0000000480)='./cgroup.cpu/syz1\x00', r0}, 0x30) perf_event_open(&(0x7f0000000300)={0x5, 0x70, 0xff, 0x4, 0x1000, 0xe5af, 0x0, 0x8000, 0xd0440, 0x2, 0xffff, 0x1, 0x4, 0x1f, 0x3, 0xfffffffffffffffa, 0x5, 0x9, 0x8, 0x1, 0x3, 0x400, 0x6, 0x5, 0x401, 0x10000, 0xff, 0xb24, 0xffffffffffff8000, 0xc8a, 0x3f, 0xfffffffffffffffa, 0xffffffffffff8001, 0x200, 0x5, 0x3, 0x2, 0x93a, 0x0, 0x7fff, 0x2, @perf_bp={&(0x7f0000000100), 0x1}, 0x0, 0x0, 0xffffffffffffff4e, 0x6, 0x0, 0x4, 0xfffffffffffffffd}, r4, 0x0, r6, 0x8) r7 = openat$tun(0xffffffffffffff9c, &(0x7f0000000580)='/dev/net/tun\x00', 0x40000, 0x0) ioctl$TUNSETPERSIST(r7, 0x400454cb, 0x1) r8 = socket$kcm(0x29, 0x5, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000800)={0x0, 0xffffffffffffffff, 0x1, 0x2}, 0x14) ioctl$sock_kcm_SIOCKCMUNATTACH(r8, 0x89e1, &(0x7f0000000900)={r1}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r2, 0x0, 0x8b, 0x0, &(0x7f0000000680)="3ce41f426b7dd449ae14b08e1868c456d4fe9c7993884cf18f4dd5a0bc57250243da4203e0640859184bc4c4690afefd7736e8842cd88030448e918bdb5bd9bbbd680a51261557c0477c18049c832005ebb5b185c6f233df73a21d3b3ddad8426fba2d5f8aac5df904d5e5f2e7dc4a517079e08d5b2175a276f2a5c49cc2957cb367f269898570852dd63a", 0x0, 0x5}, 0x28) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000500)='./cgroup/syz0\x00', 0x200002, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000740)={r2, 0x50, &(0x7f00000003c0)}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r1, 0x50, &(0x7f0000000840)}, 0x10) openat$cgroup_subtree(r1, &(0x7f0000000940)='cgroup.subtree_control\x00', 0x2, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x1ff, 0x0, 0x0, 0x0, 0x200000, 0xffffffffffffffff, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280), 0x2}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r9 = socket$kcm(0xa, 0x400000000002, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffc59) ioctl$sock_kcm_SIOCKCMCLONE(r9, 0x890b, &(0x7f0000000000)) ioctl$sock_kcm_SIOCKCMCLONE(r9, 0x890c, &(0x7f0000000000)) 03:53:02 executing program 3: 03:53:02 executing program 5: getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffff9c, 0x84, 0x13, 0x0, 0x0) r0 = syz_open_dev$swradio(&(0x7f0000000000)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$radio(0x0, 0xffffffffffffffff, 0x2) r1 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) getdents64(r1, 0x0, 0x0) r2 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r2, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(0xffffffffffffffff, 0x8) r3 = socket$inet6_sctp(0xa, 0x805, 0x84) r4 = accept4(r2, 0x0, 0x0, 0x0) prctl$PR_SET_ENDIAN(0x14, 0x1) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r3, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) epoll_pwait(0xffffffffffffffff, &(0x7f0000000040)=[{}, {}], 0x2, 0x0, &(0x7f0000000080), 0x8) getpgid(0x0) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r4, 0x84, 0x9, &(0x7f0000000280)={0x0, @in={{0x2, 0x0, @empty}}, 0x0, 0xac14142400000000, 0x0, 0x0, 0x54}, 0x98) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000780)={{{@in=@dev, @in6=@local}}, {{@in6=@mcast2}, 0x0, @in6=@dev}}, 0x0) ioctl$SIOCAX25ADDFWD(r0, 0x89ea, 0x0) syz_mount_image$gfs2(&(0x7f00000003c0)='gfs2\x00', 0x0, 0x87, 0x0, &(0x7f00000005c0), 0x1040040, 0x0) readv(r1, &(0x7f0000000500)=[{&(0x7f0000000400)=""/217, 0xd9}], 0x1) 03:53:02 executing program 4: 03:53:02 executing program 2: 03:53:02 executing program 0: 03:53:02 executing program 1: r0 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r0, 0xdb, &(0x7f0000000200)={0x0, 0x0}}, 0x393) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='cgroup.events\x00', 0x0, 0x0) write$cgroup_int(r2, &(0x7f00000007c0)=0x6, 0x12) r3 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000002c0), 0x4) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz1\x00', 0x1ff) r4 = perf_event_open$cgroup(&(0x7f0000000600)={0x0, 0x70, 0x9, 0x6, 0x8, 0x6, 0x0, 0xfffffffffffff49f, 0x2, 0x6, 0x3ff, 0x0, 0x20, 0x0, 0x1, 0x81, 0x1, 0x400, 0x4, 0xfac, 0x4, 0x1, 0x10000, 0xf1, 0xd3, 0x92b, 0x200, 0x1, 0x100000000, 0x2, 0x100000000, 0xfff, 0xfff, 0xffff, 0x3, 0xfffffffffffffffd, 0x0, 0x6, 0x0, 0x50, 0x0, @perf_config_ext={0x3f, 0x9}, 0x20000, 0x8, 0xef3, 0x7, 0x100000000, 0x8, 0xfff}, 0xffffffffffffffff, 0x2, r0, 0x8) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000b40)='cgroup.subtree_control\x00') ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x2400, 0x1) r5 = getpid() socketpair$unix(0x1, 0x7, 0x0, &(0x7f0000000540)={0xffffffffffffffff}) setsockopt$sock_attach_bpf(r6, 0x1, 0x32, &(0x7f00000005c0)=r3, 0x4) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={0x0, 0xffffffffffffffff, 0x0, 0x12, &(0x7f0000000480)='./cgroup.cpu/syz1\x00', r1}, 0x30) perf_event_open(&(0x7f0000000300)={0x5, 0x70, 0xff, 0x4, 0x1000, 0xe5af, 0x0, 0x8000, 0xd0440, 0x2, 0xffff, 0x1, 0x4, 0x1f, 0x3, 0xfffffffffffffffa, 0x5, 0x9, 0x8, 0x1, 0x3, 0x400, 0x6, 0x5, 0x401, 0x10000, 0xff, 0xb24, 0xffffffffffff8000, 0xc8a, 0x3f, 0xfffffffffffffffa, 0xffffffffffff8001, 0x200, 0x5, 0x3, 0x2, 0x93a, 0x0, 0x7fff, 0x2, @perf_bp={&(0x7f0000000100), 0x1}, 0x0, 0x0, 0xffffffffffffff4e, 0x6, 0x0, 0x4, 0xfffffffffffffffd}, r5, 0x0, r7, 0x8) r8 = openat$tun(0xffffffffffffff9c, &(0x7f0000000580)='/dev/net/tun\x00', 0x40000, 0x0) ioctl$TUNSETPERSIST(r8, 0x400454cb, 0x1) r9 = socket$kcm(0x29, 0x5, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000800)={0x0, r0, 0x1, 0x2}, 0x14) ioctl$sock_kcm_SIOCKCMUNATTACH(r9, 0x89e1, &(0x7f0000000900)={r2}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r3, 0x0, 0x8b, 0x0, &(0x7f0000000680)="3ce41f426b7dd449ae14b08e1868c456d4fe9c7993884cf18f4dd5a0bc57250243da4203e0640859184bc4c4690afefd7736e8842cd88030448e918bdb5bd9bbbd680a51261557c0477c18049c832005ebb5b185c6f233df73a21d3b3ddad8426fba2d5f8aac5df904d5e5f2e7dc4a517079e08d5b2175a276f2a5c49cc2957cb367f269898570852dd63a", 0x0, 0x5}, 0x28) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000500)='./cgroup/syz0\x00', 0x200002, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000740)={r3, 0x50, &(0x7f00000003c0)}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r2, 0x50, &(0x7f0000000840)}, 0x10) openat$cgroup_subtree(r2, &(0x7f0000000940)='cgroup.subtree_control\x00', 0x2, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x1ff, 0x0, 0x0, 0x0, 0x200000, 0xffffffffffffffff, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280), 0x2}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r10 = socket$kcm(0xa, 0x400000000002, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffc59) ioctl$sock_kcm_SIOCKCMCLONE(r10, 0x890b, &(0x7f0000000000)) ioctl$sock_kcm_SIOCKCMCLONE(r10, 0x890c, &(0x7f0000000000)) 03:53:02 executing program 3: 03:53:02 executing program 2: 03:53:02 executing program 4: 03:53:02 executing program 0: 03:53:02 executing program 1: r0 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r0, 0xdb, &(0x7f0000000200)={0x0, 0x0}}, 0x393) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='cgroup.events\x00', 0x0, 0x0) write$cgroup_int(r2, &(0x7f00000007c0)=0x6, 0x12) r3 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000002c0), 0x4) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz1\x00', 0x1ff) r4 = perf_event_open$cgroup(&(0x7f0000000600)={0x0, 0x70, 0x9, 0x6, 0x8, 0x6, 0x0, 0xfffffffffffff49f, 0x2, 0x6, 0x3ff, 0x0, 0x20, 0x0, 0x1, 0x81, 0x1, 0x400, 0x4, 0xfac, 0x4, 0x1, 0x10000, 0xf1, 0xd3, 0x92b, 0x200, 0x1, 0x100000000, 0x2, 0x100000000, 0xfff, 0xfff, 0xffff, 0x3, 0xfffffffffffffffd, 0x0, 0x6, 0x0, 0x50, 0x0, @perf_config_ext={0x3f, 0x9}, 0x20000, 0x8, 0xef3, 0x7, 0x100000000, 0x8, 0xfff}, 0xffffffffffffffff, 0x2, r0, 0x8) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000b40)='cgroup.subtree_control\x00') ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x2400, 0x1) r5 = getpid() socketpair$unix(0x1, 0x7, 0x0, &(0x7f0000000540)={0xffffffffffffffff}) setsockopt$sock_attach_bpf(r6, 0x1, 0x32, &(0x7f00000005c0)=r3, 0x4) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={0x0, 0xffffffffffffffff, 0x0, 0x12, &(0x7f0000000480)='./cgroup.cpu/syz1\x00', r1}, 0x30) perf_event_open(&(0x7f0000000300)={0x5, 0x70, 0xff, 0x4, 0x1000, 0xe5af, 0x0, 0x8000, 0xd0440, 0x2, 0xffff, 0x1, 0x4, 0x1f, 0x3, 0xfffffffffffffffa, 0x5, 0x9, 0x8, 0x1, 0x3, 0x400, 0x6, 0x5, 0x401, 0x10000, 0xff, 0xb24, 0xffffffffffff8000, 0xc8a, 0x3f, 0xfffffffffffffffa, 0xffffffffffff8001, 0x200, 0x5, 0x3, 0x2, 0x93a, 0x0, 0x7fff, 0x2, @perf_bp={&(0x7f0000000100), 0x1}, 0x0, 0x0, 0xffffffffffffff4e, 0x6, 0x0, 0x4, 0xfffffffffffffffd}, r5, 0x0, r7, 0x8) r8 = openat$tun(0xffffffffffffff9c, &(0x7f0000000580)='/dev/net/tun\x00', 0x40000, 0x0) ioctl$TUNSETPERSIST(r8, 0x400454cb, 0x1) r9 = socket$kcm(0x29, 0x5, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000800)={0x0, r0, 0x1, 0x2}, 0x14) ioctl$sock_kcm_SIOCKCMUNATTACH(r9, 0x89e1, &(0x7f0000000900)={r2}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r3, 0x0, 0x8b, 0x0, &(0x7f0000000680)="3ce41f426b7dd449ae14b08e1868c456d4fe9c7993884cf18f4dd5a0bc57250243da4203e0640859184bc4c4690afefd7736e8842cd88030448e918bdb5bd9bbbd680a51261557c0477c18049c832005ebb5b185c6f233df73a21d3b3ddad8426fba2d5f8aac5df904d5e5f2e7dc4a517079e08d5b2175a276f2a5c49cc2957cb367f269898570852dd63a", 0x0, 0x5}, 0x28) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000500)='./cgroup/syz0\x00', 0x200002, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000740)={r3, 0x50, &(0x7f00000003c0)}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r2, 0x50, &(0x7f0000000840)}, 0x10) openat$cgroup_subtree(r2, &(0x7f0000000940)='cgroup.subtree_control\x00', 0x2, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x1ff, 0x0, 0x0, 0x0, 0x200000, 0xffffffffffffffff, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280), 0x2}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r10 = socket$kcm(0xa, 0x400000000002, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffc59) ioctl$sock_kcm_SIOCKCMCLONE(r10, 0x890b, &(0x7f0000000000)) ioctl$sock_kcm_SIOCKCMCLONE(r10, 0x890c, &(0x7f0000000000)) 03:53:02 executing program 3: 03:53:02 executing program 2: 03:53:02 executing program 5: getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffff9c, 0x84, 0x13, 0x0, 0x0) r0 = syz_open_dev$swradio(&(0x7f0000000000)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$radio(0x0, 0xffffffffffffffff, 0x2) r1 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) getdents64(r1, 0x0, 0x0) r2 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r2, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r2, 0x0) r3 = socket$inet6_sctp(0xa, 0x805, 0x84) r4 = accept4(r2, 0x0, 0x0, 0x0) prctl$PR_SET_ENDIAN(0x14, 0x1) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r3, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) epoll_pwait(0xffffffffffffffff, &(0x7f0000000040)=[{}, {}], 0x2, 0x0, &(0x7f0000000080), 0x8) getpgid(0x0) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r4, 0x84, 0x9, &(0x7f0000000280)={0x0, @in={{0x2, 0x0, @empty}}, 0x0, 0xac14142400000000, 0x0, 0x0, 0x54}, 0x98) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000780)={{{@in=@dev, @in6=@local}}, {{@in6=@mcast2}, 0x0, @in6=@dev}}, 0x0) ioctl$SIOCAX25ADDFWD(r0, 0x89ea, 0x0) syz_mount_image$gfs2(&(0x7f00000003c0)='gfs2\x00', 0x0, 0x87, 0x0, &(0x7f00000005c0), 0x1040040, 0x0) readv(r1, &(0x7f0000000500)=[{&(0x7f0000000400)=""/217, 0xd9}], 0x1) 03:53:02 executing program 4: 03:53:02 executing program 0: 03:53:02 executing program 2: 03:53:02 executing program 3: 03:53:02 executing program 1: r0 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r0, 0xdb, &(0x7f0000000200)={0x0, 0x0}}, 0x393) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='cgroup.events\x00', 0x0, 0x0) write$cgroup_int(r2, &(0x7f00000007c0)=0x6, 0x12) r3 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000002c0), 0x4) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz1\x00', 0x1ff) r4 = perf_event_open$cgroup(&(0x7f0000000600)={0x0, 0x70, 0x9, 0x6, 0x8, 0x6, 0x0, 0xfffffffffffff49f, 0x2, 0x6, 0x3ff, 0x0, 0x20, 0x0, 0x1, 0x81, 0x1, 0x400, 0x4, 0xfac, 0x4, 0x1, 0x10000, 0xf1, 0xd3, 0x92b, 0x200, 0x1, 0x100000000, 0x2, 0x100000000, 0xfff, 0xfff, 0xffff, 0x3, 0xfffffffffffffffd, 0x0, 0x6, 0x0, 0x50, 0x0, @perf_config_ext={0x3f, 0x9}, 0x20000, 0x8, 0xef3, 0x7, 0x100000000, 0x8, 0xfff}, 0xffffffffffffffff, 0x2, r0, 0x8) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000b40)='cgroup.subtree_control\x00') ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x2400, 0x1) r5 = getpid() socketpair$unix(0x1, 0x7, 0x0, &(0x7f0000000540)={0xffffffffffffffff}) setsockopt$sock_attach_bpf(r6, 0x1, 0x32, &(0x7f00000005c0)=r3, 0x4) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={0x0, 0xffffffffffffffff, 0x0, 0x12, &(0x7f0000000480)='./cgroup.cpu/syz1\x00', r1}, 0x30) perf_event_open(&(0x7f0000000300)={0x5, 0x70, 0xff, 0x4, 0x1000, 0xe5af, 0x0, 0x8000, 0xd0440, 0x2, 0xffff, 0x1, 0x4, 0x1f, 0x3, 0xfffffffffffffffa, 0x5, 0x9, 0x8, 0x1, 0x3, 0x400, 0x6, 0x5, 0x401, 0x10000, 0xff, 0xb24, 0xffffffffffff8000, 0xc8a, 0x3f, 0xfffffffffffffffa, 0xffffffffffff8001, 0x200, 0x5, 0x3, 0x2, 0x93a, 0x0, 0x7fff, 0x2, @perf_bp={&(0x7f0000000100), 0x1}, 0x0, 0x0, 0xffffffffffffff4e, 0x6, 0x0, 0x4, 0xfffffffffffffffd}, r5, 0x0, r7, 0x8) r8 = openat$tun(0xffffffffffffff9c, &(0x7f0000000580)='/dev/net/tun\x00', 0x40000, 0x0) ioctl$TUNSETPERSIST(r8, 0x400454cb, 0x1) r9 = socket$kcm(0x29, 0x5, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000800)={0x0, r0, 0x1, 0x2}, 0x14) ioctl$sock_kcm_SIOCKCMUNATTACH(r9, 0x89e1, &(0x7f0000000900)={r2}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r3, 0x0, 0x8b, 0x0, &(0x7f0000000680)="3ce41f426b7dd449ae14b08e1868c456d4fe9c7993884cf18f4dd5a0bc57250243da4203e0640859184bc4c4690afefd7736e8842cd88030448e918bdb5bd9bbbd680a51261557c0477c18049c832005ebb5b185c6f233df73a21d3b3ddad8426fba2d5f8aac5df904d5e5f2e7dc4a517079e08d5b2175a276f2a5c49cc2957cb367f269898570852dd63a", 0x0, 0x5}, 0x28) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000500)='./cgroup/syz0\x00', 0x200002, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000740)={r3, 0x50, &(0x7f00000003c0)}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r2, 0x50, &(0x7f0000000840)}, 0x10) openat$cgroup_subtree(r2, &(0x7f0000000940)='cgroup.subtree_control\x00', 0x2, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x1ff, 0x0, 0x0, 0x0, 0x200000, 0xffffffffffffffff, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280), 0x2}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r10 = socket$kcm(0xa, 0x400000000002, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffc59) ioctl$sock_kcm_SIOCKCMCLONE(r10, 0x890b, &(0x7f0000000000)) ioctl$sock_kcm_SIOCKCMCLONE(r10, 0x890c, &(0x7f0000000000)) 03:53:02 executing program 4: 03:53:02 executing program 2: 03:53:02 executing program 5: getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffff9c, 0x84, 0x13, 0x0, 0x0) r0 = syz_open_dev$swradio(&(0x7f0000000000)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$radio(0x0, 0xffffffffffffffff, 0x2) r1 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) getdents64(r1, 0x0, 0x0) r2 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r2, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r2, 0x0) r3 = socket$inet6_sctp(0xa, 0x805, 0x84) r4 = accept4(r2, 0x0, 0x0, 0x0) prctl$PR_SET_ENDIAN(0x14, 0x1) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r3, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) epoll_pwait(0xffffffffffffffff, &(0x7f0000000040)=[{}, {}], 0x2, 0x0, &(0x7f0000000080), 0x8) getpgid(0x0) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r4, 0x84, 0x9, &(0x7f0000000280)={0x0, @in={{0x2, 0x0, @empty}}, 0x0, 0xac14142400000000, 0x0, 0x0, 0x54}, 0x98) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000780)={{{@in=@dev, @in6=@local}}, {{@in6=@mcast2}, 0x0, @in6=@dev}}, 0x0) ioctl$SIOCAX25ADDFWD(r0, 0x89ea, 0x0) syz_mount_image$gfs2(&(0x7f00000003c0)='gfs2\x00', 0x0, 0x87, 0x0, &(0x7f00000005c0), 0x1040040, 0x0) readv(r1, &(0x7f0000000500)=[{&(0x7f0000000400)=""/217, 0xd9}], 0x1) 03:53:02 executing program 0: 03:53:02 executing program 3: 03:53:02 executing program 2: 03:53:02 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x0, 0x20, &(0x7f0000000b80)=ANY=[@ANYBLOB="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"], 0x0, 0x1625, 0x0, 0x0, 0x41100, 0x1, [], 0x0, 0x4}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r0, 0xdb, &(0x7f0000000200)={0x0, 0x0}}, 0x393) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='cgroup.events\x00', 0x0, 0x0) write$cgroup_int(r2, &(0x7f00000007c0)=0x6, 0x12) r3 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000002c0), 0x4) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz1\x00', 0x1ff) r4 = perf_event_open$cgroup(&(0x7f0000000600)={0x0, 0x70, 0x9, 0x6, 0x8, 0x6, 0x0, 0xfffffffffffff49f, 0x2, 0x6, 0x3ff, 0x0, 0x20, 0x0, 0x1, 0x81, 0x1, 0x400, 0x4, 0xfac, 0x4, 0x1, 0x10000, 0xf1, 0xd3, 0x92b, 0x200, 0x1, 0x100000000, 0x2, 0x100000000, 0xfff, 0xfff, 0xffff, 0x3, 0xfffffffffffffffd, 0x0, 0x6, 0x0, 0x50, 0x0, @perf_config_ext={0x3f, 0x9}, 0x20000, 0x8, 0xef3, 0x7, 0x100000000, 0x8, 0xfff}, 0xffffffffffffffff, 0x2, r0, 0x8) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000b40)='cgroup.subtree_control\x00') ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x2400, 0x1) r5 = getpid() socketpair$unix(0x1, 0x7, 0x0, &(0x7f0000000540)={0xffffffffffffffff}) setsockopt$sock_attach_bpf(r6, 0x1, 0x32, &(0x7f00000005c0)=r3, 0x4) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={0x0, 0xffffffffffffffff, 0x0, 0x12, &(0x7f0000000480)='./cgroup.cpu/syz1\x00', r1}, 0x30) perf_event_open(&(0x7f0000000300)={0x5, 0x70, 0xff, 0x4, 0x1000, 0xe5af, 0x0, 0x8000, 0xd0440, 0x2, 0xffff, 0x1, 0x4, 0x1f, 0x3, 0xfffffffffffffffa, 0x5, 0x9, 0x8, 0x1, 0x3, 0x400, 0x6, 0x5, 0x401, 0x10000, 0xff, 0xb24, 0xffffffffffff8000, 0xc8a, 0x3f, 0xfffffffffffffffa, 0xffffffffffff8001, 0x200, 0x5, 0x3, 0x2, 0x93a, 0x0, 0x7fff, 0x2, @perf_bp={&(0x7f0000000100), 0x1}, 0x0, 0x0, 0xffffffffffffff4e, 0x6, 0x0, 0x4, 0xfffffffffffffffd}, r5, 0x0, r7, 0x8) r8 = openat$tun(0xffffffffffffff9c, &(0x7f0000000580)='/dev/net/tun\x00', 0x40000, 0x0) ioctl$TUNSETPERSIST(r8, 0x400454cb, 0x1) r9 = socket$kcm(0x29, 0x5, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000800)={0x0, r0, 0x1, 0x2}, 0x14) ioctl$sock_kcm_SIOCKCMUNATTACH(r9, 0x89e1, &(0x7f0000000900)={r2}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r3, 0x0, 0x8b, 0x0, &(0x7f0000000680)="3ce41f426b7dd449ae14b08e1868c456d4fe9c7993884cf18f4dd5a0bc57250243da4203e0640859184bc4c4690afefd7736e8842cd88030448e918bdb5bd9bbbd680a51261557c0477c18049c832005ebb5b185c6f233df73a21d3b3ddad8426fba2d5f8aac5df904d5e5f2e7dc4a517079e08d5b2175a276f2a5c49cc2957cb367f269898570852dd63a", 0x0, 0x5}, 0x28) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000500)='./cgroup/syz0\x00', 0x200002, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000740)={r3, 0x50, &(0x7f00000003c0)}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r2, 0x50, &(0x7f0000000840)}, 0x10) openat$cgroup_subtree(r2, &(0x7f0000000940)='cgroup.subtree_control\x00', 0x2, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x1ff, 0x0, 0x0, 0x0, 0x200000, 0xffffffffffffffff, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280), 0x2}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r10 = socket$kcm(0xa, 0x400000000002, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffc59) ioctl$sock_kcm_SIOCKCMCLONE(r10, 0x890b, &(0x7f0000000000)) ioctl$sock_kcm_SIOCKCMCLONE(r10, 0x890c, &(0x7f0000000000)) 03:53:02 executing program 4: 03:53:02 executing program 0: 03:53:02 executing program 3: 03:53:02 executing program 2: 03:53:02 executing program 3: 03:53:02 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x0, 0x20, &(0x7f0000000b80)=ANY=[@ANYBLOB="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"], 0x0, 0x1625, 0x0, 0x0, 0x41100, 0x1, [], 0x0, 0x4}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r0, 0xdb, &(0x7f0000000200)={0x0, 0x0}}, 0x393) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='cgroup.events\x00', 0x0, 0x0) write$cgroup_int(r2, &(0x7f00000007c0)=0x6, 0x12) r3 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000002c0), 0x4) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz1\x00', 0x1ff) r4 = perf_event_open$cgroup(&(0x7f0000000600)={0x0, 0x70, 0x9, 0x6, 0x8, 0x6, 0x0, 0xfffffffffffff49f, 0x2, 0x6, 0x3ff, 0x0, 0x20, 0x0, 0x1, 0x81, 0x1, 0x400, 0x4, 0xfac, 0x4, 0x1, 0x10000, 0xf1, 0xd3, 0x92b, 0x200, 0x1, 0x100000000, 0x2, 0x100000000, 0xfff, 0xfff, 0xffff, 0x3, 0xfffffffffffffffd, 0x0, 0x6, 0x0, 0x50, 0x0, @perf_config_ext={0x3f, 0x9}, 0x20000, 0x8, 0xef3, 0x7, 0x100000000, 0x8, 0xfff}, 0xffffffffffffffff, 0x2, r0, 0x8) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000b40)='cgroup.subtree_control\x00') ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x2400, 0x1) r5 = getpid() socketpair$unix(0x1, 0x7, 0x0, &(0x7f0000000540)={0xffffffffffffffff}) setsockopt$sock_attach_bpf(r6, 0x1, 0x32, &(0x7f00000005c0)=r3, 0x4) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={0x0, 0xffffffffffffffff, 0x0, 0x12, &(0x7f0000000480)='./cgroup.cpu/syz1\x00', r1}, 0x30) perf_event_open(&(0x7f0000000300)={0x5, 0x70, 0xff, 0x4, 0x1000, 0xe5af, 0x0, 0x8000, 0xd0440, 0x2, 0xffff, 0x1, 0x4, 0x1f, 0x3, 0xfffffffffffffffa, 0x5, 0x9, 0x8, 0x1, 0x3, 0x400, 0x6, 0x5, 0x401, 0x10000, 0xff, 0xb24, 0xffffffffffff8000, 0xc8a, 0x3f, 0xfffffffffffffffa, 0xffffffffffff8001, 0x200, 0x5, 0x3, 0x2, 0x93a, 0x0, 0x7fff, 0x2, @perf_bp={&(0x7f0000000100), 0x1}, 0x0, 0x0, 0xffffffffffffff4e, 0x6, 0x0, 0x4, 0xfffffffffffffffd}, r5, 0x0, r7, 0x8) r8 = openat$tun(0xffffffffffffff9c, &(0x7f0000000580)='/dev/net/tun\x00', 0x40000, 0x0) ioctl$TUNSETPERSIST(r8, 0x400454cb, 0x1) r9 = socket$kcm(0x29, 0x5, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000800)={0x0, r0, 0x1, 0x2}, 0x14) ioctl$sock_kcm_SIOCKCMUNATTACH(r9, 0x89e1, &(0x7f0000000900)={r2}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r3, 0x0, 0x8b, 0x0, &(0x7f0000000680)="3ce41f426b7dd449ae14b08e1868c456d4fe9c7993884cf18f4dd5a0bc57250243da4203e0640859184bc4c4690afefd7736e8842cd88030448e918bdb5bd9bbbd680a51261557c0477c18049c832005ebb5b185c6f233df73a21d3b3ddad8426fba2d5f8aac5df904d5e5f2e7dc4a517079e08d5b2175a276f2a5c49cc2957cb367f269898570852dd63a", 0x0, 0x5}, 0x28) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000500)='./cgroup/syz0\x00', 0x200002, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000740)={r3, 0x50, &(0x7f00000003c0)}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r2, 0x50, &(0x7f0000000840)}, 0x10) openat$cgroup_subtree(r2, &(0x7f0000000940)='cgroup.subtree_control\x00', 0x2, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x1ff, 0x0, 0x0, 0x0, 0x200000, 0xffffffffffffffff, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280), 0x2}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r10 = socket$kcm(0xa, 0x400000000002, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffc59) ioctl$sock_kcm_SIOCKCMCLONE(r10, 0x890b, &(0x7f0000000000)) ioctl$sock_kcm_SIOCKCMCLONE(r10, 0x890c, &(0x7f0000000000)) 03:53:02 executing program 0: 03:53:02 executing program 5: getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffff9c, 0x84, 0x13, 0x0, 0x0) r0 = syz_open_dev$swradio(&(0x7f0000000000)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$radio(0x0, 0xffffffffffffffff, 0x2) r1 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) getdents64(r1, 0x0, 0x0) r2 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r2, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r2, 0x0) r3 = socket$inet6_sctp(0xa, 0x805, 0x84) r4 = accept4(r2, 0x0, 0x0, 0x0) prctl$PR_SET_ENDIAN(0x14, 0x1) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r3, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) epoll_pwait(0xffffffffffffffff, &(0x7f0000000040)=[{}, {}], 0x2, 0x0, &(0x7f0000000080), 0x8) getpgid(0x0) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r4, 0x84, 0x9, &(0x7f0000000280)={0x0, @in={{0x2, 0x0, @empty}}, 0x0, 0xac14142400000000, 0x0, 0x0, 0x54}, 0x98) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000780)={{{@in=@dev, @in6=@local}}, {{@in6=@mcast2}, 0x0, @in6=@dev}}, 0x0) ioctl$SIOCAX25ADDFWD(r0, 0x89ea, 0x0) syz_mount_image$gfs2(&(0x7f00000003c0)='gfs2\x00', 0x0, 0x87, 0x0, &(0x7f00000005c0), 0x1040040, 0x0) readv(r1, &(0x7f0000000500)=[{&(0x7f0000000400)=""/217, 0xd9}], 0x1) 03:53:03 executing program 4: 03:53:03 executing program 2: 03:53:03 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x0, 0x20, &(0x7f0000000b80)=ANY=[@ANYBLOB="cab5674ca80400f902c8d3fc17d4a51472ff5e04a7ed68e9074e865fffffffffff6582e2a0c58f438f1a9b1af27305fb6c1d497851a00d51dddde821f356222d82de15a5bb3ca4d544c3683ff903b30637ee634a8a4fa0e19e57c7d35e4db3a02231b71023a910ac2424326e31258bde7ca760ff3ca3261a92112b3c8db9e0d79dc5ad29e05434154bba1e60d243d8fa466b27518c09e11b78ec43ab7af1d33fbd4885ee5e95b0849345d0edef0a2e68320a47938597cf0fba5ae2e93301ffc38baaf2673b7fd4628a0fe3665006d238567bdb430991e02866ad858345dc86331d91a53051b3284827fc0a870d857ecc180901feb2d1dd3be0c1ebc3fa1d00d550744d9e55"], 0x0, 0x1625, 0x0, 0x0, 0x41100, 0x1, [], 0x0, 0x4}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r0, 0xdb, &(0x7f0000000200)={0x0, 0x0}}, 0x393) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='cgroup.events\x00', 0x0, 0x0) write$cgroup_int(r2, &(0x7f00000007c0)=0x6, 0x12) r3 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000002c0), 0x4) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz1\x00', 0x1ff) r4 = perf_event_open$cgroup(&(0x7f0000000600)={0x0, 0x70, 0x9, 0x6, 0x8, 0x6, 0x0, 0xfffffffffffff49f, 0x2, 0x6, 0x3ff, 0x0, 0x20, 0x0, 0x1, 0x81, 0x1, 0x400, 0x4, 0xfac, 0x4, 0x1, 0x10000, 0xf1, 0xd3, 0x92b, 0x200, 0x1, 0x100000000, 0x2, 0x100000000, 0xfff, 0xfff, 0xffff, 0x3, 0xfffffffffffffffd, 0x0, 0x6, 0x0, 0x50, 0x0, @perf_config_ext={0x3f, 0x9}, 0x20000, 0x8, 0xef3, 0x7, 0x100000000, 0x8, 0xfff}, 0xffffffffffffffff, 0x2, r0, 0x8) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000b40)='cgroup.subtree_control\x00') ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x2400, 0x1) r5 = getpid() socketpair$unix(0x1, 0x7, 0x0, &(0x7f0000000540)={0xffffffffffffffff}) setsockopt$sock_attach_bpf(r6, 0x1, 0x32, &(0x7f00000005c0)=r3, 0x4) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={0x0, 0xffffffffffffffff, 0x0, 0x12, &(0x7f0000000480)='./cgroup.cpu/syz1\x00', r1}, 0x30) perf_event_open(&(0x7f0000000300)={0x5, 0x70, 0xff, 0x4, 0x1000, 0xe5af, 0x0, 0x8000, 0xd0440, 0x2, 0xffff, 0x1, 0x4, 0x1f, 0x3, 0xfffffffffffffffa, 0x5, 0x9, 0x8, 0x1, 0x3, 0x400, 0x6, 0x5, 0x401, 0x10000, 0xff, 0xb24, 0xffffffffffff8000, 0xc8a, 0x3f, 0xfffffffffffffffa, 0xffffffffffff8001, 0x200, 0x5, 0x3, 0x2, 0x93a, 0x0, 0x7fff, 0x2, @perf_bp={&(0x7f0000000100), 0x1}, 0x0, 0x0, 0xffffffffffffff4e, 0x6, 0x0, 0x4, 0xfffffffffffffffd}, r5, 0x0, r7, 0x8) r8 = openat$tun(0xffffffffffffff9c, &(0x7f0000000580)='/dev/net/tun\x00', 0x40000, 0x0) ioctl$TUNSETPERSIST(r8, 0x400454cb, 0x1) r9 = socket$kcm(0x29, 0x5, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000800)={0x0, r0, 0x1, 0x2}, 0x14) ioctl$sock_kcm_SIOCKCMUNATTACH(r9, 0x89e1, &(0x7f0000000900)={r2}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r3, 0x0, 0x8b, 0x0, &(0x7f0000000680)="3ce41f426b7dd449ae14b08e1868c456d4fe9c7993884cf18f4dd5a0bc57250243da4203e0640859184bc4c4690afefd7736e8842cd88030448e918bdb5bd9bbbd680a51261557c0477c18049c832005ebb5b185c6f233df73a21d3b3ddad8426fba2d5f8aac5df904d5e5f2e7dc4a517079e08d5b2175a276f2a5c49cc2957cb367f269898570852dd63a", 0x0, 0x5}, 0x28) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000500)='./cgroup/syz0\x00', 0x200002, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000740)={r3, 0x50, &(0x7f00000003c0)}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r2, 0x50, &(0x7f0000000840)}, 0x10) openat$cgroup_subtree(r2, &(0x7f0000000940)='cgroup.subtree_control\x00', 0x2, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x1ff, 0x0, 0x0, 0x0, 0x200000, 0xffffffffffffffff, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280), 0x2}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r10 = socket$kcm(0xa, 0x400000000002, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffc59) ioctl$sock_kcm_SIOCKCMCLONE(r10, 0x890b, &(0x7f0000000000)) ioctl$sock_kcm_SIOCKCMCLONE(r10, 0x890c, &(0x7f0000000000)) 03:53:03 executing program 0: 03:53:03 executing program 3: 03:53:03 executing program 2: 03:53:03 executing program 4: 03:53:03 executing program 0: 03:53:03 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x0, 0x0, 0x0, 0x1625, 0x0, 0x0, 0x41100, 0x1, [], 0x0, 0x4}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r0, 0xdb, &(0x7f0000000200)={0x0, 0x0}}, 0x393) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='cgroup.events\x00', 0x0, 0x0) write$cgroup_int(r2, &(0x7f00000007c0)=0x6, 0x12) r3 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000002c0), 0x4) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz1\x00', 0x1ff) r4 = perf_event_open$cgroup(&(0x7f0000000600)={0x0, 0x70, 0x9, 0x6, 0x8, 0x6, 0x0, 0xfffffffffffff49f, 0x2, 0x6, 0x3ff, 0x0, 0x20, 0x0, 0x1, 0x81, 0x1, 0x400, 0x4, 0xfac, 0x4, 0x1, 0x10000, 0xf1, 0xd3, 0x92b, 0x200, 0x1, 0x100000000, 0x2, 0x100000000, 0xfff, 0xfff, 0xffff, 0x3, 0xfffffffffffffffd, 0x0, 0x6, 0x0, 0x50, 0x0, @perf_config_ext={0x3f, 0x9}, 0x20000, 0x8, 0xef3, 0x7, 0x100000000, 0x8, 0xfff}, 0xffffffffffffffff, 0x2, r0, 0x8) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000b40)='cgroup.subtree_control\x00') ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x2400, 0x1) r5 = getpid() socketpair$unix(0x1, 0x7, 0x0, &(0x7f0000000540)={0xffffffffffffffff}) setsockopt$sock_attach_bpf(r6, 0x1, 0x32, &(0x7f00000005c0)=r3, 0x4) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={0x0, 0xffffffffffffffff, 0x0, 0x12, &(0x7f0000000480)='./cgroup.cpu/syz1\x00', r1}, 0x30) perf_event_open(&(0x7f0000000300)={0x5, 0x70, 0xff, 0x4, 0x1000, 0xe5af, 0x0, 0x8000, 0xd0440, 0x2, 0xffff, 0x1, 0x4, 0x1f, 0x3, 0xfffffffffffffffa, 0x5, 0x9, 0x8, 0x1, 0x3, 0x400, 0x6, 0x5, 0x401, 0x10000, 0xff, 0xb24, 0xffffffffffff8000, 0xc8a, 0x3f, 0xfffffffffffffffa, 0xffffffffffff8001, 0x200, 0x5, 0x3, 0x2, 0x93a, 0x0, 0x7fff, 0x2, @perf_bp={&(0x7f0000000100), 0x1}, 0x0, 0x0, 0xffffffffffffff4e, 0x6, 0x0, 0x4, 0xfffffffffffffffd}, r5, 0x0, r7, 0x8) r8 = openat$tun(0xffffffffffffff9c, &(0x7f0000000580)='/dev/net/tun\x00', 0x40000, 0x0) ioctl$TUNSETPERSIST(r8, 0x400454cb, 0x1) r9 = socket$kcm(0x29, 0x5, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000800)={0x0, r0, 0x1, 0x2}, 0x14) ioctl$sock_kcm_SIOCKCMUNATTACH(r9, 0x89e1, &(0x7f0000000900)={r2}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r3, 0x0, 0x8b, 0x0, &(0x7f0000000680)="3ce41f426b7dd449ae14b08e1868c456d4fe9c7993884cf18f4dd5a0bc57250243da4203e0640859184bc4c4690afefd7736e8842cd88030448e918bdb5bd9bbbd680a51261557c0477c18049c832005ebb5b185c6f233df73a21d3b3ddad8426fba2d5f8aac5df904d5e5f2e7dc4a517079e08d5b2175a276f2a5c49cc2957cb367f269898570852dd63a", 0x0, 0x5}, 0x28) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000500)='./cgroup/syz0\x00', 0x200002, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000740)={r3, 0x50, &(0x7f00000003c0)}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r2, 0x50, &(0x7f0000000840)}, 0x10) openat$cgroup_subtree(r2, &(0x7f0000000940)='cgroup.subtree_control\x00', 0x2, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x1ff, 0x0, 0x0, 0x0, 0x200000, 0xffffffffffffffff, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280), 0x2}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r10 = socket$kcm(0xa, 0x400000000002, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffc59) ioctl$sock_kcm_SIOCKCMCLONE(r10, 0x890b, &(0x7f0000000000)) ioctl$sock_kcm_SIOCKCMCLONE(r10, 0x890c, &(0x7f0000000000)) 03:53:03 executing program 5: getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffff9c, 0x84, 0x13, 0x0, 0x0) r0 = syz_open_dev$swradio(&(0x7f0000000000)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$radio(0x0, 0xffffffffffffffff, 0x2) r1 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) getdents64(r1, 0x0, 0x0) r2 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r2, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r2, 0x8) r3 = socket$inet6_sctp(0xa, 0x0, 0x84) r4 = accept4(r2, 0x0, 0x0, 0x0) prctl$PR_SET_ENDIAN(0x14, 0x1) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r3, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) epoll_pwait(0xffffffffffffffff, &(0x7f0000000040)=[{}, {}], 0x2, 0x0, &(0x7f0000000080), 0x8) getpgid(0x0) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r4, 0x84, 0x9, &(0x7f0000000280)={0x0, @in={{0x2, 0x0, @empty}}, 0x0, 0xac14142400000000, 0x0, 0x0, 0x54}, 0x98) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000780)={{{@in=@dev, @in6=@local}}, {{@in6=@mcast2}, 0x0, @in6=@dev}}, 0x0) ioctl$SIOCAX25ADDFWD(r0, 0x89ea, 0x0) syz_mount_image$gfs2(&(0x7f00000003c0)='gfs2\x00', 0x0, 0x87, 0x0, &(0x7f00000005c0), 0x1040040, 0x0) readv(r1, &(0x7f0000000500)=[{&(0x7f0000000400)=""/217, 0xd9}], 0x1) 03:53:03 executing program 4: 03:53:03 executing program 2: 03:53:03 executing program 0: 03:53:03 executing program 3: 03:53:03 executing program 4: 03:53:03 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x0, 0x0, 0x0, 0x1625, 0x0, 0x0, 0x41100, 0x1, [], 0x0, 0x4}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r0, 0xdb, &(0x7f0000000200)={0x0, 0x0}}, 0x393) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='cgroup.events\x00', 0x0, 0x0) write$cgroup_int(r2, &(0x7f00000007c0)=0x6, 0x12) r3 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000002c0), 0x4) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz1\x00', 0x1ff) r4 = perf_event_open$cgroup(&(0x7f0000000600)={0x0, 0x70, 0x9, 0x6, 0x8, 0x6, 0x0, 0xfffffffffffff49f, 0x2, 0x6, 0x3ff, 0x0, 0x20, 0x0, 0x1, 0x81, 0x1, 0x400, 0x4, 0xfac, 0x4, 0x1, 0x10000, 0xf1, 0xd3, 0x92b, 0x200, 0x1, 0x100000000, 0x2, 0x100000000, 0xfff, 0xfff, 0xffff, 0x3, 0xfffffffffffffffd, 0x0, 0x6, 0x0, 0x50, 0x0, @perf_config_ext={0x3f, 0x9}, 0x20000, 0x8, 0xef3, 0x7, 0x100000000, 0x8, 0xfff}, 0xffffffffffffffff, 0x2, r0, 0x8) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000b40)='cgroup.subtree_control\x00') ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x2400, 0x1) r5 = getpid() socketpair$unix(0x1, 0x7, 0x0, &(0x7f0000000540)={0xffffffffffffffff}) setsockopt$sock_attach_bpf(r6, 0x1, 0x32, &(0x7f00000005c0)=r3, 0x4) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={0x0, 0xffffffffffffffff, 0x0, 0x12, &(0x7f0000000480)='./cgroup.cpu/syz1\x00', r1}, 0x30) perf_event_open(&(0x7f0000000300)={0x5, 0x70, 0xff, 0x4, 0x1000, 0xe5af, 0x0, 0x8000, 0xd0440, 0x2, 0xffff, 0x1, 0x4, 0x1f, 0x3, 0xfffffffffffffffa, 0x5, 0x9, 0x8, 0x1, 0x3, 0x400, 0x6, 0x5, 0x401, 0x10000, 0xff, 0xb24, 0xffffffffffff8000, 0xc8a, 0x3f, 0xfffffffffffffffa, 0xffffffffffff8001, 0x200, 0x5, 0x3, 0x2, 0x93a, 0x0, 0x7fff, 0x2, @perf_bp={&(0x7f0000000100), 0x1}, 0x0, 0x0, 0xffffffffffffff4e, 0x6, 0x0, 0x4, 0xfffffffffffffffd}, r5, 0x0, r7, 0x8) r8 = openat$tun(0xffffffffffffff9c, &(0x7f0000000580)='/dev/net/tun\x00', 0x40000, 0x0) ioctl$TUNSETPERSIST(r8, 0x400454cb, 0x1) r9 = socket$kcm(0x29, 0x5, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000800)={0x0, r0, 0x1, 0x2}, 0x14) ioctl$sock_kcm_SIOCKCMUNATTACH(r9, 0x89e1, &(0x7f0000000900)={r2}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r3, 0x0, 0x8b, 0x0, &(0x7f0000000680)="3ce41f426b7dd449ae14b08e1868c456d4fe9c7993884cf18f4dd5a0bc57250243da4203e0640859184bc4c4690afefd7736e8842cd88030448e918bdb5bd9bbbd680a51261557c0477c18049c832005ebb5b185c6f233df73a21d3b3ddad8426fba2d5f8aac5df904d5e5f2e7dc4a517079e08d5b2175a276f2a5c49cc2957cb367f269898570852dd63a", 0x0, 0x5}, 0x28) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000500)='./cgroup/syz0\x00', 0x200002, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000740)={r3, 0x50, &(0x7f00000003c0)}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r2, 0x50, &(0x7f0000000840)}, 0x10) openat$cgroup_subtree(r2, &(0x7f0000000940)='cgroup.subtree_control\x00', 0x2, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x1ff, 0x0, 0x0, 0x0, 0x200000, 0xffffffffffffffff, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280), 0x2}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r10 = socket$kcm(0xa, 0x400000000002, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffc59) ioctl$sock_kcm_SIOCKCMCLONE(r10, 0x890b, &(0x7f0000000000)) ioctl$sock_kcm_SIOCKCMCLONE(r10, 0x890c, &(0x7f0000000000)) 03:53:03 executing program 2: 03:53:03 executing program 3: 03:53:03 executing program 2: 03:53:03 executing program 4: 03:53:03 executing program 0: 03:53:03 executing program 5: getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffff9c, 0x84, 0x13, 0x0, 0x0) r0 = syz_open_dev$swradio(&(0x7f0000000000)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$radio(0x0, 0xffffffffffffffff, 0x2) r1 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) getdents64(r1, 0x0, 0x0) r2 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r2, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r2, 0x8) r3 = socket$inet6_sctp(0xa, 0x0, 0x84) r4 = accept4(r2, 0x0, 0x0, 0x0) prctl$PR_SET_ENDIAN(0x14, 0x1) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r3, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) epoll_pwait(0xffffffffffffffff, &(0x7f0000000040)=[{}, {}], 0x2, 0x0, &(0x7f0000000080), 0x8) getpgid(0x0) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r4, 0x84, 0x9, &(0x7f0000000280)={0x0, @in={{0x2, 0x0, @empty}}, 0x0, 0xac14142400000000, 0x0, 0x0, 0x54}, 0x98) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000780)={{{@in=@dev, @in6=@local}}, {{@in6=@mcast2}, 0x0, @in6=@dev}}, 0x0) ioctl$SIOCAX25ADDFWD(r0, 0x89ea, 0x0) syz_mount_image$gfs2(&(0x7f00000003c0)='gfs2\x00', 0x0, 0x87, 0x0, &(0x7f00000005c0), 0x1040040, 0x0) readv(r1, &(0x7f0000000500)=[{&(0x7f0000000400)=""/217, 0xd9}], 0x1) 03:53:03 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) fcntl$F_SET_RW_HINT(r0, 0x40c, &(0x7f0000000200)=0x7) 03:53:03 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x0, 0x0, 0x0, 0x1625, 0x0, 0x0, 0x41100, 0x1, [], 0x0, 0x4}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r0, 0xdb, &(0x7f0000000200)={0x0, 0x0}}, 0x393) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='cgroup.events\x00', 0x0, 0x0) write$cgroup_int(r2, &(0x7f00000007c0)=0x6, 0x12) r3 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000002c0), 0x4) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz1\x00', 0x1ff) r4 = perf_event_open$cgroup(&(0x7f0000000600)={0x0, 0x70, 0x9, 0x6, 0x8, 0x6, 0x0, 0xfffffffffffff49f, 0x2, 0x6, 0x3ff, 0x0, 0x20, 0x0, 0x1, 0x81, 0x1, 0x400, 0x4, 0xfac, 0x4, 0x1, 0x10000, 0xf1, 0xd3, 0x92b, 0x200, 0x1, 0x100000000, 0x2, 0x100000000, 0xfff, 0xfff, 0xffff, 0x3, 0xfffffffffffffffd, 0x0, 0x6, 0x0, 0x50, 0x0, @perf_config_ext={0x3f, 0x9}, 0x20000, 0x8, 0xef3, 0x7, 0x100000000, 0x8, 0xfff}, 0xffffffffffffffff, 0x2, r0, 0x8) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000b40)='cgroup.subtree_control\x00') ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x2400, 0x1) r5 = getpid() socketpair$unix(0x1, 0x7, 0x0, &(0x7f0000000540)={0xffffffffffffffff}) setsockopt$sock_attach_bpf(r6, 0x1, 0x32, &(0x7f00000005c0)=r3, 0x4) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={0x0, 0xffffffffffffffff, 0x0, 0x12, &(0x7f0000000480)='./cgroup.cpu/syz1\x00', r1}, 0x30) perf_event_open(&(0x7f0000000300)={0x5, 0x70, 0xff, 0x4, 0x1000, 0xe5af, 0x0, 0x8000, 0xd0440, 0x2, 0xffff, 0x1, 0x4, 0x1f, 0x3, 0xfffffffffffffffa, 0x5, 0x9, 0x8, 0x1, 0x3, 0x400, 0x6, 0x5, 0x401, 0x10000, 0xff, 0xb24, 0xffffffffffff8000, 0xc8a, 0x3f, 0xfffffffffffffffa, 0xffffffffffff8001, 0x200, 0x5, 0x3, 0x2, 0x93a, 0x0, 0x7fff, 0x2, @perf_bp={&(0x7f0000000100), 0x1}, 0x0, 0x0, 0xffffffffffffff4e, 0x6, 0x0, 0x4, 0xfffffffffffffffd}, r5, 0x0, r7, 0x8) r8 = openat$tun(0xffffffffffffff9c, &(0x7f0000000580)='/dev/net/tun\x00', 0x40000, 0x0) ioctl$TUNSETPERSIST(r8, 0x400454cb, 0x1) r9 = socket$kcm(0x29, 0x5, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000800)={0x0, r0, 0x1, 0x2}, 0x14) ioctl$sock_kcm_SIOCKCMUNATTACH(r9, 0x89e1, &(0x7f0000000900)={r2}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r3, 0x0, 0x8b, 0x0, &(0x7f0000000680)="3ce41f426b7dd449ae14b08e1868c456d4fe9c7993884cf18f4dd5a0bc57250243da4203e0640859184bc4c4690afefd7736e8842cd88030448e918bdb5bd9bbbd680a51261557c0477c18049c832005ebb5b185c6f233df73a21d3b3ddad8426fba2d5f8aac5df904d5e5f2e7dc4a517079e08d5b2175a276f2a5c49cc2957cb367f269898570852dd63a", 0x0, 0x5}, 0x28) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000500)='./cgroup/syz0\x00', 0x200002, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000740)={r3, 0x50, &(0x7f00000003c0)}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r2, 0x50, &(0x7f0000000840)}, 0x10) openat$cgroup_subtree(r2, &(0x7f0000000940)='cgroup.subtree_control\x00', 0x2, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x1ff, 0x0, 0x0, 0x0, 0x200000, 0xffffffffffffffff, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280), 0x2}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r10 = socket$kcm(0xa, 0x400000000002, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffc59) ioctl$sock_kcm_SIOCKCMCLONE(r10, 0x890b, &(0x7f0000000000)) ioctl$sock_kcm_SIOCKCMCLONE(r10, 0x890c, &(0x7f0000000000)) 03:53:03 executing program 4: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x29, 0x5, 0x0) close(r0) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x894c, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0xb701, 0xffffffffffffffff) 03:53:03 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x28, 0x2, 0x0, &(0x7f0000000000)) 03:53:03 executing program 2: r0 = syz_open_dev$loop(&(0x7f0000000680)='/dev/loop#\x00', 0x0, 0x100082) r1 = memfd_create(&(0x7f0000000380)='\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x01\x00\x00\x00v\x8e\x05\xf7\xc1U\xad}\xc6\x94|W>Zi$Nv8,\n\xa6=W^\xa3Y\x7f\x8b\x17(\'~\xf7k0TM{\xa9-\xcf\x97\x8f\x1f\x81\xdc\x1b\x7f\x8f{4Q\xda\xda\x02\xec\xb4\xf1\xdd\xcc\x8bRA\xda\x89Efn\x00s\xc2Zb\x01\x00M\xbe\xa3z\xab\xd3\xeb\x98\x88\xc4\xc6)A\x9fP\x93zhH\xe0\xd2\x81\xdb\xeeV\x8cM\xe9\xa06\xc2o\x19\"\xf6Iq\xd4\xdf\x97\xfb\xab\x04\xe8\xceI8\xb3\x1d\xcf%\x9bK\xc6\t\x01\xe1\x86a\xfa\xb8\xfb)\x88\xcd+\xc2`\xc2\xf5r5>k\xb0\xa0\x02\xfc\x16MO\x18\x9b\x06\x80b\xd1\x01\x00\x00\x00\x00\x00\x00\x00@\f\fL\xa5{Tk\x940\x17.\xa56.\xe0\x14\x1b=\xf0j\xd25\xe8\x15\xd8\x9e\xea\xd3\xd9G4\t\xc0\x9c.\'\xa9R3z$\xf2\x01\x88\xc0\x13\x12<\xc01j3\xd8\xb4CE7s\xe4\xa0\x9e\xdd\x801\x12M\xee\x13\xce\x9cu(\x8f.\xc83\xc7\xe6j\xf5\xb1\x9a\x00\x00\x00\x00\x00\x00\x00', 0x0) pwritev(r1, &(0x7f00000000c0)=[{&(0x7f00000005c0)='\'', 0x1}], 0x1, 0x81806) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendfile(r0, r1, &(0x7f0000000280)=0x4800, 0x20000102000007) 03:53:03 executing program 4: socketpair$unix(0x1, 0x0, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) open(0x0, 0xfffffffffffffffc, 0x0) readv(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) socket$key(0xf, 0x3, 0x2) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$inet6_int(r1, 0x29, 0xb, &(0x7f0000000280)=0x2, 0x4) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) pause() perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) ioctl$TIOCNXCL(0xffffffffffffffff, 0x540d) mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) getpeername(0xffffffffffffffff, 0x0, 0x0) ioctl$TIOCNXCL(0xffffffffffffffff, 0x540d) r2 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x7fff) sendfile(r1, r2, &(0x7f0000d83ff8), 0x8000fffffffe) socketpair$unix(0x1, 0x4000000000000002, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) 03:53:03 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(r1, r2, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) 03:53:03 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x0, &(0x7f0000000b80)=ANY=[], 0x0, 0x1625, 0x0, 0x0, 0x41100, 0x1, [], 0x0, 0x4}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r0, 0xdb, &(0x7f0000000200)={0x0, 0x0}}, 0x393) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='cgroup.events\x00', 0x0, 0x0) write$cgroup_int(r2, &(0x7f00000007c0)=0x6, 0x12) r3 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000002c0), 0x4) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz1\x00', 0x1ff) r4 = perf_event_open$cgroup(&(0x7f0000000600)={0x0, 0x70, 0x9, 0x6, 0x8, 0x6, 0x0, 0xfffffffffffff49f, 0x2, 0x6, 0x3ff, 0x0, 0x20, 0x0, 0x1, 0x81, 0x1, 0x400, 0x4, 0xfac, 0x4, 0x1, 0x10000, 0xf1, 0xd3, 0x92b, 0x200, 0x1, 0x100000000, 0x2, 0x100000000, 0xfff, 0xfff, 0xffff, 0x3, 0xfffffffffffffffd, 0x0, 0x6, 0x0, 0x50, 0x0, @perf_config_ext={0x3f, 0x9}, 0x20000, 0x8, 0xef3, 0x7, 0x100000000, 0x8, 0xfff}, 0xffffffffffffffff, 0x2, r0, 0x8) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000b40)='cgroup.subtree_control\x00') ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x2400, 0x1) r5 = getpid() socketpair$unix(0x1, 0x7, 0x0, &(0x7f0000000540)={0xffffffffffffffff}) setsockopt$sock_attach_bpf(r6, 0x1, 0x32, &(0x7f00000005c0)=r3, 0x4) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={0x0, 0xffffffffffffffff, 0x0, 0x12, &(0x7f0000000480)='./cgroup.cpu/syz1\x00', r1}, 0x30) perf_event_open(&(0x7f0000000300)={0x5, 0x70, 0xff, 0x4, 0x1000, 0xe5af, 0x0, 0x8000, 0xd0440, 0x2, 0xffff, 0x1, 0x4, 0x1f, 0x3, 0xfffffffffffffffa, 0x5, 0x9, 0x8, 0x1, 0x3, 0x400, 0x6, 0x5, 0x401, 0x10000, 0xff, 0xb24, 0xffffffffffff8000, 0xc8a, 0x3f, 0xfffffffffffffffa, 0xffffffffffff8001, 0x200, 0x5, 0x3, 0x2, 0x93a, 0x0, 0x7fff, 0x2, @perf_bp={&(0x7f0000000100), 0x1}, 0x0, 0x0, 0xffffffffffffff4e, 0x6, 0x0, 0x4, 0xfffffffffffffffd}, r5, 0x0, r7, 0x8) r8 = openat$tun(0xffffffffffffff9c, &(0x7f0000000580)='/dev/net/tun\x00', 0x40000, 0x0) ioctl$TUNSETPERSIST(r8, 0x400454cb, 0x1) r9 = socket$kcm(0x29, 0x5, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000800)={0x0, r0, 0x1, 0x2}, 0x14) ioctl$sock_kcm_SIOCKCMUNATTACH(r9, 0x89e1, &(0x7f0000000900)={r2}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r3, 0x0, 0x8b, 0x0, &(0x7f0000000680)="3ce41f426b7dd449ae14b08e1868c456d4fe9c7993884cf18f4dd5a0bc57250243da4203e0640859184bc4c4690afefd7736e8842cd88030448e918bdb5bd9bbbd680a51261557c0477c18049c832005ebb5b185c6f233df73a21d3b3ddad8426fba2d5f8aac5df904d5e5f2e7dc4a517079e08d5b2175a276f2a5c49cc2957cb367f269898570852dd63a", 0x0, 0x5}, 0x28) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000500)='./cgroup/syz0\x00', 0x200002, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000740)={r3, 0x50, &(0x7f00000003c0)}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r2, 0x50, &(0x7f0000000840)}, 0x10) openat$cgroup_subtree(r2, &(0x7f0000000940)='cgroup.subtree_control\x00', 0x2, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x1ff, 0x0, 0x0, 0x0, 0x200000, 0xffffffffffffffff, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280), 0x2}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r10 = socket$kcm(0xa, 0x400000000002, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffc59) ioctl$sock_kcm_SIOCKCMCLONE(r10, 0x890b, &(0x7f0000000000)) ioctl$sock_kcm_SIOCKCMCLONE(r10, 0x890c, &(0x7f0000000000)) 03:53:03 executing program 2: epoll_create1(0x0) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = fcntl$dupfd(r0, 0x1, r0) getsockopt$inet_mtu(r1, 0x0, 0xa, &(0x7f0000000280), &(0x7f0000000240)=0x4) stat(&(0x7f0000002c40)='./file0\x00', &(0x7f0000002c80)) socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x4082) r3 = memfd_create(&(0x7f0000000100)='/dev/loop#\x00', 0x2) pwritev(r3, &(0x7f0000000480)=[{&(0x7f00000004c0)="2bd83b0010947db9141978d2d9c93f59a4f3ec7e1e3f098116", 0x19}], 0x1, 0x81806) ioctl$TIOCLINUX5(r1, 0x541c, &(0x7f0000000340)={0x5, 0x0, 0x6, 0x0, 0x8cf}) ioctl$FIGETBSZ(r0, 0x2, &(0x7f0000000680)) ioctl$EVIOCSABS20(0xffffffffffffffff, 0x401845e0, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x4, 0x82d, 0x6e371b8c}) ioctl$LOOP_CHANGE_FD(r2, 0x4c00, r3) unlinkat(r1, &(0x7f00000003c0)='./file0\x00', 0x200) r4 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000200)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) ioctl$sock_inet6_SIOCSIFADDR(r3, 0x8916, &(0x7f00000005c0)={@remote}) keyctl$unlink(0x9, r4, r4) fcntl$getownex(r1, 0x10, &(0x7f0000000180)) sendfile(r1, r2, &(0x7f0000000300), 0x2000006) r5 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f0000000000)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffc) r6 = add_key$keyring(&(0x7f00000003c0)='keyring\x00', &(0x7f0000000400)={'syz'}, 0x0, 0x0, r5) dup2(r2, r1) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000440)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(r1, 0x10e, 0x2, &(0x7f0000000140)=0x1, 0x4) keyctl$revoke(0x3, r6) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r7 = inotify_init() r8 = inotify_add_watch(r7, &(0x7f0000000040)='./file0\x00', 0x20000000) inotify_rm_watch(r7, r8) 03:53:03 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x28, 0x2, 0x0, &(0x7f0000000000)) 03:53:03 executing program 3: r0 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) write$UHID_INPUT2(r0, &(0x7f0000000340)={0xc, 0xe0, "344e59499c3ad9f6c6ddc246fb2a105b46db91a2243552fdad50691fdff62e244c4c5e3b80dd5b2ce5fd006320f88a65de8fe649184c6fccee38e3e1b77a15490f45247c4af62a45f6d29d74925a5a0483fbf685d370001869a148e1ccc6a2f935d661254d64ed7d6461a358b8094c2639a7fd6d0ca0b37dc3c6b7229cfef31c5da5aa9512960b221f23706ddee334bb364c31a38a9879bd9df7f8bf982094d2e1d90871508c573904aac4163ef9f8d3e27e2f92b2a7d4cc12d627b37d10d449e434475c767ebc167cd76dfe35dbccc94009a6d9d7b1d78d583c50284d72258e"}, 0xe6) 03:53:04 executing program 5: getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffff9c, 0x84, 0x13, 0x0, 0x0) r0 = syz_open_dev$swradio(&(0x7f0000000000)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$radio(0x0, 0xffffffffffffffff, 0x2) r1 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) getdents64(r1, 0x0, 0x0) r2 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r2, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r2, 0x8) r3 = socket$inet6_sctp(0xa, 0x0, 0x84) r4 = accept4(r2, 0x0, 0x0, 0x0) prctl$PR_SET_ENDIAN(0x14, 0x1) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r3, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) epoll_pwait(0xffffffffffffffff, &(0x7f0000000040)=[{}, {}], 0x2, 0x0, &(0x7f0000000080), 0x8) getpgid(0x0) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r4, 0x84, 0x9, &(0x7f0000000280)={0x0, @in={{0x2, 0x0, @empty}}, 0x0, 0xac14142400000000, 0x0, 0x0, 0x54}, 0x98) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000780)={{{@in=@dev, @in6=@local}}, {{@in6=@mcast2}, 0x0, @in6=@dev}}, 0x0) ioctl$SIOCAX25ADDFWD(r0, 0x89ea, 0x0) syz_mount_image$gfs2(&(0x7f00000003c0)='gfs2\x00', 0x0, 0x87, 0x0, &(0x7f00000005c0), 0x1040040, 0x0) readv(r1, &(0x7f0000000500)=[{&(0x7f0000000400)=""/217, 0xd9}], 0x1) 03:53:04 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x0, &(0x7f0000000b80)=ANY=[], 0x0, 0x1625, 0x0, 0x0, 0x41100, 0x1, [], 0x0, 0x4}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r0, 0xdb, &(0x7f0000000200)={0x0, 0x0}}, 0x393) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='cgroup.events\x00', 0x0, 0x0) write$cgroup_int(r2, &(0x7f00000007c0)=0x6, 0x12) r3 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000002c0), 0x4) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz1\x00', 0x1ff) r4 = perf_event_open$cgroup(&(0x7f0000000600)={0x0, 0x70, 0x9, 0x6, 0x8, 0x6, 0x0, 0xfffffffffffff49f, 0x2, 0x6, 0x3ff, 0x0, 0x20, 0x0, 0x1, 0x81, 0x1, 0x400, 0x4, 0xfac, 0x4, 0x1, 0x10000, 0xf1, 0xd3, 0x92b, 0x200, 0x1, 0x100000000, 0x2, 0x100000000, 0xfff, 0xfff, 0xffff, 0x3, 0xfffffffffffffffd, 0x0, 0x6, 0x0, 0x50, 0x0, @perf_config_ext={0x3f, 0x9}, 0x20000, 0x8, 0xef3, 0x7, 0x100000000, 0x8, 0xfff}, 0xffffffffffffffff, 0x2, r0, 0x8) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000b40)='cgroup.subtree_control\x00') ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x2400, 0x1) r5 = getpid() socketpair$unix(0x1, 0x7, 0x0, &(0x7f0000000540)={0xffffffffffffffff}) setsockopt$sock_attach_bpf(r6, 0x1, 0x32, &(0x7f00000005c0)=r3, 0x4) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={0x0, 0xffffffffffffffff, 0x0, 0x12, &(0x7f0000000480)='./cgroup.cpu/syz1\x00', r1}, 0x30) perf_event_open(&(0x7f0000000300)={0x5, 0x70, 0xff, 0x4, 0x1000, 0xe5af, 0x0, 0x8000, 0xd0440, 0x2, 0xffff, 0x1, 0x4, 0x1f, 0x3, 0xfffffffffffffffa, 0x5, 0x9, 0x8, 0x1, 0x3, 0x400, 0x6, 0x5, 0x401, 0x10000, 0xff, 0xb24, 0xffffffffffff8000, 0xc8a, 0x3f, 0xfffffffffffffffa, 0xffffffffffff8001, 0x200, 0x5, 0x3, 0x2, 0x93a, 0x0, 0x7fff, 0x2, @perf_bp={&(0x7f0000000100), 0x1}, 0x0, 0x0, 0xffffffffffffff4e, 0x6, 0x0, 0x4, 0xfffffffffffffffd}, r5, 0x0, r7, 0x8) r8 = openat$tun(0xffffffffffffff9c, &(0x7f0000000580)='/dev/net/tun\x00', 0x40000, 0x0) ioctl$TUNSETPERSIST(r8, 0x400454cb, 0x1) r9 = socket$kcm(0x29, 0x5, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000800)={0x0, r0, 0x1, 0x2}, 0x14) ioctl$sock_kcm_SIOCKCMUNATTACH(r9, 0x89e1, &(0x7f0000000900)={r2}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r3, 0x0, 0x8b, 0x0, &(0x7f0000000680)="3ce41f426b7dd449ae14b08e1868c456d4fe9c7993884cf18f4dd5a0bc57250243da4203e0640859184bc4c4690afefd7736e8842cd88030448e918bdb5bd9bbbd680a51261557c0477c18049c832005ebb5b185c6f233df73a21d3b3ddad8426fba2d5f8aac5df904d5e5f2e7dc4a517079e08d5b2175a276f2a5c49cc2957cb367f269898570852dd63a", 0x0, 0x5}, 0x28) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000500)='./cgroup/syz0\x00', 0x200002, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000740)={r3, 0x50, &(0x7f00000003c0)}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r2, 0x50, &(0x7f0000000840)}, 0x10) openat$cgroup_subtree(r2, &(0x7f0000000940)='cgroup.subtree_control\x00', 0x2, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x1ff, 0x0, 0x0, 0x0, 0x200000, 0xffffffffffffffff, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280), 0x2}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r10 = socket$kcm(0xa, 0x400000000002, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffc59) ioctl$sock_kcm_SIOCKCMCLONE(r10, 0x890b, &(0x7f0000000000)) ioctl$sock_kcm_SIOCKCMCLONE(r10, 0x890c, &(0x7f0000000000)) 03:53:04 executing program 0: getsockname$unix(0xffffffffffffffff, 0x0, 0x0) getpgrp(0xffffffffffffffff) sched_setaffinity(0x0, 0x8, &(0x7f0000000140)=0x40000000000009) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x313, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fallocate(r0, 0x1, 0x0, 0x10000103) creat(0x0, 0x0) 03:53:04 executing program 3: r0 = openat$selinux_create(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/create\x00', 0x2, 0x0) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000240)='/dev/vga_arbiter\x00', 0x0, 0x0) dup3(r0, r1, 0x0) 03:53:04 executing program 2: epoll_create1(0x0) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = fcntl$dupfd(r0, 0x1, r0) getsockopt$inet_mtu(r1, 0x0, 0xa, &(0x7f0000000280), &(0x7f0000000240)=0x4) stat(&(0x7f0000002c40)='./file0\x00', &(0x7f0000002c80)) socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x4082) r3 = memfd_create(&(0x7f0000000100)='/dev/loop#\x00', 0x2) pwritev(r3, &(0x7f0000000480)=[{&(0x7f00000004c0)="2bd83b0010947db9141978d2d9c93f59a4f3ec7e1e3f098116", 0x19}], 0x1, 0x81806) ioctl$TIOCLINUX5(r1, 0x541c, &(0x7f0000000340)={0x5, 0x0, 0x6, 0x0, 0x8cf}) ioctl$FIGETBSZ(r0, 0x2, &(0x7f0000000680)) ioctl$EVIOCSABS20(0xffffffffffffffff, 0x401845e0, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x4, 0x82d, 0x6e371b8c}) ioctl$LOOP_CHANGE_FD(r2, 0x4c00, r3) unlinkat(r1, &(0x7f00000003c0)='./file0\x00', 0x200) r4 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000200)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) ioctl$sock_inet6_SIOCSIFADDR(r3, 0x8916, &(0x7f00000005c0)={@remote}) keyctl$unlink(0x9, r4, r4) fcntl$getownex(r1, 0x10, &(0x7f0000000180)) sendfile(r1, r2, &(0x7f0000000300), 0x2000006) r5 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f0000000000)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffc) r6 = add_key$keyring(&(0x7f00000003c0)='keyring\x00', &(0x7f0000000400)={'syz'}, 0x0, 0x0, r5) dup2(r2, r1) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000440)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(r1, 0x10e, 0x2, &(0x7f0000000140)=0x1, 0x4) keyctl$revoke(0x3, r6) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r7 = inotify_init() r8 = inotify_add_watch(r7, &(0x7f0000000040)='./file0\x00', 0x20000000) inotify_rm_watch(r7, r8) 03:53:04 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x0, &(0x7f0000000b80)=ANY=[], 0x0, 0x1625, 0x0, 0x0, 0x41100, 0x1, [], 0x0, 0x4}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r0, 0xdb, &(0x7f0000000200)={0x0, 0x0}}, 0x393) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='cgroup.events\x00', 0x0, 0x0) write$cgroup_int(r2, &(0x7f00000007c0)=0x6, 0x12) r3 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000002c0), 0x4) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz1\x00', 0x1ff) r4 = perf_event_open$cgroup(&(0x7f0000000600)={0x0, 0x70, 0x9, 0x6, 0x8, 0x6, 0x0, 0xfffffffffffff49f, 0x2, 0x6, 0x3ff, 0x0, 0x20, 0x0, 0x1, 0x81, 0x1, 0x400, 0x4, 0xfac, 0x4, 0x1, 0x10000, 0xf1, 0xd3, 0x92b, 0x200, 0x1, 0x100000000, 0x2, 0x100000000, 0xfff, 0xfff, 0xffff, 0x3, 0xfffffffffffffffd, 0x0, 0x6, 0x0, 0x50, 0x0, @perf_config_ext={0x3f, 0x9}, 0x20000, 0x8, 0xef3, 0x7, 0x100000000, 0x8, 0xfff}, 0xffffffffffffffff, 0x2, r0, 0x8) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000b40)='cgroup.subtree_control\x00') ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x2400, 0x1) r5 = getpid() socketpair$unix(0x1, 0x7, 0x0, &(0x7f0000000540)={0xffffffffffffffff}) setsockopt$sock_attach_bpf(r6, 0x1, 0x32, &(0x7f00000005c0)=r3, 0x4) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={0x0, 0xffffffffffffffff, 0x0, 0x12, &(0x7f0000000480)='./cgroup.cpu/syz1\x00', r1}, 0x30) perf_event_open(&(0x7f0000000300)={0x5, 0x70, 0xff, 0x4, 0x1000, 0xe5af, 0x0, 0x8000, 0xd0440, 0x2, 0xffff, 0x1, 0x4, 0x1f, 0x3, 0xfffffffffffffffa, 0x5, 0x9, 0x8, 0x1, 0x3, 0x400, 0x6, 0x5, 0x401, 0x10000, 0xff, 0xb24, 0xffffffffffff8000, 0xc8a, 0x3f, 0xfffffffffffffffa, 0xffffffffffff8001, 0x200, 0x5, 0x3, 0x2, 0x93a, 0x0, 0x7fff, 0x2, @perf_bp={&(0x7f0000000100), 0x1}, 0x0, 0x0, 0xffffffffffffff4e, 0x6, 0x0, 0x4, 0xfffffffffffffffd}, r5, 0x0, r7, 0x8) r8 = openat$tun(0xffffffffffffff9c, &(0x7f0000000580)='/dev/net/tun\x00', 0x40000, 0x0) ioctl$TUNSETPERSIST(r8, 0x400454cb, 0x1) r9 = socket$kcm(0x29, 0x5, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000800)={0x0, r0, 0x1, 0x2}, 0x14) ioctl$sock_kcm_SIOCKCMUNATTACH(r9, 0x89e1, &(0x7f0000000900)={r2}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r3, 0x0, 0x8b, 0x0, &(0x7f0000000680)="3ce41f426b7dd449ae14b08e1868c456d4fe9c7993884cf18f4dd5a0bc57250243da4203e0640859184bc4c4690afefd7736e8842cd88030448e918bdb5bd9bbbd680a51261557c0477c18049c832005ebb5b185c6f233df73a21d3b3ddad8426fba2d5f8aac5df904d5e5f2e7dc4a517079e08d5b2175a276f2a5c49cc2957cb367f269898570852dd63a", 0x0, 0x5}, 0x28) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000500)='./cgroup/syz0\x00', 0x200002, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000740)={r3, 0x50, &(0x7f00000003c0)}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r2, 0x50, &(0x7f0000000840)}, 0x10) openat$cgroup_subtree(r2, &(0x7f0000000940)='cgroup.subtree_control\x00', 0x2, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x1ff, 0x0, 0x0, 0x0, 0x200000, 0xffffffffffffffff, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280), 0x2}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r10 = socket$kcm(0xa, 0x400000000002, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffc59) ioctl$sock_kcm_SIOCKCMCLONE(r10, 0x890b, &(0x7f0000000000)) ioctl$sock_kcm_SIOCKCMCLONE(r10, 0x890c, &(0x7f0000000000)) 03:53:04 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x0, &(0x7f0000000b80)=ANY=[@ANYBLOB], 0x0, 0x1625, 0x0, 0x0, 0x41100, 0x1, [], 0x0, 0x4}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r0, 0xdb, &(0x7f0000000200)={0x0, 0x0}}, 0x393) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='cgroup.events\x00', 0x0, 0x0) write$cgroup_int(r2, &(0x7f00000007c0)=0x6, 0x12) r3 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000002c0), 0x4) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz1\x00', 0x1ff) r4 = perf_event_open$cgroup(&(0x7f0000000600)={0x0, 0x70, 0x9, 0x6, 0x8, 0x6, 0x0, 0xfffffffffffff49f, 0x2, 0x6, 0x3ff, 0x0, 0x20, 0x0, 0x1, 0x81, 0x1, 0x400, 0x4, 0xfac, 0x4, 0x1, 0x10000, 0xf1, 0xd3, 0x92b, 0x200, 0x1, 0x100000000, 0x2, 0x100000000, 0xfff, 0xfff, 0xffff, 0x3, 0xfffffffffffffffd, 0x0, 0x6, 0x0, 0x50, 0x0, @perf_config_ext={0x3f, 0x9}, 0x20000, 0x8, 0xef3, 0x7, 0x100000000, 0x8, 0xfff}, 0xffffffffffffffff, 0x2, r0, 0x8) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000b40)='cgroup.subtree_control\x00') ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x2400, 0x1) r5 = getpid() socketpair$unix(0x1, 0x7, 0x0, &(0x7f0000000540)={0xffffffffffffffff}) setsockopt$sock_attach_bpf(r6, 0x1, 0x32, &(0x7f00000005c0)=r3, 0x4) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={0x0, 0xffffffffffffffff, 0x0, 0x12, &(0x7f0000000480)='./cgroup.cpu/syz1\x00', r1}, 0x30) perf_event_open(&(0x7f0000000300)={0x5, 0x70, 0xff, 0x4, 0x1000, 0xe5af, 0x0, 0x8000, 0xd0440, 0x2, 0xffff, 0x1, 0x4, 0x1f, 0x3, 0xfffffffffffffffa, 0x5, 0x9, 0x8, 0x1, 0x3, 0x400, 0x6, 0x5, 0x401, 0x10000, 0xff, 0xb24, 0xffffffffffff8000, 0xc8a, 0x3f, 0xfffffffffffffffa, 0xffffffffffff8001, 0x200, 0x5, 0x3, 0x2, 0x93a, 0x0, 0x7fff, 0x2, @perf_bp={&(0x7f0000000100), 0x1}, 0x0, 0x0, 0xffffffffffffff4e, 0x6, 0x0, 0x4, 0xfffffffffffffffd}, r5, 0x0, r7, 0x8) r8 = openat$tun(0xffffffffffffff9c, &(0x7f0000000580)='/dev/net/tun\x00', 0x40000, 0x0) ioctl$TUNSETPERSIST(r8, 0x400454cb, 0x1) r9 = socket$kcm(0x29, 0x5, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000800)={0x0, r0, 0x1, 0x2}, 0x14) ioctl$sock_kcm_SIOCKCMUNATTACH(r9, 0x89e1, &(0x7f0000000900)={r2}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r3, 0x0, 0x8b, 0x0, &(0x7f0000000680)="3ce41f426b7dd449ae14b08e1868c456d4fe9c7993884cf18f4dd5a0bc57250243da4203e0640859184bc4c4690afefd7736e8842cd88030448e918bdb5bd9bbbd680a51261557c0477c18049c832005ebb5b185c6f233df73a21d3b3ddad8426fba2d5f8aac5df904d5e5f2e7dc4a517079e08d5b2175a276f2a5c49cc2957cb367f269898570852dd63a", 0x0, 0x5}, 0x28) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000500)='./cgroup/syz0\x00', 0x200002, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000740)={r3, 0x50, &(0x7f00000003c0)}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r2, 0x50, &(0x7f0000000840)}, 0x10) openat$cgroup_subtree(r2, &(0x7f0000000940)='cgroup.subtree_control\x00', 0x2, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x1ff, 0x0, 0x0, 0x0, 0x200000, 0xffffffffffffffff, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280), 0x2}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r10 = socket$kcm(0xa, 0x400000000002, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffc59) ioctl$sock_kcm_SIOCKCMCLONE(r10, 0x890b, &(0x7f0000000000)) ioctl$sock_kcm_SIOCKCMCLONE(r10, 0x890c, &(0x7f0000000000)) 03:53:04 executing program 3: epoll_create1(0x0) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = fcntl$dupfd(r0, 0x1, r0) getsockopt$inet_mtu(r1, 0x0, 0xa, &(0x7f0000000280), &(0x7f0000000240)=0x4) stat(&(0x7f0000002c40)='./file0\x00', &(0x7f0000002c80)) socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x4082) r3 = memfd_create(&(0x7f0000000100)='/dev/loop#\x00', 0x2) pwritev(r3, &(0x7f0000000480)=[{&(0x7f00000004c0)="2bd83b0010947db9141978d2d9c93f59a4f3ec7e1e3f098116", 0x19}], 0x1, 0x81806) ioctl$TIOCLINUX5(r1, 0x541c, &(0x7f0000000340)={0x5, 0x0, 0x6, 0x0, 0x8cf}) ioctl$FIGETBSZ(r0, 0x2, &(0x7f0000000680)) ioctl$EVIOCSABS20(0xffffffffffffffff, 0x401845e0, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x4, 0x82d, 0x6e371b8c}) ioctl$LOOP_CHANGE_FD(r2, 0x4c00, r3) unlinkat(r1, &(0x7f00000003c0)='./file0\x00', 0x200) r4 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000200)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) ioctl$sock_inet6_SIOCSIFADDR(r3, 0x8916, &(0x7f00000005c0)={@remote}) keyctl$unlink(0x9, r4, r4) fcntl$getownex(r1, 0x10, &(0x7f0000000180)) sendfile(r1, r2, &(0x7f0000000300), 0x2000006) r5 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f0000000000)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffc) r6 = add_key$keyring(&(0x7f00000003c0)='keyring\x00', &(0x7f0000000400)={'syz'}, 0x0, 0x0, r5) dup2(r2, r1) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000440)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(r1, 0x10e, 0x2, &(0x7f0000000140)=0x1, 0x4) keyctl$revoke(0x3, r6) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r7 = inotify_init() r8 = inotify_add_watch(r7, &(0x7f0000000040)='./file0\x00', 0x20000000) inotify_rm_watch(r7, r8) 03:53:04 executing program 0: epoll_create1(0x0) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = fcntl$dupfd(r0, 0x1, r0) getsockopt$inet_mtu(r1, 0x0, 0xa, &(0x7f0000000280), &(0x7f0000000240)=0x4) stat(&(0x7f0000002c40)='./file0\x00', &(0x7f0000002c80)) socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x4082) r3 = memfd_create(&(0x7f0000000100)='/dev/loop#\x00', 0x2) pwritev(r3, &(0x7f0000000480)=[{&(0x7f00000004c0)="2bd83b0010947db9141978d2d9c93f59a4f3ec7e1e3f098116", 0x19}], 0x1, 0x81806) ioctl$TIOCLINUX5(r1, 0x541c, &(0x7f0000000340)={0x5, 0x0, 0x6, 0x0, 0x8cf}) ioctl$FIGETBSZ(r0, 0x2, &(0x7f0000000680)) ioctl$EVIOCSABS20(0xffffffffffffffff, 0x401845e0, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x4, 0x82d, 0x6e371b8c}) ioctl$LOOP_CHANGE_FD(r2, 0x4c00, r3) unlinkat(r1, &(0x7f00000003c0)='./file0\x00', 0x200) r4 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000200)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) ioctl$sock_inet6_SIOCSIFADDR(r3, 0x8916, &(0x7f00000005c0)={@remote}) keyctl$unlink(0x9, r4, r4) fcntl$getownex(r1, 0x10, &(0x7f0000000180)) sendfile(r1, r2, &(0x7f0000000300), 0x2000006) r5 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f0000000000)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffc) r6 = add_key$keyring(&(0x7f00000003c0)='keyring\x00', &(0x7f0000000400)={'syz'}, 0x0, 0x0, r5) dup2(r2, r1) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000440)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(r1, 0x10e, 0x2, &(0x7f0000000140)=0x1, 0x4) keyctl$revoke(0x3, r6) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r7 = inotify_init() r8 = inotify_add_watch(r7, &(0x7f0000000040)='./file0\x00', 0x20000000) inotify_rm_watch(r7, r8) 03:53:04 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x32a) connect$inet(r0, &(0x7f0000000180)={0x2, 0x0, @local}, 0x10) setsockopt$inet_int(r0, 0x0, 0x2, &(0x7f0000000080)=0x8, 0x4) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000100), 0x4) 03:53:04 executing program 4: openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000003280)='/selinux/mls\x00', 0x0, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000003300)='TIPCv2\x00') r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000280)='/dev/rtc0\x00', 0x4000, 0x0) getsockname$unix(r0, 0x0, &(0x7f0000000340)) getdents(0xffffffffffffffff, 0x0, 0x0) syz_open_dev$binder(&(0x7f0000d59ff3)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r1 = getpgrp(0xffffffffffffffff) ptrace$setopts(0x4206, r1, 0x0, 0x1) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) fstat(r2, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x313, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x8) fallocate(r2, 0x1, 0x0, 0x10000103) getsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, 0x0, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, 0x0, 0x0) unlinkat(0xffffffffffffffff, 0x0, 0x200) ioctl$sock_SIOCGSKNS(0xffffffffffffffff, 0x894c, &(0x7f0000000000)=0x7f) 03:53:04 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x0, &(0x7f0000000b80)=ANY=[@ANYBLOB], 0x0, 0x1625, 0x0, 0x0, 0x41100, 0x1, [], 0x0, 0x4}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r0, 0xdb, &(0x7f0000000200)={0x0, 0x0}}, 0x393) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='cgroup.events\x00', 0x0, 0x0) write$cgroup_int(r2, &(0x7f00000007c0)=0x6, 0x12) r3 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000002c0), 0x4) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz1\x00', 0x1ff) r4 = perf_event_open$cgroup(&(0x7f0000000600)={0x0, 0x70, 0x9, 0x6, 0x8, 0x6, 0x0, 0xfffffffffffff49f, 0x2, 0x6, 0x3ff, 0x0, 0x20, 0x0, 0x1, 0x81, 0x1, 0x400, 0x4, 0xfac, 0x4, 0x1, 0x10000, 0xf1, 0xd3, 0x92b, 0x200, 0x1, 0x100000000, 0x2, 0x100000000, 0xfff, 0xfff, 0xffff, 0x3, 0xfffffffffffffffd, 0x0, 0x6, 0x0, 0x50, 0x0, @perf_config_ext={0x3f, 0x9}, 0x20000, 0x8, 0xef3, 0x7, 0x100000000, 0x8, 0xfff}, 0xffffffffffffffff, 0x2, r0, 0x8) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000b40)='cgroup.subtree_control\x00') ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x2400, 0x1) r5 = getpid() socketpair$unix(0x1, 0x7, 0x0, &(0x7f0000000540)={0xffffffffffffffff}) setsockopt$sock_attach_bpf(r6, 0x1, 0x32, &(0x7f00000005c0)=r3, 0x4) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={0x0, 0xffffffffffffffff, 0x0, 0x12, &(0x7f0000000480)='./cgroup.cpu/syz1\x00', r1}, 0x30) perf_event_open(&(0x7f0000000300)={0x5, 0x70, 0xff, 0x4, 0x1000, 0xe5af, 0x0, 0x8000, 0xd0440, 0x2, 0xffff, 0x1, 0x4, 0x1f, 0x3, 0xfffffffffffffffa, 0x5, 0x9, 0x8, 0x1, 0x3, 0x400, 0x6, 0x5, 0x401, 0x10000, 0xff, 0xb24, 0xffffffffffff8000, 0xc8a, 0x3f, 0xfffffffffffffffa, 0xffffffffffff8001, 0x200, 0x5, 0x3, 0x2, 0x93a, 0x0, 0x7fff, 0x2, @perf_bp={&(0x7f0000000100), 0x1}, 0x0, 0x0, 0xffffffffffffff4e, 0x6, 0x0, 0x4, 0xfffffffffffffffd}, r5, 0x0, r7, 0x8) r8 = openat$tun(0xffffffffffffff9c, &(0x7f0000000580)='/dev/net/tun\x00', 0x40000, 0x0) ioctl$TUNSETPERSIST(r8, 0x400454cb, 0x1) r9 = socket$kcm(0x29, 0x5, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000800)={0x0, r0, 0x1, 0x2}, 0x14) ioctl$sock_kcm_SIOCKCMUNATTACH(r9, 0x89e1, &(0x7f0000000900)={r2}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r3, 0x0, 0x8b, 0x0, &(0x7f0000000680)="3ce41f426b7dd449ae14b08e1868c456d4fe9c7993884cf18f4dd5a0bc57250243da4203e0640859184bc4c4690afefd7736e8842cd88030448e918bdb5bd9bbbd680a51261557c0477c18049c832005ebb5b185c6f233df73a21d3b3ddad8426fba2d5f8aac5df904d5e5f2e7dc4a517079e08d5b2175a276f2a5c49cc2957cb367f269898570852dd63a", 0x0, 0x5}, 0x28) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000500)='./cgroup/syz0\x00', 0x200002, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000740)={r3, 0x50, &(0x7f00000003c0)}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r2, 0x50, &(0x7f0000000840)}, 0x10) openat$cgroup_subtree(r2, &(0x7f0000000940)='cgroup.subtree_control\x00', 0x2, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x1ff, 0x0, 0x0, 0x0, 0x200000, 0xffffffffffffffff, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280), 0x2}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r10 = socket$kcm(0xa, 0x400000000002, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffc59) ioctl$sock_kcm_SIOCKCMCLONE(r10, 0x890b, &(0x7f0000000000)) ioctl$sock_kcm_SIOCKCMCLONE(r10, 0x890c, &(0x7f0000000000)) 03:53:05 executing program 5: getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffff9c, 0x84, 0x13, 0x0, 0x0) r0 = syz_open_dev$swradio(&(0x7f0000000000)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$radio(0x0, 0xffffffffffffffff, 0x2) r1 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) getdents64(r1, 0x0, 0x0) r2 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r2, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r2, 0x8) r3 = socket$inet6_sctp(0xa, 0x805, 0x84) r4 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) prctl$PR_SET_ENDIAN(0x14, 0x1) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r3, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) epoll_pwait(0xffffffffffffffff, &(0x7f0000000040)=[{}, {}], 0x2, 0x0, &(0x7f0000000080), 0x8) getpgid(0x0) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r4, 0x84, 0x9, &(0x7f0000000280)={0x0, @in={{0x2, 0x0, @empty}}, 0x0, 0xac14142400000000, 0x0, 0x0, 0x54}, 0x98) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000780)={{{@in=@dev, @in6=@local}}, {{@in6=@mcast2}, 0x0, @in6=@dev}}, 0x0) ioctl$SIOCAX25ADDFWD(r0, 0x89ea, 0x0) syz_mount_image$gfs2(&(0x7f00000003c0)='gfs2\x00', 0x0, 0x87, 0x0, &(0x7f00000005c0), 0x1040040, 0x0) readv(r1, &(0x7f0000000500)=[{&(0x7f0000000400)=""/217, 0xd9}], 0x1) 03:53:05 executing program 2: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000280)='/dev/null\x00', 0x0, 0x0) fsetxattr$system_posix_acl(r0, &(0x7f00000000c0)='system.posix_acl_access\x00', &(0x7f00000001c0)={{}, {}, [], {}, [], {}, {0x20, 0x9f62c034b6980c60}}, 0x24, 0x0) 03:53:05 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x0, &(0x7f0000000b80)=ANY=[@ANYBLOB], 0x0, 0x1625, 0x0, 0x0, 0x41100, 0x1, [], 0x0, 0x4}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r0, 0xdb, &(0x7f0000000200)={0x0, 0x0}}, 0x393) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='cgroup.events\x00', 0x0, 0x0) write$cgroup_int(r2, &(0x7f00000007c0)=0x6, 0x12) r3 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000002c0), 0x4) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz1\x00', 0x1ff) r4 = perf_event_open$cgroup(&(0x7f0000000600)={0x0, 0x70, 0x9, 0x6, 0x8, 0x6, 0x0, 0xfffffffffffff49f, 0x2, 0x6, 0x3ff, 0x0, 0x20, 0x0, 0x1, 0x81, 0x1, 0x400, 0x4, 0xfac, 0x4, 0x1, 0x10000, 0xf1, 0xd3, 0x92b, 0x200, 0x1, 0x100000000, 0x2, 0x100000000, 0xfff, 0xfff, 0xffff, 0x3, 0xfffffffffffffffd, 0x0, 0x6, 0x0, 0x50, 0x0, @perf_config_ext={0x3f, 0x9}, 0x20000, 0x8, 0xef3, 0x7, 0x100000000, 0x8, 0xfff}, 0xffffffffffffffff, 0x2, r0, 0x8) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000b40)='cgroup.subtree_control\x00') ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x2400, 0x1) r5 = getpid() socketpair$unix(0x1, 0x7, 0x0, &(0x7f0000000540)={0xffffffffffffffff}) setsockopt$sock_attach_bpf(r6, 0x1, 0x32, &(0x7f00000005c0)=r3, 0x4) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={0x0, 0xffffffffffffffff, 0x0, 0x12, &(0x7f0000000480)='./cgroup.cpu/syz1\x00', r1}, 0x30) perf_event_open(&(0x7f0000000300)={0x5, 0x70, 0xff, 0x4, 0x1000, 0xe5af, 0x0, 0x8000, 0xd0440, 0x2, 0xffff, 0x1, 0x4, 0x1f, 0x3, 0xfffffffffffffffa, 0x5, 0x9, 0x8, 0x1, 0x3, 0x400, 0x6, 0x5, 0x401, 0x10000, 0xff, 0xb24, 0xffffffffffff8000, 0xc8a, 0x3f, 0xfffffffffffffffa, 0xffffffffffff8001, 0x200, 0x5, 0x3, 0x2, 0x93a, 0x0, 0x7fff, 0x2, @perf_bp={&(0x7f0000000100), 0x1}, 0x0, 0x0, 0xffffffffffffff4e, 0x6, 0x0, 0x4, 0xfffffffffffffffd}, r5, 0x0, r7, 0x8) r8 = openat$tun(0xffffffffffffff9c, &(0x7f0000000580)='/dev/net/tun\x00', 0x40000, 0x0) ioctl$TUNSETPERSIST(r8, 0x400454cb, 0x1) r9 = socket$kcm(0x29, 0x5, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000800)={0x0, r0, 0x1, 0x2}, 0x14) ioctl$sock_kcm_SIOCKCMUNATTACH(r9, 0x89e1, &(0x7f0000000900)={r2}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r3, 0x0, 0x8b, 0x0, &(0x7f0000000680)="3ce41f426b7dd449ae14b08e1868c456d4fe9c7993884cf18f4dd5a0bc57250243da4203e0640859184bc4c4690afefd7736e8842cd88030448e918bdb5bd9bbbd680a51261557c0477c18049c832005ebb5b185c6f233df73a21d3b3ddad8426fba2d5f8aac5df904d5e5f2e7dc4a517079e08d5b2175a276f2a5c49cc2957cb367f269898570852dd63a", 0x0, 0x5}, 0x28) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000500)='./cgroup/syz0\x00', 0x200002, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000740)={r3, 0x50, &(0x7f00000003c0)}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r2, 0x50, &(0x7f0000000840)}, 0x10) openat$cgroup_subtree(r2, &(0x7f0000000940)='cgroup.subtree_control\x00', 0x2, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x1ff, 0x0, 0x0, 0x0, 0x200000, 0xffffffffffffffff, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280), 0x2}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r10 = socket$kcm(0xa, 0x400000000002, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffc59) ioctl$sock_kcm_SIOCKCMCLONE(r10, 0x890b, &(0x7f0000000000)) ioctl$sock_kcm_SIOCKCMCLONE(r10, 0x890c, &(0x7f0000000000)) 03:53:05 executing program 3: openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000003280)='/selinux/mls\x00', 0x0, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000003300)='TIPCv2\x00') openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f0000000140)=0x40000000000009) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) fallocate(r0, 0x1, 0x0, 0x10000103) 03:53:05 executing program 4: openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000003280)='/selinux/mls\x00', 0x0, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000003300)='TIPCv2\x00') r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000280)='/dev/rtc0\x00', 0x4000, 0x0) getsockname$unix(r0, 0x0, &(0x7f0000000340)) getdents(0xffffffffffffffff, 0x0, 0x0) syz_open_dev$binder(&(0x7f0000d59ff3)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r1 = getpgrp(0xffffffffffffffff) ptrace$setopts(0x4206, r1, 0x0, 0x1) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) fstat(r2, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x313, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x8) fallocate(r2, 0x1, 0x0, 0x10000103) getsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, 0x0, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, 0x0, 0x0) unlinkat(0xffffffffffffffff, 0x0, 0x200) ioctl$sock_SIOCGSKNS(0xffffffffffffffff, 0x894c, &(0x7f0000000000)=0x7f) 03:53:05 executing program 0: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r0 = inotify_init() read(r0, 0x0, 0x0) r1 = inotify_add_watch(r0, &(0x7f0000000040)='./file0\x00', 0x20000000) inotify_rm_watch(r0, r1) 03:53:05 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r0, &(0x7f0000001200)=[{&(0x7f0000000000)=@file={0x1, './bus\x00'}, 0x6e, &(0x7f00000006c0)=[{&(0x7f0000000380)='z', 0x1}], 0x1, 0x0, 0x0, 0x80}], 0x1, 0x10) 03:53:05 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x10, &(0x7f0000000b80)=ANY=[@ANYBLOB="cab5674ca80400f902c8d3fc17d4a51472ff5e04a7ed68e9074e865fffffffffff6582e2a0c58f438f1a9b1af27305fb6c1d497851a00d51dddde821f356222d82de15a5bb3ca4d544c3683ff903b30637ee634a8a4fa0e19e57c7d35e4db3a02231b71023a910ac2424326e31258bde7ca760ff3ca3261a92112b3c8db9e0d79dc5ad"], 0x0, 0x1625, 0x0, 0x0, 0x41100, 0x1, [], 0x0, 0x4}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r0, 0xdb, &(0x7f0000000200)={0x0, 0x0}}, 0x393) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='cgroup.events\x00', 0x0, 0x0) write$cgroup_int(r2, &(0x7f00000007c0)=0x6, 0x12) r3 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000002c0), 0x4) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz1\x00', 0x1ff) r4 = perf_event_open$cgroup(&(0x7f0000000600)={0x0, 0x70, 0x9, 0x6, 0x8, 0x6, 0x0, 0xfffffffffffff49f, 0x2, 0x6, 0x3ff, 0x0, 0x20, 0x0, 0x1, 0x81, 0x1, 0x400, 0x4, 0xfac, 0x4, 0x1, 0x10000, 0xf1, 0xd3, 0x92b, 0x200, 0x1, 0x100000000, 0x2, 0x100000000, 0xfff, 0xfff, 0xffff, 0x3, 0xfffffffffffffffd, 0x0, 0x6, 0x0, 0x50, 0x0, @perf_config_ext={0x3f, 0x9}, 0x20000, 0x8, 0xef3, 0x7, 0x100000000, 0x8, 0xfff}, 0xffffffffffffffff, 0x2, r0, 0x8) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000b40)='cgroup.subtree_control\x00') ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x2400, 0x1) r5 = getpid() socketpair$unix(0x1, 0x7, 0x0, &(0x7f0000000540)={0xffffffffffffffff}) setsockopt$sock_attach_bpf(r6, 0x1, 0x32, &(0x7f00000005c0)=r3, 0x4) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={0x0, 0xffffffffffffffff, 0x0, 0x12, &(0x7f0000000480)='./cgroup.cpu/syz1\x00', r1}, 0x30) perf_event_open(&(0x7f0000000300)={0x5, 0x70, 0xff, 0x4, 0x1000, 0xe5af, 0x0, 0x8000, 0xd0440, 0x2, 0xffff, 0x1, 0x4, 0x1f, 0x3, 0xfffffffffffffffa, 0x5, 0x9, 0x8, 0x1, 0x3, 0x400, 0x6, 0x5, 0x401, 0x10000, 0xff, 0xb24, 0xffffffffffff8000, 0xc8a, 0x3f, 0xfffffffffffffffa, 0xffffffffffff8001, 0x200, 0x5, 0x3, 0x2, 0x93a, 0x0, 0x7fff, 0x2, @perf_bp={&(0x7f0000000100), 0x1}, 0x0, 0x0, 0xffffffffffffff4e, 0x6, 0x0, 0x4, 0xfffffffffffffffd}, r5, 0x0, r7, 0x8) r8 = openat$tun(0xffffffffffffff9c, &(0x7f0000000580)='/dev/net/tun\x00', 0x40000, 0x0) ioctl$TUNSETPERSIST(r8, 0x400454cb, 0x1) r9 = socket$kcm(0x29, 0x5, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000800)={0x0, r0, 0x1, 0x2}, 0x14) ioctl$sock_kcm_SIOCKCMUNATTACH(r9, 0x89e1, &(0x7f0000000900)={r2}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r3, 0x0, 0x8b, 0x0, &(0x7f0000000680)="3ce41f426b7dd449ae14b08e1868c456d4fe9c7993884cf18f4dd5a0bc57250243da4203e0640859184bc4c4690afefd7736e8842cd88030448e918bdb5bd9bbbd680a51261557c0477c18049c832005ebb5b185c6f233df73a21d3b3ddad8426fba2d5f8aac5df904d5e5f2e7dc4a517079e08d5b2175a276f2a5c49cc2957cb367f269898570852dd63a", 0x0, 0x5}, 0x28) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000500)='./cgroup/syz0\x00', 0x200002, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000740)={r3, 0x50, &(0x7f00000003c0)}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r2, 0x50, &(0x7f0000000840)}, 0x10) openat$cgroup_subtree(r2, &(0x7f0000000940)='cgroup.subtree_control\x00', 0x2, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x1ff, 0x0, 0x0, 0x0, 0x200000, 0xffffffffffffffff, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280), 0x2}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r10 = socket$kcm(0xa, 0x400000000002, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffc59) ioctl$sock_kcm_SIOCKCMCLONE(r10, 0x890b, &(0x7f0000000000)) ioctl$sock_kcm_SIOCKCMCLONE(r10, 0x890c, &(0x7f0000000000)) 03:53:05 executing program 0: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r0 = inotify_init() read(r0, 0x0, 0x0) r1 = inotify_add_watch(r0, &(0x7f0000000040)='./file0\x00', 0x20000000) inotify_rm_watch(r0, r1) 03:53:05 executing program 4: epoll_create1(0x0) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = fcntl$dupfd(r0, 0x1, r0) getsockopt$inet_mtu(r1, 0x0, 0xa, &(0x7f0000000280), &(0x7f0000000240)=0x4) stat(&(0x7f0000002c40)='./file0\x00', &(0x7f0000002c80)) socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x4082) r3 = memfd_create(&(0x7f0000000100)='/dev/loop#\x00', 0x2) pwritev(r3, &(0x7f0000000480)=[{&(0x7f00000004c0)="2bd83b0010947db9141978d2d9c93f59a4f3", 0x12}], 0x1, 0x81806) ioctl$TIOCLINUX5(r1, 0x541c, &(0x7f0000000340)={0x5, 0x0, 0x6, 0x0, 0x8cf}) ioctl$FIGETBSZ(0xffffffffffffffff, 0x2, &(0x7f0000000680)) ioctl$EVIOCSABS20(0xffffffffffffffff, 0x401845e0, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x4, 0x82d, 0x6e371b8c}) ioctl$LOOP_CHANGE_FD(r2, 0x4c00, r3) unlinkat(r1, &(0x7f00000003c0)='./file0\x00', 0x200) r4 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000200)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) ioctl$sock_inet6_SIOCSIFADDR(r3, 0x8916, &(0x7f00000005c0)={@remote}) keyctl$unlink(0x9, r4, r4) fcntl$getownex(r1, 0x10, &(0x7f0000000180)) sendfile(r1, r2, &(0x7f0000000300), 0x2000006) r5 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f0000000000)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffc) r6 = add_key$keyring(&(0x7f00000003c0)='keyring\x00', &(0x7f0000000400)={'syz'}, 0x0, 0x0, r5) dup2(r2, r1) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000440)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(r1, 0x10e, 0x2, &(0x7f0000000140)=0x1, 0x4) keyctl$revoke(0x3, r6) r7 = inotify_init() r8 = inotify_add_watch(r7, &(0x7f0000000040)='./file0\x00', 0x20000000) inotify_rm_watch(r7, r8) 03:53:05 executing program 2: openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000003280)='/selinux/mls\x00', 0x0, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000003300)='TIPCv2\x00') r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000280)='/dev/rtc0\x00', 0x4000, 0x0) getsockname$unix(0xffffffffffffffff, 0x0, &(0x7f0000000340)) syz_open_dev$binder(&(0x7f0000d59ff3)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r1 = getpgrp(0xffffffffffffffff) ptrace$setopts(0x4206, r1, 0x4, 0x1) sched_setaffinity(0x0, 0x8, &(0x7f0000000140)=0x40000000000009) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) fallocate(r2, 0x1, 0x0, 0x10000103) ioctl$sock_inet_SIOCSIFBRDADDR(0xffffffffffffffff, 0x891a, &(0x7f0000000280)={'eql\x00', {0x2, 0x0, @local}}) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlinkat(r0, &(0x7f00000001c0)='./file0\x00', 0x200) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) 03:53:05 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x10, &(0x7f0000000b80)=ANY=[@ANYBLOB="cab5674ca80400f902c8d3fc17d4a51472ff5e04a7ed68e9074e865fffffffffff6582e2a0c58f438f1a9b1af27305fb6c1d497851a00d51dddde821f356222d82de15a5bb3ca4d544c3683ff903b30637ee634a8a4fa0e19e57c7d35e4db3a02231b71023a910ac2424326e31258bde7ca760ff3ca3261a92112b3c8db9e0d79dc5ad"], 0x0, 0x1625, 0x0, 0x0, 0x41100, 0x1, [], 0x0, 0x4}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r0, 0xdb, &(0x7f0000000200)={0x0, 0x0}}, 0x393) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='cgroup.events\x00', 0x0, 0x0) write$cgroup_int(r2, &(0x7f00000007c0)=0x6, 0x12) r3 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000002c0), 0x4) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz1\x00', 0x1ff) r4 = perf_event_open$cgroup(&(0x7f0000000600)={0x0, 0x70, 0x9, 0x6, 0x8, 0x6, 0x0, 0xfffffffffffff49f, 0x2, 0x6, 0x3ff, 0x0, 0x20, 0x0, 0x1, 0x81, 0x1, 0x400, 0x4, 0xfac, 0x4, 0x1, 0x10000, 0xf1, 0xd3, 0x92b, 0x200, 0x1, 0x100000000, 0x2, 0x100000000, 0xfff, 0xfff, 0xffff, 0x3, 0xfffffffffffffffd, 0x0, 0x6, 0x0, 0x50, 0x0, @perf_config_ext={0x3f, 0x9}, 0x20000, 0x8, 0xef3, 0x7, 0x100000000, 0x8, 0xfff}, 0xffffffffffffffff, 0x2, r0, 0x8) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000b40)='cgroup.subtree_control\x00') ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x2400, 0x1) r5 = getpid() socketpair$unix(0x1, 0x7, 0x0, &(0x7f0000000540)={0xffffffffffffffff}) setsockopt$sock_attach_bpf(r6, 0x1, 0x32, &(0x7f00000005c0)=r3, 0x4) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={0x0, 0xffffffffffffffff, 0x0, 0x12, &(0x7f0000000480)='./cgroup.cpu/syz1\x00', r1}, 0x30) perf_event_open(&(0x7f0000000300)={0x5, 0x70, 0xff, 0x4, 0x1000, 0xe5af, 0x0, 0x8000, 0xd0440, 0x2, 0xffff, 0x1, 0x4, 0x1f, 0x3, 0xfffffffffffffffa, 0x5, 0x9, 0x8, 0x1, 0x3, 0x400, 0x6, 0x5, 0x401, 0x10000, 0xff, 0xb24, 0xffffffffffff8000, 0xc8a, 0x3f, 0xfffffffffffffffa, 0xffffffffffff8001, 0x200, 0x5, 0x3, 0x2, 0x93a, 0x0, 0x7fff, 0x2, @perf_bp={&(0x7f0000000100), 0x1}, 0x0, 0x0, 0xffffffffffffff4e, 0x6, 0x0, 0x4, 0xfffffffffffffffd}, r5, 0x0, r7, 0x8) r8 = openat$tun(0xffffffffffffff9c, &(0x7f0000000580)='/dev/net/tun\x00', 0x40000, 0x0) ioctl$TUNSETPERSIST(r8, 0x400454cb, 0x1) r9 = socket$kcm(0x29, 0x5, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000800)={0x0, r0, 0x1, 0x2}, 0x14) ioctl$sock_kcm_SIOCKCMUNATTACH(r9, 0x89e1, &(0x7f0000000900)={r2}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r3, 0x0, 0x8b, 0x0, &(0x7f0000000680)="3ce41f426b7dd449ae14b08e1868c456d4fe9c7993884cf18f4dd5a0bc57250243da4203e0640859184bc4c4690afefd7736e8842cd88030448e918bdb5bd9bbbd680a51261557c0477c18049c832005ebb5b185c6f233df73a21d3b3ddad8426fba2d5f8aac5df904d5e5f2e7dc4a517079e08d5b2175a276f2a5c49cc2957cb367f269898570852dd63a", 0x0, 0x5}, 0x28) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000500)='./cgroup/syz0\x00', 0x200002, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000740)={r3, 0x50, &(0x7f00000003c0)}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r2, 0x50, &(0x7f0000000840)}, 0x10) openat$cgroup_subtree(r2, &(0x7f0000000940)='cgroup.subtree_control\x00', 0x2, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x1ff, 0x0, 0x0, 0x0, 0x200000, 0xffffffffffffffff, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280), 0x2}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r10 = socket$kcm(0xa, 0x400000000002, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffc59) ioctl$sock_kcm_SIOCKCMCLONE(r10, 0x890b, &(0x7f0000000000)) ioctl$sock_kcm_SIOCKCMCLONE(r10, 0x890c, &(0x7f0000000000)) 03:53:06 executing program 0: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r0 = inotify_init() read(r0, 0x0, 0x0) r1 = inotify_add_watch(r0, &(0x7f0000000040)='./file0\x00', 0x20000000) inotify_rm_watch(r0, r1) 03:53:06 executing program 4: epoll_create1(0x0) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = fcntl$dupfd(r0, 0x1, r0) getsockopt$inet_mtu(r1, 0x0, 0xa, &(0x7f0000000280), &(0x7f0000000240)=0x4) stat(&(0x7f0000002c40)='./file0\x00', &(0x7f0000002c80)) socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x4082) r3 = memfd_create(&(0x7f0000000100)='/dev/loop#\x00', 0x2) pwritev(r3, &(0x7f0000000480)=[{&(0x7f00000004c0)="2bd83b0010947db9141978d2d9c93f59a4f3", 0x12}], 0x1, 0x81806) ioctl$TIOCLINUX5(r1, 0x541c, &(0x7f0000000340)={0x5, 0x0, 0x6, 0x0, 0x8cf}) ioctl$FIGETBSZ(0xffffffffffffffff, 0x2, &(0x7f0000000680)) ioctl$EVIOCSABS20(0xffffffffffffffff, 0x401845e0, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x4, 0x82d, 0x6e371b8c}) ioctl$LOOP_CHANGE_FD(r2, 0x4c00, r3) unlinkat(r1, &(0x7f00000003c0)='./file0\x00', 0x200) r4 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000200)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) ioctl$sock_inet6_SIOCSIFADDR(r3, 0x8916, &(0x7f00000005c0)={@remote}) keyctl$unlink(0x9, r4, r4) fcntl$getownex(r1, 0x10, &(0x7f0000000180)) sendfile(r1, r2, &(0x7f0000000300), 0x2000006) r5 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f0000000000)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffc) r6 = add_key$keyring(&(0x7f00000003c0)='keyring\x00', &(0x7f0000000400)={'syz'}, 0x0, 0x0, r5) dup2(r2, r1) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000440)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(r1, 0x10e, 0x2, &(0x7f0000000140)=0x1, 0x4) keyctl$revoke(0x3, r6) r7 = inotify_init() r8 = inotify_add_watch(r7, &(0x7f0000000040)='./file0\x00', 0x20000000) inotify_rm_watch(r7, r8) 03:53:06 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x10, &(0x7f0000000b80)=ANY=[@ANYBLOB="cab5674ca80400f902c8d3fc17d4a51472ff5e04a7ed68e9074e865fffffffffff6582e2a0c58f438f1a9b1af27305fb6c1d497851a00d51dddde821f356222d82de15a5bb3ca4d544c3683ff903b30637ee634a8a4fa0e19e57c7d35e4db3a02231b71023a910ac2424326e31258bde7ca760ff3ca3261a92112b3c8db9e0d79dc5ad"], 0x0, 0x1625, 0x0, 0x0, 0x41100, 0x1, [], 0x0, 0x4}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r0, 0xdb, &(0x7f0000000200)={0x0, 0x0}}, 0x393) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='cgroup.events\x00', 0x0, 0x0) write$cgroup_int(r2, &(0x7f00000007c0)=0x6, 0x12) r3 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000002c0), 0x4) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz1\x00', 0x1ff) r4 = perf_event_open$cgroup(&(0x7f0000000600)={0x0, 0x70, 0x9, 0x6, 0x8, 0x6, 0x0, 0xfffffffffffff49f, 0x2, 0x6, 0x3ff, 0x0, 0x20, 0x0, 0x1, 0x81, 0x1, 0x400, 0x4, 0xfac, 0x4, 0x1, 0x10000, 0xf1, 0xd3, 0x92b, 0x200, 0x1, 0x100000000, 0x2, 0x100000000, 0xfff, 0xfff, 0xffff, 0x3, 0xfffffffffffffffd, 0x0, 0x6, 0x0, 0x50, 0x0, @perf_config_ext={0x3f, 0x9}, 0x20000, 0x8, 0xef3, 0x7, 0x100000000, 0x8, 0xfff}, 0xffffffffffffffff, 0x2, r0, 0x8) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000b40)='cgroup.subtree_control\x00') ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x2400, 0x1) r5 = getpid() socketpair$unix(0x1, 0x7, 0x0, &(0x7f0000000540)={0xffffffffffffffff}) setsockopt$sock_attach_bpf(r6, 0x1, 0x32, &(0x7f00000005c0)=r3, 0x4) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={0x0, 0xffffffffffffffff, 0x0, 0x12, &(0x7f0000000480)='./cgroup.cpu/syz1\x00', r1}, 0x30) perf_event_open(&(0x7f0000000300)={0x5, 0x70, 0xff, 0x4, 0x1000, 0xe5af, 0x0, 0x8000, 0xd0440, 0x2, 0xffff, 0x1, 0x4, 0x1f, 0x3, 0xfffffffffffffffa, 0x5, 0x9, 0x8, 0x1, 0x3, 0x400, 0x6, 0x5, 0x401, 0x10000, 0xff, 0xb24, 0xffffffffffff8000, 0xc8a, 0x3f, 0xfffffffffffffffa, 0xffffffffffff8001, 0x200, 0x5, 0x3, 0x2, 0x93a, 0x0, 0x7fff, 0x2, @perf_bp={&(0x7f0000000100), 0x1}, 0x0, 0x0, 0xffffffffffffff4e, 0x6, 0x0, 0x4, 0xfffffffffffffffd}, r5, 0x0, r7, 0x8) r8 = openat$tun(0xffffffffffffff9c, &(0x7f0000000580)='/dev/net/tun\x00', 0x40000, 0x0) ioctl$TUNSETPERSIST(r8, 0x400454cb, 0x1) r9 = socket$kcm(0x29, 0x5, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000800)={0x0, r0, 0x1, 0x2}, 0x14) ioctl$sock_kcm_SIOCKCMUNATTACH(r9, 0x89e1, &(0x7f0000000900)={r2}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r3, 0x0, 0x8b, 0x0, &(0x7f0000000680)="3ce41f426b7dd449ae14b08e1868c456d4fe9c7993884cf18f4dd5a0bc57250243da4203e0640859184bc4c4690afefd7736e8842cd88030448e918bdb5bd9bbbd680a51261557c0477c18049c832005ebb5b185c6f233df73a21d3b3ddad8426fba2d5f8aac5df904d5e5f2e7dc4a517079e08d5b2175a276f2a5c49cc2957cb367f269898570852dd63a", 0x0, 0x5}, 0x28) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000500)='./cgroup/syz0\x00', 0x200002, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000740)={r3, 0x50, &(0x7f00000003c0)}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r2, 0x50, &(0x7f0000000840)}, 0x10) openat$cgroup_subtree(r2, &(0x7f0000000940)='cgroup.subtree_control\x00', 0x2, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x1ff, 0x0, 0x0, 0x0, 0x200000, 0xffffffffffffffff, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280), 0x2}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r10 = socket$kcm(0xa, 0x400000000002, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffc59) ioctl$sock_kcm_SIOCKCMCLONE(r10, 0x890b, &(0x7f0000000000)) ioctl$sock_kcm_SIOCKCMCLONE(r10, 0x890c, &(0x7f0000000000)) 03:53:06 executing program 3: epoll_create1(0x0) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = fcntl$dupfd(r0, 0x1, r0) getsockopt$inet_mtu(r1, 0x0, 0xa, &(0x7f0000000280), &(0x7f0000000240)=0x4) stat(&(0x7f0000002c40)='./file0\x00', &(0x7f0000002c80)) socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x4082) r3 = memfd_create(&(0x7f0000000100)='/dev/loop#\x00', 0x2) pwritev(r3, &(0x7f0000000480)=[{&(0x7f00000004c0)="2bd83b0010947db9141978d2d9c93f59a4f3", 0x12}], 0x1, 0x81806) ioctl$TIOCLINUX5(r1, 0x541c, &(0x7f0000000340)={0x5, 0x0, 0x6, 0x0, 0x8cf}) ioctl$FIGETBSZ(0xffffffffffffffff, 0x2, &(0x7f0000000680)) ioctl$EVIOCSABS20(0xffffffffffffffff, 0x401845e0, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x4, 0x82d, 0x6e371b8c}) ioctl$LOOP_CHANGE_FD(r2, 0x4c00, r3) unlinkat(r1, &(0x7f00000003c0)='./file0\x00', 0x200) r4 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000200)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) ioctl$sock_inet6_SIOCSIFADDR(r3, 0x8916, &(0x7f00000005c0)={@remote}) keyctl$unlink(0x9, r4, r4) fcntl$getownex(r1, 0x10, &(0x7f0000000180)) sendfile(r1, r2, &(0x7f0000000300), 0x2000006) r5 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f0000000000)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffc) r6 = add_key$keyring(&(0x7f00000003c0)='keyring\x00', &(0x7f0000000400)={'syz'}, 0x0, 0x0, r5) dup2(r2, r1) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000440)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(r1, 0x10e, 0x2, &(0x7f0000000140)=0x1, 0x4) keyctl$revoke(0x3, r6) r7 = inotify_init() r8 = inotify_add_watch(r7, &(0x7f0000000040)='./file0\x00', 0x20000000) inotify_rm_watch(r7, r8) 03:53:06 executing program 5: getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffff9c, 0x84, 0x13, 0x0, 0x0) r0 = syz_open_dev$swradio(&(0x7f0000000000)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$radio(0x0, 0xffffffffffffffff, 0x2) r1 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) getdents64(r1, 0x0, 0x0) r2 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r2, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r2, 0x8) r3 = socket$inet6_sctp(0xa, 0x805, 0x84) r4 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) prctl$PR_SET_ENDIAN(0x14, 0x1) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r3, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) epoll_pwait(0xffffffffffffffff, &(0x7f0000000040)=[{}, {}], 0x2, 0x0, &(0x7f0000000080), 0x8) getpgid(0x0) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r4, 0x84, 0x9, &(0x7f0000000280)={0x0, @in={{0x2, 0x0, @empty}}, 0x0, 0xac14142400000000, 0x0, 0x0, 0x54}, 0x98) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000780)={{{@in=@dev, @in6=@local}}, {{@in6=@mcast2}, 0x0, @in6=@dev}}, 0x0) ioctl$SIOCAX25ADDFWD(r0, 0x89ea, 0x0) syz_mount_image$gfs2(&(0x7f00000003c0)='gfs2\x00', 0x0, 0x87, 0x0, &(0x7f00000005c0), 0x1040040, 0x0) readv(r1, &(0x7f0000000500)=[{&(0x7f0000000400)=""/217, 0xd9}], 0x1) 03:53:06 executing program 2: epoll_create1(0x0) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = fcntl$dupfd(r0, 0x1, r0) getsockopt$inet_mtu(r1, 0x0, 0xa, &(0x7f0000000280), &(0x7f0000000240)=0x4) stat(&(0x7f0000002c40)='./file0\x00', &(0x7f0000002c80)) socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x4082) r3 = memfd_create(&(0x7f0000000100)='/dev/loop#\x00', 0x2) pwritev(r3, &(0x7f0000000480)=[{&(0x7f00000004c0)="2bd83b0010947db9141978d2d9c93f59a4f3", 0x12}], 0x1, 0x81806) ioctl$TIOCLINUX5(r1, 0x541c, &(0x7f0000000340)={0x5, 0x0, 0x6, 0x0, 0x8cf}) ioctl$FIGETBSZ(0xffffffffffffffff, 0x2, &(0x7f0000000680)) ioctl$EVIOCSABS20(0xffffffffffffffff, 0x401845e0, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x4, 0x82d, 0x6e371b8c}) ioctl$LOOP_CHANGE_FD(r2, 0x4c00, r3) unlinkat(r1, &(0x7f00000003c0)='./file0\x00', 0x200) r4 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000200)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) ioctl$sock_inet6_SIOCSIFADDR(r3, 0x8916, &(0x7f00000005c0)={@remote}) keyctl$unlink(0x9, r4, r4) fcntl$getownex(r1, 0x10, &(0x7f0000000180)) sendfile(r1, r2, &(0x7f0000000300), 0x2000006) r5 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f0000000000)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffc) r6 = add_key$keyring(&(0x7f00000003c0)='keyring\x00', &(0x7f0000000400)={'syz'}, 0x0, 0x0, r5) dup2(r2, r1) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000440)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(r1, 0x10e, 0x2, &(0x7f0000000140)=0x1, 0x4) keyctl$revoke(0x3, r6) r7 = inotify_init() r8 = inotify_add_watch(r7, &(0x7f0000000040)='./file0\x00', 0x20000000) inotify_rm_watch(r7, r8) 03:53:06 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x18, &(0x7f0000000b80)=ANY=[@ANYBLOB="cab5674ca80400f902c8d3fc17d4a51472ff5e04a7ed68e9074e865fffffffffff6582e2a0c58f438f1a9b1af27305fb6c1d497851a00d51dddde821f356222d82de15a5bb3ca4d544c3683ff903b30637ee634a8a4fa0e19e57c7d35e4db3a02231b71023a910ac2424326e31258bde7ca760ff3ca3261a92112b3c8db9e0d79dc5ad29e05434154bba1e60d243d8fa466b27518c09e11b78ec43ab7af1d33fbd4885ee5e95b0849345d0edef0a2e68320a47938597cf0fba5ae2e93301ffc38baaf267"], 0x0, 0x1625, 0x0, 0x0, 0x41100, 0x1, [], 0x0, 0x4}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r0, 0xdb, &(0x7f0000000200)={0x0, 0x0}}, 0x393) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='cgroup.events\x00', 0x0, 0x0) write$cgroup_int(r2, &(0x7f00000007c0)=0x6, 0x12) r3 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000002c0), 0x4) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz1\x00', 0x1ff) r4 = perf_event_open$cgroup(&(0x7f0000000600)={0x0, 0x70, 0x9, 0x6, 0x8, 0x6, 0x0, 0xfffffffffffff49f, 0x2, 0x6, 0x3ff, 0x0, 0x20, 0x0, 0x1, 0x81, 0x1, 0x400, 0x4, 0xfac, 0x4, 0x1, 0x10000, 0xf1, 0xd3, 0x92b, 0x200, 0x1, 0x100000000, 0x2, 0x100000000, 0xfff, 0xfff, 0xffff, 0x3, 0xfffffffffffffffd, 0x0, 0x6, 0x0, 0x50, 0x0, @perf_config_ext={0x3f, 0x9}, 0x20000, 0x8, 0xef3, 0x7, 0x100000000, 0x8, 0xfff}, 0xffffffffffffffff, 0x2, r0, 0x8) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000b40)='cgroup.subtree_control\x00') ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x2400, 0x1) r5 = getpid() socketpair$unix(0x1, 0x7, 0x0, &(0x7f0000000540)={0xffffffffffffffff}) setsockopt$sock_attach_bpf(r6, 0x1, 0x32, &(0x7f00000005c0)=r3, 0x4) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={0x0, 0xffffffffffffffff, 0x0, 0x12, &(0x7f0000000480)='./cgroup.cpu/syz1\x00', r1}, 0x30) perf_event_open(&(0x7f0000000300)={0x5, 0x70, 0xff, 0x4, 0x1000, 0xe5af, 0x0, 0x8000, 0xd0440, 0x2, 0xffff, 0x1, 0x4, 0x1f, 0x3, 0xfffffffffffffffa, 0x5, 0x9, 0x8, 0x1, 0x3, 0x400, 0x6, 0x5, 0x401, 0x10000, 0xff, 0xb24, 0xffffffffffff8000, 0xc8a, 0x3f, 0xfffffffffffffffa, 0xffffffffffff8001, 0x200, 0x5, 0x3, 0x2, 0x93a, 0x0, 0x7fff, 0x2, @perf_bp={&(0x7f0000000100), 0x1}, 0x0, 0x0, 0xffffffffffffff4e, 0x6, 0x0, 0x4, 0xfffffffffffffffd}, r5, 0x0, r7, 0x8) r8 = openat$tun(0xffffffffffffff9c, &(0x7f0000000580)='/dev/net/tun\x00', 0x40000, 0x0) ioctl$TUNSETPERSIST(r8, 0x400454cb, 0x1) r9 = socket$kcm(0x29, 0x5, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000800)={0x0, r0, 0x1, 0x2}, 0x14) ioctl$sock_kcm_SIOCKCMUNATTACH(r9, 0x89e1, &(0x7f0000000900)={r2}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r3, 0x0, 0x8b, 0x0, &(0x7f0000000680)="3ce41f426b7dd449ae14b08e1868c456d4fe9c7993884cf18f4dd5a0bc57250243da4203e0640859184bc4c4690afefd7736e8842cd88030448e918bdb5bd9bbbd680a51261557c0477c18049c832005ebb5b185c6f233df73a21d3b3ddad8426fba2d5f8aac5df904d5e5f2e7dc4a517079e08d5b2175a276f2a5c49cc2957cb367f269898570852dd63a", 0x0, 0x5}, 0x28) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000500)='./cgroup/syz0\x00', 0x200002, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000740)={r3, 0x50, &(0x7f00000003c0)}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r2, 0x50, &(0x7f0000000840)}, 0x10) openat$cgroup_subtree(r2, &(0x7f0000000940)='cgroup.subtree_control\x00', 0x2, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x1ff, 0x0, 0x0, 0x0, 0x200000, 0xffffffffffffffff, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280), 0x2}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r10 = socket$kcm(0xa, 0x400000000002, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffc59) ioctl$sock_kcm_SIOCKCMCLONE(r10, 0x890b, &(0x7f0000000000)) ioctl$sock_kcm_SIOCKCMCLONE(r10, 0x890c, &(0x7f0000000000)) 03:53:06 executing program 3: gettid() r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) write$cgroup_pid(r0, &(0x7f0000000100), 0xda4fff08) sendmsg(r0, &(0x7f0000002e40)={&(0x7f0000000500)=@rxrpc=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x4e22, @local}}, 0x80, 0x0, 0x0, &(0x7f0000001840)=[{0x10}], 0x10}, 0x80) getpid() ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, 0x0) perf_event_open(&(0x7f0000000400)={0x2562f8c4a2ccfd7b, 0x70, 0x64, 0x0, 0x2, 0x4eee, 0x0, 0x0, 0x20000, 0x9, 0xae5b, 0x4, 0x1, 0xcd, 0x7, 0x4, 0xb7, 0x9, 0x8, 0x0, 0x29a, 0x7fff, 0x100000000, 0x38, 0x2, 0x0, 0x3, 0x7, 0x0, 0x5, 0x0, 0x0, 0x1, 0x0, 0x4, 0x8, 0x0, 0x8000, 0x0, 0x1, 0x1, @perf_bp={0x0, 0x3}, 0x8, 0x5d, 0x9, 0x0, 0x433, 0x1}, 0x0, 0x3, 0xffffffffffffff9c, 0x2) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000140), 0x12) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x660c, 0x0) 03:53:06 executing program 4: epoll_create1(0x0) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = fcntl$dupfd(r0, 0x1, r0) getsockopt$inet_mtu(r1, 0x0, 0xa, &(0x7f0000000280), &(0x7f0000000240)=0x4) stat(&(0x7f0000002c40)='./file0\x00', &(0x7f0000002c80)) socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x4082) r3 = memfd_create(&(0x7f0000000100)='/dev/loop#\x00', 0x2) pwritev(r3, &(0x7f0000000480)=[{&(0x7f00000004c0)="2bd83b0010947db9141978d2d9c93f59a4f3", 0x12}], 0x1, 0x81806) ioctl$TIOCLINUX5(r1, 0x541c, &(0x7f0000000340)={0x5, 0x0, 0x6, 0x0, 0x8cf}) ioctl$FIGETBSZ(0xffffffffffffffff, 0x2, &(0x7f0000000680)) ioctl$EVIOCSABS20(0xffffffffffffffff, 0x401845e0, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x4, 0x82d, 0x6e371b8c}) ioctl$LOOP_CHANGE_FD(r2, 0x4c00, r3) unlinkat(r1, &(0x7f00000003c0)='./file0\x00', 0x200) r4 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000200)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) ioctl$sock_inet6_SIOCSIFADDR(r3, 0x8916, &(0x7f00000005c0)={@remote}) keyctl$unlink(0x9, r4, r4) fcntl$getownex(r1, 0x10, &(0x7f0000000180)) sendfile(r1, r2, &(0x7f0000000300), 0x2000006) r5 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f0000000000)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffc) r6 = add_key$keyring(&(0x7f00000003c0)='keyring\x00', &(0x7f0000000400)={'syz'}, 0x0, 0x0, r5) dup2(r2, r1) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000440)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(r1, 0x10e, 0x2, &(0x7f0000000140)=0x1, 0x4) keyctl$revoke(0x3, r6) r7 = inotify_init() r8 = inotify_add_watch(r7, &(0x7f0000000040)='./file0\x00', 0x20000000) inotify_rm_watch(r7, r8) 03:53:06 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x18, &(0x7f0000000b80)=ANY=[@ANYBLOB="cab5674ca80400f902c8d3fc17d4a51472ff5e04a7ed68e9074e865fffffffffff6582e2a0c58f438f1a9b1af27305fb6c1d497851a00d51dddde821f356222d82de15a5bb3ca4d544c3683ff903b30637ee634a8a4fa0e19e57c7d35e4db3a02231b71023a910ac2424326e31258bde7ca760ff3ca3261a92112b3c8db9e0d79dc5ad29e05434154bba1e60d243d8fa466b27518c09e11b78ec43ab7af1d33fbd4885ee5e95b0849345d0edef0a2e68320a47938597cf0fba5ae2e93301ffc38baaf267"], 0x0, 0x1625, 0x0, 0x0, 0x41100, 0x1, [], 0x0, 0x4}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r0, 0xdb, &(0x7f0000000200)={0x0, 0x0}}, 0x393) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='cgroup.events\x00', 0x0, 0x0) write$cgroup_int(r2, &(0x7f00000007c0)=0x6, 0x12) r3 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000002c0), 0x4) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz1\x00', 0x1ff) r4 = perf_event_open$cgroup(&(0x7f0000000600)={0x0, 0x70, 0x9, 0x6, 0x8, 0x6, 0x0, 0xfffffffffffff49f, 0x2, 0x6, 0x3ff, 0x0, 0x20, 0x0, 0x1, 0x81, 0x1, 0x400, 0x4, 0xfac, 0x4, 0x1, 0x10000, 0xf1, 0xd3, 0x92b, 0x200, 0x1, 0x100000000, 0x2, 0x100000000, 0xfff, 0xfff, 0xffff, 0x3, 0xfffffffffffffffd, 0x0, 0x6, 0x0, 0x50, 0x0, @perf_config_ext={0x3f, 0x9}, 0x20000, 0x8, 0xef3, 0x7, 0x100000000, 0x8, 0xfff}, 0xffffffffffffffff, 0x2, r0, 0x8) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000b40)='cgroup.subtree_control\x00') ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x2400, 0x1) r5 = getpid() socketpair$unix(0x1, 0x7, 0x0, &(0x7f0000000540)={0xffffffffffffffff}) setsockopt$sock_attach_bpf(r6, 0x1, 0x32, &(0x7f00000005c0)=r3, 0x4) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={0x0, 0xffffffffffffffff, 0x0, 0x12, &(0x7f0000000480)='./cgroup.cpu/syz1\x00', r1}, 0x30) perf_event_open(&(0x7f0000000300)={0x5, 0x70, 0xff, 0x4, 0x1000, 0xe5af, 0x0, 0x8000, 0xd0440, 0x2, 0xffff, 0x1, 0x4, 0x1f, 0x3, 0xfffffffffffffffa, 0x5, 0x9, 0x8, 0x1, 0x3, 0x400, 0x6, 0x5, 0x401, 0x10000, 0xff, 0xb24, 0xffffffffffff8000, 0xc8a, 0x3f, 0xfffffffffffffffa, 0xffffffffffff8001, 0x200, 0x5, 0x3, 0x2, 0x93a, 0x0, 0x7fff, 0x2, @perf_bp={&(0x7f0000000100), 0x1}, 0x0, 0x0, 0xffffffffffffff4e, 0x6, 0x0, 0x4, 0xfffffffffffffffd}, r5, 0x0, r7, 0x8) r8 = openat$tun(0xffffffffffffff9c, &(0x7f0000000580)='/dev/net/tun\x00', 0x40000, 0x0) ioctl$TUNSETPERSIST(r8, 0x400454cb, 0x1) r9 = socket$kcm(0x29, 0x5, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000800)={0x0, r0, 0x1, 0x2}, 0x14) ioctl$sock_kcm_SIOCKCMUNATTACH(r9, 0x89e1, &(0x7f0000000900)={r2}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r3, 0x0, 0x8b, 0x0, &(0x7f0000000680)="3ce41f426b7dd449ae14b08e1868c456d4fe9c7993884cf18f4dd5a0bc57250243da4203e0640859184bc4c4690afefd7736e8842cd88030448e918bdb5bd9bbbd680a51261557c0477c18049c832005ebb5b185c6f233df73a21d3b3ddad8426fba2d5f8aac5df904d5e5f2e7dc4a517079e08d5b2175a276f2a5c49cc2957cb367f269898570852dd63a", 0x0, 0x5}, 0x28) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000500)='./cgroup/syz0\x00', 0x200002, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000740)={r3, 0x50, &(0x7f00000003c0)}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r2, 0x50, &(0x7f0000000840)}, 0x10) openat$cgroup_subtree(r2, &(0x7f0000000940)='cgroup.subtree_control\x00', 0x2, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x1ff, 0x0, 0x0, 0x0, 0x200000, 0xffffffffffffffff, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280), 0x2}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r10 = socket$kcm(0xa, 0x400000000002, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffc59) ioctl$sock_kcm_SIOCKCMCLONE(r10, 0x890b, &(0x7f0000000000)) ioctl$sock_kcm_SIOCKCMCLONE(r10, 0x890c, &(0x7f0000000000)) 03:53:06 executing program 2: r0 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) r1 = fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffff9c) sendmsg$TIPC_CMD_SET_LINK_TOL(r1, &(0x7f00000005c0)={&(0x7f00000004c0), 0xc, &(0x7f0000000580)={&(0x7f0000000540)={0x2c, 0x0, 0x0, 0x70bd28, 0x25dfdbfd, {{}, 0x0, 0x4107, 0x0, {0x10, 0x18, {0x0, @bearer=@l2={'ib', 0x3a, 'nr0\x00'}}}}, [""]}, 0x2c}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) add_key$user(&(0x7f0000000080)='user\x00', &(0x7f0000000100)={'syz', 0x2}, &(0x7f0000000140)="32d4adb3cdc80c95d3f6bc7f0d02e5e07d1a1997d275b2d7081d02b9da88228d45a148f3d7bd2e66abf674e816094f92d5c87435135a2a5bc1972f4af5601b469bd1ed030b2a483eaf7551b4c6879db1c3e5779a7abcdcb8d35241311e966f08cd30934babe276b5c599253e4f29c6ed795210417a6148fe102f4d3d90994979a2d99aafaba3aa2d8d59acc44843d2d9f0a7796da57ff29998d763b864076667aebcdc1b237671270b28da4a3eb89a7a96", 0xb1, 0x0) r2 = request_key(&(0x7f0000000600)='id_rz3$\x1ei\xfc\xe0\x1c!\x03\x92\x80^\x1eesolver ', &(0x7f00000003c0)={'syz', 0x0}, &(0x7f0000000640)='\xf8mime_type--*\x00', r0) add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) add_key(0x0, &(0x7f0000000380)={'syz', 0x2}, &(0x7f00000006c0)="7032ca1d3dae0252c52a2e86249222d89bcfa55c6b854fdf1a2ca24435a1ef4f5605c83d11dc947337e13385858ea429b183af9dca1d1d66e17b8e40c093bdcea9ae45", 0x43, r2) r3 = request_key(&(0x7f0000000400)='asymmetric\x00', &(0x7f0000000440)={'syz', 0x1}, &(0x7f0000000480)='\x00', 0x0) keyctl$revoke(0x3, r3) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003840)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000002c00)=""/125, 0x7d}}], 0x1, 0x0, 0x0) r4 = syz_open_procfs(0x0, &(0x7f00000000c0)='status\x00') preadv(r4, &(0x7f00000017c0), 0x3ba, 0x0) 03:53:06 executing program 0: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r0 = inotify_init() read(r0, 0x0, 0x0) r1 = inotify_add_watch(r0, &(0x7f0000000040)='./file0\x00', 0x20000000) inotify_rm_watch(r0, r1) 03:53:06 executing program 3: clone(0x13102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x1e) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x1, 0x0, 0x0, 0x0, 0x19}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) [ 1814.252589] net_ratelimit: 26 callbacks suppressed [ 1814.252598] protocol 88fb is buggy, dev hsr_slave_0 [ 1814.262738] protocol 88fb is buggy, dev hsr_slave_1 [ 1814.267856] protocol 88fb is buggy, dev hsr_slave_0 [ 1814.272972] protocol 88fb is buggy, dev hsr_slave_1 [ 1814.278134] protocol 88fb is buggy, dev hsr_slave_0 [ 1814.283234] protocol 88fb is buggy, dev hsr_slave_1 [ 1814.288387] protocol 88fb is buggy, dev hsr_slave_0 [ 1814.293472] protocol 88fb is buggy, dev hsr_slave_1 03:53:06 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x18, &(0x7f0000000b80)=ANY=[@ANYBLOB="cab5674ca80400f902c8d3fc17d4a51472ff5e04a7ed68e9074e865fffffffffff6582e2a0c58f438f1a9b1af27305fb6c1d497851a00d51dddde821f356222d82de15a5bb3ca4d544c3683ff903b30637ee634a8a4fa0e19e57c7d35e4db3a02231b71023a910ac2424326e31258bde7ca760ff3ca3261a92112b3c8db9e0d79dc5ad29e05434154bba1e60d243d8fa466b27518c09e11b78ec43ab7af1d33fbd4885ee5e95b0849345d0edef0a2e68320a47938597cf0fba5ae2e93301ffc38baaf267"], 0x0, 0x1625, 0x0, 0x0, 0x41100, 0x1, [], 0x0, 0x4}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r0, 0xdb, &(0x7f0000000200)={0x0, 0x0}}, 0x393) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='cgroup.events\x00', 0x0, 0x0) write$cgroup_int(r2, &(0x7f00000007c0)=0x6, 0x12) r3 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000002c0), 0x4) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz1\x00', 0x1ff) r4 = perf_event_open$cgroup(&(0x7f0000000600)={0x0, 0x70, 0x9, 0x6, 0x8, 0x6, 0x0, 0xfffffffffffff49f, 0x2, 0x6, 0x3ff, 0x0, 0x20, 0x0, 0x1, 0x81, 0x1, 0x400, 0x4, 0xfac, 0x4, 0x1, 0x10000, 0xf1, 0xd3, 0x92b, 0x200, 0x1, 0x100000000, 0x2, 0x100000000, 0xfff, 0xfff, 0xffff, 0x3, 0xfffffffffffffffd, 0x0, 0x6, 0x0, 0x50, 0x0, @perf_config_ext={0x3f, 0x9}, 0x20000, 0x8, 0xef3, 0x7, 0x100000000, 0x8, 0xfff}, 0xffffffffffffffff, 0x2, r0, 0x8) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000b40)='cgroup.subtree_control\x00') ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x2400, 0x1) r5 = getpid() socketpair$unix(0x1, 0x7, 0x0, &(0x7f0000000540)={0xffffffffffffffff}) setsockopt$sock_attach_bpf(r6, 0x1, 0x32, &(0x7f00000005c0)=r3, 0x4) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={0x0, 0xffffffffffffffff, 0x0, 0x12, &(0x7f0000000480)='./cgroup.cpu/syz1\x00', r1}, 0x30) perf_event_open(&(0x7f0000000300)={0x5, 0x70, 0xff, 0x4, 0x1000, 0xe5af, 0x0, 0x8000, 0xd0440, 0x2, 0xffff, 0x1, 0x4, 0x1f, 0x3, 0xfffffffffffffffa, 0x5, 0x9, 0x8, 0x1, 0x3, 0x400, 0x6, 0x5, 0x401, 0x10000, 0xff, 0xb24, 0xffffffffffff8000, 0xc8a, 0x3f, 0xfffffffffffffffa, 0xffffffffffff8001, 0x200, 0x5, 0x3, 0x2, 0x93a, 0x0, 0x7fff, 0x2, @perf_bp={&(0x7f0000000100), 0x1}, 0x0, 0x0, 0xffffffffffffff4e, 0x6, 0x0, 0x4, 0xfffffffffffffffd}, r5, 0x0, r7, 0x8) r8 = openat$tun(0xffffffffffffff9c, &(0x7f0000000580)='/dev/net/tun\x00', 0x40000, 0x0) ioctl$TUNSETPERSIST(r8, 0x400454cb, 0x1) r9 = socket$kcm(0x29, 0x5, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000800)={0x0, r0, 0x1, 0x2}, 0x14) ioctl$sock_kcm_SIOCKCMUNATTACH(r9, 0x89e1, &(0x7f0000000900)={r2}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r3, 0x0, 0x8b, 0x0, &(0x7f0000000680)="3ce41f426b7dd449ae14b08e1868c456d4fe9c7993884cf18f4dd5a0bc57250243da4203e0640859184bc4c4690afefd7736e8842cd88030448e918bdb5bd9bbbd680a51261557c0477c18049c832005ebb5b185c6f233df73a21d3b3ddad8426fba2d5f8aac5df904d5e5f2e7dc4a517079e08d5b2175a276f2a5c49cc2957cb367f269898570852dd63a", 0x0, 0x5}, 0x28) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000500)='./cgroup/syz0\x00', 0x200002, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000740)={r3, 0x50, &(0x7f00000003c0)}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r2, 0x50, &(0x7f0000000840)}, 0x10) openat$cgroup_subtree(r2, &(0x7f0000000940)='cgroup.subtree_control\x00', 0x2, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x1ff, 0x0, 0x0, 0x0, 0x200000, 0xffffffffffffffff, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280), 0x2}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r10 = socket$kcm(0xa, 0x400000000002, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffc59) ioctl$sock_kcm_SIOCKCMCLONE(r10, 0x890b, &(0x7f0000000000)) ioctl$sock_kcm_SIOCKCMCLONE(r10, 0x890c, &(0x7f0000000000)) 03:53:06 executing program 5: getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffff9c, 0x84, 0x13, 0x0, 0x0) r0 = syz_open_dev$swradio(&(0x7f0000000000)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$radio(0x0, 0xffffffffffffffff, 0x2) r1 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) getdents64(r1, 0x0, 0x0) r2 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r2, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r2, 0x8) r3 = socket$inet6_sctp(0xa, 0x805, 0x84) r4 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) prctl$PR_SET_ENDIAN(0x14, 0x1) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r3, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) epoll_pwait(0xffffffffffffffff, &(0x7f0000000040)=[{}, {}], 0x2, 0x0, &(0x7f0000000080), 0x8) getpgid(0x0) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r4, 0x84, 0x9, &(0x7f0000000280)={0x0, @in={{0x2, 0x0, @empty}}, 0x0, 0xac14142400000000, 0x0, 0x0, 0x54}, 0x98) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000780)={{{@in=@dev, @in6=@local}}, {{@in6=@mcast2}, 0x0, @in6=@dev}}, 0x0) ioctl$SIOCAX25ADDFWD(r0, 0x89ea, 0x0) syz_mount_image$gfs2(&(0x7f00000003c0)='gfs2\x00', 0x0, 0x87, 0x0, &(0x7f00000005c0), 0x1040040, 0x0) readv(r1, &(0x7f0000000500)=[{&(0x7f0000000400)=""/217, 0xd9}], 0x1) 03:53:06 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000a00)='uid_map\x00') socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) preadv(r0, &(0x7f0000000580)=[{&(0x7f0000000000)=""/137, 0x89}], 0x1, 0x0) 03:53:06 executing program 4: epoll_create1(0x0) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = fcntl$dupfd(r0, 0x1, r0) getsockopt$inet_mtu(r1, 0x0, 0xa, &(0x7f0000000280), &(0x7f0000000240)=0x4) stat(&(0x7f0000002c40)='./file0\x00', &(0x7f0000002c80)) socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x4082) r3 = memfd_create(&(0x7f0000000100)='/dev/loop#\x00', 0x2) pwritev(r3, &(0x7f0000000480)=[{&(0x7f00000004c0)="2bd83b0010947db9141978d2d9c93f59a4f3ec", 0x13}], 0x1, 0x81806) ioctl$TIOCLINUX5(r1, 0x541c, &(0x7f0000000340)={0x5, 0x0, 0x6, 0x0, 0x8cf}) ioctl$FIGETBSZ(r0, 0x2, &(0x7f0000000680)) ioctl$EVIOCSABS20(0xffffffffffffffff, 0x401845e0, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x4, 0x82d, 0x6e371b8c}) ioctl$LOOP_CHANGE_FD(r2, 0x4c00, r3) unlinkat(r1, &(0x7f00000003c0)='./file0\x00', 0x200) r4 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000200)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) ioctl$sock_inet6_SIOCSIFADDR(r3, 0x8916, &(0x7f00000005c0)={@remote}) keyctl$unlink(0x9, r4, r4) fcntl$getownex(r1, 0x10, &(0x7f0000000180)) sendfile(r1, r2, &(0x7f0000000300), 0x2000006) r5 = add_key$keyring(&(0x7f0000000380)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffc) r6 = add_key$keyring(&(0x7f00000003c0)='keyring\x00', &(0x7f0000000400)={'syz'}, 0x0, 0x0, r5) dup2(r2, r1) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000440)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(r1, 0x10e, 0x2, &(0x7f0000000140)=0x1, 0x4) keyctl$revoke(0x3, r6) r7 = inotify_init() r8 = inotify_add_watch(r7, &(0x7f0000000040)='./file0\x00', 0x20000000) inotify_rm_watch(r7, r8) 03:53:06 executing program 3: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000280)='/dev/null\x00', 0x0, 0x0) fsetxattr$security_smack_entry(r0, &(0x7f0000000040)='security.SMACK64\x00', 0x0, 0x0, 0x1) 03:53:06 executing program 0: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r0 = inotify_init() read(r0, 0x0, 0x0) inotify_add_watch(r0, &(0x7f0000000040)='./file0\x00', 0x20000000) 03:53:06 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x1c, &(0x7f0000000b80)=ANY=[@ANYBLOB="cab5674ca80400f902c8d3fc17d4a51472ff5e04a7ed68e9074e865fffffffffff6582e2a0c58f438f1a9b1af27305fb6c1d497851a00d51dddde821f356222d82de15a5bb3ca4d544c3683ff903b30637ee634a8a4fa0e19e57c7d35e4db3a02231b71023a910ac2424326e31258bde7ca760ff3ca3261a92112b3c8db9e0d79dc5ad29e05434154bba1e60d243d8fa466b27518c09e11b78ec43ab7af1d33fbd4885ee5e95b0849345d0edef0a2e68320a47938597cf0fba5ae2e93301ffc38baaf2673b7fd4628a0fe3665006d238567bdb430991e02866ad858345dc86331d91a53051"], 0x0, 0x1625, 0x0, 0x0, 0x41100, 0x1, [], 0x0, 0x4}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r0, 0xdb, &(0x7f0000000200)={0x0, 0x0}}, 0x393) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='cgroup.events\x00', 0x0, 0x0) write$cgroup_int(r2, &(0x7f00000007c0)=0x6, 0x12) r3 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000002c0), 0x4) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz1\x00', 0x1ff) r4 = perf_event_open$cgroup(&(0x7f0000000600)={0x0, 0x70, 0x9, 0x6, 0x8, 0x6, 0x0, 0xfffffffffffff49f, 0x2, 0x6, 0x3ff, 0x0, 0x20, 0x0, 0x1, 0x81, 0x1, 0x400, 0x4, 0xfac, 0x4, 0x1, 0x10000, 0xf1, 0xd3, 0x92b, 0x200, 0x1, 0x100000000, 0x2, 0x100000000, 0xfff, 0xfff, 0xffff, 0x3, 0xfffffffffffffffd, 0x0, 0x6, 0x0, 0x50, 0x0, @perf_config_ext={0x3f, 0x9}, 0x20000, 0x8, 0xef3, 0x7, 0x100000000, 0x8, 0xfff}, 0xffffffffffffffff, 0x2, r0, 0x8) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000b40)='cgroup.subtree_control\x00') ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x2400, 0x1) r5 = getpid() socketpair$unix(0x1, 0x7, 0x0, &(0x7f0000000540)={0xffffffffffffffff}) setsockopt$sock_attach_bpf(r6, 0x1, 0x32, &(0x7f00000005c0)=r3, 0x4) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={0x0, 0xffffffffffffffff, 0x0, 0x12, &(0x7f0000000480)='./cgroup.cpu/syz1\x00', r1}, 0x30) perf_event_open(&(0x7f0000000300)={0x5, 0x70, 0xff, 0x4, 0x1000, 0xe5af, 0x0, 0x8000, 0xd0440, 0x2, 0xffff, 0x1, 0x4, 0x1f, 0x3, 0xfffffffffffffffa, 0x5, 0x9, 0x8, 0x1, 0x3, 0x400, 0x6, 0x5, 0x401, 0x10000, 0xff, 0xb24, 0xffffffffffff8000, 0xc8a, 0x3f, 0xfffffffffffffffa, 0xffffffffffff8001, 0x200, 0x5, 0x3, 0x2, 0x93a, 0x0, 0x7fff, 0x2, @perf_bp={&(0x7f0000000100), 0x1}, 0x0, 0x0, 0xffffffffffffff4e, 0x6, 0x0, 0x4, 0xfffffffffffffffd}, r5, 0x0, r7, 0x8) r8 = openat$tun(0xffffffffffffff9c, &(0x7f0000000580)='/dev/net/tun\x00', 0x40000, 0x0) ioctl$TUNSETPERSIST(r8, 0x400454cb, 0x1) r9 = socket$kcm(0x29, 0x5, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000800)={0x0, r0, 0x1, 0x2}, 0x14) ioctl$sock_kcm_SIOCKCMUNATTACH(r9, 0x89e1, &(0x7f0000000900)={r2}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r3, 0x0, 0x8b, 0x0, &(0x7f0000000680)="3ce41f426b7dd449ae14b08e1868c456d4fe9c7993884cf18f4dd5a0bc57250243da4203e0640859184bc4c4690afefd7736e8842cd88030448e918bdb5bd9bbbd680a51261557c0477c18049c832005ebb5b185c6f233df73a21d3b3ddad8426fba2d5f8aac5df904d5e5f2e7dc4a517079e08d5b2175a276f2a5c49cc2957cb367f269898570852dd63a", 0x0, 0x5}, 0x28) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000500)='./cgroup/syz0\x00', 0x200002, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000740)={r3, 0x50, &(0x7f00000003c0)}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r2, 0x50, &(0x7f0000000840)}, 0x10) openat$cgroup_subtree(r2, &(0x7f0000000940)='cgroup.subtree_control\x00', 0x2, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x1ff, 0x0, 0x0, 0x0, 0x200000, 0xffffffffffffffff, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280), 0x2}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r10 = socket$kcm(0xa, 0x400000000002, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffc59) ioctl$sock_kcm_SIOCKCMCLONE(r10, 0x890b, &(0x7f0000000000)) ioctl$sock_kcm_SIOCKCMCLONE(r10, 0x890c, &(0x7f0000000000)) 03:53:07 executing program 3: 03:53:07 executing program 2: 03:53:07 executing program 4: epoll_create1(0x0) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = fcntl$dupfd(r0, 0x1, r0) getsockopt$inet_mtu(r1, 0x0, 0xa, &(0x7f0000000280), &(0x7f0000000240)=0x4) stat(&(0x7f0000002c40)='./file0\x00', &(0x7f0000002c80)) socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x4082) r3 = memfd_create(&(0x7f0000000100)='/dev/loop#\x00', 0x2) pwritev(r3, &(0x7f0000000480)=[{&(0x7f00000004c0)="2bd83b0010947db9141978d2d9c93f59a4f3ec", 0x13}], 0x1, 0x81806) ioctl$TIOCLINUX5(r1, 0x541c, &(0x7f0000000340)={0x5, 0x0, 0x6, 0x0, 0x8cf}) ioctl$FIGETBSZ(r0, 0x2, &(0x7f0000000680)) ioctl$EVIOCSABS20(0xffffffffffffffff, 0x401845e0, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x4, 0x82d, 0x6e371b8c}) ioctl$LOOP_CHANGE_FD(r2, 0x4c00, r3) unlinkat(r1, &(0x7f00000003c0)='./file0\x00', 0x200) r4 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000200)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) ioctl$sock_inet6_SIOCSIFADDR(r3, 0x8916, &(0x7f00000005c0)={@remote}) keyctl$unlink(0x9, r4, r4) fcntl$getownex(r1, 0x10, &(0x7f0000000180)) sendfile(r1, r2, &(0x7f0000000300), 0x2000006) r5 = add_key$keyring(&(0x7f0000000380)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffc) r6 = add_key$keyring(&(0x7f00000003c0)='keyring\x00', &(0x7f0000000400)={'syz'}, 0x0, 0x0, r5) dup2(r2, r1) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000440)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(r1, 0x10e, 0x2, &(0x7f0000000140)=0x1, 0x4) keyctl$revoke(0x3, r6) r7 = inotify_init() r8 = inotify_add_watch(r7, &(0x7f0000000040)='./file0\x00', 0x20000000) inotify_rm_watch(r7, r8) 03:53:07 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x1c, &(0x7f0000000b80)=ANY=[@ANYBLOB="cab5674ca80400f902c8d3fc17d4a51472ff5e04a7ed68e9074e865fffffffffff6582e2a0c58f438f1a9b1af27305fb6c1d497851a00d51dddde821f356222d82de15a5bb3ca4d544c3683ff903b30637ee634a8a4fa0e19e57c7d35e4db3a02231b71023a910ac2424326e31258bde7ca760ff3ca3261a92112b3c8db9e0d79dc5ad29e05434154bba1e60d243d8fa466b27518c09e11b78ec43ab7af1d33fbd4885ee5e95b0849345d0edef0a2e68320a47938597cf0fba5ae2e93301ffc38baaf2673b7fd4628a0fe3665006d238567bdb430991e02866ad858345dc86331d91a53051"], 0x0, 0x1625, 0x0, 0x0, 0x41100, 0x1, [], 0x0, 0x4}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r0, 0xdb, &(0x7f0000000200)={0x0, 0x0}}, 0x393) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='cgroup.events\x00', 0x0, 0x0) write$cgroup_int(r2, &(0x7f00000007c0)=0x6, 0x12) r3 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000002c0), 0x4) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz1\x00', 0x1ff) r4 = perf_event_open$cgroup(&(0x7f0000000600)={0x0, 0x70, 0x9, 0x6, 0x8, 0x6, 0x0, 0xfffffffffffff49f, 0x2, 0x6, 0x3ff, 0x0, 0x20, 0x0, 0x1, 0x81, 0x1, 0x400, 0x4, 0xfac, 0x4, 0x1, 0x10000, 0xf1, 0xd3, 0x92b, 0x200, 0x1, 0x100000000, 0x2, 0x100000000, 0xfff, 0xfff, 0xffff, 0x3, 0xfffffffffffffffd, 0x0, 0x6, 0x0, 0x50, 0x0, @perf_config_ext={0x3f, 0x9}, 0x20000, 0x8, 0xef3, 0x7, 0x100000000, 0x8, 0xfff}, 0xffffffffffffffff, 0x2, r0, 0x8) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000b40)='cgroup.subtree_control\x00') ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x2400, 0x1) r5 = getpid() socketpair$unix(0x1, 0x7, 0x0, &(0x7f0000000540)={0xffffffffffffffff}) setsockopt$sock_attach_bpf(r6, 0x1, 0x32, &(0x7f00000005c0)=r3, 0x4) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={0x0, 0xffffffffffffffff, 0x0, 0x12, &(0x7f0000000480)='./cgroup.cpu/syz1\x00', r1}, 0x30) perf_event_open(&(0x7f0000000300)={0x5, 0x70, 0xff, 0x4, 0x1000, 0xe5af, 0x0, 0x8000, 0xd0440, 0x2, 0xffff, 0x1, 0x4, 0x1f, 0x3, 0xfffffffffffffffa, 0x5, 0x9, 0x8, 0x1, 0x3, 0x400, 0x6, 0x5, 0x401, 0x10000, 0xff, 0xb24, 0xffffffffffff8000, 0xc8a, 0x3f, 0xfffffffffffffffa, 0xffffffffffff8001, 0x200, 0x5, 0x3, 0x2, 0x93a, 0x0, 0x7fff, 0x2, @perf_bp={&(0x7f0000000100), 0x1}, 0x0, 0x0, 0xffffffffffffff4e, 0x6, 0x0, 0x4, 0xfffffffffffffffd}, r5, 0x0, r7, 0x8) r8 = openat$tun(0xffffffffffffff9c, &(0x7f0000000580)='/dev/net/tun\x00', 0x40000, 0x0) ioctl$TUNSETPERSIST(r8, 0x400454cb, 0x1) r9 = socket$kcm(0x29, 0x5, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000800)={0x0, r0, 0x1, 0x2}, 0x14) ioctl$sock_kcm_SIOCKCMUNATTACH(r9, 0x89e1, &(0x7f0000000900)={r2}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r3, 0x0, 0x8b, 0x0, &(0x7f0000000680)="3ce41f426b7dd449ae14b08e1868c456d4fe9c7993884cf18f4dd5a0bc57250243da4203e0640859184bc4c4690afefd7736e8842cd88030448e918bdb5bd9bbbd680a51261557c0477c18049c832005ebb5b185c6f233df73a21d3b3ddad8426fba2d5f8aac5df904d5e5f2e7dc4a517079e08d5b2175a276f2a5c49cc2957cb367f269898570852dd63a", 0x0, 0x5}, 0x28) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000500)='./cgroup/syz0\x00', 0x200002, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000740)={r3, 0x50, &(0x7f00000003c0)}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r2, 0x50, &(0x7f0000000840)}, 0x10) openat$cgroup_subtree(r2, &(0x7f0000000940)='cgroup.subtree_control\x00', 0x2, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x1ff, 0x0, 0x0, 0x0, 0x200000, 0xffffffffffffffff, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280), 0x2}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r10 = socket$kcm(0xa, 0x400000000002, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffc59) ioctl$sock_kcm_SIOCKCMCLONE(r10, 0x890b, &(0x7f0000000000)) ioctl$sock_kcm_SIOCKCMCLONE(r10, 0x890c, &(0x7f0000000000)) 03:53:07 executing program 3: r0 = epoll_create1(0x0) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x4, 0x31, 0xffffffffffffffff, 0x0) epoll_wait(r0, &(0x7f0000000040)=[{}], 0x1, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000080)) 03:53:07 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0xffffffff}]}) mkdir(&(0x7f0000000000)='./control\x00', 0x0) r0 = open(&(0x7f0000022ff6)='./control\x00', 0x0, 0x0) mkdirat(r0, &(0x7f00000001c0)='./control\x00', 0x0) futimesat(r0, 0x0, 0x0) [ 1815.142592] protocol 88fb is buggy, dev hsr_slave_0 [ 1815.147726] protocol 88fb is buggy, dev hsr_slave_1 [ 1815.197625] audit: type=1326 audit(2000001187.510:643): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=27513 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45ad2a code=0xffff0000 03:53:07 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0xffffffff}]}) mkdir(&(0x7f0000000000)='./control\x00', 0x0) r0 = open(&(0x7f0000000180)='./control\x00', 0x0, 0x0) mkdirat(r0, &(0x7f0000000140)='./control\x00', 0x0) unlinkat(r0, &(0x7f0000000080)='./control\x00', 0x200) 03:53:07 executing program 5: getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffff9c, 0x84, 0x13, 0x0, 0x0) r0 = syz_open_dev$swradio(&(0x7f0000000000)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$radio(0x0, 0xffffffffffffffff, 0x2) r1 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) getdents64(r1, 0x0, 0x0) r2 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r2, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r2, 0x8) r3 = socket$inet6_sctp(0xa, 0x805, 0x84) r4 = accept4(r2, 0x0, 0x0, 0x0) prctl$PR_SET_ENDIAN(0x14, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r3, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) epoll_pwait(0xffffffffffffffff, &(0x7f0000000040)=[{}, {}], 0x2, 0x0, &(0x7f0000000080), 0x8) getpgid(0x0) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r4, 0x84, 0x9, &(0x7f0000000280)={0x0, @in={{0x2, 0x0, @empty}}, 0x0, 0xac14142400000000, 0x0, 0x0, 0x54}, 0x98) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000780)={{{@in=@dev, @in6=@local}}, {{@in6=@mcast2}, 0x0, @in6=@dev}}, 0x0) ioctl$SIOCAX25ADDFWD(r0, 0x89ea, 0x0) syz_mount_image$gfs2(&(0x7f00000003c0)='gfs2\x00', 0x0, 0x87, 0x0, &(0x7f00000005c0), 0x1040040, 0x0) readv(r1, &(0x7f0000000500)=[{&(0x7f0000000400)=""/217, 0xd9}], 0x1) 03:53:07 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x1c, &(0x7f0000000b80)=ANY=[@ANYBLOB="cab5674ca80400f902c8d3fc17d4a51472ff5e04a7ed68e9074e865fffffffffff6582e2a0c58f438f1a9b1af27305fb6c1d497851a00d51dddde821f356222d82de15a5bb3ca4d544c3683ff903b30637ee634a8a4fa0e19e57c7d35e4db3a02231b71023a910ac2424326e31258bde7ca760ff3ca3261a92112b3c8db9e0d79dc5ad29e05434154bba1e60d243d8fa466b27518c09e11b78ec43ab7af1d33fbd4885ee5e95b0849345d0edef0a2e68320a47938597cf0fba5ae2e93301ffc38baaf2673b7fd4628a0fe3665006d238567bdb430991e02866ad858345dc86331d91a53051"], 0x0, 0x1625, 0x0, 0x0, 0x41100, 0x1, [], 0x0, 0x4}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r0, 0xdb, &(0x7f0000000200)={0x0, 0x0}}, 0x393) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='cgroup.events\x00', 0x0, 0x0) write$cgroup_int(r2, &(0x7f00000007c0)=0x6, 0x12) r3 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000002c0), 0x4) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz1\x00', 0x1ff) r4 = perf_event_open$cgroup(&(0x7f0000000600)={0x0, 0x70, 0x9, 0x6, 0x8, 0x6, 0x0, 0xfffffffffffff49f, 0x2, 0x6, 0x3ff, 0x0, 0x20, 0x0, 0x1, 0x81, 0x1, 0x400, 0x4, 0xfac, 0x4, 0x1, 0x10000, 0xf1, 0xd3, 0x92b, 0x200, 0x1, 0x100000000, 0x2, 0x100000000, 0xfff, 0xfff, 0xffff, 0x3, 0xfffffffffffffffd, 0x0, 0x6, 0x0, 0x50, 0x0, @perf_config_ext={0x3f, 0x9}, 0x20000, 0x8, 0xef3, 0x7, 0x100000000, 0x8, 0xfff}, 0xffffffffffffffff, 0x2, r0, 0x8) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000b40)='cgroup.subtree_control\x00') ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x2400, 0x1) r5 = getpid() socketpair$unix(0x1, 0x7, 0x0, &(0x7f0000000540)={0xffffffffffffffff}) setsockopt$sock_attach_bpf(r6, 0x1, 0x32, &(0x7f00000005c0)=r3, 0x4) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={0x0, 0xffffffffffffffff, 0x0, 0x12, &(0x7f0000000480)='./cgroup.cpu/syz1\x00', r1}, 0x30) perf_event_open(&(0x7f0000000300)={0x5, 0x70, 0xff, 0x4, 0x1000, 0xe5af, 0x0, 0x8000, 0xd0440, 0x2, 0xffff, 0x1, 0x4, 0x1f, 0x3, 0xfffffffffffffffa, 0x5, 0x9, 0x8, 0x1, 0x3, 0x400, 0x6, 0x5, 0x401, 0x10000, 0xff, 0xb24, 0xffffffffffff8000, 0xc8a, 0x3f, 0xfffffffffffffffa, 0xffffffffffff8001, 0x200, 0x5, 0x3, 0x2, 0x93a, 0x0, 0x7fff, 0x2, @perf_bp={&(0x7f0000000100), 0x1}, 0x0, 0x0, 0xffffffffffffff4e, 0x6, 0x0, 0x4, 0xfffffffffffffffd}, r5, 0x0, r7, 0x8) r8 = openat$tun(0xffffffffffffff9c, &(0x7f0000000580)='/dev/net/tun\x00', 0x40000, 0x0) ioctl$TUNSETPERSIST(r8, 0x400454cb, 0x1) r9 = socket$kcm(0x29, 0x5, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000800)={0x0, r0, 0x1, 0x2}, 0x14) ioctl$sock_kcm_SIOCKCMUNATTACH(r9, 0x89e1, &(0x7f0000000900)={r2}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r3, 0x0, 0x8b, 0x0, &(0x7f0000000680)="3ce41f426b7dd449ae14b08e1868c456d4fe9c7993884cf18f4dd5a0bc57250243da4203e0640859184bc4c4690afefd7736e8842cd88030448e918bdb5bd9bbbd680a51261557c0477c18049c832005ebb5b185c6f233df73a21d3b3ddad8426fba2d5f8aac5df904d5e5f2e7dc4a517079e08d5b2175a276f2a5c49cc2957cb367f269898570852dd63a", 0x0, 0x5}, 0x28) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000500)='./cgroup/syz0\x00', 0x200002, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000740)={r3, 0x50, &(0x7f00000003c0)}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r2, 0x50, &(0x7f0000000840)}, 0x10) openat$cgroup_subtree(r2, &(0x7f0000000940)='cgroup.subtree_control\x00', 0x2, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x1ff, 0x0, 0x0, 0x0, 0x200000, 0xffffffffffffffff, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280), 0x2}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r10 = socket$kcm(0xa, 0x400000000002, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffc59) ioctl$sock_kcm_SIOCKCMCLONE(r10, 0x890b, &(0x7f0000000000)) ioctl$sock_kcm_SIOCKCMCLONE(r10, 0x890c, &(0x7f0000000000)) [ 1815.308001] audit: type=1326 audit(2000001187.620:644): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=27520 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45ad2a code=0xffff0000 03:53:07 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x1e, &(0x7f0000000b80)=ANY=[@ANYBLOB="cab5674ca80400f902c8d3fc17d4a51472ff5e04a7ed68e9074e865fffffffffff6582e2a0c58f438f1a9b1af27305fb6c1d497851a00d51dddde821f356222d82de15a5bb3ca4d544c3683ff903b30637ee634a8a4fa0e19e57c7d35e4db3a02231b71023a910ac2424326e31258bde7ca760ff3ca3261a92112b3c8db9e0d79dc5ad29e05434154bba1e60d243d8fa466b27518c09e11b78ec43ab7af1d33fbd4885ee5e95b0849345d0edef0a2e68320a47938597cf0fba5ae2e93301ffc38baaf2673b7fd4628a0fe3665006d238567bdb430991e02866ad858345dc86331d91a53051b3284827fc0a870d857ecc180901feb2"], 0x0, 0x1625, 0x0, 0x0, 0x41100, 0x1, [], 0x0, 0x4}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r0, 0xdb, &(0x7f0000000200)={0x0, 0x0}}, 0x393) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='cgroup.events\x00', 0x0, 0x0) write$cgroup_int(r2, &(0x7f00000007c0)=0x6, 0x12) r3 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000002c0), 0x4) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz1\x00', 0x1ff) r4 = perf_event_open$cgroup(&(0x7f0000000600)={0x0, 0x70, 0x9, 0x6, 0x8, 0x6, 0x0, 0xfffffffffffff49f, 0x2, 0x6, 0x3ff, 0x0, 0x20, 0x0, 0x1, 0x81, 0x1, 0x400, 0x4, 0xfac, 0x4, 0x1, 0x10000, 0xf1, 0xd3, 0x92b, 0x200, 0x1, 0x100000000, 0x2, 0x100000000, 0xfff, 0xfff, 0xffff, 0x3, 0xfffffffffffffffd, 0x0, 0x6, 0x0, 0x50, 0x0, @perf_config_ext={0x3f, 0x9}, 0x20000, 0x8, 0xef3, 0x7, 0x100000000, 0x8, 0xfff}, 0xffffffffffffffff, 0x2, r0, 0x8) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000b40)='cgroup.subtree_control\x00') ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x2400, 0x1) r5 = getpid() socketpair$unix(0x1, 0x7, 0x0, &(0x7f0000000540)={0xffffffffffffffff}) setsockopt$sock_attach_bpf(r6, 0x1, 0x32, &(0x7f00000005c0)=r3, 0x4) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={0x0, 0xffffffffffffffff, 0x0, 0x12, &(0x7f0000000480)='./cgroup.cpu/syz1\x00', r1}, 0x30) perf_event_open(&(0x7f0000000300)={0x5, 0x70, 0xff, 0x4, 0x1000, 0xe5af, 0x0, 0x8000, 0xd0440, 0x2, 0xffff, 0x1, 0x4, 0x1f, 0x3, 0xfffffffffffffffa, 0x5, 0x9, 0x8, 0x1, 0x3, 0x400, 0x6, 0x5, 0x401, 0x10000, 0xff, 0xb24, 0xffffffffffff8000, 0xc8a, 0x3f, 0xfffffffffffffffa, 0xffffffffffff8001, 0x200, 0x5, 0x3, 0x2, 0x93a, 0x0, 0x7fff, 0x2, @perf_bp={&(0x7f0000000100), 0x1}, 0x0, 0x0, 0xffffffffffffff4e, 0x6, 0x0, 0x4, 0xfffffffffffffffd}, r5, 0x0, r7, 0x8) r8 = openat$tun(0xffffffffffffff9c, &(0x7f0000000580)='/dev/net/tun\x00', 0x40000, 0x0) ioctl$TUNSETPERSIST(r8, 0x400454cb, 0x1) r9 = socket$kcm(0x29, 0x5, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000800)={0x0, r0, 0x1, 0x2}, 0x14) ioctl$sock_kcm_SIOCKCMUNATTACH(r9, 0x89e1, &(0x7f0000000900)={r2}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r3, 0x0, 0x8b, 0x0, &(0x7f0000000680)="3ce41f426b7dd449ae14b08e1868c456d4fe9c7993884cf18f4dd5a0bc57250243da4203e0640859184bc4c4690afefd7736e8842cd88030448e918bdb5bd9bbbd680a51261557c0477c18049c832005ebb5b185c6f233df73a21d3b3ddad8426fba2d5f8aac5df904d5e5f2e7dc4a517079e08d5b2175a276f2a5c49cc2957cb367f269898570852dd63a", 0x0, 0x5}, 0x28) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000500)='./cgroup/syz0\x00', 0x200002, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000740)={r3, 0x50, &(0x7f00000003c0)}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r2, 0x50, &(0x7f0000000840)}, 0x10) openat$cgroup_subtree(r2, &(0x7f0000000940)='cgroup.subtree_control\x00', 0x2, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x1ff, 0x0, 0x0, 0x0, 0x200000, 0xffffffffffffffff, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280), 0x2}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r10 = socket$kcm(0xa, 0x400000000002, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffc59) ioctl$sock_kcm_SIOCKCMCLONE(r10, 0x890b, &(0x7f0000000000)) ioctl$sock_kcm_SIOCKCMCLONE(r10, 0x890c, &(0x7f0000000000)) 03:53:08 executing program 0: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r0 = inotify_init() read(r0, 0x0, 0x0) inotify_add_watch(r0, &(0x7f0000000040)='./file0\x00', 0x20000000) 03:53:08 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x1e, &(0x7f0000000b80)=ANY=[@ANYBLOB="cab5674ca80400f902c8d3fc17d4a51472ff5e04a7ed68e9074e865fffffffffff6582e2a0c58f438f1a9b1af27305fb6c1d497851a00d51dddde821f356222d82de15a5bb3ca4d544c3683ff903b30637ee634a8a4fa0e19e57c7d35e4db3a02231b71023a910ac2424326e31258bde7ca760ff3ca3261a92112b3c8db9e0d79dc5ad29e05434154bba1e60d243d8fa466b27518c09e11b78ec43ab7af1d33fbd4885ee5e95b0849345d0edef0a2e68320a47938597cf0fba5ae2e93301ffc38baaf2673b7fd4628a0fe3665006d238567bdb430991e02866ad858345dc86331d91a53051b3284827fc0a870d857ecc180901feb2"], 0x0, 0x1625, 0x0, 0x0, 0x41100, 0x1, [], 0x0, 0x4}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r0, 0xdb, &(0x7f0000000200)={0x0, 0x0}}, 0x393) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='cgroup.events\x00', 0x0, 0x0) write$cgroup_int(r2, &(0x7f00000007c0)=0x6, 0x12) r3 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000002c0), 0x4) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz1\x00', 0x1ff) r4 = perf_event_open$cgroup(&(0x7f0000000600)={0x0, 0x70, 0x9, 0x6, 0x8, 0x6, 0x0, 0xfffffffffffff49f, 0x2, 0x6, 0x3ff, 0x0, 0x20, 0x0, 0x1, 0x81, 0x1, 0x400, 0x4, 0xfac, 0x4, 0x1, 0x10000, 0xf1, 0xd3, 0x92b, 0x200, 0x1, 0x100000000, 0x2, 0x100000000, 0xfff, 0xfff, 0xffff, 0x3, 0xfffffffffffffffd, 0x0, 0x6, 0x0, 0x50, 0x0, @perf_config_ext={0x3f, 0x9}, 0x20000, 0x8, 0xef3, 0x7, 0x100000000, 0x8, 0xfff}, 0xffffffffffffffff, 0x2, r0, 0x8) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000b40)='cgroup.subtree_control\x00') ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x2400, 0x1) r5 = getpid() socketpair$unix(0x1, 0x7, 0x0, &(0x7f0000000540)={0xffffffffffffffff}) setsockopt$sock_attach_bpf(r6, 0x1, 0x32, &(0x7f00000005c0)=r3, 0x4) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={0x0, 0xffffffffffffffff, 0x0, 0x12, &(0x7f0000000480)='./cgroup.cpu/syz1\x00', r1}, 0x30) perf_event_open(&(0x7f0000000300)={0x5, 0x70, 0xff, 0x4, 0x1000, 0xe5af, 0x0, 0x8000, 0xd0440, 0x2, 0xffff, 0x1, 0x4, 0x1f, 0x3, 0xfffffffffffffffa, 0x5, 0x9, 0x8, 0x1, 0x3, 0x400, 0x6, 0x5, 0x401, 0x10000, 0xff, 0xb24, 0xffffffffffff8000, 0xc8a, 0x3f, 0xfffffffffffffffa, 0xffffffffffff8001, 0x200, 0x5, 0x3, 0x2, 0x93a, 0x0, 0x7fff, 0x2, @perf_bp={&(0x7f0000000100), 0x1}, 0x0, 0x0, 0xffffffffffffff4e, 0x6, 0x0, 0x4, 0xfffffffffffffffd}, r5, 0x0, r7, 0x8) r8 = openat$tun(0xffffffffffffff9c, &(0x7f0000000580)='/dev/net/tun\x00', 0x40000, 0x0) ioctl$TUNSETPERSIST(r8, 0x400454cb, 0x1) r9 = socket$kcm(0x29, 0x5, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000800)={0x0, r0, 0x1, 0x2}, 0x14) ioctl$sock_kcm_SIOCKCMUNATTACH(r9, 0x89e1, &(0x7f0000000900)={r2}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r3, 0x0, 0x8b, 0x0, &(0x7f0000000680)="3ce41f426b7dd449ae14b08e1868c456d4fe9c7993884cf18f4dd5a0bc57250243da4203e0640859184bc4c4690afefd7736e8842cd88030448e918bdb5bd9bbbd680a51261557c0477c18049c832005ebb5b185c6f233df73a21d3b3ddad8426fba2d5f8aac5df904d5e5f2e7dc4a517079e08d5b2175a276f2a5c49cc2957cb367f269898570852dd63a", 0x0, 0x5}, 0x28) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000500)='./cgroup/syz0\x00', 0x200002, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000740)={r3, 0x50, &(0x7f00000003c0)}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r2, 0x50, &(0x7f0000000840)}, 0x10) openat$cgroup_subtree(r2, &(0x7f0000000940)='cgroup.subtree_control\x00', 0x2, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x1ff, 0x0, 0x0, 0x0, 0x200000, 0xffffffffffffffff, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280), 0x2}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r10 = socket$kcm(0xa, 0x400000000002, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffc59) ioctl$sock_kcm_SIOCKCMCLONE(r10, 0x890b, &(0x7f0000000000)) ioctl$sock_kcm_SIOCKCMCLONE(r10, 0x890c, &(0x7f0000000000)) 03:53:08 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x1e, &(0x7f0000000b80)=ANY=[@ANYBLOB="cab5674ca80400f902c8d3fc17d4a51472ff5e04a7ed68e9074e865fffffffffff6582e2a0c58f438f1a9b1af27305fb6c1d497851a00d51dddde821f356222d82de15a5bb3ca4d544c3683ff903b30637ee634a8a4fa0e19e57c7d35e4db3a02231b71023a910ac2424326e31258bde7ca760ff3ca3261a92112b3c8db9e0d79dc5ad29e05434154bba1e60d243d8fa466b27518c09e11b78ec43ab7af1d33fbd4885ee5e95b0849345d0edef0a2e68320a47938597cf0fba5ae2e93301ffc38baaf2673b7fd4628a0fe3665006d238567bdb430991e02866ad858345dc86331d91a53051b3284827fc0a870d857ecc180901feb2"], 0x0, 0x1625, 0x0, 0x0, 0x41100, 0x1, [], 0x0, 0x4}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r0, 0xdb, &(0x7f0000000200)={0x0, 0x0}}, 0x393) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='cgroup.events\x00', 0x0, 0x0) write$cgroup_int(r2, &(0x7f00000007c0)=0x6, 0x12) r3 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000002c0), 0x4) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz1\x00', 0x1ff) r4 = perf_event_open$cgroup(&(0x7f0000000600)={0x0, 0x70, 0x9, 0x6, 0x8, 0x6, 0x0, 0xfffffffffffff49f, 0x2, 0x6, 0x3ff, 0x0, 0x20, 0x0, 0x1, 0x81, 0x1, 0x400, 0x4, 0xfac, 0x4, 0x1, 0x10000, 0xf1, 0xd3, 0x92b, 0x200, 0x1, 0x100000000, 0x2, 0x100000000, 0xfff, 0xfff, 0xffff, 0x3, 0xfffffffffffffffd, 0x0, 0x6, 0x0, 0x50, 0x0, @perf_config_ext={0x3f, 0x9}, 0x20000, 0x8, 0xef3, 0x7, 0x100000000, 0x8, 0xfff}, 0xffffffffffffffff, 0x2, r0, 0x8) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000b40)='cgroup.subtree_control\x00') ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x2400, 0x1) r5 = getpid() socketpair$unix(0x1, 0x7, 0x0, &(0x7f0000000540)={0xffffffffffffffff}) setsockopt$sock_attach_bpf(r6, 0x1, 0x32, &(0x7f00000005c0)=r3, 0x4) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={0x0, 0xffffffffffffffff, 0x0, 0x12, &(0x7f0000000480)='./cgroup.cpu/syz1\x00', r1}, 0x30) perf_event_open(&(0x7f0000000300)={0x5, 0x70, 0xff, 0x4, 0x1000, 0xe5af, 0x0, 0x8000, 0xd0440, 0x2, 0xffff, 0x1, 0x4, 0x1f, 0x3, 0xfffffffffffffffa, 0x5, 0x9, 0x8, 0x1, 0x3, 0x400, 0x6, 0x5, 0x401, 0x10000, 0xff, 0xb24, 0xffffffffffff8000, 0xc8a, 0x3f, 0xfffffffffffffffa, 0xffffffffffff8001, 0x200, 0x5, 0x3, 0x2, 0x93a, 0x0, 0x7fff, 0x2, @perf_bp={&(0x7f0000000100), 0x1}, 0x0, 0x0, 0xffffffffffffff4e, 0x6, 0x0, 0x4, 0xfffffffffffffffd}, r5, 0x0, r7, 0x8) r8 = openat$tun(0xffffffffffffff9c, &(0x7f0000000580)='/dev/net/tun\x00', 0x40000, 0x0) ioctl$TUNSETPERSIST(r8, 0x400454cb, 0x1) r9 = socket$kcm(0x29, 0x5, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000800)={0x0, r0, 0x1, 0x2}, 0x14) ioctl$sock_kcm_SIOCKCMUNATTACH(r9, 0x89e1, &(0x7f0000000900)={r2}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r3, 0x0, 0x8b, 0x0, &(0x7f0000000680)="3ce41f426b7dd449ae14b08e1868c456d4fe9c7993884cf18f4dd5a0bc57250243da4203e0640859184bc4c4690afefd7736e8842cd88030448e918bdb5bd9bbbd680a51261557c0477c18049c832005ebb5b185c6f233df73a21d3b3ddad8426fba2d5f8aac5df904d5e5f2e7dc4a517079e08d5b2175a276f2a5c49cc2957cb367f269898570852dd63a", 0x0, 0x5}, 0x28) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000500)='./cgroup/syz0\x00', 0x200002, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000740)={r3, 0x50, &(0x7f00000003c0)}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r2, 0x50, &(0x7f0000000840)}, 0x10) openat$cgroup_subtree(r2, &(0x7f0000000940)='cgroup.subtree_control\x00', 0x2, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x1ff, 0x0, 0x0, 0x0, 0x200000, 0xffffffffffffffff, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280), 0x2}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r10 = socket$kcm(0xa, 0x400000000002, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffc59) ioctl$sock_kcm_SIOCKCMCLONE(r10, 0x890b, &(0x7f0000000000)) ioctl$sock_kcm_SIOCKCMCLONE(r10, 0x890c, &(0x7f0000000000)) [ 1815.973150] audit: type=1326 audit(2000001188.280:645): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=27513 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45ad2a code=0xffff0000 03:53:08 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xff7000)=nil, 0xff7000, 0xfffffffffc, 0x31, 0xffffffffffffffff, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) prctl$PR_GET_TSC(0x19, &(0x7f0000000000)) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) ioctl$KVM_IRQ_LINE(r1, 0x4008ae61, &(0x7f0000000140)) 03:53:08 executing program 3: [ 1816.115002] audit: type=1326 audit(2000001188.420:646): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=27520 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45ad2a code=0xffff0000 03:53:08 executing program 5: getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffff9c, 0x84, 0x13, 0x0, 0x0) r0 = syz_open_dev$swradio(&(0x7f0000000000)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$radio(0x0, 0xffffffffffffffff, 0x2) r1 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) getdents64(r1, 0x0, 0x0) r2 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r2, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r2, 0x8) r3 = socket$inet6_sctp(0xa, 0x805, 0x84) r4 = accept4(r2, 0x0, 0x0, 0x0) prctl$PR_SET_ENDIAN(0x14, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r3, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) epoll_pwait(0xffffffffffffffff, &(0x7f0000000040)=[{}, {}], 0x2, 0x0, &(0x7f0000000080), 0x8) getpgid(0x0) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r4, 0x84, 0x9, &(0x7f0000000280)={0x0, @in={{0x2, 0x0, @empty}}, 0x0, 0xac14142400000000, 0x0, 0x0, 0x54}, 0x98) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000780)={{{@in=@dev, @in6=@local}}, {{@in6=@mcast2}, 0x0, @in6=@dev}}, 0x0) ioctl$SIOCAX25ADDFWD(r0, 0x89ea, 0x0) syz_mount_image$gfs2(&(0x7f00000003c0)='gfs2\x00', 0x0, 0x87, 0x0, &(0x7f00000005c0), 0x1040040, 0x0) readv(r1, &(0x7f0000000500)=[{&(0x7f0000000400)=""/217, 0xd9}], 0x1) 03:53:08 executing program 4: 03:53:08 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x1f, &(0x7f0000000b80)=ANY=[@ANYBLOB="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"], 0x0, 0x1625, 0x0, 0x0, 0x41100, 0x1, [], 0x0, 0x4}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r0, 0xdb, &(0x7f0000000200)={0x0, 0x0}}, 0x393) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='cgroup.events\x00', 0x0, 0x0) write$cgroup_int(r2, &(0x7f00000007c0)=0x6, 0x12) r3 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000002c0), 0x4) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz1\x00', 0x1ff) r4 = perf_event_open$cgroup(&(0x7f0000000600)={0x0, 0x70, 0x9, 0x6, 0x8, 0x6, 0x0, 0xfffffffffffff49f, 0x2, 0x6, 0x3ff, 0x0, 0x20, 0x0, 0x1, 0x81, 0x1, 0x400, 0x4, 0xfac, 0x4, 0x1, 0x10000, 0xf1, 0xd3, 0x92b, 0x200, 0x1, 0x100000000, 0x2, 0x100000000, 0xfff, 0xfff, 0xffff, 0x3, 0xfffffffffffffffd, 0x0, 0x6, 0x0, 0x50, 0x0, @perf_config_ext={0x3f, 0x9}, 0x20000, 0x8, 0xef3, 0x7, 0x100000000, 0x8, 0xfff}, 0xffffffffffffffff, 0x2, r0, 0x8) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000b40)='cgroup.subtree_control\x00') ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x2400, 0x1) r5 = getpid() socketpair$unix(0x1, 0x7, 0x0, &(0x7f0000000540)={0xffffffffffffffff}) setsockopt$sock_attach_bpf(r6, 0x1, 0x32, &(0x7f00000005c0)=r3, 0x4) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={0x0, 0xffffffffffffffff, 0x0, 0x12, &(0x7f0000000480)='./cgroup.cpu/syz1\x00', r1}, 0x30) perf_event_open(&(0x7f0000000300)={0x5, 0x70, 0xff, 0x4, 0x1000, 0xe5af, 0x0, 0x8000, 0xd0440, 0x2, 0xffff, 0x1, 0x4, 0x1f, 0x3, 0xfffffffffffffffa, 0x5, 0x9, 0x8, 0x1, 0x3, 0x400, 0x6, 0x5, 0x401, 0x10000, 0xff, 0xb24, 0xffffffffffff8000, 0xc8a, 0x3f, 0xfffffffffffffffa, 0xffffffffffff8001, 0x200, 0x5, 0x3, 0x2, 0x93a, 0x0, 0x7fff, 0x2, @perf_bp={&(0x7f0000000100), 0x1}, 0x0, 0x0, 0xffffffffffffff4e, 0x6, 0x0, 0x4, 0xfffffffffffffffd}, r5, 0x0, r7, 0x8) r8 = openat$tun(0xffffffffffffff9c, &(0x7f0000000580)='/dev/net/tun\x00', 0x40000, 0x0) ioctl$TUNSETPERSIST(r8, 0x400454cb, 0x1) r9 = socket$kcm(0x29, 0x5, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000800)={0x0, r0, 0x1, 0x2}, 0x14) ioctl$sock_kcm_SIOCKCMUNATTACH(r9, 0x89e1, &(0x7f0000000900)={r2}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r3, 0x0, 0x8b, 0x0, &(0x7f0000000680)="3ce41f426b7dd449ae14b08e1868c456d4fe9c7993884cf18f4dd5a0bc57250243da4203e0640859184bc4c4690afefd7736e8842cd88030448e918bdb5bd9bbbd680a51261557c0477c18049c832005ebb5b185c6f233df73a21d3b3ddad8426fba2d5f8aac5df904d5e5f2e7dc4a517079e08d5b2175a276f2a5c49cc2957cb367f269898570852dd63a", 0x0, 0x5}, 0x28) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000500)='./cgroup/syz0\x00', 0x200002, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000740)={r3, 0x50, &(0x7f00000003c0)}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r2, 0x50, &(0x7f0000000840)}, 0x10) openat$cgroup_subtree(r2, &(0x7f0000000940)='cgroup.subtree_control\x00', 0x2, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x1ff, 0x0, 0x0, 0x0, 0x200000, 0xffffffffffffffff, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280), 0x2}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r10 = socket$kcm(0xa, 0x400000000002, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffc59) ioctl$sock_kcm_SIOCKCMCLONE(r10, 0x890b, &(0x7f0000000000)) ioctl$sock_kcm_SIOCKCMCLONE(r10, 0x890c, &(0x7f0000000000)) 03:53:08 executing program 3: 03:53:08 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x1f, &(0x7f0000000b80)=ANY=[@ANYBLOB="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"], 0x0, 0x1625, 0x0, 0x0, 0x41100, 0x1, [], 0x0, 0x4}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r0, 0xdb, &(0x7f0000000200)={0x0, 0x0}}, 0x393) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='cgroup.events\x00', 0x0, 0x0) write$cgroup_int(r2, &(0x7f00000007c0)=0x6, 0x12) r3 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000002c0), 0x4) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz1\x00', 0x1ff) r4 = perf_event_open$cgroup(&(0x7f0000000600)={0x0, 0x70, 0x9, 0x6, 0x8, 0x6, 0x0, 0xfffffffffffff49f, 0x2, 0x6, 0x3ff, 0x0, 0x20, 0x0, 0x1, 0x81, 0x1, 0x400, 0x4, 0xfac, 0x4, 0x1, 0x10000, 0xf1, 0xd3, 0x92b, 0x200, 0x1, 0x100000000, 0x2, 0x100000000, 0xfff, 0xfff, 0xffff, 0x3, 0xfffffffffffffffd, 0x0, 0x6, 0x0, 0x50, 0x0, @perf_config_ext={0x3f, 0x9}, 0x20000, 0x8, 0xef3, 0x7, 0x100000000, 0x8, 0xfff}, 0xffffffffffffffff, 0x2, r0, 0x8) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000b40)='cgroup.subtree_control\x00') ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x2400, 0x1) r5 = getpid() socketpair$unix(0x1, 0x7, 0x0, &(0x7f0000000540)={0xffffffffffffffff}) setsockopt$sock_attach_bpf(r6, 0x1, 0x32, &(0x7f00000005c0)=r3, 0x4) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={0x0, 0xffffffffffffffff, 0x0, 0x12, &(0x7f0000000480)='./cgroup.cpu/syz1\x00', r1}, 0x30) perf_event_open(&(0x7f0000000300)={0x5, 0x70, 0xff, 0x4, 0x1000, 0xe5af, 0x0, 0x8000, 0xd0440, 0x2, 0xffff, 0x1, 0x4, 0x1f, 0x3, 0xfffffffffffffffa, 0x5, 0x9, 0x8, 0x1, 0x3, 0x400, 0x6, 0x5, 0x401, 0x10000, 0xff, 0xb24, 0xffffffffffff8000, 0xc8a, 0x3f, 0xfffffffffffffffa, 0xffffffffffff8001, 0x200, 0x5, 0x3, 0x2, 0x93a, 0x0, 0x7fff, 0x2, @perf_bp={&(0x7f0000000100), 0x1}, 0x0, 0x0, 0xffffffffffffff4e, 0x6, 0x0, 0x4, 0xfffffffffffffffd}, r5, 0x0, r7, 0x8) r8 = openat$tun(0xffffffffffffff9c, &(0x7f0000000580)='/dev/net/tun\x00', 0x40000, 0x0) ioctl$TUNSETPERSIST(r8, 0x400454cb, 0x1) r9 = socket$kcm(0x29, 0x5, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000800)={0x0, r0, 0x1, 0x2}, 0x14) ioctl$sock_kcm_SIOCKCMUNATTACH(r9, 0x89e1, &(0x7f0000000900)={r2}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r3, 0x0, 0x8b, 0x0, &(0x7f0000000680)="3ce41f426b7dd449ae14b08e1868c456d4fe9c7993884cf18f4dd5a0bc57250243da4203e0640859184bc4c4690afefd7736e8842cd88030448e918bdb5bd9bbbd680a51261557c0477c18049c832005ebb5b185c6f233df73a21d3b3ddad8426fba2d5f8aac5df904d5e5f2e7dc4a517079e08d5b2175a276f2a5c49cc2957cb367f269898570852dd63a", 0x0, 0x5}, 0x28) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000500)='./cgroup/syz0\x00', 0x200002, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000740)={r3, 0x50, &(0x7f00000003c0)}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r2, 0x50, &(0x7f0000000840)}, 0x10) openat$cgroup_subtree(r2, &(0x7f0000000940)='cgroup.subtree_control\x00', 0x2, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x1ff, 0x0, 0x0, 0x0, 0x200000, 0xffffffffffffffff, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280), 0x2}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r10 = socket$kcm(0xa, 0x400000000002, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffc59) ioctl$sock_kcm_SIOCKCMCLONE(r10, 0x890b, &(0x7f0000000000)) ioctl$sock_kcm_SIOCKCMCLONE(r10, 0x890c, &(0x7f0000000000)) 03:53:08 executing program 2: 03:53:08 executing program 3: 03:53:09 executing program 0: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r0 = inotify_init() read(r0, 0x0, 0x0) inotify_add_watch(r0, &(0x7f0000000040)='./file0\x00', 0x20000000) 03:53:09 executing program 4: 03:53:09 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x1f, &(0x7f0000000b80)=ANY=[@ANYBLOB="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"], 0x0, 0x1625, 0x0, 0x0, 0x41100, 0x1, [], 0x0, 0x4}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r0, 0xdb, &(0x7f0000000200)={0x0, 0x0}}, 0x393) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='cgroup.events\x00', 0x0, 0x0) write$cgroup_int(r2, &(0x7f00000007c0)=0x6, 0x12) r3 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000002c0), 0x4) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz1\x00', 0x1ff) r4 = perf_event_open$cgroup(&(0x7f0000000600)={0x0, 0x70, 0x9, 0x6, 0x8, 0x6, 0x0, 0xfffffffffffff49f, 0x2, 0x6, 0x3ff, 0x0, 0x20, 0x0, 0x1, 0x81, 0x1, 0x400, 0x4, 0xfac, 0x4, 0x1, 0x10000, 0xf1, 0xd3, 0x92b, 0x200, 0x1, 0x100000000, 0x2, 0x100000000, 0xfff, 0xfff, 0xffff, 0x3, 0xfffffffffffffffd, 0x0, 0x6, 0x0, 0x50, 0x0, @perf_config_ext={0x3f, 0x9}, 0x20000, 0x8, 0xef3, 0x7, 0x100000000, 0x8, 0xfff}, 0xffffffffffffffff, 0x2, r0, 0x8) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000b40)='cgroup.subtree_control\x00') ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x2400, 0x1) r5 = getpid() socketpair$unix(0x1, 0x7, 0x0, &(0x7f0000000540)={0xffffffffffffffff}) setsockopt$sock_attach_bpf(r6, 0x1, 0x32, &(0x7f00000005c0)=r3, 0x4) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={0x0, 0xffffffffffffffff, 0x0, 0x12, &(0x7f0000000480)='./cgroup.cpu/syz1\x00', r1}, 0x30) perf_event_open(&(0x7f0000000300)={0x5, 0x70, 0xff, 0x4, 0x1000, 0xe5af, 0x0, 0x8000, 0xd0440, 0x2, 0xffff, 0x1, 0x4, 0x1f, 0x3, 0xfffffffffffffffa, 0x5, 0x9, 0x8, 0x1, 0x3, 0x400, 0x6, 0x5, 0x401, 0x10000, 0xff, 0xb24, 0xffffffffffff8000, 0xc8a, 0x3f, 0xfffffffffffffffa, 0xffffffffffff8001, 0x200, 0x5, 0x3, 0x2, 0x93a, 0x0, 0x7fff, 0x2, @perf_bp={&(0x7f0000000100), 0x1}, 0x0, 0x0, 0xffffffffffffff4e, 0x6, 0x0, 0x4, 0xfffffffffffffffd}, r5, 0x0, r7, 0x8) r8 = openat$tun(0xffffffffffffff9c, &(0x7f0000000580)='/dev/net/tun\x00', 0x40000, 0x0) ioctl$TUNSETPERSIST(r8, 0x400454cb, 0x1) r9 = socket$kcm(0x29, 0x5, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000800)={0x0, r0, 0x1, 0x2}, 0x14) ioctl$sock_kcm_SIOCKCMUNATTACH(r9, 0x89e1, &(0x7f0000000900)={r2}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r3, 0x0, 0x8b, 0x0, &(0x7f0000000680)="3ce41f426b7dd449ae14b08e1868c456d4fe9c7993884cf18f4dd5a0bc57250243da4203e0640859184bc4c4690afefd7736e8842cd88030448e918bdb5bd9bbbd680a51261557c0477c18049c832005ebb5b185c6f233df73a21d3b3ddad8426fba2d5f8aac5df904d5e5f2e7dc4a517079e08d5b2175a276f2a5c49cc2957cb367f269898570852dd63a", 0x0, 0x5}, 0x28) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000500)='./cgroup/syz0\x00', 0x200002, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000740)={r3, 0x50, &(0x7f00000003c0)}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r2, 0x50, &(0x7f0000000840)}, 0x10) openat$cgroup_subtree(r2, &(0x7f0000000940)='cgroup.subtree_control\x00', 0x2, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x1ff, 0x0, 0x0, 0x0, 0x200000, 0xffffffffffffffff, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280), 0x2}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r10 = socket$kcm(0xa, 0x400000000002, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffc59) ioctl$sock_kcm_SIOCKCMCLONE(r10, 0x890b, &(0x7f0000000000)) ioctl$sock_kcm_SIOCKCMCLONE(r10, 0x890c, &(0x7f0000000000)) 03:53:09 executing program 2: 03:53:09 executing program 3: 03:53:09 executing program 5: getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffff9c, 0x84, 0x13, 0x0, 0x0) r0 = syz_open_dev$swradio(&(0x7f0000000000)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$radio(0x0, 0xffffffffffffffff, 0x2) r1 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) getdents64(r1, 0x0, 0x0) r2 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r2, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r2, 0x8) r3 = socket$inet6_sctp(0xa, 0x805, 0x84) r4 = accept4(r2, 0x0, 0x0, 0x0) prctl$PR_SET_ENDIAN(0x14, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r3, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) epoll_pwait(0xffffffffffffffff, &(0x7f0000000040)=[{}, {}], 0x2, 0x0, &(0x7f0000000080), 0x8) getpgid(0x0) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r4, 0x84, 0x9, &(0x7f0000000280)={0x0, @in={{0x2, 0x0, @empty}}, 0x0, 0xac14142400000000, 0x0, 0x0, 0x54}, 0x98) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000780)={{{@in=@dev, @in6=@local}}, {{@in6=@mcast2}, 0x0, @in6=@dev}}, 0x0) ioctl$SIOCAX25ADDFWD(r0, 0x89ea, 0x0) syz_mount_image$gfs2(&(0x7f00000003c0)='gfs2\x00', 0x0, 0x87, 0x0, &(0x7f00000005c0), 0x1040040, 0x0) readv(r1, &(0x7f0000000500)=[{&(0x7f0000000400)=""/217, 0xd9}], 0x1) 03:53:09 executing program 4: 03:53:09 executing program 3: 03:53:09 executing program 2: 03:53:09 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x20, &(0x7f0000000b80)=ANY=[@ANYBLOB="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"], 0x0, 0x1625, 0x0, 0x0, 0x41100, 0x1, [], 0x0, 0x4}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r0, 0xdb, &(0x7f0000000200)={0x0, 0x0}}, 0x393) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='cgroup.events\x00', 0x0, 0x0) write$cgroup_int(r2, &(0x7f00000007c0)=0x6, 0x12) r3 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000002c0), 0x4) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz1\x00', 0x1ff) r4 = perf_event_open$cgroup(&(0x7f0000000600)={0x0, 0x70, 0x9, 0x6, 0x8, 0x6, 0x0, 0xfffffffffffff49f, 0x2, 0x6, 0x3ff, 0x0, 0x20, 0x0, 0x1, 0x81, 0x1, 0x400, 0x4, 0xfac, 0x4, 0x1, 0x10000, 0xf1, 0xd3, 0x92b, 0x200, 0x1, 0x100000000, 0x2, 0x100000000, 0xfff, 0xfff, 0xffff, 0x3, 0xfffffffffffffffd, 0x0, 0x6, 0x0, 0x50, 0x0, @perf_config_ext={0x3f, 0x9}, 0x20000, 0x8, 0xef3, 0x7, 0x100000000, 0x8, 0xfff}, 0xffffffffffffffff, 0x2, r0, 0x8) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000b40)='cgroup.subtree_control\x00') ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x2400, 0x1) r5 = getpid() socketpair$unix(0x1, 0x7, 0x0, &(0x7f0000000540)={0xffffffffffffffff}) setsockopt$sock_attach_bpf(r6, 0x1, 0x32, &(0x7f00000005c0)=r3, 0x4) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={0x0, 0xffffffffffffffff, 0x0, 0x12, &(0x7f0000000480)='./cgroup.cpu/syz1\x00', r1}, 0x30) perf_event_open(&(0x7f0000000300)={0x5, 0x70, 0xff, 0x4, 0x1000, 0xe5af, 0x0, 0x8000, 0xd0440, 0x2, 0xffff, 0x1, 0x4, 0x1f, 0x3, 0xfffffffffffffffa, 0x5, 0x9, 0x8, 0x1, 0x3, 0x400, 0x6, 0x5, 0x401, 0x10000, 0xff, 0xb24, 0xffffffffffff8000, 0xc8a, 0x3f, 0xfffffffffffffffa, 0xffffffffffff8001, 0x200, 0x5, 0x3, 0x2, 0x93a, 0x0, 0x7fff, 0x2, @perf_bp={&(0x7f0000000100), 0x1}, 0x0, 0x0, 0xffffffffffffff4e, 0x6, 0x0, 0x4, 0xfffffffffffffffd}, r5, 0x0, r7, 0x8) r8 = openat$tun(0xffffffffffffff9c, &(0x7f0000000580)='/dev/net/tun\x00', 0x40000, 0x0) ioctl$TUNSETPERSIST(r8, 0x400454cb, 0x1) r9 = socket$kcm(0x29, 0x5, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000800)={0x0, r0, 0x1, 0x2}, 0x14) ioctl$sock_kcm_SIOCKCMUNATTACH(r9, 0x89e1, &(0x7f0000000900)={r2}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r3, 0x0, 0x8b, 0x0, &(0x7f0000000680)="3ce41f426b7dd449ae14b08e1868c456d4fe9c7993884cf18f4dd5a0bc57250243da4203e0640859184bc4c4690afefd7736e8842cd88030448e918bdb5bd9bbbd680a51261557c0477c18049c832005ebb5b185c6f233df73a21d3b3ddad8426fba2d5f8aac5df904d5e5f2e7dc4a517079e08d5b2175a276f2a5c49cc2957cb367f269898570852dd63a", 0x0, 0x5}, 0x28) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000500)='./cgroup/syz0\x00', 0x200002, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000740)={r3, 0x50, &(0x7f00000003c0)}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r2, 0x50, &(0x7f0000000840)}, 0x10) openat$cgroup_subtree(r2, &(0x7f0000000940)='cgroup.subtree_control\x00', 0x2, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x1ff, 0x0, 0x0, 0x0, 0x200000, 0xffffffffffffffff, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280), 0x2}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r10 = socket$kcm(0xa, 0x400000000002, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffc59) ioctl$sock_kcm_SIOCKCMCLONE(r10, 0x890b, &(0x7f0000000000)) ioctl$sock_kcm_SIOCKCMCLONE(r10, 0x890c, &(0x7f0000000000)) 03:53:09 executing program 2: 03:53:09 executing program 4: 03:53:10 executing program 0: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r0 = inotify_init() read(r0, 0x0, 0x0) inotify_rm_watch(r0, 0x0) 03:53:10 executing program 3: 03:53:10 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x20, &(0x7f0000000b80)=ANY=[@ANYBLOB="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"], 0x0, 0x1625, 0x0, 0x0, 0x41100, 0x1, [], 0x0, 0x4}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r0, 0xdb, &(0x7f0000000200)={0x0, 0x0}}, 0x393) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='cgroup.events\x00', 0x0, 0x0) write$cgroup_int(r2, &(0x7f00000007c0)=0x6, 0x12) r3 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000002c0), 0x4) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz1\x00', 0x1ff) r4 = perf_event_open$cgroup(&(0x7f0000000600)={0x0, 0x70, 0x9, 0x6, 0x8, 0x6, 0x0, 0xfffffffffffff49f, 0x2, 0x6, 0x3ff, 0x0, 0x20, 0x0, 0x1, 0x81, 0x1, 0x400, 0x4, 0xfac, 0x4, 0x1, 0x10000, 0xf1, 0xd3, 0x92b, 0x200, 0x1, 0x100000000, 0x2, 0x100000000, 0xfff, 0xfff, 0xffff, 0x3, 0xfffffffffffffffd, 0x0, 0x6, 0x0, 0x50, 0x0, @perf_config_ext={0x3f, 0x9}, 0x20000, 0x8, 0xef3, 0x7, 0x100000000, 0x8, 0xfff}, 0xffffffffffffffff, 0x2, r0, 0x8) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000b40)='cgroup.subtree_control\x00') ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x2400, 0x1) r5 = getpid() socketpair$unix(0x1, 0x7, 0x0, &(0x7f0000000540)={0xffffffffffffffff}) setsockopt$sock_attach_bpf(r6, 0x1, 0x32, &(0x7f00000005c0)=r3, 0x4) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={0x0, 0xffffffffffffffff, 0x0, 0x12, &(0x7f0000000480)='./cgroup.cpu/syz1\x00', r1}, 0x30) perf_event_open(&(0x7f0000000300)={0x5, 0x70, 0xff, 0x4, 0x1000, 0xe5af, 0x0, 0x8000, 0xd0440, 0x2, 0xffff, 0x1, 0x4, 0x1f, 0x3, 0xfffffffffffffffa, 0x5, 0x9, 0x8, 0x1, 0x3, 0x400, 0x6, 0x5, 0x401, 0x10000, 0xff, 0xb24, 0xffffffffffff8000, 0xc8a, 0x3f, 0xfffffffffffffffa, 0xffffffffffff8001, 0x200, 0x5, 0x3, 0x2, 0x93a, 0x0, 0x7fff, 0x2, @perf_bp={&(0x7f0000000100), 0x1}, 0x0, 0x0, 0xffffffffffffff4e, 0x6, 0x0, 0x4, 0xfffffffffffffffd}, r5, 0x0, r7, 0x8) r8 = openat$tun(0xffffffffffffff9c, &(0x7f0000000580)='/dev/net/tun\x00', 0x40000, 0x0) ioctl$TUNSETPERSIST(r8, 0x400454cb, 0x1) r9 = socket$kcm(0x29, 0x5, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000800)={0x0, r0, 0x1, 0x2}, 0x14) ioctl$sock_kcm_SIOCKCMUNATTACH(r9, 0x89e1, &(0x7f0000000900)={r2}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r3, 0x0, 0x8b, 0x0, &(0x7f0000000680)="3ce41f426b7dd449ae14b08e1868c456d4fe9c7993884cf18f4dd5a0bc57250243da4203e0640859184bc4c4690afefd7736e8842cd88030448e918bdb5bd9bbbd680a51261557c0477c18049c832005ebb5b185c6f233df73a21d3b3ddad8426fba2d5f8aac5df904d5e5f2e7dc4a517079e08d5b2175a276f2a5c49cc2957cb367f269898570852dd63a", 0x0, 0x5}, 0x28) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000500)='./cgroup/syz0\x00', 0x200002, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000740)={r3, 0x50, &(0x7f00000003c0)}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r2, 0x50, &(0x7f0000000840)}, 0x10) openat$cgroup_subtree(r2, &(0x7f0000000940)='cgroup.subtree_control\x00', 0x2, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x1ff, 0x0, 0x0, 0x0, 0x200000, 0xffffffffffffffff, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280), 0x2}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r10 = socket$kcm(0xa, 0x400000000002, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffc59) ioctl$sock_kcm_SIOCKCMCLONE(r10, 0x890b, &(0x7f0000000000)) ioctl$sock_kcm_SIOCKCMCLONE(r10, 0x890c, &(0x7f0000000000)) 03:53:10 executing program 2: 03:53:10 executing program 4: 03:53:10 executing program 5: getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffff9c, 0x84, 0x13, 0x0, 0x0) r0 = syz_open_dev$swradio(&(0x7f0000000000)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$radio(0x0, 0xffffffffffffffff, 0x2) r1 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) getdents64(r1, 0x0, 0x0) r2 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r2, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r2, 0x8) socket$inet6_sctp(0xa, 0x805, 0x84) r3 = accept4(r2, 0x0, 0x0, 0x0) prctl$PR_SET_ENDIAN(0x14, 0x1) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(0xffffffffffffffff, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) epoll_pwait(0xffffffffffffffff, &(0x7f0000000040)=[{}, {}], 0x2, 0x0, &(0x7f0000000080), 0x8) getpgid(0x0) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r3, 0x84, 0x9, &(0x7f0000000280)={0x0, @in={{0x2, 0x0, @empty}}, 0x0, 0xac14142400000000, 0x0, 0x0, 0x54}, 0x98) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000780)={{{@in=@dev, @in6=@local}}, {{@in6=@mcast2}, 0x0, @in6=@dev}}, 0x0) ioctl$SIOCAX25ADDFWD(r0, 0x89ea, 0x0) syz_mount_image$gfs2(&(0x7f00000003c0)='gfs2\x00', 0x0, 0x87, 0x0, &(0x7f00000005c0), 0x1040040, 0x0) readv(r1, &(0x7f0000000500)=[{&(0x7f0000000400)=""/217, 0xd9}], 0x1) 03:53:10 executing program 4: 03:53:10 executing program 3: 03:53:10 executing program 2: 03:53:10 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x20, &(0x7f0000000b80)=ANY=[@ANYBLOB="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"], 0x0, 0x1625, 0x0, 0x0, 0x41100, 0x1, [], 0x0, 0x4}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r0, 0xdb, &(0x7f0000000200)={0x0, 0x0}}, 0x393) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='cgroup.events\x00', 0x0, 0x0) write$cgroup_int(r2, &(0x7f00000007c0)=0x6, 0x12) r3 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000002c0), 0x4) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz1\x00', 0x1ff) r4 = perf_event_open$cgroup(&(0x7f0000000600)={0x0, 0x70, 0x9, 0x6, 0x8, 0x6, 0x0, 0xfffffffffffff49f, 0x2, 0x6, 0x3ff, 0x0, 0x20, 0x0, 0x1, 0x81, 0x1, 0x400, 0x4, 0xfac, 0x4, 0x1, 0x10000, 0xf1, 0xd3, 0x92b, 0x200, 0x1, 0x100000000, 0x2, 0x100000000, 0xfff, 0xfff, 0xffff, 0x3, 0xfffffffffffffffd, 0x0, 0x6, 0x0, 0x50, 0x0, @perf_config_ext={0x3f, 0x9}, 0x20000, 0x8, 0xef3, 0x7, 0x100000000, 0x8, 0xfff}, 0xffffffffffffffff, 0x2, r0, 0x8) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000b40)='cgroup.subtree_control\x00') ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x2400, 0x1) r5 = getpid() socketpair$unix(0x1, 0x7, 0x0, &(0x7f0000000540)={0xffffffffffffffff}) setsockopt$sock_attach_bpf(r6, 0x1, 0x32, &(0x7f00000005c0)=r3, 0x4) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={0x0, 0xffffffffffffffff, 0x0, 0x12, &(0x7f0000000480)='./cgroup.cpu/syz1\x00', r1}, 0x30) perf_event_open(&(0x7f0000000300)={0x5, 0x70, 0xff, 0x4, 0x1000, 0xe5af, 0x0, 0x8000, 0xd0440, 0x2, 0xffff, 0x1, 0x4, 0x1f, 0x3, 0xfffffffffffffffa, 0x5, 0x9, 0x8, 0x1, 0x3, 0x400, 0x6, 0x5, 0x401, 0x10000, 0xff, 0xb24, 0xffffffffffff8000, 0xc8a, 0x3f, 0xfffffffffffffffa, 0xffffffffffff8001, 0x200, 0x5, 0x3, 0x2, 0x93a, 0x0, 0x7fff, 0x2, @perf_bp={&(0x7f0000000100), 0x1}, 0x0, 0x0, 0xffffffffffffff4e, 0x6, 0x0, 0x4, 0xfffffffffffffffd}, r5, 0x0, r7, 0x8) r8 = openat$tun(0xffffffffffffff9c, &(0x7f0000000580)='/dev/net/tun\x00', 0x40000, 0x0) ioctl$TUNSETPERSIST(r8, 0x400454cb, 0x1) r9 = socket$kcm(0x29, 0x5, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000800)={0x0, r0, 0x1, 0x2}, 0x14) ioctl$sock_kcm_SIOCKCMUNATTACH(r9, 0x89e1, &(0x7f0000000900)={r2}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r3, 0x0, 0x8b, 0x0, &(0x7f0000000680)="3ce41f426b7dd449ae14b08e1868c456d4fe9c7993884cf18f4dd5a0bc57250243da4203e0640859184bc4c4690afefd7736e8842cd88030448e918bdb5bd9bbbd680a51261557c0477c18049c832005ebb5b185c6f233df73a21d3b3ddad8426fba2d5f8aac5df904d5e5f2e7dc4a517079e08d5b2175a276f2a5c49cc2957cb367f269898570852dd63a", 0x0, 0x5}, 0x28) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000500)='./cgroup/syz0\x00', 0x200002, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000740)={r3, 0x50, &(0x7f00000003c0)}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r2, 0x50, &(0x7f0000000840)}, 0x10) openat$cgroup_subtree(r2, &(0x7f0000000940)='cgroup.subtree_control\x00', 0x2, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x1ff, 0x0, 0x0, 0x0, 0x200000, 0xffffffffffffffff, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280), 0x2}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r10 = socket$kcm(0xa, 0x400000000002, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffc59) ioctl$sock_kcm_SIOCKCMCLONE(r10, 0x890b, &(0x7f0000000000)) ioctl$sock_kcm_SIOCKCMCLONE(r10, 0x890c, &(0x7f0000000000)) 03:53:10 executing program 4: 03:53:10 executing program 4: 03:53:11 executing program 0: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r0 = inotify_init() read(r0, 0x0, 0x0) inotify_rm_watch(r0, 0x0) 03:53:11 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x20, &(0x7f0000000b80)=ANY=[@ANYBLOB="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"], 0x0, 0x1625, 0x0, 0x0, 0x41100, 0x1, [], 0x0, 0x4}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r0, 0xdb, &(0x7f0000000200)={0x0, 0x0}}, 0x393) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='cgroup.events\x00', 0x0, 0x0) write$cgroup_int(r2, &(0x7f00000007c0)=0x6, 0x12) r3 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000002c0), 0x4) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz1\x00', 0x1ff) r4 = perf_event_open$cgroup(&(0x7f0000000600)={0x0, 0x70, 0x9, 0x6, 0x8, 0x6, 0x0, 0xfffffffffffff49f, 0x2, 0x6, 0x3ff, 0x0, 0x20, 0x0, 0x1, 0x81, 0x1, 0x400, 0x4, 0xfac, 0x4, 0x1, 0x10000, 0xf1, 0xd3, 0x92b, 0x200, 0x1, 0x100000000, 0x2, 0x100000000, 0xfff, 0xfff, 0xffff, 0x3, 0xfffffffffffffffd, 0x0, 0x6, 0x0, 0x50, 0x0, @perf_config_ext={0x3f, 0x9}, 0x20000, 0x8, 0xef3, 0x7, 0x100000000, 0x8, 0xfff}, 0xffffffffffffffff, 0x2, r0, 0x8) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000b40)='cgroup.subtree_control\x00') ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x2400, 0x1) r5 = getpid() socketpair$unix(0x1, 0x7, 0x0, &(0x7f0000000540)={0xffffffffffffffff}) setsockopt$sock_attach_bpf(r6, 0x1, 0x32, &(0x7f00000005c0)=r3, 0x4) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={0x0, 0xffffffffffffffff, 0x0, 0x12, &(0x7f0000000480)='./cgroup.cpu/syz1\x00', r1}, 0x30) perf_event_open(&(0x7f0000000300)={0x5, 0x70, 0xff, 0x4, 0x1000, 0xe5af, 0x0, 0x8000, 0xd0440, 0x2, 0xffff, 0x1, 0x4, 0x1f, 0x3, 0xfffffffffffffffa, 0x5, 0x9, 0x8, 0x1, 0x3, 0x400, 0x6, 0x5, 0x401, 0x10000, 0xff, 0xb24, 0xffffffffffff8000, 0xc8a, 0x3f, 0xfffffffffffffffa, 0xffffffffffff8001, 0x200, 0x5, 0x3, 0x2, 0x93a, 0x0, 0x7fff, 0x2, @perf_bp={&(0x7f0000000100), 0x1}, 0x0, 0x0, 0xffffffffffffff4e, 0x6, 0x0, 0x4, 0xfffffffffffffffd}, r5, 0x0, r7, 0x8) r8 = openat$tun(0xffffffffffffff9c, &(0x7f0000000580)='/dev/net/tun\x00', 0x40000, 0x0) ioctl$TUNSETPERSIST(r8, 0x400454cb, 0x1) r9 = socket$kcm(0x29, 0x5, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000800)={0x0, r0, 0x1, 0x2}, 0x14) ioctl$sock_kcm_SIOCKCMUNATTACH(r9, 0x89e1, &(0x7f0000000900)={r2}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r3, 0x0, 0x8b, 0x0, &(0x7f0000000680)="3ce41f426b7dd449ae14b08e1868c456d4fe9c7993884cf18f4dd5a0bc57250243da4203e0640859184bc4c4690afefd7736e8842cd88030448e918bdb5bd9bbbd680a51261557c0477c18049c832005ebb5b185c6f233df73a21d3b3ddad8426fba2d5f8aac5df904d5e5f2e7dc4a517079e08d5b2175a276f2a5c49cc2957cb367f269898570852dd63a", 0x0, 0x5}, 0x28) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000500)='./cgroup/syz0\x00', 0x200002, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000740)={r3, 0x50, &(0x7f00000003c0)}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r2, 0x50, &(0x7f0000000840)}, 0x10) openat$cgroup_subtree(r2, &(0x7f0000000940)='cgroup.subtree_control\x00', 0x2, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x1ff, 0x0, 0x0, 0x0, 0x200000, 0xffffffffffffffff, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280), 0x2}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r10 = socket$kcm(0xa, 0x400000000002, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffc59) ioctl$sock_kcm_SIOCKCMCLONE(r10, 0x890b, &(0x7f0000000000)) ioctl$sock_kcm_SIOCKCMCLONE(r10, 0x890c, &(0x7f0000000000)) 03:53:11 executing program 2: 03:53:11 executing program 3: 03:53:11 executing program 4: 03:53:11 executing program 5: getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffff9c, 0x84, 0x13, 0x0, 0x0) r0 = syz_open_dev$swradio(&(0x7f0000000000)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$radio(0x0, 0xffffffffffffffff, 0x2) r1 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) getdents64(r1, 0x0, 0x0) r2 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r2, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r2, 0x8) socket$inet6_sctp(0xa, 0x805, 0x84) r3 = accept4(r2, 0x0, 0x0, 0x0) prctl$PR_SET_ENDIAN(0x14, 0x1) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(0xffffffffffffffff, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) epoll_pwait(0xffffffffffffffff, &(0x7f0000000040)=[{}, {}], 0x2, 0x0, &(0x7f0000000080), 0x8) getpgid(0x0) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r3, 0x84, 0x9, &(0x7f0000000280)={0x0, @in={{0x2, 0x0, @empty}}, 0x0, 0xac14142400000000, 0x0, 0x0, 0x54}, 0x98) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000780)={{{@in=@dev, @in6=@local}}, {{@in6=@mcast2}, 0x0, @in6=@dev}}, 0x0) ioctl$SIOCAX25ADDFWD(r0, 0x89ea, 0x0) syz_mount_image$gfs2(&(0x7f00000003c0)='gfs2\x00', 0x0, 0x87, 0x0, &(0x7f00000005c0), 0x1040040, 0x0) readv(r1, &(0x7f0000000500)=[{&(0x7f0000000400)=""/217, 0xd9}], 0x1) 03:53:11 executing program 3: 03:53:11 executing program 2: 03:53:11 executing program 4: 03:53:11 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x20, &(0x7f0000000b80)=ANY=[@ANYBLOB="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"], 0x0, 0x1625, 0x0, 0x0, 0x41100, 0x1, [], 0x0, 0x4}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r0, 0xdb, &(0x7f0000000200)={0x0, 0x0}}, 0x393) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='cgroup.events\x00', 0x0, 0x0) write$cgroup_int(r2, &(0x7f00000007c0)=0x6, 0x12) r3 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000002c0), 0x4) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz1\x00', 0x1ff) r4 = perf_event_open$cgroup(&(0x7f0000000600)={0x0, 0x70, 0x9, 0x6, 0x8, 0x6, 0x0, 0xfffffffffffff49f, 0x2, 0x6, 0x3ff, 0x0, 0x20, 0x0, 0x1, 0x81, 0x1, 0x400, 0x4, 0xfac, 0x4, 0x1, 0x10000, 0xf1, 0xd3, 0x92b, 0x200, 0x1, 0x100000000, 0x2, 0x100000000, 0xfff, 0xfff, 0xffff, 0x3, 0xfffffffffffffffd, 0x0, 0x6, 0x0, 0x50, 0x0, @perf_config_ext={0x3f, 0x9}, 0x20000, 0x8, 0xef3, 0x7, 0x100000000, 0x8, 0xfff}, 0xffffffffffffffff, 0x2, r0, 0x8) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000b40)='cgroup.subtree_control\x00') ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x2400, 0x1) r5 = getpid() socketpair$unix(0x1, 0x7, 0x0, &(0x7f0000000540)={0xffffffffffffffff}) setsockopt$sock_attach_bpf(r6, 0x1, 0x32, &(0x7f00000005c0)=r3, 0x4) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={0x0, 0xffffffffffffffff, 0x0, 0x12, &(0x7f0000000480)='./cgroup.cpu/syz1\x00', r1}, 0x30) perf_event_open(&(0x7f0000000300)={0x5, 0x70, 0xff, 0x4, 0x1000, 0xe5af, 0x0, 0x8000, 0xd0440, 0x2, 0xffff, 0x1, 0x4, 0x1f, 0x3, 0xfffffffffffffffa, 0x5, 0x9, 0x8, 0x1, 0x3, 0x400, 0x6, 0x5, 0x401, 0x10000, 0xff, 0xb24, 0xffffffffffff8000, 0xc8a, 0x3f, 0xfffffffffffffffa, 0xffffffffffff8001, 0x200, 0x5, 0x3, 0x2, 0x93a, 0x0, 0x7fff, 0x2, @perf_bp={&(0x7f0000000100), 0x1}, 0x0, 0x0, 0xffffffffffffff4e, 0x6, 0x0, 0x4, 0xfffffffffffffffd}, r5, 0x0, r7, 0x8) r8 = openat$tun(0xffffffffffffff9c, &(0x7f0000000580)='/dev/net/tun\x00', 0x40000, 0x0) ioctl$TUNSETPERSIST(r8, 0x400454cb, 0x1) r9 = socket$kcm(0x29, 0x5, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000800)={0x0, r0, 0x1, 0x2}, 0x14) ioctl$sock_kcm_SIOCKCMUNATTACH(r9, 0x89e1, &(0x7f0000000900)={r2}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r3, 0x0, 0x8b, 0x0, &(0x7f0000000680)="3ce41f426b7dd449ae14b08e1868c456d4fe9c7993884cf18f4dd5a0bc57250243da4203e0640859184bc4c4690afefd7736e8842cd88030448e918bdb5bd9bbbd680a51261557c0477c18049c832005ebb5b185c6f233df73a21d3b3ddad8426fba2d5f8aac5df904d5e5f2e7dc4a517079e08d5b2175a276f2a5c49cc2957cb367f269898570852dd63a", 0x0, 0x5}, 0x28) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000500)='./cgroup/syz0\x00', 0x200002, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000740)={r3, 0x50, &(0x7f00000003c0)}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r2, 0x50, &(0x7f0000000840)}, 0x10) openat$cgroup_subtree(r2, &(0x7f0000000940)='cgroup.subtree_control\x00', 0x2, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x1ff, 0x0, 0x0, 0x0, 0x200000, 0xffffffffffffffff, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280), 0x2}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r10 = socket$kcm(0xa, 0x400000000002, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffc59) ioctl$sock_kcm_SIOCKCMCLONE(r10, 0x890b, &(0x7f0000000000)) ioctl$sock_kcm_SIOCKCMCLONE(r10, 0x890c, &(0x7f0000000000)) 03:53:11 executing program 3: 03:53:11 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x20, &(0x7f0000000b80)=ANY=[@ANYBLOB="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"], 0x0, 0x1625, 0x0, 0x0, 0x41100, 0x1, [], 0x0, 0x4}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r0, 0xdb, &(0x7f0000000200)={0x0, 0x0}}, 0x393) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='cgroup.events\x00', 0x0, 0x0) write$cgroup_int(r2, &(0x7f00000007c0)=0x6, 0x12) r3 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000002c0), 0x4) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz1\x00', 0x1ff) r4 = perf_event_open$cgroup(&(0x7f0000000600)={0x0, 0x70, 0x9, 0x6, 0x8, 0x6, 0x0, 0xfffffffffffff49f, 0x2, 0x6, 0x3ff, 0x0, 0x20, 0x0, 0x1, 0x81, 0x1, 0x400, 0x4, 0xfac, 0x4, 0x1, 0x10000, 0xf1, 0xd3, 0x92b, 0x200, 0x1, 0x100000000, 0x2, 0x100000000, 0xfff, 0xfff, 0xffff, 0x3, 0xfffffffffffffffd, 0x0, 0x6, 0x0, 0x50, 0x0, @perf_config_ext={0x3f, 0x9}, 0x20000, 0x8, 0xef3, 0x7, 0x100000000, 0x8, 0xfff}, 0xffffffffffffffff, 0x2, r0, 0x8) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000b40)='cgroup.subtree_control\x00') ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x2400, 0x1) r5 = getpid() socketpair$unix(0x1, 0x7, 0x0, &(0x7f0000000540)={0xffffffffffffffff}) setsockopt$sock_attach_bpf(r6, 0x1, 0x32, &(0x7f00000005c0)=r3, 0x4) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={0x0, 0xffffffffffffffff, 0x0, 0x12, &(0x7f0000000480)='./cgroup.cpu/syz1\x00', r1}, 0x30) perf_event_open(&(0x7f0000000300)={0x5, 0x70, 0xff, 0x4, 0x1000, 0xe5af, 0x0, 0x8000, 0xd0440, 0x2, 0xffff, 0x1, 0x4, 0x1f, 0x3, 0xfffffffffffffffa, 0x5, 0x9, 0x8, 0x1, 0x3, 0x400, 0x6, 0x5, 0x401, 0x10000, 0xff, 0xb24, 0xffffffffffff8000, 0xc8a, 0x3f, 0xfffffffffffffffa, 0xffffffffffff8001, 0x200, 0x5, 0x3, 0x2, 0x93a, 0x0, 0x7fff, 0x2, @perf_bp={&(0x7f0000000100), 0x1}, 0x0, 0x0, 0xffffffffffffff4e, 0x6, 0x0, 0x4, 0xfffffffffffffffd}, r5, 0x0, r7, 0x8) r8 = openat$tun(0xffffffffffffff9c, &(0x7f0000000580)='/dev/net/tun\x00', 0x40000, 0x0) ioctl$TUNSETPERSIST(r8, 0x400454cb, 0x1) r9 = socket$kcm(0x29, 0x5, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000800)={0x0, r0, 0x1, 0x2}, 0x14) ioctl$sock_kcm_SIOCKCMUNATTACH(r9, 0x89e1, &(0x7f0000000900)={r2}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r3, 0x0, 0x8b, 0x0, &(0x7f0000000680)="3ce41f426b7dd449ae14b08e1868c456d4fe9c7993884cf18f4dd5a0bc57250243da4203e0640859184bc4c4690afefd7736e8842cd88030448e918bdb5bd9bbbd680a51261557c0477c18049c832005ebb5b185c6f233df73a21d3b3ddad8426fba2d5f8aac5df904d5e5f2e7dc4a517079e08d5b2175a276f2a5c49cc2957cb367f269898570852dd63a", 0x0, 0x5}, 0x28) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000500)='./cgroup/syz0\x00', 0x200002, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000740)={r3, 0x50, &(0x7f00000003c0)}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r2, 0x50, &(0x7f0000000840)}, 0x10) openat$cgroup_subtree(r2, &(0x7f0000000940)='cgroup.subtree_control\x00', 0x2, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x1ff, 0x0, 0x0, 0x0, 0x200000, 0xffffffffffffffff, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280), 0x2}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r10 = socket$kcm(0xa, 0x400000000002, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffc59) ioctl$sock_kcm_SIOCKCMCLONE(r10, 0x890b, &(0x7f0000000000)) ioctl$sock_kcm_SIOCKCMCLONE(r10, 0x890c, &(0x7f0000000000)) [ 1819.292822] net_ratelimit: 22 callbacks suppressed [ 1819.292831] protocol 88fb is buggy, dev hsr_slave_0 [ 1819.302979] protocol 88fb is buggy, dev hsr_slave_1 [ 1819.308106] protocol 88fb is buggy, dev hsr_slave_0 [ 1819.313234] protocol 88fb is buggy, dev hsr_slave_1 03:53:11 executing program 0: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r0 = inotify_init() read(r0, 0x0, 0x0) inotify_rm_watch(r0, 0x0) 03:53:11 executing program 4: 03:53:11 executing program 2: 03:53:11 executing program 3: 03:53:11 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x20, &(0x7f0000000b80)=ANY=[@ANYBLOB="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"], 0x0, 0x1625, 0x0, 0x0, 0x41100, 0x1, [], 0x0, 0x4}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r0, 0xdb, &(0x7f0000000200)={0x0, 0x0}}, 0x393) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='cgroup.events\x00', 0x0, 0x0) write$cgroup_int(r2, &(0x7f00000007c0)=0x6, 0x12) r3 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000002c0), 0x4) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz1\x00', 0x1ff) r4 = perf_event_open$cgroup(&(0x7f0000000600)={0x0, 0x70, 0x9, 0x6, 0x8, 0x6, 0x0, 0xfffffffffffff49f, 0x2, 0x6, 0x3ff, 0x0, 0x20, 0x0, 0x1, 0x81, 0x1, 0x400, 0x4, 0xfac, 0x4, 0x1, 0x10000, 0xf1, 0xd3, 0x92b, 0x200, 0x1, 0x100000000, 0x2, 0x100000000, 0xfff, 0xfff, 0xffff, 0x3, 0xfffffffffffffffd, 0x0, 0x6, 0x0, 0x50, 0x0, @perf_config_ext={0x3f, 0x9}, 0x20000, 0x8, 0xef3, 0x7, 0x100000000, 0x8, 0xfff}, 0xffffffffffffffff, 0x2, r0, 0x8) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000b40)='cgroup.subtree_control\x00') ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x2400, 0x1) r5 = getpid() socketpair$unix(0x1, 0x7, 0x0, &(0x7f0000000540)={0xffffffffffffffff}) setsockopt$sock_attach_bpf(r6, 0x1, 0x32, &(0x7f00000005c0)=r3, 0x4) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={0x0, 0xffffffffffffffff, 0x0, 0x12, &(0x7f0000000480)='./cgroup.cpu/syz1\x00', r1}, 0x30) perf_event_open(&(0x7f0000000300)={0x5, 0x70, 0xff, 0x4, 0x1000, 0xe5af, 0x0, 0x8000, 0xd0440, 0x2, 0xffff, 0x1, 0x4, 0x1f, 0x3, 0xfffffffffffffffa, 0x5, 0x9, 0x8, 0x1, 0x3, 0x400, 0x6, 0x5, 0x401, 0x10000, 0xff, 0xb24, 0xffffffffffff8000, 0xc8a, 0x3f, 0xfffffffffffffffa, 0xffffffffffff8001, 0x200, 0x5, 0x3, 0x2, 0x93a, 0x0, 0x7fff, 0x2, @perf_bp={&(0x7f0000000100), 0x1}, 0x0, 0x0, 0xffffffffffffff4e, 0x6, 0x0, 0x4, 0xfffffffffffffffd}, r5, 0x0, r7, 0x8) r8 = openat$tun(0xffffffffffffff9c, &(0x7f0000000580)='/dev/net/tun\x00', 0x40000, 0x0) ioctl$TUNSETPERSIST(r8, 0x400454cb, 0x1) r9 = socket$kcm(0x29, 0x5, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000800)={0x0, r0, 0x1, 0x2}, 0x14) ioctl$sock_kcm_SIOCKCMUNATTACH(r9, 0x89e1, &(0x7f0000000900)={r2}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r3, 0x0, 0x8b, 0x0, &(0x7f0000000680)="3ce41f426b7dd449ae14b08e1868c456d4fe9c7993884cf18f4dd5a0bc57250243da4203e0640859184bc4c4690afefd7736e8842cd88030448e918bdb5bd9bbbd680a51261557c0477c18049c832005ebb5b185c6f233df73a21d3b3ddad8426fba2d5f8aac5df904d5e5f2e7dc4a517079e08d5b2175a276f2a5c49cc2957cb367f269898570852dd63a", 0x0, 0x5}, 0x28) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000500)='./cgroup/syz0\x00', 0x200002, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000740)={r3, 0x50, &(0x7f00000003c0)}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r2, 0x50, &(0x7f0000000840)}, 0x10) openat$cgroup_subtree(r2, &(0x7f0000000940)='cgroup.subtree_control\x00', 0x2, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x1ff, 0x0, 0x0, 0x0, 0x200000, 0xffffffffffffffff, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280), 0x2}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r10 = socket$kcm(0xa, 0x400000000002, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffc59) ioctl$sock_kcm_SIOCKCMCLONE(r10, 0x890b, &(0x7f0000000000)) ioctl$sock_kcm_SIOCKCMCLONE(r10, 0x890c, &(0x7f0000000000)) 03:53:12 executing program 4: 03:53:12 executing program 2: 03:53:12 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x20, &(0x7f0000000b80)=ANY=[@ANYBLOB="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"], 0x0, 0x1625, 0x0, 0x0, 0x41100, 0x1, [], 0x0, 0x4}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r0, 0xdb, &(0x7f0000000200)={0x0, 0x0}}, 0x393) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='cgroup.events\x00', 0x0, 0x0) write$cgroup_int(r2, &(0x7f00000007c0)=0x6, 0x12) r3 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000002c0), 0x4) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz1\x00', 0x1ff) r4 = perf_event_open$cgroup(&(0x7f0000000600)={0x0, 0x70, 0x9, 0x6, 0x8, 0x6, 0x0, 0xfffffffffffff49f, 0x2, 0x6, 0x3ff, 0x0, 0x20, 0x0, 0x1, 0x81, 0x1, 0x400, 0x4, 0xfac, 0x4, 0x1, 0x10000, 0xf1, 0xd3, 0x92b, 0x200, 0x1, 0x100000000, 0x2, 0x100000000, 0xfff, 0xfff, 0xffff, 0x3, 0xfffffffffffffffd, 0x0, 0x6, 0x0, 0x50, 0x0, @perf_config_ext={0x3f, 0x9}, 0x20000, 0x8, 0xef3, 0x7, 0x100000000, 0x8, 0xfff}, 0xffffffffffffffff, 0x2, r0, 0x8) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000b40)='cgroup.subtree_control\x00') ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x2400, 0x1) r5 = getpid() socketpair$unix(0x1, 0x7, 0x0, &(0x7f0000000540)={0xffffffffffffffff}) setsockopt$sock_attach_bpf(r6, 0x1, 0x32, &(0x7f00000005c0)=r3, 0x4) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={0x0, 0xffffffffffffffff, 0x0, 0x12, &(0x7f0000000480)='./cgroup.cpu/syz1\x00', r1}, 0x30) perf_event_open(&(0x7f0000000300)={0x5, 0x70, 0xff, 0x4, 0x1000, 0xe5af, 0x0, 0x8000, 0xd0440, 0x2, 0xffff, 0x1, 0x4, 0x1f, 0x3, 0xfffffffffffffffa, 0x5, 0x9, 0x8, 0x1, 0x3, 0x400, 0x6, 0x5, 0x401, 0x10000, 0xff, 0xb24, 0xffffffffffff8000, 0xc8a, 0x3f, 0xfffffffffffffffa, 0xffffffffffff8001, 0x200, 0x5, 0x3, 0x2, 0x93a, 0x0, 0x7fff, 0x2, @perf_bp={&(0x7f0000000100), 0x1}, 0x0, 0x0, 0xffffffffffffff4e, 0x6, 0x0, 0x4, 0xfffffffffffffffd}, r5, 0x0, r7, 0x8) r8 = openat$tun(0xffffffffffffff9c, &(0x7f0000000580)='/dev/net/tun\x00', 0x40000, 0x0) ioctl$TUNSETPERSIST(r8, 0x400454cb, 0x1) r9 = socket$kcm(0x29, 0x5, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000800)={0x0, r0, 0x1, 0x2}, 0x14) ioctl$sock_kcm_SIOCKCMUNATTACH(r9, 0x89e1, &(0x7f0000000900)={r2}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r3, 0x0, 0x8b, 0x0, &(0x7f0000000680)="3ce41f426b7dd449ae14b08e1868c456d4fe9c7993884cf18f4dd5a0bc57250243da4203e0640859184bc4c4690afefd7736e8842cd88030448e918bdb5bd9bbbd680a51261557c0477c18049c832005ebb5b185c6f233df73a21d3b3ddad8426fba2d5f8aac5df904d5e5f2e7dc4a517079e08d5b2175a276f2a5c49cc2957cb367f269898570852dd63a", 0x0, 0x5}, 0x28) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000500)='./cgroup/syz0\x00', 0x200002, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000740)={r3, 0x50, &(0x7f00000003c0)}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r2, 0x50, &(0x7f0000000840)}, 0x10) openat$cgroup_subtree(r2, &(0x7f0000000940)='cgroup.subtree_control\x00', 0x2, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x1ff, 0x0, 0x0, 0x0, 0x200000, 0xffffffffffffffff, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280), 0x2}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r10 = socket$kcm(0xa, 0x400000000002, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffc59) ioctl$sock_kcm_SIOCKCMCLONE(r10, 0x890b, &(0x7f0000000000)) ioctl$sock_kcm_SIOCKCMCLONE(r10, 0x890c, &(0x7f0000000000)) 03:53:12 executing program 5: getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffff9c, 0x84, 0x13, 0x0, 0x0) r0 = syz_open_dev$swradio(&(0x7f0000000000)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$radio(0x0, 0xffffffffffffffff, 0x2) r1 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) getdents64(r1, 0x0, 0x0) r2 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r2, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r2, 0x8) socket$inet6_sctp(0xa, 0x805, 0x84) r3 = accept4(r2, 0x0, 0x0, 0x0) prctl$PR_SET_ENDIAN(0x14, 0x1) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(0xffffffffffffffff, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) epoll_pwait(0xffffffffffffffff, &(0x7f0000000040)=[{}, {}], 0x2, 0x0, &(0x7f0000000080), 0x8) getpgid(0x0) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r3, 0x84, 0x9, &(0x7f0000000280)={0x0, @in={{0x2, 0x0, @empty}}, 0x0, 0xac14142400000000, 0x0, 0x0, 0x54}, 0x98) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000780)={{{@in=@dev, @in6=@local}}, {{@in6=@mcast2}, 0x0, @in6=@dev}}, 0x0) ioctl$SIOCAX25ADDFWD(r0, 0x89ea, 0x0) syz_mount_image$gfs2(&(0x7f00000003c0)='gfs2\x00', 0x0, 0x87, 0x0, &(0x7f00000005c0), 0x1040040, 0x0) readv(r1, &(0x7f0000000500)=[{&(0x7f0000000400)=""/217, 0xd9}], 0x1) 03:53:12 executing program 3: 03:53:12 executing program 2: 03:53:12 executing program 4: 03:53:12 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x20, &(0x7f0000000b80)=ANY=[@ANYBLOB="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"], 0x0, 0x1625, 0x0, 0x0, 0x41100, 0x1, [], 0x0, 0x4}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r0, 0xdb, &(0x7f0000000200)={0x0, 0x0}}, 0x393) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='cgroup.events\x00', 0x0, 0x0) write$cgroup_int(r2, &(0x7f00000007c0)=0x6, 0x12) r3 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000002c0), 0x4) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz1\x00', 0x1ff) r4 = perf_event_open$cgroup(&(0x7f0000000600)={0x0, 0x70, 0x9, 0x6, 0x8, 0x6, 0x0, 0xfffffffffffff49f, 0x2, 0x6, 0x3ff, 0x0, 0x20, 0x0, 0x1, 0x81, 0x1, 0x400, 0x4, 0xfac, 0x4, 0x1, 0x10000, 0xf1, 0xd3, 0x92b, 0x200, 0x1, 0x100000000, 0x2, 0x100000000, 0xfff, 0xfff, 0xffff, 0x3, 0xfffffffffffffffd, 0x0, 0x6, 0x0, 0x50, 0x0, @perf_config_ext={0x3f, 0x9}, 0x20000, 0x8, 0xef3, 0x7, 0x100000000, 0x8, 0xfff}, 0xffffffffffffffff, 0x2, r0, 0x8) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000b40)='cgroup.subtree_control\x00') ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x2400, 0x1) r5 = getpid() socketpair$unix(0x1, 0x7, 0x0, &(0x7f0000000540)={0xffffffffffffffff}) setsockopt$sock_attach_bpf(r6, 0x1, 0x32, &(0x7f00000005c0)=r3, 0x4) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={0x0, 0xffffffffffffffff, 0x0, 0x12, &(0x7f0000000480)='./cgroup.cpu/syz1\x00', r1}, 0x30) perf_event_open(&(0x7f0000000300)={0x5, 0x70, 0xff, 0x4, 0x1000, 0xe5af, 0x0, 0x8000, 0xd0440, 0x2, 0xffff, 0x1, 0x4, 0x1f, 0x3, 0xfffffffffffffffa, 0x5, 0x9, 0x8, 0x1, 0x3, 0x400, 0x6, 0x5, 0x401, 0x10000, 0xff, 0xb24, 0xffffffffffff8000, 0xc8a, 0x3f, 0xfffffffffffffffa, 0xffffffffffff8001, 0x200, 0x5, 0x3, 0x2, 0x93a, 0x0, 0x7fff, 0x2, @perf_bp={&(0x7f0000000100), 0x1}, 0x0, 0x0, 0xffffffffffffff4e, 0x6, 0x0, 0x4, 0xfffffffffffffffd}, r5, 0x0, r7, 0x8) r8 = openat$tun(0xffffffffffffff9c, &(0x7f0000000580)='/dev/net/tun\x00', 0x40000, 0x0) ioctl$TUNSETPERSIST(r8, 0x400454cb, 0x1) r9 = socket$kcm(0x29, 0x5, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000800)={0x0, r0, 0x1, 0x2}, 0x14) ioctl$sock_kcm_SIOCKCMUNATTACH(r9, 0x89e1, &(0x7f0000000900)={r2}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r3, 0x0, 0x8b, 0x0, &(0x7f0000000680)="3ce41f426b7dd449ae14b08e1868c456d4fe9c7993884cf18f4dd5a0bc57250243da4203e0640859184bc4c4690afefd7736e8842cd88030448e918bdb5bd9bbbd680a51261557c0477c18049c832005ebb5b185c6f233df73a21d3b3ddad8426fba2d5f8aac5df904d5e5f2e7dc4a517079e08d5b2175a276f2a5c49cc2957cb367f269898570852dd63a", 0x0, 0x5}, 0x28) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000500)='./cgroup/syz0\x00', 0x200002, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000740)={r3, 0x50, &(0x7f00000003c0)}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r2, 0x50, &(0x7f0000000840)}, 0x10) openat$cgroup_subtree(r2, &(0x7f0000000940)='cgroup.subtree_control\x00', 0x2, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x1ff, 0x0, 0x0, 0x0, 0x200000, 0xffffffffffffffff, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280), 0x2}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r10 = socket$kcm(0xa, 0x400000000002, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffc59) ioctl$sock_kcm_SIOCKCMCLONE(r10, 0x890b, &(0x7f0000000000)) ioctl$sock_kcm_SIOCKCMCLONE(r10, 0x890c, &(0x7f0000000000)) 03:53:12 executing program 0: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) read(0xffffffffffffffff, 0x0, 0x0) r0 = inotify_add_watch(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x20000000) inotify_rm_watch(0xffffffffffffffff, r0) 03:53:12 executing program 2: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$EBT_SO_GET_INFO(r0, 0x0, 0x80, &(0x7f0000000200)={'filter\x00'}, &(0x7f0000000280)=0x78) 03:53:12 executing program 3: r0 = syz_open_dev$video4linux(&(0x7f0000000180)='/dev/v4l-subdev#\x00', 0x0, 0x0) ioctl$VIDIOC_G_EDID(r0, 0xc0285628, &(0x7f0000000040)={0x0, 0x0, 0x6}) 03:53:12 executing program 4: r0 = socket$vsock_dgram(0x28, 0x2, 0x0) getpeername(r0, 0x0, 0x0) [ 1820.482550] protocol 88fb is buggy, dev hsr_slave_0 [ 1820.487663] protocol 88fb is buggy, dev hsr_slave_1 [ 1820.492842] protocol 88fb is buggy, dev hsr_slave_0 [ 1820.497902] protocol 88fb is buggy, dev hsr_slave_1 [ 1820.503103] protocol 88fb is buggy, dev hsr_slave_0 [ 1820.508165] protocol 88fb is buggy, dev hsr_slave_1 03:53:12 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = syz_open_dev$vbi(&(0x7f0000000080)='/dev/vbi#\x00', 0xffffffffffffffff, 0x2) ioctl$FICLONE(r0, 0x40049409, r1) 03:53:12 executing program 4: openat$audio(0xffffffffffffff9c, &(0x7f0000000300)='/dev/audio\x00', 0x0, 0x0) 03:53:13 executing program 3: r0 = socket$unix(0x1, 0x1, 0x0) connect(r0, 0x0, 0x0) 03:53:13 executing program 5: getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffff9c, 0x84, 0x13, 0x0, 0x0) r0 = syz_open_dev$swradio(&(0x7f0000000000)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$radio(0x0, 0xffffffffffffffff, 0x2) r1 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) getdents64(r1, 0x0, 0x0) r2 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r2, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r2, 0x8) r3 = socket$inet6_sctp(0xa, 0x805, 0x84) r4 = accept4(r2, 0x0, 0x0, 0x0) prctl$PR_SET_ENDIAN(0x14, 0x1) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r3, 0x84, 0x6b, 0x0, 0x0) epoll_pwait(0xffffffffffffffff, &(0x7f0000000040)=[{}, {}], 0x2, 0x0, &(0x7f0000000080), 0x8) getpgid(0x0) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r4, 0x84, 0x9, &(0x7f0000000280)={0x0, @in={{0x2, 0x0, @empty}}, 0x0, 0xac14142400000000, 0x0, 0x0, 0x54}, 0x98) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000780)={{{@in=@dev, @in6=@local}}, {{@in6=@mcast2}, 0x0, @in6=@dev}}, 0x0) ioctl$SIOCAX25ADDFWD(r0, 0x89ea, 0x0) syz_mount_image$gfs2(&(0x7f00000003c0)='gfs2\x00', 0x0, 0x87, 0x0, &(0x7f00000005c0), 0x1040040, 0x0) readv(r1, &(0x7f0000000500)=[{&(0x7f0000000400)=""/217, 0xd9}], 0x1) 03:53:13 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x20, &(0x7f0000000b80)=ANY=[@ANYBLOB="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"], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x1, [], 0x0, 0x4}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r0, 0xdb, &(0x7f0000000200)={0x0, 0x0}}, 0x393) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='cgroup.events\x00', 0x0, 0x0) write$cgroup_int(r2, &(0x7f00000007c0)=0x6, 0x12) r3 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000002c0), 0x4) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz1\x00', 0x1ff) r4 = perf_event_open$cgroup(&(0x7f0000000600)={0x0, 0x70, 0x9, 0x6, 0x8, 0x6, 0x0, 0xfffffffffffff49f, 0x2, 0x6, 0x3ff, 0x0, 0x20, 0x0, 0x1, 0x81, 0x1, 0x400, 0x4, 0xfac, 0x4, 0x1, 0x10000, 0xf1, 0xd3, 0x92b, 0x200, 0x1, 0x100000000, 0x2, 0x100000000, 0xfff, 0xfff, 0xffff, 0x3, 0xfffffffffffffffd, 0x0, 0x6, 0x0, 0x50, 0x0, @perf_config_ext={0x3f, 0x9}, 0x20000, 0x8, 0xef3, 0x7, 0x100000000, 0x8, 0xfff}, 0xffffffffffffffff, 0x2, r0, 0x8) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000b40)='cgroup.subtree_control\x00') ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x2400, 0x1) r5 = getpid() socketpair$unix(0x1, 0x7, 0x0, &(0x7f0000000540)={0xffffffffffffffff}) setsockopt$sock_attach_bpf(r6, 0x1, 0x32, &(0x7f00000005c0)=r3, 0x4) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={0x0, 0xffffffffffffffff, 0x0, 0x12, &(0x7f0000000480)='./cgroup.cpu/syz1\x00', r1}, 0x30) perf_event_open(&(0x7f0000000300)={0x5, 0x70, 0xff, 0x4, 0x1000, 0xe5af, 0x0, 0x8000, 0xd0440, 0x2, 0xffff, 0x1, 0x4, 0x1f, 0x3, 0xfffffffffffffffa, 0x5, 0x9, 0x8, 0x1, 0x3, 0x400, 0x6, 0x5, 0x401, 0x10000, 0xff, 0xb24, 0xffffffffffff8000, 0xc8a, 0x3f, 0xfffffffffffffffa, 0xffffffffffff8001, 0x200, 0x5, 0x3, 0x2, 0x93a, 0x0, 0x7fff, 0x2, @perf_bp={&(0x7f0000000100), 0x1}, 0x0, 0x0, 0xffffffffffffff4e, 0x6, 0x0, 0x4, 0xfffffffffffffffd}, r5, 0x0, r7, 0x8) r8 = openat$tun(0xffffffffffffff9c, &(0x7f0000000580)='/dev/net/tun\x00', 0x40000, 0x0) ioctl$TUNSETPERSIST(r8, 0x400454cb, 0x1) r9 = socket$kcm(0x29, 0x5, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000800)={0x0, r0, 0x1, 0x2}, 0x14) ioctl$sock_kcm_SIOCKCMUNATTACH(r9, 0x89e1, &(0x7f0000000900)={r2}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r3, 0x0, 0x8b, 0x0, &(0x7f0000000680)="3ce41f426b7dd449ae14b08e1868c456d4fe9c7993884cf18f4dd5a0bc57250243da4203e0640859184bc4c4690afefd7736e8842cd88030448e918bdb5bd9bbbd680a51261557c0477c18049c832005ebb5b185c6f233df73a21d3b3ddad8426fba2d5f8aac5df904d5e5f2e7dc4a517079e08d5b2175a276f2a5c49cc2957cb367f269898570852dd63a", 0x0, 0x5}, 0x28) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000500)='./cgroup/syz0\x00', 0x200002, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000740)={r3, 0x50, &(0x7f00000003c0)}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r2, 0x50, &(0x7f0000000840)}, 0x10) openat$cgroup_subtree(r2, &(0x7f0000000940)='cgroup.subtree_control\x00', 0x2, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x1ff, 0x0, 0x0, 0x0, 0x200000, 0xffffffffffffffff, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280), 0x2}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r10 = socket$kcm(0xa, 0x400000000002, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffc59) ioctl$sock_kcm_SIOCKCMCLONE(r10, 0x890b, &(0x7f0000000000)) ioctl$sock_kcm_SIOCKCMCLONE(r10, 0x890c, &(0x7f0000000000)) 03:53:13 executing program 3: r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) setsockopt$inet_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000580)='veno\x00', 0x5) bind$inet6(r0, &(0x7f0000000180)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) 03:53:13 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) getsockopt$IP6T_SO_GET_REVISION_MATCH(r0, 0x29, 0x44, &(0x7f0000000000)={'icmp\x00'}, &(0x7f0000000040)=0x1e) 03:53:13 executing program 0: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) read(0xffffffffffffffff, 0x0, 0x0) r0 = inotify_add_watch(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x20000000) inotify_rm_watch(0xffffffffffffffff, r0) 03:53:13 executing program 2: mmap(&(0x7f0000000000/0x7f2000)=nil, 0x7f2000, 0x3, 0x31, 0xffffffffffffffff, 0x0) mq_open(&(0x7f00005a1ffb)='eth0\x00', 0x0, 0x0, 0x0) mbind(&(0x7f00003b5000/0x800000)=nil, 0x800000, 0x0, 0x0, 0x0, 0x2) 03:53:13 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x20, &(0x7f0000000b80)=ANY=[@ANYBLOB="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"], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x1, [], 0x0, 0x4}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r0, 0xdb, &(0x7f0000000200)={0x0, 0x0}}, 0x393) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='cgroup.events\x00', 0x0, 0x0) write$cgroup_int(r2, &(0x7f00000007c0)=0x6, 0x12) r3 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000002c0), 0x4) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz1\x00', 0x1ff) r4 = perf_event_open$cgroup(&(0x7f0000000600)={0x0, 0x70, 0x9, 0x6, 0x8, 0x6, 0x0, 0xfffffffffffff49f, 0x2, 0x6, 0x3ff, 0x0, 0x20, 0x0, 0x1, 0x81, 0x1, 0x400, 0x4, 0xfac, 0x4, 0x1, 0x10000, 0xf1, 0xd3, 0x92b, 0x200, 0x1, 0x100000000, 0x2, 0x100000000, 0xfff, 0xfff, 0xffff, 0x3, 0xfffffffffffffffd, 0x0, 0x6, 0x0, 0x50, 0x0, @perf_config_ext={0x3f, 0x9}, 0x20000, 0x8, 0xef3, 0x7, 0x100000000, 0x8, 0xfff}, 0xffffffffffffffff, 0x2, r0, 0x8) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000b40)='cgroup.subtree_control\x00') ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x2400, 0x1) r5 = getpid() socketpair$unix(0x1, 0x7, 0x0, &(0x7f0000000540)={0xffffffffffffffff}) setsockopt$sock_attach_bpf(r6, 0x1, 0x32, &(0x7f00000005c0)=r3, 0x4) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={0x0, 0xffffffffffffffff, 0x0, 0x12, &(0x7f0000000480)='./cgroup.cpu/syz1\x00', r1}, 0x30) perf_event_open(&(0x7f0000000300)={0x5, 0x70, 0xff, 0x4, 0x1000, 0xe5af, 0x0, 0x8000, 0xd0440, 0x2, 0xffff, 0x1, 0x4, 0x1f, 0x3, 0xfffffffffffffffa, 0x5, 0x9, 0x8, 0x1, 0x3, 0x400, 0x6, 0x5, 0x401, 0x10000, 0xff, 0xb24, 0xffffffffffff8000, 0xc8a, 0x3f, 0xfffffffffffffffa, 0xffffffffffff8001, 0x200, 0x5, 0x3, 0x2, 0x93a, 0x0, 0x7fff, 0x2, @perf_bp={&(0x7f0000000100), 0x1}, 0x0, 0x0, 0xffffffffffffff4e, 0x6, 0x0, 0x4, 0xfffffffffffffffd}, r5, 0x0, r7, 0x8) r8 = openat$tun(0xffffffffffffff9c, &(0x7f0000000580)='/dev/net/tun\x00', 0x40000, 0x0) ioctl$TUNSETPERSIST(r8, 0x400454cb, 0x1) r9 = socket$kcm(0x29, 0x5, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000800)={0x0, r0, 0x1, 0x2}, 0x14) ioctl$sock_kcm_SIOCKCMUNATTACH(r9, 0x89e1, &(0x7f0000000900)={r2}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r3, 0x0, 0x8b, 0x0, &(0x7f0000000680)="3ce41f426b7dd449ae14b08e1868c456d4fe9c7993884cf18f4dd5a0bc57250243da4203e0640859184bc4c4690afefd7736e8842cd88030448e918bdb5bd9bbbd680a51261557c0477c18049c832005ebb5b185c6f233df73a21d3b3ddad8426fba2d5f8aac5df904d5e5f2e7dc4a517079e08d5b2175a276f2a5c49cc2957cb367f269898570852dd63a", 0x0, 0x5}, 0x28) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000500)='./cgroup/syz0\x00', 0x200002, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000740)={r3, 0x50, &(0x7f00000003c0)}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r2, 0x50, &(0x7f0000000840)}, 0x10) openat$cgroup_subtree(r2, &(0x7f0000000940)='cgroup.subtree_control\x00', 0x2, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x1ff, 0x0, 0x0, 0x0, 0x200000, 0xffffffffffffffff, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280), 0x2}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r10 = socket$kcm(0xa, 0x400000000002, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffc59) ioctl$sock_kcm_SIOCKCMCLONE(r10, 0x890b, &(0x7f0000000000)) ioctl$sock_kcm_SIOCKCMCLONE(r10, 0x890c, &(0x7f0000000000)) 03:53:13 executing program 2: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_RTOINFO(r0, 0x84, 0x0, 0x0, &(0x7f0000000140)) 03:53:13 executing program 0: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) read(0xffffffffffffffff, 0x0, 0x0) r0 = inotify_add_watch(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x20000000) inotify_rm_watch(0xffffffffffffffff, r0) 03:53:13 executing program 4: syz_open_dev$mice(&(0x7f00000000c0)='/dev/input/mice\x00', 0x0, 0x0) syz_open_dev$audion(0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) 03:53:13 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFBR(r0, 0x8940, &(0x7f0000000080)=@generic={0x3}) 03:53:13 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0x0, 0x0, &(0x7f00000000c0)='GPL\x00', 0x400, 0xd8, &(0x7f0000000440)=""/216, 0x0, 0x1, [], 0x0, 0x3}, 0x48) 03:53:14 executing program 5: getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffff9c, 0x84, 0x13, 0x0, 0x0) r0 = syz_open_dev$swradio(&(0x7f0000000000)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$radio(0x0, 0xffffffffffffffff, 0x2) r1 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) getdents64(r1, 0x0, 0x0) r2 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r2, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r2, 0x8) r3 = socket$inet6_sctp(0xa, 0x805, 0x84) r4 = accept4(r2, 0x0, 0x0, 0x0) prctl$PR_SET_ENDIAN(0x14, 0x1) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r3, 0x84, 0x6b, 0x0, 0x0) epoll_pwait(0xffffffffffffffff, &(0x7f0000000040)=[{}, {}], 0x2, 0x0, &(0x7f0000000080), 0x8) getpgid(0x0) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r4, 0x84, 0x9, &(0x7f0000000280)={0x0, @in={{0x2, 0x0, @empty}}, 0x0, 0xac14142400000000, 0x0, 0x0, 0x54}, 0x98) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000780)={{{@in=@dev, @in6=@local}}, {{@in6=@mcast2}, 0x0, @in6=@dev}}, 0x0) ioctl$SIOCAX25ADDFWD(r0, 0x89ea, 0x0) syz_mount_image$gfs2(&(0x7f00000003c0)='gfs2\x00', 0x0, 0x87, 0x0, &(0x7f00000005c0), 0x1040040, 0x0) readv(r1, &(0x7f0000000500)=[{&(0x7f0000000400)=""/217, 0xd9}], 0x1) 03:53:14 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x20, &(0x7f0000000b80)=ANY=[@ANYBLOB="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"], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x1, [], 0x0, 0x4}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r0, 0xdb, &(0x7f0000000200)={0x0, 0x0}}, 0x393) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='cgroup.events\x00', 0x0, 0x0) write$cgroup_int(r2, &(0x7f00000007c0)=0x6, 0x12) r3 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000002c0), 0x4) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz1\x00', 0x1ff) r4 = perf_event_open$cgroup(&(0x7f0000000600)={0x0, 0x70, 0x9, 0x6, 0x8, 0x6, 0x0, 0xfffffffffffff49f, 0x2, 0x6, 0x3ff, 0x0, 0x20, 0x0, 0x1, 0x81, 0x1, 0x400, 0x4, 0xfac, 0x4, 0x1, 0x10000, 0xf1, 0xd3, 0x92b, 0x200, 0x1, 0x100000000, 0x2, 0x100000000, 0xfff, 0xfff, 0xffff, 0x3, 0xfffffffffffffffd, 0x0, 0x6, 0x0, 0x50, 0x0, @perf_config_ext={0x3f, 0x9}, 0x20000, 0x8, 0xef3, 0x7, 0x100000000, 0x8, 0xfff}, 0xffffffffffffffff, 0x2, r0, 0x8) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000b40)='cgroup.subtree_control\x00') ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x2400, 0x1) r5 = getpid() socketpair$unix(0x1, 0x7, 0x0, &(0x7f0000000540)={0xffffffffffffffff}) setsockopt$sock_attach_bpf(r6, 0x1, 0x32, &(0x7f00000005c0)=r3, 0x4) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={0x0, 0xffffffffffffffff, 0x0, 0x12, &(0x7f0000000480)='./cgroup.cpu/syz1\x00', r1}, 0x30) perf_event_open(&(0x7f0000000300)={0x5, 0x70, 0xff, 0x4, 0x1000, 0xe5af, 0x0, 0x8000, 0xd0440, 0x2, 0xffff, 0x1, 0x4, 0x1f, 0x3, 0xfffffffffffffffa, 0x5, 0x9, 0x8, 0x1, 0x3, 0x400, 0x6, 0x5, 0x401, 0x10000, 0xff, 0xb24, 0xffffffffffff8000, 0xc8a, 0x3f, 0xfffffffffffffffa, 0xffffffffffff8001, 0x200, 0x5, 0x3, 0x2, 0x93a, 0x0, 0x7fff, 0x2, @perf_bp={&(0x7f0000000100), 0x1}, 0x0, 0x0, 0xffffffffffffff4e, 0x6, 0x0, 0x4, 0xfffffffffffffffd}, r5, 0x0, r7, 0x8) r8 = openat$tun(0xffffffffffffff9c, &(0x7f0000000580)='/dev/net/tun\x00', 0x40000, 0x0) ioctl$TUNSETPERSIST(r8, 0x400454cb, 0x1) r9 = socket$kcm(0x29, 0x5, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000800)={0x0, r0, 0x1, 0x2}, 0x14) ioctl$sock_kcm_SIOCKCMUNATTACH(r9, 0x89e1, &(0x7f0000000900)={r2}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r3, 0x0, 0x8b, 0x0, &(0x7f0000000680)="3ce41f426b7dd449ae14b08e1868c456d4fe9c7993884cf18f4dd5a0bc57250243da4203e0640859184bc4c4690afefd7736e8842cd88030448e918bdb5bd9bbbd680a51261557c0477c18049c832005ebb5b185c6f233df73a21d3b3ddad8426fba2d5f8aac5df904d5e5f2e7dc4a517079e08d5b2175a276f2a5c49cc2957cb367f269898570852dd63a", 0x0, 0x5}, 0x28) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000500)='./cgroup/syz0\x00', 0x200002, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000740)={r3, 0x50, &(0x7f00000003c0)}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r2, 0x50, &(0x7f0000000840)}, 0x10) openat$cgroup_subtree(r2, &(0x7f0000000940)='cgroup.subtree_control\x00', 0x2, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x1ff, 0x0, 0x0, 0x0, 0x200000, 0xffffffffffffffff, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280), 0x2}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r10 = socket$kcm(0xa, 0x400000000002, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffc59) ioctl$sock_kcm_SIOCKCMCLONE(r10, 0x890b, &(0x7f0000000000)) ioctl$sock_kcm_SIOCKCMCLONE(r10, 0x890c, &(0x7f0000000000)) 03:53:14 executing program 0: r0 = inotify_init() read(r0, 0x0, 0x0) r1 = inotify_add_watch(r0, &(0x7f0000000040)='./file0\x00', 0x20000000) inotify_rm_watch(r0, r1) 03:53:14 executing program 2: r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x0, 0x0) fstat(r0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setregid(r1, 0x0) 03:53:14 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_mreq(r0, 0x29, 0x15, 0x0, 0x0) 03:53:14 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet_sctp(0x2, 0x1, 0x84) sendmmsg$inet_sctp(r1, &(0x7f00000023c0)=[{&(0x7f0000000000)=@in={0x2, 0x0, @local}, 0x10, &(0x7f00000002c0)=[{&(0x7f0000000100)='~', 0x1}], 0x1}], 0x1, 0x0) 03:53:14 executing program 3: poll(&(0x7f0000000080)=[{}], 0x1, 0x0) prctl$PR_GET_TID_ADDRESS(0x28, &(0x7f0000000040)) 03:53:14 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x20, &(0x7f0000000b80)=ANY=[@ANYBLOB="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"], 0x0, 0x1625, 0x0, 0x0, 0x0, 0x1, [], 0x0, 0x4}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r0, 0xdb, &(0x7f0000000200)={0x0, 0x0}}, 0x393) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='cgroup.events\x00', 0x0, 0x0) write$cgroup_int(r2, &(0x7f00000007c0)=0x6, 0x12) r3 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000002c0), 0x4) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz1\x00', 0x1ff) r4 = perf_event_open$cgroup(&(0x7f0000000600)={0x0, 0x70, 0x9, 0x6, 0x8, 0x6, 0x0, 0xfffffffffffff49f, 0x2, 0x6, 0x3ff, 0x0, 0x20, 0x0, 0x1, 0x81, 0x1, 0x400, 0x4, 0xfac, 0x4, 0x1, 0x10000, 0xf1, 0xd3, 0x92b, 0x200, 0x1, 0x100000000, 0x2, 0x100000000, 0xfff, 0xfff, 0xffff, 0x3, 0xfffffffffffffffd, 0x0, 0x6, 0x0, 0x50, 0x0, @perf_config_ext={0x3f, 0x9}, 0x20000, 0x8, 0xef3, 0x7, 0x100000000, 0x8, 0xfff}, 0xffffffffffffffff, 0x2, r0, 0x8) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000b40)='cgroup.subtree_control\x00') ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x2400, 0x1) r5 = getpid() socketpair$unix(0x1, 0x7, 0x0, &(0x7f0000000540)={0xffffffffffffffff}) setsockopt$sock_attach_bpf(r6, 0x1, 0x32, &(0x7f00000005c0)=r3, 0x4) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={0x0, 0xffffffffffffffff, 0x0, 0x12, &(0x7f0000000480)='./cgroup.cpu/syz1\x00', r1}, 0x30) perf_event_open(&(0x7f0000000300)={0x5, 0x70, 0xff, 0x4, 0x1000, 0xe5af, 0x0, 0x8000, 0xd0440, 0x2, 0xffff, 0x1, 0x4, 0x1f, 0x3, 0xfffffffffffffffa, 0x5, 0x9, 0x8, 0x1, 0x3, 0x400, 0x6, 0x5, 0x401, 0x10000, 0xff, 0xb24, 0xffffffffffff8000, 0xc8a, 0x3f, 0xfffffffffffffffa, 0xffffffffffff8001, 0x200, 0x5, 0x3, 0x2, 0x93a, 0x0, 0x7fff, 0x2, @perf_bp={&(0x7f0000000100), 0x1}, 0x0, 0x0, 0xffffffffffffff4e, 0x6, 0x0, 0x4, 0xfffffffffffffffd}, r5, 0x0, r7, 0x8) r8 = openat$tun(0xffffffffffffff9c, &(0x7f0000000580)='/dev/net/tun\x00', 0x40000, 0x0) ioctl$TUNSETPERSIST(r8, 0x400454cb, 0x1) r9 = socket$kcm(0x29, 0x5, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000800)={0x0, r0, 0x1, 0x2}, 0x14) ioctl$sock_kcm_SIOCKCMUNATTACH(r9, 0x89e1, &(0x7f0000000900)={r2}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r3, 0x0, 0x8b, 0x0, &(0x7f0000000680)="3ce41f426b7dd449ae14b08e1868c456d4fe9c7993884cf18f4dd5a0bc57250243da4203e0640859184bc4c4690afefd7736e8842cd88030448e918bdb5bd9bbbd680a51261557c0477c18049c832005ebb5b185c6f233df73a21d3b3ddad8426fba2d5f8aac5df904d5e5f2e7dc4a517079e08d5b2175a276f2a5c49cc2957cb367f269898570852dd63a", 0x0, 0x5}, 0x28) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000500)='./cgroup/syz0\x00', 0x200002, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000740)={r3, 0x50, &(0x7f00000003c0)}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r2, 0x50, &(0x7f0000000840)}, 0x10) openat$cgroup_subtree(r2, &(0x7f0000000940)='cgroup.subtree_control\x00', 0x2, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x1ff, 0x0, 0x0, 0x0, 0x200000, 0xffffffffffffffff, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280), 0x2}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r10 = socket$kcm(0xa, 0x400000000002, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffc59) ioctl$sock_kcm_SIOCKCMCLONE(r10, 0x890b, &(0x7f0000000000)) ioctl$sock_kcm_SIOCKCMCLONE(r10, 0x890c, &(0x7f0000000000)) 03:53:14 executing program 2: r0 = semget$private(0x0, 0x7, 0x0) semctl$IPC_STAT(r0, 0x0, 0x2, &(0x7f0000000200)=""/95) 03:53:14 executing program 2: ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, 0x0) r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000180)='/dev/mixer\x00', 0x0, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r0, 0x400c6615, &(0x7f0000000000)) 03:53:14 executing program 3: r0 = socket$inet(0x2, 0x1, 0x0) r1 = dup(r0) fremovexattr(r1, &(0x7f0000000000)=@random={'trusted.', 'nlmon0\x00'}) 03:53:14 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x20, &(0x7f0000000b80)=ANY=[@ANYBLOB="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"], 0x0, 0x1625, 0x0, 0x0, 0x0, 0x1, [], 0x0, 0x4}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r0, 0xdb, &(0x7f0000000200)={0x0, 0x0}}, 0x393) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='cgroup.events\x00', 0x0, 0x0) write$cgroup_int(r2, &(0x7f00000007c0)=0x6, 0x12) r3 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000002c0), 0x4) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz1\x00', 0x1ff) r4 = perf_event_open$cgroup(&(0x7f0000000600)={0x0, 0x70, 0x9, 0x6, 0x8, 0x6, 0x0, 0xfffffffffffff49f, 0x2, 0x6, 0x3ff, 0x0, 0x20, 0x0, 0x1, 0x81, 0x1, 0x400, 0x4, 0xfac, 0x4, 0x1, 0x10000, 0xf1, 0xd3, 0x92b, 0x200, 0x1, 0x100000000, 0x2, 0x100000000, 0xfff, 0xfff, 0xffff, 0x3, 0xfffffffffffffffd, 0x0, 0x6, 0x0, 0x50, 0x0, @perf_config_ext={0x3f, 0x9}, 0x20000, 0x8, 0xef3, 0x7, 0x100000000, 0x8, 0xfff}, 0xffffffffffffffff, 0x2, r0, 0x8) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000b40)='cgroup.subtree_control\x00') ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x2400, 0x1) r5 = getpid() socketpair$unix(0x1, 0x7, 0x0, &(0x7f0000000540)={0xffffffffffffffff}) setsockopt$sock_attach_bpf(r6, 0x1, 0x32, &(0x7f00000005c0)=r3, 0x4) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={0x0, 0xffffffffffffffff, 0x0, 0x12, &(0x7f0000000480)='./cgroup.cpu/syz1\x00', r1}, 0x30) perf_event_open(&(0x7f0000000300)={0x5, 0x70, 0xff, 0x4, 0x1000, 0xe5af, 0x0, 0x8000, 0xd0440, 0x2, 0xffff, 0x1, 0x4, 0x1f, 0x3, 0xfffffffffffffffa, 0x5, 0x9, 0x8, 0x1, 0x3, 0x400, 0x6, 0x5, 0x401, 0x10000, 0xff, 0xb24, 0xffffffffffff8000, 0xc8a, 0x3f, 0xfffffffffffffffa, 0xffffffffffff8001, 0x200, 0x5, 0x3, 0x2, 0x93a, 0x0, 0x7fff, 0x2, @perf_bp={&(0x7f0000000100), 0x1}, 0x0, 0x0, 0xffffffffffffff4e, 0x6, 0x0, 0x4, 0xfffffffffffffffd}, r5, 0x0, r7, 0x8) r8 = openat$tun(0xffffffffffffff9c, &(0x7f0000000580)='/dev/net/tun\x00', 0x40000, 0x0) ioctl$TUNSETPERSIST(r8, 0x400454cb, 0x1) r9 = socket$kcm(0x29, 0x5, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000800)={0x0, r0, 0x1, 0x2}, 0x14) ioctl$sock_kcm_SIOCKCMUNATTACH(r9, 0x89e1, &(0x7f0000000900)={r2}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r3, 0x0, 0x8b, 0x0, &(0x7f0000000680)="3ce41f426b7dd449ae14b08e1868c456d4fe9c7993884cf18f4dd5a0bc57250243da4203e0640859184bc4c4690afefd7736e8842cd88030448e918bdb5bd9bbbd680a51261557c0477c18049c832005ebb5b185c6f233df73a21d3b3ddad8426fba2d5f8aac5df904d5e5f2e7dc4a517079e08d5b2175a276f2a5c49cc2957cb367f269898570852dd63a", 0x0, 0x5}, 0x28) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000500)='./cgroup/syz0\x00', 0x200002, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000740)={r3, 0x50, &(0x7f00000003c0)}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r2, 0x50, &(0x7f0000000840)}, 0x10) openat$cgroup_subtree(r2, &(0x7f0000000940)='cgroup.subtree_control\x00', 0x2, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x1ff, 0x0, 0x0, 0x0, 0x200000, 0xffffffffffffffff, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280), 0x2}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r10 = socket$kcm(0xa, 0x400000000002, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffc59) ioctl$sock_kcm_SIOCKCMCLONE(r10, 0x890b, &(0x7f0000000000)) ioctl$sock_kcm_SIOCKCMCLONE(r10, 0x890c, &(0x7f0000000000)) 03:53:14 executing program 5: getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffff9c, 0x84, 0x13, 0x0, 0x0) r0 = syz_open_dev$swradio(&(0x7f0000000000)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$radio(0x0, 0xffffffffffffffff, 0x2) r1 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) getdents64(r1, 0x0, 0x0) r2 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r2, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r2, 0x8) r3 = socket$inet6_sctp(0xa, 0x805, 0x84) r4 = accept4(r2, 0x0, 0x0, 0x0) prctl$PR_SET_ENDIAN(0x14, 0x1) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r3, 0x84, 0x6b, 0x0, 0x0) epoll_pwait(0xffffffffffffffff, &(0x7f0000000040)=[{}, {}], 0x2, 0x0, &(0x7f0000000080), 0x8) getpgid(0x0) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r4, 0x84, 0x9, &(0x7f0000000280)={0x0, @in={{0x2, 0x0, @empty}}, 0x0, 0xac14142400000000, 0x0, 0x0, 0x54}, 0x98) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000780)={{{@in=@dev, @in6=@local}}, {{@in6=@mcast2}, 0x0, @in6=@dev}}, 0x0) ioctl$SIOCAX25ADDFWD(r0, 0x89ea, 0x0) syz_mount_image$gfs2(&(0x7f00000003c0)='gfs2\x00', 0x0, 0x87, 0x0, &(0x7f00000005c0), 0x1040040, 0x0) readv(r1, &(0x7f0000000500)=[{&(0x7f0000000400)=""/217, 0xd9}], 0x1) 03:53:14 executing program 2: syz_open_dev$radio(0x0, 0xffffffffffffffff, 0x2) 03:53:14 executing program 0: r0 = inotify_init() read(r0, 0x0, 0x0) r1 = inotify_add_watch(r0, &(0x7f0000000040)='./file0\x00', 0x20000000) inotify_rm_watch(r0, r1) 03:53:14 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_X86_SET_MCE(r2, 0x4040ae9e, &(0x7f0000000040)={0xc100000000000000}) 03:53:14 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x20, &(0x7f0000000b80)=ANY=[@ANYBLOB="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"], 0x0, 0x1625, 0x0, 0x0, 0x0, 0x1, [], 0x0, 0x4}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r0, 0xdb, &(0x7f0000000200)={0x0, 0x0}}, 0x393) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='cgroup.events\x00', 0x0, 0x0) write$cgroup_int(r2, &(0x7f00000007c0)=0x6, 0x12) r3 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000002c0), 0x4) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz1\x00', 0x1ff) r4 = perf_event_open$cgroup(&(0x7f0000000600)={0x0, 0x70, 0x9, 0x6, 0x8, 0x6, 0x0, 0xfffffffffffff49f, 0x2, 0x6, 0x3ff, 0x0, 0x20, 0x0, 0x1, 0x81, 0x1, 0x400, 0x4, 0xfac, 0x4, 0x1, 0x10000, 0xf1, 0xd3, 0x92b, 0x200, 0x1, 0x100000000, 0x2, 0x100000000, 0xfff, 0xfff, 0xffff, 0x3, 0xfffffffffffffffd, 0x0, 0x6, 0x0, 0x50, 0x0, @perf_config_ext={0x3f, 0x9}, 0x20000, 0x8, 0xef3, 0x7, 0x100000000, 0x8, 0xfff}, 0xffffffffffffffff, 0x2, r0, 0x8) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000b40)='cgroup.subtree_control\x00') ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x2400, 0x1) r5 = getpid() socketpair$unix(0x1, 0x7, 0x0, &(0x7f0000000540)={0xffffffffffffffff}) setsockopt$sock_attach_bpf(r6, 0x1, 0x32, &(0x7f00000005c0)=r3, 0x4) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={0x0, 0xffffffffffffffff, 0x0, 0x12, &(0x7f0000000480)='./cgroup.cpu/syz1\x00', r1}, 0x30) perf_event_open(&(0x7f0000000300)={0x5, 0x70, 0xff, 0x4, 0x1000, 0xe5af, 0x0, 0x8000, 0xd0440, 0x2, 0xffff, 0x1, 0x4, 0x1f, 0x3, 0xfffffffffffffffa, 0x5, 0x9, 0x8, 0x1, 0x3, 0x400, 0x6, 0x5, 0x401, 0x10000, 0xff, 0xb24, 0xffffffffffff8000, 0xc8a, 0x3f, 0xfffffffffffffffa, 0xffffffffffff8001, 0x200, 0x5, 0x3, 0x2, 0x93a, 0x0, 0x7fff, 0x2, @perf_bp={&(0x7f0000000100), 0x1}, 0x0, 0x0, 0xffffffffffffff4e, 0x6, 0x0, 0x4, 0xfffffffffffffffd}, r5, 0x0, r7, 0x8) r8 = openat$tun(0xffffffffffffff9c, &(0x7f0000000580)='/dev/net/tun\x00', 0x40000, 0x0) ioctl$TUNSETPERSIST(r8, 0x400454cb, 0x1) r9 = socket$kcm(0x29, 0x5, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000800)={0x0, r0, 0x1, 0x2}, 0x14) ioctl$sock_kcm_SIOCKCMUNATTACH(r9, 0x89e1, &(0x7f0000000900)={r2}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r3, 0x0, 0x8b, 0x0, &(0x7f0000000680)="3ce41f426b7dd449ae14b08e1868c456d4fe9c7993884cf18f4dd5a0bc57250243da4203e0640859184bc4c4690afefd7736e8842cd88030448e918bdb5bd9bbbd680a51261557c0477c18049c832005ebb5b185c6f233df73a21d3b3ddad8426fba2d5f8aac5df904d5e5f2e7dc4a517079e08d5b2175a276f2a5c49cc2957cb367f269898570852dd63a", 0x0, 0x5}, 0x28) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000500)='./cgroup/syz0\x00', 0x200002, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000740)={r3, 0x50, &(0x7f00000003c0)}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r2, 0x50, &(0x7f0000000840)}, 0x10) openat$cgroup_subtree(r2, &(0x7f0000000940)='cgroup.subtree_control\x00', 0x2, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x1ff, 0x0, 0x0, 0x0, 0x200000, 0xffffffffffffffff, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280), 0x2}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r10 = socket$kcm(0xa, 0x400000000002, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffc59) ioctl$sock_kcm_SIOCKCMCLONE(r10, 0x890b, &(0x7f0000000000)) ioctl$sock_kcm_SIOCKCMCLONE(r10, 0x890c, &(0x7f0000000000)) 03:53:14 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) munlockall() 03:53:15 executing program 2: r0 = syz_open_dev$video(&(0x7f0000000040)='/dev/video#\x00', 0x4, 0x0) ioctl$VIDIOC_TRY_EXT_CTRLS(r0, 0xc0205649, &(0x7f0000000100)={0xfffffff, 0x1ff, 0x0, [], 0x0}) 03:53:15 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x20, &(0x7f0000000b80)=ANY=[@ANYBLOB="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"], 0x0, 0x1625, 0x0, 0x0, 0x41100, 0x0, [], 0x0, 0x4}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r0, 0xdb, &(0x7f0000000200)={0x0, 0x0}}, 0x393) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='cgroup.events\x00', 0x0, 0x0) write$cgroup_int(r2, &(0x7f00000007c0)=0x6, 0x12) r3 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000002c0), 0x4) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz1\x00', 0x1ff) r4 = perf_event_open$cgroup(&(0x7f0000000600)={0x0, 0x70, 0x9, 0x6, 0x8, 0x6, 0x0, 0xfffffffffffff49f, 0x2, 0x6, 0x3ff, 0x0, 0x20, 0x0, 0x1, 0x81, 0x1, 0x400, 0x4, 0xfac, 0x4, 0x1, 0x10000, 0xf1, 0xd3, 0x92b, 0x200, 0x1, 0x100000000, 0x2, 0x100000000, 0xfff, 0xfff, 0xffff, 0x3, 0xfffffffffffffffd, 0x0, 0x6, 0x0, 0x50, 0x0, @perf_config_ext={0x3f, 0x9}, 0x20000, 0x8, 0xef3, 0x7, 0x100000000, 0x8, 0xfff}, 0xffffffffffffffff, 0x2, r0, 0x8) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000b40)='cgroup.subtree_control\x00') ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x2400, 0x1) r5 = getpid() socketpair$unix(0x1, 0x7, 0x0, &(0x7f0000000540)={0xffffffffffffffff}) setsockopt$sock_attach_bpf(r6, 0x1, 0x32, &(0x7f00000005c0)=r3, 0x4) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={0x0, 0xffffffffffffffff, 0x0, 0x12, &(0x7f0000000480)='./cgroup.cpu/syz1\x00', r1}, 0x30) perf_event_open(&(0x7f0000000300)={0x5, 0x70, 0xff, 0x4, 0x1000, 0xe5af, 0x0, 0x8000, 0xd0440, 0x2, 0xffff, 0x1, 0x4, 0x1f, 0x3, 0xfffffffffffffffa, 0x5, 0x9, 0x8, 0x1, 0x3, 0x400, 0x6, 0x5, 0x401, 0x10000, 0xff, 0xb24, 0xffffffffffff8000, 0xc8a, 0x3f, 0xfffffffffffffffa, 0xffffffffffff8001, 0x200, 0x5, 0x3, 0x2, 0x93a, 0x0, 0x7fff, 0x2, @perf_bp={&(0x7f0000000100), 0x1}, 0x0, 0x0, 0xffffffffffffff4e, 0x6, 0x0, 0x4, 0xfffffffffffffffd}, r5, 0x0, r7, 0x8) r8 = openat$tun(0xffffffffffffff9c, &(0x7f0000000580)='/dev/net/tun\x00', 0x40000, 0x0) ioctl$TUNSETPERSIST(r8, 0x400454cb, 0x1) r9 = socket$kcm(0x29, 0x5, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000800)={0x0, r0, 0x1, 0x2}, 0x14) ioctl$sock_kcm_SIOCKCMUNATTACH(r9, 0x89e1, &(0x7f0000000900)={r2}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r3, 0x0, 0x8b, 0x0, &(0x7f0000000680)="3ce41f426b7dd449ae14b08e1868c456d4fe9c7993884cf18f4dd5a0bc57250243da4203e0640859184bc4c4690afefd7736e8842cd88030448e918bdb5bd9bbbd680a51261557c0477c18049c832005ebb5b185c6f233df73a21d3b3ddad8426fba2d5f8aac5df904d5e5f2e7dc4a517079e08d5b2175a276f2a5c49cc2957cb367f269898570852dd63a", 0x0, 0x5}, 0x28) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000500)='./cgroup/syz0\x00', 0x200002, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000740)={r3, 0x50, &(0x7f00000003c0)}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r2, 0x50, &(0x7f0000000840)}, 0x10) openat$cgroup_subtree(r2, &(0x7f0000000940)='cgroup.subtree_control\x00', 0x2, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x1ff, 0x0, 0x0, 0x0, 0x200000, 0xffffffffffffffff, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280), 0x2}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r10 = socket$kcm(0xa, 0x400000000002, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffc59) ioctl$sock_kcm_SIOCKCMCLONE(r10, 0x890b, &(0x7f0000000000)) ioctl$sock_kcm_SIOCKCMCLONE(r10, 0x890c, &(0x7f0000000000)) 03:53:15 executing program 3: r0 = socket$kcm(0x29, 0x2, 0x0) close(r0) fadvise64(r0, 0x0, 0x0, 0x0) 03:53:15 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='environ\x00') ioctl$FIBMAP(r0, 0x1, 0x0) 03:53:15 executing program 2: shmctl$IPC_STAT(0x0, 0x2, &(0x7f0000000000)=""/58) 03:53:15 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x20, &(0x7f0000000b80)=ANY=[@ANYBLOB="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"], 0x0, 0x1625, 0x0, 0x0, 0x41100, 0x0, [], 0x0, 0x4}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r0, 0xdb, &(0x7f0000000200)={0x0, 0x0}}, 0x393) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='cgroup.events\x00', 0x0, 0x0) write$cgroup_int(r2, &(0x7f00000007c0)=0x6, 0x12) r3 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000002c0), 0x4) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz1\x00', 0x1ff) r4 = perf_event_open$cgroup(&(0x7f0000000600)={0x0, 0x70, 0x9, 0x6, 0x8, 0x6, 0x0, 0xfffffffffffff49f, 0x2, 0x6, 0x3ff, 0x0, 0x20, 0x0, 0x1, 0x81, 0x1, 0x400, 0x4, 0xfac, 0x4, 0x1, 0x10000, 0xf1, 0xd3, 0x92b, 0x200, 0x1, 0x100000000, 0x2, 0x100000000, 0xfff, 0xfff, 0xffff, 0x3, 0xfffffffffffffffd, 0x0, 0x6, 0x0, 0x50, 0x0, @perf_config_ext={0x3f, 0x9}, 0x20000, 0x8, 0xef3, 0x7, 0x100000000, 0x8, 0xfff}, 0xffffffffffffffff, 0x2, r0, 0x8) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000b40)='cgroup.subtree_control\x00') ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x2400, 0x1) r5 = getpid() socketpair$unix(0x1, 0x7, 0x0, &(0x7f0000000540)={0xffffffffffffffff}) setsockopt$sock_attach_bpf(r6, 0x1, 0x32, &(0x7f00000005c0)=r3, 0x4) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={0x0, 0xffffffffffffffff, 0x0, 0x12, &(0x7f0000000480)='./cgroup.cpu/syz1\x00', r1}, 0x30) perf_event_open(&(0x7f0000000300)={0x5, 0x70, 0xff, 0x4, 0x1000, 0xe5af, 0x0, 0x8000, 0xd0440, 0x2, 0xffff, 0x1, 0x4, 0x1f, 0x3, 0xfffffffffffffffa, 0x5, 0x9, 0x8, 0x1, 0x3, 0x400, 0x6, 0x5, 0x401, 0x10000, 0xff, 0xb24, 0xffffffffffff8000, 0xc8a, 0x3f, 0xfffffffffffffffa, 0xffffffffffff8001, 0x200, 0x5, 0x3, 0x2, 0x93a, 0x0, 0x7fff, 0x2, @perf_bp={&(0x7f0000000100), 0x1}, 0x0, 0x0, 0xffffffffffffff4e, 0x6, 0x0, 0x4, 0xfffffffffffffffd}, r5, 0x0, r7, 0x8) r8 = openat$tun(0xffffffffffffff9c, &(0x7f0000000580)='/dev/net/tun\x00', 0x40000, 0x0) ioctl$TUNSETPERSIST(r8, 0x400454cb, 0x1) r9 = socket$kcm(0x29, 0x5, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000800)={0x0, r0, 0x1, 0x2}, 0x14) ioctl$sock_kcm_SIOCKCMUNATTACH(r9, 0x89e1, &(0x7f0000000900)={r2}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r3, 0x0, 0x8b, 0x0, &(0x7f0000000680)="3ce41f426b7dd449ae14b08e1868c456d4fe9c7993884cf18f4dd5a0bc57250243da4203e0640859184bc4c4690afefd7736e8842cd88030448e918bdb5bd9bbbd680a51261557c0477c18049c832005ebb5b185c6f233df73a21d3b3ddad8426fba2d5f8aac5df904d5e5f2e7dc4a517079e08d5b2175a276f2a5c49cc2957cb367f269898570852dd63a", 0x0, 0x5}, 0x28) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000500)='./cgroup/syz0\x00', 0x200002, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000740)={r3, 0x50, &(0x7f00000003c0)}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r2, 0x50, &(0x7f0000000840)}, 0x10) openat$cgroup_subtree(r2, &(0x7f0000000940)='cgroup.subtree_control\x00', 0x2, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x1ff, 0x0, 0x0, 0x0, 0x200000, 0xffffffffffffffff, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280), 0x2}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r10 = socket$kcm(0xa, 0x400000000002, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffc59) ioctl$sock_kcm_SIOCKCMCLONE(r10, 0x890b, &(0x7f0000000000)) ioctl$sock_kcm_SIOCKCMCLONE(r10, 0x890c, &(0x7f0000000000)) 03:53:15 executing program 2: openat$ipvs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/sys/vs/secure_tcp\x00', 0x2, 0x0) 03:53:15 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fgetxattr(r0, &(0x7f0000000080)=ANY=[@ANYBLOB='u'], 0x0, 0x0) 03:53:15 executing program 0: r0 = inotify_init() read(r0, 0x0, 0x0) r1 = inotify_add_watch(r0, &(0x7f0000000040)='./file0\x00', 0x20000000) inotify_rm_watch(r0, r1) 03:53:15 executing program 4: socket$inet(0x2, 0x4000000000000001, 0x7) 03:53:15 executing program 5: getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffff9c, 0x84, 0x13, 0x0, 0x0) r0 = syz_open_dev$swradio(&(0x7f0000000000)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$radio(0x0, 0xffffffffffffffff, 0x2) r1 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) getdents64(r1, 0x0, 0x0) r2 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r2, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r2, 0x8) r3 = socket$inet6_sctp(0xa, 0x805, 0x84) r4 = accept4(r2, 0x0, 0x0, 0x0) prctl$PR_SET_ENDIAN(0x14, 0x1) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r3, 0x84, 0x6b, &(0x7f000055bfe4), 0x0) epoll_pwait(0xffffffffffffffff, &(0x7f0000000040)=[{}, {}], 0x2, 0x0, &(0x7f0000000080), 0x8) getpgid(0x0) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r4, 0x84, 0x9, &(0x7f0000000280)={0x0, @in={{0x2, 0x0, @empty}}, 0x0, 0xac14142400000000, 0x0, 0x0, 0x54}, 0x98) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000780)={{{@in=@dev, @in6=@local}}, {{@in6=@mcast2}, 0x0, @in6=@dev}}, 0x0) ioctl$SIOCAX25ADDFWD(r0, 0x89ea, 0x0) syz_mount_image$gfs2(&(0x7f00000003c0)='gfs2\x00', 0x0, 0x87, 0x0, &(0x7f00000005c0), 0x1040040, 0x0) readv(r1, &(0x7f0000000500)=[{&(0x7f0000000400)=""/217, 0xd9}], 0x1) 03:53:15 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x20, &(0x7f0000000b80)=ANY=[@ANYBLOB="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"], 0x0, 0x1625, 0x0, 0x0, 0x41100, 0x0, [], 0x0, 0x4}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r0, 0xdb, &(0x7f0000000200)={0x0, 0x0}}, 0x393) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='cgroup.events\x00', 0x0, 0x0) write$cgroup_int(r2, &(0x7f00000007c0)=0x6, 0x12) r3 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000002c0), 0x4) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz1\x00', 0x1ff) r4 = perf_event_open$cgroup(&(0x7f0000000600)={0x0, 0x70, 0x9, 0x6, 0x8, 0x6, 0x0, 0xfffffffffffff49f, 0x2, 0x6, 0x3ff, 0x0, 0x20, 0x0, 0x1, 0x81, 0x1, 0x400, 0x4, 0xfac, 0x4, 0x1, 0x10000, 0xf1, 0xd3, 0x92b, 0x200, 0x1, 0x100000000, 0x2, 0x100000000, 0xfff, 0xfff, 0xffff, 0x3, 0xfffffffffffffffd, 0x0, 0x6, 0x0, 0x50, 0x0, @perf_config_ext={0x3f, 0x9}, 0x20000, 0x8, 0xef3, 0x7, 0x100000000, 0x8, 0xfff}, 0xffffffffffffffff, 0x2, r0, 0x8) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000b40)='cgroup.subtree_control\x00') ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x2400, 0x1) r5 = getpid() socketpair$unix(0x1, 0x7, 0x0, &(0x7f0000000540)={0xffffffffffffffff}) setsockopt$sock_attach_bpf(r6, 0x1, 0x32, &(0x7f00000005c0)=r3, 0x4) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={0x0, 0xffffffffffffffff, 0x0, 0x12, &(0x7f0000000480)='./cgroup.cpu/syz1\x00', r1}, 0x30) perf_event_open(&(0x7f0000000300)={0x5, 0x70, 0xff, 0x4, 0x1000, 0xe5af, 0x0, 0x8000, 0xd0440, 0x2, 0xffff, 0x1, 0x4, 0x1f, 0x3, 0xfffffffffffffffa, 0x5, 0x9, 0x8, 0x1, 0x3, 0x400, 0x6, 0x5, 0x401, 0x10000, 0xff, 0xb24, 0xffffffffffff8000, 0xc8a, 0x3f, 0xfffffffffffffffa, 0xffffffffffff8001, 0x200, 0x5, 0x3, 0x2, 0x93a, 0x0, 0x7fff, 0x2, @perf_bp={&(0x7f0000000100), 0x1}, 0x0, 0x0, 0xffffffffffffff4e, 0x6, 0x0, 0x4, 0xfffffffffffffffd}, r5, 0x0, r7, 0x8) r8 = openat$tun(0xffffffffffffff9c, &(0x7f0000000580)='/dev/net/tun\x00', 0x40000, 0x0) ioctl$TUNSETPERSIST(r8, 0x400454cb, 0x1) r9 = socket$kcm(0x29, 0x5, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000800)={0x0, r0, 0x1, 0x2}, 0x14) ioctl$sock_kcm_SIOCKCMUNATTACH(r9, 0x89e1, &(0x7f0000000900)={r2}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r3, 0x0, 0x8b, 0x0, &(0x7f0000000680)="3ce41f426b7dd449ae14b08e1868c456d4fe9c7993884cf18f4dd5a0bc57250243da4203e0640859184bc4c4690afefd7736e8842cd88030448e918bdb5bd9bbbd680a51261557c0477c18049c832005ebb5b185c6f233df73a21d3b3ddad8426fba2d5f8aac5df904d5e5f2e7dc4a517079e08d5b2175a276f2a5c49cc2957cb367f269898570852dd63a", 0x0, 0x5}, 0x28) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000500)='./cgroup/syz0\x00', 0x200002, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000740)={r3, 0x50, &(0x7f00000003c0)}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r2, 0x50, &(0x7f0000000840)}, 0x10) openat$cgroup_subtree(r2, &(0x7f0000000940)='cgroup.subtree_control\x00', 0x2, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x1ff, 0x0, 0x0, 0x0, 0x200000, 0xffffffffffffffff, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280), 0x2}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r10 = socket$kcm(0xa, 0x400000000002, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffc59) ioctl$sock_kcm_SIOCKCMCLONE(r10, 0x890b, &(0x7f0000000000)) ioctl$sock_kcm_SIOCKCMCLONE(r10, 0x890c, &(0x7f0000000000)) 03:53:15 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$inet6_int(r0, 0x29, 0x3b, 0x0, &(0x7f00000000c0)=0x1c2) 03:53:15 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x482, &(0x7f0000000040)={0x3f, @multicast2, 0x0, 0x1, 'lc\x00', 0x0, 0xfff}, 0x2c) 03:53:15 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x20, &(0x7f0000000b80)=ANY=[@ANYBLOB="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"], 0x0, 0x1625, 0x0, 0x0, 0x41100, 0x1}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r0, 0xdb, &(0x7f0000000200)={0x0, 0x0}}, 0x393) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='cgroup.events\x00', 0x0, 0x0) write$cgroup_int(r2, &(0x7f00000007c0)=0x6, 0x12) r3 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000002c0), 0x4) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz1\x00', 0x1ff) r4 = perf_event_open$cgroup(&(0x7f0000000600)={0x0, 0x70, 0x9, 0x6, 0x8, 0x6, 0x0, 0xfffffffffffff49f, 0x2, 0x6, 0x3ff, 0x0, 0x20, 0x0, 0x1, 0x81, 0x1, 0x400, 0x4, 0xfac, 0x4, 0x1, 0x10000, 0xf1, 0xd3, 0x92b, 0x200, 0x1, 0x100000000, 0x2, 0x100000000, 0xfff, 0xfff, 0xffff, 0x3, 0xfffffffffffffffd, 0x0, 0x6, 0x0, 0x50, 0x0, @perf_config_ext={0x3f, 0x9}, 0x20000, 0x8, 0xef3, 0x7, 0x100000000, 0x8, 0xfff}, 0xffffffffffffffff, 0x2, r0, 0x8) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000b40)='cgroup.subtree_control\x00') ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x2400, 0x1) r5 = getpid() socketpair$unix(0x1, 0x7, 0x0, &(0x7f0000000540)={0xffffffffffffffff}) setsockopt$sock_attach_bpf(r6, 0x1, 0x32, &(0x7f00000005c0)=r3, 0x4) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={0x0, 0xffffffffffffffff, 0x0, 0x12, &(0x7f0000000480)='./cgroup.cpu/syz1\x00', r1}, 0x30) perf_event_open(&(0x7f0000000300)={0x5, 0x70, 0xff, 0x4, 0x1000, 0xe5af, 0x0, 0x8000, 0xd0440, 0x2, 0xffff, 0x1, 0x4, 0x1f, 0x3, 0xfffffffffffffffa, 0x5, 0x9, 0x8, 0x1, 0x3, 0x400, 0x6, 0x5, 0x401, 0x10000, 0xff, 0xb24, 0xffffffffffff8000, 0xc8a, 0x3f, 0xfffffffffffffffa, 0xffffffffffff8001, 0x200, 0x5, 0x3, 0x2, 0x93a, 0x0, 0x7fff, 0x2, @perf_bp={&(0x7f0000000100), 0x1}, 0x0, 0x0, 0xffffffffffffff4e, 0x6, 0x0, 0x4, 0xfffffffffffffffd}, r5, 0x0, r7, 0x8) r8 = openat$tun(0xffffffffffffff9c, &(0x7f0000000580)='/dev/net/tun\x00', 0x40000, 0x0) ioctl$TUNSETPERSIST(r8, 0x400454cb, 0x1) r9 = socket$kcm(0x29, 0x5, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000800)={0x0, r0, 0x1, 0x2}, 0x14) ioctl$sock_kcm_SIOCKCMUNATTACH(r9, 0x89e1, &(0x7f0000000900)={r2}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r3, 0x0, 0x8b, 0x0, &(0x7f0000000680)="3ce41f426b7dd449ae14b08e1868c456d4fe9c7993884cf18f4dd5a0bc57250243da4203e0640859184bc4c4690afefd7736e8842cd88030448e918bdb5bd9bbbd680a51261557c0477c18049c832005ebb5b185c6f233df73a21d3b3ddad8426fba2d5f8aac5df904d5e5f2e7dc4a517079e08d5b2175a276f2a5c49cc2957cb367f269898570852dd63a", 0x0, 0x5}, 0x28) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000500)='./cgroup/syz0\x00', 0x200002, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000740)={r3, 0x50, &(0x7f00000003c0)}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r2, 0x50, &(0x7f0000000840)}, 0x10) openat$cgroup_subtree(r2, &(0x7f0000000940)='cgroup.subtree_control\x00', 0x2, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x1ff, 0x0, 0x0, 0x0, 0x200000, 0xffffffffffffffff, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280), 0x2}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r10 = socket$kcm(0xa, 0x400000000002, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffc59) ioctl$sock_kcm_SIOCKCMCLONE(r10, 0x890b, &(0x7f0000000000)) ioctl$sock_kcm_SIOCKCMCLONE(r10, 0x890c, &(0x7f0000000000)) 03:53:16 executing program 3: unshare(0x2000400) r0 = syz_open_dev$mice(&(0x7f0000000080)='/dev/input/mice\x00', 0x0, 0x0) recvfrom$unix(r0, 0x0, 0x0, 0x0, 0x0, 0x0) [ 1823.659180] IPVS: set_ctl: invalid protocol: 63 224.0.0.2:0 03:53:16 executing program 4: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r0, 0x84, 0x1b, 0x0, &(0x7f00000001c0)) [ 1823.705135] IPVS: set_ctl: invalid protocol: 63 224.0.0.2:0 03:53:16 executing program 2: sched_rr_get_interval(0x0, &(0x7f0000000040)) 03:53:16 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x20, &(0x7f0000000b80)=ANY=[@ANYBLOB="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"], 0x0, 0x1625, 0x0, 0x0, 0x41100, 0x1}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r0, 0xdb, &(0x7f0000000200)={0x0, 0x0}}, 0x393) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='cgroup.events\x00', 0x0, 0x0) write$cgroup_int(r2, &(0x7f00000007c0)=0x6, 0x12) r3 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000002c0), 0x4) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz1\x00', 0x1ff) r4 = perf_event_open$cgroup(&(0x7f0000000600)={0x0, 0x70, 0x9, 0x6, 0x8, 0x6, 0x0, 0xfffffffffffff49f, 0x2, 0x6, 0x3ff, 0x0, 0x20, 0x0, 0x1, 0x81, 0x1, 0x400, 0x4, 0xfac, 0x4, 0x1, 0x10000, 0xf1, 0xd3, 0x92b, 0x200, 0x1, 0x100000000, 0x2, 0x100000000, 0xfff, 0xfff, 0xffff, 0x3, 0xfffffffffffffffd, 0x0, 0x6, 0x0, 0x50, 0x0, @perf_config_ext={0x3f, 0x9}, 0x20000, 0x8, 0xef3, 0x7, 0x100000000, 0x8, 0xfff}, 0xffffffffffffffff, 0x2, r0, 0x8) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000b40)='cgroup.subtree_control\x00') ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x2400, 0x1) r5 = getpid() socketpair$unix(0x1, 0x7, 0x0, &(0x7f0000000540)={0xffffffffffffffff}) setsockopt$sock_attach_bpf(r6, 0x1, 0x32, &(0x7f00000005c0)=r3, 0x4) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={0x0, 0xffffffffffffffff, 0x0, 0x12, &(0x7f0000000480)='./cgroup.cpu/syz1\x00', r1}, 0x30) perf_event_open(&(0x7f0000000300)={0x5, 0x70, 0xff, 0x4, 0x1000, 0xe5af, 0x0, 0x8000, 0xd0440, 0x2, 0xffff, 0x1, 0x4, 0x1f, 0x3, 0xfffffffffffffffa, 0x5, 0x9, 0x8, 0x1, 0x3, 0x400, 0x6, 0x5, 0x401, 0x10000, 0xff, 0xb24, 0xffffffffffff8000, 0xc8a, 0x3f, 0xfffffffffffffffa, 0xffffffffffff8001, 0x200, 0x5, 0x3, 0x2, 0x93a, 0x0, 0x7fff, 0x2, @perf_bp={&(0x7f0000000100), 0x1}, 0x0, 0x0, 0xffffffffffffff4e, 0x6, 0x0, 0x4, 0xfffffffffffffffd}, r5, 0x0, r7, 0x8) r8 = openat$tun(0xffffffffffffff9c, &(0x7f0000000580)='/dev/net/tun\x00', 0x40000, 0x0) ioctl$TUNSETPERSIST(r8, 0x400454cb, 0x1) r9 = socket$kcm(0x29, 0x5, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000800)={0x0, r0, 0x1, 0x2}, 0x14) ioctl$sock_kcm_SIOCKCMUNATTACH(r9, 0x89e1, &(0x7f0000000900)={r2}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r3, 0x0, 0x8b, 0x0, &(0x7f0000000680)="3ce41f426b7dd449ae14b08e1868c456d4fe9c7993884cf18f4dd5a0bc57250243da4203e0640859184bc4c4690afefd7736e8842cd88030448e918bdb5bd9bbbd680a51261557c0477c18049c832005ebb5b185c6f233df73a21d3b3ddad8426fba2d5f8aac5df904d5e5f2e7dc4a517079e08d5b2175a276f2a5c49cc2957cb367f269898570852dd63a", 0x0, 0x5}, 0x28) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000500)='./cgroup/syz0\x00', 0x200002, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000740)={r3, 0x50, &(0x7f00000003c0)}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r2, 0x50, &(0x7f0000000840)}, 0x10) openat$cgroup_subtree(r2, &(0x7f0000000940)='cgroup.subtree_control\x00', 0x2, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x1ff, 0x0, 0x0, 0x0, 0x200000, 0xffffffffffffffff, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280), 0x2}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r10 = socket$kcm(0xa, 0x400000000002, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffc59) ioctl$sock_kcm_SIOCKCMCLONE(r10, 0x890b, &(0x7f0000000000)) ioctl$sock_kcm_SIOCKCMCLONE(r10, 0x890c, &(0x7f0000000000)) 03:53:16 executing program 3: r0 = syz_open_dev$video(&(0x7f0000000040)='/dev/video#\x00', 0x0, 0x0) ioctl$VIDIOC_PREPARE_BUF(r0, 0xc058565d, &(0x7f0000000240)={0x0, 0x10000000000b, 0x4, 0x0, {0x0, 0x7530}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "2b75098a"}, 0x0, 0x0, @planes=0x0, 0x4}) 03:53:16 executing program 0: mkdir(0x0, 0x0) r0 = inotify_init() read(r0, 0x0, 0x0) r1 = inotify_add_watch(r0, &(0x7f0000000040)='./file0\x00', 0x20000000) inotify_rm_watch(r0, r1) 03:53:16 executing program 4: r0 = semget$private(0x0, 0x5, 0x0) semctl$IPC_STAT(r0, 0x0, 0x2, &(0x7f0000000200)=""/95) 03:53:16 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00005befdc)) r1 = syz_open_pts(r0, 0x0) close(r0) ioctl$int_in(r1, 0x0, 0x0) 03:53:16 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x20, &(0x7f0000000b80)=ANY=[@ANYBLOB="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"], 0x0, 0x1625, 0x0, 0x0, 0x41100, 0x1}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r0, 0xdb, &(0x7f0000000200)={0x0, 0x0}}, 0x393) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='cgroup.events\x00', 0x0, 0x0) write$cgroup_int(r2, &(0x7f00000007c0)=0x6, 0x12) r3 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000002c0), 0x4) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz1\x00', 0x1ff) r4 = perf_event_open$cgroup(&(0x7f0000000600)={0x0, 0x70, 0x9, 0x6, 0x8, 0x6, 0x0, 0xfffffffffffff49f, 0x2, 0x6, 0x3ff, 0x0, 0x20, 0x0, 0x1, 0x81, 0x1, 0x400, 0x4, 0xfac, 0x4, 0x1, 0x10000, 0xf1, 0xd3, 0x92b, 0x200, 0x1, 0x100000000, 0x2, 0x100000000, 0xfff, 0xfff, 0xffff, 0x3, 0xfffffffffffffffd, 0x0, 0x6, 0x0, 0x50, 0x0, @perf_config_ext={0x3f, 0x9}, 0x20000, 0x8, 0xef3, 0x7, 0x100000000, 0x8, 0xfff}, 0xffffffffffffffff, 0x2, r0, 0x8) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000b40)='cgroup.subtree_control\x00') ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x2400, 0x1) r5 = getpid() socketpair$unix(0x1, 0x7, 0x0, &(0x7f0000000540)={0xffffffffffffffff}) setsockopt$sock_attach_bpf(r6, 0x1, 0x32, &(0x7f00000005c0)=r3, 0x4) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={0x0, 0xffffffffffffffff, 0x0, 0x12, &(0x7f0000000480)='./cgroup.cpu/syz1\x00', r1}, 0x30) perf_event_open(&(0x7f0000000300)={0x5, 0x70, 0xff, 0x4, 0x1000, 0xe5af, 0x0, 0x8000, 0xd0440, 0x2, 0xffff, 0x1, 0x4, 0x1f, 0x3, 0xfffffffffffffffa, 0x5, 0x9, 0x8, 0x1, 0x3, 0x400, 0x6, 0x5, 0x401, 0x10000, 0xff, 0xb24, 0xffffffffffff8000, 0xc8a, 0x3f, 0xfffffffffffffffa, 0xffffffffffff8001, 0x200, 0x5, 0x3, 0x2, 0x93a, 0x0, 0x7fff, 0x2, @perf_bp={&(0x7f0000000100), 0x1}, 0x0, 0x0, 0xffffffffffffff4e, 0x6, 0x0, 0x4, 0xfffffffffffffffd}, r5, 0x0, r7, 0x8) r8 = openat$tun(0xffffffffffffff9c, &(0x7f0000000580)='/dev/net/tun\x00', 0x40000, 0x0) ioctl$TUNSETPERSIST(r8, 0x400454cb, 0x1) r9 = socket$kcm(0x29, 0x5, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000800)={0x0, r0, 0x1, 0x2}, 0x14) ioctl$sock_kcm_SIOCKCMUNATTACH(r9, 0x89e1, &(0x7f0000000900)={r2}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r3, 0x0, 0x8b, 0x0, &(0x7f0000000680)="3ce41f426b7dd449ae14b08e1868c456d4fe9c7993884cf18f4dd5a0bc57250243da4203e0640859184bc4c4690afefd7736e8842cd88030448e918bdb5bd9bbbd680a51261557c0477c18049c832005ebb5b185c6f233df73a21d3b3ddad8426fba2d5f8aac5df904d5e5f2e7dc4a517079e08d5b2175a276f2a5c49cc2957cb367f269898570852dd63a", 0x0, 0x5}, 0x28) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000500)='./cgroup/syz0\x00', 0x200002, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000740)={r3, 0x50, &(0x7f00000003c0)}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r2, 0x50, &(0x7f0000000840)}, 0x10) openat$cgroup_subtree(r2, &(0x7f0000000940)='cgroup.subtree_control\x00', 0x2, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x1ff, 0x0, 0x0, 0x0, 0x200000, 0xffffffffffffffff, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280), 0x2}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r10 = socket$kcm(0xa, 0x400000000002, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffc59) ioctl$sock_kcm_SIOCKCMCLONE(r10, 0x890b, &(0x7f0000000000)) ioctl$sock_kcm_SIOCKCMCLONE(r10, 0x890c, &(0x7f0000000000)) 03:53:16 executing program 3: r0 = syz_open_dev$video(&(0x7f0000000240)='/dev/video#\x00', 0x0, 0x0) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000280)={0x0, 0x0, 0x0, {0x9, @pix_mp}}) 03:53:16 executing program 5: getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffff9c, 0x84, 0x13, 0x0, 0x0) r0 = syz_open_dev$swradio(&(0x7f0000000000)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$radio(0x0, 0xffffffffffffffff, 0x2) r1 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) getdents64(r1, 0x0, 0x0) r2 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r2, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r2, 0x8) r3 = socket$inet6_sctp(0xa, 0x805, 0x84) r4 = accept4(r2, 0x0, 0x0, 0x0) prctl$PR_SET_ENDIAN(0x14, 0x1) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r3, 0x84, 0x6b, &(0x7f000055bfe4), 0x0) epoll_pwait(0xffffffffffffffff, &(0x7f0000000040)=[{}, {}], 0x2, 0x0, &(0x7f0000000080), 0x8) getpgid(0x0) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r4, 0x84, 0x9, &(0x7f0000000280)={0x0, @in={{0x2, 0x0, @empty}}, 0x0, 0xac14142400000000, 0x0, 0x0, 0x54}, 0x98) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000780)={{{@in=@dev, @in6=@local}}, {{@in6=@mcast2}, 0x0, @in6=@dev}}, 0x0) ioctl$SIOCAX25ADDFWD(r0, 0x89ea, 0x0) syz_mount_image$gfs2(&(0x7f00000003c0)='gfs2\x00', 0x0, 0x87, 0x0, &(0x7f00000005c0), 0x1040040, 0x0) readv(r1, &(0x7f0000000500)=[{&(0x7f0000000400)=""/217, 0xd9}], 0x1) 03:53:16 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x20, &(0x7f0000000b80)=ANY=[@ANYBLOB="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"], 0x0, 0x1625, 0x0, 0x0, 0x41100, 0x1, [], 0x0, 0x4}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='cgroup.events\x00', 0x0, 0x0) write$cgroup_int(r1, &(0x7f00000007c0)=0x6, 0x12) r2 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000002c0), 0x4) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz1\x00', 0x1ff) r3 = perf_event_open$cgroup(&(0x7f0000000600)={0x0, 0x70, 0x9, 0x6, 0x8, 0x6, 0x0, 0xfffffffffffff49f, 0x2, 0x6, 0x3ff, 0x0, 0x20, 0x0, 0x1, 0x81, 0x1, 0x400, 0x4, 0xfac, 0x4, 0x1, 0x10000, 0xf1, 0xd3, 0x92b, 0x200, 0x1, 0x100000000, 0x2, 0x100000000, 0xfff, 0xfff, 0xffff, 0x3, 0xfffffffffffffffd, 0x0, 0x6, 0x0, 0x50, 0x0, @perf_config_ext={0x3f, 0x9}, 0x20000, 0x8, 0xef3, 0x7, 0x100000000, 0x8, 0xfff}, 0xffffffffffffffff, 0x2, r0, 0x8) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000b40)='cgroup.subtree_control\x00') ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0x1) r4 = getpid() socketpair$unix(0x1, 0x7, 0x0, &(0x7f0000000540)={0xffffffffffffffff}) setsockopt$sock_attach_bpf(r5, 0x1, 0x32, &(0x7f00000005c0)=r2, 0x4) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={0x0, 0xffffffffffffffff, 0x0, 0x12, &(0x7f0000000480)='./cgroup.cpu/syz1\x00'}, 0x30) perf_event_open(&(0x7f0000000300)={0x5, 0x70, 0xff, 0x4, 0x1000, 0xe5af, 0x0, 0x8000, 0xd0440, 0x2, 0xffff, 0x1, 0x4, 0x1f, 0x3, 0xfffffffffffffffa, 0x5, 0x9, 0x8, 0x1, 0x3, 0x400, 0x6, 0x5, 0x401, 0x10000, 0xff, 0xb24, 0xffffffffffff8000, 0xc8a, 0x3f, 0xfffffffffffffffa, 0xffffffffffff8001, 0x200, 0x5, 0x3, 0x2, 0x93a, 0x0, 0x7fff, 0x2, @perf_bp={&(0x7f0000000100), 0x1}, 0x0, 0x0, 0xffffffffffffff4e, 0x6, 0x0, 0x4, 0xfffffffffffffffd}, r4, 0x0, r6, 0x8) r7 = openat$tun(0xffffffffffffff9c, &(0x7f0000000580)='/dev/net/tun\x00', 0x40000, 0x0) ioctl$TUNSETPERSIST(r7, 0x400454cb, 0x1) r8 = socket$kcm(0x29, 0x5, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000800)={0x0, r0, 0x1, 0x2}, 0x14) ioctl$sock_kcm_SIOCKCMUNATTACH(r8, 0x89e1, &(0x7f0000000900)={r1}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r2, 0x0, 0x8b, 0x0, &(0x7f0000000680)="3ce41f426b7dd449ae14b08e1868c456d4fe9c7993884cf18f4dd5a0bc57250243da4203e0640859184bc4c4690afefd7736e8842cd88030448e918bdb5bd9bbbd680a51261557c0477c18049c832005ebb5b185c6f233df73a21d3b3ddad8426fba2d5f8aac5df904d5e5f2e7dc4a517079e08d5b2175a276f2a5c49cc2957cb367f269898570852dd63a", 0x0, 0x5}, 0x28) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000500)='./cgroup/syz0\x00', 0x200002, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000740)={r2, 0x50, &(0x7f00000003c0)}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r1, 0x50, &(0x7f0000000840)}, 0x10) openat$cgroup_subtree(r1, &(0x7f0000000940)='cgroup.subtree_control\x00', 0x2, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x1ff, 0x0, 0x0, 0x0, 0x200000, 0xffffffffffffffff, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280), 0x2}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r9 = socket$kcm(0xa, 0x400000000002, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffc59) ioctl$sock_kcm_SIOCKCMCLONE(r9, 0x890b, &(0x7f0000000000)) ioctl$sock_kcm_SIOCKCMCLONE(r9, 0x890c, &(0x7f0000000000)) 03:53:16 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_CPUID2(r2, 0x4008ae90, &(0x7f0000000180)) 03:53:16 executing program 3: syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) syz_open_dev$ndb(0x0, 0xffffffffffffffff, 0x0) 03:53:16 executing program 4: r0 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0) connect$netlink(r0, 0x0, 0x0) 03:53:16 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x20, &(0x7f0000000b80)=ANY=[@ANYBLOB="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"], 0x0, 0x1625, 0x0, 0x0, 0x41100, 0x1, [], 0x0, 0x4}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='cgroup.events\x00', 0x0, 0x0) write$cgroup_int(r1, &(0x7f00000007c0)=0x6, 0x12) r2 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000002c0), 0x4) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz1\x00', 0x1ff) r3 = perf_event_open$cgroup(&(0x7f0000000600)={0x0, 0x70, 0x9, 0x6, 0x8, 0x6, 0x0, 0xfffffffffffff49f, 0x2, 0x6, 0x3ff, 0x0, 0x20, 0x0, 0x1, 0x81, 0x1, 0x400, 0x4, 0xfac, 0x4, 0x1, 0x10000, 0xf1, 0xd3, 0x92b, 0x200, 0x1, 0x100000000, 0x2, 0x100000000, 0xfff, 0xfff, 0xffff, 0x3, 0xfffffffffffffffd, 0x0, 0x6, 0x0, 0x50, 0x0, @perf_config_ext={0x3f, 0x9}, 0x20000, 0x8, 0xef3, 0x7, 0x100000000, 0x8, 0xfff}, 0xffffffffffffffff, 0x2, r0, 0x8) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000b40)='cgroup.subtree_control\x00') ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0x1) r4 = getpid() socketpair$unix(0x1, 0x7, 0x0, &(0x7f0000000540)={0xffffffffffffffff}) setsockopt$sock_attach_bpf(r5, 0x1, 0x32, &(0x7f00000005c0)=r2, 0x4) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={0x0, 0xffffffffffffffff, 0x0, 0x12, &(0x7f0000000480)='./cgroup.cpu/syz1\x00'}, 0x30) perf_event_open(&(0x7f0000000300)={0x5, 0x70, 0xff, 0x4, 0x1000, 0xe5af, 0x0, 0x8000, 0xd0440, 0x2, 0xffff, 0x1, 0x4, 0x1f, 0x3, 0xfffffffffffffffa, 0x5, 0x9, 0x8, 0x1, 0x3, 0x400, 0x6, 0x5, 0x401, 0x10000, 0xff, 0xb24, 0xffffffffffff8000, 0xc8a, 0x3f, 0xfffffffffffffffa, 0xffffffffffff8001, 0x200, 0x5, 0x3, 0x2, 0x93a, 0x0, 0x7fff, 0x2, @perf_bp={&(0x7f0000000100), 0x1}, 0x0, 0x0, 0xffffffffffffff4e, 0x6, 0x0, 0x4, 0xfffffffffffffffd}, r4, 0x0, r6, 0x8) r7 = openat$tun(0xffffffffffffff9c, &(0x7f0000000580)='/dev/net/tun\x00', 0x40000, 0x0) ioctl$TUNSETPERSIST(r7, 0x400454cb, 0x1) r8 = socket$kcm(0x29, 0x5, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000800)={0x0, r0, 0x1, 0x2}, 0x14) ioctl$sock_kcm_SIOCKCMUNATTACH(r8, 0x89e1, &(0x7f0000000900)={r1}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r2, 0x0, 0x8b, 0x0, &(0x7f0000000680)="3ce41f426b7dd449ae14b08e1868c456d4fe9c7993884cf18f4dd5a0bc57250243da4203e0640859184bc4c4690afefd7736e8842cd88030448e918bdb5bd9bbbd680a51261557c0477c18049c832005ebb5b185c6f233df73a21d3b3ddad8426fba2d5f8aac5df904d5e5f2e7dc4a517079e08d5b2175a276f2a5c49cc2957cb367f269898570852dd63a", 0x0, 0x5}, 0x28) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000500)='./cgroup/syz0\x00', 0x200002, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000740)={r2, 0x50, &(0x7f00000003c0)}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r1, 0x50, &(0x7f0000000840)}, 0x10) openat$cgroup_subtree(r1, &(0x7f0000000940)='cgroup.subtree_control\x00', 0x2, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x1ff, 0x0, 0x0, 0x0, 0x200000, 0xffffffffffffffff, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280), 0x2}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r9 = socket$kcm(0xa, 0x400000000002, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffc59) ioctl$sock_kcm_SIOCKCMCLONE(r9, 0x890b, &(0x7f0000000000)) ioctl$sock_kcm_SIOCKCMCLONE(r9, 0x890c, &(0x7f0000000000)) 03:53:17 executing program 3: request_key(&(0x7f0000000000)='id_legacy\x00', 0x0, 0x0, 0x0) [ 1824.642535] net_ratelimit: 18 callbacks suppressed [ 1824.642544] protocol 88fb is buggy, dev hsr_slave_0 [ 1824.652672] protocol 88fb is buggy, dev hsr_slave_1 [ 1824.657798] protocol 88fb is buggy, dev hsr_slave_0 [ 1824.663592] protocol 88fb is buggy, dev hsr_slave_1 [ 1824.668735] protocol 88fb is buggy, dev hsr_slave_0 [ 1824.673833] protocol 88fb is buggy, dev hsr_slave_1 [ 1824.678959] protocol 88fb is buggy, dev hsr_slave_0 [ 1824.684057] protocol 88fb is buggy, dev hsr_slave_1 03:53:17 executing program 0: mkdir(0x0, 0x0) r0 = inotify_init() read(r0, 0x0, 0x0) r1 = inotify_add_watch(r0, &(0x7f0000000040)='./file0\x00', 0x20000000) inotify_rm_watch(r0, r1) 03:53:17 executing program 4: r0 = syz_open_dev$sndtimer(&(0x7f00000000c0)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f0000000040)) 03:53:17 executing program 2: unshare(0x20400) r0 = openat$md(0xffffffffffffff9c, &(0x7f0000000000)='/dev/md0\x00', 0x0, 0x0) ioctl$VHOST_SET_FEATURES(r0, 0x4008af00, 0x0) 03:53:17 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x20, &(0x7f0000000b80)=ANY=[@ANYBLOB="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"], 0x0, 0x1625, 0x0, 0x0, 0x41100, 0x1, [], 0x0, 0x4}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='cgroup.events\x00', 0x0, 0x0) write$cgroup_int(r1, &(0x7f00000007c0)=0x6, 0x12) r2 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000002c0), 0x4) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz1\x00', 0x1ff) r3 = perf_event_open$cgroup(&(0x7f0000000600)={0x0, 0x70, 0x9, 0x6, 0x8, 0x6, 0x0, 0xfffffffffffff49f, 0x2, 0x6, 0x3ff, 0x0, 0x20, 0x0, 0x1, 0x81, 0x1, 0x400, 0x4, 0xfac, 0x4, 0x1, 0x10000, 0xf1, 0xd3, 0x92b, 0x200, 0x1, 0x100000000, 0x2, 0x100000000, 0xfff, 0xfff, 0xffff, 0x3, 0xfffffffffffffffd, 0x0, 0x6, 0x0, 0x50, 0x0, @perf_config_ext={0x3f, 0x9}, 0x20000, 0x8, 0xef3, 0x7, 0x100000000, 0x8, 0xfff}, 0xffffffffffffffff, 0x2, r0, 0x8) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000b40)='cgroup.subtree_control\x00') ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0x1) r4 = getpid() socketpair$unix(0x1, 0x7, 0x0, &(0x7f0000000540)={0xffffffffffffffff}) setsockopt$sock_attach_bpf(r5, 0x1, 0x32, &(0x7f00000005c0)=r2, 0x4) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={0x0, 0xffffffffffffffff, 0x0, 0x12, &(0x7f0000000480)='./cgroup.cpu/syz1\x00'}, 0x30) perf_event_open(&(0x7f0000000300)={0x5, 0x70, 0xff, 0x4, 0x1000, 0xe5af, 0x0, 0x8000, 0xd0440, 0x2, 0xffff, 0x1, 0x4, 0x1f, 0x3, 0xfffffffffffffffa, 0x5, 0x9, 0x8, 0x1, 0x3, 0x400, 0x6, 0x5, 0x401, 0x10000, 0xff, 0xb24, 0xffffffffffff8000, 0xc8a, 0x3f, 0xfffffffffffffffa, 0xffffffffffff8001, 0x200, 0x5, 0x3, 0x2, 0x93a, 0x0, 0x7fff, 0x2, @perf_bp={&(0x7f0000000100), 0x1}, 0x0, 0x0, 0xffffffffffffff4e, 0x6, 0x0, 0x4, 0xfffffffffffffffd}, r4, 0x0, r6, 0x8) r7 = openat$tun(0xffffffffffffff9c, &(0x7f0000000580)='/dev/net/tun\x00', 0x40000, 0x0) ioctl$TUNSETPERSIST(r7, 0x400454cb, 0x1) r8 = socket$kcm(0x29, 0x5, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000800)={0x0, r0, 0x1, 0x2}, 0x14) ioctl$sock_kcm_SIOCKCMUNATTACH(r8, 0x89e1, &(0x7f0000000900)={r1}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r2, 0x0, 0x8b, 0x0, &(0x7f0000000680)="3ce41f426b7dd449ae14b08e1868c456d4fe9c7993884cf18f4dd5a0bc57250243da4203e0640859184bc4c4690afefd7736e8842cd88030448e918bdb5bd9bbbd680a51261557c0477c18049c832005ebb5b185c6f233df73a21d3b3ddad8426fba2d5f8aac5df904d5e5f2e7dc4a517079e08d5b2175a276f2a5c49cc2957cb367f269898570852dd63a", 0x0, 0x5}, 0x28) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000500)='./cgroup/syz0\x00', 0x200002, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000740)={r2, 0x50, &(0x7f00000003c0)}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r1, 0x50, &(0x7f0000000840)}, 0x10) openat$cgroup_subtree(r1, &(0x7f0000000940)='cgroup.subtree_control\x00', 0x2, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x1ff, 0x0, 0x0, 0x0, 0x200000, 0xffffffffffffffff, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280), 0x2}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r9 = socket$kcm(0xa, 0x400000000002, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffc59) ioctl$sock_kcm_SIOCKCMCLONE(r9, 0x890b, &(0x7f0000000000)) ioctl$sock_kcm_SIOCKCMCLONE(r9, 0x890c, &(0x7f0000000000)) 03:53:17 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000200)={0x0, 0x11, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_NOTIFY(r0, &(0x7f0000000300)={0xf, 0x8, 0xfa00, {r1}}, 0x10) 03:53:17 executing program 5: getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffff9c, 0x84, 0x13, 0x0, 0x0) r0 = syz_open_dev$swradio(&(0x7f0000000000)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$radio(0x0, 0xffffffffffffffff, 0x2) r1 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) getdents64(r1, 0x0, 0x0) r2 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r2, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r2, 0x8) r3 = socket$inet6_sctp(0xa, 0x805, 0x84) r4 = accept4(r2, 0x0, 0x0, 0x0) prctl$PR_SET_ENDIAN(0x14, 0x1) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r3, 0x84, 0x6b, &(0x7f000055bfe4), 0x0) epoll_pwait(0xffffffffffffffff, &(0x7f0000000040)=[{}, {}], 0x2, 0x0, &(0x7f0000000080), 0x8) getpgid(0x0) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r4, 0x84, 0x9, &(0x7f0000000280)={0x0, @in={{0x2, 0x0, @empty}}, 0x0, 0xac14142400000000, 0x0, 0x0, 0x54}, 0x98) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000780)={{{@in=@dev, @in6=@local}}, {{@in6=@mcast2}, 0x0, @in6=@dev}}, 0x0) ioctl$SIOCAX25ADDFWD(r0, 0x89ea, 0x0) syz_mount_image$gfs2(&(0x7f00000003c0)='gfs2\x00', 0x0, 0x87, 0x0, &(0x7f00000005c0), 0x1040040, 0x0) readv(r1, &(0x7f0000000500)=[{&(0x7f0000000400)=""/217, 0xd9}], 0x1) 03:53:17 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x20, &(0x7f0000000b80)=ANY=[@ANYBLOB="cab5674ca80400f902c8d3fc17d4a51472ff5e04a7ed68e9074e865fffffffffff6582e2a0c58f438f1a9b1af27305fb6c1d497851a00d51dddde821f356222d82de15a5bb3ca4d544c3683ff903b30637ee634a8a4fa0e19e57c7d35e4db3a02231b71023a910ac2424326e31258bde7ca760ff3ca3261a92112b3c8db9e0d79dc5ad29e05434154bba1e60d243d8fa466b27518c09e11b78ec43ab7af1d33fbd4885ee5e95b0849345d0edef0a2e68320a47938597cf0fba5ae2e93301ffc38baaf2673b7fd4628a0fe3665006d238567bdb430991e02866ad858345dc86331d91a53051b3284827fc0a870d857ecc180901feb2d1dd3be0c1ebc3fa1d00d550744d9e55"], 0x0, 0x1625, 0x0, 0x0, 0x41100, 0x1, [], 0x0, 0x4}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={0xffffffffffffffff, 0xdb, &(0x7f0000000200)={0x0, 0x0}}, 0x393) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='cgroup.events\x00', 0x0, 0x0) write$cgroup_int(r2, &(0x7f00000007c0)=0x6, 0x12) r3 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000002c0), 0x4) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz1\x00', 0x1ff) r4 = perf_event_open$cgroup(&(0x7f0000000600)={0x0, 0x70, 0x9, 0x6, 0x8, 0x6, 0x0, 0xfffffffffffff49f, 0x2, 0x6, 0x3ff, 0x0, 0x20, 0x0, 0x1, 0x81, 0x1, 0x400, 0x4, 0xfac, 0x4, 0x1, 0x10000, 0xf1, 0xd3, 0x92b, 0x200, 0x1, 0x100000000, 0x2, 0x100000000, 0xfff, 0xfff, 0xffff, 0x3, 0xfffffffffffffffd, 0x0, 0x6, 0x0, 0x50, 0x0, @perf_config_ext={0x3f, 0x9}, 0x20000, 0x8, 0xef3, 0x7, 0x100000000, 0x8, 0xfff}, 0xffffffffffffffff, 0x2, r0, 0x8) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000b40)='cgroup.subtree_control\x00') ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x2400, 0x1) r5 = getpid() socketpair$unix(0x1, 0x7, 0x0, &(0x7f0000000540)={0xffffffffffffffff}) setsockopt$sock_attach_bpf(r6, 0x1, 0x32, &(0x7f00000005c0)=r3, 0x4) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={0x0, 0xffffffffffffffff, 0x0, 0x12, &(0x7f0000000480)='./cgroup.cpu/syz1\x00', r1}, 0x30) perf_event_open(&(0x7f0000000300)={0x5, 0x70, 0xff, 0x4, 0x1000, 0xe5af, 0x0, 0x8000, 0xd0440, 0x2, 0xffff, 0x1, 0x4, 0x1f, 0x3, 0xfffffffffffffffa, 0x5, 0x9, 0x8, 0x1, 0x3, 0x400, 0x6, 0x5, 0x401, 0x10000, 0xff, 0xb24, 0xffffffffffff8000, 0xc8a, 0x3f, 0xfffffffffffffffa, 0xffffffffffff8001, 0x200, 0x5, 0x3, 0x2, 0x93a, 0x0, 0x7fff, 0x2, @perf_bp={&(0x7f0000000100), 0x1}, 0x0, 0x0, 0xffffffffffffff4e, 0x6, 0x0, 0x4, 0xfffffffffffffffd}, r5, 0x0, r7, 0x8) r8 = openat$tun(0xffffffffffffff9c, &(0x7f0000000580)='/dev/net/tun\x00', 0x40000, 0x0) ioctl$TUNSETPERSIST(r8, 0x400454cb, 0x1) r9 = socket$kcm(0x29, 0x5, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000800)={0x0, r0, 0x1, 0x2}, 0x14) ioctl$sock_kcm_SIOCKCMUNATTACH(r9, 0x89e1, &(0x7f0000000900)={r2}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r3, 0x0, 0x8b, 0x0, &(0x7f0000000680)="3ce41f426b7dd449ae14b08e1868c456d4fe9c7993884cf18f4dd5a0bc57250243da4203e0640859184bc4c4690afefd7736e8842cd88030448e918bdb5bd9bbbd680a51261557c0477c18049c832005ebb5b185c6f233df73a21d3b3ddad8426fba2d5f8aac5df904d5e5f2e7dc4a517079e08d5b2175a276f2a5c49cc2957cb367f269898570852dd63a", 0x0, 0x5}, 0x28) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000500)='./cgroup/syz0\x00', 0x200002, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000740)={r3, 0x50, &(0x7f00000003c0)}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r2, 0x50, &(0x7f0000000840)}, 0x10) openat$cgroup_subtree(r2, &(0x7f0000000940)='cgroup.subtree_control\x00', 0x2, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x1ff, 0x0, 0x0, 0x0, 0x200000, 0xffffffffffffffff, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280), 0x2}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r10 = socket$kcm(0xa, 0x400000000002, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffc59) ioctl$sock_kcm_SIOCKCMCLONE(r10, 0x890b, &(0x7f0000000000)) ioctl$sock_kcm_SIOCKCMCLONE(r10, 0x890c, &(0x7f0000000000)) 03:53:17 executing program 4: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$EBT_SO_GET_INFO(r0, 0x0, 0x80, 0x0, &(0x7f0000000280)) 03:53:17 executing program 3: io_cancel(0x0, &(0x7f0000001240)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}, 0x0) 03:53:17 executing program 2: r0 = syz_open_dev$binder(&(0x7f0000000080)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, 0x0) ioctl$LOOP_SET_FD(r0, 0x4c00, 0xffffffffffffffff) 03:53:17 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x20, &(0x7f0000000b80)=ANY=[@ANYBLOB="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"], 0x0, 0x1625, 0x0, 0x0, 0x41100, 0x1, [], 0x0, 0x4}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={0xffffffffffffffff, 0xdb, &(0x7f0000000200)={0x0, 0x0}}, 0x393) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='cgroup.events\x00', 0x0, 0x0) write$cgroup_int(r2, &(0x7f00000007c0)=0x6, 0x12) r3 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000002c0), 0x4) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz1\x00', 0x1ff) r4 = perf_event_open$cgroup(&(0x7f0000000600)={0x0, 0x70, 0x9, 0x6, 0x8, 0x6, 0x0, 0xfffffffffffff49f, 0x2, 0x6, 0x3ff, 0x0, 0x20, 0x0, 0x1, 0x81, 0x1, 0x400, 0x4, 0xfac, 0x4, 0x1, 0x10000, 0xf1, 0xd3, 0x92b, 0x200, 0x1, 0x100000000, 0x2, 0x100000000, 0xfff, 0xfff, 0xffff, 0x3, 0xfffffffffffffffd, 0x0, 0x6, 0x0, 0x50, 0x0, @perf_config_ext={0x3f, 0x9}, 0x20000, 0x8, 0xef3, 0x7, 0x100000000, 0x8, 0xfff}, 0xffffffffffffffff, 0x2, r0, 0x8) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000b40)='cgroup.subtree_control\x00') ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x2400, 0x1) r5 = getpid() socketpair$unix(0x1, 0x7, 0x0, &(0x7f0000000540)={0xffffffffffffffff}) setsockopt$sock_attach_bpf(r6, 0x1, 0x32, &(0x7f00000005c0)=r3, 0x4) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={0x0, 0xffffffffffffffff, 0x0, 0x12, &(0x7f0000000480)='./cgroup.cpu/syz1\x00', r1}, 0x30) perf_event_open(&(0x7f0000000300)={0x5, 0x70, 0xff, 0x4, 0x1000, 0xe5af, 0x0, 0x8000, 0xd0440, 0x2, 0xffff, 0x1, 0x4, 0x1f, 0x3, 0xfffffffffffffffa, 0x5, 0x9, 0x8, 0x1, 0x3, 0x400, 0x6, 0x5, 0x401, 0x10000, 0xff, 0xb24, 0xffffffffffff8000, 0xc8a, 0x3f, 0xfffffffffffffffa, 0xffffffffffff8001, 0x200, 0x5, 0x3, 0x2, 0x93a, 0x0, 0x7fff, 0x2, @perf_bp={&(0x7f0000000100), 0x1}, 0x0, 0x0, 0xffffffffffffff4e, 0x6, 0x0, 0x4, 0xfffffffffffffffd}, r5, 0x0, r7, 0x8) r8 = openat$tun(0xffffffffffffff9c, &(0x7f0000000580)='/dev/net/tun\x00', 0x40000, 0x0) ioctl$TUNSETPERSIST(r8, 0x400454cb, 0x1) r9 = socket$kcm(0x29, 0x5, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000800)={0x0, r0, 0x1, 0x2}, 0x14) ioctl$sock_kcm_SIOCKCMUNATTACH(r9, 0x89e1, &(0x7f0000000900)={r2}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r3, 0x0, 0x8b, 0x0, &(0x7f0000000680)="3ce41f426b7dd449ae14b08e1868c456d4fe9c7993884cf18f4dd5a0bc57250243da4203e0640859184bc4c4690afefd7736e8842cd88030448e918bdb5bd9bbbd680a51261557c0477c18049c832005ebb5b185c6f233df73a21d3b3ddad8426fba2d5f8aac5df904d5e5f2e7dc4a517079e08d5b2175a276f2a5c49cc2957cb367f269898570852dd63a", 0x0, 0x5}, 0x28) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000500)='./cgroup/syz0\x00', 0x200002, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000740)={r3, 0x50, &(0x7f00000003c0)}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r2, 0x50, &(0x7f0000000840)}, 0x10) openat$cgroup_subtree(r2, &(0x7f0000000940)='cgroup.subtree_control\x00', 0x2, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x1ff, 0x0, 0x0, 0x0, 0x200000, 0xffffffffffffffff, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280), 0x2}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r10 = socket$kcm(0xa, 0x400000000002, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffc59) ioctl$sock_kcm_SIOCKCMCLONE(r10, 0x890b, &(0x7f0000000000)) ioctl$sock_kcm_SIOCKCMCLONE(r10, 0x890c, &(0x7f0000000000)) 03:53:17 executing program 3: r0 = syz_open_dev$video4linux(&(0x7f0000000280)='/dev/v4l-subdev#\x00', 0x0, 0x0) ioctl$VIDIOC_QUERY_DV_TIMINGS(r0, 0x80845663, 0x0) [ 1825.532669] protocol 88fb is buggy, dev hsr_slave_0 [ 1825.537830] protocol 88fb is buggy, dev hsr_slave_1 03:53:18 executing program 2: socket$inet6(0xa, 0x0, 0x200) setsockopt$RDS_GET_MR_FOR_DEST(0xffffffffffffffff, 0x114, 0x7, 0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgrou\xd9\xb6\xa3\x00\x00\x00\x80\x00\x00\x00\x00', 0x1ff) r0 = openat$sequencer2(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000800)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$SG_GET_PACK_ID(0xffffffffffffffff, 0x227c, 0x0) socket$inet6(0xa, 0x4000000000000005, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x10f, 0x87, 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) utime(0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000680)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) ioctl$TIOCGPGRP(r0, 0x540f, 0x0) 03:53:18 executing program 0: mkdir(0x0, 0x0) r0 = inotify_init() read(r0, 0x0, 0x0) r1 = inotify_add_watch(r0, &(0x7f0000000040)='./file0\x00', 0x20000000) inotify_rm_watch(r0, r1) 03:53:18 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00005befdc)) r1 = syz_open_pts(r0, 0x0) ioctl$int_in(r1, 0x0, 0x0) 03:53:18 executing program 3: r0 = syz_open_dev$midi(&(0x7f00000000c0)='/dev/midi#\x00', 0x2, 0x200000) readahead(r0, 0x0, 0x0) 03:53:18 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x20, &(0x7f0000000b80)=ANY=[@ANYBLOB="cab5674ca80400f902c8d3fc17d4a51472ff5e04a7ed68e9074e865fffffffffff6582e2a0c58f438f1a9b1af27305fb6c1d497851a00d51dddde821f356222d82de15a5bb3ca4d544c3683ff903b30637ee634a8a4fa0e19e57c7d35e4db3a02231b71023a910ac2424326e31258bde7ca760ff3ca3261a92112b3c8db9e0d79dc5ad29e05434154bba1e60d243d8fa466b27518c09e11b78ec43ab7af1d33fbd4885ee5e95b0849345d0edef0a2e68320a47938597cf0fba5ae2e93301ffc38baaf2673b7fd4628a0fe3665006d238567bdb430991e02866ad858345dc86331d91a53051b3284827fc0a870d857ecc180901feb2d1dd3be0c1ebc3fa1d00d550744d9e55"], 0x0, 0x1625, 0x0, 0x0, 0x41100, 0x1, [], 0x0, 0x4}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={0xffffffffffffffff, 0xdb, &(0x7f0000000200)={0x0, 0x0}}, 0x393) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='cgroup.events\x00', 0x0, 0x0) write$cgroup_int(r2, &(0x7f00000007c0)=0x6, 0x12) r3 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000002c0), 0x4) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz1\x00', 0x1ff) r4 = perf_event_open$cgroup(&(0x7f0000000600)={0x0, 0x70, 0x9, 0x6, 0x8, 0x6, 0x0, 0xfffffffffffff49f, 0x2, 0x6, 0x3ff, 0x0, 0x20, 0x0, 0x1, 0x81, 0x1, 0x400, 0x4, 0xfac, 0x4, 0x1, 0x10000, 0xf1, 0xd3, 0x92b, 0x200, 0x1, 0x100000000, 0x2, 0x100000000, 0xfff, 0xfff, 0xffff, 0x3, 0xfffffffffffffffd, 0x0, 0x6, 0x0, 0x50, 0x0, @perf_config_ext={0x3f, 0x9}, 0x20000, 0x8, 0xef3, 0x7, 0x100000000, 0x8, 0xfff}, 0xffffffffffffffff, 0x2, r0, 0x8) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000b40)='cgroup.subtree_control\x00') ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x2400, 0x1) r5 = getpid() socketpair$unix(0x1, 0x7, 0x0, &(0x7f0000000540)={0xffffffffffffffff}) setsockopt$sock_attach_bpf(r6, 0x1, 0x32, &(0x7f00000005c0)=r3, 0x4) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={0x0, 0xffffffffffffffff, 0x0, 0x12, &(0x7f0000000480)='./cgroup.cpu/syz1\x00', r1}, 0x30) perf_event_open(&(0x7f0000000300)={0x5, 0x70, 0xff, 0x4, 0x1000, 0xe5af, 0x0, 0x8000, 0xd0440, 0x2, 0xffff, 0x1, 0x4, 0x1f, 0x3, 0xfffffffffffffffa, 0x5, 0x9, 0x8, 0x1, 0x3, 0x400, 0x6, 0x5, 0x401, 0x10000, 0xff, 0xb24, 0xffffffffffff8000, 0xc8a, 0x3f, 0xfffffffffffffffa, 0xffffffffffff8001, 0x200, 0x5, 0x3, 0x2, 0x93a, 0x0, 0x7fff, 0x2, @perf_bp={&(0x7f0000000100), 0x1}, 0x0, 0x0, 0xffffffffffffff4e, 0x6, 0x0, 0x4, 0xfffffffffffffffd}, r5, 0x0, r7, 0x8) r8 = openat$tun(0xffffffffffffff9c, &(0x7f0000000580)='/dev/net/tun\x00', 0x40000, 0x0) ioctl$TUNSETPERSIST(r8, 0x400454cb, 0x1) r9 = socket$kcm(0x29, 0x5, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000800)={0x0, r0, 0x1, 0x2}, 0x14) ioctl$sock_kcm_SIOCKCMUNATTACH(r9, 0x89e1, &(0x7f0000000900)={r2}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r3, 0x0, 0x8b, 0x0, &(0x7f0000000680)="3ce41f426b7dd449ae14b08e1868c456d4fe9c7993884cf18f4dd5a0bc57250243da4203e0640859184bc4c4690afefd7736e8842cd88030448e918bdb5bd9bbbd680a51261557c0477c18049c832005ebb5b185c6f233df73a21d3b3ddad8426fba2d5f8aac5df904d5e5f2e7dc4a517079e08d5b2175a276f2a5c49cc2957cb367f269898570852dd63a", 0x0, 0x5}, 0x28) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000500)='./cgroup/syz0\x00', 0x200002, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000740)={r3, 0x50, &(0x7f00000003c0)}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r2, 0x50, &(0x7f0000000840)}, 0x10) openat$cgroup_subtree(r2, &(0x7f0000000940)='cgroup.subtree_control\x00', 0x2, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x1ff, 0x0, 0x0, 0x0, 0x200000, 0xffffffffffffffff, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280), 0x2}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r10 = socket$kcm(0xa, 0x400000000002, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffc59) ioctl$sock_kcm_SIOCKCMCLONE(r10, 0x890b, &(0x7f0000000000)) ioctl$sock_kcm_SIOCKCMCLONE(r10, 0x890c, &(0x7f0000000000)) 03:53:18 executing program 5: getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffff9c, 0x84, 0x13, 0x0, 0x0) r0 = syz_open_dev$swradio(&(0x7f0000000000)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$radio(0x0, 0xffffffffffffffff, 0x2) r1 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) getdents64(r1, 0x0, 0x0) r2 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r2, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r2, 0x8) r3 = socket$inet6_sctp(0xa, 0x805, 0x84) r4 = accept4(r2, 0x0, 0x0, 0x0) prctl$PR_SET_ENDIAN(0x14, 0x1) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r3, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x0, 0x0, @loopback}], 0x1c) epoll_pwait(0xffffffffffffffff, &(0x7f0000000040)=[{}, {}], 0x2, 0x0, &(0x7f0000000080), 0x8) getpgid(0x0) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r4, 0x84, 0x9, &(0x7f0000000280)={0x0, @in={{0x2, 0x0, @empty}}, 0x0, 0xac14142400000000, 0x0, 0x0, 0x54}, 0x98) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000780)={{{@in=@dev, @in6=@local}}, {{@in6=@mcast2}, 0x0, @in6=@dev}}, 0x0) ioctl$SIOCAX25ADDFWD(r0, 0x89ea, 0x0) syz_mount_image$gfs2(&(0x7f00000003c0)='gfs2\x00', 0x0, 0x87, 0x0, &(0x7f00000005c0), 0x1040040, 0x0) readv(r1, &(0x7f0000000500)=[{&(0x7f0000000400)=""/217, 0xd9}], 0x1) 03:53:18 executing program 4: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') getdents64(r0, &(0x7f0000000140)=""/140, 0x1c4) getdents(r0, &(0x7f0000000ea9)=""/407, 0x197) 03:53:18 executing program 3: r0 = socket(0x11, 0x2, 0x0) bind$packet(r0, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="c14d9ea42835"}, 0x903) 03:53:18 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x20, &(0x7f0000000b80)=ANY=[@ANYBLOB="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"], 0x0, 0x1625, 0x0, 0x0, 0x41100, 0x1, [], 0x0, 0x4}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r0, 0x0, 0x0}, 0x10) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='cgroup.events\x00', 0x0, 0x0) write$cgroup_int(r1, &(0x7f00000007c0)=0x6, 0x12) r2 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000002c0), 0x4) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz1\x00', 0x1ff) r3 = perf_event_open$cgroup(&(0x7f0000000600)={0x0, 0x70, 0x9, 0x6, 0x8, 0x6, 0x0, 0xfffffffffffff49f, 0x2, 0x6, 0x3ff, 0x0, 0x20, 0x0, 0x1, 0x81, 0x1, 0x400, 0x4, 0xfac, 0x4, 0x1, 0x10000, 0xf1, 0xd3, 0x92b, 0x200, 0x1, 0x100000000, 0x2, 0x100000000, 0xfff, 0xfff, 0xffff, 0x3, 0xfffffffffffffffd, 0x0, 0x6, 0x0, 0x50, 0x0, @perf_config_ext={0x3f, 0x9}, 0x20000, 0x8, 0xef3, 0x7, 0x100000000, 0x8, 0xfff}, 0xffffffffffffffff, 0x2, r0, 0x8) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000b40)='cgroup.subtree_control\x00') ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0x1) r4 = getpid() socketpair$unix(0x1, 0x7, 0x0, &(0x7f0000000540)={0xffffffffffffffff}) setsockopt$sock_attach_bpf(r5, 0x1, 0x32, &(0x7f00000005c0)=r2, 0x4) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={0x0, 0xffffffffffffffff, 0x0, 0x12, &(0x7f0000000480)='./cgroup.cpu/syz1\x00'}, 0x30) perf_event_open(&(0x7f0000000300)={0x5, 0x70, 0xff, 0x4, 0x1000, 0xe5af, 0x0, 0x8000, 0xd0440, 0x2, 0xffff, 0x1, 0x4, 0x1f, 0x3, 0xfffffffffffffffa, 0x5, 0x9, 0x8, 0x1, 0x3, 0x400, 0x6, 0x5, 0x401, 0x10000, 0xff, 0xb24, 0xffffffffffff8000, 0xc8a, 0x3f, 0xfffffffffffffffa, 0xffffffffffff8001, 0x200, 0x5, 0x3, 0x2, 0x93a, 0x0, 0x7fff, 0x2, @perf_bp={&(0x7f0000000100), 0x1}, 0x0, 0x0, 0xffffffffffffff4e, 0x6, 0x0, 0x4, 0xfffffffffffffffd}, r4, 0x0, r6, 0x8) r7 = openat$tun(0xffffffffffffff9c, &(0x7f0000000580)='/dev/net/tun\x00', 0x40000, 0x0) ioctl$TUNSETPERSIST(r7, 0x400454cb, 0x1) r8 = socket$kcm(0x29, 0x5, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000800)={0x0, r0, 0x1, 0x2}, 0x14) ioctl$sock_kcm_SIOCKCMUNATTACH(r8, 0x89e1, &(0x7f0000000900)={r1}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r2, 0x0, 0x8b, 0x0, &(0x7f0000000680)="3ce41f426b7dd449ae14b08e1868c456d4fe9c7993884cf18f4dd5a0bc57250243da4203e0640859184bc4c4690afefd7736e8842cd88030448e918bdb5bd9bbbd680a51261557c0477c18049c832005ebb5b185c6f233df73a21d3b3ddad8426fba2d5f8aac5df904d5e5f2e7dc4a517079e08d5b2175a276f2a5c49cc2957cb367f269898570852dd63a", 0x0, 0x5}, 0x28) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000500)='./cgroup/syz0\x00', 0x200002, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000740)={r2, 0x50, &(0x7f00000003c0)}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r1, 0x50, &(0x7f0000000840)}, 0x10) openat$cgroup_subtree(r1, &(0x7f0000000940)='cgroup.subtree_control\x00', 0x2, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x1ff, 0x0, 0x0, 0x0, 0x200000, 0xffffffffffffffff, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280), 0x2}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r9 = socket$kcm(0xa, 0x400000000002, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffc59) ioctl$sock_kcm_SIOCKCMCLONE(r9, 0x890b, &(0x7f0000000000)) ioctl$sock_kcm_SIOCKCMCLONE(r9, 0x890c, &(0x7f0000000000)) 03:53:18 executing program 2: r0 = socket(0xa, 0x1, 0x0) unshare(0x20400) r1 = dup(r0) ioctl$VHOST_RESET_OWNER(r1, 0xaf02, 0x0) 03:53:18 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000000)={@mcast2, 0x0, 0x3}, 0x0) 03:53:18 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x20, &(0x7f0000000b80)=ANY=[@ANYBLOB="cab5674ca80400f902c8d3fc17d4a51472ff5e04a7ed68e9074e865fffffffffff6582e2a0c58f438f1a9b1af27305fb6c1d497851a00d51dddde821f356222d82de15a5bb3ca4d544c3683ff903b30637ee634a8a4fa0e19e57c7d35e4db3a02231b71023a910ac2424326e31258bde7ca760ff3ca3261a92112b3c8db9e0d79dc5ad29e05434154bba1e60d243d8fa466b27518c09e11b78ec43ab7af1d33fbd4885ee5e95b0849345d0edef0a2e68320a47938597cf0fba5ae2e93301ffc38baaf2673b7fd4628a0fe3665006d238567bdb430991e02866ad858345dc86331d91a53051b3284827fc0a870d857ecc180901feb2d1dd3be0c1ebc3fa1d00d550744d9e55"], 0x0, 0x1625, 0x0, 0x0, 0x41100, 0x1, [], 0x0, 0x4}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r0, 0x0, 0x0}, 0x10) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='cgroup.events\x00', 0x0, 0x0) write$cgroup_int(r1, &(0x7f00000007c0)=0x6, 0x12) r2 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000002c0), 0x4) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz1\x00', 0x1ff) r3 = perf_event_open$cgroup(&(0x7f0000000600)={0x0, 0x70, 0x9, 0x6, 0x8, 0x6, 0x0, 0xfffffffffffff49f, 0x2, 0x6, 0x3ff, 0x0, 0x20, 0x0, 0x1, 0x81, 0x1, 0x400, 0x4, 0xfac, 0x4, 0x1, 0x10000, 0xf1, 0xd3, 0x92b, 0x200, 0x1, 0x100000000, 0x2, 0x100000000, 0xfff, 0xfff, 0xffff, 0x3, 0xfffffffffffffffd, 0x0, 0x6, 0x0, 0x50, 0x0, @perf_config_ext={0x3f, 0x9}, 0x20000, 0x8, 0xef3, 0x7, 0x100000000, 0x8, 0xfff}, 0xffffffffffffffff, 0x2, r0, 0x8) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000b40)='cgroup.subtree_control\x00') ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0x1) r4 = getpid() socketpair$unix(0x1, 0x7, 0x0, &(0x7f0000000540)={0xffffffffffffffff}) setsockopt$sock_attach_bpf(r5, 0x1, 0x32, &(0x7f00000005c0)=r2, 0x4) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={0x0, 0xffffffffffffffff, 0x0, 0x12, &(0x7f0000000480)='./cgroup.cpu/syz1\x00'}, 0x30) perf_event_open(&(0x7f0000000300)={0x5, 0x70, 0xff, 0x4, 0x1000, 0xe5af, 0x0, 0x8000, 0xd0440, 0x2, 0xffff, 0x1, 0x4, 0x1f, 0x3, 0xfffffffffffffffa, 0x5, 0x9, 0x8, 0x1, 0x3, 0x400, 0x6, 0x5, 0x401, 0x10000, 0xff, 0xb24, 0xffffffffffff8000, 0xc8a, 0x3f, 0xfffffffffffffffa, 0xffffffffffff8001, 0x200, 0x5, 0x3, 0x2, 0x93a, 0x0, 0x7fff, 0x2, @perf_bp={&(0x7f0000000100), 0x1}, 0x0, 0x0, 0xffffffffffffff4e, 0x6, 0x0, 0x4, 0xfffffffffffffffd}, r4, 0x0, r6, 0x8) r7 = openat$tun(0xffffffffffffff9c, &(0x7f0000000580)='/dev/net/tun\x00', 0x40000, 0x0) ioctl$TUNSETPERSIST(r7, 0x400454cb, 0x1) r8 = socket$kcm(0x29, 0x5, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000800)={0x0, r0, 0x1, 0x2}, 0x14) ioctl$sock_kcm_SIOCKCMUNATTACH(r8, 0x89e1, &(0x7f0000000900)={r1}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r2, 0x0, 0x8b, 0x0, &(0x7f0000000680)="3ce41f426b7dd449ae14b08e1868c456d4fe9c7993884cf18f4dd5a0bc57250243da4203e0640859184bc4c4690afefd7736e8842cd88030448e918bdb5bd9bbbd680a51261557c0477c18049c832005ebb5b185c6f233df73a21d3b3ddad8426fba2d5f8aac5df904d5e5f2e7dc4a517079e08d5b2175a276f2a5c49cc2957cb367f269898570852dd63a", 0x0, 0x5}, 0x28) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000500)='./cgroup/syz0\x00', 0x200002, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000740)={r2, 0x50, &(0x7f00000003c0)}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r1, 0x50, &(0x7f0000000840)}, 0x10) openat$cgroup_subtree(r1, &(0x7f0000000940)='cgroup.subtree_control\x00', 0x2, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x1ff, 0x0, 0x0, 0x0, 0x200000, 0xffffffffffffffff, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280), 0x2}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r9 = socket$kcm(0xa, 0x400000000002, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffc59) ioctl$sock_kcm_SIOCKCMCLONE(r9, 0x890b, &(0x7f0000000000)) ioctl$sock_kcm_SIOCKCMCLONE(r9, 0x890c, &(0x7f0000000000)) 03:53:18 executing program 3: bind$inet6(0xffffffffffffffff, &(0x7f0000000000), 0x1c) r0 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$IP_VS_SO_GET_DAEMON(r0, 0x84, 0x9, &(0x7f0000000000), &(0x7f0000000040)=0x9b) close(0xffffffffffffffff) 03:53:19 executing program 0: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r0 = inotify_init() read(0xffffffffffffffff, 0x0, 0x0) r1 = inotify_add_watch(r0, &(0x7f0000000040)='./file0\x00', 0x20000000) inotify_rm_watch(r0, r1) 03:53:19 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x20, &(0x7f0000000b80)=ANY=[@ANYBLOB="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"], 0x0, 0x1625, 0x0, 0x0, 0x41100, 0x1, [], 0x0, 0x4}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r0, 0x0, 0x0}, 0x10) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='cgroup.events\x00', 0x0, 0x0) write$cgroup_int(r1, &(0x7f00000007c0)=0x6, 0x12) r2 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000002c0), 0x4) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz1\x00', 0x1ff) r3 = perf_event_open$cgroup(&(0x7f0000000600)={0x0, 0x70, 0x9, 0x6, 0x8, 0x6, 0x0, 0xfffffffffffff49f, 0x2, 0x6, 0x3ff, 0x0, 0x20, 0x0, 0x1, 0x81, 0x1, 0x400, 0x4, 0xfac, 0x4, 0x1, 0x10000, 0xf1, 0xd3, 0x92b, 0x200, 0x1, 0x100000000, 0x2, 0x100000000, 0xfff, 0xfff, 0xffff, 0x3, 0xfffffffffffffffd, 0x0, 0x6, 0x0, 0x50, 0x0, @perf_config_ext={0x3f, 0x9}, 0x20000, 0x8, 0xef3, 0x7, 0x100000000, 0x8, 0xfff}, 0xffffffffffffffff, 0x2, r0, 0x8) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000b40)='cgroup.subtree_control\x00') ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0x1) r4 = getpid() socketpair$unix(0x1, 0x7, 0x0, &(0x7f0000000540)={0xffffffffffffffff}) setsockopt$sock_attach_bpf(r5, 0x1, 0x32, &(0x7f00000005c0)=r2, 0x4) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={0x0, 0xffffffffffffffff, 0x0, 0x12, &(0x7f0000000480)='./cgroup.cpu/syz1\x00'}, 0x30) perf_event_open(&(0x7f0000000300)={0x5, 0x70, 0xff, 0x4, 0x1000, 0xe5af, 0x0, 0x8000, 0xd0440, 0x2, 0xffff, 0x1, 0x4, 0x1f, 0x3, 0xfffffffffffffffa, 0x5, 0x9, 0x8, 0x1, 0x3, 0x400, 0x6, 0x5, 0x401, 0x10000, 0xff, 0xb24, 0xffffffffffff8000, 0xc8a, 0x3f, 0xfffffffffffffffa, 0xffffffffffff8001, 0x200, 0x5, 0x3, 0x2, 0x93a, 0x0, 0x7fff, 0x2, @perf_bp={&(0x7f0000000100), 0x1}, 0x0, 0x0, 0xffffffffffffff4e, 0x6, 0x0, 0x4, 0xfffffffffffffffd}, r4, 0x0, r6, 0x8) r7 = openat$tun(0xffffffffffffff9c, &(0x7f0000000580)='/dev/net/tun\x00', 0x40000, 0x0) ioctl$TUNSETPERSIST(r7, 0x400454cb, 0x1) r8 = socket$kcm(0x29, 0x5, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000800)={0x0, r0, 0x1, 0x2}, 0x14) ioctl$sock_kcm_SIOCKCMUNATTACH(r8, 0x89e1, &(0x7f0000000900)={r1}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r2, 0x0, 0x8b, 0x0, &(0x7f0000000680)="3ce41f426b7dd449ae14b08e1868c456d4fe9c7993884cf18f4dd5a0bc57250243da4203e0640859184bc4c4690afefd7736e8842cd88030448e918bdb5bd9bbbd680a51261557c0477c18049c832005ebb5b185c6f233df73a21d3b3ddad8426fba2d5f8aac5df904d5e5f2e7dc4a517079e08d5b2175a276f2a5c49cc2957cb367f269898570852dd63a", 0x0, 0x5}, 0x28) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000500)='./cgroup/syz0\x00', 0x200002, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000740)={r2, 0x50, &(0x7f00000003c0)}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r1, 0x50, &(0x7f0000000840)}, 0x10) openat$cgroup_subtree(r1, &(0x7f0000000940)='cgroup.subtree_control\x00', 0x2, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x1ff, 0x0, 0x0, 0x0, 0x200000, 0xffffffffffffffff, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280), 0x2}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r9 = socket$kcm(0xa, 0x400000000002, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffc59) ioctl$sock_kcm_SIOCKCMCLONE(r9, 0x890b, &(0x7f0000000000)) ioctl$sock_kcm_SIOCKCMCLONE(r9, 0x890c, &(0x7f0000000000)) 03:53:19 executing program 4: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz0\x00', 0x200002, 0x0) 03:53:19 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000080)={'batadv0\x00', &(0x7f0000000140)=ANY=[@ANYBLOB="3a00000004"]}) 03:53:19 executing program 5: getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffff9c, 0x84, 0x13, 0x0, 0x0) r0 = syz_open_dev$swradio(&(0x7f0000000000)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$radio(0x0, 0xffffffffffffffff, 0x2) r1 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) getdents64(r1, 0x0, 0x0) r2 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r2, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r2, 0x8) r3 = socket$inet6_sctp(0xa, 0x805, 0x84) r4 = accept4(r2, 0x0, 0x0, 0x0) prctl$PR_SET_ENDIAN(0x14, 0x1) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r3, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x0, 0x0, @loopback}], 0x1c) epoll_pwait(0xffffffffffffffff, &(0x7f0000000040)=[{}, {}], 0x2, 0x0, &(0x7f0000000080), 0x8) getpgid(0x0) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r4, 0x84, 0x9, &(0x7f0000000280)={0x0, @in={{0x2, 0x0, @empty}}, 0x0, 0xac14142400000000, 0x0, 0x0, 0x54}, 0x98) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000780)={{{@in=@dev, @in6=@local}}, {{@in6=@mcast2}, 0x0, @in6=@dev}}, 0x0) ioctl$SIOCAX25ADDFWD(r0, 0x89ea, 0x0) syz_mount_image$gfs2(&(0x7f00000003c0)='gfs2\x00', 0x0, 0x87, 0x0, &(0x7f00000005c0), 0x1040040, 0x0) readv(r1, &(0x7f0000000500)=[{&(0x7f0000000400)=""/217, 0xd9}], 0x1) 03:53:19 executing program 3: r0 = syz_open_dev$dmmidi(&(0x7f00000001c0)='/dev/dmmidi#\x00', 0x4010000034, 0x0) ioctl$int_out(r0, 0xc0305718, 0x0) 03:53:19 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) 03:53:19 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$VIDIOC_CREATE_BUFS(0xffffffffffffffff, 0xc100565c, &(0x7f0000000200)={0x0, 0x0, 0x0, {0x0, @pix_mp={0x0, 0x0, 0x0, 0x0, 0x0, [{}, {0x7}, {0x37a4}, {}, {0x8}, {0x0, 0x3}, {0x9}, {0x0, 0xffff}], 0x0, 0x80}}}) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000fde000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_SET_VAPIC_ADDR(r3, 0x4008ae93, &(0x7f0000000580)=0x2fff) ioctl$KVM_GET_VCPU_EVENTS(r3, 0x4400ae8f, &(0x7f0000000100)) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f0000000000)={[], 0x0, 0x20600}) ioctl$KVM_RUN(r3, 0xae80, 0x0) 03:53:19 executing program 0: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r0 = inotify_init() read(0xffffffffffffffff, 0x0, 0x0) r1 = inotify_add_watch(r0, &(0x7f0000000040)='./file0\x00', 0x20000000) inotify_rm_watch(r0, r1) 03:53:19 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x20, &(0x7f0000000b80)=ANY=[@ANYBLOB="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"], 0x0, 0x1625, 0x0, 0x0, 0x41100, 0x1, [], 0x0, 0x4}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r0, 0xdb, &(0x7f0000000200)={0x0, 0x0}}, 0x393) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) write$cgroup_int(r2, &(0x7f00000007c0)=0x6, 0x12) r3 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000002c0), 0x4) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz1\x00', 0x1ff) r4 = perf_event_open$cgroup(&(0x7f0000000600)={0x0, 0x70, 0x9, 0x6, 0x8, 0x6, 0x0, 0xfffffffffffff49f, 0x2, 0x6, 0x3ff, 0x0, 0x20, 0x0, 0x1, 0x81, 0x1, 0x400, 0x4, 0xfac, 0x4, 0x1, 0x10000, 0xf1, 0xd3, 0x92b, 0x200, 0x1, 0x100000000, 0x2, 0x100000000, 0xfff, 0xfff, 0xffff, 0x3, 0xfffffffffffffffd, 0x0, 0x6, 0x0, 0x50, 0x0, @perf_config_ext={0x3f, 0x9}, 0x20000, 0x8, 0xef3, 0x7, 0x100000000, 0x8, 0xfff}, 0xffffffffffffffff, 0x2, r0, 0x8) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000b40)='cgroup.subtree_control\x00') ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x2400, 0x1) r5 = getpid() socketpair$unix(0x1, 0x7, 0x0, &(0x7f0000000540)={0xffffffffffffffff}) setsockopt$sock_attach_bpf(r6, 0x1, 0x32, &(0x7f00000005c0)=r3, 0x4) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={0x0, 0xffffffffffffffff, 0x0, 0x12, &(0x7f0000000480)='./cgroup.cpu/syz1\x00', r1}, 0x30) perf_event_open(&(0x7f0000000300)={0x5, 0x70, 0xff, 0x4, 0x1000, 0xe5af, 0x0, 0x8000, 0xd0440, 0x2, 0xffff, 0x1, 0x4, 0x1f, 0x3, 0xfffffffffffffffa, 0x5, 0x9, 0x8, 0x1, 0x3, 0x400, 0x6, 0x5, 0x401, 0x10000, 0xff, 0xb24, 0xffffffffffff8000, 0xc8a, 0x3f, 0xfffffffffffffffa, 0xffffffffffff8001, 0x200, 0x5, 0x3, 0x2, 0x93a, 0x0, 0x7fff, 0x2, @perf_bp={&(0x7f0000000100), 0x1}, 0x0, 0x0, 0xffffffffffffff4e, 0x6, 0x0, 0x4, 0xfffffffffffffffd}, r5, 0x0, r7, 0x8) r8 = openat$tun(0xffffffffffffff9c, &(0x7f0000000580)='/dev/net/tun\x00', 0x40000, 0x0) ioctl$TUNSETPERSIST(r8, 0x400454cb, 0x1) r9 = socket$kcm(0x29, 0x5, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000800)={0x0, r0, 0x1, 0x2}, 0x14) ioctl$sock_kcm_SIOCKCMUNATTACH(r9, 0x89e1, &(0x7f0000000900)={r2}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r3, 0x0, 0x8b, 0x0, &(0x7f0000000680)="3ce41f426b7dd449ae14b08e1868c456d4fe9c7993884cf18f4dd5a0bc57250243da4203e0640859184bc4c4690afefd7736e8842cd88030448e918bdb5bd9bbbd680a51261557c0477c18049c832005ebb5b185c6f233df73a21d3b3ddad8426fba2d5f8aac5df904d5e5f2e7dc4a517079e08d5b2175a276f2a5c49cc2957cb367f269898570852dd63a", 0x0, 0x5}, 0x28) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000500)='./cgroup/syz0\x00', 0x200002, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000740)={r3, 0x50, &(0x7f00000003c0)}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r2, 0x50, &(0x7f0000000840)}, 0x10) openat$cgroup_subtree(r2, &(0x7f0000000940)='cgroup.subtree_control\x00', 0x2, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x1ff, 0x0, 0x0, 0x0, 0x200000, 0xffffffffffffffff, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280), 0x2}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r10 = socket$kcm(0xa, 0x400000000002, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffc59) ioctl$sock_kcm_SIOCKCMCLONE(r10, 0x890b, &(0x7f0000000000)) ioctl$sock_kcm_SIOCKCMCLONE(r10, 0x890c, &(0x7f0000000000)) 03:53:19 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000040)='/proc/capi/capi20ncci\x00', 0x8000, 0x0) ioctl$UI_SET_PROPBIT(r1, 0x4004556e, 0x1a) r2 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x4}, 0x1c) socket$nl_xfrm(0x10, 0x3, 0x6) setsockopt$inet6_opts(r2, 0x29, 0x39, &(0x7f0000000280)=ANY=[@ANYBLOB="000004b200000002e812bc3d759f60243e0b0fce8629538f251fc4530c53532fa68bd02bb7fac7802c3a54d570edc55d7a2179a799ecf96d210e50d032468b2146715fd1c666ec0f86abfd0ec5efa5ab7cec231a8fb8bb20b981a2e61499dc27947964a2c4f86ee73eb980c2b48ab0c5ed8e849a163fbf54c8dd57a26d011d26a553176af234ea34249519c2f3aa40e5e7c0a9d0d09ccb1ca93604ed5f3759b920b2ad9b38f14a0e5b8a7d138bb4649d5d29e810222734f682465ace5bf45f6140551f8c905c40e605904dd4cb5d4dc3"], 0x1) 03:53:19 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x0, 0x3, &(0x7f0000000000)=@framed, &(0x7f00002bf000)='syzkaller\x00'}, 0x48) 03:53:19 executing program 0: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r0 = inotify_init() read(0xffffffffffffffff, 0x0, 0x0) r1 = inotify_add_watch(r0, &(0x7f0000000040)='./file0\x00', 0x20000000) inotify_rm_watch(r0, r1) 03:53:19 executing program 4: socket$unix(0x1, 0x0, 0x0) 03:53:19 executing program 2: r0 = socket(0x11, 0x2, 0x0) setsockopt$packet_fanout_data(r0, 0x107, 0x16, 0x0, 0x0) 03:53:19 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x20, &(0x7f0000000b80)=ANY=[@ANYBLOB="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"], 0x0, 0x1625, 0x0, 0x0, 0x41100, 0x1, [], 0x0, 0x4}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r0, 0xdb, &(0x7f0000000200)={0x0, 0x0}}, 0x393) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) write$cgroup_int(r2, &(0x7f00000007c0)=0x6, 0x12) r3 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000002c0), 0x4) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz1\x00', 0x1ff) r4 = perf_event_open$cgroup(&(0x7f0000000600)={0x0, 0x70, 0x9, 0x6, 0x8, 0x6, 0x0, 0xfffffffffffff49f, 0x2, 0x6, 0x3ff, 0x0, 0x20, 0x0, 0x1, 0x81, 0x1, 0x400, 0x4, 0xfac, 0x4, 0x1, 0x10000, 0xf1, 0xd3, 0x92b, 0x200, 0x1, 0x100000000, 0x2, 0x100000000, 0xfff, 0xfff, 0xffff, 0x3, 0xfffffffffffffffd, 0x0, 0x6, 0x0, 0x50, 0x0, @perf_config_ext={0x3f, 0x9}, 0x20000, 0x8, 0xef3, 0x7, 0x100000000, 0x8, 0xfff}, 0xffffffffffffffff, 0x2, r0, 0x8) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000b40)='cgroup.subtree_control\x00') ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x2400, 0x1) r5 = getpid() socketpair$unix(0x1, 0x7, 0x0, &(0x7f0000000540)={0xffffffffffffffff}) setsockopt$sock_attach_bpf(r6, 0x1, 0x32, &(0x7f00000005c0)=r3, 0x4) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={0x0, 0xffffffffffffffff, 0x0, 0x12, &(0x7f0000000480)='./cgroup.cpu/syz1\x00', r1}, 0x30) perf_event_open(&(0x7f0000000300)={0x5, 0x70, 0xff, 0x4, 0x1000, 0xe5af, 0x0, 0x8000, 0xd0440, 0x2, 0xffff, 0x1, 0x4, 0x1f, 0x3, 0xfffffffffffffffa, 0x5, 0x9, 0x8, 0x1, 0x3, 0x400, 0x6, 0x5, 0x401, 0x10000, 0xff, 0xb24, 0xffffffffffff8000, 0xc8a, 0x3f, 0xfffffffffffffffa, 0xffffffffffff8001, 0x200, 0x5, 0x3, 0x2, 0x93a, 0x0, 0x7fff, 0x2, @perf_bp={&(0x7f0000000100), 0x1}, 0x0, 0x0, 0xffffffffffffff4e, 0x6, 0x0, 0x4, 0xfffffffffffffffd}, r5, 0x0, r7, 0x8) r8 = openat$tun(0xffffffffffffff9c, &(0x7f0000000580)='/dev/net/tun\x00', 0x40000, 0x0) ioctl$TUNSETPERSIST(r8, 0x400454cb, 0x1) r9 = socket$kcm(0x29, 0x5, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000800)={0x0, r0, 0x1, 0x2}, 0x14) ioctl$sock_kcm_SIOCKCMUNATTACH(r9, 0x89e1, &(0x7f0000000900)={r2}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r3, 0x0, 0x8b, 0x0, &(0x7f0000000680)="3ce41f426b7dd449ae14b08e1868c456d4fe9c7993884cf18f4dd5a0bc57250243da4203e0640859184bc4c4690afefd7736e8842cd88030448e918bdb5bd9bbbd680a51261557c0477c18049c832005ebb5b185c6f233df73a21d3b3ddad8426fba2d5f8aac5df904d5e5f2e7dc4a517079e08d5b2175a276f2a5c49cc2957cb367f269898570852dd63a", 0x0, 0x5}, 0x28) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000500)='./cgroup/syz0\x00', 0x200002, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000740)={r3, 0x50, &(0x7f00000003c0)}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r2, 0x50, &(0x7f0000000840)}, 0x10) openat$cgroup_subtree(r2, &(0x7f0000000940)='cgroup.subtree_control\x00', 0x2, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x1ff, 0x0, 0x0, 0x0, 0x200000, 0xffffffffffffffff, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280), 0x2}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r10 = socket$kcm(0xa, 0x400000000002, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffc59) ioctl$sock_kcm_SIOCKCMCLONE(r10, 0x890b, &(0x7f0000000000)) ioctl$sock_kcm_SIOCKCMCLONE(r10, 0x890c, &(0x7f0000000000)) 03:53:20 executing program 5: getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffff9c, 0x84, 0x13, 0x0, 0x0) r0 = syz_open_dev$swradio(&(0x7f0000000000)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$radio(0x0, 0xffffffffffffffff, 0x2) r1 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) getdents64(r1, 0x0, 0x0) r2 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r2, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r2, 0x8) r3 = socket$inet6_sctp(0xa, 0x805, 0x84) r4 = accept4(r2, 0x0, 0x0, 0x0) prctl$PR_SET_ENDIAN(0x14, 0x1) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r3, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x0, 0x0, @loopback}], 0x1c) epoll_pwait(0xffffffffffffffff, &(0x7f0000000040)=[{}, {}], 0x2, 0x0, &(0x7f0000000080), 0x8) getpgid(0x0) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r4, 0x84, 0x9, &(0x7f0000000280)={0x0, @in={{0x2, 0x0, @empty}}, 0x0, 0xac14142400000000, 0x0, 0x0, 0x54}, 0x98) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000780)={{{@in=@dev, @in6=@local}}, {{@in6=@mcast2}, 0x0, @in6=@dev}}, 0x0) ioctl$SIOCAX25ADDFWD(r0, 0x89ea, 0x0) syz_mount_image$gfs2(&(0x7f00000003c0)='gfs2\x00', 0x0, 0x87, 0x0, &(0x7f00000005c0), 0x1040040, 0x0) readv(r1, &(0x7f0000000500)=[{&(0x7f0000000400)=""/217, 0xd9}], 0x1) 03:53:20 executing program 3: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f00000000c0)={0x0, 0x80}, 0x14) 03:53:20 executing program 4: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x200000, 0x0) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000100)={r0, 0x0, 0x0}, 0x18) 03:53:20 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x20, &(0x7f0000000b80)=ANY=[@ANYBLOB="cab5674ca80400f902c8d3fc17d4a51472ff5e04a7ed68e9074e865fffffffffff6582e2a0c58f438f1a9b1af27305fb6c1d497851a00d51dddde821f356222d82de15a5bb3ca4d544c3683ff903b30637ee634a8a4fa0e19e57c7d35e4db3a02231b71023a910ac2424326e31258bde7ca760ff3ca3261a92112b3c8db9e0d79dc5ad29e05434154bba1e60d243d8fa466b27518c09e11b78ec43ab7af1d33fbd4885ee5e95b0849345d0edef0a2e68320a47938597cf0fba5ae2e93301ffc38baaf2673b7fd4628a0fe3665006d238567bdb430991e02866ad858345dc86331d91a53051b3284827fc0a870d857ecc180901feb2d1dd3be0c1ebc3fa1d00d550744d9e55"], 0x0, 0x1625, 0x0, 0x0, 0x41100, 0x1, [], 0x0, 0x4}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r0, 0xdb, &(0x7f0000000200)={0x0, 0x0}}, 0x393) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) write$cgroup_int(r2, &(0x7f00000007c0)=0x6, 0x12) r3 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000002c0), 0x4) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz1\x00', 0x1ff) r4 = perf_event_open$cgroup(&(0x7f0000000600)={0x0, 0x70, 0x9, 0x6, 0x8, 0x6, 0x0, 0xfffffffffffff49f, 0x2, 0x6, 0x3ff, 0x0, 0x20, 0x0, 0x1, 0x81, 0x1, 0x400, 0x4, 0xfac, 0x4, 0x1, 0x10000, 0xf1, 0xd3, 0x92b, 0x200, 0x1, 0x100000000, 0x2, 0x100000000, 0xfff, 0xfff, 0xffff, 0x3, 0xfffffffffffffffd, 0x0, 0x6, 0x0, 0x50, 0x0, @perf_config_ext={0x3f, 0x9}, 0x20000, 0x8, 0xef3, 0x7, 0x100000000, 0x8, 0xfff}, 0xffffffffffffffff, 0x2, r0, 0x8) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000b40)='cgroup.subtree_control\x00') ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x2400, 0x1) r5 = getpid() socketpair$unix(0x1, 0x7, 0x0, &(0x7f0000000540)={0xffffffffffffffff}) setsockopt$sock_attach_bpf(r6, 0x1, 0x32, &(0x7f00000005c0)=r3, 0x4) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={0x0, 0xffffffffffffffff, 0x0, 0x12, &(0x7f0000000480)='./cgroup.cpu/syz1\x00', r1}, 0x30) perf_event_open(&(0x7f0000000300)={0x5, 0x70, 0xff, 0x4, 0x1000, 0xe5af, 0x0, 0x8000, 0xd0440, 0x2, 0xffff, 0x1, 0x4, 0x1f, 0x3, 0xfffffffffffffffa, 0x5, 0x9, 0x8, 0x1, 0x3, 0x400, 0x6, 0x5, 0x401, 0x10000, 0xff, 0xb24, 0xffffffffffff8000, 0xc8a, 0x3f, 0xfffffffffffffffa, 0xffffffffffff8001, 0x200, 0x5, 0x3, 0x2, 0x93a, 0x0, 0x7fff, 0x2, @perf_bp={&(0x7f0000000100), 0x1}, 0x0, 0x0, 0xffffffffffffff4e, 0x6, 0x0, 0x4, 0xfffffffffffffffd}, r5, 0x0, r7, 0x8) r8 = openat$tun(0xffffffffffffff9c, &(0x7f0000000580)='/dev/net/tun\x00', 0x40000, 0x0) ioctl$TUNSETPERSIST(r8, 0x400454cb, 0x1) r9 = socket$kcm(0x29, 0x5, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000800)={0x0, r0, 0x1, 0x2}, 0x14) ioctl$sock_kcm_SIOCKCMUNATTACH(r9, 0x89e1, &(0x7f0000000900)={r2}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r3, 0x0, 0x8b, 0x0, &(0x7f0000000680)="3ce41f426b7dd449ae14b08e1868c456d4fe9c7993884cf18f4dd5a0bc57250243da4203e0640859184bc4c4690afefd7736e8842cd88030448e918bdb5bd9bbbd680a51261557c0477c18049c832005ebb5b185c6f233df73a21d3b3ddad8426fba2d5f8aac5df904d5e5f2e7dc4a517079e08d5b2175a276f2a5c49cc2957cb367f269898570852dd63a", 0x0, 0x5}, 0x28) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000500)='./cgroup/syz0\x00', 0x200002, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000740)={r3, 0x50, &(0x7f00000003c0)}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r2, 0x50, &(0x7f0000000840)}, 0x10) openat$cgroup_subtree(r2, &(0x7f0000000940)='cgroup.subtree_control\x00', 0x2, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x1ff, 0x0, 0x0, 0x0, 0x200000, 0xffffffffffffffff, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280), 0x2}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r10 = socket$kcm(0xa, 0x400000000002, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffc59) ioctl$sock_kcm_SIOCKCMCLONE(r10, 0x890b, &(0x7f0000000000)) ioctl$sock_kcm_SIOCKCMCLONE(r10, 0x890c, &(0x7f0000000000)) 03:53:20 executing program 0: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r0 = inotify_init() read(r0, 0x0, 0x0) r1 = inotify_add_watch(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x20000000) inotify_rm_watch(r0, r1) 03:53:20 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) sendmmsg(r0, &(0x7f0000001c80)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000001340)=[{0x10}], 0x10}}], 0x1, 0x0) 03:53:20 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000080)) 03:53:20 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f00000025c0)={'vcan0\x00', 0x0}) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000008f00)={'tunl0\x00B\xb5\xab*\x00\x00\x00\xee\x00', r2}) ioctl$KVM_SET_IRQCHIP(r1, 0x8208ae63, &(0x7f00000001c0)={0x0, 0x0, @pic={0x0, 0xfffffffffffffffe, 0x0, 0x9}}) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000100)=[@textreal={0x8, &(0x7f0000000140)="65d9f3ba2000b0e1eed9ff66b8c4b800000f23c00f21f86635000005000f23f80f01d1baf80c66b8a322e48266efbafc0cb09dee6726670f32670fb2aec1cb0000ff22c02200", 0x46}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) 03:53:20 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x20, &(0x7f0000000b80)=ANY=[@ANYBLOB="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"], 0x0, 0x1625, 0x0, 0x0, 0x41100, 0x1, [], 0x0, 0x4}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r0, 0xdb, &(0x7f0000000200)={0x0, 0x0}}, 0x393) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='cgroup.events\x00', 0x0, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f00000007c0)=0x6, 0x12) r3 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000002c0), 0x4) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz1\x00', 0x1ff) r4 = perf_event_open$cgroup(&(0x7f0000000600)={0x0, 0x70, 0x9, 0x6, 0x8, 0x6, 0x0, 0xfffffffffffff49f, 0x2, 0x6, 0x3ff, 0x0, 0x20, 0x0, 0x1, 0x81, 0x1, 0x400, 0x4, 0xfac, 0x4, 0x1, 0x10000, 0xf1, 0xd3, 0x92b, 0x200, 0x1, 0x100000000, 0x2, 0x100000000, 0xfff, 0xfff, 0xffff, 0x3, 0xfffffffffffffffd, 0x0, 0x6, 0x0, 0x50, 0x0, @perf_config_ext={0x3f, 0x9}, 0x20000, 0x8, 0xef3, 0x7, 0x100000000, 0x8, 0xfff}, 0xffffffffffffffff, 0x2, r0, 0x8) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000b40)='cgroup.subtree_control\x00') ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x2400, 0x1) r5 = getpid() socketpair$unix(0x1, 0x7, 0x0, &(0x7f0000000540)={0xffffffffffffffff}) setsockopt$sock_attach_bpf(r6, 0x1, 0x32, &(0x7f00000005c0)=r3, 0x4) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={0x0, 0xffffffffffffffff, 0x0, 0x12, &(0x7f0000000480)='./cgroup.cpu/syz1\x00', r1}, 0x30) perf_event_open(&(0x7f0000000300)={0x5, 0x70, 0xff, 0x4, 0x1000, 0xe5af, 0x0, 0x8000, 0xd0440, 0x2, 0xffff, 0x1, 0x4, 0x1f, 0x3, 0xfffffffffffffffa, 0x5, 0x9, 0x8, 0x1, 0x3, 0x400, 0x6, 0x5, 0x401, 0x10000, 0xff, 0xb24, 0xffffffffffff8000, 0xc8a, 0x3f, 0xfffffffffffffffa, 0xffffffffffff8001, 0x200, 0x5, 0x3, 0x2, 0x93a, 0x0, 0x7fff, 0x2, @perf_bp={&(0x7f0000000100), 0x1}, 0x0, 0x0, 0xffffffffffffff4e, 0x6, 0x0, 0x4, 0xfffffffffffffffd}, r5, 0x0, r7, 0x8) r8 = openat$tun(0xffffffffffffff9c, &(0x7f0000000580)='/dev/net/tun\x00', 0x40000, 0x0) ioctl$TUNSETPERSIST(r8, 0x400454cb, 0x1) r9 = socket$kcm(0x29, 0x5, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000800)={0x0, r0, 0x1, 0x2}, 0x14) ioctl$sock_kcm_SIOCKCMUNATTACH(r9, 0x89e1, &(0x7f0000000900)={r2}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r3, 0x0, 0x8b, 0x0, &(0x7f0000000680)="3ce41f426b7dd449ae14b08e1868c456d4fe9c7993884cf18f4dd5a0bc57250243da4203e0640859184bc4c4690afefd7736e8842cd88030448e918bdb5bd9bbbd680a51261557c0477c18049c832005ebb5b185c6f233df73a21d3b3ddad8426fba2d5f8aac5df904d5e5f2e7dc4a517079e08d5b2175a276f2a5c49cc2957cb367f269898570852dd63a", 0x0, 0x5}, 0x28) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000500)='./cgroup/syz0\x00', 0x200002, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000740)={r3, 0x50, &(0x7f00000003c0)}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r2, 0x50, &(0x7f0000000840)}, 0x10) openat$cgroup_subtree(r2, &(0x7f0000000940)='cgroup.subtree_control\x00', 0x2, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x1ff, 0x0, 0x0, 0x0, 0x200000, 0xffffffffffffffff, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280), 0x2}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r10 = socket$kcm(0xa, 0x400000000002, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffc59) ioctl$sock_kcm_SIOCKCMCLONE(r10, 0x890b, &(0x7f0000000000)) ioctl$sock_kcm_SIOCKCMCLONE(r10, 0x890c, &(0x7f0000000000)) 03:53:20 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x6) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000700)={{{@in6=@mcast1, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x3}, {{@in=@broadcast}, 0x0, @in=@broadcast}}, 0xe8) 03:53:20 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000300)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\x9e\xd5T\xfa\aBJ\xde\xe9\xcb\xc6\x99\xec,\xa5v\xe5\x00\x00\xbc\xd7\xa0q\xfb53\x1c\xe3\x9cZ\xd0\xcfsw\v\xd4$hG\xa1\x91NO\xb0\xaa\x9b\x15\xea\xa9K\xcd\x0ep\x0e\xd6;D3\x8e\x84\xadN\xc2\xf1\x1fo*\xdb\x8d\xc2\xfd\xb1\x821DoC\x14.\xbep\v\"1\xe8\xfc\xee\xd6\xb2*7<\x94\tgZ\xc8\xd0\xb503\x12?\xb3\x03}f$\x1a\xaf\xe0\xf8\x80\xe7\xa5\x1d\x1b\x03j\xde1\xd2TM%\x81\xfe\x86S\xd0\xcf\xf5Ci\xdf\x8c/\xce!\xdc\xb1\xcb\x96Vi\xf9\xa7SE\xac4y\xcdQ\xdc}\xe3d\xc9\xc2r\xc8>\xd9\xe6f\xca%\xaa\xd2\xe7\xa2n=lb\xd0\xf8\xb9\x06\\\xfc\xa3\x11\xc0m\aD\xdb&Z\xa0\xe4\x86p|Q\xfd\x10\x8c\fl\xca\xe6\xffB\'J\xf9M0\xfc\xe8\x83o\xf9\xd0\v\xdd') unshare(0x20400) ioctl$BLKIOMIN(r0, 0x1278, 0x0) 03:53:20 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000040)={0x14, 0x20, 0x301}, 0x14}}, 0x0) 03:53:21 executing program 5: getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffff9c, 0x84, 0x13, 0x0, 0x0) r0 = syz_open_dev$swradio(&(0x7f0000000000)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$radio(0x0, 0xffffffffffffffff, 0x2) r1 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) getdents64(r1, 0x0, 0x0) r2 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r2, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r2, 0x8) r3 = socket$inet6_sctp(0xa, 0x805, 0x84) r4 = accept4(r2, 0x0, 0x0, 0x0) prctl$PR_SET_ENDIAN(0x14, 0x1) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r3, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) epoll_pwait(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000080), 0x8) getpgid(0x0) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r4, 0x84, 0x9, &(0x7f0000000280)={0x0, @in={{0x2, 0x0, @empty}}, 0x0, 0xac14142400000000, 0x0, 0x0, 0x54}, 0x98) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000780)={{{@in=@dev, @in6=@local}}, {{@in6=@mcast2}, 0x0, @in6=@dev}}, 0x0) ioctl$SIOCAX25ADDFWD(r0, 0x89ea, 0x0) syz_mount_image$gfs2(&(0x7f00000003c0)='gfs2\x00', 0x0, 0x87, 0x0, &(0x7f00000005c0), 0x1040040, 0x0) readv(r1, &(0x7f0000000500)=[{&(0x7f0000000400)=""/217, 0xd9}], 0x1) 03:53:21 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETSF(r0, 0x5404, &(0x7f0000000040)={0x401, 0x0, 0x0, 0x3e7}) 03:53:21 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x20, &(0x7f0000000b80)=ANY=[@ANYBLOB="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"], 0x0, 0x1625, 0x0, 0x0, 0x41100, 0x1, [], 0x0, 0x4}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r0, 0xdb, &(0x7f0000000200)={0x0, 0x0}}, 0x393) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='cgroup.events\x00', 0x0, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f00000007c0)=0x6, 0x12) r3 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000002c0), 0x4) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz1\x00', 0x1ff) r4 = perf_event_open$cgroup(&(0x7f0000000600)={0x0, 0x70, 0x9, 0x6, 0x8, 0x6, 0x0, 0xfffffffffffff49f, 0x2, 0x6, 0x3ff, 0x0, 0x20, 0x0, 0x1, 0x81, 0x1, 0x400, 0x4, 0xfac, 0x4, 0x1, 0x10000, 0xf1, 0xd3, 0x92b, 0x200, 0x1, 0x100000000, 0x2, 0x100000000, 0xfff, 0xfff, 0xffff, 0x3, 0xfffffffffffffffd, 0x0, 0x6, 0x0, 0x50, 0x0, @perf_config_ext={0x3f, 0x9}, 0x20000, 0x8, 0xef3, 0x7, 0x100000000, 0x8, 0xfff}, 0xffffffffffffffff, 0x2, r0, 0x8) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000b40)='cgroup.subtree_control\x00') ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x2400, 0x1) r5 = getpid() socketpair$unix(0x1, 0x7, 0x0, &(0x7f0000000540)={0xffffffffffffffff}) setsockopt$sock_attach_bpf(r6, 0x1, 0x32, &(0x7f00000005c0)=r3, 0x4) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={0x0, 0xffffffffffffffff, 0x0, 0x12, &(0x7f0000000480)='./cgroup.cpu/syz1\x00', r1}, 0x30) perf_event_open(&(0x7f0000000300)={0x5, 0x70, 0xff, 0x4, 0x1000, 0xe5af, 0x0, 0x8000, 0xd0440, 0x2, 0xffff, 0x1, 0x4, 0x1f, 0x3, 0xfffffffffffffffa, 0x5, 0x9, 0x8, 0x1, 0x3, 0x400, 0x6, 0x5, 0x401, 0x10000, 0xff, 0xb24, 0xffffffffffff8000, 0xc8a, 0x3f, 0xfffffffffffffffa, 0xffffffffffff8001, 0x200, 0x5, 0x3, 0x2, 0x93a, 0x0, 0x7fff, 0x2, @perf_bp={&(0x7f0000000100), 0x1}, 0x0, 0x0, 0xffffffffffffff4e, 0x6, 0x0, 0x4, 0xfffffffffffffffd}, r5, 0x0, r7, 0x8) r8 = openat$tun(0xffffffffffffff9c, &(0x7f0000000580)='/dev/net/tun\x00', 0x40000, 0x0) ioctl$TUNSETPERSIST(r8, 0x400454cb, 0x1) r9 = socket$kcm(0x29, 0x5, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000800)={0x0, r0, 0x1, 0x2}, 0x14) ioctl$sock_kcm_SIOCKCMUNATTACH(r9, 0x89e1, &(0x7f0000000900)={r2}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r3, 0x0, 0x8b, 0x0, &(0x7f0000000680)="3ce41f426b7dd449ae14b08e1868c456d4fe9c7993884cf18f4dd5a0bc57250243da4203e0640859184bc4c4690afefd7736e8842cd88030448e918bdb5bd9bbbd680a51261557c0477c18049c832005ebb5b185c6f233df73a21d3b3ddad8426fba2d5f8aac5df904d5e5f2e7dc4a517079e08d5b2175a276f2a5c49cc2957cb367f269898570852dd63a", 0x0, 0x5}, 0x28) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000500)='./cgroup/syz0\x00', 0x200002, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000740)={r3, 0x50, &(0x7f00000003c0)}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r2, 0x50, &(0x7f0000000840)}, 0x10) openat$cgroup_subtree(r2, &(0x7f0000000940)='cgroup.subtree_control\x00', 0x2, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x1ff, 0x0, 0x0, 0x0, 0x200000, 0xffffffffffffffff, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280), 0x2}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r10 = socket$kcm(0xa, 0x400000000002, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffc59) ioctl$sock_kcm_SIOCKCMCLONE(r10, 0x890b, &(0x7f0000000000)) ioctl$sock_kcm_SIOCKCMCLONE(r10, 0x890c, &(0x7f0000000000)) 03:53:21 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r2, 0x4008ae89, &(0x7f00000001c0)={0x2, 0x0, [0x8ac]}) 03:53:21 executing program 3: socketpair$unix(0x1, 0x800000002, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) write(r0, 0x0, 0x0) setsockopt$sock_int(r1, 0x1, 0x2a, &(0x7f00000001c0), 0x4) recvmmsg(r1, &(0x7f0000002bc0)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) dup(r0) 03:53:21 executing program 0: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r0 = inotify_init() read(r0, 0x0, 0x0) r1 = inotify_add_watch(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x20000000) inotify_rm_watch(r0, r1) 03:53:21 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_TSC_KHZ(r2, 0xaea2, 0x0) 03:53:21 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x20, &(0x7f0000000b80)=ANY=[@ANYBLOB="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"], 0x0, 0x1625, 0x0, 0x0, 0x41100, 0x1, [], 0x0, 0x4}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r0, 0xdb, &(0x7f0000000200)={0x0, 0x0}}, 0x393) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='cgroup.events\x00', 0x0, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f00000007c0)=0x6, 0x12) r3 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000002c0), 0x4) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz1\x00', 0x1ff) r4 = perf_event_open$cgroup(&(0x7f0000000600)={0x0, 0x70, 0x9, 0x6, 0x8, 0x6, 0x0, 0xfffffffffffff49f, 0x2, 0x6, 0x3ff, 0x0, 0x20, 0x0, 0x1, 0x81, 0x1, 0x400, 0x4, 0xfac, 0x4, 0x1, 0x10000, 0xf1, 0xd3, 0x92b, 0x200, 0x1, 0x100000000, 0x2, 0x100000000, 0xfff, 0xfff, 0xffff, 0x3, 0xfffffffffffffffd, 0x0, 0x6, 0x0, 0x50, 0x0, @perf_config_ext={0x3f, 0x9}, 0x20000, 0x8, 0xef3, 0x7, 0x100000000, 0x8, 0xfff}, 0xffffffffffffffff, 0x2, r0, 0x8) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000b40)='cgroup.subtree_control\x00') ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x2400, 0x1) r5 = getpid() socketpair$unix(0x1, 0x7, 0x0, &(0x7f0000000540)={0xffffffffffffffff}) setsockopt$sock_attach_bpf(r6, 0x1, 0x32, &(0x7f00000005c0)=r3, 0x4) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={0x0, 0xffffffffffffffff, 0x0, 0x12, &(0x7f0000000480)='./cgroup.cpu/syz1\x00', r1}, 0x30) perf_event_open(&(0x7f0000000300)={0x5, 0x70, 0xff, 0x4, 0x1000, 0xe5af, 0x0, 0x8000, 0xd0440, 0x2, 0xffff, 0x1, 0x4, 0x1f, 0x3, 0xfffffffffffffffa, 0x5, 0x9, 0x8, 0x1, 0x3, 0x400, 0x6, 0x5, 0x401, 0x10000, 0xff, 0xb24, 0xffffffffffff8000, 0xc8a, 0x3f, 0xfffffffffffffffa, 0xffffffffffff8001, 0x200, 0x5, 0x3, 0x2, 0x93a, 0x0, 0x7fff, 0x2, @perf_bp={&(0x7f0000000100), 0x1}, 0x0, 0x0, 0xffffffffffffff4e, 0x6, 0x0, 0x4, 0xfffffffffffffffd}, r5, 0x0, r7, 0x8) r8 = openat$tun(0xffffffffffffff9c, &(0x7f0000000580)='/dev/net/tun\x00', 0x40000, 0x0) ioctl$TUNSETPERSIST(r8, 0x400454cb, 0x1) r9 = socket$kcm(0x29, 0x5, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000800)={0x0, r0, 0x1, 0x2}, 0x14) ioctl$sock_kcm_SIOCKCMUNATTACH(r9, 0x89e1, &(0x7f0000000900)={r2}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r3, 0x0, 0x8b, 0x0, &(0x7f0000000680)="3ce41f426b7dd449ae14b08e1868c456d4fe9c7993884cf18f4dd5a0bc57250243da4203e0640859184bc4c4690afefd7736e8842cd88030448e918bdb5bd9bbbd680a51261557c0477c18049c832005ebb5b185c6f233df73a21d3b3ddad8426fba2d5f8aac5df904d5e5f2e7dc4a517079e08d5b2175a276f2a5c49cc2957cb367f269898570852dd63a", 0x0, 0x5}, 0x28) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000500)='./cgroup/syz0\x00', 0x200002, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000740)={r3, 0x50, &(0x7f00000003c0)}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r2, 0x50, &(0x7f0000000840)}, 0x10) openat$cgroup_subtree(r2, &(0x7f0000000940)='cgroup.subtree_control\x00', 0x2, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x1ff, 0x0, 0x0, 0x0, 0x200000, 0xffffffffffffffff, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280), 0x2}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r10 = socket$kcm(0xa, 0x400000000002, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffc59) ioctl$sock_kcm_SIOCKCMCLONE(r10, 0x890b, &(0x7f0000000000)) ioctl$sock_kcm_SIOCKCMCLONE(r10, 0x890c, &(0x7f0000000000)) 03:53:21 executing program 3: r0 = gettid() mremap(&(0x7f0000182000/0x3000)=nil, 0x3000, 0x2000, 0x0, &(0x7f00000be000/0x2000)=nil) process_vm_writev(r0, &(0x7f0000c22000)=[{&(0x7f000034afa4)=""/1, 0x2f4}], 0x352, &(0x7f0000c22fa0)=[{&(0x7f0000000080)=""/1, 0x2034afa5}], 0x1, 0x0) 03:53:21 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_ENABLE_CAP(0xffffffffffffffff, 0x4068aea3, 0x0) ioctl$KVM_GET_PIT2(r1, 0x8070ae9f, 0x0) 03:53:21 executing program 4: r0 = syz_open_dev$sndseq(&(0x7f0000000100)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_RUNNING_MODE(r0, 0x40505331, &(0x7f0000000040)={0xfffffffffffffffc}) 03:53:21 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) accept(0xffffffffffffffff, 0x0, 0x0) clone(0x100002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="6c6f61640564656661756c7420757365723a"], 0x1, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0x1f1, 0xfffffffffffffffe) 03:53:21 executing program 5: getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffff9c, 0x84, 0x13, 0x0, 0x0) r0 = syz_open_dev$swradio(&(0x7f0000000000)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$radio(0x0, 0xffffffffffffffff, 0x2) r1 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) getdents64(r1, 0x0, 0x0) r2 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r2, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r2, 0x8) r3 = socket$inet6_sctp(0xa, 0x805, 0x84) r4 = accept4(r2, 0x0, 0x0, 0x0) prctl$PR_SET_ENDIAN(0x14, 0x1) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r3, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) epoll_pwait(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000080), 0x8) getpgid(0x0) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r4, 0x84, 0x9, &(0x7f0000000280)={0x0, @in={{0x2, 0x0, @empty}}, 0x0, 0xac14142400000000, 0x0, 0x0, 0x54}, 0x98) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000780)={{{@in=@dev, @in6=@local}}, {{@in6=@mcast2}, 0x0, @in6=@dev}}, 0x0) ioctl$SIOCAX25ADDFWD(r0, 0x89ea, 0x0) syz_mount_image$gfs2(&(0x7f00000003c0)='gfs2\x00', 0x0, 0x87, 0x0, &(0x7f00000005c0), 0x1040040, 0x0) readv(r1, &(0x7f0000000500)=[{&(0x7f0000000400)=""/217, 0xd9}], 0x1) 03:53:21 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x20, &(0x7f0000000b80)=ANY=[@ANYBLOB="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"], 0x0, 0x1625, 0x0, 0x0, 0x41100, 0x1, [], 0x0, 0x4}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r0, 0xdb, &(0x7f0000000200)={0x0, 0x0}}, 0x393) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='cgroup.events\x00', 0x0, 0x0) write$cgroup_int(r2, 0x0, 0x0) r3 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000002c0), 0x4) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz1\x00', 0x1ff) r4 = perf_event_open$cgroup(&(0x7f0000000600)={0x0, 0x70, 0x9, 0x6, 0x8, 0x6, 0x0, 0xfffffffffffff49f, 0x2, 0x6, 0x3ff, 0x0, 0x20, 0x0, 0x1, 0x81, 0x1, 0x400, 0x4, 0xfac, 0x4, 0x1, 0x10000, 0xf1, 0xd3, 0x92b, 0x200, 0x1, 0x100000000, 0x2, 0x100000000, 0xfff, 0xfff, 0xffff, 0x3, 0xfffffffffffffffd, 0x0, 0x6, 0x0, 0x50, 0x0, @perf_config_ext={0x3f, 0x9}, 0x20000, 0x8, 0xef3, 0x7, 0x100000000, 0x8, 0xfff}, 0xffffffffffffffff, 0x2, r0, 0x8) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000b40)='cgroup.subtree_control\x00') ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x2400, 0x1) r5 = getpid() socketpair$unix(0x1, 0x7, 0x0, &(0x7f0000000540)={0xffffffffffffffff}) setsockopt$sock_attach_bpf(r6, 0x1, 0x32, &(0x7f00000005c0)=r3, 0x4) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={0x0, 0xffffffffffffffff, 0x0, 0x12, &(0x7f0000000480)='./cgroup.cpu/syz1\x00', r1}, 0x30) perf_event_open(&(0x7f0000000300)={0x5, 0x70, 0xff, 0x4, 0x1000, 0xe5af, 0x0, 0x8000, 0xd0440, 0x2, 0xffff, 0x1, 0x4, 0x1f, 0x3, 0xfffffffffffffffa, 0x5, 0x9, 0x8, 0x1, 0x3, 0x400, 0x6, 0x5, 0x401, 0x10000, 0xff, 0xb24, 0xffffffffffff8000, 0xc8a, 0x3f, 0xfffffffffffffffa, 0xffffffffffff8001, 0x200, 0x5, 0x3, 0x2, 0x93a, 0x0, 0x7fff, 0x2, @perf_bp={&(0x7f0000000100), 0x1}, 0x0, 0x0, 0xffffffffffffff4e, 0x6, 0x0, 0x4, 0xfffffffffffffffd}, r5, 0x0, r7, 0x8) r8 = openat$tun(0xffffffffffffff9c, &(0x7f0000000580)='/dev/net/tun\x00', 0x40000, 0x0) ioctl$TUNSETPERSIST(r8, 0x400454cb, 0x1) r9 = socket$kcm(0x29, 0x5, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000800)={0x0, r0, 0x1, 0x2}, 0x14) ioctl$sock_kcm_SIOCKCMUNATTACH(r9, 0x89e1, &(0x7f0000000900)={r2}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r3, 0x0, 0x8b, 0x0, &(0x7f0000000680)="3ce41f426b7dd449ae14b08e1868c456d4fe9c7993884cf18f4dd5a0bc57250243da4203e0640859184bc4c4690afefd7736e8842cd88030448e918bdb5bd9bbbd680a51261557c0477c18049c832005ebb5b185c6f233df73a21d3b3ddad8426fba2d5f8aac5df904d5e5f2e7dc4a517079e08d5b2175a276f2a5c49cc2957cb367f269898570852dd63a", 0x0, 0x5}, 0x28) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000500)='./cgroup/syz0\x00', 0x200002, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000740)={r3, 0x50, &(0x7f00000003c0)}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r2, 0x50, &(0x7f0000000840)}, 0x10) openat$cgroup_subtree(r2, &(0x7f0000000940)='cgroup.subtree_control\x00', 0x2, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x1ff, 0x0, 0x0, 0x0, 0x200000, 0xffffffffffffffff, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280), 0x2}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r10 = socket$kcm(0xa, 0x400000000002, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffc59) ioctl$sock_kcm_SIOCKCMCLONE(r10, 0x890b, &(0x7f0000000000)) ioctl$sock_kcm_SIOCKCMCLONE(r10, 0x890c, &(0x7f0000000000)) 03:53:21 executing program 2: clone(0x1fd, 0x0, 0x0, 0x0, 0x0) mknod(&(0x7f0000000040)='./file0\x00', 0x1040, 0x0) execve(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) recvfrom$unix(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) 03:53:21 executing program 3: r0 = syz_open_dev$binder(&(0x7f0000000080)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x106, 0x0, 0x0}) [ 1829.174612] encrypted_key: master key parameter 'user:' is invalid [ 1829.191139] encrypted_key: master key parameter 'user:' is invalid 03:53:21 executing program 4: r0 = socket$inet_dccp(0x2, 0x6, 0x0) fcntl$getflags(r0, 0x7) 03:53:22 executing program 0: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r0 = inotify_init() read(r0, 0x0, 0x0) r1 = inotify_add_watch(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x20000000) inotify_rm_watch(r0, r1) 03:53:22 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) sendmsg$TIPC_CMD_SET_NODE_ADDR(0xffffffffffffffff, 0x0, 0x20000000) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/nat_icmp_send\x00', 0x2, 0x0) syz_kvm_setup_cpu$x86(r1, r2, &(0x7f0000011000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f0000000040)={0x0, 0x119000}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffd9c) ioctl$KVM_NMI(r2, 0xae9a) ioctl$KVM_RUN(r2, 0xae80, 0x0) 03:53:22 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x20, &(0x7f0000000b80)=ANY=[@ANYBLOB="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"], 0x0, 0x1625, 0x0, 0x0, 0x41100, 0x1, [], 0x0, 0x4}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r0, 0xdb, &(0x7f0000000200)={0x0, 0x0}}, 0x393) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='cgroup.events\x00', 0x0, 0x0) write$cgroup_int(r2, 0x0, 0x0) r3 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000002c0), 0x4) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz1\x00', 0x1ff) r4 = perf_event_open$cgroup(&(0x7f0000000600)={0x0, 0x70, 0x9, 0x6, 0x8, 0x6, 0x0, 0xfffffffffffff49f, 0x2, 0x6, 0x3ff, 0x0, 0x20, 0x0, 0x1, 0x81, 0x1, 0x400, 0x4, 0xfac, 0x4, 0x1, 0x10000, 0xf1, 0xd3, 0x92b, 0x200, 0x1, 0x100000000, 0x2, 0x100000000, 0xfff, 0xfff, 0xffff, 0x3, 0xfffffffffffffffd, 0x0, 0x6, 0x0, 0x50, 0x0, @perf_config_ext={0x3f, 0x9}, 0x20000, 0x8, 0xef3, 0x7, 0x100000000, 0x8, 0xfff}, 0xffffffffffffffff, 0x2, r0, 0x8) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000b40)='cgroup.subtree_control\x00') ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x2400, 0x1) r5 = getpid() socketpair$unix(0x1, 0x7, 0x0, &(0x7f0000000540)={0xffffffffffffffff}) setsockopt$sock_attach_bpf(r6, 0x1, 0x32, &(0x7f00000005c0)=r3, 0x4) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={0x0, 0xffffffffffffffff, 0x0, 0x12, &(0x7f0000000480)='./cgroup.cpu/syz1\x00', r1}, 0x30) perf_event_open(&(0x7f0000000300)={0x5, 0x70, 0xff, 0x4, 0x1000, 0xe5af, 0x0, 0x8000, 0xd0440, 0x2, 0xffff, 0x1, 0x4, 0x1f, 0x3, 0xfffffffffffffffa, 0x5, 0x9, 0x8, 0x1, 0x3, 0x400, 0x6, 0x5, 0x401, 0x10000, 0xff, 0xb24, 0xffffffffffff8000, 0xc8a, 0x3f, 0xfffffffffffffffa, 0xffffffffffff8001, 0x200, 0x5, 0x3, 0x2, 0x93a, 0x0, 0x7fff, 0x2, @perf_bp={&(0x7f0000000100), 0x1}, 0x0, 0x0, 0xffffffffffffff4e, 0x6, 0x0, 0x4, 0xfffffffffffffffd}, r5, 0x0, r7, 0x8) r8 = openat$tun(0xffffffffffffff9c, &(0x7f0000000580)='/dev/net/tun\x00', 0x40000, 0x0) ioctl$TUNSETPERSIST(r8, 0x400454cb, 0x1) r9 = socket$kcm(0x29, 0x5, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000800)={0x0, r0, 0x1, 0x2}, 0x14) ioctl$sock_kcm_SIOCKCMUNATTACH(r9, 0x89e1, &(0x7f0000000900)={r2}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r3, 0x0, 0x8b, 0x0, &(0x7f0000000680)="3ce41f426b7dd449ae14b08e1868c456d4fe9c7993884cf18f4dd5a0bc57250243da4203e0640859184bc4c4690afefd7736e8842cd88030448e918bdb5bd9bbbd680a51261557c0477c18049c832005ebb5b185c6f233df73a21d3b3ddad8426fba2d5f8aac5df904d5e5f2e7dc4a517079e08d5b2175a276f2a5c49cc2957cb367f269898570852dd63a", 0x0, 0x5}, 0x28) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000500)='./cgroup/syz0\x00', 0x200002, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000740)={r3, 0x50, &(0x7f00000003c0)}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r2, 0x50, &(0x7f0000000840)}, 0x10) openat$cgroup_subtree(r2, &(0x7f0000000940)='cgroup.subtree_control\x00', 0x2, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x1ff, 0x0, 0x0, 0x0, 0x200000, 0xffffffffffffffff, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280), 0x2}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r10 = socket$kcm(0xa, 0x400000000002, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffc59) ioctl$sock_kcm_SIOCKCMCLONE(r10, 0x890b, &(0x7f0000000000)) ioctl$sock_kcm_SIOCKCMCLONE(r10, 0x890c, &(0x7f0000000000)) 03:53:22 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, 0x0, &(0x7f0000002e00)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) fstat(r1, &(0x7f0000003840)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) 03:53:22 executing program 4: r0 = syz_open_dev$sndseq(&(0x7f0000000080)='/dev/snd/seq\x00', 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r0, 0xc08c5332, &(0x7f00000000c0)={0x0, 0x0, 0x0, 'queue0\x00'}) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TEMPO(r0, 0x404c534a, &(0x7f0000dc5f98)) [ 1829.682712] net_ratelimit: 22 callbacks suppressed [ 1829.682726] protocol 88fb is buggy, dev hsr_slave_0 [ 1829.692872] protocol 88fb is buggy, dev hsr_slave_1 [ 1829.698047] protocol 88fb is buggy, dev hsr_slave_0 [ 1829.703171] protocol 88fb is buggy, dev hsr_slave_1 03:53:22 executing program 4: r0 = socket$unix(0x1, 0x1, 0x0) connect(r0, &(0x7f0000931ff4)=@un=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) 03:53:22 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x20, &(0x7f0000000b80)=ANY=[@ANYBLOB="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"], 0x0, 0x1625, 0x0, 0x0, 0x41100, 0x1, [], 0x0, 0x4}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r0, 0xdb, &(0x7f0000000200)={0x0, 0x0}}, 0x393) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='cgroup.events\x00', 0x0, 0x0) write$cgroup_int(r2, 0x0, 0x0) r3 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000002c0), 0x4) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz1\x00', 0x1ff) r4 = perf_event_open$cgroup(&(0x7f0000000600)={0x0, 0x70, 0x9, 0x6, 0x8, 0x6, 0x0, 0xfffffffffffff49f, 0x2, 0x6, 0x3ff, 0x0, 0x20, 0x0, 0x1, 0x81, 0x1, 0x400, 0x4, 0xfac, 0x4, 0x1, 0x10000, 0xf1, 0xd3, 0x92b, 0x200, 0x1, 0x100000000, 0x2, 0x100000000, 0xfff, 0xfff, 0xffff, 0x3, 0xfffffffffffffffd, 0x0, 0x6, 0x0, 0x50, 0x0, @perf_config_ext={0x3f, 0x9}, 0x20000, 0x8, 0xef3, 0x7, 0x100000000, 0x8, 0xfff}, 0xffffffffffffffff, 0x2, r0, 0x8) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000b40)='cgroup.subtree_control\x00') ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x2400, 0x1) r5 = getpid() socketpair$unix(0x1, 0x7, 0x0, &(0x7f0000000540)={0xffffffffffffffff}) setsockopt$sock_attach_bpf(r6, 0x1, 0x32, &(0x7f00000005c0)=r3, 0x4) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={0x0, 0xffffffffffffffff, 0x0, 0x12, &(0x7f0000000480)='./cgroup.cpu/syz1\x00', r1}, 0x30) perf_event_open(&(0x7f0000000300)={0x5, 0x70, 0xff, 0x4, 0x1000, 0xe5af, 0x0, 0x8000, 0xd0440, 0x2, 0xffff, 0x1, 0x4, 0x1f, 0x3, 0xfffffffffffffffa, 0x5, 0x9, 0x8, 0x1, 0x3, 0x400, 0x6, 0x5, 0x401, 0x10000, 0xff, 0xb24, 0xffffffffffff8000, 0xc8a, 0x3f, 0xfffffffffffffffa, 0xffffffffffff8001, 0x200, 0x5, 0x3, 0x2, 0x93a, 0x0, 0x7fff, 0x2, @perf_bp={&(0x7f0000000100), 0x1}, 0x0, 0x0, 0xffffffffffffff4e, 0x6, 0x0, 0x4, 0xfffffffffffffffd}, r5, 0x0, r7, 0x8) r8 = openat$tun(0xffffffffffffff9c, &(0x7f0000000580)='/dev/net/tun\x00', 0x40000, 0x0) ioctl$TUNSETPERSIST(r8, 0x400454cb, 0x1) r9 = socket$kcm(0x29, 0x5, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000800)={0x0, r0, 0x1, 0x2}, 0x14) ioctl$sock_kcm_SIOCKCMUNATTACH(r9, 0x89e1, &(0x7f0000000900)={r2}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r3, 0x0, 0x8b, 0x0, &(0x7f0000000680)="3ce41f426b7dd449ae14b08e1868c456d4fe9c7993884cf18f4dd5a0bc57250243da4203e0640859184bc4c4690afefd7736e8842cd88030448e918bdb5bd9bbbd680a51261557c0477c18049c832005ebb5b185c6f233df73a21d3b3ddad8426fba2d5f8aac5df904d5e5f2e7dc4a517079e08d5b2175a276f2a5c49cc2957cb367f269898570852dd63a", 0x0, 0x5}, 0x28) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000500)='./cgroup/syz0\x00', 0x200002, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000740)={r3, 0x50, &(0x7f00000003c0)}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r2, 0x50, &(0x7f0000000840)}, 0x10) openat$cgroup_subtree(r2, &(0x7f0000000940)='cgroup.subtree_control\x00', 0x2, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x1ff, 0x0, 0x0, 0x0, 0x200000, 0xffffffffffffffff, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280), 0x2}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r10 = socket$kcm(0xa, 0x400000000002, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffc59) ioctl$sock_kcm_SIOCKCMCLONE(r10, 0x890b, &(0x7f0000000000)) ioctl$sock_kcm_SIOCKCMCLONE(r10, 0x890c, &(0x7f0000000000)) 03:53:22 executing program 5: getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffff9c, 0x84, 0x13, 0x0, 0x0) r0 = syz_open_dev$swradio(&(0x7f0000000000)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$radio(0x0, 0xffffffffffffffff, 0x2) r1 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) getdents64(r1, 0x0, 0x0) r2 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r2, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r2, 0x8) r3 = socket$inet6_sctp(0xa, 0x805, 0x84) r4 = accept4(r2, 0x0, 0x0, 0x0) prctl$PR_SET_ENDIAN(0x14, 0x1) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r3, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) epoll_pwait(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000080), 0x8) getpgid(0x0) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r4, 0x84, 0x9, &(0x7f0000000280)={0x0, @in={{0x2, 0x0, @empty}}, 0x0, 0xac14142400000000, 0x0, 0x0, 0x54}, 0x98) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000780)={{{@in=@dev, @in6=@local}}, {{@in6=@mcast2}, 0x0, @in6=@dev}}, 0x0) ioctl$SIOCAX25ADDFWD(r0, 0x89ea, 0x0) syz_mount_image$gfs2(&(0x7f00000003c0)='gfs2\x00', 0x0, 0x87, 0x0, &(0x7f00000005c0), 0x1040040, 0x0) readv(r1, &(0x7f0000000500)=[{&(0x7f0000000400)=""/217, 0xd9}], 0x1) 03:53:22 executing program 3: r0 = getpgid(0x0) r1 = gettid() kcmp(r0, r1, 0x1, 0xffffffffffffffff, 0xffffffffffffffff) 03:53:22 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, 0x0, 0x0) 03:53:22 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x20, &(0x7f0000000b80)=ANY=[@ANYBLOB="cab5674ca80400f902c8d3fc17d4a51472ff5e04a7ed68e9074e865fffffffffff6582e2a0c58f438f1a9b1af27305fb6c1d497851a00d51dddde821f356222d82de15a5bb3ca4d544c3683ff903b30637ee634a8a4fa0e19e57c7d35e4db3a02231b71023a910ac2424326e31258bde7ca760ff3ca3261a92112b3c8db9e0d79dc5ad29e05434154bba1e60d243d8fa466b27518c09e11b78ec43ab7af1d33fbd4885ee5e95b0849345d0edef0a2e68320a47938597cf0fba5ae2e93301ffc38baaf2673b7fd4628a0fe3665006d238567bdb430991e02866ad858345dc86331d91a53051b3284827fc0a870d857ecc180901feb2d1dd3be0c1ebc3fa1d00d550744d9e55"], 0x0, 0x1625, 0x0, 0x0, 0x41100, 0x1, [], 0x0, 0x4}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r0, 0xdb, &(0x7f0000000200)={0x0, 0x0}}, 0x393) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='cgroup.events\x00', 0x0, 0x0) write$cgroup_int(r2, &(0x7f00000007c0), 0x12) r3 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000002c0), 0x4) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz1\x00', 0x1ff) r4 = perf_event_open$cgroup(&(0x7f0000000600)={0x0, 0x70, 0x9, 0x6, 0x8, 0x6, 0x0, 0xfffffffffffff49f, 0x2, 0x6, 0x3ff, 0x0, 0x20, 0x0, 0x1, 0x81, 0x1, 0x400, 0x4, 0xfac, 0x4, 0x1, 0x10000, 0xf1, 0xd3, 0x92b, 0x200, 0x1, 0x100000000, 0x2, 0x100000000, 0xfff, 0xfff, 0xffff, 0x3, 0xfffffffffffffffd, 0x0, 0x6, 0x0, 0x50, 0x0, @perf_config_ext={0x3f, 0x9}, 0x20000, 0x8, 0xef3, 0x7, 0x100000000, 0x8, 0xfff}, 0xffffffffffffffff, 0x2, r0, 0x8) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000b40)='cgroup.subtree_control\x00') ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x2400, 0x1) r5 = getpid() socketpair$unix(0x1, 0x7, 0x0, &(0x7f0000000540)={0xffffffffffffffff}) setsockopt$sock_attach_bpf(r6, 0x1, 0x32, &(0x7f00000005c0)=r3, 0x4) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={0x0, 0xffffffffffffffff, 0x0, 0x12, &(0x7f0000000480)='./cgroup.cpu/syz1\x00', r1}, 0x30) perf_event_open(&(0x7f0000000300)={0x5, 0x70, 0xff, 0x4, 0x1000, 0xe5af, 0x0, 0x8000, 0xd0440, 0x2, 0xffff, 0x1, 0x4, 0x1f, 0x3, 0xfffffffffffffffa, 0x5, 0x9, 0x8, 0x1, 0x3, 0x400, 0x6, 0x5, 0x401, 0x10000, 0xff, 0xb24, 0xffffffffffff8000, 0xc8a, 0x3f, 0xfffffffffffffffa, 0xffffffffffff8001, 0x200, 0x5, 0x3, 0x2, 0x93a, 0x0, 0x7fff, 0x2, @perf_bp={&(0x7f0000000100), 0x1}, 0x0, 0x0, 0xffffffffffffff4e, 0x6, 0x0, 0x4, 0xfffffffffffffffd}, r5, 0x0, r7, 0x8) r8 = openat$tun(0xffffffffffffff9c, &(0x7f0000000580)='/dev/net/tun\x00', 0x40000, 0x0) ioctl$TUNSETPERSIST(r8, 0x400454cb, 0x1) r9 = socket$kcm(0x29, 0x5, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000800)={0x0, r0, 0x1, 0x2}, 0x14) ioctl$sock_kcm_SIOCKCMUNATTACH(r9, 0x89e1, &(0x7f0000000900)={r2}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r3, 0x0, 0x8b, 0x0, &(0x7f0000000680)="3ce41f426b7dd449ae14b08e1868c456d4fe9c7993884cf18f4dd5a0bc57250243da4203e0640859184bc4c4690afefd7736e8842cd88030448e918bdb5bd9bbbd680a51261557c0477c18049c832005ebb5b185c6f233df73a21d3b3ddad8426fba2d5f8aac5df904d5e5f2e7dc4a517079e08d5b2175a276f2a5c49cc2957cb367f269898570852dd63a", 0x0, 0x5}, 0x28) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000500)='./cgroup/syz0\x00', 0x200002, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000740)={r3, 0x50, &(0x7f00000003c0)}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r2, 0x50, &(0x7f0000000840)}, 0x10) openat$cgroup_subtree(r2, &(0x7f0000000940)='cgroup.subtree_control\x00', 0x2, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x1ff, 0x0, 0x0, 0x0, 0x200000, 0xffffffffffffffff, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280), 0x2}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r10 = socket$kcm(0xa, 0x400000000002, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffc59) ioctl$sock_kcm_SIOCKCMCLONE(r10, 0x890b, &(0x7f0000000000)) ioctl$sock_kcm_SIOCKCMCLONE(r10, 0x890c, &(0x7f0000000000)) 03:53:22 executing program 4: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_ASSOCINFO(r0, 0x84, 0x1, 0x0, 0x0) 03:53:23 executing program 3: sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) 03:53:23 executing program 2: r0 = socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x4, 0x310, 0x238, 0x0, 0x0, 0x0, 0x0, 0x4b0, 0x4b0, 0x4b0, 0x4b0, 0x4b0, 0x4, 0x0, {[{{@ip={@dev, @rand_addr, 0x0, 0x0, 'teql0\x00', 'erspan0\x00', {}, {0xff}}, 0x0, 0x98, 0xc0}, @REJECT={0x28, 'REJECT\x00'}}, {{@ip={@empty, @broadcast, 0x0, 0x0, 'lapb0\x00', 'bridge_slave_0\x00'}, 0x0, 0x98, 0xc0}, @REJECT={0x28, 'REJECT\x00'}}, {{@ip={@remote, @empty, 0x0, 0x0, 'veth0_to_bridge\x00', 'batadv0\x00'}, 0x0, 0x98, 0xf8}, @common=@SET={0x60, 'SET\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x370) 03:53:23 executing program 0: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r0 = inotify_init() read(r0, 0x0, 0x0) r1 = inotify_add_watch(r0, 0x0, 0x20000000) inotify_rm_watch(r0, r1) 03:53:23 executing program 4: connect$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x4e24, 0x0, @dev}, 0x313) r0 = socket(0xa, 0x3, 0x1000000000ff) sendto$unix(r0, 0x0, 0x0, 0x0, &(0x7f0000000080)=@abs, 0x6e) 03:53:23 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x20, &(0x7f0000000b80)=ANY=[@ANYBLOB="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"], 0x0, 0x1625, 0x0, 0x0, 0x41100, 0x1, [], 0x0, 0x4}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r0, 0xdb, &(0x7f0000000200)={0x0, 0x0}}, 0x393) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='cgroup.events\x00', 0x0, 0x0) write$cgroup_int(r2, &(0x7f00000007c0), 0x12) r3 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000002c0), 0x4) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz1\x00', 0x1ff) r4 = perf_event_open$cgroup(&(0x7f0000000600)={0x0, 0x70, 0x9, 0x6, 0x8, 0x6, 0x0, 0xfffffffffffff49f, 0x2, 0x6, 0x3ff, 0x0, 0x20, 0x0, 0x1, 0x81, 0x1, 0x400, 0x4, 0xfac, 0x4, 0x1, 0x10000, 0xf1, 0xd3, 0x92b, 0x200, 0x1, 0x100000000, 0x2, 0x100000000, 0xfff, 0xfff, 0xffff, 0x3, 0xfffffffffffffffd, 0x0, 0x6, 0x0, 0x50, 0x0, @perf_config_ext={0x3f, 0x9}, 0x20000, 0x8, 0xef3, 0x7, 0x100000000, 0x8, 0xfff}, 0xffffffffffffffff, 0x2, r0, 0x8) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000b40)='cgroup.subtree_control\x00') ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x2400, 0x1) r5 = getpid() socketpair$unix(0x1, 0x7, 0x0, &(0x7f0000000540)={0xffffffffffffffff}) setsockopt$sock_attach_bpf(r6, 0x1, 0x32, &(0x7f00000005c0)=r3, 0x4) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={0x0, 0xffffffffffffffff, 0x0, 0x12, &(0x7f0000000480)='./cgroup.cpu/syz1\x00', r1}, 0x30) perf_event_open(&(0x7f0000000300)={0x5, 0x70, 0xff, 0x4, 0x1000, 0xe5af, 0x0, 0x8000, 0xd0440, 0x2, 0xffff, 0x1, 0x4, 0x1f, 0x3, 0xfffffffffffffffa, 0x5, 0x9, 0x8, 0x1, 0x3, 0x400, 0x6, 0x5, 0x401, 0x10000, 0xff, 0xb24, 0xffffffffffff8000, 0xc8a, 0x3f, 0xfffffffffffffffa, 0xffffffffffff8001, 0x200, 0x5, 0x3, 0x2, 0x93a, 0x0, 0x7fff, 0x2, @perf_bp={&(0x7f0000000100), 0x1}, 0x0, 0x0, 0xffffffffffffff4e, 0x6, 0x0, 0x4, 0xfffffffffffffffd}, r5, 0x0, r7, 0x8) r8 = openat$tun(0xffffffffffffff9c, &(0x7f0000000580)='/dev/net/tun\x00', 0x40000, 0x0) ioctl$TUNSETPERSIST(r8, 0x400454cb, 0x1) r9 = socket$kcm(0x29, 0x5, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000800)={0x0, r0, 0x1, 0x2}, 0x14) ioctl$sock_kcm_SIOCKCMUNATTACH(r9, 0x89e1, &(0x7f0000000900)={r2}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r3, 0x0, 0x8b, 0x0, &(0x7f0000000680)="3ce41f426b7dd449ae14b08e1868c456d4fe9c7993884cf18f4dd5a0bc57250243da4203e0640859184bc4c4690afefd7736e8842cd88030448e918bdb5bd9bbbd680a51261557c0477c18049c832005ebb5b185c6f233df73a21d3b3ddad8426fba2d5f8aac5df904d5e5f2e7dc4a517079e08d5b2175a276f2a5c49cc2957cb367f269898570852dd63a", 0x0, 0x5}, 0x28) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000500)='./cgroup/syz0\x00', 0x200002, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000740)={r3, 0x50, &(0x7f00000003c0)}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r2, 0x50, &(0x7f0000000840)}, 0x10) openat$cgroup_subtree(r2, &(0x7f0000000940)='cgroup.subtree_control\x00', 0x2, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x1ff, 0x0, 0x0, 0x0, 0x200000, 0xffffffffffffffff, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280), 0x2}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r10 = socket$kcm(0xa, 0x400000000002, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffc59) ioctl$sock_kcm_SIOCKCMCLONE(r10, 0x890b, &(0x7f0000000000)) ioctl$sock_kcm_SIOCKCMCLONE(r10, 0x890c, &(0x7f0000000000)) 03:53:23 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) fgetxattr(r0, &(0x7f0000000000)=@random={'security.', 'cpuset\x00'}, 0x0, 0x0) 03:53:23 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x20, &(0x7f0000000b80)=ANY=[@ANYBLOB="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"], 0x0, 0x1625, 0x0, 0x0, 0x41100, 0x1, [], 0x0, 0x4}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r0, 0xdb, &(0x7f0000000200)={0x0, 0x0}}, 0x393) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='cgroup.events\x00', 0x0, 0x0) write$cgroup_int(r2, &(0x7f00000007c0), 0x12) r3 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000002c0), 0x4) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz1\x00', 0x1ff) r4 = perf_event_open$cgroup(&(0x7f0000000600)={0x0, 0x70, 0x9, 0x6, 0x8, 0x6, 0x0, 0xfffffffffffff49f, 0x2, 0x6, 0x3ff, 0x0, 0x20, 0x0, 0x1, 0x81, 0x1, 0x400, 0x4, 0xfac, 0x4, 0x1, 0x10000, 0xf1, 0xd3, 0x92b, 0x200, 0x1, 0x100000000, 0x2, 0x100000000, 0xfff, 0xfff, 0xffff, 0x3, 0xfffffffffffffffd, 0x0, 0x6, 0x0, 0x50, 0x0, @perf_config_ext={0x3f, 0x9}, 0x20000, 0x8, 0xef3, 0x7, 0x100000000, 0x8, 0xfff}, 0xffffffffffffffff, 0x2, r0, 0x8) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000b40)='cgroup.subtree_control\x00') ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x2400, 0x1) r5 = getpid() socketpair$unix(0x1, 0x7, 0x0, &(0x7f0000000540)={0xffffffffffffffff}) setsockopt$sock_attach_bpf(r6, 0x1, 0x32, &(0x7f00000005c0)=r3, 0x4) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={0x0, 0xffffffffffffffff, 0x0, 0x12, &(0x7f0000000480)='./cgroup.cpu/syz1\x00', r1}, 0x30) perf_event_open(&(0x7f0000000300)={0x5, 0x70, 0xff, 0x4, 0x1000, 0xe5af, 0x0, 0x8000, 0xd0440, 0x2, 0xffff, 0x1, 0x4, 0x1f, 0x3, 0xfffffffffffffffa, 0x5, 0x9, 0x8, 0x1, 0x3, 0x400, 0x6, 0x5, 0x401, 0x10000, 0xff, 0xb24, 0xffffffffffff8000, 0xc8a, 0x3f, 0xfffffffffffffffa, 0xffffffffffff8001, 0x200, 0x5, 0x3, 0x2, 0x93a, 0x0, 0x7fff, 0x2, @perf_bp={&(0x7f0000000100), 0x1}, 0x0, 0x0, 0xffffffffffffff4e, 0x6, 0x0, 0x4, 0xfffffffffffffffd}, r5, 0x0, r7, 0x8) r8 = openat$tun(0xffffffffffffff9c, &(0x7f0000000580)='/dev/net/tun\x00', 0x40000, 0x0) ioctl$TUNSETPERSIST(r8, 0x400454cb, 0x1) r9 = socket$kcm(0x29, 0x5, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000800)={0x0, r0, 0x1, 0x2}, 0x14) ioctl$sock_kcm_SIOCKCMUNATTACH(r9, 0x89e1, &(0x7f0000000900)={r2}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r3, 0x0, 0x8b, 0x0, &(0x7f0000000680)="3ce41f426b7dd449ae14b08e1868c456d4fe9c7993884cf18f4dd5a0bc57250243da4203e0640859184bc4c4690afefd7736e8842cd88030448e918bdb5bd9bbbd680a51261557c0477c18049c832005ebb5b185c6f233df73a21d3b3ddad8426fba2d5f8aac5df904d5e5f2e7dc4a517079e08d5b2175a276f2a5c49cc2957cb367f269898570852dd63a", 0x0, 0x5}, 0x28) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000500)='./cgroup/syz0\x00', 0x200002, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000740)={r3, 0x50, &(0x7f00000003c0)}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r2, 0x50, &(0x7f0000000840)}, 0x10) openat$cgroup_subtree(r2, &(0x7f0000000940)='cgroup.subtree_control\x00', 0x2, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x1ff, 0x0, 0x0, 0x0, 0x200000, 0xffffffffffffffff, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280), 0x2}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r10 = socket$kcm(0xa, 0x400000000002, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffc59) ioctl$sock_kcm_SIOCKCMCLONE(r10, 0x890b, &(0x7f0000000000)) ioctl$sock_kcm_SIOCKCMCLONE(r10, 0x890c, &(0x7f0000000000)) [ 1830.882604] protocol 88fb is buggy, dev hsr_slave_0 [ 1830.887744] protocol 88fb is buggy, dev hsr_slave_1 [ 1830.892943] protocol 88fb is buggy, dev hsr_slave_0 [ 1830.898042] protocol 88fb is buggy, dev hsr_slave_1 [ 1830.903242] protocol 88fb is buggy, dev hsr_slave_0 [ 1830.908329] protocol 88fb is buggy, dev hsr_slave_1 03:53:23 executing program 5: getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffff9c, 0x84, 0x13, 0x0, 0x0) r0 = syz_open_dev$swradio(&(0x7f0000000000)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$radio(0x0, 0xffffffffffffffff, 0x2) r1 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) getdents64(r1, 0x0, 0x0) r2 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r2, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r2, 0x8) r3 = socket$inet6_sctp(0xa, 0x805, 0x84) r4 = accept4(r2, 0x0, 0x0, 0x0) prctl$PR_SET_ENDIAN(0x14, 0x1) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r3, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) epoll_pwait(0xffffffffffffffff, &(0x7f0000000040)=[{}], 0x1, 0x0, &(0x7f0000000080), 0x8) getpgid(0x0) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r4, 0x84, 0x9, &(0x7f0000000280)={0x0, @in={{0x2, 0x0, @empty}}, 0x0, 0xac14142400000000, 0x0, 0x0, 0x54}, 0x98) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000780)={{{@in=@dev, @in6=@local}}, {{@in6=@mcast2}, 0x0, @in6=@dev}}, 0x0) ioctl$SIOCAX25ADDFWD(r0, 0x89ea, 0x0) syz_mount_image$gfs2(&(0x7f00000003c0)='gfs2\x00', 0x0, 0x87, 0x0, &(0x7f00000005c0), 0x1040040, 0x0) readv(r1, &(0x7f0000000500)=[{&(0x7f0000000400)=""/217, 0xd9}], 0x1) 03:53:23 executing program 3: r0 = socket$kcm(0x29, 0x2, 0x0) close(r0) sendmmsg(r0, 0x0, 0x0, 0x0) 03:53:23 executing program 2: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x2000a, 0x0) write$binfmt_elf32(r0, &(0x7f0000000080)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38, 0x392}, [{}]}, 0x58) 03:53:23 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x20, &(0x7f0000000b80)=ANY=[@ANYBLOB="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"], 0x0, 0x1625, 0x0, 0x0, 0x41100, 0x1, [], 0x0, 0x4}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r0, 0xdb, &(0x7f0000000200)={0x0, 0x0}}, 0x393) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='cgroup.events\x00', 0x0, 0x0) write$cgroup_int(r2, &(0x7f00000007c0)=0x6, 0x12) r3 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz1\x00', 0x1ff) r4 = perf_event_open$cgroup(&(0x7f0000000600)={0x0, 0x70, 0x9, 0x6, 0x8, 0x6, 0x0, 0xfffffffffffff49f, 0x2, 0x6, 0x3ff, 0x0, 0x20, 0x0, 0x1, 0x81, 0x1, 0x400, 0x4, 0xfac, 0x4, 0x1, 0x10000, 0xf1, 0xd3, 0x92b, 0x200, 0x1, 0x100000000, 0x2, 0x100000000, 0xfff, 0xfff, 0xffff, 0x3, 0xfffffffffffffffd, 0x0, 0x6, 0x0, 0x50, 0x0, @perf_config_ext={0x3f, 0x9}, 0x20000, 0x8, 0xef3, 0x7, 0x100000000, 0x8, 0xfff}, 0xffffffffffffffff, 0x2, r0, 0x8) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000b40)='cgroup.subtree_control\x00') ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x2400, 0x1) r5 = getpid() socketpair$unix(0x1, 0x7, 0x0, &(0x7f0000000540)={0xffffffffffffffff}) setsockopt$sock_attach_bpf(r6, 0x1, 0x32, &(0x7f00000005c0)=r3, 0x4) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={0x0, 0xffffffffffffffff, 0x0, 0x12, &(0x7f0000000480)='./cgroup.cpu/syz1\x00', r1}, 0x30) perf_event_open(&(0x7f0000000300)={0x5, 0x70, 0xff, 0x4, 0x1000, 0xe5af, 0x0, 0x8000, 0xd0440, 0x2, 0xffff, 0x1, 0x4, 0x1f, 0x3, 0xfffffffffffffffa, 0x5, 0x9, 0x8, 0x1, 0x3, 0x400, 0x6, 0x5, 0x401, 0x10000, 0xff, 0xb24, 0xffffffffffff8000, 0xc8a, 0x3f, 0xfffffffffffffffa, 0xffffffffffff8001, 0x200, 0x5, 0x3, 0x2, 0x93a, 0x0, 0x7fff, 0x2, @perf_bp={&(0x7f0000000100), 0x1}, 0x0, 0x0, 0xffffffffffffff4e, 0x6, 0x0, 0x4, 0xfffffffffffffffd}, r5, 0x0, r7, 0x8) r8 = openat$tun(0xffffffffffffff9c, &(0x7f0000000580)='/dev/net/tun\x00', 0x40000, 0x0) ioctl$TUNSETPERSIST(r8, 0x400454cb, 0x1) r9 = socket$kcm(0x29, 0x5, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000800)={0x0, r0, 0x1, 0x2}, 0x14) ioctl$sock_kcm_SIOCKCMUNATTACH(r9, 0x89e1, &(0x7f0000000900)={r2}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r3, 0x0, 0x8b, 0x0, &(0x7f0000000680)="3ce41f426b7dd449ae14b08e1868c456d4fe9c7993884cf18f4dd5a0bc57250243da4203e0640859184bc4c4690afefd7736e8842cd88030448e918bdb5bd9bbbd680a51261557c0477c18049c832005ebb5b185c6f233df73a21d3b3ddad8426fba2d5f8aac5df904d5e5f2e7dc4a517079e08d5b2175a276f2a5c49cc2957cb367f269898570852dd63a", 0x0, 0x5}, 0x28) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000500)='./cgroup/syz0\x00', 0x200002, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000740)={r3, 0x50, &(0x7f00000003c0)}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r2, 0x50, &(0x7f0000000840)}, 0x10) openat$cgroup_subtree(r2, &(0x7f0000000940)='cgroup.subtree_control\x00', 0x2, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x1ff, 0x0, 0x0, 0x0, 0x200000, 0xffffffffffffffff, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280), 0x2}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r10 = socket$kcm(0xa, 0x400000000002, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffc59) ioctl$sock_kcm_SIOCKCMCLONE(r10, 0x890b, &(0x7f0000000000)) ioctl$sock_kcm_SIOCKCMCLONE(r10, 0x890c, &(0x7f0000000000)) 03:53:23 executing program 4: r0 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r0, &(0x7f0000000000)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x1, 0x0, 0x0, 0x3, {0xa, 0x0, 0x0, @dev}}}, 0x3a) 03:53:23 executing program 2: r0 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$clear(0x7, r0) 03:53:23 executing program 3: r0 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(r0, 0x84, 0x78, 0x0, 0x0) 03:53:24 executing program 4: mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0xfffffffffffffffc, 0x32, 0xffffffffffffffff, 0x0) r0 = socket$packet(0x11, 0x2, 0x300) getsockopt$packet_int(r0, 0x107, 0xb, 0x0, &(0x7f0000000040)) 03:53:24 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x20, &(0x7f0000000b80)=ANY=[@ANYBLOB="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"], 0x0, 0x1625, 0x0, 0x0, 0x41100, 0x1, [], 0x0, 0x4}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r0, 0xdb, &(0x7f0000000200)={0x0, 0x0}}, 0x393) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='cgroup.events\x00', 0x0, 0x0) write$cgroup_int(r2, &(0x7f00000007c0)=0x6, 0x12) r3 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz1\x00', 0x1ff) r4 = perf_event_open$cgroup(&(0x7f0000000600)={0x0, 0x70, 0x9, 0x6, 0x8, 0x6, 0x0, 0xfffffffffffff49f, 0x2, 0x6, 0x3ff, 0x0, 0x20, 0x0, 0x1, 0x81, 0x1, 0x400, 0x4, 0xfac, 0x4, 0x1, 0x10000, 0xf1, 0xd3, 0x92b, 0x200, 0x1, 0x100000000, 0x2, 0x100000000, 0xfff, 0xfff, 0xffff, 0x3, 0xfffffffffffffffd, 0x0, 0x6, 0x0, 0x50, 0x0, @perf_config_ext={0x3f, 0x9}, 0x20000, 0x8, 0xef3, 0x7, 0x100000000, 0x8, 0xfff}, 0xffffffffffffffff, 0x2, r0, 0x8) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000b40)='cgroup.subtree_control\x00') ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x2400, 0x1) r5 = getpid() socketpair$unix(0x1, 0x7, 0x0, &(0x7f0000000540)={0xffffffffffffffff}) setsockopt$sock_attach_bpf(r6, 0x1, 0x32, &(0x7f00000005c0)=r3, 0x4) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={0x0, 0xffffffffffffffff, 0x0, 0x12, &(0x7f0000000480)='./cgroup.cpu/syz1\x00', r1}, 0x30) perf_event_open(&(0x7f0000000300)={0x5, 0x70, 0xff, 0x4, 0x1000, 0xe5af, 0x0, 0x8000, 0xd0440, 0x2, 0xffff, 0x1, 0x4, 0x1f, 0x3, 0xfffffffffffffffa, 0x5, 0x9, 0x8, 0x1, 0x3, 0x400, 0x6, 0x5, 0x401, 0x10000, 0xff, 0xb24, 0xffffffffffff8000, 0xc8a, 0x3f, 0xfffffffffffffffa, 0xffffffffffff8001, 0x200, 0x5, 0x3, 0x2, 0x93a, 0x0, 0x7fff, 0x2, @perf_bp={&(0x7f0000000100), 0x1}, 0x0, 0x0, 0xffffffffffffff4e, 0x6, 0x0, 0x4, 0xfffffffffffffffd}, r5, 0x0, r7, 0x8) r8 = openat$tun(0xffffffffffffff9c, &(0x7f0000000580)='/dev/net/tun\x00', 0x40000, 0x0) ioctl$TUNSETPERSIST(r8, 0x400454cb, 0x1) r9 = socket$kcm(0x29, 0x5, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000800)={0x0, r0, 0x1, 0x2}, 0x14) ioctl$sock_kcm_SIOCKCMUNATTACH(r9, 0x89e1, &(0x7f0000000900)={r2}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r3, 0x0, 0x8b, 0x0, &(0x7f0000000680)="3ce41f426b7dd449ae14b08e1868c456d4fe9c7993884cf18f4dd5a0bc57250243da4203e0640859184bc4c4690afefd7736e8842cd88030448e918bdb5bd9bbbd680a51261557c0477c18049c832005ebb5b185c6f233df73a21d3b3ddad8426fba2d5f8aac5df904d5e5f2e7dc4a517079e08d5b2175a276f2a5c49cc2957cb367f269898570852dd63a", 0x0, 0x5}, 0x28) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000500)='./cgroup/syz0\x00', 0x200002, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000740)={r3, 0x50, &(0x7f00000003c0)}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r2, 0x50, &(0x7f0000000840)}, 0x10) openat$cgroup_subtree(r2, &(0x7f0000000940)='cgroup.subtree_control\x00', 0x2, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x1ff, 0x0, 0x0, 0x0, 0x200000, 0xffffffffffffffff, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280), 0x2}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r10 = socket$kcm(0xa, 0x400000000002, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffc59) ioctl$sock_kcm_SIOCKCMCLONE(r10, 0x890b, &(0x7f0000000000)) ioctl$sock_kcm_SIOCKCMCLONE(r10, 0x890c, &(0x7f0000000000)) 03:53:24 executing program 0: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r0 = inotify_init() read(r0, 0x0, 0x0) r1 = inotify_add_watch(r0, 0x0, 0x20000000) inotify_rm_watch(r0, r1) 03:53:24 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)=ANY=[@ANYBLOB="0000000023859b380c000200aaaaaaaaaa000000140003006272696467655f736c6176655f310000143935de0fd9335a1a6c1e2487a8111e1b05cb9855873b7b517b57ae5fbb71c74eb452aa425763"], 0x1}}, 0x0) 03:53:24 executing program 2: unshare(0x400) fstat(0xffffffffffffff9c, 0x0) 03:53:24 executing program 5: getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffff9c, 0x84, 0x13, 0x0, 0x0) r0 = syz_open_dev$swradio(&(0x7f0000000000)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$radio(0x0, 0xffffffffffffffff, 0x2) r1 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) getdents64(r1, 0x0, 0x0) r2 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r2, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r2, 0x8) r3 = socket$inet6_sctp(0xa, 0x805, 0x84) r4 = accept4(r2, 0x0, 0x0, 0x0) prctl$PR_SET_ENDIAN(0x14, 0x1) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r3, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) epoll_pwait(0xffffffffffffffff, &(0x7f0000000040)=[{}], 0x1, 0x0, &(0x7f0000000080), 0x8) getpgid(0x0) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r4, 0x84, 0x9, &(0x7f0000000280)={0x0, @in={{0x2, 0x0, @empty}}, 0x0, 0xac14142400000000, 0x0, 0x0, 0x54}, 0x98) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000780)={{{@in=@dev, @in6=@local}}, {{@in6=@mcast2}, 0x0, @in6=@dev}}, 0x0) ioctl$SIOCAX25ADDFWD(r0, 0x89ea, 0x0) syz_mount_image$gfs2(&(0x7f00000003c0)='gfs2\x00', 0x0, 0x87, 0x0, &(0x7f00000005c0), 0x1040040, 0x0) readv(r1, &(0x7f0000000500)=[{&(0x7f0000000400)=""/217, 0xd9}], 0x1) 03:53:24 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7, 0x9}, 0x2c) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000340)={r0, 0xffffffbd, 0x0}, 0x10) 03:53:24 executing program 3: mbind(&(0x7f000033f000/0x3000)=nil, 0x3000, 0x4, 0x0, 0x0, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='numa_maps\x00') readv(r0, &(0x7f0000000780)=[{&(0x7f0000002400)=""/4096, 0x1000}], 0x1) 03:53:24 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x20, &(0x7f0000000b80)=ANY=[@ANYBLOB="cab5674ca80400f902c8d3fc17d4a51472ff5e04a7ed68e9074e865fffffffffff6582e2a0c58f438f1a9b1af27305fb6c1d497851a00d51dddde821f356222d82de15a5bb3ca4d544c3683ff903b30637ee634a8a4fa0e19e57c7d35e4db3a02231b71023a910ac2424326e31258bde7ca760ff3ca3261a92112b3c8db9e0d79dc5ad29e05434154bba1e60d243d8fa466b27518c09e11b78ec43ab7af1d33fbd4885ee5e95b0849345d0edef0a2e68320a47938597cf0fba5ae2e93301ffc38baaf2673b7fd4628a0fe3665006d238567bdb430991e02866ad858345dc86331d91a53051b3284827fc0a870d857ecc180901feb2d1dd3be0c1ebc3fa1d00d550744d9e55"], 0x0, 0x1625, 0x0, 0x0, 0x41100, 0x1, [], 0x0, 0x4}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r0, 0xdb, &(0x7f0000000200)={0x0, 0x0}}, 0x393) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='cgroup.events\x00', 0x0, 0x0) write$cgroup_int(r2, &(0x7f00000007c0)=0x6, 0x12) r3 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz1\x00', 0x1ff) r4 = perf_event_open$cgroup(&(0x7f0000000600)={0x0, 0x70, 0x9, 0x6, 0x8, 0x6, 0x0, 0xfffffffffffff49f, 0x2, 0x6, 0x3ff, 0x0, 0x20, 0x0, 0x1, 0x81, 0x1, 0x400, 0x4, 0xfac, 0x4, 0x1, 0x10000, 0xf1, 0xd3, 0x92b, 0x200, 0x1, 0x100000000, 0x2, 0x100000000, 0xfff, 0xfff, 0xffff, 0x3, 0xfffffffffffffffd, 0x0, 0x6, 0x0, 0x50, 0x0, @perf_config_ext={0x3f, 0x9}, 0x20000, 0x8, 0xef3, 0x7, 0x100000000, 0x8, 0xfff}, 0xffffffffffffffff, 0x2, r0, 0x8) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000b40)='cgroup.subtree_control\x00') ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x2400, 0x1) r5 = getpid() socketpair$unix(0x1, 0x7, 0x0, &(0x7f0000000540)={0xffffffffffffffff}) setsockopt$sock_attach_bpf(r6, 0x1, 0x32, &(0x7f00000005c0)=r3, 0x4) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={0x0, 0xffffffffffffffff, 0x0, 0x12, &(0x7f0000000480)='./cgroup.cpu/syz1\x00', r1}, 0x30) perf_event_open(&(0x7f0000000300)={0x5, 0x70, 0xff, 0x4, 0x1000, 0xe5af, 0x0, 0x8000, 0xd0440, 0x2, 0xffff, 0x1, 0x4, 0x1f, 0x3, 0xfffffffffffffffa, 0x5, 0x9, 0x8, 0x1, 0x3, 0x400, 0x6, 0x5, 0x401, 0x10000, 0xff, 0xb24, 0xffffffffffff8000, 0xc8a, 0x3f, 0xfffffffffffffffa, 0xffffffffffff8001, 0x200, 0x5, 0x3, 0x2, 0x93a, 0x0, 0x7fff, 0x2, @perf_bp={&(0x7f0000000100), 0x1}, 0x0, 0x0, 0xffffffffffffff4e, 0x6, 0x0, 0x4, 0xfffffffffffffffd}, r5, 0x0, r7, 0x8) r8 = openat$tun(0xffffffffffffff9c, &(0x7f0000000580)='/dev/net/tun\x00', 0x40000, 0x0) ioctl$TUNSETPERSIST(r8, 0x400454cb, 0x1) r9 = socket$kcm(0x29, 0x5, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000800)={0x0, r0, 0x1, 0x2}, 0x14) ioctl$sock_kcm_SIOCKCMUNATTACH(r9, 0x89e1, &(0x7f0000000900)={r2}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r3, 0x0, 0x8b, 0x0, &(0x7f0000000680)="3ce41f426b7dd449ae14b08e1868c456d4fe9c7993884cf18f4dd5a0bc57250243da4203e0640859184bc4c4690afefd7736e8842cd88030448e918bdb5bd9bbbd680a51261557c0477c18049c832005ebb5b185c6f233df73a21d3b3ddad8426fba2d5f8aac5df904d5e5f2e7dc4a517079e08d5b2175a276f2a5c49cc2957cb367f269898570852dd63a", 0x0, 0x5}, 0x28) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000500)='./cgroup/syz0\x00', 0x200002, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000740)={r3, 0x50, &(0x7f00000003c0)}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r2, 0x50, &(0x7f0000000840)}, 0x10) openat$cgroup_subtree(r2, &(0x7f0000000940)='cgroup.subtree_control\x00', 0x2, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x1ff, 0x0, 0x0, 0x0, 0x200000, 0xffffffffffffffff, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280), 0x2}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r10 = socket$kcm(0xa, 0x400000000002, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffc59) ioctl$sock_kcm_SIOCKCMCLONE(r10, 0x890b, &(0x7f0000000000)) ioctl$sock_kcm_SIOCKCMCLONE(r10, 0x890c, &(0x7f0000000000)) 03:53:24 executing program 4: io_setup(0x0, &(0x7f0000001180)) 03:53:24 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, &(0x7f0000000180)={0x2}, 0x8) 03:53:24 executing program 3: setrlimit(0x0, &(0x7f0000001b80)={0x1286, 0x7fff}) 03:53:24 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) getsockopt$IP_VS_SO_GET_SERVICES(r0, 0x0, 0x482, &(0x7f0000000040)=""/161, &(0x7f0000000140)=0xa1) 03:53:24 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x20, &(0x7f0000000b80)=ANY=[@ANYBLOB="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"], 0x0, 0x1625, 0x0, 0x0, 0x41100, 0x1, [], 0x0, 0x4}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r0, 0xdb, &(0x7f0000000200)={0x0, 0x0}}, 0x393) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='cgroup.events\x00', 0x0, 0x0) write$cgroup_int(r2, &(0x7f00000007c0)=0x6, 0x12) r3 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000002c0), 0x4) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) r4 = perf_event_open$cgroup(&(0x7f0000000600)={0x0, 0x70, 0x9, 0x6, 0x8, 0x6, 0x0, 0xfffffffffffff49f, 0x2, 0x6, 0x3ff, 0x0, 0x20, 0x0, 0x1, 0x81, 0x1, 0x400, 0x4, 0xfac, 0x4, 0x1, 0x10000, 0xf1, 0xd3, 0x92b, 0x200, 0x1, 0x100000000, 0x2, 0x100000000, 0xfff, 0xfff, 0xffff, 0x3, 0xfffffffffffffffd, 0x0, 0x6, 0x0, 0x50, 0x0, @perf_config_ext={0x3f, 0x9}, 0x20000, 0x8, 0xef3, 0x7, 0x100000000, 0x8, 0xfff}, 0xffffffffffffffff, 0x2, r0, 0x8) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000b40)='cgroup.subtree_control\x00') ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x2400, 0x1) r5 = getpid() socketpair$unix(0x1, 0x7, 0x0, &(0x7f0000000540)={0xffffffffffffffff}) setsockopt$sock_attach_bpf(r6, 0x1, 0x32, &(0x7f00000005c0)=r3, 0x4) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={0x0, 0xffffffffffffffff, 0x0, 0x12, &(0x7f0000000480)='./cgroup.cpu/syz1\x00', r1}, 0x30) perf_event_open(&(0x7f0000000300)={0x5, 0x70, 0xff, 0x4, 0x1000, 0xe5af, 0x0, 0x8000, 0xd0440, 0x2, 0xffff, 0x1, 0x4, 0x1f, 0x3, 0xfffffffffffffffa, 0x5, 0x9, 0x8, 0x1, 0x3, 0x400, 0x6, 0x5, 0x401, 0x10000, 0xff, 0xb24, 0xffffffffffff8000, 0xc8a, 0x3f, 0xfffffffffffffffa, 0xffffffffffff8001, 0x200, 0x5, 0x3, 0x2, 0x93a, 0x0, 0x7fff, 0x2, @perf_bp={&(0x7f0000000100), 0x1}, 0x0, 0x0, 0xffffffffffffff4e, 0x6, 0x0, 0x4, 0xfffffffffffffffd}, r5, 0x0, r7, 0x8) r8 = openat$tun(0xffffffffffffff9c, &(0x7f0000000580)='/dev/net/tun\x00', 0x40000, 0x0) ioctl$TUNSETPERSIST(r8, 0x400454cb, 0x1) r9 = socket$kcm(0x29, 0x5, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000800)={0x0, r0, 0x1, 0x2}, 0x14) ioctl$sock_kcm_SIOCKCMUNATTACH(r9, 0x89e1, &(0x7f0000000900)={r2}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r3, 0x0, 0x8b, 0x0, &(0x7f0000000680)="3ce41f426b7dd449ae14b08e1868c456d4fe9c7993884cf18f4dd5a0bc57250243da4203e0640859184bc4c4690afefd7736e8842cd88030448e918bdb5bd9bbbd680a51261557c0477c18049c832005ebb5b185c6f233df73a21d3b3ddad8426fba2d5f8aac5df904d5e5f2e7dc4a517079e08d5b2175a276f2a5c49cc2957cb367f269898570852dd63a", 0x0, 0x5}, 0x28) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000500)='./cgroup/syz0\x00', 0x200002, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000740)={r3, 0x50, &(0x7f00000003c0)}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r2, 0x50, &(0x7f0000000840)}, 0x10) openat$cgroup_subtree(r2, &(0x7f0000000940)='cgroup.subtree_control\x00', 0x2, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x1ff, 0x0, 0x0, 0x0, 0x200000, 0xffffffffffffffff, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280), 0x2}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r10 = socket$kcm(0xa, 0x400000000002, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffc59) ioctl$sock_kcm_SIOCKCMCLONE(r10, 0x890b, &(0x7f0000000000)) ioctl$sock_kcm_SIOCKCMCLONE(r10, 0x890c, &(0x7f0000000000)) [ 1832.116059] IPVS: length: 161 != 8 03:53:24 executing program 0: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r0 = inotify_init() read(r0, 0x0, 0x0) r1 = inotify_add_watch(r0, 0x0, 0x20000000) inotify_rm_watch(r0, r1) 03:53:24 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x20, &(0x7f0000000b80)=ANY=[@ANYBLOB="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"], 0x0, 0x1625, 0x0, 0x0, 0x41100, 0x1, [], 0x0, 0x4}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r0, 0xdb, &(0x7f0000000200)={0x0, 0x0}}, 0x393) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='cgroup.events\x00', 0x0, 0x0) write$cgroup_int(r2, &(0x7f00000007c0)=0x6, 0x12) r3 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000002c0), 0x4) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) r4 = perf_event_open$cgroup(&(0x7f0000000600)={0x0, 0x70, 0x9, 0x6, 0x8, 0x6, 0x0, 0xfffffffffffff49f, 0x2, 0x6, 0x3ff, 0x0, 0x20, 0x0, 0x1, 0x81, 0x1, 0x400, 0x4, 0xfac, 0x4, 0x1, 0x10000, 0xf1, 0xd3, 0x92b, 0x200, 0x1, 0x100000000, 0x2, 0x100000000, 0xfff, 0xfff, 0xffff, 0x3, 0xfffffffffffffffd, 0x0, 0x6, 0x0, 0x50, 0x0, @perf_config_ext={0x3f, 0x9}, 0x20000, 0x8, 0xef3, 0x7, 0x100000000, 0x8, 0xfff}, 0xffffffffffffffff, 0x2, r0, 0x8) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000b40)='cgroup.subtree_control\x00') ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x2400, 0x1) r5 = getpid() socketpair$unix(0x1, 0x7, 0x0, &(0x7f0000000540)={0xffffffffffffffff}) setsockopt$sock_attach_bpf(r6, 0x1, 0x32, &(0x7f00000005c0)=r3, 0x4) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={0x0, 0xffffffffffffffff, 0x0, 0x12, &(0x7f0000000480)='./cgroup.cpu/syz1\x00', r1}, 0x30) perf_event_open(&(0x7f0000000300)={0x5, 0x70, 0xff, 0x4, 0x1000, 0xe5af, 0x0, 0x8000, 0xd0440, 0x2, 0xffff, 0x1, 0x4, 0x1f, 0x3, 0xfffffffffffffffa, 0x5, 0x9, 0x8, 0x1, 0x3, 0x400, 0x6, 0x5, 0x401, 0x10000, 0xff, 0xb24, 0xffffffffffff8000, 0xc8a, 0x3f, 0xfffffffffffffffa, 0xffffffffffff8001, 0x200, 0x5, 0x3, 0x2, 0x93a, 0x0, 0x7fff, 0x2, @perf_bp={&(0x7f0000000100), 0x1}, 0x0, 0x0, 0xffffffffffffff4e, 0x6, 0x0, 0x4, 0xfffffffffffffffd}, r5, 0x0, r7, 0x8) r8 = openat$tun(0xffffffffffffff9c, &(0x7f0000000580)='/dev/net/tun\x00', 0x40000, 0x0) ioctl$TUNSETPERSIST(r8, 0x400454cb, 0x1) r9 = socket$kcm(0x29, 0x5, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000800)={0x0, r0, 0x1, 0x2}, 0x14) ioctl$sock_kcm_SIOCKCMUNATTACH(r9, 0x89e1, &(0x7f0000000900)={r2}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r3, 0x0, 0x8b, 0x0, &(0x7f0000000680)="3ce41f426b7dd449ae14b08e1868c456d4fe9c7993884cf18f4dd5a0bc57250243da4203e0640859184bc4c4690afefd7736e8842cd88030448e918bdb5bd9bbbd680a51261557c0477c18049c832005ebb5b185c6f233df73a21d3b3ddad8426fba2d5f8aac5df904d5e5f2e7dc4a517079e08d5b2175a276f2a5c49cc2957cb367f269898570852dd63a", 0x0, 0x5}, 0x28) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000500)='./cgroup/syz0\x00', 0x200002, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000740)={r3, 0x50, &(0x7f00000003c0)}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r2, 0x50, &(0x7f0000000840)}, 0x10) openat$cgroup_subtree(r2, &(0x7f0000000940)='cgroup.subtree_control\x00', 0x2, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x1ff, 0x0, 0x0, 0x0, 0x200000, 0xffffffffffffffff, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280), 0x2}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r10 = socket$kcm(0xa, 0x400000000002, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffc59) ioctl$sock_kcm_SIOCKCMCLONE(r10, 0x890b, &(0x7f0000000000)) ioctl$sock_kcm_SIOCKCMCLONE(r10, 0x890c, &(0x7f0000000000)) 03:53:24 executing program 2: chdir(0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x20141042, 0x0) ftruncate(r0, 0x28007e) sendfile(r0, r0, 0x0, 0x2008000fffffffe) ftruncate(r0, 0x0) 03:53:24 executing program 3: r0 = syz_open_dev$video(&(0x7f0000000240)='/dev/video#\x00', 0x0, 0x0) ioctl$VIDIOC_REQBUFS(r0, 0xc0145608, &(0x7f0000000000)={0x0, 0x3}) 03:53:24 executing program 5: getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffff9c, 0x84, 0x13, 0x0, 0x0) r0 = syz_open_dev$swradio(&(0x7f0000000000)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$radio(0x0, 0xffffffffffffffff, 0x2) r1 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) getdents64(r1, 0x0, 0x0) r2 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r2, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r2, 0x8) r3 = socket$inet6_sctp(0xa, 0x805, 0x84) r4 = accept4(r2, 0x0, 0x0, 0x0) prctl$PR_SET_ENDIAN(0x14, 0x1) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r3, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) epoll_pwait(0xffffffffffffffff, &(0x7f0000000040)=[{}], 0x1, 0x0, &(0x7f0000000080), 0x8) getpgid(0x0) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r4, 0x84, 0x9, &(0x7f0000000280)={0x0, @in={{0x2, 0x0, @empty}}, 0x0, 0xac14142400000000, 0x0, 0x0, 0x54}, 0x98) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000780)={{{@in=@dev, @in6=@local}}, {{@in6=@mcast2}, 0x0, @in6=@dev}}, 0x0) ioctl$SIOCAX25ADDFWD(r0, 0x89ea, 0x0) syz_mount_image$gfs2(&(0x7f00000003c0)='gfs2\x00', 0x0, 0x87, 0x0, &(0x7f00000005c0), 0x1040040, 0x0) readv(r1, &(0x7f0000000500)=[{&(0x7f0000000400)=""/217, 0xd9}], 0x1) 03:53:25 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x20, &(0x7f0000000b80)=ANY=[@ANYBLOB="cab5674ca80400f902c8d3fc17d4a51472ff5e04a7ed68e9074e865fffffffffff6582e2a0c58f438f1a9b1af27305fb6c1d497851a00d51dddde821f356222d82de15a5bb3ca4d544c3683ff903b30637ee634a8a4fa0e19e57c7d35e4db3a02231b71023a910ac2424326e31258bde7ca760ff3ca3261a92112b3c8db9e0d79dc5ad29e05434154bba1e60d243d8fa466b27518c09e11b78ec43ab7af1d33fbd4885ee5e95b0849345d0edef0a2e68320a47938597cf0fba5ae2e93301ffc38baaf2673b7fd4628a0fe3665006d238567bdb430991e02866ad858345dc86331d91a53051b3284827fc0a870d857ecc180901feb2d1dd3be0c1ebc3fa1d00d550744d9e55"], 0x0, 0x1625, 0x0, 0x0, 0x41100, 0x1, [], 0x0, 0x4}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r0, 0xdb, &(0x7f0000000200)={0x0, 0x0}}, 0x393) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='cgroup.events\x00', 0x0, 0x0) write$cgroup_int(r2, &(0x7f00000007c0)=0x6, 0x12) r3 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000002c0), 0x4) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) r4 = perf_event_open$cgroup(&(0x7f0000000600)={0x0, 0x70, 0x9, 0x6, 0x8, 0x6, 0x0, 0xfffffffffffff49f, 0x2, 0x6, 0x3ff, 0x0, 0x20, 0x0, 0x1, 0x81, 0x1, 0x400, 0x4, 0xfac, 0x4, 0x1, 0x10000, 0xf1, 0xd3, 0x92b, 0x200, 0x1, 0x100000000, 0x2, 0x100000000, 0xfff, 0xfff, 0xffff, 0x3, 0xfffffffffffffffd, 0x0, 0x6, 0x0, 0x50, 0x0, @perf_config_ext={0x3f, 0x9}, 0x20000, 0x8, 0xef3, 0x7, 0x100000000, 0x8, 0xfff}, 0xffffffffffffffff, 0x2, r0, 0x8) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000b40)='cgroup.subtree_control\x00') ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x2400, 0x1) r5 = getpid() socketpair$unix(0x1, 0x7, 0x0, &(0x7f0000000540)={0xffffffffffffffff}) setsockopt$sock_attach_bpf(r6, 0x1, 0x32, &(0x7f00000005c0)=r3, 0x4) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={0x0, 0xffffffffffffffff, 0x0, 0x12, &(0x7f0000000480)='./cgroup.cpu/syz1\x00', r1}, 0x30) perf_event_open(&(0x7f0000000300)={0x5, 0x70, 0xff, 0x4, 0x1000, 0xe5af, 0x0, 0x8000, 0xd0440, 0x2, 0xffff, 0x1, 0x4, 0x1f, 0x3, 0xfffffffffffffffa, 0x5, 0x9, 0x8, 0x1, 0x3, 0x400, 0x6, 0x5, 0x401, 0x10000, 0xff, 0xb24, 0xffffffffffff8000, 0xc8a, 0x3f, 0xfffffffffffffffa, 0xffffffffffff8001, 0x200, 0x5, 0x3, 0x2, 0x93a, 0x0, 0x7fff, 0x2, @perf_bp={&(0x7f0000000100), 0x1}, 0x0, 0x0, 0xffffffffffffff4e, 0x6, 0x0, 0x4, 0xfffffffffffffffd}, r5, 0x0, r7, 0x8) r8 = openat$tun(0xffffffffffffff9c, &(0x7f0000000580)='/dev/net/tun\x00', 0x40000, 0x0) ioctl$TUNSETPERSIST(r8, 0x400454cb, 0x1) r9 = socket$kcm(0x29, 0x5, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000800)={0x0, r0, 0x1, 0x2}, 0x14) ioctl$sock_kcm_SIOCKCMUNATTACH(r9, 0x89e1, &(0x7f0000000900)={r2}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r3, 0x0, 0x8b, 0x0, &(0x7f0000000680)="3ce41f426b7dd449ae14b08e1868c456d4fe9c7993884cf18f4dd5a0bc57250243da4203e0640859184bc4c4690afefd7736e8842cd88030448e918bdb5bd9bbbd680a51261557c0477c18049c832005ebb5b185c6f233df73a21d3b3ddad8426fba2d5f8aac5df904d5e5f2e7dc4a517079e08d5b2175a276f2a5c49cc2957cb367f269898570852dd63a", 0x0, 0x5}, 0x28) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000500)='./cgroup/syz0\x00', 0x200002, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000740)={r3, 0x50, &(0x7f00000003c0)}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r2, 0x50, &(0x7f0000000840)}, 0x10) openat$cgroup_subtree(r2, &(0x7f0000000940)='cgroup.subtree_control\x00', 0x2, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x1ff, 0x0, 0x0, 0x0, 0x200000, 0xffffffffffffffff, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280), 0x2}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r10 = socket$kcm(0xa, 0x400000000002, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffc59) ioctl$sock_kcm_SIOCKCMCLONE(r10, 0x890b, &(0x7f0000000000)) ioctl$sock_kcm_SIOCKCMCLONE(r10, 0x890c, &(0x7f0000000000)) 03:53:25 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) sendmsg$inet_sctp(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000139ff0)=@in={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10, &(0x7f0000000040)=[{&(0x7f0000000340)="d2", 0x1}], 0x1}, 0x0) sendmmsg$inet_sctp(r0, &(0x7f0000000080)=[{&(0x7f0000000180)=@in={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10, &(0x7f0000562000), 0x0, &(0x7f00000c3000)=[@sndinfo={0x20, 0x84, 0x2, {0x0, 0x241}}], 0x20}], 0x4924924924924d0, 0x0) 03:53:25 executing program 2: pipe2(&(0x7f0000000000), 0x0) shmat(0x0, &(0x7f0000fff000/0x1000)=nil, 0x0) 03:53:25 executing program 4: r0 = syz_open_dev$midi(&(0x7f00000000c0)='/dev/midi#\x00', 0x2, 0x200000) splice(r0, 0x0, 0xffffffffffffffff, 0x0, 0x1, 0x0) 03:53:25 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x20, &(0x7f0000000b80)=ANY=[@ANYBLOB="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"], 0x0, 0x1625, 0x0, 0x0, 0x41100, 0x1, [], 0x0, 0x4}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r0, 0xdb, &(0x7f0000000200)={0x0, 0x0}}, 0x393) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='cgroup.events\x00', 0x0, 0x0) write$cgroup_int(r2, &(0x7f00000007c0)=0x6, 0x12) r3 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000002c0), 0x4) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz1\x00', 0x1ff) r4 = perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x2, r0, 0x8) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000b40)='cgroup.subtree_control\x00') ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x2400, 0x1) r5 = getpid() socketpair$unix(0x1, 0x7, 0x0, &(0x7f0000000540)={0xffffffffffffffff}) setsockopt$sock_attach_bpf(r6, 0x1, 0x32, &(0x7f00000005c0)=r3, 0x4) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={0x0, 0xffffffffffffffff, 0x0, 0x12, &(0x7f0000000480)='./cgroup.cpu/syz1\x00', r1}, 0x30) perf_event_open(&(0x7f0000000300)={0x5, 0x70, 0xff, 0x4, 0x1000, 0xe5af, 0x0, 0x8000, 0xd0440, 0x2, 0xffff, 0x1, 0x4, 0x1f, 0x3, 0xfffffffffffffffa, 0x5, 0x9, 0x8, 0x1, 0x3, 0x400, 0x6, 0x5, 0x401, 0x10000, 0xff, 0xb24, 0xffffffffffff8000, 0xc8a, 0x3f, 0xfffffffffffffffa, 0xffffffffffff8001, 0x200, 0x5, 0x3, 0x2, 0x93a, 0x0, 0x7fff, 0x2, @perf_bp={&(0x7f0000000100), 0x1}, 0x0, 0x0, 0xffffffffffffff4e, 0x6, 0x0, 0x4, 0xfffffffffffffffd}, r5, 0x0, r7, 0x8) r8 = openat$tun(0xffffffffffffff9c, &(0x7f0000000580)='/dev/net/tun\x00', 0x40000, 0x0) ioctl$TUNSETPERSIST(r8, 0x400454cb, 0x1) r9 = socket$kcm(0x29, 0x5, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000800)={0x0, r0, 0x1, 0x2}, 0x14) ioctl$sock_kcm_SIOCKCMUNATTACH(r9, 0x89e1, &(0x7f0000000900)={r2}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r3, 0x0, 0x8b, 0x0, &(0x7f0000000680)="3ce41f426b7dd449ae14b08e1868c456d4fe9c7993884cf18f4dd5a0bc57250243da4203e0640859184bc4c4690afefd7736e8842cd88030448e918bdb5bd9bbbd680a51261557c0477c18049c832005ebb5b185c6f233df73a21d3b3ddad8426fba2d5f8aac5df904d5e5f2e7dc4a517079e08d5b2175a276f2a5c49cc2957cb367f269898570852dd63a", 0x0, 0x5}, 0x28) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000500)='./cgroup/syz0\x00', 0x200002, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000740)={r3, 0x50, &(0x7f00000003c0)}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r2, 0x50, &(0x7f0000000840)}, 0x10) openat$cgroup_subtree(r2, &(0x7f0000000940)='cgroup.subtree_control\x00', 0x2, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x1ff, 0x0, 0x0, 0x0, 0x200000, 0xffffffffffffffff, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280), 0x2}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r10 = socket$kcm(0xa, 0x400000000002, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffc59) ioctl$sock_kcm_SIOCKCMCLONE(r10, 0x890b, &(0x7f0000000000)) ioctl$sock_kcm_SIOCKCMCLONE(r10, 0x890c, &(0x7f0000000000)) 03:53:25 executing program 2: r0 = socket(0xa, 0x3, 0x1000000000ff) connect$l2tp(r0, &(0x7f0000000000)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, 0x26) 03:53:25 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x20, &(0x7f0000000b80)=ANY=[@ANYBLOB="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"], 0x0, 0x1625, 0x0, 0x0, 0x41100, 0x1, [], 0x0, 0x4}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r0, 0xdb, &(0x7f0000000200)={0x0, 0x0}}, 0x393) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='cgroup.events\x00', 0x0, 0x0) write$cgroup_int(r2, &(0x7f00000007c0)=0x6, 0x12) r3 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000002c0), 0x4) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz1\x00', 0x1ff) r4 = perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x2, r0, 0x8) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000b40)='cgroup.subtree_control\x00') ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x2400, 0x1) r5 = getpid() socketpair$unix(0x1, 0x7, 0x0, &(0x7f0000000540)={0xffffffffffffffff}) setsockopt$sock_attach_bpf(r6, 0x1, 0x32, &(0x7f00000005c0)=r3, 0x4) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={0x0, 0xffffffffffffffff, 0x0, 0x12, &(0x7f0000000480)='./cgroup.cpu/syz1\x00', r1}, 0x30) perf_event_open(&(0x7f0000000300)={0x5, 0x70, 0xff, 0x4, 0x1000, 0xe5af, 0x0, 0x8000, 0xd0440, 0x2, 0xffff, 0x1, 0x4, 0x1f, 0x3, 0xfffffffffffffffa, 0x5, 0x9, 0x8, 0x1, 0x3, 0x400, 0x6, 0x5, 0x401, 0x10000, 0xff, 0xb24, 0xffffffffffff8000, 0xc8a, 0x3f, 0xfffffffffffffffa, 0xffffffffffff8001, 0x200, 0x5, 0x3, 0x2, 0x93a, 0x0, 0x7fff, 0x2, @perf_bp={&(0x7f0000000100), 0x1}, 0x0, 0x0, 0xffffffffffffff4e, 0x6, 0x0, 0x4, 0xfffffffffffffffd}, r5, 0x0, r7, 0x8) r8 = openat$tun(0xffffffffffffff9c, &(0x7f0000000580)='/dev/net/tun\x00', 0x40000, 0x0) ioctl$TUNSETPERSIST(r8, 0x400454cb, 0x1) r9 = socket$kcm(0x29, 0x5, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000800)={0x0, r0, 0x1, 0x2}, 0x14) ioctl$sock_kcm_SIOCKCMUNATTACH(r9, 0x89e1, &(0x7f0000000900)={r2}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r3, 0x0, 0x8b, 0x0, &(0x7f0000000680)="3ce41f426b7dd449ae14b08e1868c456d4fe9c7993884cf18f4dd5a0bc57250243da4203e0640859184bc4c4690afefd7736e8842cd88030448e918bdb5bd9bbbd680a51261557c0477c18049c832005ebb5b185c6f233df73a21d3b3ddad8426fba2d5f8aac5df904d5e5f2e7dc4a517079e08d5b2175a276f2a5c49cc2957cb367f269898570852dd63a", 0x0, 0x5}, 0x28) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000500)='./cgroup/syz0\x00', 0x200002, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000740)={r3, 0x50, &(0x7f00000003c0)}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r2, 0x50, &(0x7f0000000840)}, 0x10) openat$cgroup_subtree(r2, &(0x7f0000000940)='cgroup.subtree_control\x00', 0x2, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x1ff, 0x0, 0x0, 0x0, 0x200000, 0xffffffffffffffff, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280), 0x2}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r10 = socket$kcm(0xa, 0x400000000002, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffc59) ioctl$sock_kcm_SIOCKCMCLONE(r10, 0x890b, &(0x7f0000000000)) ioctl$sock_kcm_SIOCKCMCLONE(r10, 0x890c, &(0x7f0000000000)) 03:53:25 executing program 0: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r0 = inotify_init() read(r0, 0x0, 0x0) r1 = inotify_add_watch(r0, &(0x7f0000000040)='./file0\x00', 0x0) inotify_rm_watch(r0, r1) 03:53:25 executing program 2: r0 = syz_open_dev$swradio(&(0x7f0000000000)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_ENUM_FMT(r0, 0xc0405602, &(0x7f0000000040)={0x0, 0x7, 0x0, "42d05c96cace31edcf81a1ec0d4fb3fcffbd569c33e064ebde8d2a50552a575c"}) 03:53:25 executing program 4: r0 = socket$kcm(0x2, 0x2, 0x73) r1 = dup(r0) connect$vsock_dgram(r1, &(0x7f0000000000)={0x28, 0x0, 0x0, @reserved}, 0x10) 03:53:25 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x20, &(0x7f0000000b80)=ANY=[@ANYBLOB="cab5674ca80400f902c8d3fc17d4a51472ff5e04a7ed68e9074e865fffffffffff6582e2a0c58f438f1a9b1af27305fb6c1d497851a00d51dddde821f356222d82de15a5bb3ca4d544c3683ff903b30637ee634a8a4fa0e19e57c7d35e4db3a02231b71023a910ac2424326e31258bde7ca760ff3ca3261a92112b3c8db9e0d79dc5ad29e05434154bba1e60d243d8fa466b27518c09e11b78ec43ab7af1d33fbd4885ee5e95b0849345d0edef0a2e68320a47938597cf0fba5ae2e93301ffc38baaf2673b7fd4628a0fe3665006d238567bdb430991e02866ad858345dc86331d91a53051b3284827fc0a870d857ecc180901feb2d1dd3be0c1ebc3fa1d00d550744d9e55"], 0x0, 0x1625, 0x0, 0x0, 0x41100, 0x1, [], 0x0, 0x4}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r0, 0xdb, &(0x7f0000000200)={0x0, 0x0}}, 0x393) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='cgroup.events\x00', 0x0, 0x0) write$cgroup_int(r2, &(0x7f00000007c0)=0x6, 0x12) r3 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000002c0), 0x4) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz1\x00', 0x1ff) r4 = perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x2, r0, 0x8) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000b40)='cgroup.subtree_control\x00') ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x2400, 0x1) r5 = getpid() socketpair$unix(0x1, 0x7, 0x0, &(0x7f0000000540)={0xffffffffffffffff}) setsockopt$sock_attach_bpf(r6, 0x1, 0x32, &(0x7f00000005c0)=r3, 0x4) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={0x0, 0xffffffffffffffff, 0x0, 0x12, &(0x7f0000000480)='./cgroup.cpu/syz1\x00', r1}, 0x30) perf_event_open(&(0x7f0000000300)={0x5, 0x70, 0xff, 0x4, 0x1000, 0xe5af, 0x0, 0x8000, 0xd0440, 0x2, 0xffff, 0x1, 0x4, 0x1f, 0x3, 0xfffffffffffffffa, 0x5, 0x9, 0x8, 0x1, 0x3, 0x400, 0x6, 0x5, 0x401, 0x10000, 0xff, 0xb24, 0xffffffffffff8000, 0xc8a, 0x3f, 0xfffffffffffffffa, 0xffffffffffff8001, 0x200, 0x5, 0x3, 0x2, 0x93a, 0x0, 0x7fff, 0x2, @perf_bp={&(0x7f0000000100), 0x1}, 0x0, 0x0, 0xffffffffffffff4e, 0x6, 0x0, 0x4, 0xfffffffffffffffd}, r5, 0x0, r7, 0x8) r8 = openat$tun(0xffffffffffffff9c, &(0x7f0000000580)='/dev/net/tun\x00', 0x40000, 0x0) ioctl$TUNSETPERSIST(r8, 0x400454cb, 0x1) r9 = socket$kcm(0x29, 0x5, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000800)={0x0, r0, 0x1, 0x2}, 0x14) ioctl$sock_kcm_SIOCKCMUNATTACH(r9, 0x89e1, &(0x7f0000000900)={r2}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r3, 0x0, 0x8b, 0x0, &(0x7f0000000680)="3ce41f426b7dd449ae14b08e1868c456d4fe9c7993884cf18f4dd5a0bc57250243da4203e0640859184bc4c4690afefd7736e8842cd88030448e918bdb5bd9bbbd680a51261557c0477c18049c832005ebb5b185c6f233df73a21d3b3ddad8426fba2d5f8aac5df904d5e5f2e7dc4a517079e08d5b2175a276f2a5c49cc2957cb367f269898570852dd63a", 0x0, 0x5}, 0x28) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000500)='./cgroup/syz0\x00', 0x200002, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000740)={r3, 0x50, &(0x7f00000003c0)}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r2, 0x50, &(0x7f0000000840)}, 0x10) openat$cgroup_subtree(r2, &(0x7f0000000940)='cgroup.subtree_control\x00', 0x2, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x1ff, 0x0, 0x0, 0x0, 0x200000, 0xffffffffffffffff, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280), 0x2}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r10 = socket$kcm(0xa, 0x400000000002, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffc59) ioctl$sock_kcm_SIOCKCMCLONE(r10, 0x890b, &(0x7f0000000000)) ioctl$sock_kcm_SIOCKCMCLONE(r10, 0x890c, &(0x7f0000000000)) 03:53:25 executing program 5: getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffff9c, 0x84, 0x13, 0x0, 0x0) r0 = syz_open_dev$swradio(&(0x7f0000000000)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$radio(0x0, 0xffffffffffffffff, 0x2) r1 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) getdents64(r1, 0x0, 0x0) r2 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r2, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r2, 0x8) r3 = socket$inet6_sctp(0xa, 0x805, 0x84) r4 = accept4(r2, 0x0, 0x0, 0x0) prctl$PR_SET_ENDIAN(0x14, 0x1) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r3, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) epoll_pwait(0xffffffffffffffff, &(0x7f0000000040), 0x0, 0x0, &(0x7f0000000080), 0x8) getpgid(0x0) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r4, 0x84, 0x9, &(0x7f0000000280)={0x0, @in={{0x2, 0x0, @empty}}, 0x0, 0xac14142400000000, 0x0, 0x0, 0x54}, 0x98) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000780)={{{@in=@dev, @in6=@local}}, {{@in6=@mcast2}, 0x0, @in6=@dev}}, 0x0) ioctl$SIOCAX25ADDFWD(r0, 0x89ea, 0x0) syz_mount_image$gfs2(&(0x7f00000003c0)='gfs2\x00', 0x0, 0x87, 0x0, &(0x7f00000005c0), 0x1040040, 0x0) readv(r1, &(0x7f0000000500)=[{&(0x7f0000000400)=""/217, 0xd9}], 0x1) 03:53:25 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x20, &(0x7f0000000b80)=ANY=[@ANYBLOB="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"], 0x0, 0x1625, 0x0, 0x0, 0x41100, 0x1, [], 0x0, 0x4}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r0, 0xdb, &(0x7f0000000200)={0x0, 0x0}}, 0x393) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='cgroup.events\x00', 0x0, 0x0) write$cgroup_int(r2, &(0x7f00000007c0)=0x6, 0x12) r3 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000002c0), 0x4) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz1\x00', 0x1ff) r4 = perf_event_open$cgroup(&(0x7f0000000600)={0x0, 0x70, 0x0, 0x6, 0x8, 0x6, 0x0, 0xfffffffffffff49f, 0x2, 0x6, 0x3ff, 0x0, 0x20, 0x0, 0x1, 0x81, 0x1, 0x400, 0x4, 0xfac, 0x4, 0x1, 0x10000, 0xf1, 0xd3, 0x92b, 0x200, 0x1, 0x100000000, 0x2, 0x100000000, 0xfff, 0xfff, 0xffff, 0x3, 0xfffffffffffffffd, 0x0, 0x6, 0x0, 0x50, 0x0, @perf_config_ext={0x3f, 0x9}, 0x20000, 0x8, 0xef3, 0x7, 0x100000000, 0x8, 0xfff}, 0xffffffffffffffff, 0x2, r0, 0x8) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000b40)='cgroup.subtree_control\x00') ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x2400, 0x1) r5 = getpid() socketpair$unix(0x1, 0x7, 0x0, &(0x7f0000000540)={0xffffffffffffffff}) setsockopt$sock_attach_bpf(r6, 0x1, 0x32, &(0x7f00000005c0)=r3, 0x4) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={0x0, 0xffffffffffffffff, 0x0, 0x12, &(0x7f0000000480)='./cgroup.cpu/syz1\x00', r1}, 0x30) perf_event_open(&(0x7f0000000300)={0x5, 0x70, 0xff, 0x4, 0x1000, 0xe5af, 0x0, 0x8000, 0xd0440, 0x2, 0xffff, 0x1, 0x4, 0x1f, 0x3, 0xfffffffffffffffa, 0x5, 0x9, 0x8, 0x1, 0x3, 0x400, 0x6, 0x5, 0x401, 0x10000, 0xff, 0xb24, 0xffffffffffff8000, 0xc8a, 0x3f, 0xfffffffffffffffa, 0xffffffffffff8001, 0x200, 0x5, 0x3, 0x2, 0x93a, 0x0, 0x7fff, 0x2, @perf_bp={&(0x7f0000000100), 0x1}, 0x0, 0x0, 0xffffffffffffff4e, 0x6, 0x0, 0x4, 0xfffffffffffffffd}, r5, 0x0, r7, 0x8) r8 = openat$tun(0xffffffffffffff9c, &(0x7f0000000580)='/dev/net/tun\x00', 0x40000, 0x0) ioctl$TUNSETPERSIST(r8, 0x400454cb, 0x1) r9 = socket$kcm(0x29, 0x5, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000800)={0x0, r0, 0x1, 0x2}, 0x14) ioctl$sock_kcm_SIOCKCMUNATTACH(r9, 0x89e1, &(0x7f0000000900)={r2}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r3, 0x0, 0x8b, 0x0, &(0x7f0000000680)="3ce41f426b7dd449ae14b08e1868c456d4fe9c7993884cf18f4dd5a0bc57250243da4203e0640859184bc4c4690afefd7736e8842cd88030448e918bdb5bd9bbbd680a51261557c0477c18049c832005ebb5b185c6f233df73a21d3b3ddad8426fba2d5f8aac5df904d5e5f2e7dc4a517079e08d5b2175a276f2a5c49cc2957cb367f269898570852dd63a", 0x0, 0x5}, 0x28) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000500)='./cgroup/syz0\x00', 0x200002, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000740)={r3, 0x50, &(0x7f00000003c0)}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r2, 0x50, &(0x7f0000000840)}, 0x10) openat$cgroup_subtree(r2, &(0x7f0000000940)='cgroup.subtree_control\x00', 0x2, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x1ff, 0x0, 0x0, 0x0, 0x200000, 0xffffffffffffffff, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280), 0x2}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r10 = socket$kcm(0xa, 0x400000000002, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffc59) ioctl$sock_kcm_SIOCKCMCLONE(r10, 0x890b, &(0x7f0000000000)) ioctl$sock_kcm_SIOCKCMCLONE(r10, 0x890c, &(0x7f0000000000)) 03:53:25 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000280)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aBJ\xb9\xb3\xf8h>\xcf\x89\xde\xe9\x01\xd2\xdau\xc0\x1f\x02\x00\xf5\x8d&\xd7\xa0q\xfb53\x1c\xe3\x9cZ\xee\xffP\x83\xcf\a\xddFE\\\x91MJ\xff\x1e|\xf7\xedW\xc0\xc2\x05o\\\xa9\xfc\xf0<\xbf\x82\xbd\x13SG73\x92E\xd3\xc7\x06A\xbeb\x81\xd7\xe1\xb4\xb7\t\x91\x14\xc5q\x87\"\x98\xdd\x7f! \xe2\xb6\xfa*.*,\x9cn\x004u\vya\xfa,\x15\x84\xc0\xb5\xa5\x00\xae\n\xc3\x9b\xc7jx\xd9\x15\x82fu\x9fvj>\x8c\x84\xc0\x9c\xf3\xad\x88\x82\x94\x7f\xfa\x1f\xb4\xc0Pr{\xeb\x12\xc5~\x06\xffY\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x89$W\x8a\xd4\x9e\xa1\x14LtH\xd6@\xaa\x88\xa6jq\xb7}s\xa9$\xff\x02\x7f\xdc\xb5P\x16\x16S\xd4\xcbW\b\x83\x85$\x82\x86\xf5\xbe\x9d\x87f\xc7\f)\xe6\xf5\x06=\xfet\xa1\xb0\xb5 y\x15\x90H!\vM\'\x1a\xc9L\x88\x9b\x06<\xa3J\tW\x9a\xf061\xf1(\xe6\xdd,\x96m\xae\xcd|o~\x0fN\xbc\xaf\x80%\f\xfa\xb0q\x84\x83\x80x\xc7\x1d\x80\x9d\x06\xdc\v\xacu\xdb\x81E%\xd1\xd1\xac\xafL\xb6\xf4\x89\x0f9s\x82\xaecf\x97\xf6\x88\tN8\xdb\\\"w\x0fS\alc\r\xf9\xbbL\x14\x91\x89\xff\xa9u\xf5 \x871\x1c[\xaa\xfc\x11\xc9\v\xdc%\xfc\x80;q\x15=\xdc9\x95\xb2\xdfI\xcd\xd7\x84\xbc[\xea@\x86\x10p\xda\xdb9^\x85\xc9<\xdf\xa0\x8e') readahead(r0, 0x0, 0x0) 03:53:25 executing program 3: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/btrfs-control\x00', 0x0, 0x0) flock(r0, 0x0) 03:53:25 executing program 4: r0 = syz_open_dev$sndtimer(&(0x7f00000000c0)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f0000000000)={{0x3, 0x0, 0x0, 0xfffffffff7ffffff}}) 03:53:26 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x20, &(0x7f0000000b80)=ANY=[@ANYBLOB="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"], 0x0, 0x1625, 0x0, 0x0, 0x41100, 0x1, [], 0x0, 0x4}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r0, 0xdb, &(0x7f0000000200)={0x0, 0x0}}, 0x393) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='cgroup.events\x00', 0x0, 0x0) write$cgroup_int(r2, &(0x7f00000007c0)=0x6, 0x12) r3 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000002c0), 0x4) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz1\x00', 0x1ff) r4 = perf_event_open$cgroup(&(0x7f0000000600)={0x0, 0x70, 0x0, 0x6, 0x8, 0x6, 0x0, 0xfffffffffffff49f, 0x2, 0x6, 0x3ff, 0x0, 0x20, 0x0, 0x1, 0x81, 0x1, 0x400, 0x4, 0xfac, 0x4, 0x1, 0x10000, 0xf1, 0xd3, 0x92b, 0x200, 0x1, 0x100000000, 0x2, 0x100000000, 0xfff, 0xfff, 0xffff, 0x3, 0xfffffffffffffffd, 0x0, 0x6, 0x0, 0x50, 0x0, @perf_config_ext={0x3f, 0x9}, 0x20000, 0x8, 0xef3, 0x7, 0x100000000, 0x8, 0xfff}, 0xffffffffffffffff, 0x2, r0, 0x8) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000b40)='cgroup.subtree_control\x00') ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x2400, 0x1) r5 = getpid() socketpair$unix(0x1, 0x7, 0x0, &(0x7f0000000540)={0xffffffffffffffff}) setsockopt$sock_attach_bpf(r6, 0x1, 0x32, &(0x7f00000005c0)=r3, 0x4) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={0x0, 0xffffffffffffffff, 0x0, 0x12, &(0x7f0000000480)='./cgroup.cpu/syz1\x00', r1}, 0x30) perf_event_open(&(0x7f0000000300)={0x5, 0x70, 0xff, 0x4, 0x1000, 0xe5af, 0x0, 0x8000, 0xd0440, 0x2, 0xffff, 0x1, 0x4, 0x1f, 0x3, 0xfffffffffffffffa, 0x5, 0x9, 0x8, 0x1, 0x3, 0x400, 0x6, 0x5, 0x401, 0x10000, 0xff, 0xb24, 0xffffffffffff8000, 0xc8a, 0x3f, 0xfffffffffffffffa, 0xffffffffffff8001, 0x200, 0x5, 0x3, 0x2, 0x93a, 0x0, 0x7fff, 0x2, @perf_bp={&(0x7f0000000100), 0x1}, 0x0, 0x0, 0xffffffffffffff4e, 0x6, 0x0, 0x4, 0xfffffffffffffffd}, r5, 0x0, r7, 0x8) r8 = openat$tun(0xffffffffffffff9c, &(0x7f0000000580)='/dev/net/tun\x00', 0x40000, 0x0) ioctl$TUNSETPERSIST(r8, 0x400454cb, 0x1) r9 = socket$kcm(0x29, 0x5, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000800)={0x0, r0, 0x1, 0x2}, 0x14) ioctl$sock_kcm_SIOCKCMUNATTACH(r9, 0x89e1, &(0x7f0000000900)={r2}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r3, 0x0, 0x8b, 0x0, &(0x7f0000000680)="3ce41f426b7dd449ae14b08e1868c456d4fe9c7993884cf18f4dd5a0bc57250243da4203e0640859184bc4c4690afefd7736e8842cd88030448e918bdb5bd9bbbd680a51261557c0477c18049c832005ebb5b185c6f233df73a21d3b3ddad8426fba2d5f8aac5df904d5e5f2e7dc4a517079e08d5b2175a276f2a5c49cc2957cb367f269898570852dd63a", 0x0, 0x5}, 0x28) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000500)='./cgroup/syz0\x00', 0x200002, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000740)={r3, 0x50, &(0x7f00000003c0)}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r2, 0x50, &(0x7f0000000840)}, 0x10) openat$cgroup_subtree(r2, &(0x7f0000000940)='cgroup.subtree_control\x00', 0x2, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x1ff, 0x0, 0x0, 0x0, 0x200000, 0xffffffffffffffff, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280), 0x2}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r10 = socket$kcm(0xa, 0x400000000002, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffc59) ioctl$sock_kcm_SIOCKCMCLONE(r10, 0x890b, &(0x7f0000000000)) ioctl$sock_kcm_SIOCKCMCLONE(r10, 0x890c, &(0x7f0000000000)) 03:53:26 executing program 4: r0 = socket(0x22, 0x2, 0x4) setsockopt$l2tp_PPPOL2TP_SO_DEBUG(r0, 0x111, 0x1, 0xfffffffffa10d8c2, 0x4) 03:53:26 executing program 2: r0 = syz_open_dev$radio(&(0x7f00000000c0)='/dev/radio#\x00', 0xffffffffffffffff, 0x2) statx(r0, &(0x7f0000000100)='\xe9\x1fq\x89Y\x1e\x923aK\x00', 0x0, 0x0, 0x0) 03:53:26 executing program 0: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r0 = inotify_init() read(r0, 0x0, 0x0) r1 = inotify_add_watch(r0, &(0x7f0000000040)='./file0\x00', 0x0) inotify_rm_watch(r0, r1) 03:53:26 executing program 3: r0 = syz_open_dev$sndtimer(&(0x7f00000000c0)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f0000000040)={{0x1, 0x0, 0x0, 0x0, 0x7f}}) 03:53:26 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x20, &(0x7f0000000b80)=ANY=[@ANYBLOB="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"], 0x0, 0x1625, 0x0, 0x0, 0x41100, 0x1, [], 0x0, 0x4}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r0, 0xdb, &(0x7f0000000200)={0x0, 0x0}}, 0x393) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='cgroup.events\x00', 0x0, 0x0) write$cgroup_int(r2, &(0x7f00000007c0)=0x6, 0x12) r3 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000002c0), 0x4) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz1\x00', 0x1ff) r4 = perf_event_open$cgroup(&(0x7f0000000600)={0x0, 0x70, 0x0, 0x6, 0x8, 0x6, 0x0, 0xfffffffffffff49f, 0x2, 0x6, 0x3ff, 0x0, 0x20, 0x0, 0x1, 0x81, 0x1, 0x400, 0x4, 0xfac, 0x4, 0x1, 0x10000, 0xf1, 0xd3, 0x92b, 0x200, 0x1, 0x100000000, 0x2, 0x100000000, 0xfff, 0xfff, 0xffff, 0x3, 0xfffffffffffffffd, 0x0, 0x6, 0x0, 0x50, 0x0, @perf_config_ext={0x3f, 0x9}, 0x20000, 0x8, 0xef3, 0x7, 0x100000000, 0x8, 0xfff}, 0xffffffffffffffff, 0x2, r0, 0x8) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000b40)='cgroup.subtree_control\x00') ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x2400, 0x1) r5 = getpid() socketpair$unix(0x1, 0x7, 0x0, &(0x7f0000000540)={0xffffffffffffffff}) setsockopt$sock_attach_bpf(r6, 0x1, 0x32, &(0x7f00000005c0)=r3, 0x4) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={0x0, 0xffffffffffffffff, 0x0, 0x12, &(0x7f0000000480)='./cgroup.cpu/syz1\x00', r1}, 0x30) perf_event_open(&(0x7f0000000300)={0x5, 0x70, 0xff, 0x4, 0x1000, 0xe5af, 0x0, 0x8000, 0xd0440, 0x2, 0xffff, 0x1, 0x4, 0x1f, 0x3, 0xfffffffffffffffa, 0x5, 0x9, 0x8, 0x1, 0x3, 0x400, 0x6, 0x5, 0x401, 0x10000, 0xff, 0xb24, 0xffffffffffff8000, 0xc8a, 0x3f, 0xfffffffffffffffa, 0xffffffffffff8001, 0x200, 0x5, 0x3, 0x2, 0x93a, 0x0, 0x7fff, 0x2, @perf_bp={&(0x7f0000000100), 0x1}, 0x0, 0x0, 0xffffffffffffff4e, 0x6, 0x0, 0x4, 0xfffffffffffffffd}, r5, 0x0, r7, 0x8) r8 = openat$tun(0xffffffffffffff9c, &(0x7f0000000580)='/dev/net/tun\x00', 0x40000, 0x0) ioctl$TUNSETPERSIST(r8, 0x400454cb, 0x1) r9 = socket$kcm(0x29, 0x5, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000800)={0x0, r0, 0x1, 0x2}, 0x14) ioctl$sock_kcm_SIOCKCMUNATTACH(r9, 0x89e1, &(0x7f0000000900)={r2}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r3, 0x0, 0x8b, 0x0, &(0x7f0000000680)="3ce41f426b7dd449ae14b08e1868c456d4fe9c7993884cf18f4dd5a0bc57250243da4203e0640859184bc4c4690afefd7736e8842cd88030448e918bdb5bd9bbbd680a51261557c0477c18049c832005ebb5b185c6f233df73a21d3b3ddad8426fba2d5f8aac5df904d5e5f2e7dc4a517079e08d5b2175a276f2a5c49cc2957cb367f269898570852dd63a", 0x0, 0x5}, 0x28) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000500)='./cgroup/syz0\x00', 0x200002, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000740)={r3, 0x50, &(0x7f00000003c0)}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r2, 0x50, &(0x7f0000000840)}, 0x10) openat$cgroup_subtree(r2, &(0x7f0000000940)='cgroup.subtree_control\x00', 0x2, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x1ff, 0x0, 0x0, 0x0, 0x200000, 0xffffffffffffffff, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280), 0x2}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r10 = socket$kcm(0xa, 0x400000000002, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffc59) ioctl$sock_kcm_SIOCKCMCLONE(r10, 0x890b, &(0x7f0000000000)) ioctl$sock_kcm_SIOCKCMCLONE(r10, 0x890c, &(0x7f0000000000)) 03:53:26 executing program 4: remap_file_pages(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x1000000, 0x0, 0x0) 03:53:26 executing program 2: r0 = socket$inet(0x2, 0xa, 0x0) sendmsg$IPVS_CMD_ZERO(r0, &(0x7f0000000140)={&(0x7f0000000080), 0xc, 0x0, 0x1, 0x0, 0x0, 0x40880}, 0x10) 03:53:26 executing program 5: getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffff9c, 0x84, 0x13, 0x0, 0x0) r0 = syz_open_dev$swradio(&(0x7f0000000000)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$radio(0x0, 0xffffffffffffffff, 0x2) r1 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) getdents64(r1, 0x0, 0x0) r2 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r2, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r2, 0x8) r3 = socket$inet6_sctp(0xa, 0x805, 0x84) r4 = accept4(r2, 0x0, 0x0, 0x0) prctl$PR_SET_ENDIAN(0x14, 0x1) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r3, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) epoll_pwait(0xffffffffffffffff, &(0x7f0000000040), 0x0, 0x0, &(0x7f0000000080), 0x8) getpgid(0x0) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r4, 0x84, 0x9, &(0x7f0000000280)={0x0, @in={{0x2, 0x0, @empty}}, 0x0, 0xac14142400000000, 0x0, 0x0, 0x54}, 0x98) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000780)={{{@in=@dev, @in6=@local}}, {{@in6=@mcast2}, 0x0, @in6=@dev}}, 0x0) ioctl$SIOCAX25ADDFWD(r0, 0x89ea, 0x0) syz_mount_image$gfs2(&(0x7f00000003c0)='gfs2\x00', 0x0, 0x87, 0x0, &(0x7f00000005c0), 0x1040040, 0x0) readv(r1, &(0x7f0000000500)=[{&(0x7f0000000400)=""/217, 0xd9}], 0x1) 03:53:26 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) fstat(r1, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fsetxattr$system_posix_acl(r0, &(0x7f0000000000)='system.posix_acl_default\x00', &(0x7f0000000740)={{}, {}, [], {}, [{0x8, 0x0, r2}]}, 0x2c, 0x0) 03:53:26 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x20, &(0x7f0000000b80)=ANY=[@ANYBLOB="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"], 0x0, 0x1625, 0x0, 0x0, 0x41100, 0x1, [], 0x0, 0x4}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r0, 0xdb, &(0x7f0000000200)={0x0, 0x0}}, 0x393) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='cgroup.events\x00', 0x0, 0x0) write$cgroup_int(r2, &(0x7f00000007c0)=0x6, 0x12) r3 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000002c0), 0x4) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz1\x00', 0x1ff) r4 = perf_event_open$cgroup(&(0x7f0000000600)={0x0, 0x70, 0x9, 0x0, 0x8, 0x6, 0x0, 0xfffffffffffff49f, 0x2, 0x6, 0x3ff, 0x0, 0x20, 0x0, 0x1, 0x81, 0x1, 0x400, 0x4, 0xfac, 0x4, 0x1, 0x10000, 0xf1, 0xd3, 0x92b, 0x200, 0x1, 0x100000000, 0x2, 0x100000000, 0xfff, 0xfff, 0xffff, 0x3, 0xfffffffffffffffd, 0x0, 0x6, 0x0, 0x50, 0x0, @perf_config_ext={0x3f, 0x9}, 0x20000, 0x8, 0xef3, 0x7, 0x100000000, 0x8, 0xfff}, 0xffffffffffffffff, 0x2, r0, 0x8) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000b40)='cgroup.subtree_control\x00') ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x2400, 0x1) r5 = getpid() socketpair$unix(0x1, 0x7, 0x0, &(0x7f0000000540)={0xffffffffffffffff}) setsockopt$sock_attach_bpf(r6, 0x1, 0x32, &(0x7f00000005c0)=r3, 0x4) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={0x0, 0xffffffffffffffff, 0x0, 0x12, &(0x7f0000000480)='./cgroup.cpu/syz1\x00', r1}, 0x30) perf_event_open(&(0x7f0000000300)={0x5, 0x70, 0xff, 0x4, 0x1000, 0xe5af, 0x0, 0x8000, 0xd0440, 0x2, 0xffff, 0x1, 0x4, 0x1f, 0x3, 0xfffffffffffffffa, 0x5, 0x9, 0x8, 0x1, 0x3, 0x400, 0x6, 0x5, 0x401, 0x10000, 0xff, 0xb24, 0xffffffffffff8000, 0xc8a, 0x3f, 0xfffffffffffffffa, 0xffffffffffff8001, 0x200, 0x5, 0x3, 0x2, 0x93a, 0x0, 0x7fff, 0x2, @perf_bp={&(0x7f0000000100), 0x1}, 0x0, 0x0, 0xffffffffffffff4e, 0x6, 0x0, 0x4, 0xfffffffffffffffd}, r5, 0x0, r7, 0x8) r8 = openat$tun(0xffffffffffffff9c, &(0x7f0000000580)='/dev/net/tun\x00', 0x40000, 0x0) ioctl$TUNSETPERSIST(r8, 0x400454cb, 0x1) r9 = socket$kcm(0x29, 0x5, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000800)={0x0, r0, 0x1, 0x2}, 0x14) ioctl$sock_kcm_SIOCKCMUNATTACH(r9, 0x89e1, &(0x7f0000000900)={r2}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r3, 0x0, 0x8b, 0x0, &(0x7f0000000680)="3ce41f426b7dd449ae14b08e1868c456d4fe9c7993884cf18f4dd5a0bc57250243da4203e0640859184bc4c4690afefd7736e8842cd88030448e918bdb5bd9bbbd680a51261557c0477c18049c832005ebb5b185c6f233df73a21d3b3ddad8426fba2d5f8aac5df904d5e5f2e7dc4a517079e08d5b2175a276f2a5c49cc2957cb367f269898570852dd63a", 0x0, 0x5}, 0x28) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000500)='./cgroup/syz0\x00', 0x200002, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000740)={r3, 0x50, &(0x7f00000003c0)}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r2, 0x50, &(0x7f0000000840)}, 0x10) openat$cgroup_subtree(r2, &(0x7f0000000940)='cgroup.subtree_control\x00', 0x2, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x1ff, 0x0, 0x0, 0x0, 0x200000, 0xffffffffffffffff, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280), 0x2}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r10 = socket$kcm(0xa, 0x400000000002, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffc59) ioctl$sock_kcm_SIOCKCMCLONE(r10, 0x890b, &(0x7f0000000000)) ioctl$sock_kcm_SIOCKCMCLONE(r10, 0x890c, &(0x7f0000000000)) 03:53:26 executing program 3: r0 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_ZERO(r0, 0x0, 0x48f, &(0x7f0000000040)={0x0, @rand_addr, 0x0, 0x2, 'lc\x00'}, 0x2c) 03:53:26 executing program 2: r0 = socket(0x2000000000000021, 0x2, 0x2) setsockopt$inet6_opts(r0, 0x29, 0x0, 0x0, 0x0) 03:53:26 executing program 4: futex(&(0x7f0000000000)=0x2, 0x4, 0x0, &(0x7f0000000040)={0x0, 0x1c9c380}, &(0x7f00000000c0), 0x2) [ 1834.577739] IPVS: set_ctl: invalid protocol: 0 0.0.0.0:0 03:53:27 executing program 3: r0 = socket$inet6(0xa, 0x3, 0x9) getsockopt$inet6_buf(r0, 0x29, 0x6, 0x0, &(0x7f0000000080)) [ 1835.045904] net_ratelimit: 18 callbacks suppressed [ 1835.045913] protocol 88fb is buggy, dev hsr_slave_0 [ 1835.055990] protocol 88fb is buggy, dev hsr_slave_1 [ 1835.061220] protocol 88fb is buggy, dev hsr_slave_0 [ 1835.066343] protocol 88fb is buggy, dev hsr_slave_1 [ 1835.071480] protocol 88fb is buggy, dev hsr_slave_0 [ 1835.076635] protocol 88fb is buggy, dev hsr_slave_1 [ 1835.081750] protocol 88fb is buggy, dev hsr_slave_0 [ 1835.086858] protocol 88fb is buggy, dev hsr_slave_1 03:53:27 executing program 0: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r0 = inotify_init() read(r0, 0x0, 0x0) r1 = inotify_add_watch(r0, &(0x7f0000000040)='./file0\x00', 0x0) inotify_rm_watch(r0, r1) 03:53:27 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x20, &(0x7f0000000b80)=ANY=[@ANYBLOB="cab5674ca80400f902c8d3fc17d4a51472ff5e04a7ed68e9074e865fffffffffff6582e2a0c58f438f1a9b1af27305fb6c1d497851a00d51dddde821f356222d82de15a5bb3ca4d544c3683ff903b30637ee634a8a4fa0e19e57c7d35e4db3a02231b71023a910ac2424326e31258bde7ca760ff3ca3261a92112b3c8db9e0d79dc5ad29e05434154bba1e60d243d8fa466b27518c09e11b78ec43ab7af1d33fbd4885ee5e95b0849345d0edef0a2e68320a47938597cf0fba5ae2e93301ffc38baaf2673b7fd4628a0fe3665006d238567bdb430991e02866ad858345dc86331d91a53051b3284827fc0a870d857ecc180901feb2d1dd3be0c1ebc3fa1d00d550744d9e55"], 0x0, 0x1625, 0x0, 0x0, 0x41100, 0x1, [], 0x0, 0x4}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r0, 0xdb, &(0x7f0000000200)={0x0, 0x0}}, 0x393) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='cgroup.events\x00', 0x0, 0x0) write$cgroup_int(r2, &(0x7f00000007c0)=0x6, 0x12) r3 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000002c0), 0x4) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz1\x00', 0x1ff) r4 = perf_event_open$cgroup(&(0x7f0000000600)={0x0, 0x70, 0x9, 0x0, 0x8, 0x6, 0x0, 0xfffffffffffff49f, 0x2, 0x6, 0x3ff, 0x0, 0x20, 0x0, 0x1, 0x81, 0x1, 0x400, 0x4, 0xfac, 0x4, 0x1, 0x10000, 0xf1, 0xd3, 0x92b, 0x200, 0x1, 0x100000000, 0x2, 0x100000000, 0xfff, 0xfff, 0xffff, 0x3, 0xfffffffffffffffd, 0x0, 0x6, 0x0, 0x50, 0x0, @perf_config_ext={0x3f, 0x9}, 0x20000, 0x8, 0xef3, 0x7, 0x100000000, 0x8, 0xfff}, 0xffffffffffffffff, 0x2, r0, 0x8) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000b40)='cgroup.subtree_control\x00') ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x2400, 0x1) r5 = getpid() socketpair$unix(0x1, 0x7, 0x0, &(0x7f0000000540)={0xffffffffffffffff}) setsockopt$sock_attach_bpf(r6, 0x1, 0x32, &(0x7f00000005c0)=r3, 0x4) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={0x0, 0xffffffffffffffff, 0x0, 0x12, &(0x7f0000000480)='./cgroup.cpu/syz1\x00', r1}, 0x30) perf_event_open(&(0x7f0000000300)={0x5, 0x70, 0xff, 0x4, 0x1000, 0xe5af, 0x0, 0x8000, 0xd0440, 0x2, 0xffff, 0x1, 0x4, 0x1f, 0x3, 0xfffffffffffffffa, 0x5, 0x9, 0x8, 0x1, 0x3, 0x400, 0x6, 0x5, 0x401, 0x10000, 0xff, 0xb24, 0xffffffffffff8000, 0xc8a, 0x3f, 0xfffffffffffffffa, 0xffffffffffff8001, 0x200, 0x5, 0x3, 0x2, 0x93a, 0x0, 0x7fff, 0x2, @perf_bp={&(0x7f0000000100), 0x1}, 0x0, 0x0, 0xffffffffffffff4e, 0x6, 0x0, 0x4, 0xfffffffffffffffd}, r5, 0x0, r7, 0x8) r8 = openat$tun(0xffffffffffffff9c, &(0x7f0000000580)='/dev/net/tun\x00', 0x40000, 0x0) ioctl$TUNSETPERSIST(r8, 0x400454cb, 0x1) r9 = socket$kcm(0x29, 0x5, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000800)={0x0, r0, 0x1, 0x2}, 0x14) ioctl$sock_kcm_SIOCKCMUNATTACH(r9, 0x89e1, &(0x7f0000000900)={r2}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r3, 0x0, 0x8b, 0x0, &(0x7f0000000680)="3ce41f426b7dd449ae14b08e1868c456d4fe9c7993884cf18f4dd5a0bc57250243da4203e0640859184bc4c4690afefd7736e8842cd88030448e918bdb5bd9bbbd680a51261557c0477c18049c832005ebb5b185c6f233df73a21d3b3ddad8426fba2d5f8aac5df904d5e5f2e7dc4a517079e08d5b2175a276f2a5c49cc2957cb367f269898570852dd63a", 0x0, 0x5}, 0x28) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000500)='./cgroup/syz0\x00', 0x200002, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000740)={r3, 0x50, &(0x7f00000003c0)}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r2, 0x50, &(0x7f0000000840)}, 0x10) openat$cgroup_subtree(r2, &(0x7f0000000940)='cgroup.subtree_control\x00', 0x2, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x1ff, 0x0, 0x0, 0x0, 0x200000, 0xffffffffffffffff, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280), 0x2}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r10 = socket$kcm(0xa, 0x400000000002, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffc59) ioctl$sock_kcm_SIOCKCMCLONE(r10, 0x890b, &(0x7f0000000000)) ioctl$sock_kcm_SIOCKCMCLONE(r10, 0x890c, &(0x7f0000000000)) 03:53:27 executing program 2: keyctl$search(0xa, 0x0, &(0x7f0000000900)='encrypted\x00', &(0x7f0000000940)={'syz'}, 0x0) 03:53:27 executing program 4: r0 = syz_open_dev$video(&(0x7f0000000040)='/dev/video#\x00', 0x0, 0x0) ioctl$VIDIOC_S_FMT(r0, 0xc0d05605, &(0x7f0000000080)={0x0, @vbi}) 03:53:27 executing program 3: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f000001d000)={0x0, 0x0, &(0x7f0000024000)=[{&(0x7f0000000100)="24000000100007031dff22946fa2830020200a0009000300001d85687f0000000400ff7e280000000c0a43ba5d806055b6fdd80b", 0x34}], 0x1}, 0x0) 03:53:27 executing program 5: getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffff9c, 0x84, 0x13, 0x0, 0x0) r0 = syz_open_dev$swradio(&(0x7f0000000000)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$radio(0x0, 0xffffffffffffffff, 0x2) r1 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) getdents64(r1, 0x0, 0x0) r2 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r2, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r2, 0x8) r3 = socket$inet6_sctp(0xa, 0x805, 0x84) r4 = accept4(r2, 0x0, 0x0, 0x0) prctl$PR_SET_ENDIAN(0x14, 0x1) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r3, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) epoll_pwait(0xffffffffffffffff, &(0x7f0000000040), 0x0, 0x0, &(0x7f0000000080), 0x8) getpgid(0x0) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r4, 0x84, 0x9, &(0x7f0000000280)={0x0, @in={{0x2, 0x0, @empty}}, 0x0, 0xac14142400000000, 0x0, 0x0, 0x54}, 0x98) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000780)={{{@in=@dev, @in6=@local}}, {{@in6=@mcast2}, 0x0, @in6=@dev}}, 0x0) ioctl$SIOCAX25ADDFWD(r0, 0x89ea, 0x0) syz_mount_image$gfs2(&(0x7f00000003c0)='gfs2\x00', 0x0, 0x87, 0x0, &(0x7f00000005c0), 0x1040040, 0x0) readv(r1, &(0x7f0000000500)=[{&(0x7f0000000400)=""/217, 0xd9}], 0x1) 03:53:27 executing program 2: syz_genetlink_get_family_id$tipc2(&(0x7f0000000140)='TIPCv2\x00') 03:53:27 executing program 4: r0 = syz_open_dev$sndctrl(&(0x7f0000000000)='/dev/snd/controlC#\x00', 0x15, 0x0) ioctl$SNDRV_CTL_IOCTL_PCM_INFO(r0, 0xc1205531, &(0x7f0000000040)={0x4, 0x0, 0x0, 0x0, [], [], [], 0x0, 0x0, 0x0, 0x0, "86510824fcfe9eac4df608efdc0e3fad"}) 03:53:27 executing program 3: r0 = syz_open_dev$usbmon(&(0x7f0000000100)='/dev/usbmon#\x00', 0x0, 0x0) pwrite64(r0, 0x0, 0x0, 0x0) 03:53:27 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x20, &(0x7f0000000b80)=ANY=[@ANYBLOB="cab5674ca80400f902c8d3fc17d4a51472ff5e04a7ed68e9074e865fffffffffff6582e2a0c58f438f1a9b1af27305fb6c1d497851a00d51dddde821f356222d82de15a5bb3ca4d544c3683ff903b30637ee634a8a4fa0e19e57c7d35e4db3a02231b71023a910ac2424326e31258bde7ca760ff3ca3261a92112b3c8db9e0d79dc5ad29e05434154bba1e60d243d8fa466b27518c09e11b78ec43ab7af1d33fbd4885ee5e95b0849345d0edef0a2e68320a47938597cf0fba5ae2e93301ffc38baaf2673b7fd4628a0fe3665006d238567bdb430991e02866ad858345dc86331d91a53051b3284827fc0a870d857ecc180901feb2d1dd3be0c1ebc3fa1d00d550744d9e55"], 0x0, 0x1625, 0x0, 0x0, 0x41100, 0x1, [], 0x0, 0x4}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r0, 0xdb, &(0x7f0000000200)={0x0, 0x0}}, 0x393) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='cgroup.events\x00', 0x0, 0x0) write$cgroup_int(r2, &(0x7f00000007c0)=0x6, 0x12) r3 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000002c0), 0x4) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz1\x00', 0x1ff) r4 = perf_event_open$cgroup(&(0x7f0000000600)={0x0, 0x70, 0x9, 0x0, 0x8, 0x6, 0x0, 0xfffffffffffff49f, 0x2, 0x6, 0x3ff, 0x0, 0x20, 0x0, 0x1, 0x81, 0x1, 0x400, 0x4, 0xfac, 0x4, 0x1, 0x10000, 0xf1, 0xd3, 0x92b, 0x200, 0x1, 0x100000000, 0x2, 0x100000000, 0xfff, 0xfff, 0xffff, 0x3, 0xfffffffffffffffd, 0x0, 0x6, 0x0, 0x50, 0x0, @perf_config_ext={0x3f, 0x9}, 0x20000, 0x8, 0xef3, 0x7, 0x100000000, 0x8, 0xfff}, 0xffffffffffffffff, 0x2, r0, 0x8) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000b40)='cgroup.subtree_control\x00') ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x2400, 0x1) r5 = getpid() socketpair$unix(0x1, 0x7, 0x0, &(0x7f0000000540)={0xffffffffffffffff}) setsockopt$sock_attach_bpf(r6, 0x1, 0x32, &(0x7f00000005c0)=r3, 0x4) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={0x0, 0xffffffffffffffff, 0x0, 0x12, &(0x7f0000000480)='./cgroup.cpu/syz1\x00', r1}, 0x30) perf_event_open(&(0x7f0000000300)={0x5, 0x70, 0xff, 0x4, 0x1000, 0xe5af, 0x0, 0x8000, 0xd0440, 0x2, 0xffff, 0x1, 0x4, 0x1f, 0x3, 0xfffffffffffffffa, 0x5, 0x9, 0x8, 0x1, 0x3, 0x400, 0x6, 0x5, 0x401, 0x10000, 0xff, 0xb24, 0xffffffffffff8000, 0xc8a, 0x3f, 0xfffffffffffffffa, 0xffffffffffff8001, 0x200, 0x5, 0x3, 0x2, 0x93a, 0x0, 0x7fff, 0x2, @perf_bp={&(0x7f0000000100), 0x1}, 0x0, 0x0, 0xffffffffffffff4e, 0x6, 0x0, 0x4, 0xfffffffffffffffd}, r5, 0x0, r7, 0x8) r8 = openat$tun(0xffffffffffffff9c, &(0x7f0000000580)='/dev/net/tun\x00', 0x40000, 0x0) ioctl$TUNSETPERSIST(r8, 0x400454cb, 0x1) r9 = socket$kcm(0x29, 0x5, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000800)={0x0, r0, 0x1, 0x2}, 0x14) ioctl$sock_kcm_SIOCKCMUNATTACH(r9, 0x89e1, &(0x7f0000000900)={r2}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r3, 0x0, 0x8b, 0x0, &(0x7f0000000680)="3ce41f426b7dd449ae14b08e1868c456d4fe9c7993884cf18f4dd5a0bc57250243da4203e0640859184bc4c4690afefd7736e8842cd88030448e918bdb5bd9bbbd680a51261557c0477c18049c832005ebb5b185c6f233df73a21d3b3ddad8426fba2d5f8aac5df904d5e5f2e7dc4a517079e08d5b2175a276f2a5c49cc2957cb367f269898570852dd63a", 0x0, 0x5}, 0x28) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000500)='./cgroup/syz0\x00', 0x200002, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000740)={r3, 0x50, &(0x7f00000003c0)}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r2, 0x50, &(0x7f0000000840)}, 0x10) openat$cgroup_subtree(r2, &(0x7f0000000940)='cgroup.subtree_control\x00', 0x2, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x1ff, 0x0, 0x0, 0x0, 0x200000, 0xffffffffffffffff, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280), 0x2}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r10 = socket$kcm(0xa, 0x400000000002, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffc59) ioctl$sock_kcm_SIOCKCMCLONE(r10, 0x890b, &(0x7f0000000000)) ioctl$sock_kcm_SIOCKCMCLONE(r10, 0x890c, &(0x7f0000000000)) 03:53:27 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000080)='/dev/video37\x00', 0x2, 0x0) 03:53:27 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f00000000c0)=ANY=[@ANYBLOB="1500000083a5"], 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f0000000100)={0x0, 0x100000}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 1835.936286] protocol 88fb is buggy, dev hsr_slave_0 [ 1835.941410] protocol 88fb is buggy, dev hsr_slave_1 03:53:28 executing program 0: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r0 = inotify_init() read(r0, 0x0, 0x0) r1 = inotify_add_watch(r0, &(0x7f0000000040)='./file0\x00', 0x20000000) inotify_rm_watch(0xffffffffffffffff, r1) 03:53:28 executing program 3: socketpair(0xf, 0x0, 0x0, 0x0) 03:53:28 executing program 4: r0 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$DRM_IOCTL_SET_SAREA_CTX(r0, 0x4010641c, 0x0) 03:53:28 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x20, &(0x7f0000000b80)=ANY=[@ANYBLOB="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"], 0x0, 0x1625, 0x0, 0x0, 0x41100, 0x1, [], 0x0, 0x4}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r0, 0xdb, &(0x7f0000000200)={0x0, 0x0}}, 0x393) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='cgroup.events\x00', 0x0, 0x0) write$cgroup_int(r2, &(0x7f00000007c0)=0x6, 0x12) r3 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000002c0), 0x4) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz1\x00', 0x1ff) r4 = perf_event_open$cgroup(&(0x7f0000000600)={0x0, 0x70, 0x9, 0x6, 0x0, 0x6, 0x0, 0xfffffffffffff49f, 0x2, 0x6, 0x3ff, 0x0, 0x20, 0x0, 0x1, 0x81, 0x1, 0x400, 0x4, 0xfac, 0x4, 0x1, 0x10000, 0xf1, 0xd3, 0x92b, 0x200, 0x1, 0x100000000, 0x2, 0x100000000, 0xfff, 0xfff, 0xffff, 0x3, 0xfffffffffffffffd, 0x0, 0x6, 0x0, 0x50, 0x0, @perf_config_ext={0x3f, 0x9}, 0x20000, 0x8, 0xef3, 0x7, 0x100000000, 0x8, 0xfff}, 0xffffffffffffffff, 0x2, r0, 0x8) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000b40)='cgroup.subtree_control\x00') ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x2400, 0x1) r5 = getpid() socketpair$unix(0x1, 0x7, 0x0, &(0x7f0000000540)={0xffffffffffffffff}) setsockopt$sock_attach_bpf(r6, 0x1, 0x32, &(0x7f00000005c0)=r3, 0x4) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={0x0, 0xffffffffffffffff, 0x0, 0x12, &(0x7f0000000480)='./cgroup.cpu/syz1\x00', r1}, 0x30) perf_event_open(&(0x7f0000000300)={0x5, 0x70, 0xff, 0x4, 0x1000, 0xe5af, 0x0, 0x8000, 0xd0440, 0x2, 0xffff, 0x1, 0x4, 0x1f, 0x3, 0xfffffffffffffffa, 0x5, 0x9, 0x8, 0x1, 0x3, 0x400, 0x6, 0x5, 0x401, 0x10000, 0xff, 0xb24, 0xffffffffffff8000, 0xc8a, 0x3f, 0xfffffffffffffffa, 0xffffffffffff8001, 0x200, 0x5, 0x3, 0x2, 0x93a, 0x0, 0x7fff, 0x2, @perf_bp={&(0x7f0000000100), 0x1}, 0x0, 0x0, 0xffffffffffffff4e, 0x6, 0x0, 0x4, 0xfffffffffffffffd}, r5, 0x0, r7, 0x8) r8 = openat$tun(0xffffffffffffff9c, &(0x7f0000000580)='/dev/net/tun\x00', 0x40000, 0x0) ioctl$TUNSETPERSIST(r8, 0x400454cb, 0x1) r9 = socket$kcm(0x29, 0x5, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000800)={0x0, r0, 0x1, 0x2}, 0x14) ioctl$sock_kcm_SIOCKCMUNATTACH(r9, 0x89e1, &(0x7f0000000900)={r2}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r3, 0x0, 0x8b, 0x0, &(0x7f0000000680)="3ce41f426b7dd449ae14b08e1868c456d4fe9c7993884cf18f4dd5a0bc57250243da4203e0640859184bc4c4690afefd7736e8842cd88030448e918bdb5bd9bbbd680a51261557c0477c18049c832005ebb5b185c6f233df73a21d3b3ddad8426fba2d5f8aac5df904d5e5f2e7dc4a517079e08d5b2175a276f2a5c49cc2957cb367f269898570852dd63a", 0x0, 0x5}, 0x28) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000500)='./cgroup/syz0\x00', 0x200002, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000740)={r3, 0x50, &(0x7f00000003c0)}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r2, 0x50, &(0x7f0000000840)}, 0x10) openat$cgroup_subtree(r2, &(0x7f0000000940)='cgroup.subtree_control\x00', 0x2, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x1ff, 0x0, 0x0, 0x0, 0x200000, 0xffffffffffffffff, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280), 0x2}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r10 = socket$kcm(0xa, 0x400000000002, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffc59) ioctl$sock_kcm_SIOCKCMCLONE(r10, 0x890b, &(0x7f0000000000)) ioctl$sock_kcm_SIOCKCMCLONE(r10, 0x890c, &(0x7f0000000000)) 03:53:28 executing program 2: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000000000), 0x0) 03:53:28 executing program 5: getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffff9c, 0x84, 0x13, 0x0, 0x0) r0 = syz_open_dev$swradio(&(0x7f0000000000)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$radio(0x0, 0xffffffffffffffff, 0x2) r1 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) getdents64(r1, 0x0, 0x0) r2 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r2, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r2, 0x8) r3 = socket$inet6_sctp(0xa, 0x805, 0x84) r4 = accept4(r2, 0x0, 0x0, 0x0) prctl$PR_SET_ENDIAN(0x14, 0x1) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r3, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) epoll_pwait(0xffffffffffffffff, &(0x7f0000000040)=[{}], 0x1, 0x0, 0x0, 0x0) getpgid(0x0) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r4, 0x84, 0x9, &(0x7f0000000280)={0x0, @in={{0x2, 0x0, @empty}}, 0x0, 0xac14142400000000, 0x0, 0x0, 0x54}, 0x98) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000780)={{{@in=@dev, @in6=@local}}, {{@in6=@mcast2}, 0x0, @in6=@dev}}, 0x0) ioctl$SIOCAX25ADDFWD(r0, 0x89ea, 0x0) syz_mount_image$gfs2(&(0x7f00000003c0)='gfs2\x00', 0x0, 0x87, 0x0, &(0x7f00000005c0), 0x1040040, 0x0) readv(r1, &(0x7f0000000500)=[{&(0x7f0000000400)=""/217, 0xd9}], 0x1) 03:53:28 executing program 3: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) read(r0, 0x0, 0x0) 03:53:28 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x20, &(0x7f0000000b80)=ANY=[@ANYBLOB="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"], 0x0, 0x1625, 0x0, 0x0, 0x41100, 0x1, [], 0x0, 0x4}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r0, 0xdb, &(0x7f0000000200)={0x0, 0x0}}, 0x393) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='cgroup.events\x00', 0x0, 0x0) write$cgroup_int(r2, &(0x7f00000007c0)=0x6, 0x12) r3 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000002c0), 0x4) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz1\x00', 0x1ff) r4 = perf_event_open$cgroup(&(0x7f0000000600)={0x0, 0x70, 0x9, 0x6, 0x0, 0x6, 0x0, 0xfffffffffffff49f, 0x2, 0x6, 0x3ff, 0x0, 0x20, 0x0, 0x1, 0x81, 0x1, 0x400, 0x4, 0xfac, 0x4, 0x1, 0x10000, 0xf1, 0xd3, 0x92b, 0x200, 0x1, 0x100000000, 0x2, 0x100000000, 0xfff, 0xfff, 0xffff, 0x3, 0xfffffffffffffffd, 0x0, 0x6, 0x0, 0x50, 0x0, @perf_config_ext={0x3f, 0x9}, 0x20000, 0x8, 0xef3, 0x7, 0x100000000, 0x8, 0xfff}, 0xffffffffffffffff, 0x2, r0, 0x8) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000b40)='cgroup.subtree_control\x00') ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x2400, 0x1) r5 = getpid() socketpair$unix(0x1, 0x7, 0x0, &(0x7f0000000540)={0xffffffffffffffff}) setsockopt$sock_attach_bpf(r6, 0x1, 0x32, &(0x7f00000005c0)=r3, 0x4) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={0x0, 0xffffffffffffffff, 0x0, 0x12, &(0x7f0000000480)='./cgroup.cpu/syz1\x00', r1}, 0x30) perf_event_open(&(0x7f0000000300)={0x5, 0x70, 0xff, 0x4, 0x1000, 0xe5af, 0x0, 0x8000, 0xd0440, 0x2, 0xffff, 0x1, 0x4, 0x1f, 0x3, 0xfffffffffffffffa, 0x5, 0x9, 0x8, 0x1, 0x3, 0x400, 0x6, 0x5, 0x401, 0x10000, 0xff, 0xb24, 0xffffffffffff8000, 0xc8a, 0x3f, 0xfffffffffffffffa, 0xffffffffffff8001, 0x200, 0x5, 0x3, 0x2, 0x93a, 0x0, 0x7fff, 0x2, @perf_bp={&(0x7f0000000100), 0x1}, 0x0, 0x0, 0xffffffffffffff4e, 0x6, 0x0, 0x4, 0xfffffffffffffffd}, r5, 0x0, r7, 0x8) r8 = openat$tun(0xffffffffffffff9c, &(0x7f0000000580)='/dev/net/tun\x00', 0x40000, 0x0) ioctl$TUNSETPERSIST(r8, 0x400454cb, 0x1) r9 = socket$kcm(0x29, 0x5, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000800)={0x0, r0, 0x1, 0x2}, 0x14) ioctl$sock_kcm_SIOCKCMUNATTACH(r9, 0x89e1, &(0x7f0000000900)={r2}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r3, 0x0, 0x8b, 0x0, &(0x7f0000000680)="3ce41f426b7dd449ae14b08e1868c456d4fe9c7993884cf18f4dd5a0bc57250243da4203e0640859184bc4c4690afefd7736e8842cd88030448e918bdb5bd9bbbd680a51261557c0477c18049c832005ebb5b185c6f233df73a21d3b3ddad8426fba2d5f8aac5df904d5e5f2e7dc4a517079e08d5b2175a276f2a5c49cc2957cb367f269898570852dd63a", 0x0, 0x5}, 0x28) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000500)='./cgroup/syz0\x00', 0x200002, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000740)={r3, 0x50, &(0x7f00000003c0)}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r2, 0x50, &(0x7f0000000840)}, 0x10) openat$cgroup_subtree(r2, &(0x7f0000000940)='cgroup.subtree_control\x00', 0x2, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x1ff, 0x0, 0x0, 0x0, 0x200000, 0xffffffffffffffff, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280), 0x2}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r10 = socket$kcm(0xa, 0x400000000002, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffc59) ioctl$sock_kcm_SIOCKCMCLONE(r10, 0x890b, &(0x7f0000000000)) ioctl$sock_kcm_SIOCKCMCLONE(r10, 0x890c, &(0x7f0000000000)) 03:53:28 executing program 4: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001780)='/dev/fuse\x00', 0x2, 0x0) ppoll(&(0x7f0000001f40)=[{r0}], 0x1, 0x0, 0x0, 0x0) 03:53:28 executing program 2: r0 = syz_open_dev$video4linux(&(0x7f0000000000)='/dev/v4l-subdev#\x00', 0x0, 0x0) ioctl$VIDIOC_TRY_EXT_CTRLS(r0, 0xc0205649, &(0x7f00000000c0)={0x0, 0xfff, 0x0, [], 0x0}) 03:53:28 executing program 3: mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x81030, 0xffffffffffffffff, 0x0) 03:53:28 executing program 2: r0 = socket$inet_sctp(0x2, 0x3, 0x84) sendmmsg$inet_sctp(r0, &(0x7f0000002840)=[{0x0, 0x0, 0x0}], 0x1, 0xc1fcb1bc1deb76a7) 03:53:29 executing program 0: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r0 = inotify_init() read(r0, 0x0, 0x0) r1 = inotify_add_watch(r0, &(0x7f0000000040)='./file0\x00', 0x20000000) inotify_rm_watch(0xffffffffffffffff, r1) 03:53:29 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x20, &(0x7f0000000b80)=ANY=[@ANYBLOB="cab5674ca80400f902c8d3fc17d4a51472ff5e04a7ed68e9074e865fffffffffff6582e2a0c58f438f1a9b1af27305fb6c1d497851a00d51dddde821f356222d82de15a5bb3ca4d544c3683ff903b30637ee634a8a4fa0e19e57c7d35e4db3a02231b71023a910ac2424326e31258bde7ca760ff3ca3261a92112b3c8db9e0d79dc5ad29e05434154bba1e60d243d8fa466b27518c09e11b78ec43ab7af1d33fbd4885ee5e95b0849345d0edef0a2e68320a47938597cf0fba5ae2e93301ffc38baaf2673b7fd4628a0fe3665006d238567bdb430991e02866ad858345dc86331d91a53051b3284827fc0a870d857ecc180901feb2d1dd3be0c1ebc3fa1d00d550744d9e55"], 0x0, 0x1625, 0x0, 0x0, 0x41100, 0x1, [], 0x0, 0x4}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r0, 0xdb, &(0x7f0000000200)={0x0, 0x0}}, 0x393) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='cgroup.events\x00', 0x0, 0x0) write$cgroup_int(r2, &(0x7f00000007c0)=0x6, 0x12) r3 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000002c0), 0x4) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz1\x00', 0x1ff) r4 = perf_event_open$cgroup(&(0x7f0000000600)={0x0, 0x70, 0x9, 0x6, 0x0, 0x6, 0x0, 0xfffffffffffff49f, 0x2, 0x6, 0x3ff, 0x0, 0x20, 0x0, 0x1, 0x81, 0x1, 0x400, 0x4, 0xfac, 0x4, 0x1, 0x10000, 0xf1, 0xd3, 0x92b, 0x200, 0x1, 0x100000000, 0x2, 0x100000000, 0xfff, 0xfff, 0xffff, 0x3, 0xfffffffffffffffd, 0x0, 0x6, 0x0, 0x50, 0x0, @perf_config_ext={0x3f, 0x9}, 0x20000, 0x8, 0xef3, 0x7, 0x100000000, 0x8, 0xfff}, 0xffffffffffffffff, 0x2, r0, 0x8) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000b40)='cgroup.subtree_control\x00') ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x2400, 0x1) r5 = getpid() socketpair$unix(0x1, 0x7, 0x0, &(0x7f0000000540)={0xffffffffffffffff}) setsockopt$sock_attach_bpf(r6, 0x1, 0x32, &(0x7f00000005c0)=r3, 0x4) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={0x0, 0xffffffffffffffff, 0x0, 0x12, &(0x7f0000000480)='./cgroup.cpu/syz1\x00', r1}, 0x30) perf_event_open(&(0x7f0000000300)={0x5, 0x70, 0xff, 0x4, 0x1000, 0xe5af, 0x0, 0x8000, 0xd0440, 0x2, 0xffff, 0x1, 0x4, 0x1f, 0x3, 0xfffffffffffffffa, 0x5, 0x9, 0x8, 0x1, 0x3, 0x400, 0x6, 0x5, 0x401, 0x10000, 0xff, 0xb24, 0xffffffffffff8000, 0xc8a, 0x3f, 0xfffffffffffffffa, 0xffffffffffff8001, 0x200, 0x5, 0x3, 0x2, 0x93a, 0x0, 0x7fff, 0x2, @perf_bp={&(0x7f0000000100), 0x1}, 0x0, 0x0, 0xffffffffffffff4e, 0x6, 0x0, 0x4, 0xfffffffffffffffd}, r5, 0x0, r7, 0x8) r8 = openat$tun(0xffffffffffffff9c, &(0x7f0000000580)='/dev/net/tun\x00', 0x40000, 0x0) ioctl$TUNSETPERSIST(r8, 0x400454cb, 0x1) r9 = socket$kcm(0x29, 0x5, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000800)={0x0, r0, 0x1, 0x2}, 0x14) ioctl$sock_kcm_SIOCKCMUNATTACH(r9, 0x89e1, &(0x7f0000000900)={r2}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r3, 0x0, 0x8b, 0x0, &(0x7f0000000680)="3ce41f426b7dd449ae14b08e1868c456d4fe9c7993884cf18f4dd5a0bc57250243da4203e0640859184bc4c4690afefd7736e8842cd88030448e918bdb5bd9bbbd680a51261557c0477c18049c832005ebb5b185c6f233df73a21d3b3ddad8426fba2d5f8aac5df904d5e5f2e7dc4a517079e08d5b2175a276f2a5c49cc2957cb367f269898570852dd63a", 0x0, 0x5}, 0x28) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000500)='./cgroup/syz0\x00', 0x200002, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000740)={r3, 0x50, &(0x7f00000003c0)}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r2, 0x50, &(0x7f0000000840)}, 0x10) openat$cgroup_subtree(r2, &(0x7f0000000940)='cgroup.subtree_control\x00', 0x2, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x1ff, 0x0, 0x0, 0x0, 0x200000, 0xffffffffffffffff, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280), 0x2}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r10 = socket$kcm(0xa, 0x400000000002, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffc59) ioctl$sock_kcm_SIOCKCMCLONE(r10, 0x890b, &(0x7f0000000000)) ioctl$sock_kcm_SIOCKCMCLONE(r10, 0x890c, &(0x7f0000000000)) 03:53:29 executing program 3: mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x0, 0x5c831, 0xffffffffffffffff, 0x0) mincore(&(0x7f000009a000/0x600000)=nil, 0x600000, 0x0) 03:53:29 executing program 2: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) fsetxattr(r0, &(0x7f0000000040)=@known='system.posix_acl_default\x00', &(0x7f0000000080)='#GPL!\x00', 0x23f, 0x0) 03:53:29 executing program 5: getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffff9c, 0x84, 0x13, 0x0, 0x0) r0 = syz_open_dev$swradio(&(0x7f0000000000)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$radio(0x0, 0xffffffffffffffff, 0x2) r1 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) getdents64(r1, 0x0, 0x0) r2 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r2, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r2, 0x8) r3 = socket$inet6_sctp(0xa, 0x805, 0x84) r4 = accept4(r2, 0x0, 0x0, 0x0) prctl$PR_SET_ENDIAN(0x14, 0x1) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r3, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) epoll_pwait(0xffffffffffffffff, &(0x7f0000000040)=[{}], 0x1, 0x0, 0x0, 0x0) getpgid(0x0) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r4, 0x84, 0x9, &(0x7f0000000280)={0x0, @in={{0x2, 0x0, @empty}}, 0x0, 0xac14142400000000, 0x0, 0x0, 0x54}, 0x98) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000780)={{{@in=@dev, @in6=@local}}, {{@in6=@mcast2}, 0x0, @in6=@dev}}, 0x0) ioctl$SIOCAX25ADDFWD(r0, 0x89ea, 0x0) syz_mount_image$gfs2(&(0x7f00000003c0)='gfs2\x00', 0x0, 0x87, 0x0, &(0x7f00000005c0), 0x1040040, 0x0) readv(r1, &(0x7f0000000500)=[{&(0x7f0000000400)=""/217, 0xd9}], 0x1) 03:53:29 executing program 4: io_setup(0xe4, &(0x7f0000000100)=0x0) io_submit(r0, 0x1, &(0x7f0000000400)=[&(0x7f0000000200)={0x0, 0x0, 0x0, 0x3, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x8000}]) 03:53:29 executing program 2: r0 = openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000000)='/dev/video37\x00', 0x2, 0x0) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/btrfs-control\x00', 0x0, 0x0) fstat(r0, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fsetxattr$system_posix_acl(r1, &(0x7f0000000240)='system.posix_acl_access\x00', &(0x7f0000000480)={{}, {}, [], {}, [{0x8, 0x0, r2}]}, 0x2c, 0x0) 03:53:29 executing program 3: socket(0x3, 0x0, 0x7fffffff) 03:53:29 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x20, &(0x7f0000000b80)=ANY=[@ANYBLOB="cab5674ca80400f902c8d3fc17d4a51472ff5e04a7ed68e9074e865fffffffffff6582e2a0c58f438f1a9b1af27305fb6c1d497851a00d51dddde821f356222d82de15a5bb3ca4d544c3683ff903b30637ee634a8a4fa0e19e57c7d35e4db3a02231b71023a910ac2424326e31258bde7ca760ff3ca3261a92112b3c8db9e0d79dc5ad29e05434154bba1e60d243d8fa466b27518c09e11b78ec43ab7af1d33fbd4885ee5e95b0849345d0edef0a2e68320a47938597cf0fba5ae2e93301ffc38baaf2673b7fd4628a0fe3665006d238567bdb430991e02866ad858345dc86331d91a53051b3284827fc0a870d857ecc180901feb2d1dd3be0c1ebc3fa1d00d550744d9e55"], 0x0, 0x1625, 0x0, 0x0, 0x41100, 0x1, [], 0x0, 0x4}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r0, 0xdb, &(0x7f0000000200)={0x0, 0x0}}, 0x393) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='cgroup.events\x00', 0x0, 0x0) write$cgroup_int(r2, &(0x7f00000007c0)=0x6, 0x12) r3 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000002c0), 0x4) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz1\x00', 0x1ff) r4 = perf_event_open$cgroup(&(0x7f0000000600)={0x0, 0x70, 0x9, 0x6, 0x8, 0x0, 0x0, 0xfffffffffffff49f, 0x2, 0x6, 0x3ff, 0x0, 0x20, 0x0, 0x1, 0x81, 0x1, 0x400, 0x4, 0xfac, 0x4, 0x1, 0x10000, 0xf1, 0xd3, 0x92b, 0x200, 0x1, 0x100000000, 0x2, 0x100000000, 0xfff, 0xfff, 0xffff, 0x3, 0xfffffffffffffffd, 0x0, 0x6, 0x0, 0x50, 0x0, @perf_config_ext={0x3f, 0x9}, 0x20000, 0x8, 0xef3, 0x7, 0x100000000, 0x8, 0xfff}, 0xffffffffffffffff, 0x2, r0, 0x8) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000b40)='cgroup.subtree_control\x00') ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x2400, 0x1) r5 = getpid() socketpair$unix(0x1, 0x7, 0x0, &(0x7f0000000540)={0xffffffffffffffff}) setsockopt$sock_attach_bpf(r6, 0x1, 0x32, &(0x7f00000005c0)=r3, 0x4) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={0x0, 0xffffffffffffffff, 0x0, 0x12, &(0x7f0000000480)='./cgroup.cpu/syz1\x00', r1}, 0x30) perf_event_open(&(0x7f0000000300)={0x5, 0x70, 0xff, 0x4, 0x1000, 0xe5af, 0x0, 0x8000, 0xd0440, 0x2, 0xffff, 0x1, 0x4, 0x1f, 0x3, 0xfffffffffffffffa, 0x5, 0x9, 0x8, 0x1, 0x3, 0x400, 0x6, 0x5, 0x401, 0x10000, 0xff, 0xb24, 0xffffffffffff8000, 0xc8a, 0x3f, 0xfffffffffffffffa, 0xffffffffffff8001, 0x200, 0x5, 0x3, 0x2, 0x93a, 0x0, 0x7fff, 0x2, @perf_bp={&(0x7f0000000100), 0x1}, 0x0, 0x0, 0xffffffffffffff4e, 0x6, 0x0, 0x4, 0xfffffffffffffffd}, r5, 0x0, r7, 0x8) r8 = openat$tun(0xffffffffffffff9c, &(0x7f0000000580)='/dev/net/tun\x00', 0x40000, 0x0) ioctl$TUNSETPERSIST(r8, 0x400454cb, 0x1) r9 = socket$kcm(0x29, 0x5, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000800)={0x0, r0, 0x1, 0x2}, 0x14) ioctl$sock_kcm_SIOCKCMUNATTACH(r9, 0x89e1, &(0x7f0000000900)={r2}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r3, 0x0, 0x8b, 0x0, &(0x7f0000000680)="3ce41f426b7dd449ae14b08e1868c456d4fe9c7993884cf18f4dd5a0bc57250243da4203e0640859184bc4c4690afefd7736e8842cd88030448e918bdb5bd9bbbd680a51261557c0477c18049c832005ebb5b185c6f233df73a21d3b3ddad8426fba2d5f8aac5df904d5e5f2e7dc4a517079e08d5b2175a276f2a5c49cc2957cb367f269898570852dd63a", 0x0, 0x5}, 0x28) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000500)='./cgroup/syz0\x00', 0x200002, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000740)={r3, 0x50, &(0x7f00000003c0)}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r2, 0x50, &(0x7f0000000840)}, 0x10) openat$cgroup_subtree(r2, &(0x7f0000000940)='cgroup.subtree_control\x00', 0x2, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x1ff, 0x0, 0x0, 0x0, 0x200000, 0xffffffffffffffff, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280), 0x2}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r10 = socket$kcm(0xa, 0x400000000002, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffc59) ioctl$sock_kcm_SIOCKCMCLONE(r10, 0x890b, &(0x7f0000000000)) ioctl$sock_kcm_SIOCKCMCLONE(r10, 0x890c, &(0x7f0000000000)) 03:53:29 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) fsetxattr$security_ima(r0, 0x0, 0x0, 0x0, 0xfffbffffffffffff) 03:53:29 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x20, &(0x7f0000000b80)=ANY=[@ANYBLOB="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"], 0x0, 0x1625, 0x0, 0x0, 0x41100, 0x1, [], 0x0, 0x4}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r0, 0xdb, &(0x7f0000000200)={0x0, 0x0}}, 0x393) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='cgroup.events\x00', 0x0, 0x0) write$cgroup_int(r2, &(0x7f00000007c0)=0x6, 0x12) r3 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000002c0), 0x4) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz1\x00', 0x1ff) r4 = perf_event_open$cgroup(&(0x7f0000000600)={0x0, 0x70, 0x9, 0x6, 0x8, 0x0, 0x0, 0xfffffffffffff49f, 0x2, 0x6, 0x3ff, 0x0, 0x20, 0x0, 0x1, 0x81, 0x1, 0x400, 0x4, 0xfac, 0x4, 0x1, 0x10000, 0xf1, 0xd3, 0x92b, 0x200, 0x1, 0x100000000, 0x2, 0x100000000, 0xfff, 0xfff, 0xffff, 0x3, 0xfffffffffffffffd, 0x0, 0x6, 0x0, 0x50, 0x0, @perf_config_ext={0x3f, 0x9}, 0x20000, 0x8, 0xef3, 0x7, 0x100000000, 0x8, 0xfff}, 0xffffffffffffffff, 0x2, r0, 0x8) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000b40)='cgroup.subtree_control\x00') ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x2400, 0x1) r5 = getpid() socketpair$unix(0x1, 0x7, 0x0, &(0x7f0000000540)={0xffffffffffffffff}) setsockopt$sock_attach_bpf(r6, 0x1, 0x32, &(0x7f00000005c0)=r3, 0x4) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={0x0, 0xffffffffffffffff, 0x0, 0x12, &(0x7f0000000480)='./cgroup.cpu/syz1\x00', r1}, 0x30) perf_event_open(&(0x7f0000000300)={0x5, 0x70, 0xff, 0x4, 0x1000, 0xe5af, 0x0, 0x8000, 0xd0440, 0x2, 0xffff, 0x1, 0x4, 0x1f, 0x3, 0xfffffffffffffffa, 0x5, 0x9, 0x8, 0x1, 0x3, 0x400, 0x6, 0x5, 0x401, 0x10000, 0xff, 0xb24, 0xffffffffffff8000, 0xc8a, 0x3f, 0xfffffffffffffffa, 0xffffffffffff8001, 0x200, 0x5, 0x3, 0x2, 0x93a, 0x0, 0x7fff, 0x2, @perf_bp={&(0x7f0000000100), 0x1}, 0x0, 0x0, 0xffffffffffffff4e, 0x6, 0x0, 0x4, 0xfffffffffffffffd}, r5, 0x0, r7, 0x8) r8 = openat$tun(0xffffffffffffff9c, &(0x7f0000000580)='/dev/net/tun\x00', 0x40000, 0x0) ioctl$TUNSETPERSIST(r8, 0x400454cb, 0x1) r9 = socket$kcm(0x29, 0x5, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000800)={0x0, r0, 0x1, 0x2}, 0x14) ioctl$sock_kcm_SIOCKCMUNATTACH(r9, 0x89e1, &(0x7f0000000900)={r2}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r3, 0x0, 0x8b, 0x0, &(0x7f0000000680)="3ce41f426b7dd449ae14b08e1868c456d4fe9c7993884cf18f4dd5a0bc57250243da4203e0640859184bc4c4690afefd7736e8842cd88030448e918bdb5bd9bbbd680a51261557c0477c18049c832005ebb5b185c6f233df73a21d3b3ddad8426fba2d5f8aac5df904d5e5f2e7dc4a517079e08d5b2175a276f2a5c49cc2957cb367f269898570852dd63a", 0x0, 0x5}, 0x28) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000500)='./cgroup/syz0\x00', 0x200002, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000740)={r3, 0x50, &(0x7f00000003c0)}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r2, 0x50, &(0x7f0000000840)}, 0x10) openat$cgroup_subtree(r2, &(0x7f0000000940)='cgroup.subtree_control\x00', 0x2, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x1ff, 0x0, 0x0, 0x0, 0x200000, 0xffffffffffffffff, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280), 0x2}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r10 = socket$kcm(0xa, 0x400000000002, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffc59) ioctl$sock_kcm_SIOCKCMCLONE(r10, 0x890b, &(0x7f0000000000)) ioctl$sock_kcm_SIOCKCMCLONE(r10, 0x890c, &(0x7f0000000000)) 03:53:29 executing program 4: r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvfrom$inet6(r0, 0x0, 0x0, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0xa4}, {&(0x7f00000000c0)=""/85, 0xfb}, {&(0x7f0000000fc0)=""/4096, 0x1000}, {&(0x7f0000000400)=""/120, 0x78}, {&(0x7f0000000480)=""/60, 0xa9}, {&(0x7f0000000200)=""/77, 0x5c8}, {&(0x7f0000000540)=""/154, 0x9a}, {&(0x7f0000000340)=""/22, 0x16}], 0x8, &(0x7f0000002400)=""/191, 0xbf}}], 0x4000000000000f0, 0x0, &(0x7f0000003700)={0x77359400}) 03:53:30 executing program 0: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r0 = inotify_init() read(r0, 0x0, 0x0) r1 = inotify_add_watch(r0, &(0x7f0000000040)='./file0\x00', 0x20000000) inotify_rm_watch(0xffffffffffffffff, r1) 03:53:30 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) unshare(0x24020400) setsockopt$inet_tcp_TCP_QUEUE_SEQ(r0, 0x6, 0x15, &(0x7f0000000180), 0x4) 03:53:30 executing program 5: getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffff9c, 0x84, 0x13, 0x0, 0x0) r0 = syz_open_dev$swradio(&(0x7f0000000000)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$radio(0x0, 0xffffffffffffffff, 0x2) r1 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) getdents64(r1, 0x0, 0x0) r2 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r2, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r2, 0x8) r3 = socket$inet6_sctp(0xa, 0x805, 0x84) r4 = accept4(r2, 0x0, 0x0, 0x0) prctl$PR_SET_ENDIAN(0x14, 0x1) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r3, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) epoll_pwait(0xffffffffffffffff, &(0x7f0000000040)=[{}], 0x1, 0x0, 0x0, 0x0) getpgid(0x0) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r4, 0x84, 0x9, &(0x7f0000000280)={0x0, @in={{0x2, 0x0, @empty}}, 0x0, 0xac14142400000000, 0x0, 0x0, 0x54}, 0x98) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000780)={{{@in=@dev, @in6=@local}}, {{@in6=@mcast2}, 0x0, @in6=@dev}}, 0x0) ioctl$SIOCAX25ADDFWD(r0, 0x89ea, 0x0) syz_mount_image$gfs2(&(0x7f00000003c0)='gfs2\x00', 0x0, 0x87, 0x0, &(0x7f00000005c0), 0x1040040, 0x0) readv(r1, &(0x7f0000000500)=[{&(0x7f0000000400)=""/217, 0xd9}], 0x1) 03:53:30 executing program 2: r0 = socket(0x2000000000000021, 0x2, 0x2) sendmsg$TIPC_NL_NAME_TABLE_GET(r0, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={0x0}}, 0x4000011) 03:53:30 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x20, &(0x7f0000000b80)=ANY=[@ANYBLOB="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"], 0x0, 0x1625, 0x0, 0x0, 0x41100, 0x1, [], 0x0, 0x4}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r0, 0xdb, &(0x7f0000000200)={0x0, 0x0}}, 0x393) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='cgroup.events\x00', 0x0, 0x0) write$cgroup_int(r2, &(0x7f00000007c0)=0x6, 0x12) r3 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000002c0), 0x4) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz1\x00', 0x1ff) r4 = perf_event_open$cgroup(&(0x7f0000000600)={0x0, 0x70, 0x9, 0x6, 0x8, 0x0, 0x0, 0xfffffffffffff49f, 0x2, 0x6, 0x3ff, 0x0, 0x20, 0x0, 0x1, 0x81, 0x1, 0x400, 0x4, 0xfac, 0x4, 0x1, 0x10000, 0xf1, 0xd3, 0x92b, 0x200, 0x1, 0x100000000, 0x2, 0x100000000, 0xfff, 0xfff, 0xffff, 0x3, 0xfffffffffffffffd, 0x0, 0x6, 0x0, 0x50, 0x0, @perf_config_ext={0x3f, 0x9}, 0x20000, 0x8, 0xef3, 0x7, 0x100000000, 0x8, 0xfff}, 0xffffffffffffffff, 0x2, r0, 0x8) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000b40)='cgroup.subtree_control\x00') ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x2400, 0x1) r5 = getpid() socketpair$unix(0x1, 0x7, 0x0, &(0x7f0000000540)={0xffffffffffffffff}) setsockopt$sock_attach_bpf(r6, 0x1, 0x32, &(0x7f00000005c0)=r3, 0x4) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={0x0, 0xffffffffffffffff, 0x0, 0x12, &(0x7f0000000480)='./cgroup.cpu/syz1\x00', r1}, 0x30) perf_event_open(&(0x7f0000000300)={0x5, 0x70, 0xff, 0x4, 0x1000, 0xe5af, 0x0, 0x8000, 0xd0440, 0x2, 0xffff, 0x1, 0x4, 0x1f, 0x3, 0xfffffffffffffffa, 0x5, 0x9, 0x8, 0x1, 0x3, 0x400, 0x6, 0x5, 0x401, 0x10000, 0xff, 0xb24, 0xffffffffffff8000, 0xc8a, 0x3f, 0xfffffffffffffffa, 0xffffffffffff8001, 0x200, 0x5, 0x3, 0x2, 0x93a, 0x0, 0x7fff, 0x2, @perf_bp={&(0x7f0000000100), 0x1}, 0x0, 0x0, 0xffffffffffffff4e, 0x6, 0x0, 0x4, 0xfffffffffffffffd}, r5, 0x0, r7, 0x8) r8 = openat$tun(0xffffffffffffff9c, &(0x7f0000000580)='/dev/net/tun\x00', 0x40000, 0x0) ioctl$TUNSETPERSIST(r8, 0x400454cb, 0x1) r9 = socket$kcm(0x29, 0x5, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000800)={0x0, r0, 0x1, 0x2}, 0x14) ioctl$sock_kcm_SIOCKCMUNATTACH(r9, 0x89e1, &(0x7f0000000900)={r2}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r3, 0x0, 0x8b, 0x0, &(0x7f0000000680)="3ce41f426b7dd449ae14b08e1868c456d4fe9c7993884cf18f4dd5a0bc57250243da4203e0640859184bc4c4690afefd7736e8842cd88030448e918bdb5bd9bbbd680a51261557c0477c18049c832005ebb5b185c6f233df73a21d3b3ddad8426fba2d5f8aac5df904d5e5f2e7dc4a517079e08d5b2175a276f2a5c49cc2957cb367f269898570852dd63a", 0x0, 0x5}, 0x28) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000500)='./cgroup/syz0\x00', 0x200002, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000740)={r3, 0x50, &(0x7f00000003c0)}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r2, 0x50, &(0x7f0000000840)}, 0x10) openat$cgroup_subtree(r2, &(0x7f0000000940)='cgroup.subtree_control\x00', 0x2, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x1ff, 0x0, 0x0, 0x0, 0x200000, 0xffffffffffffffff, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280), 0x2}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r10 = socket$kcm(0xa, 0x400000000002, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffc59) ioctl$sock_kcm_SIOCKCMCLONE(r10, 0x890b, &(0x7f0000000000)) ioctl$sock_kcm_SIOCKCMCLONE(r10, 0x890c, &(0x7f0000000000)) 03:53:30 executing program 4: r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvfrom$inet6(r0, 0x0, 0x0, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0xa4}, {&(0x7f00000000c0)=""/85, 0xfb}, {&(0x7f0000000fc0)=""/4096, 0x1000}, {&(0x7f0000000400)=""/120, 0x78}, {&(0x7f0000000480)=""/60, 0xa9}, {&(0x7f0000000200)=""/77, 0x5c8}, {&(0x7f0000000540)=""/154, 0x9a}, {&(0x7f0000000340)=""/22, 0x16}], 0x8, &(0x7f0000002400)=""/191, 0xbf}}], 0x4000000000000f0, 0x0, &(0x7f0000003700)={0x77359400}) 03:53:30 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_ENABLE_CAP(r1, 0x4068aea3, &(0x7f00000001c0)={0x74}) 03:53:30 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x20, &(0x7f0000000b80)=ANY=[@ANYBLOB="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"], 0x0, 0x1625, 0x0, 0x0, 0x41100, 0x1, [], 0x0, 0x4}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r0, 0xdb, &(0x7f0000000200)={0x0, 0x0}}, 0x393) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='cgroup.events\x00', 0x0, 0x0) write$cgroup_int(r2, &(0x7f00000007c0)=0x6, 0x12) r3 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000002c0), 0x4) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz1\x00', 0x1ff) r4 = perf_event_open$cgroup(&(0x7f0000000600)={0x0, 0x70, 0x9, 0x6, 0x8, 0x6, 0x0, 0x0, 0x2, 0x6, 0x3ff, 0x0, 0x20, 0x0, 0x1, 0x81, 0x1, 0x400, 0x4, 0xfac, 0x4, 0x1, 0x10000, 0xf1, 0xd3, 0x92b, 0x200, 0x1, 0x100000000, 0x2, 0x100000000, 0xfff, 0xfff, 0xffff, 0x3, 0xfffffffffffffffd, 0x0, 0x6, 0x0, 0x50, 0x0, @perf_config_ext={0x3f, 0x9}, 0x20000, 0x8, 0xef3, 0x7, 0x100000000, 0x8, 0xfff}, 0xffffffffffffffff, 0x2, r0, 0x8) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000b40)='cgroup.subtree_control\x00') ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x2400, 0x1) r5 = getpid() socketpair$unix(0x1, 0x7, 0x0, &(0x7f0000000540)={0xffffffffffffffff}) setsockopt$sock_attach_bpf(r6, 0x1, 0x32, &(0x7f00000005c0)=r3, 0x4) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={0x0, 0xffffffffffffffff, 0x0, 0x12, &(0x7f0000000480)='./cgroup.cpu/syz1\x00', r1}, 0x30) perf_event_open(&(0x7f0000000300)={0x5, 0x70, 0xff, 0x4, 0x1000, 0xe5af, 0x0, 0x8000, 0xd0440, 0x2, 0xffff, 0x1, 0x4, 0x1f, 0x3, 0xfffffffffffffffa, 0x5, 0x9, 0x8, 0x1, 0x3, 0x400, 0x6, 0x5, 0x401, 0x10000, 0xff, 0xb24, 0xffffffffffff8000, 0xc8a, 0x3f, 0xfffffffffffffffa, 0xffffffffffff8001, 0x200, 0x5, 0x3, 0x2, 0x93a, 0x0, 0x7fff, 0x2, @perf_bp={&(0x7f0000000100), 0x1}, 0x0, 0x0, 0xffffffffffffff4e, 0x6, 0x0, 0x4, 0xfffffffffffffffd}, r5, 0x0, r7, 0x8) r8 = openat$tun(0xffffffffffffff9c, &(0x7f0000000580)='/dev/net/tun\x00', 0x40000, 0x0) ioctl$TUNSETPERSIST(r8, 0x400454cb, 0x1) r9 = socket$kcm(0x29, 0x5, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000800)={0x0, r0, 0x1, 0x2}, 0x14) ioctl$sock_kcm_SIOCKCMUNATTACH(r9, 0x89e1, &(0x7f0000000900)={r2}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r3, 0x0, 0x8b, 0x0, &(0x7f0000000680)="3ce41f426b7dd449ae14b08e1868c456d4fe9c7993884cf18f4dd5a0bc57250243da4203e0640859184bc4c4690afefd7736e8842cd88030448e918bdb5bd9bbbd680a51261557c0477c18049c832005ebb5b185c6f233df73a21d3b3ddad8426fba2d5f8aac5df904d5e5f2e7dc4a517079e08d5b2175a276f2a5c49cc2957cb367f269898570852dd63a", 0x0, 0x5}, 0x28) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000500)='./cgroup/syz0\x00', 0x200002, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000740)={r3, 0x50, &(0x7f00000003c0)}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r2, 0x50, &(0x7f0000000840)}, 0x10) openat$cgroup_subtree(r2, &(0x7f0000000940)='cgroup.subtree_control\x00', 0x2, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x1ff, 0x0, 0x0, 0x0, 0x200000, 0xffffffffffffffff, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280), 0x2}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r10 = socket$kcm(0xa, 0x400000000002, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffc59) ioctl$sock_kcm_SIOCKCMCLONE(r10, 0x890b, &(0x7f0000000000)) ioctl$sock_kcm_SIOCKCMCLONE(r10, 0x890c, &(0x7f0000000000)) 03:53:30 executing program 3: r0 = socket(0x22, 0x2, 0x4) sendmsg$IPVS_CMD_NEW_DAEMON(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)}, 0x45) 03:53:30 executing program 4: r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvfrom$inet6(r0, 0x0, 0x0, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0xa4}, {&(0x7f00000000c0)=""/85, 0xfb}, {&(0x7f0000000fc0)=""/4096, 0x1000}, {&(0x7f0000000400)=""/120, 0x78}, {&(0x7f0000000480)=""/60, 0xa9}, {&(0x7f0000000200)=""/77, 0x5c8}, {&(0x7f0000000540)=""/154, 0x9a}, {&(0x7f0000000340)=""/22, 0x16}], 0x8, &(0x7f0000002400)=""/191, 0xbf}}], 0x4000000000000f0, 0x0, &(0x7f0000003700)={0x77359400}) 03:53:30 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x20, &(0x7f0000000b80)=ANY=[@ANYBLOB="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"], 0x0, 0x1625, 0x0, 0x0, 0x41100, 0x1, [], 0x0, 0x4}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r0, 0xdb, &(0x7f0000000200)={0x0, 0x0}}, 0x393) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='cgroup.events\x00', 0x0, 0x0) write$cgroup_int(r2, &(0x7f00000007c0)=0x6, 0x12) r3 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000002c0), 0x4) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz1\x00', 0x1ff) r4 = perf_event_open$cgroup(&(0x7f0000000600)={0x0, 0x70, 0x9, 0x6, 0x8, 0x6, 0x0, 0x0, 0x2, 0x6, 0x3ff, 0x0, 0x20, 0x0, 0x1, 0x81, 0x1, 0x400, 0x4, 0xfac, 0x4, 0x1, 0x10000, 0xf1, 0xd3, 0x92b, 0x200, 0x1, 0x100000000, 0x2, 0x100000000, 0xfff, 0xfff, 0xffff, 0x3, 0xfffffffffffffffd, 0x0, 0x6, 0x0, 0x50, 0x0, @perf_config_ext={0x3f, 0x9}, 0x20000, 0x8, 0xef3, 0x7, 0x100000000, 0x8, 0xfff}, 0xffffffffffffffff, 0x2, r0, 0x8) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000b40)='cgroup.subtree_control\x00') ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x2400, 0x1) r5 = getpid() socketpair$unix(0x1, 0x7, 0x0, &(0x7f0000000540)={0xffffffffffffffff}) setsockopt$sock_attach_bpf(r6, 0x1, 0x32, &(0x7f00000005c0)=r3, 0x4) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={0x0, 0xffffffffffffffff, 0x0, 0x12, &(0x7f0000000480)='./cgroup.cpu/syz1\x00', r1}, 0x30) perf_event_open(&(0x7f0000000300)={0x5, 0x70, 0xff, 0x4, 0x1000, 0xe5af, 0x0, 0x8000, 0xd0440, 0x2, 0xffff, 0x1, 0x4, 0x1f, 0x3, 0xfffffffffffffffa, 0x5, 0x9, 0x8, 0x1, 0x3, 0x400, 0x6, 0x5, 0x401, 0x10000, 0xff, 0xb24, 0xffffffffffff8000, 0xc8a, 0x3f, 0xfffffffffffffffa, 0xffffffffffff8001, 0x200, 0x5, 0x3, 0x2, 0x93a, 0x0, 0x7fff, 0x2, @perf_bp={&(0x7f0000000100), 0x1}, 0x0, 0x0, 0xffffffffffffff4e, 0x6, 0x0, 0x4, 0xfffffffffffffffd}, r5, 0x0, r7, 0x8) r8 = openat$tun(0xffffffffffffff9c, &(0x7f0000000580)='/dev/net/tun\x00', 0x40000, 0x0) ioctl$TUNSETPERSIST(r8, 0x400454cb, 0x1) r9 = socket$kcm(0x29, 0x5, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000800)={0x0, r0, 0x1, 0x2}, 0x14) ioctl$sock_kcm_SIOCKCMUNATTACH(r9, 0x89e1, &(0x7f0000000900)={r2}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r3, 0x0, 0x8b, 0x0, &(0x7f0000000680)="3ce41f426b7dd449ae14b08e1868c456d4fe9c7993884cf18f4dd5a0bc57250243da4203e0640859184bc4c4690afefd7736e8842cd88030448e918bdb5bd9bbbd680a51261557c0477c18049c832005ebb5b185c6f233df73a21d3b3ddad8426fba2d5f8aac5df904d5e5f2e7dc4a517079e08d5b2175a276f2a5c49cc2957cb367f269898570852dd63a", 0x0, 0x5}, 0x28) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000500)='./cgroup/syz0\x00', 0x200002, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000740)={r3, 0x50, &(0x7f00000003c0)}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r2, 0x50, &(0x7f0000000840)}, 0x10) openat$cgroup_subtree(r2, &(0x7f0000000940)='cgroup.subtree_control\x00', 0x2, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x1ff, 0x0, 0x0, 0x0, 0x200000, 0xffffffffffffffff, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280), 0x2}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r10 = socket$kcm(0xa, 0x400000000002, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffc59) ioctl$sock_kcm_SIOCKCMCLONE(r10, 0x890b, &(0x7f0000000000)) ioctl$sock_kcm_SIOCKCMCLONE(r10, 0x890c, &(0x7f0000000000)) 03:53:30 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) sync_file_range(r0, 0x0, 0x0, 0x0) 03:53:31 executing program 4: r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvfrom$inet6(r0, 0x0, 0x0, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0xa4}, {&(0x7f00000000c0)=""/85, 0xfb}, {&(0x7f0000000fc0)=""/4096, 0x1000}, {&(0x7f0000000400)=""/120, 0x78}, {&(0x7f0000000480)=""/60, 0xa9}, {&(0x7f0000000200)=""/77, 0x5c8}, {&(0x7f0000000540)=""/154, 0x9a}, {&(0x7f0000000340)=""/22, 0x16}], 0x8, &(0x7f0000002400)=""/191, 0xbf}}], 0x4000000000000f0, 0x0, &(0x7f0000003700)={0x77359400}) 03:53:31 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)=ANY=[@ANYBLOB="3c000000210001010000000000000000020000000000000000000000040000001400110076657468315f746f5f6272696467800008000a00ffff0000"], 0x1}}, 0x0) 03:53:31 executing program 0: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r0 = inotify_init() read(r0, 0x0, 0x0) inotify_add_watch(r0, &(0x7f0000000040)='./file0\x00', 0x20000000) inotify_rm_watch(r0, 0x0) 03:53:31 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="00000000000000001c0012000c000100626f6e64000000000c0002000800030000020000"], 0x1}}, 0x0) 03:53:31 executing program 5: getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffff9c, 0x84, 0x13, 0x0, 0x0) r0 = syz_open_dev$swradio(&(0x7f0000000000)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$radio(0x0, 0xffffffffffffffff, 0x2) r1 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) getdents64(r1, 0x0, 0x0) r2 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r2, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r2, 0x8) r3 = socket$inet6_sctp(0xa, 0x805, 0x84) accept4(r2, 0x0, 0x0, 0x0) prctl$PR_SET_ENDIAN(0x14, 0x1) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r3, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) epoll_pwait(0xffffffffffffffff, &(0x7f0000000040)=[{}], 0x1, 0x0, &(0x7f0000000080), 0x8) getpgid(0x0) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f0000000280)={0x0, @in={{0x2, 0x0, @empty}}, 0x0, 0xac14142400000000, 0x0, 0x0, 0x54}, 0x98) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000780)={{{@in=@dev, @in6=@local}}, {{@in6=@mcast2}, 0x0, @in6=@dev}}, 0x0) ioctl$SIOCAX25ADDFWD(r0, 0x89ea, 0x0) syz_mount_image$gfs2(&(0x7f00000003c0)='gfs2\x00', 0x0, 0x87, 0x0, &(0x7f00000005c0), 0x1040040, 0x0) readv(r1, &(0x7f0000000500)=[{&(0x7f0000000400)=""/217, 0xd9}], 0x1) 03:53:31 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x20, &(0x7f0000000b80)=ANY=[@ANYBLOB="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"], 0x0, 0x1625, 0x0, 0x0, 0x41100, 0x1, [], 0x0, 0x4}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r0, 0xdb, &(0x7f0000000200)={0x0, 0x0}}, 0x393) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='cgroup.events\x00', 0x0, 0x0) write$cgroup_int(r2, &(0x7f00000007c0)=0x6, 0x12) r3 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000002c0), 0x4) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz1\x00', 0x1ff) r4 = perf_event_open$cgroup(&(0x7f0000000600)={0x0, 0x70, 0x9, 0x6, 0x8, 0x6, 0x0, 0x0, 0x2, 0x6, 0x3ff, 0x0, 0x20, 0x0, 0x1, 0x81, 0x1, 0x400, 0x4, 0xfac, 0x4, 0x1, 0x10000, 0xf1, 0xd3, 0x92b, 0x200, 0x1, 0x100000000, 0x2, 0x100000000, 0xfff, 0xfff, 0xffff, 0x3, 0xfffffffffffffffd, 0x0, 0x6, 0x0, 0x50, 0x0, @perf_config_ext={0x3f, 0x9}, 0x20000, 0x8, 0xef3, 0x7, 0x100000000, 0x8, 0xfff}, 0xffffffffffffffff, 0x2, r0, 0x8) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000b40)='cgroup.subtree_control\x00') ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x2400, 0x1) r5 = getpid() socketpair$unix(0x1, 0x7, 0x0, &(0x7f0000000540)={0xffffffffffffffff}) setsockopt$sock_attach_bpf(r6, 0x1, 0x32, &(0x7f00000005c0)=r3, 0x4) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={0x0, 0xffffffffffffffff, 0x0, 0x12, &(0x7f0000000480)='./cgroup.cpu/syz1\x00', r1}, 0x30) perf_event_open(&(0x7f0000000300)={0x5, 0x70, 0xff, 0x4, 0x1000, 0xe5af, 0x0, 0x8000, 0xd0440, 0x2, 0xffff, 0x1, 0x4, 0x1f, 0x3, 0xfffffffffffffffa, 0x5, 0x9, 0x8, 0x1, 0x3, 0x400, 0x6, 0x5, 0x401, 0x10000, 0xff, 0xb24, 0xffffffffffff8000, 0xc8a, 0x3f, 0xfffffffffffffffa, 0xffffffffffff8001, 0x200, 0x5, 0x3, 0x2, 0x93a, 0x0, 0x7fff, 0x2, @perf_bp={&(0x7f0000000100), 0x1}, 0x0, 0x0, 0xffffffffffffff4e, 0x6, 0x0, 0x4, 0xfffffffffffffffd}, r5, 0x0, r7, 0x8) r8 = openat$tun(0xffffffffffffff9c, &(0x7f0000000580)='/dev/net/tun\x00', 0x40000, 0x0) ioctl$TUNSETPERSIST(r8, 0x400454cb, 0x1) r9 = socket$kcm(0x29, 0x5, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000800)={0x0, r0, 0x1, 0x2}, 0x14) ioctl$sock_kcm_SIOCKCMUNATTACH(r9, 0x89e1, &(0x7f0000000900)={r2}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r3, 0x0, 0x8b, 0x0, &(0x7f0000000680)="3ce41f426b7dd449ae14b08e1868c456d4fe9c7993884cf18f4dd5a0bc57250243da4203e0640859184bc4c4690afefd7736e8842cd88030448e918bdb5bd9bbbd680a51261557c0477c18049c832005ebb5b185c6f233df73a21d3b3ddad8426fba2d5f8aac5df904d5e5f2e7dc4a517079e08d5b2175a276f2a5c49cc2957cb367f269898570852dd63a", 0x0, 0x5}, 0x28) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000500)='./cgroup/syz0\x00', 0x200002, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000740)={r3, 0x50, &(0x7f00000003c0)}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r2, 0x50, &(0x7f0000000840)}, 0x10) openat$cgroup_subtree(r2, &(0x7f0000000940)='cgroup.subtree_control\x00', 0x2, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x1ff, 0x0, 0x0, 0x0, 0x200000, 0xffffffffffffffff, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280), 0x2}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r10 = socket$kcm(0xa, 0x400000000002, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffc59) ioctl$sock_kcm_SIOCKCMCLONE(r10, 0x890b, &(0x7f0000000000)) ioctl$sock_kcm_SIOCKCMCLONE(r10, 0x890c, &(0x7f0000000000)) 03:53:31 executing program 3: r0 = syz_open_dev$sg(&(0x7f0000001000)='/dev/sg#\x00', 0x0, 0x0) ioctl(r0, 0x227f, &(0x7f0000979fff)) 03:53:31 executing program 2: openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 03:53:31 executing program 4: r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0xa4}, {&(0x7f00000000c0)=""/85, 0xfb}, {&(0x7f0000000fc0)=""/4096, 0x1000}, {&(0x7f0000000400)=""/120, 0x78}, {&(0x7f0000000480)=""/60, 0xa9}, {&(0x7f0000000200)=""/77, 0x5c8}, {&(0x7f0000000540)=""/154, 0x9a}, {&(0x7f0000000340)=""/22, 0x16}], 0x8, &(0x7f0000002400)=""/191, 0xbf}}], 0x4000000000000f0, 0x0, &(0x7f0000003700)={0x77359400}) 03:53:31 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x20, &(0x7f0000000b80)=ANY=[@ANYBLOB="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"], 0x0, 0x1625, 0x0, 0x0, 0x41100, 0x1, [], 0x0, 0x4}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r0, 0xdb, &(0x7f0000000200)={0x0, 0x0}}, 0x393) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='cgroup.events\x00', 0x0, 0x0) write$cgroup_int(r2, &(0x7f00000007c0)=0x6, 0x12) r3 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000002c0), 0x4) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz1\x00', 0x1ff) r4 = perf_event_open$cgroup(&(0x7f0000000600)={0x0, 0x70, 0x9, 0x6, 0x8, 0x6, 0x0, 0xfffffffffffff49f, 0x0, 0x6, 0x3ff, 0x0, 0x20, 0x0, 0x1, 0x81, 0x1, 0x400, 0x4, 0xfac, 0x4, 0x1, 0x10000, 0xf1, 0xd3, 0x92b, 0x200, 0x1, 0x100000000, 0x2, 0x100000000, 0xfff, 0xfff, 0xffff, 0x3, 0xfffffffffffffffd, 0x0, 0x6, 0x0, 0x50, 0x0, @perf_config_ext={0x3f, 0x9}, 0x20000, 0x8, 0xef3, 0x7, 0x100000000, 0x8, 0xfff}, 0xffffffffffffffff, 0x2, r0, 0x8) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000b40)='cgroup.subtree_control\x00') ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x2400, 0x1) r5 = getpid() socketpair$unix(0x1, 0x7, 0x0, &(0x7f0000000540)={0xffffffffffffffff}) setsockopt$sock_attach_bpf(r6, 0x1, 0x32, &(0x7f00000005c0)=r3, 0x4) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={0x0, 0xffffffffffffffff, 0x0, 0x12, &(0x7f0000000480)='./cgroup.cpu/syz1\x00', r1}, 0x30) perf_event_open(&(0x7f0000000300)={0x5, 0x70, 0xff, 0x4, 0x1000, 0xe5af, 0x0, 0x8000, 0xd0440, 0x2, 0xffff, 0x1, 0x4, 0x1f, 0x3, 0xfffffffffffffffa, 0x5, 0x9, 0x8, 0x1, 0x3, 0x400, 0x6, 0x5, 0x401, 0x10000, 0xff, 0xb24, 0xffffffffffff8000, 0xc8a, 0x3f, 0xfffffffffffffffa, 0xffffffffffff8001, 0x200, 0x5, 0x3, 0x2, 0x93a, 0x0, 0x7fff, 0x2, @perf_bp={&(0x7f0000000100), 0x1}, 0x0, 0x0, 0xffffffffffffff4e, 0x6, 0x0, 0x4, 0xfffffffffffffffd}, r5, 0x0, r7, 0x8) r8 = openat$tun(0xffffffffffffff9c, &(0x7f0000000580)='/dev/net/tun\x00', 0x40000, 0x0) ioctl$TUNSETPERSIST(r8, 0x400454cb, 0x1) r9 = socket$kcm(0x29, 0x5, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000800)={0x0, r0, 0x1, 0x2}, 0x14) ioctl$sock_kcm_SIOCKCMUNATTACH(r9, 0x89e1, &(0x7f0000000900)={r2}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r3, 0x0, 0x8b, 0x0, &(0x7f0000000680)="3ce41f426b7dd449ae14b08e1868c456d4fe9c7993884cf18f4dd5a0bc57250243da4203e0640859184bc4c4690afefd7736e8842cd88030448e918bdb5bd9bbbd680a51261557c0477c18049c832005ebb5b185c6f233df73a21d3b3ddad8426fba2d5f8aac5df904d5e5f2e7dc4a517079e08d5b2175a276f2a5c49cc2957cb367f269898570852dd63a", 0x0, 0x5}, 0x28) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000500)='./cgroup/syz0\x00', 0x200002, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000740)={r3, 0x50, &(0x7f00000003c0)}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r2, 0x50, &(0x7f0000000840)}, 0x10) openat$cgroup_subtree(r2, &(0x7f0000000940)='cgroup.subtree_control\x00', 0x2, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x1ff, 0x0, 0x0, 0x0, 0x200000, 0xffffffffffffffff, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280), 0x2}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r10 = socket$kcm(0xa, 0x400000000002, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffc59) ioctl$sock_kcm_SIOCKCMCLONE(r10, 0x890b, &(0x7f0000000000)) ioctl$sock_kcm_SIOCKCMCLONE(r10, 0x890c, &(0x7f0000000000)) 03:53:31 executing program 4: r0 = socket(0x10, 0x803, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0xa4}, {&(0x7f00000000c0)=""/85, 0xfb}, {&(0x7f0000000fc0)=""/4096, 0x1000}, {&(0x7f0000000400)=""/120, 0x78}, {&(0x7f0000000480)=""/60, 0xa9}, {&(0x7f0000000200)=""/77, 0x5c8}, {&(0x7f0000000540)=""/154, 0x9a}, {&(0x7f0000000340)=""/22, 0x16}], 0x8, &(0x7f0000002400)=""/191, 0xbf}}], 0x4000000000000f0, 0x0, &(0x7f0000003700)={0x77359400}) 03:53:31 executing program 3: r0 = syz_open_dev$vbi(&(0x7f0000000040)='/dev/vbi#\x00', 0xffffffffffffffff, 0x2) read(r0, 0x0, 0x0) 03:53:31 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x20, &(0x7f0000000b80)=ANY=[@ANYBLOB="cab5674ca80400f902c8d3fc17d4a51472ff5e04a7ed68e9074e865fffffffffff6582e2a0c58f438f1a9b1af27305fb6c1d497851a00d51dddde821f356222d82de15a5bb3ca4d544c3683ff903b30637ee634a8a4fa0e19e57c7d35e4db3a02231b71023a910ac2424326e31258bde7ca760ff3ca3261a92112b3c8db9e0d79dc5ad29e05434154bba1e60d243d8fa466b27518c09e11b78ec43ab7af1d33fbd4885ee5e95b0849345d0edef0a2e68320a47938597cf0fba5ae2e93301ffc38baaf2673b7fd4628a0fe3665006d238567bdb430991e02866ad858345dc86331d91a53051b3284827fc0a870d857ecc180901feb2d1dd3be0c1ebc3fa1d00d550744d9e55"], 0x0, 0x1625, 0x0, 0x0, 0x41100, 0x1, [], 0x0, 0x4}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r0, 0xdb, &(0x7f0000000200)={0x0, 0x0}}, 0x393) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='cgroup.events\x00', 0x0, 0x0) write$cgroup_int(r2, &(0x7f00000007c0)=0x6, 0x12) r3 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000002c0), 0x4) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz1\x00', 0x1ff) r4 = perf_event_open$cgroup(&(0x7f0000000600)={0x0, 0x70, 0x9, 0x6, 0x8, 0x6, 0x0, 0xfffffffffffff49f, 0x0, 0x6, 0x3ff, 0x0, 0x20, 0x0, 0x1, 0x81, 0x1, 0x400, 0x4, 0xfac, 0x4, 0x1, 0x10000, 0xf1, 0xd3, 0x92b, 0x200, 0x1, 0x100000000, 0x2, 0x100000000, 0xfff, 0xfff, 0xffff, 0x3, 0xfffffffffffffffd, 0x0, 0x6, 0x0, 0x50, 0x0, @perf_config_ext={0x3f, 0x9}, 0x20000, 0x8, 0xef3, 0x7, 0x100000000, 0x8, 0xfff}, 0xffffffffffffffff, 0x2, r0, 0x8) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000b40)='cgroup.subtree_control\x00') ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x2400, 0x1) r5 = getpid() socketpair$unix(0x1, 0x7, 0x0, &(0x7f0000000540)={0xffffffffffffffff}) setsockopt$sock_attach_bpf(r6, 0x1, 0x32, &(0x7f00000005c0)=r3, 0x4) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={0x0, 0xffffffffffffffff, 0x0, 0x12, &(0x7f0000000480)='./cgroup.cpu/syz1\x00', r1}, 0x30) perf_event_open(&(0x7f0000000300)={0x5, 0x70, 0xff, 0x4, 0x1000, 0xe5af, 0x0, 0x8000, 0xd0440, 0x2, 0xffff, 0x1, 0x4, 0x1f, 0x3, 0xfffffffffffffffa, 0x5, 0x9, 0x8, 0x1, 0x3, 0x400, 0x6, 0x5, 0x401, 0x10000, 0xff, 0xb24, 0xffffffffffff8000, 0xc8a, 0x3f, 0xfffffffffffffffa, 0xffffffffffff8001, 0x200, 0x5, 0x3, 0x2, 0x93a, 0x0, 0x7fff, 0x2, @perf_bp={&(0x7f0000000100), 0x1}, 0x0, 0x0, 0xffffffffffffff4e, 0x6, 0x0, 0x4, 0xfffffffffffffffd}, r5, 0x0, r7, 0x8) r8 = openat$tun(0xffffffffffffff9c, &(0x7f0000000580)='/dev/net/tun\x00', 0x40000, 0x0) ioctl$TUNSETPERSIST(r8, 0x400454cb, 0x1) r9 = socket$kcm(0x29, 0x5, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000800)={0x0, r0, 0x1, 0x2}, 0x14) ioctl$sock_kcm_SIOCKCMUNATTACH(r9, 0x89e1, &(0x7f0000000900)={r2}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r3, 0x0, 0x8b, 0x0, &(0x7f0000000680)="3ce41f426b7dd449ae14b08e1868c456d4fe9c7993884cf18f4dd5a0bc57250243da4203e0640859184bc4c4690afefd7736e8842cd88030448e918bdb5bd9bbbd680a51261557c0477c18049c832005ebb5b185c6f233df73a21d3b3ddad8426fba2d5f8aac5df904d5e5f2e7dc4a517079e08d5b2175a276f2a5c49cc2957cb367f269898570852dd63a", 0x0, 0x5}, 0x28) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000500)='./cgroup/syz0\x00', 0x200002, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000740)={r3, 0x50, &(0x7f00000003c0)}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r2, 0x50, &(0x7f0000000840)}, 0x10) openat$cgroup_subtree(r2, &(0x7f0000000940)='cgroup.subtree_control\x00', 0x2, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x1ff, 0x0, 0x0, 0x0, 0x200000, 0xffffffffffffffff, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280), 0x2}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r10 = socket$kcm(0xa, 0x400000000002, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffc59) ioctl$sock_kcm_SIOCKCMCLONE(r10, 0x890b, &(0x7f0000000000)) ioctl$sock_kcm_SIOCKCMCLONE(r10, 0x890c, &(0x7f0000000000)) 03:53:31 executing program 5: getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffff9c, 0x84, 0x13, 0x0, 0x0) r0 = syz_open_dev$swradio(&(0x7f0000000000)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$radio(0x0, 0xffffffffffffffff, 0x2) r1 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) getdents64(r1, 0x0, 0x0) r2 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r2, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r2, 0x8) r3 = socket$inet6_sctp(0xa, 0x805, 0x84) accept4(r2, 0x0, 0x0, 0x0) prctl$PR_SET_ENDIAN(0x14, 0x1) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r3, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) epoll_pwait(0xffffffffffffffff, &(0x7f0000000040)=[{}], 0x1, 0x0, &(0x7f0000000080), 0x8) getpgid(0x0) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f0000000280)={0x0, @in={{0x2, 0x0, @empty}}, 0x0, 0xac14142400000000, 0x0, 0x0, 0x54}, 0x98) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000780)={{{@in=@dev, @in6=@local}}, {{@in6=@mcast2}, 0x0, @in6=@dev}}, 0x0) ioctl$SIOCAX25ADDFWD(r0, 0x89ea, 0x0) syz_mount_image$gfs2(&(0x7f00000003c0)='gfs2\x00', 0x0, 0x87, 0x0, &(0x7f00000005c0), 0x1040040, 0x0) readv(r1, &(0x7f0000000500)=[{&(0x7f0000000400)=""/217, 0xd9}], 0x1) 03:53:31 executing program 2: r0 = socket$inet_dccp(0x2, 0x6, 0x0) fcntl$getflags(r0, 0xb) 03:53:32 executing program 0: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r0 = inotify_init() read(r0, 0x0, 0x0) inotify_add_watch(r0, &(0x7f0000000040)='./file0\x00', 0x20000000) inotify_rm_watch(r0, 0x0) 03:53:32 executing program 4: sendto(0xffffffffffffffff, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0xa4}, {&(0x7f00000000c0)=""/85, 0xfb}, {&(0x7f0000000fc0)=""/4096, 0x1000}, {&(0x7f0000000400)=""/120, 0x78}, {&(0x7f0000000480)=""/60, 0xa9}, {&(0x7f0000000200)=""/77, 0x5c8}, {&(0x7f0000000540)=""/154, 0x9a}, {&(0x7f0000000340)=""/22, 0x16}], 0x8, &(0x7f0000002400)=""/191, 0xbf}}], 0x4000000000000f0, 0x0, &(0x7f0000003700)={0x77359400}) 03:53:32 executing program 3: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup.cpu\x00', 0x200002, 0x0) r1 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r1, 0x40000000af01, 0x0) r2 = openat$cgroup_procs(r0, &(0x7f0000000080)='cgroup.procs\x00', 0x2, 0x0) r3 = socket$kcm(0x29, 0x805, 0x0) sendfile(r3, r2, 0x0, 0x1000000005) 03:53:32 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x20, &(0x7f0000000b80)=ANY=[@ANYBLOB="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"], 0x0, 0x1625, 0x0, 0x0, 0x41100, 0x1, [], 0x0, 0x4}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r0, 0xdb, &(0x7f0000000200)={0x0, 0x0}}, 0x393) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='cgroup.events\x00', 0x0, 0x0) write$cgroup_int(r2, &(0x7f00000007c0)=0x6, 0x12) r3 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000002c0), 0x4) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz1\x00', 0x1ff) r4 = perf_event_open$cgroup(&(0x7f0000000600)={0x0, 0x70, 0x9, 0x6, 0x8, 0x6, 0x0, 0xfffffffffffff49f, 0x0, 0x6, 0x3ff, 0x0, 0x20, 0x0, 0x1, 0x81, 0x1, 0x400, 0x4, 0xfac, 0x4, 0x1, 0x10000, 0xf1, 0xd3, 0x92b, 0x200, 0x1, 0x100000000, 0x2, 0x100000000, 0xfff, 0xfff, 0xffff, 0x3, 0xfffffffffffffffd, 0x0, 0x6, 0x0, 0x50, 0x0, @perf_config_ext={0x3f, 0x9}, 0x20000, 0x8, 0xef3, 0x7, 0x100000000, 0x8, 0xfff}, 0xffffffffffffffff, 0x2, r0, 0x8) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000b40)='cgroup.subtree_control\x00') ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x2400, 0x1) r5 = getpid() socketpair$unix(0x1, 0x7, 0x0, &(0x7f0000000540)={0xffffffffffffffff}) setsockopt$sock_attach_bpf(r6, 0x1, 0x32, &(0x7f00000005c0)=r3, 0x4) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={0x0, 0xffffffffffffffff, 0x0, 0x12, &(0x7f0000000480)='./cgroup.cpu/syz1\x00', r1}, 0x30) perf_event_open(&(0x7f0000000300)={0x5, 0x70, 0xff, 0x4, 0x1000, 0xe5af, 0x0, 0x8000, 0xd0440, 0x2, 0xffff, 0x1, 0x4, 0x1f, 0x3, 0xfffffffffffffffa, 0x5, 0x9, 0x8, 0x1, 0x3, 0x400, 0x6, 0x5, 0x401, 0x10000, 0xff, 0xb24, 0xffffffffffff8000, 0xc8a, 0x3f, 0xfffffffffffffffa, 0xffffffffffff8001, 0x200, 0x5, 0x3, 0x2, 0x93a, 0x0, 0x7fff, 0x2, @perf_bp={&(0x7f0000000100), 0x1}, 0x0, 0x0, 0xffffffffffffff4e, 0x6, 0x0, 0x4, 0xfffffffffffffffd}, r5, 0x0, r7, 0x8) r8 = openat$tun(0xffffffffffffff9c, &(0x7f0000000580)='/dev/net/tun\x00', 0x40000, 0x0) ioctl$TUNSETPERSIST(r8, 0x400454cb, 0x1) r9 = socket$kcm(0x29, 0x5, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000800)={0x0, r0, 0x1, 0x2}, 0x14) ioctl$sock_kcm_SIOCKCMUNATTACH(r9, 0x89e1, &(0x7f0000000900)={r2}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r3, 0x0, 0x8b, 0x0, &(0x7f0000000680)="3ce41f426b7dd449ae14b08e1868c456d4fe9c7993884cf18f4dd5a0bc57250243da4203e0640859184bc4c4690afefd7736e8842cd88030448e918bdb5bd9bbbd680a51261557c0477c18049c832005ebb5b185c6f233df73a21d3b3ddad8426fba2d5f8aac5df904d5e5f2e7dc4a517079e08d5b2175a276f2a5c49cc2957cb367f269898570852dd63a", 0x0, 0x5}, 0x28) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000500)='./cgroup/syz0\x00', 0x200002, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000740)={r3, 0x50, &(0x7f00000003c0)}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r2, 0x50, &(0x7f0000000840)}, 0x10) openat$cgroup_subtree(r2, &(0x7f0000000940)='cgroup.subtree_control\x00', 0x2, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x1ff, 0x0, 0x0, 0x0, 0x200000, 0xffffffffffffffff, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280), 0x2}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r10 = socket$kcm(0xa, 0x400000000002, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffc59) ioctl$sock_kcm_SIOCKCMCLONE(r10, 0x890b, &(0x7f0000000000)) ioctl$sock_kcm_SIOCKCMCLONE(r10, 0x890c, &(0x7f0000000000)) 03:53:32 executing program 2: r0 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r0, &(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, 0xfffffffffffffdc4) 03:53:32 executing program 5: getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffff9c, 0x84, 0x13, 0x0, 0x0) r0 = syz_open_dev$swradio(&(0x7f0000000000)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$radio(0x0, 0xffffffffffffffff, 0x2) r1 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) getdents64(r1, 0x0, 0x0) r2 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r2, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r2, 0x8) r3 = socket$inet6_sctp(0xa, 0x805, 0x84) accept4(r2, 0x0, 0x0, 0x0) prctl$PR_SET_ENDIAN(0x14, 0x1) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r3, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) epoll_pwait(0xffffffffffffffff, &(0x7f0000000040)=[{}], 0x1, 0x0, &(0x7f0000000080), 0x8) getpgid(0x0) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f0000000280)={0x0, @in={{0x2, 0x0, @empty}}, 0x0, 0xac14142400000000, 0x0, 0x0, 0x54}, 0x98) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000780)={{{@in=@dev, @in6=@local}}, {{@in6=@mcast2}, 0x0, @in6=@dev}}, 0x0) ioctl$SIOCAX25ADDFWD(r0, 0x89ea, 0x0) syz_mount_image$gfs2(&(0x7f00000003c0)='gfs2\x00', 0x0, 0x87, 0x0, &(0x7f00000005c0), 0x1040040, 0x0) readv(r1, &(0x7f0000000500)=[{&(0x7f0000000400)=""/217, 0xd9}], 0x1) 03:53:32 executing program 2: splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x7, 0x0) 03:53:32 executing program 3: r0 = socket$unix(0x1, 0x1, 0x0) bind$unix(r0, &(0x7f0000003000)=@file={0x0, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) 03:53:32 executing program 4: r0 = socket(0x0, 0x803, 0x0) sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0xa4}, {&(0x7f00000000c0)=""/85, 0xfb}, {&(0x7f0000000fc0)=""/4096, 0x1000}, {&(0x7f0000000400)=""/120, 0x78}, {&(0x7f0000000480)=""/60, 0xa9}, {&(0x7f0000000200)=""/77, 0x5c8}, {&(0x7f0000000540)=""/154, 0x9a}, {&(0x7f0000000340)=""/22, 0x16}], 0x8, &(0x7f0000002400)=""/191, 0xbf}}], 0x4000000000000f0, 0x0, &(0x7f0000003700)={0x77359400}) 03:53:32 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x20, &(0x7f0000000b80)=ANY=[@ANYBLOB="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"], 0x0, 0x1625, 0x0, 0x0, 0x41100, 0x1, [], 0x0, 0x4}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r0, 0xdb, &(0x7f0000000200)={0x0, 0x0}}, 0x393) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='cgroup.events\x00', 0x0, 0x0) write$cgroup_int(r2, &(0x7f00000007c0)=0x6, 0x12) r3 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000002c0), 0x4) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz1\x00', 0x1ff) r4 = perf_event_open$cgroup(&(0x7f0000000600)={0x0, 0x70, 0x9, 0x6, 0x8, 0x6, 0x0, 0xfffffffffffff49f, 0x2, 0x0, 0x3ff, 0x0, 0x20, 0x0, 0x1, 0x81, 0x1, 0x400, 0x4, 0xfac, 0x4, 0x1, 0x10000, 0xf1, 0xd3, 0x92b, 0x200, 0x1, 0x100000000, 0x2, 0x100000000, 0xfff, 0xfff, 0xffff, 0x3, 0xfffffffffffffffd, 0x0, 0x6, 0x0, 0x50, 0x0, @perf_config_ext={0x3f, 0x9}, 0x20000, 0x8, 0xef3, 0x7, 0x100000000, 0x8, 0xfff}, 0xffffffffffffffff, 0x2, r0, 0x8) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000b40)='cgroup.subtree_control\x00') ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x2400, 0x1) r5 = getpid() socketpair$unix(0x1, 0x7, 0x0, &(0x7f0000000540)={0xffffffffffffffff}) setsockopt$sock_attach_bpf(r6, 0x1, 0x32, &(0x7f00000005c0)=r3, 0x4) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={0x0, 0xffffffffffffffff, 0x0, 0x12, &(0x7f0000000480)='./cgroup.cpu/syz1\x00', r1}, 0x30) perf_event_open(&(0x7f0000000300)={0x5, 0x70, 0xff, 0x4, 0x1000, 0xe5af, 0x0, 0x8000, 0xd0440, 0x2, 0xffff, 0x1, 0x4, 0x1f, 0x3, 0xfffffffffffffffa, 0x5, 0x9, 0x8, 0x1, 0x3, 0x400, 0x6, 0x5, 0x401, 0x10000, 0xff, 0xb24, 0xffffffffffff8000, 0xc8a, 0x3f, 0xfffffffffffffffa, 0xffffffffffff8001, 0x200, 0x5, 0x3, 0x2, 0x93a, 0x0, 0x7fff, 0x2, @perf_bp={&(0x7f0000000100), 0x1}, 0x0, 0x0, 0xffffffffffffff4e, 0x6, 0x0, 0x4, 0xfffffffffffffffd}, r5, 0x0, r7, 0x8) r8 = openat$tun(0xffffffffffffff9c, &(0x7f0000000580)='/dev/net/tun\x00', 0x40000, 0x0) ioctl$TUNSETPERSIST(r8, 0x400454cb, 0x1) r9 = socket$kcm(0x29, 0x5, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000800)={0x0, r0, 0x1, 0x2}, 0x14) ioctl$sock_kcm_SIOCKCMUNATTACH(r9, 0x89e1, &(0x7f0000000900)={r2}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r3, 0x0, 0x8b, 0x0, &(0x7f0000000680)="3ce41f426b7dd449ae14b08e1868c456d4fe9c7993884cf18f4dd5a0bc57250243da4203e0640859184bc4c4690afefd7736e8842cd88030448e918bdb5bd9bbbd680a51261557c0477c18049c832005ebb5b185c6f233df73a21d3b3ddad8426fba2d5f8aac5df904d5e5f2e7dc4a517079e08d5b2175a276f2a5c49cc2957cb367f269898570852dd63a", 0x0, 0x5}, 0x28) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000500)='./cgroup/syz0\x00', 0x200002, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000740)={r3, 0x50, &(0x7f00000003c0)}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r2, 0x50, &(0x7f0000000840)}, 0x10) openat$cgroup_subtree(r2, &(0x7f0000000940)='cgroup.subtree_control\x00', 0x2, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x1ff, 0x0, 0x0, 0x0, 0x200000, 0xffffffffffffffff, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280), 0x2}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r10 = socket$kcm(0xa, 0x400000000002, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffc59) ioctl$sock_kcm_SIOCKCMCLONE(r10, 0x890b, &(0x7f0000000000)) ioctl$sock_kcm_SIOCKCMCLONE(r10, 0x890c, &(0x7f0000000000)) [ 1840.082631] net_ratelimit: 22 callbacks suppressed [ 1840.082641] protocol 88fb is buggy, dev hsr_slave_0 [ 1840.092798] protocol 88fb is buggy, dev hsr_slave_1 [ 1840.097939] protocol 88fb is buggy, dev hsr_slave_0 [ 1840.103045] protocol 88fb is buggy, dev hsr_slave_1 03:53:32 executing program 3: clock_getres(0x2, &(0x7f0000000200)) 03:53:32 executing program 5: getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffff9c, 0x84, 0x13, 0x0, 0x0) r0 = syz_open_dev$swradio(&(0x7f0000000000)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$radio(0x0, 0xffffffffffffffff, 0x2) r1 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) getdents64(r1, 0x0, 0x0) r2 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r2, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r2, 0x8) r3 = socket$inet6_sctp(0xa, 0x805, 0x84) r4 = accept4(r2, 0x0, 0x0, 0x0) prctl$PR_SET_ENDIAN(0x14, 0x1) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r3, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) epoll_pwait(0xffffffffffffffff, &(0x7f0000000040)=[{}], 0x1, 0x0, &(0x7f0000000080), 0x8) getpgid(0x0) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r4, 0x84, 0x9, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000780)={{{@in=@dev, @in6=@local}}, {{@in6=@mcast2}, 0x0, @in6=@dev}}, 0x0) ioctl$SIOCAX25ADDFWD(r0, 0x89ea, 0x0) syz_mount_image$gfs2(&(0x7f00000003c0)='gfs2\x00', 0x0, 0x87, 0x0, &(0x7f00000005c0), 0x1040040, 0x0) readv(r1, &(0x7f0000000500)=[{&(0x7f0000000400)=""/217, 0xd9}], 0x1) 03:53:33 executing program 0: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r0 = inotify_init() read(r0, 0x0, 0x0) inotify_add_watch(r0, &(0x7f0000000040)='./file0\x00', 0x20000000) inotify_rm_watch(r0, 0x0) 03:53:33 executing program 2: r0 = socket(0xa, 0x80002, 0x0) unshare(0x20400) r1 = dup(r0) getsockopt$inet_mreqsrc(r1, 0x0, 0x0, 0x0, &(0x7f0000000080)) 03:53:33 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x20, &(0x7f0000000b80)=ANY=[@ANYBLOB="cab5674ca80400f902c8d3fc17d4a51472ff5e04a7ed68e9074e865fffffffffff6582e2a0c58f438f1a9b1af27305fb6c1d497851a00d51dddde821f356222d82de15a5bb3ca4d544c3683ff903b30637ee634a8a4fa0e19e57c7d35e4db3a02231b71023a910ac2424326e31258bde7ca760ff3ca3261a92112b3c8db9e0d79dc5ad29e05434154bba1e60d243d8fa466b27518c09e11b78ec43ab7af1d33fbd4885ee5e95b0849345d0edef0a2e68320a47938597cf0fba5ae2e93301ffc38baaf2673b7fd4628a0fe3665006d238567bdb430991e02866ad858345dc86331d91a53051b3284827fc0a870d857ecc180901feb2d1dd3be0c1ebc3fa1d00d550744d9e55"], 0x0, 0x1625, 0x0, 0x0, 0x41100, 0x1, [], 0x0, 0x4}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r0, 0xdb, &(0x7f0000000200)={0x0, 0x0}}, 0x393) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='cgroup.events\x00', 0x0, 0x0) write$cgroup_int(r2, &(0x7f00000007c0)=0x6, 0x12) r3 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000002c0), 0x4) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz1\x00', 0x1ff) r4 = perf_event_open$cgroup(&(0x7f0000000600)={0x0, 0x70, 0x9, 0x6, 0x8, 0x6, 0x0, 0xfffffffffffff49f, 0x2, 0x0, 0x3ff, 0x0, 0x20, 0x0, 0x1, 0x81, 0x1, 0x400, 0x4, 0xfac, 0x4, 0x1, 0x10000, 0xf1, 0xd3, 0x92b, 0x200, 0x1, 0x100000000, 0x2, 0x100000000, 0xfff, 0xfff, 0xffff, 0x3, 0xfffffffffffffffd, 0x0, 0x6, 0x0, 0x50, 0x0, @perf_config_ext={0x3f, 0x9}, 0x20000, 0x8, 0xef3, 0x7, 0x100000000, 0x8, 0xfff}, 0xffffffffffffffff, 0x2, r0, 0x8) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000b40)='cgroup.subtree_control\x00') ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x2400, 0x1) r5 = getpid() socketpair$unix(0x1, 0x7, 0x0, &(0x7f0000000540)={0xffffffffffffffff}) setsockopt$sock_attach_bpf(r6, 0x1, 0x32, &(0x7f00000005c0)=r3, 0x4) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={0x0, 0xffffffffffffffff, 0x0, 0x12, &(0x7f0000000480)='./cgroup.cpu/syz1\x00', r1}, 0x30) perf_event_open(&(0x7f0000000300)={0x5, 0x70, 0xff, 0x4, 0x1000, 0xe5af, 0x0, 0x8000, 0xd0440, 0x2, 0xffff, 0x1, 0x4, 0x1f, 0x3, 0xfffffffffffffffa, 0x5, 0x9, 0x8, 0x1, 0x3, 0x400, 0x6, 0x5, 0x401, 0x10000, 0xff, 0xb24, 0xffffffffffff8000, 0xc8a, 0x3f, 0xfffffffffffffffa, 0xffffffffffff8001, 0x200, 0x5, 0x3, 0x2, 0x93a, 0x0, 0x7fff, 0x2, @perf_bp={&(0x7f0000000100), 0x1}, 0x0, 0x0, 0xffffffffffffff4e, 0x6, 0x0, 0x4, 0xfffffffffffffffd}, r5, 0x0, r7, 0x8) r8 = openat$tun(0xffffffffffffff9c, &(0x7f0000000580)='/dev/net/tun\x00', 0x40000, 0x0) ioctl$TUNSETPERSIST(r8, 0x400454cb, 0x1) r9 = socket$kcm(0x29, 0x5, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000800)={0x0, r0, 0x1, 0x2}, 0x14) ioctl$sock_kcm_SIOCKCMUNATTACH(r9, 0x89e1, &(0x7f0000000900)={r2}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r3, 0x0, 0x8b, 0x0, &(0x7f0000000680)="3ce41f426b7dd449ae14b08e1868c456d4fe9c7993884cf18f4dd5a0bc57250243da4203e0640859184bc4c4690afefd7736e8842cd88030448e918bdb5bd9bbbd680a51261557c0477c18049c832005ebb5b185c6f233df73a21d3b3ddad8426fba2d5f8aac5df904d5e5f2e7dc4a517079e08d5b2175a276f2a5c49cc2957cb367f269898570852dd63a", 0x0, 0x5}, 0x28) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000500)='./cgroup/syz0\x00', 0x200002, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000740)={r3, 0x50, &(0x7f00000003c0)}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r2, 0x50, &(0x7f0000000840)}, 0x10) openat$cgroup_subtree(r2, &(0x7f0000000940)='cgroup.subtree_control\x00', 0x2, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x1ff, 0x0, 0x0, 0x0, 0x200000, 0xffffffffffffffff, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280), 0x2}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r10 = socket$kcm(0xa, 0x400000000002, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffc59) ioctl$sock_kcm_SIOCKCMCLONE(r10, 0x890b, &(0x7f0000000000)) ioctl$sock_kcm_SIOCKCMCLONE(r10, 0x890c, &(0x7f0000000000)) 03:53:33 executing program 4: r0 = socket(0x10, 0x0, 0x0) sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0xa4}, {&(0x7f00000000c0)=""/85, 0xfb}, {&(0x7f0000000fc0)=""/4096, 0x1000}, {&(0x7f0000000400)=""/120, 0x78}, {&(0x7f0000000480)=""/60, 0xa9}, {&(0x7f0000000200)=""/77, 0x5c8}, {&(0x7f0000000540)=""/154, 0x9a}, {&(0x7f0000000340)=""/22, 0x16}], 0x8, &(0x7f0000002400)=""/191, 0xbf}}], 0x4000000000000f0, 0x0, &(0x7f0000003700)={0x77359400}) 03:53:33 executing program 3: r0 = socket$kcm(0x2, 0x2, 0x73) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$ARPT_SO_SET_ADD_COUNTERS(r1, 0x0, 0x61, &(0x7f00000000c0)={'filter\x00', 0x4}, 0x68) 03:53:33 executing program 5: getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffff9c, 0x84, 0x13, 0x0, 0x0) r0 = syz_open_dev$swradio(&(0x7f0000000000)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$radio(0x0, 0xffffffffffffffff, 0x2) r1 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) getdents64(r1, 0x0, 0x0) r2 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r2, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r2, 0x8) r3 = socket$inet6_sctp(0xa, 0x805, 0x84) r4 = accept4(r2, 0x0, 0x0, 0x0) prctl$PR_SET_ENDIAN(0x14, 0x1) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r3, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) epoll_pwait(0xffffffffffffffff, &(0x7f0000000040)=[{}], 0x1, 0x0, &(0x7f0000000080), 0x8) getpgid(0x0) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r4, 0x84, 0x9, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000780)={{{@in=@dev, @in6=@local}}, {{@in6=@mcast2}, 0x0, @in6=@dev}}, 0x0) ioctl$SIOCAX25ADDFWD(r0, 0x89ea, 0x0) syz_mount_image$gfs2(&(0x7f00000003c0)='gfs2\x00', 0x0, 0x87, 0x0, &(0x7f00000005c0), 0x1040040, 0x0) readv(r1, &(0x7f0000000500)=[{&(0x7f0000000400)=""/217, 0xd9}], 0x1) 03:53:33 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x20, &(0x7f0000000b80)=ANY=[@ANYBLOB="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"], 0x0, 0x1625, 0x0, 0x0, 0x41100, 0x1, [], 0x0, 0x4}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r0, 0xdb, &(0x7f0000000200)={0x0, 0x0}}, 0x393) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='cgroup.events\x00', 0x0, 0x0) write$cgroup_int(r2, &(0x7f00000007c0)=0x6, 0x12) r3 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000002c0), 0x4) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz1\x00', 0x1ff) r4 = perf_event_open$cgroup(&(0x7f0000000600)={0x0, 0x70, 0x9, 0x6, 0x8, 0x6, 0x0, 0xfffffffffffff49f, 0x2, 0x0, 0x3ff, 0x0, 0x20, 0x0, 0x1, 0x81, 0x1, 0x400, 0x4, 0xfac, 0x4, 0x1, 0x10000, 0xf1, 0xd3, 0x92b, 0x200, 0x1, 0x100000000, 0x2, 0x100000000, 0xfff, 0xfff, 0xffff, 0x3, 0xfffffffffffffffd, 0x0, 0x6, 0x0, 0x50, 0x0, @perf_config_ext={0x3f, 0x9}, 0x20000, 0x8, 0xef3, 0x7, 0x100000000, 0x8, 0xfff}, 0xffffffffffffffff, 0x2, r0, 0x8) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000b40)='cgroup.subtree_control\x00') ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x2400, 0x1) r5 = getpid() socketpair$unix(0x1, 0x7, 0x0, &(0x7f0000000540)={0xffffffffffffffff}) setsockopt$sock_attach_bpf(r6, 0x1, 0x32, &(0x7f00000005c0)=r3, 0x4) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={0x0, 0xffffffffffffffff, 0x0, 0x12, &(0x7f0000000480)='./cgroup.cpu/syz1\x00', r1}, 0x30) perf_event_open(&(0x7f0000000300)={0x5, 0x70, 0xff, 0x4, 0x1000, 0xe5af, 0x0, 0x8000, 0xd0440, 0x2, 0xffff, 0x1, 0x4, 0x1f, 0x3, 0xfffffffffffffffa, 0x5, 0x9, 0x8, 0x1, 0x3, 0x400, 0x6, 0x5, 0x401, 0x10000, 0xff, 0xb24, 0xffffffffffff8000, 0xc8a, 0x3f, 0xfffffffffffffffa, 0xffffffffffff8001, 0x200, 0x5, 0x3, 0x2, 0x93a, 0x0, 0x7fff, 0x2, @perf_bp={&(0x7f0000000100), 0x1}, 0x0, 0x0, 0xffffffffffffff4e, 0x6, 0x0, 0x4, 0xfffffffffffffffd}, r5, 0x0, r7, 0x8) r8 = openat$tun(0xffffffffffffff9c, &(0x7f0000000580)='/dev/net/tun\x00', 0x40000, 0x0) ioctl$TUNSETPERSIST(r8, 0x400454cb, 0x1) r9 = socket$kcm(0x29, 0x5, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000800)={0x0, r0, 0x1, 0x2}, 0x14) ioctl$sock_kcm_SIOCKCMUNATTACH(r9, 0x89e1, &(0x7f0000000900)={r2}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r3, 0x0, 0x8b, 0x0, &(0x7f0000000680)="3ce41f426b7dd449ae14b08e1868c456d4fe9c7993884cf18f4dd5a0bc57250243da4203e0640859184bc4c4690afefd7736e8842cd88030448e918bdb5bd9bbbd680a51261557c0477c18049c832005ebb5b185c6f233df73a21d3b3ddad8426fba2d5f8aac5df904d5e5f2e7dc4a517079e08d5b2175a276f2a5c49cc2957cb367f269898570852dd63a", 0x0, 0x5}, 0x28) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000500)='./cgroup/syz0\x00', 0x200002, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000740)={r3, 0x50, &(0x7f00000003c0)}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r2, 0x50, &(0x7f0000000840)}, 0x10) openat$cgroup_subtree(r2, &(0x7f0000000940)='cgroup.subtree_control\x00', 0x2, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x1ff, 0x0, 0x0, 0x0, 0x200000, 0xffffffffffffffff, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280), 0x2}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r10 = socket$kcm(0xa, 0x400000000002, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffc59) ioctl$sock_kcm_SIOCKCMCLONE(r10, 0x890b, &(0x7f0000000000)) ioctl$sock_kcm_SIOCKCMCLONE(r10, 0x890c, &(0x7f0000000000)) 03:53:33 executing program 4: r0 = socket(0x10, 0x803, 0x0) sendto(0xffffffffffffffff, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0xa4}, {&(0x7f00000000c0)=""/85, 0xfb}, {&(0x7f0000000fc0)=""/4096, 0x1000}, {&(0x7f0000000400)=""/120, 0x78}, {&(0x7f0000000480)=""/60, 0xa9}, {&(0x7f0000000200)=""/77, 0x5c8}, {&(0x7f0000000540)=""/154, 0x9a}, {&(0x7f0000000340)=""/22, 0x16}], 0x8, &(0x7f0000002400)=""/191, 0xbf}}], 0x4000000000000f0, 0x0, &(0x7f0000003700)={0x77359400}) 03:53:33 executing program 3: r0 = socket$kcm(0x2, 0x2, 0x73) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$ARPT_SO_SET_ADD_COUNTERS(r1, 0x0, 0x61, &(0x7f00000000c0)={'filter\x00', 0x4}, 0x68) 03:53:33 executing program 2: mremap(&(0x7f00001d4000/0x3000)=nil, 0x3000, 0x3000, 0x2, &(0x7f0000ffd000/0x3000)=nil) 03:53:33 executing program 3: r0 = socket$kcm(0x2, 0x2, 0x73) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$ARPT_SO_SET_ADD_COUNTERS(r1, 0x0, 0x61, &(0x7f00000000c0)={'filter\x00', 0x4}, 0x68) 03:53:33 executing program 5: getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffff9c, 0x84, 0x13, 0x0, 0x0) r0 = syz_open_dev$swradio(&(0x7f0000000000)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$radio(0x0, 0xffffffffffffffff, 0x2) r1 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) getdents64(r1, 0x0, 0x0) r2 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r2, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r2, 0x8) r3 = socket$inet6_sctp(0xa, 0x805, 0x84) r4 = accept4(r2, 0x0, 0x0, 0x0) prctl$PR_SET_ENDIAN(0x14, 0x1) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r3, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) epoll_pwait(0xffffffffffffffff, &(0x7f0000000040)=[{}], 0x1, 0x0, &(0x7f0000000080), 0x8) getpgid(0x0) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r4, 0x84, 0x9, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000780)={{{@in=@dev, @in6=@local}}, {{@in6=@mcast2}, 0x0, @in6=@dev}}, 0x0) ioctl$SIOCAX25ADDFWD(r0, 0x89ea, 0x0) syz_mount_image$gfs2(&(0x7f00000003c0)='gfs2\x00', 0x0, 0x87, 0x0, &(0x7f00000005c0), 0x1040040, 0x0) readv(r1, &(0x7f0000000500)=[{&(0x7f0000000400)=""/217, 0xd9}], 0x1) [ 1841.282555] protocol 88fb is buggy, dev hsr_slave_0 [ 1841.287683] protocol 88fb is buggy, dev hsr_slave_1 [ 1841.292841] protocol 88fb is buggy, dev hsr_slave_0 [ 1841.297902] protocol 88fb is buggy, dev hsr_slave_1 [ 1841.303101] protocol 88fb is buggy, dev hsr_slave_0 [ 1841.308159] protocol 88fb is buggy, dev hsr_slave_1 03:53:34 executing program 5: getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffff9c, 0x84, 0x13, 0x0, 0x0) r0 = syz_open_dev$swradio(&(0x7f0000000000)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$radio(0x0, 0xffffffffffffffff, 0x2) r1 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) getdents64(r1, 0x0, 0x0) r2 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r2, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r2, 0x8) r3 = socket$inet6_sctp(0xa, 0x805, 0x84) r4 = accept4(r2, 0x0, 0x0, 0x0) prctl$PR_SET_ENDIAN(0x14, 0x1) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r3, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) epoll_pwait(0xffffffffffffffff, &(0x7f0000000040)=[{}], 0x1, 0x0, &(0x7f0000000080), 0x8) getpgid(0x0) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r4, 0x84, 0x9, &(0x7f0000000280)={0x0, @in={{0x2, 0x0, @empty}}, 0x0, 0x0, 0x0, 0x0, 0x54}, 0x98) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000780)={{{@in=@dev, @in6=@local}}, {{@in6=@mcast2}, 0x0, @in6=@dev}}, 0x0) ioctl$SIOCAX25ADDFWD(r0, 0x89ea, 0x0) syz_mount_image$gfs2(&(0x7f00000003c0)='gfs2\x00', 0x0, 0x87, 0x0, &(0x7f00000005c0), 0x1040040, 0x0) readv(r1, &(0x7f0000000500)=[{&(0x7f0000000400)=""/217, 0xd9}], 0x1) 03:53:34 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000040)={0xe, 0xfffffffffffffd64, 0xfa00, @id_resuseaddr={0x0}}, 0x20) 03:53:34 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x20, &(0x7f0000000b80)=ANY=[@ANYBLOB="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"], 0x0, 0x1625, 0x0, 0x0, 0x41100, 0x1, [], 0x0, 0x4}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r0, 0xdb, &(0x7f0000000200)={0x0, 0x0}}, 0x393) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='cgroup.events\x00', 0x0, 0x0) write$cgroup_int(r2, &(0x7f00000007c0)=0x6, 0x12) r3 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000002c0), 0x4) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz1\x00', 0x1ff) r4 = perf_event_open$cgroup(&(0x7f0000000600)={0x0, 0x70, 0x9, 0x6, 0x8, 0x6, 0x0, 0xfffffffffffff49f, 0x2, 0x6, 0x0, 0x0, 0x20, 0x0, 0x1, 0x81, 0x1, 0x400, 0x4, 0xfac, 0x4, 0x1, 0x10000, 0xf1, 0xd3, 0x92b, 0x200, 0x1, 0x100000000, 0x2, 0x100000000, 0xfff, 0xfff, 0xffff, 0x3, 0xfffffffffffffffd, 0x0, 0x6, 0x0, 0x50, 0x0, @perf_config_ext={0x3f, 0x9}, 0x20000, 0x8, 0xef3, 0x7, 0x100000000, 0x8, 0xfff}, 0xffffffffffffffff, 0x2, r0, 0x8) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000b40)='cgroup.subtree_control\x00') ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x2400, 0x1) r5 = getpid() socketpair$unix(0x1, 0x7, 0x0, &(0x7f0000000540)={0xffffffffffffffff}) setsockopt$sock_attach_bpf(r6, 0x1, 0x32, &(0x7f00000005c0)=r3, 0x4) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={0x0, 0xffffffffffffffff, 0x0, 0x12, &(0x7f0000000480)='./cgroup.cpu/syz1\x00', r1}, 0x30) perf_event_open(&(0x7f0000000300)={0x5, 0x70, 0xff, 0x4, 0x1000, 0xe5af, 0x0, 0x8000, 0xd0440, 0x2, 0xffff, 0x1, 0x4, 0x1f, 0x3, 0xfffffffffffffffa, 0x5, 0x9, 0x8, 0x1, 0x3, 0x400, 0x6, 0x5, 0x401, 0x10000, 0xff, 0xb24, 0xffffffffffff8000, 0xc8a, 0x3f, 0xfffffffffffffffa, 0xffffffffffff8001, 0x200, 0x5, 0x3, 0x2, 0x93a, 0x0, 0x7fff, 0x2, @perf_bp={&(0x7f0000000100), 0x1}, 0x0, 0x0, 0xffffffffffffff4e, 0x6, 0x0, 0x4, 0xfffffffffffffffd}, r5, 0x0, r7, 0x8) r8 = openat$tun(0xffffffffffffff9c, &(0x7f0000000580)='/dev/net/tun\x00', 0x40000, 0x0) ioctl$TUNSETPERSIST(r8, 0x400454cb, 0x1) r9 = socket$kcm(0x29, 0x5, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000800)={0x0, r0, 0x1, 0x2}, 0x14) ioctl$sock_kcm_SIOCKCMUNATTACH(r9, 0x89e1, &(0x7f0000000900)={r2}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r3, 0x0, 0x8b, 0x0, &(0x7f0000000680)="3ce41f426b7dd449ae14b08e1868c456d4fe9c7993884cf18f4dd5a0bc57250243da4203e0640859184bc4c4690afefd7736e8842cd88030448e918bdb5bd9bbbd680a51261557c0477c18049c832005ebb5b185c6f233df73a21d3b3ddad8426fba2d5f8aac5df904d5e5f2e7dc4a517079e08d5b2175a276f2a5c49cc2957cb367f269898570852dd63a", 0x0, 0x5}, 0x28) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000500)='./cgroup/syz0\x00', 0x200002, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000740)={r3, 0x50, &(0x7f00000003c0)}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r2, 0x50, &(0x7f0000000840)}, 0x10) openat$cgroup_subtree(r2, &(0x7f0000000940)='cgroup.subtree_control\x00', 0x2, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x1ff, 0x0, 0x0, 0x0, 0x200000, 0xffffffffffffffff, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280), 0x2}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r10 = socket$kcm(0xa, 0x400000000002, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffc59) ioctl$sock_kcm_SIOCKCMCLONE(r10, 0x890b, &(0x7f0000000000)) ioctl$sock_kcm_SIOCKCMCLONE(r10, 0x890c, &(0x7f0000000000)) 03:53:34 executing program 0: r0 = syz_open_dev$video4linux(&(0x7f0000000000)='/dev/v4l-subdev#\x00', 0x3ff, 0x0) ioctl$VIDIOC_SUBDEV_G_FMT(r0, 0xc0585604, &(0x7f0000000280)={0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}}) 03:53:34 executing program 4: r0 = socket(0x10, 0x803, 0x0) sendto(r0, 0x0, 0x0, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0xa4}, {&(0x7f00000000c0)=""/85, 0xfb}, {&(0x7f0000000fc0)=""/4096, 0x1000}, {&(0x7f0000000400)=""/120, 0x78}, {&(0x7f0000000480)=""/60, 0xa9}, {&(0x7f0000000200)=""/77, 0x5c8}, {&(0x7f0000000540)=""/154, 0x9a}, {&(0x7f0000000340)=""/22, 0x16}], 0x8, &(0x7f0000002400)=""/191, 0xbf}}], 0x4000000000000f0, 0x0, &(0x7f0000003700)={0x77359400}) 03:53:34 executing program 3: r0 = socket$kcm(0x2, 0x2, 0x73) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$ARPT_SO_SET_ADD_COUNTERS(r1, 0x0, 0x61, &(0x7f00000000c0)={'filter\x00', 0x4}, 0x68) 03:53:34 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x20, &(0x7f0000000b80)=ANY=[@ANYBLOB="cab5674ca80400f902c8d3fc17d4a51472ff5e04a7ed68e9074e865fffffffffff6582e2a0c58f438f1a9b1af27305fb6c1d497851a00d51dddde821f356222d82de15a5bb3ca4d544c3683ff903b30637ee634a8a4fa0e19e57c7d35e4db3a02231b71023a910ac2424326e31258bde7ca760ff3ca3261a92112b3c8db9e0d79dc5ad29e05434154bba1e60d243d8fa466b27518c09e11b78ec43ab7af1d33fbd4885ee5e95b0849345d0edef0a2e68320a47938597cf0fba5ae2e93301ffc38baaf2673b7fd4628a0fe3665006d238567bdb430991e02866ad858345dc86331d91a53051b3284827fc0a870d857ecc180901feb2d1dd3be0c1ebc3fa1d00d550744d9e55"], 0x0, 0x1625, 0x0, 0x0, 0x41100, 0x1, [], 0x0, 0x4}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r0, 0xdb, &(0x7f0000000200)={0x0, 0x0}}, 0x393) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='cgroup.events\x00', 0x0, 0x0) write$cgroup_int(r2, &(0x7f00000007c0)=0x6, 0x12) r3 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000002c0), 0x4) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz1\x00', 0x1ff) r4 = perf_event_open$cgroup(&(0x7f0000000600)={0x0, 0x70, 0x9, 0x6, 0x8, 0x6, 0x0, 0xfffffffffffff49f, 0x2, 0x6, 0x0, 0x0, 0x20, 0x0, 0x1, 0x81, 0x1, 0x400, 0x4, 0xfac, 0x4, 0x1, 0x10000, 0xf1, 0xd3, 0x92b, 0x200, 0x1, 0x100000000, 0x2, 0x100000000, 0xfff, 0xfff, 0xffff, 0x3, 0xfffffffffffffffd, 0x0, 0x6, 0x0, 0x50, 0x0, @perf_config_ext={0x3f, 0x9}, 0x20000, 0x8, 0xef3, 0x7, 0x100000000, 0x8, 0xfff}, 0xffffffffffffffff, 0x2, r0, 0x8) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000b40)='cgroup.subtree_control\x00') ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x2400, 0x1) r5 = getpid() socketpair$unix(0x1, 0x7, 0x0, &(0x7f0000000540)={0xffffffffffffffff}) setsockopt$sock_attach_bpf(r6, 0x1, 0x32, &(0x7f00000005c0)=r3, 0x4) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={0x0, 0xffffffffffffffff, 0x0, 0x12, &(0x7f0000000480)='./cgroup.cpu/syz1\x00', r1}, 0x30) perf_event_open(&(0x7f0000000300)={0x5, 0x70, 0xff, 0x4, 0x1000, 0xe5af, 0x0, 0x8000, 0xd0440, 0x2, 0xffff, 0x1, 0x4, 0x1f, 0x3, 0xfffffffffffffffa, 0x5, 0x9, 0x8, 0x1, 0x3, 0x400, 0x6, 0x5, 0x401, 0x10000, 0xff, 0xb24, 0xffffffffffff8000, 0xc8a, 0x3f, 0xfffffffffffffffa, 0xffffffffffff8001, 0x200, 0x5, 0x3, 0x2, 0x93a, 0x0, 0x7fff, 0x2, @perf_bp={&(0x7f0000000100), 0x1}, 0x0, 0x0, 0xffffffffffffff4e, 0x6, 0x0, 0x4, 0xfffffffffffffffd}, r5, 0x0, r7, 0x8) r8 = openat$tun(0xffffffffffffff9c, &(0x7f0000000580)='/dev/net/tun\x00', 0x40000, 0x0) ioctl$TUNSETPERSIST(r8, 0x400454cb, 0x1) r9 = socket$kcm(0x29, 0x5, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000800)={0x0, r0, 0x1, 0x2}, 0x14) ioctl$sock_kcm_SIOCKCMUNATTACH(r9, 0x89e1, &(0x7f0000000900)={r2}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r3, 0x0, 0x8b, 0x0, &(0x7f0000000680)="3ce41f426b7dd449ae14b08e1868c456d4fe9c7993884cf18f4dd5a0bc57250243da4203e0640859184bc4c4690afefd7736e8842cd88030448e918bdb5bd9bbbd680a51261557c0477c18049c832005ebb5b185c6f233df73a21d3b3ddad8426fba2d5f8aac5df904d5e5f2e7dc4a517079e08d5b2175a276f2a5c49cc2957cb367f269898570852dd63a", 0x0, 0x5}, 0x28) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000500)='./cgroup/syz0\x00', 0x200002, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000740)={r3, 0x50, &(0x7f00000003c0)}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r2, 0x50, &(0x7f0000000840)}, 0x10) openat$cgroup_subtree(r2, &(0x7f0000000940)='cgroup.subtree_control\x00', 0x2, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x1ff, 0x0, 0x0, 0x0, 0x200000, 0xffffffffffffffff, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280), 0x2}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r10 = socket$kcm(0xa, 0x400000000002, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffc59) ioctl$sock_kcm_SIOCKCMCLONE(r10, 0x890b, &(0x7f0000000000)) ioctl$sock_kcm_SIOCKCMCLONE(r10, 0x890c, &(0x7f0000000000)) 03:53:34 executing program 4: r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f0000cfefee), 0x0, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0xa4}, {&(0x7f00000000c0)=""/85, 0xfb}, {&(0x7f0000000fc0)=""/4096, 0x1000}, {&(0x7f0000000400)=""/120, 0x78}, {&(0x7f0000000480)=""/60, 0xa9}, {&(0x7f0000000200)=""/77, 0x5c8}, {&(0x7f0000000540)=""/154, 0x9a}, {&(0x7f0000000340)=""/22, 0x16}], 0x8, &(0x7f0000002400)=""/191, 0xbf}}], 0x4000000000000f0, 0x0, &(0x7f0000003700)={0x77359400}) 03:53:34 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(r0, 0x0, 0x48c, &(0x7f0000000040)={0x1, 'nr0\x00'}, 0x18) 03:53:34 executing program 0: r0 = syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x2) write$binfmt_script(r0, &(0x7f0000000180)={'#! ', './file0', [], 0xa, "3762ce382ae695832b3b7af78fbd90b1649c1b3a4dc27b6057a85976fda93e88dc1d7fdd7d"}, 0x30) ioctl$SG_SET_FORCE_PACK_ID(r0, 0x227b, &(0x7f0000000280)=0x1) readv(r0, &(0x7f0000000140)=[{&(0x7f0000000080)=""/33, 0x57}], 0x1) 03:53:34 executing program 3: socket$kcm(0x2, 0x2, 0x73) setsockopt$ARPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x61, &(0x7f00000000c0)={'filter\x00', 0x4}, 0x68) [ 1842.000668] IPVS: stopping master sync thread 23326 ... 03:53:34 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x20, &(0x7f0000000b80)=ANY=[@ANYBLOB="cab5674ca80400f902c8d3fc17d4a51472ff5e04a7ed68e9074e865fffffffffff6582e2a0c58f438f1a9b1af27305fb6c1d497851a00d51dddde821f356222d82de15a5bb3ca4d544c3683ff903b30637ee634a8a4fa0e19e57c7d35e4db3a02231b71023a910ac2424326e31258bde7ca760ff3ca3261a92112b3c8db9e0d79dc5ad29e05434154bba1e60d243d8fa466b27518c09e11b78ec43ab7af1d33fbd4885ee5e95b0849345d0edef0a2e68320a47938597cf0fba5ae2e93301ffc38baaf2673b7fd4628a0fe3665006d238567bdb430991e02866ad858345dc86331d91a53051b3284827fc0a870d857ecc180901feb2d1dd3be0c1ebc3fa1d00d550744d9e55"], 0x0, 0x1625, 0x0, 0x0, 0x41100, 0x1, [], 0x0, 0x4}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r0, 0xdb, &(0x7f0000000200)={0x0, 0x0}}, 0x393) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='cgroup.events\x00', 0x0, 0x0) write$cgroup_int(r2, &(0x7f00000007c0)=0x6, 0x12) r3 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000002c0), 0x4) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz1\x00', 0x1ff) r4 = perf_event_open$cgroup(&(0x7f0000000600)={0x0, 0x70, 0x9, 0x6, 0x8, 0x6, 0x0, 0xfffffffffffff49f, 0x2, 0x6, 0x0, 0x0, 0x20, 0x0, 0x1, 0x81, 0x1, 0x400, 0x4, 0xfac, 0x4, 0x1, 0x10000, 0xf1, 0xd3, 0x92b, 0x200, 0x1, 0x100000000, 0x2, 0x100000000, 0xfff, 0xfff, 0xffff, 0x3, 0xfffffffffffffffd, 0x0, 0x6, 0x0, 0x50, 0x0, @perf_config_ext={0x3f, 0x9}, 0x20000, 0x8, 0xef3, 0x7, 0x100000000, 0x8, 0xfff}, 0xffffffffffffffff, 0x2, r0, 0x8) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000b40)='cgroup.subtree_control\x00') ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x2400, 0x1) r5 = getpid() socketpair$unix(0x1, 0x7, 0x0, &(0x7f0000000540)={0xffffffffffffffff}) setsockopt$sock_attach_bpf(r6, 0x1, 0x32, &(0x7f00000005c0)=r3, 0x4) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={0x0, 0xffffffffffffffff, 0x0, 0x12, &(0x7f0000000480)='./cgroup.cpu/syz1\x00', r1}, 0x30) perf_event_open(&(0x7f0000000300)={0x5, 0x70, 0xff, 0x4, 0x1000, 0xe5af, 0x0, 0x8000, 0xd0440, 0x2, 0xffff, 0x1, 0x4, 0x1f, 0x3, 0xfffffffffffffffa, 0x5, 0x9, 0x8, 0x1, 0x3, 0x400, 0x6, 0x5, 0x401, 0x10000, 0xff, 0xb24, 0xffffffffffff8000, 0xc8a, 0x3f, 0xfffffffffffffffa, 0xffffffffffff8001, 0x200, 0x5, 0x3, 0x2, 0x93a, 0x0, 0x7fff, 0x2, @perf_bp={&(0x7f0000000100), 0x1}, 0x0, 0x0, 0xffffffffffffff4e, 0x6, 0x0, 0x4, 0xfffffffffffffffd}, r5, 0x0, r7, 0x8) r8 = openat$tun(0xffffffffffffff9c, &(0x7f0000000580)='/dev/net/tun\x00', 0x40000, 0x0) ioctl$TUNSETPERSIST(r8, 0x400454cb, 0x1) r9 = socket$kcm(0x29, 0x5, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000800)={0x0, r0, 0x1, 0x2}, 0x14) ioctl$sock_kcm_SIOCKCMUNATTACH(r9, 0x89e1, &(0x7f0000000900)={r2}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r3, 0x0, 0x8b, 0x0, &(0x7f0000000680)="3ce41f426b7dd449ae14b08e1868c456d4fe9c7993884cf18f4dd5a0bc57250243da4203e0640859184bc4c4690afefd7736e8842cd88030448e918bdb5bd9bbbd680a51261557c0477c18049c832005ebb5b185c6f233df73a21d3b3ddad8426fba2d5f8aac5df904d5e5f2e7dc4a517079e08d5b2175a276f2a5c49cc2957cb367f269898570852dd63a", 0x0, 0x5}, 0x28) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000500)='./cgroup/syz0\x00', 0x200002, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000740)={r3, 0x50, &(0x7f00000003c0)}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r2, 0x50, &(0x7f0000000840)}, 0x10) openat$cgroup_subtree(r2, &(0x7f0000000940)='cgroup.subtree_control\x00', 0x2, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x1ff, 0x0, 0x0, 0x0, 0x200000, 0xffffffffffffffff, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280), 0x2}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r10 = socket$kcm(0xa, 0x400000000002, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffc59) ioctl$sock_kcm_SIOCKCMCLONE(r10, 0x890b, &(0x7f0000000000)) ioctl$sock_kcm_SIOCKCMCLONE(r10, 0x890c, &(0x7f0000000000)) 03:53:34 executing program 5: getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffff9c, 0x84, 0x13, 0x0, 0x0) r0 = syz_open_dev$swradio(&(0x7f0000000000)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$radio(0x0, 0xffffffffffffffff, 0x2) r1 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) getdents64(r1, 0x0, 0x0) r2 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r2, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r2, 0x8) r3 = socket$inet6_sctp(0xa, 0x805, 0x84) r4 = accept4(r2, 0x0, 0x0, 0x0) prctl$PR_SET_ENDIAN(0x14, 0x1) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r3, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) epoll_pwait(0xffffffffffffffff, &(0x7f0000000040)=[{}], 0x1, 0x0, &(0x7f0000000080), 0x8) getpgid(0x0) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r4, 0x84, 0x9, &(0x7f0000000280)={0x0, @in={{0x2, 0x0, @empty}}, 0x0, 0x0, 0x0, 0x0, 0x54}, 0x98) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000780)={{{@in=@dev, @in6=@local}}, {{@in6=@mcast2}, 0x0, @in6=@dev}}, 0x0) ioctl$SIOCAX25ADDFWD(r0, 0x89ea, 0x0) syz_mount_image$gfs2(&(0x7f00000003c0)='gfs2\x00', 0x0, 0x87, 0x0, &(0x7f00000005c0), 0x1040040, 0x0) readv(r1, &(0x7f0000000500)=[{&(0x7f0000000400)=""/217, 0xd9}], 0x1) 03:53:34 executing program 0: openat$mixer(0xffffffffffffff9c, &(0x7f0000000100)='/dev/mixer\x00', 0x0, 0x0) 03:53:34 executing program 2: perf_event_open$cgroup(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffff9c, 0x0) 03:53:34 executing program 4: r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f0000cfefee)="120000001200e7ef00", 0x9, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0xa4}, {&(0x7f00000000c0)=""/85, 0xfb}, {&(0x7f0000000fc0)=""/4096, 0x1000}, {&(0x7f0000000400)=""/120, 0x78}, {&(0x7f0000000480)=""/60, 0xa9}, {&(0x7f0000000200)=""/77, 0x5c8}, {&(0x7f0000000540)=""/154, 0x9a}, {&(0x7f0000000340)=""/22, 0x16}], 0x8, &(0x7f0000002400)=""/191, 0xbf}}], 0x4000000000000f0, 0x0, &(0x7f0000003700)={0x77359400}) 03:53:34 executing program 3: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) setsockopt$ARPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x61, &(0x7f00000000c0)={'filter\x00', 0x4}, 0x68) 03:53:34 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x20, &(0x7f0000000b80)=ANY=[@ANYBLOB="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"], 0x0, 0x1625, 0x0, 0x0, 0x41100, 0x1, [], 0x0, 0x4}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r0, 0xdb, &(0x7f0000000200)={0x0, 0x0}}, 0x393) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='cgroup.events\x00', 0x0, 0x0) write$cgroup_int(r2, &(0x7f00000007c0)=0x6, 0x12) r3 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000002c0), 0x4) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz1\x00', 0x1ff) r4 = perf_event_open$cgroup(&(0x7f0000000600)={0x0, 0x70, 0x9, 0x6, 0x8, 0x6, 0x0, 0xfffffffffffff49f, 0x2, 0x6, 0x3ff, 0x0, 0x0, 0x0, 0x1, 0x81, 0x1, 0x400, 0x4, 0xfac, 0x4, 0x1, 0x10000, 0xf1, 0xd3, 0x92b, 0x200, 0x1, 0x100000000, 0x2, 0x100000000, 0xfff, 0xfff, 0xffff, 0x3, 0xfffffffffffffffd, 0x0, 0x6, 0x0, 0x50, 0x0, @perf_config_ext={0x3f, 0x9}, 0x20000, 0x8, 0xef3, 0x7, 0x100000000, 0x8, 0xfff}, 0xffffffffffffffff, 0x2, r0, 0x8) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000b40)='cgroup.subtree_control\x00') ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x2400, 0x1) r5 = getpid() socketpair$unix(0x1, 0x7, 0x0, &(0x7f0000000540)={0xffffffffffffffff}) setsockopt$sock_attach_bpf(r6, 0x1, 0x32, &(0x7f00000005c0)=r3, 0x4) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={0x0, 0xffffffffffffffff, 0x0, 0x12, &(0x7f0000000480)='./cgroup.cpu/syz1\x00', r1}, 0x30) perf_event_open(&(0x7f0000000300)={0x5, 0x70, 0xff, 0x4, 0x1000, 0xe5af, 0x0, 0x8000, 0xd0440, 0x2, 0xffff, 0x1, 0x4, 0x1f, 0x3, 0xfffffffffffffffa, 0x5, 0x9, 0x8, 0x1, 0x3, 0x400, 0x6, 0x5, 0x401, 0x10000, 0xff, 0xb24, 0xffffffffffff8000, 0xc8a, 0x3f, 0xfffffffffffffffa, 0xffffffffffff8001, 0x200, 0x5, 0x3, 0x2, 0x93a, 0x0, 0x7fff, 0x2, @perf_bp={&(0x7f0000000100), 0x1}, 0x0, 0x0, 0xffffffffffffff4e, 0x6, 0x0, 0x4, 0xfffffffffffffffd}, r5, 0x0, r7, 0x8) r8 = openat$tun(0xffffffffffffff9c, &(0x7f0000000580)='/dev/net/tun\x00', 0x40000, 0x0) ioctl$TUNSETPERSIST(r8, 0x400454cb, 0x1) r9 = socket$kcm(0x29, 0x5, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000800)={0x0, r0, 0x1, 0x2}, 0x14) ioctl$sock_kcm_SIOCKCMUNATTACH(r9, 0x89e1, &(0x7f0000000900)={r2}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r3, 0x0, 0x8b, 0x0, &(0x7f0000000680)="3ce41f426b7dd449ae14b08e1868c456d4fe9c7993884cf18f4dd5a0bc57250243da4203e0640859184bc4c4690afefd7736e8842cd88030448e918bdb5bd9bbbd680a51261557c0477c18049c832005ebb5b185c6f233df73a21d3b3ddad8426fba2d5f8aac5df904d5e5f2e7dc4a517079e08d5b2175a276f2a5c49cc2957cb367f269898570852dd63a", 0x0, 0x5}, 0x28) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000500)='./cgroup/syz0\x00', 0x200002, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000740)={r3, 0x50, &(0x7f00000003c0)}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r2, 0x50, &(0x7f0000000840)}, 0x10) openat$cgroup_subtree(r2, &(0x7f0000000940)='cgroup.subtree_control\x00', 0x2, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x1ff, 0x0, 0x0, 0x0, 0x200000, 0xffffffffffffffff, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280), 0x2}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r10 = socket$kcm(0xa, 0x400000000002, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffc59) ioctl$sock_kcm_SIOCKCMCLONE(r10, 0x890b, &(0x7f0000000000)) ioctl$sock_kcm_SIOCKCMCLONE(r10, 0x890c, &(0x7f0000000000)) 03:53:35 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000000), 0xffffff6a) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgpoup.events\x00>\xa5^\x10\xa8)\x9ds\xeemr\xda\x86\xf4\xdb\xed/\x19\xb5*H\xa9\x0ea\x87)\x89L\x91\x8aI\x85\xeb\x8fo,1h\x1f\x98\x87 \xc1u<\x87\xf1=\x03a\xb8%\xfe/J\xc4\xad\x9e\xdb\xd5^\xeb\xfe\f\xee$\x0f\xf8\x94\xa1J\xe0\xeb\xe6\xc8A\xb4\x9b\xed\xc1D\x02\xa1R\x88\x15\xb5\xafr5\xf0\xef\xce\xe6\xb1\xcb\xa8r\x81a\xd6\x1a\x1a\xb8\xa9\x17\xc2\xb5', 0x275a, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r2, 0xc028660f, &(0x7f0000001300)={0x2880008, r1}) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) 03:53:35 executing program 4: r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000", 0xe, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0xa4}, {&(0x7f00000000c0)=""/85, 0xfb}, {&(0x7f0000000fc0)=""/4096, 0x1000}, {&(0x7f0000000400)=""/120, 0x78}, {&(0x7f0000000480)=""/60, 0xa9}, {&(0x7f0000000200)=""/77, 0x5c8}, {&(0x7f0000000540)=""/154, 0x9a}, {&(0x7f0000000340)=""/22, 0x16}], 0x8, &(0x7f0000002400)=""/191, 0xbf}}], 0x4000000000000f0, 0x0, &(0x7f0000003700)={0x77359400}) 03:53:35 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x20, &(0x7f0000000b80)=ANY=[@ANYBLOB="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"], 0x0, 0x1625, 0x0, 0x0, 0x41100, 0x1, [], 0x0, 0x4}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r0, 0xdb, &(0x7f0000000200)={0x0, 0x0}}, 0x393) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='cgroup.events\x00', 0x0, 0x0) write$cgroup_int(r2, &(0x7f00000007c0)=0x6, 0x12) r3 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000002c0), 0x4) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz1\x00', 0x1ff) r4 = perf_event_open$cgroup(&(0x7f0000000600)={0x0, 0x70, 0x9, 0x6, 0x8, 0x6, 0x0, 0xfffffffffffff49f, 0x2, 0x6, 0x3ff, 0x0, 0x0, 0x0, 0x1, 0x81, 0x1, 0x400, 0x4, 0xfac, 0x4, 0x1, 0x10000, 0xf1, 0xd3, 0x92b, 0x200, 0x1, 0x100000000, 0x2, 0x100000000, 0xfff, 0xfff, 0xffff, 0x3, 0xfffffffffffffffd, 0x0, 0x6, 0x0, 0x50, 0x0, @perf_config_ext={0x3f, 0x9}, 0x20000, 0x8, 0xef3, 0x7, 0x100000000, 0x8, 0xfff}, 0xffffffffffffffff, 0x2, r0, 0x8) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000b40)='cgroup.subtree_control\x00') ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x2400, 0x1) r5 = getpid() socketpair$unix(0x1, 0x7, 0x0, &(0x7f0000000540)={0xffffffffffffffff}) setsockopt$sock_attach_bpf(r6, 0x1, 0x32, &(0x7f00000005c0)=r3, 0x4) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={0x0, 0xffffffffffffffff, 0x0, 0x12, &(0x7f0000000480)='./cgroup.cpu/syz1\x00', r1}, 0x30) perf_event_open(&(0x7f0000000300)={0x5, 0x70, 0xff, 0x4, 0x1000, 0xe5af, 0x0, 0x8000, 0xd0440, 0x2, 0xffff, 0x1, 0x4, 0x1f, 0x3, 0xfffffffffffffffa, 0x5, 0x9, 0x8, 0x1, 0x3, 0x400, 0x6, 0x5, 0x401, 0x10000, 0xff, 0xb24, 0xffffffffffff8000, 0xc8a, 0x3f, 0xfffffffffffffffa, 0xffffffffffff8001, 0x200, 0x5, 0x3, 0x2, 0x93a, 0x0, 0x7fff, 0x2, @perf_bp={&(0x7f0000000100), 0x1}, 0x0, 0x0, 0xffffffffffffff4e, 0x6, 0x0, 0x4, 0xfffffffffffffffd}, r5, 0x0, r7, 0x8) r8 = openat$tun(0xffffffffffffff9c, &(0x7f0000000580)='/dev/net/tun\x00', 0x40000, 0x0) ioctl$TUNSETPERSIST(r8, 0x400454cb, 0x1) r9 = socket$kcm(0x29, 0x5, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000800)={0x0, r0, 0x1, 0x2}, 0x14) ioctl$sock_kcm_SIOCKCMUNATTACH(r9, 0x89e1, &(0x7f0000000900)={r2}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r3, 0x0, 0x8b, 0x0, &(0x7f0000000680)="3ce41f426b7dd449ae14b08e1868c456d4fe9c7993884cf18f4dd5a0bc57250243da4203e0640859184bc4c4690afefd7736e8842cd88030448e918bdb5bd9bbbd680a51261557c0477c18049c832005ebb5b185c6f233df73a21d3b3ddad8426fba2d5f8aac5df904d5e5f2e7dc4a517079e08d5b2175a276f2a5c49cc2957cb367f269898570852dd63a", 0x0, 0x5}, 0x28) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000500)='./cgroup/syz0\x00', 0x200002, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000740)={r3, 0x50, &(0x7f00000003c0)}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r2, 0x50, &(0x7f0000000840)}, 0x10) openat$cgroup_subtree(r2, &(0x7f0000000940)='cgroup.subtree_control\x00', 0x2, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x1ff, 0x0, 0x0, 0x0, 0x200000, 0xffffffffffffffff, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280), 0x2}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r10 = socket$kcm(0xa, 0x400000000002, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffc59) ioctl$sock_kcm_SIOCKCMCLONE(r10, 0x890b, &(0x7f0000000000)) ioctl$sock_kcm_SIOCKCMCLONE(r10, 0x890c, &(0x7f0000000000)) 03:53:35 executing program 0: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, 0x0) umount2(&(0x7f0000000000)='./file0\x00', 0x4) 03:53:35 executing program 3: r0 = socket$kcm(0x2, 0x0, 0x73) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$ARPT_SO_SET_ADD_COUNTERS(r1, 0x0, 0x61, &(0x7f00000000c0)={'filter\x00', 0x4}, 0x68) 03:53:35 executing program 4: r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b000000000000", 0x10, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0xa4}, {&(0x7f00000000c0)=""/85, 0xfb}, {&(0x7f0000000fc0)=""/4096, 0x1000}, {&(0x7f0000000400)=""/120, 0x78}, {&(0x7f0000000480)=""/60, 0xa9}, {&(0x7f0000000200)=""/77, 0x5c8}, {&(0x7f0000000540)=""/154, 0x9a}, {&(0x7f0000000340)=""/22, 0x16}], 0x8, &(0x7f0000002400)=""/191, 0xbf}}], 0x4000000000000f0, 0x0, &(0x7f0000003700)={0x77359400}) 03:53:35 executing program 5: getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffff9c, 0x84, 0x13, 0x0, 0x0) r0 = syz_open_dev$swradio(&(0x7f0000000000)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$radio(0x0, 0xffffffffffffffff, 0x2) r1 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) getdents64(r1, 0x0, 0x0) r2 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r2, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r2, 0x8) r3 = socket$inet6_sctp(0xa, 0x805, 0x84) r4 = accept4(r2, 0x0, 0x0, 0x0) prctl$PR_SET_ENDIAN(0x14, 0x1) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r3, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) epoll_pwait(0xffffffffffffffff, &(0x7f0000000040)=[{}], 0x1, 0x0, &(0x7f0000000080), 0x8) getpgid(0x0) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r4, 0x84, 0x9, &(0x7f0000000280)={0x0, @in={{0x2, 0x0, @empty}}, 0x0, 0x0, 0x0, 0x0, 0x54}, 0x98) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000780)={{{@in=@dev, @in6=@local}}, {{@in6=@mcast2}, 0x0, @in6=@dev}}, 0x0) ioctl$SIOCAX25ADDFWD(r0, 0x89ea, 0x0) syz_mount_image$gfs2(&(0x7f00000003c0)='gfs2\x00', 0x0, 0x87, 0x0, &(0x7f00000005c0), 0x1040040, 0x0) readv(r1, &(0x7f0000000500)=[{&(0x7f0000000400)=""/217, 0xd9}], 0x1) 03:53:35 executing program 2: socket$inet6(0xa, 0x0, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() request_key(&(0x7f0000000240)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000280)='\x00E\x00\x00\x00\x00^\x16O\x93\x93\xc1B*\xd5\xa7hX\xc6>\xd18Xr\xa6\x12\x802\x05\x96\xc9\xda\x89\xe9\x83\xbb\x9cD\x801\xe5&\xf6\xa4\x87d\xbf\xacp\xe6g\xf2\x82\xcb\x14\xc2\xccL\x01\xa8\x9f\x90\xb2rV\xd2\xbd\xd2\xab\xd4\xb9\xb2\xe4\xe6\x10X\xdd:&\x91\xde4\xa0\xd6\x80\x05\xb4\xcd\x982\xdc\x8d&\x83+\x93\\\xf6zWg\xd6D\x1e\x8d\x15\xf7\xabh\xbaL.:ES\xa3\xc6*\xd1\xdd\t\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0xfffffffffffffffd) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x11) wait4(0x0, 0x0, 0x0, 0x0) 03:53:35 executing program 0: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c) getsockopt$IP_VS_SO_GET_DAEMON(r0, 0x0, 0xe, 0x0, &(0x7f00000002c0)) 03:53:35 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x20, &(0x7f0000000b80)=ANY=[@ANYBLOB="cab5674ca80400f902c8d3fc17d4a51472ff5e04a7ed68e9074e865fffffffffff6582e2a0c58f438f1a9b1af27305fb6c1d497851a00d51dddde821f356222d82de15a5bb3ca4d544c3683ff903b30637ee634a8a4fa0e19e57c7d35e4db3a02231b71023a910ac2424326e31258bde7ca760ff3ca3261a92112b3c8db9e0d79dc5ad29e05434154bba1e60d243d8fa466b27518c09e11b78ec43ab7af1d33fbd4885ee5e95b0849345d0edef0a2e68320a47938597cf0fba5ae2e93301ffc38baaf2673b7fd4628a0fe3665006d238567bdb430991e02866ad858345dc86331d91a53051b3284827fc0a870d857ecc180901feb2d1dd3be0c1ebc3fa1d00d550744d9e55"], 0x0, 0x1625, 0x0, 0x0, 0x41100, 0x1, [], 0x0, 0x4}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r0, 0xdb, &(0x7f0000000200)={0x0, 0x0}}, 0x393) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='cgroup.events\x00', 0x0, 0x0) write$cgroup_int(r2, &(0x7f00000007c0)=0x6, 0x12) r3 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000002c0), 0x4) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz1\x00', 0x1ff) r4 = perf_event_open$cgroup(&(0x7f0000000600)={0x0, 0x70, 0x9, 0x6, 0x8, 0x6, 0x0, 0xfffffffffffff49f, 0x2, 0x6, 0x3ff, 0x0, 0x0, 0x0, 0x1, 0x81, 0x1, 0x400, 0x4, 0xfac, 0x4, 0x1, 0x10000, 0xf1, 0xd3, 0x92b, 0x200, 0x1, 0x100000000, 0x2, 0x100000000, 0xfff, 0xfff, 0xffff, 0x3, 0xfffffffffffffffd, 0x0, 0x6, 0x0, 0x50, 0x0, @perf_config_ext={0x3f, 0x9}, 0x20000, 0x8, 0xef3, 0x7, 0x100000000, 0x8, 0xfff}, 0xffffffffffffffff, 0x2, r0, 0x8) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000b40)='cgroup.subtree_control\x00') ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x2400, 0x1) r5 = getpid() socketpair$unix(0x1, 0x7, 0x0, &(0x7f0000000540)={0xffffffffffffffff}) setsockopt$sock_attach_bpf(r6, 0x1, 0x32, &(0x7f00000005c0)=r3, 0x4) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={0x0, 0xffffffffffffffff, 0x0, 0x12, &(0x7f0000000480)='./cgroup.cpu/syz1\x00', r1}, 0x30) perf_event_open(&(0x7f0000000300)={0x5, 0x70, 0xff, 0x4, 0x1000, 0xe5af, 0x0, 0x8000, 0xd0440, 0x2, 0xffff, 0x1, 0x4, 0x1f, 0x3, 0xfffffffffffffffa, 0x5, 0x9, 0x8, 0x1, 0x3, 0x400, 0x6, 0x5, 0x401, 0x10000, 0xff, 0xb24, 0xffffffffffff8000, 0xc8a, 0x3f, 0xfffffffffffffffa, 0xffffffffffff8001, 0x200, 0x5, 0x3, 0x2, 0x93a, 0x0, 0x7fff, 0x2, @perf_bp={&(0x7f0000000100), 0x1}, 0x0, 0x0, 0xffffffffffffff4e, 0x6, 0x0, 0x4, 0xfffffffffffffffd}, r5, 0x0, r7, 0x8) r8 = openat$tun(0xffffffffffffff9c, &(0x7f0000000580)='/dev/net/tun\x00', 0x40000, 0x0) ioctl$TUNSETPERSIST(r8, 0x400454cb, 0x1) r9 = socket$kcm(0x29, 0x5, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000800)={0x0, r0, 0x1, 0x2}, 0x14) ioctl$sock_kcm_SIOCKCMUNATTACH(r9, 0x89e1, &(0x7f0000000900)={r2}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r3, 0x0, 0x8b, 0x0, &(0x7f0000000680)="3ce41f426b7dd449ae14b08e1868c456d4fe9c7993884cf18f4dd5a0bc57250243da4203e0640859184bc4c4690afefd7736e8842cd88030448e918bdb5bd9bbbd680a51261557c0477c18049c832005ebb5b185c6f233df73a21d3b3ddad8426fba2d5f8aac5df904d5e5f2e7dc4a517079e08d5b2175a276f2a5c49cc2957cb367f269898570852dd63a", 0x0, 0x5}, 0x28) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000500)='./cgroup/syz0\x00', 0x200002, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000740)={r3, 0x50, &(0x7f00000003c0)}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r2, 0x50, &(0x7f0000000840)}, 0x10) openat$cgroup_subtree(r2, &(0x7f0000000940)='cgroup.subtree_control\x00', 0x2, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x1ff, 0x0, 0x0, 0x0, 0x200000, 0xffffffffffffffff, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280), 0x2}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r10 = socket$kcm(0xa, 0x400000000002, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffc59) ioctl$sock_kcm_SIOCKCMCLONE(r10, 0x890b, &(0x7f0000000000)) ioctl$sock_kcm_SIOCKCMCLONE(r10, 0x890c, &(0x7f0000000000)) 03:53:35 executing program 4: r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000", 0x11, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0xa4}, {&(0x7f00000000c0)=""/85, 0xfb}, {&(0x7f0000000fc0)=""/4096, 0x1000}, {&(0x7f0000000400)=""/120, 0x78}, {&(0x7f0000000480)=""/60, 0xa9}, {&(0x7f0000000200)=""/77, 0x5c8}, {&(0x7f0000000540)=""/154, 0x9a}, {&(0x7f0000000340)=""/22, 0x16}], 0x8, &(0x7f0000002400)=""/191, 0xbf}}], 0x4000000000000f0, 0x0, &(0x7f0000003700)={0x77359400}) 03:53:35 executing program 3: r0 = socket$kcm(0x2, 0x2, 0x73) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, r0) setsockopt$ARPT_SO_SET_ADD_COUNTERS(r1, 0x0, 0x61, &(0x7f00000000c0)={'filter\x00', 0x4}, 0x68) 03:53:35 executing program 3: r0 = socket$kcm(0x2, 0x2, 0x73) r1 = fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) setsockopt$ARPT_SO_SET_ADD_COUNTERS(r1, 0x0, 0x61, &(0x7f00000000c0)={'filter\x00', 0x4}, 0x68) 03:53:35 executing program 4: r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0xa4}, {&(0x7f00000000c0)=""/85, 0xfb}, {&(0x7f0000000fc0)=""/4096, 0x1000}, {&(0x7f0000000400)=""/120, 0x78}, {&(0x7f0000000480)=""/60, 0xa9}, {&(0x7f0000000200)=""/77, 0x5c8}, {&(0x7f0000000540)=""/154, 0x9a}, {&(0x7f0000000340)=""/22, 0x16}], 0x8, &(0x7f0000002400)=""/191, 0xbf}}], 0x4000000000000f0, 0x0, &(0x7f0000003700)={0x77359400}) 03:53:35 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r0, r1) sendmsg$TIPC_CMD_SET_NODE_ADDR(r2, &(0x7f0000000180)={&(0x7f0000000000), 0xc, 0x0, 0x1, 0x0, 0x0, 0x20000801}, 0x4008000) 03:53:35 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x20, &(0x7f0000000b80)=ANY=[@ANYBLOB="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"], 0x0, 0x1625, 0x0, 0x0, 0x41100, 0x1, [], 0x0, 0x4}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r0, 0xdb, &(0x7f0000000200)={0x0, 0x0}}, 0x393) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='cgroup.events\x00', 0x0, 0x0) write$cgroup_int(r2, &(0x7f00000007c0)=0x6, 0x12) r3 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000002c0), 0x4) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz1\x00', 0x1ff) r4 = perf_event_open$cgroup(&(0x7f0000000600)={0x0, 0x70, 0x9, 0x6, 0x8, 0x6, 0x0, 0xfffffffffffff49f, 0x2, 0x6, 0x3ff, 0x0, 0x20, 0x0, 0x0, 0x81, 0x1, 0x400, 0x4, 0xfac, 0x4, 0x1, 0x10000, 0xf1, 0xd3, 0x92b, 0x200, 0x1, 0x100000000, 0x2, 0x100000000, 0xfff, 0xfff, 0xffff, 0x3, 0xfffffffffffffffd, 0x0, 0x6, 0x0, 0x50, 0x0, @perf_config_ext={0x3f, 0x9}, 0x20000, 0x8, 0xef3, 0x7, 0x100000000, 0x8, 0xfff}, 0xffffffffffffffff, 0x2, r0, 0x8) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000b40)='cgroup.subtree_control\x00') ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x2400, 0x1) r5 = getpid() socketpair$unix(0x1, 0x7, 0x0, &(0x7f0000000540)={0xffffffffffffffff}) setsockopt$sock_attach_bpf(r6, 0x1, 0x32, &(0x7f00000005c0)=r3, 0x4) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={0x0, 0xffffffffffffffff, 0x0, 0x12, &(0x7f0000000480)='./cgroup.cpu/syz1\x00', r1}, 0x30) perf_event_open(&(0x7f0000000300)={0x5, 0x70, 0xff, 0x4, 0x1000, 0xe5af, 0x0, 0x8000, 0xd0440, 0x2, 0xffff, 0x1, 0x4, 0x1f, 0x3, 0xfffffffffffffffa, 0x5, 0x9, 0x8, 0x1, 0x3, 0x400, 0x6, 0x5, 0x401, 0x10000, 0xff, 0xb24, 0xffffffffffff8000, 0xc8a, 0x3f, 0xfffffffffffffffa, 0xffffffffffff8001, 0x200, 0x5, 0x3, 0x2, 0x93a, 0x0, 0x7fff, 0x2, @perf_bp={&(0x7f0000000100), 0x1}, 0x0, 0x0, 0xffffffffffffff4e, 0x6, 0x0, 0x4, 0xfffffffffffffffd}, r5, 0x0, r7, 0x8) r8 = openat$tun(0xffffffffffffff9c, &(0x7f0000000580)='/dev/net/tun\x00', 0x40000, 0x0) ioctl$TUNSETPERSIST(r8, 0x400454cb, 0x1) r9 = socket$kcm(0x29, 0x5, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000800)={0x0, r0, 0x1, 0x2}, 0x14) ioctl$sock_kcm_SIOCKCMUNATTACH(r9, 0x89e1, &(0x7f0000000900)={r2}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r3, 0x0, 0x8b, 0x0, &(0x7f0000000680)="3ce41f426b7dd449ae14b08e1868c456d4fe9c7993884cf18f4dd5a0bc57250243da4203e0640859184bc4c4690afefd7736e8842cd88030448e918bdb5bd9bbbd680a51261557c0477c18049c832005ebb5b185c6f233df73a21d3b3ddad8426fba2d5f8aac5df904d5e5f2e7dc4a517079e08d5b2175a276f2a5c49cc2957cb367f269898570852dd63a", 0x0, 0x5}, 0x28) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000500)='./cgroup/syz0\x00', 0x200002, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000740)={r3, 0x50, &(0x7f00000003c0)}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r2, 0x50, &(0x7f0000000840)}, 0x10) openat$cgroup_subtree(r2, &(0x7f0000000940)='cgroup.subtree_control\x00', 0x2, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x1ff, 0x0, 0x0, 0x0, 0x200000, 0xffffffffffffffff, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280), 0x2}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r10 = socket$kcm(0xa, 0x400000000002, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffc59) ioctl$sock_kcm_SIOCKCMCLONE(r10, 0x890b, &(0x7f0000000000)) ioctl$sock_kcm_SIOCKCMCLONE(r10, 0x890c, &(0x7f0000000000)) 03:53:36 executing program 2: clone(0x200, 0x0, 0x0, 0x0, 0x0) mknod(&(0x7f00000001c0)='./file1\x00', 0xc042, 0x0) mknod(&(0x7f0000f80000)='./file0\x00', 0x1042, 0x0) execve(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) read(r0, &(0x7f0000000300)=""/11, 0xb) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000200)) r1 = creat(&(0x7f0000000080)='\xe9\x1fq\x89Y\x1e\x923aK\x00', 0x109) dup2(r0, r1) execve(&(0x7f00000000c0)='\xe9\x1fq\x89Y\x1e\x923aK\x00', 0x0, 0x0) open$dir(&(0x7f00000001c0)='./file0\x00', 0x83e, 0x0) clone(0x3102001ff6, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000040)='./file1\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(r1, 0x800454cf, 0x0) 03:53:36 executing program 3: r0 = socket$kcm(0x2, 0x2, 0x73) fcntl$dupfd(r0, 0x0, r0) setsockopt$ARPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x61, &(0x7f00000000c0)={'filter\x00', 0x4}, 0x68) 03:53:36 executing program 5: getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffff9c, 0x84, 0x13, 0x0, 0x0) r0 = syz_open_dev$swradio(&(0x7f0000000000)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$radio(0x0, 0xffffffffffffffff, 0x2) r1 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) getdents64(r1, 0x0, 0x0) r2 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r2, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r2, 0x8) r3 = socket$inet6_sctp(0xa, 0x805, 0x84) r4 = accept4(r2, 0x0, 0x0, 0x0) prctl$PR_SET_ENDIAN(0x14, 0x1) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r3, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) epoll_pwait(0xffffffffffffffff, &(0x7f0000000040)=[{}], 0x1, 0x0, &(0x7f0000000080), 0x8) getpgid(0x0) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r4, 0x84, 0x9, &(0x7f0000000280)={0x0, @in={{0x2, 0x0, @empty}}, 0x0, 0xac14142400000000}, 0x98) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000780)={{{@in=@dev, @in6=@local}}, {{@in6=@mcast2}, 0x0, @in6=@dev}}, 0x0) ioctl$SIOCAX25ADDFWD(r0, 0x89ea, 0x0) syz_mount_image$gfs2(&(0x7f00000003c0)='gfs2\x00', 0x0, 0x87, 0x0, &(0x7f00000005c0), 0x1040040, 0x0) readv(r1, &(0x7f0000000500)=[{&(0x7f0000000400)=""/217, 0xd9}], 0x1) 03:53:36 executing program 4: r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r0, 0x0, 0x0, 0x0, &(0x7f0000003700)={0x77359400}) 03:53:36 executing program 3: r0 = socket$kcm(0x2, 0x2, 0x73) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$ARPT_SO_SET_ADD_COUNTERS(r1, 0x0, 0x61, 0x0, 0x0) 03:53:36 executing program 0: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) creat(&(0x7f0000000040)='./file0\x00', 0x0) 03:53:36 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x20, &(0x7f0000000b80)=ANY=[@ANYBLOB="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"], 0x0, 0x1625, 0x0, 0x0, 0x41100, 0x1, [], 0x0, 0x4}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r0, 0xdb, &(0x7f0000000200)={0x0, 0x0}}, 0x393) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='cgroup.events\x00', 0x0, 0x0) write$cgroup_int(r2, &(0x7f00000007c0)=0x6, 0x12) r3 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000002c0), 0x4) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz1\x00', 0x1ff) r4 = perf_event_open$cgroup(&(0x7f0000000600)={0x0, 0x70, 0x9, 0x6, 0x8, 0x6, 0x0, 0xfffffffffffff49f, 0x2, 0x6, 0x3ff, 0x0, 0x20, 0x0, 0x0, 0x81, 0x1, 0x400, 0x4, 0xfac, 0x4, 0x1, 0x10000, 0xf1, 0xd3, 0x92b, 0x200, 0x1, 0x100000000, 0x2, 0x100000000, 0xfff, 0xfff, 0xffff, 0x3, 0xfffffffffffffffd, 0x0, 0x6, 0x0, 0x50, 0x0, @perf_config_ext={0x3f, 0x9}, 0x20000, 0x8, 0xef3, 0x7, 0x100000000, 0x8, 0xfff}, 0xffffffffffffffff, 0x2, r0, 0x8) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000b40)='cgroup.subtree_control\x00') ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x2400, 0x1) r5 = getpid() socketpair$unix(0x1, 0x7, 0x0, &(0x7f0000000540)={0xffffffffffffffff}) setsockopt$sock_attach_bpf(r6, 0x1, 0x32, &(0x7f00000005c0)=r3, 0x4) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={0x0, 0xffffffffffffffff, 0x0, 0x12, &(0x7f0000000480)='./cgroup.cpu/syz1\x00', r1}, 0x30) perf_event_open(&(0x7f0000000300)={0x5, 0x70, 0xff, 0x4, 0x1000, 0xe5af, 0x0, 0x8000, 0xd0440, 0x2, 0xffff, 0x1, 0x4, 0x1f, 0x3, 0xfffffffffffffffa, 0x5, 0x9, 0x8, 0x1, 0x3, 0x400, 0x6, 0x5, 0x401, 0x10000, 0xff, 0xb24, 0xffffffffffff8000, 0xc8a, 0x3f, 0xfffffffffffffffa, 0xffffffffffff8001, 0x200, 0x5, 0x3, 0x2, 0x93a, 0x0, 0x7fff, 0x2, @perf_bp={&(0x7f0000000100), 0x1}, 0x0, 0x0, 0xffffffffffffff4e, 0x6, 0x0, 0x4, 0xfffffffffffffffd}, r5, 0x0, r7, 0x8) r8 = openat$tun(0xffffffffffffff9c, &(0x7f0000000580)='/dev/net/tun\x00', 0x40000, 0x0) ioctl$TUNSETPERSIST(r8, 0x400454cb, 0x1) r9 = socket$kcm(0x29, 0x5, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000800)={0x0, r0, 0x1, 0x2}, 0x14) ioctl$sock_kcm_SIOCKCMUNATTACH(r9, 0x89e1, &(0x7f0000000900)={r2}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r3, 0x0, 0x8b, 0x0, &(0x7f0000000680)="3ce41f426b7dd449ae14b08e1868c456d4fe9c7993884cf18f4dd5a0bc57250243da4203e0640859184bc4c4690afefd7736e8842cd88030448e918bdb5bd9bbbd680a51261557c0477c18049c832005ebb5b185c6f233df73a21d3b3ddad8426fba2d5f8aac5df904d5e5f2e7dc4a517079e08d5b2175a276f2a5c49cc2957cb367f269898570852dd63a", 0x0, 0x5}, 0x28) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000500)='./cgroup/syz0\x00', 0x200002, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000740)={r3, 0x50, &(0x7f00000003c0)}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r2, 0x50, &(0x7f0000000840)}, 0x10) openat$cgroup_subtree(r2, &(0x7f0000000940)='cgroup.subtree_control\x00', 0x2, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x1ff, 0x0, 0x0, 0x0, 0x200000, 0xffffffffffffffff, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280), 0x2}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r10 = socket$kcm(0xa, 0x400000000002, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffc59) ioctl$sock_kcm_SIOCKCMCLONE(r10, 0x890b, &(0x7f0000000000)) ioctl$sock_kcm_SIOCKCMCLONE(r10, 0x890c, &(0x7f0000000000)) 03:53:36 executing program 2: r0 = creat(&(0x7f0000000040)='./file1\x00', 0x0) lremovexattr(&(0x7f0000000340)='./bus\x00', 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000380)='./file0\x00', 0x0) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x104) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)) ioctl$RTC_WIE_OFF(r1, 0x7010) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) mount(0x0, &(0x7f000000aff8)='./file0\x00', &(0x7f0000000400)='devtmpfs\x00', 0x0, 0x0) chdir(&(0x7f0000000180)='./file0\x00') execve(0x0, 0x0, &(0x7f0000000880)=[0x0, &(0x7f0000000780)='eth0+-\xabuser#-wlan0em1\x00', &(0x7f00000007c0)=':\x00', &(0x7f0000000840)='lomd5sum}\x00']) r2 = creat(0x0, 0x0) write$eventfd(r2, &(0x7f0000000080), 0xfffffe5e) ioctl$PIO_SCRNMAP(r0, 0x4b41, &(0x7f00000002c0)) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) getsockopt$inet_buf(r3, 0x0, 0x0, 0x0, 0x0) 03:53:36 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x20, &(0x7f0000000b80)=ANY=[@ANYBLOB="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"], 0x0, 0x1625, 0x0, 0x0, 0x41100, 0x1, [], 0x0, 0x4}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r0, 0xdb, &(0x7f0000000200)={0x0, 0x0}}, 0x393) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='cgroup.events\x00', 0x0, 0x0) write$cgroup_int(r2, &(0x7f00000007c0)=0x6, 0x12) r3 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000002c0), 0x4) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz1\x00', 0x1ff) r4 = perf_event_open$cgroup(&(0x7f0000000600)={0x0, 0x70, 0x9, 0x6, 0x8, 0x6, 0x0, 0xfffffffffffff49f, 0x2, 0x6, 0x3ff, 0x0, 0x20, 0x0, 0x0, 0x81, 0x1, 0x400, 0x4, 0xfac, 0x4, 0x1, 0x10000, 0xf1, 0xd3, 0x92b, 0x200, 0x1, 0x100000000, 0x2, 0x100000000, 0xfff, 0xfff, 0xffff, 0x3, 0xfffffffffffffffd, 0x0, 0x6, 0x0, 0x50, 0x0, @perf_config_ext={0x3f, 0x9}, 0x20000, 0x8, 0xef3, 0x7, 0x100000000, 0x8, 0xfff}, 0xffffffffffffffff, 0x2, r0, 0x8) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000b40)='cgroup.subtree_control\x00') ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x2400, 0x1) r5 = getpid() socketpair$unix(0x1, 0x7, 0x0, &(0x7f0000000540)={0xffffffffffffffff}) setsockopt$sock_attach_bpf(r6, 0x1, 0x32, &(0x7f00000005c0)=r3, 0x4) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={0x0, 0xffffffffffffffff, 0x0, 0x12, &(0x7f0000000480)='./cgroup.cpu/syz1\x00', r1}, 0x30) perf_event_open(&(0x7f0000000300)={0x5, 0x70, 0xff, 0x4, 0x1000, 0xe5af, 0x0, 0x8000, 0xd0440, 0x2, 0xffff, 0x1, 0x4, 0x1f, 0x3, 0xfffffffffffffffa, 0x5, 0x9, 0x8, 0x1, 0x3, 0x400, 0x6, 0x5, 0x401, 0x10000, 0xff, 0xb24, 0xffffffffffff8000, 0xc8a, 0x3f, 0xfffffffffffffffa, 0xffffffffffff8001, 0x200, 0x5, 0x3, 0x2, 0x93a, 0x0, 0x7fff, 0x2, @perf_bp={&(0x7f0000000100), 0x1}, 0x0, 0x0, 0xffffffffffffff4e, 0x6, 0x0, 0x4, 0xfffffffffffffffd}, r5, 0x0, r7, 0x8) r8 = openat$tun(0xffffffffffffff9c, &(0x7f0000000580)='/dev/net/tun\x00', 0x40000, 0x0) ioctl$TUNSETPERSIST(r8, 0x400454cb, 0x1) r9 = socket$kcm(0x29, 0x5, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000800)={0x0, r0, 0x1, 0x2}, 0x14) ioctl$sock_kcm_SIOCKCMUNATTACH(r9, 0x89e1, &(0x7f0000000900)={r2}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r3, 0x0, 0x8b, 0x0, &(0x7f0000000680)="3ce41f426b7dd449ae14b08e1868c456d4fe9c7993884cf18f4dd5a0bc57250243da4203e0640859184bc4c4690afefd7736e8842cd88030448e918bdb5bd9bbbd680a51261557c0477c18049c832005ebb5b185c6f233df73a21d3b3ddad8426fba2d5f8aac5df904d5e5f2e7dc4a517079e08d5b2175a276f2a5c49cc2957cb367f269898570852dd63a", 0x0, 0x5}, 0x28) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000500)='./cgroup/syz0\x00', 0x200002, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000740)={r3, 0x50, &(0x7f00000003c0)}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r2, 0x50, &(0x7f0000000840)}, 0x10) openat$cgroup_subtree(r2, &(0x7f0000000940)='cgroup.subtree_control\x00', 0x2, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x1ff, 0x0, 0x0, 0x0, 0x200000, 0xffffffffffffffff, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280), 0x2}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r10 = socket$kcm(0xa, 0x400000000002, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffc59) ioctl$sock_kcm_SIOCKCMCLONE(r10, 0x890b, &(0x7f0000000000)) ioctl$sock_kcm_SIOCKCMCLONE(r10, 0x890c, &(0x7f0000000000)) 03:53:36 executing program 0: r0 = getpid() sched_rr_get_interval(r0, &(0x7f0000000000)) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r1 = creat(&(0x7f0000000040)='./file1\x00', 0x0) lremovexattr(&(0x7f0000000340)='./bus\x00', &(0x7f00000003c0)=@known='user.syz\x00') pwritev(r1, &(0x7f0000003440)=[{&(0x7f0000001100)}], 0x1, 0x40000) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000380)='./file0\x00', 0x0) r2 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x104) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)) ioctl$RTC_WIE_OFF(r2, 0x7010) sendmsg$key(0xffffffffffffffff, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000440)=ANY=[@ANYBLOB="0202ce0d1700000026bd7000fddbdf25030005007ca0000002004e20e00000020000000000000000050007007ea000000a004e230000800000000000000000000000ffffac1414aaffff000000000000040003007b000000400000000000000054b7000000000000c57700000000000005001a00fe880000000000000000000000000001fe8000000000000000000000000000aa1b00141004000400fbffffff9c89000000000000ff7f00000000000056a5bd6b00000000"], 0xb8}}, 0x24008801) mount(0x0, &(0x7f000000aff8)='./file0\x00', &(0x7f0000000400)='devtmpfs\x00', 0x0, &(0x7f000001c000)) chdir(&(0x7f0000000180)='./file0\x00') execve(&(0x7f0000000580)='./bus\x00', &(0x7f0000000700)=[&(0x7f0000000600)='user.syz\x00', &(0x7f0000000640)='devtmpfs\x00', &(0x7f0000000680)='devtmpfs\x00', &(0x7f00000006c0)='devtmpfs\x00'], &(0x7f0000000880)=[0x0, &(0x7f0000000780)='eth0+-\xabuser#-wlan0em1\x00', &(0x7f00000007c0)=':\x00', &(0x7f0000000840)='lomd5sum}\x00']) r3 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) write$eventfd(r3, &(0x7f0000000080), 0xfffffe5e) ioctl$PIO_SCRNMAP(r1, 0x4b41, &(0x7f00000002c0)="ff79c46f7dc0c1030275849d0d1fb49953964b66b022f1faa3e84bbf8ced98d326f21b16bb1db6c6be2c05074ac8d999882dfd53c5f571714eff775ad190473fd8") r4 = socket$inet(0x2, 0x4000000000000001, 0x0) getsockopt$inet_buf(r4, 0x0, 0x4, 0x0, &(0x7f0000000100)) r5 = perf_event_open$cgroup(&(0x7f0000000080)={0x5, 0x70, 0x7, 0x40, 0x40, 0x5, 0x0, 0x1, 0x42100, 0x8, 0xdb, 0x80000000, 0x1, 0x20, 0x6, 0x1, 0x40000000000000, 0x60, 0x9, 0x6, 0xfffffffffffffe01, 0x44, 0x9, 0x8, 0xd5, 0x5, 0xde6a, 0x7fffffff, 0x4, 0x5, 0x7, 0x5, 0x6, 0xd8, 0x1f, 0x3ba0, 0x9, 0xa79, 0x0, 0x5, 0x4, @perf_config_ext={0x1000, 0x3}, 0x100, 0x7fffffff, 0x1f, 0x2, 0x6, 0x8, 0x1000}, 0xffffffffffffff9c, 0x10, 0xffffffffffffffff, 0x7) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x7, 0x400, 0x5, 0x3, 0x0, 0xfffffffffffffffb, 0x40, 0x8, 0x0, 0x2, 0x7, 0x0, 0x80, 0x4, 0xfffffffffffffffa, 0x7ff, 0x0, 0xfff, 0x7, 0x6, 0x7, 0x7, 0x80000001, 0x8, 0x1, 0x5, 0x5, 0x8, 0x3, 0x7, 0x1, 0xffffffff80000000, 0x1f, 0x9, 0x8, 0x7, 0x0, 0x5, 0x2, @perf_config_ext={0x1, 0x72}, 0x28020, 0x20, 0x46de, 0x5, 0x7, 0x4, 0x5}, 0x0, 0xb, r5, 0x3) r6 = inotify_init() r7 = inotify_add_watch(r6, &(0x7f0000000040)='./file0\x00', 0x0) inotify_rm_watch(r6, r7) 03:53:36 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) flistxattr(r0, &(0x7f0000000180)=""/230, 0xe6) 03:53:36 executing program 4: r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r0, 0x0, 0x0, 0x0, &(0x7f0000003700)={0x77359400}) 03:53:36 executing program 2: r0 = epoll_create1(0x0) r1 = epoll_create1(0x0) close(r0) timerfd_create(0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f00000000c0)) 03:53:36 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x20, &(0x7f0000000b80)=ANY=[@ANYBLOB="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"], 0x0, 0x1625, 0x0, 0x0, 0x41100, 0x1, [], 0x0, 0x4}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r0, 0xdb, &(0x7f0000000200)={0x0, 0x0}}, 0x393) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='cgroup.events\x00', 0x0, 0x0) write$cgroup_int(r2, &(0x7f00000007c0)=0x6, 0x12) r3 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000002c0), 0x4) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz1\x00', 0x1ff) r4 = perf_event_open$cgroup(&(0x7f0000000600)={0x0, 0x70, 0x9, 0x6, 0x8, 0x6, 0x0, 0xfffffffffffff49f, 0x2, 0x6, 0x3ff, 0x0, 0x20, 0x0, 0x1, 0x0, 0x1, 0x400, 0x4, 0xfac, 0x4, 0x1, 0x10000, 0xf1, 0xd3, 0x92b, 0x200, 0x1, 0x100000000, 0x2, 0x100000000, 0xfff, 0xfff, 0xffff, 0x3, 0xfffffffffffffffd, 0x0, 0x6, 0x0, 0x50, 0x0, @perf_config_ext={0x3f, 0x9}, 0x20000, 0x8, 0xef3, 0x7, 0x100000000, 0x8, 0xfff}, 0xffffffffffffffff, 0x2, r0, 0x8) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000b40)='cgroup.subtree_control\x00') ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x2400, 0x1) r5 = getpid() socketpair$unix(0x1, 0x7, 0x0, &(0x7f0000000540)={0xffffffffffffffff}) setsockopt$sock_attach_bpf(r6, 0x1, 0x32, &(0x7f00000005c0)=r3, 0x4) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={0x0, 0xffffffffffffffff, 0x0, 0x12, &(0x7f0000000480)='./cgroup.cpu/syz1\x00', r1}, 0x30) perf_event_open(&(0x7f0000000300)={0x5, 0x70, 0xff, 0x4, 0x1000, 0xe5af, 0x0, 0x8000, 0xd0440, 0x2, 0xffff, 0x1, 0x4, 0x1f, 0x3, 0xfffffffffffffffa, 0x5, 0x9, 0x8, 0x1, 0x3, 0x400, 0x6, 0x5, 0x401, 0x10000, 0xff, 0xb24, 0xffffffffffff8000, 0xc8a, 0x3f, 0xfffffffffffffffa, 0xffffffffffff8001, 0x200, 0x5, 0x3, 0x2, 0x93a, 0x0, 0x7fff, 0x2, @perf_bp={&(0x7f0000000100), 0x1}, 0x0, 0x0, 0xffffffffffffff4e, 0x6, 0x0, 0x4, 0xfffffffffffffffd}, r5, 0x0, r7, 0x8) r8 = openat$tun(0xffffffffffffff9c, &(0x7f0000000580)='/dev/net/tun\x00', 0x40000, 0x0) ioctl$TUNSETPERSIST(r8, 0x400454cb, 0x1) r9 = socket$kcm(0x29, 0x5, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000800)={0x0, r0, 0x1, 0x2}, 0x14) ioctl$sock_kcm_SIOCKCMUNATTACH(r9, 0x89e1, &(0x7f0000000900)={r2}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r3, 0x0, 0x8b, 0x0, &(0x7f0000000680)="3ce41f426b7dd449ae14b08e1868c456d4fe9c7993884cf18f4dd5a0bc57250243da4203e0640859184bc4c4690afefd7736e8842cd88030448e918bdb5bd9bbbd680a51261557c0477c18049c832005ebb5b185c6f233df73a21d3b3ddad8426fba2d5f8aac5df904d5e5f2e7dc4a517079e08d5b2175a276f2a5c49cc2957cb367f269898570852dd63a", 0x0, 0x5}, 0x28) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000500)='./cgroup/syz0\x00', 0x200002, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000740)={r3, 0x50, &(0x7f00000003c0)}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r2, 0x50, &(0x7f0000000840)}, 0x10) openat$cgroup_subtree(r2, &(0x7f0000000940)='cgroup.subtree_control\x00', 0x2, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x1ff, 0x0, 0x0, 0x0, 0x200000, 0xffffffffffffffff, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280), 0x2}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r10 = socket$kcm(0xa, 0x400000000002, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffc59) ioctl$sock_kcm_SIOCKCMCLONE(r10, 0x890b, &(0x7f0000000000)) ioctl$sock_kcm_SIOCKCMCLONE(r10, 0x890c, &(0x7f0000000000)) 03:53:37 executing program 5: getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffff9c, 0x84, 0x13, 0x0, 0x0) r0 = syz_open_dev$swradio(&(0x7f0000000000)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$radio(0x0, 0xffffffffffffffff, 0x2) r1 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) getdents64(r1, 0x0, 0x0) r2 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r2, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r2, 0x8) r3 = socket$inet6_sctp(0xa, 0x805, 0x84) r4 = accept4(r2, 0x0, 0x0, 0x0) prctl$PR_SET_ENDIAN(0x14, 0x1) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r3, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) epoll_pwait(0xffffffffffffffff, &(0x7f0000000040)=[{}], 0x1, 0x0, &(0x7f0000000080), 0x8) getpgid(0x0) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r4, 0x84, 0x9, &(0x7f0000000280)={0x0, @in={{0x2, 0x0, @empty}}, 0x0, 0xac14142400000000}, 0x98) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000780)={{{@in=@dev, @in6=@local}}, {{@in6=@mcast2}, 0x0, @in6=@dev}}, 0x0) ioctl$SIOCAX25ADDFWD(r0, 0x89ea, 0x0) syz_mount_image$gfs2(&(0x7f00000003c0)='gfs2\x00', 0x0, 0x87, 0x0, &(0x7f00000005c0), 0x1040040, 0x0) readv(r1, &(0x7f0000000500)=[{&(0x7f0000000400)=""/217, 0xd9}], 0x1) 03:53:37 executing program 4: r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r0, 0x0, 0x0, 0x0, &(0x7f0000003700)={0x77359400}) 03:53:37 executing program 3: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) stat(0x0, 0x0) timer_create(0x0, 0x0, 0x0) setxattr$system_posix_acl(0x0, 0x0, 0x0, 0x0, 0x0) socket$unix(0x1, 0x0, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) listen(0xffffffffffffffff, 0x0) ioctl$BLKROTATIONAL(0xffffffffffffffff, 0x127e, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) gettid() ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) preadv(r0, &(0x7f0000000440)=[{&(0x7f0000000180)=""/184, 0xb8}], 0x1, 0x0) 03:53:37 executing program 2: 03:53:37 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x20, &(0x7f0000000b80)=ANY=[@ANYBLOB="cab5674ca80400f902c8d3fc17d4a51472ff5e04a7ed68e9074e865fffffffffff6582e2a0c58f438f1a9b1af27305fb6c1d497851a00d51dddde821f356222d82de15a5bb3ca4d544c3683ff903b30637ee634a8a4fa0e19e57c7d35e4db3a02231b71023a910ac2424326e31258bde7ca760ff3ca3261a92112b3c8db9e0d79dc5ad29e05434154bba1e60d243d8fa466b27518c09e11b78ec43ab7af1d33fbd4885ee5e95b0849345d0edef0a2e68320a47938597cf0fba5ae2e93301ffc38baaf2673b7fd4628a0fe3665006d238567bdb430991e02866ad858345dc86331d91a53051b3284827fc0a870d857ecc180901feb2d1dd3be0c1ebc3fa1d00d550744d9e55"], 0x0, 0x1625, 0x0, 0x0, 0x41100, 0x1, [], 0x0, 0x4}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r0, 0xdb, &(0x7f0000000200)={0x0, 0x0}}, 0x393) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='cgroup.events\x00', 0x0, 0x0) write$cgroup_int(r2, &(0x7f00000007c0)=0x6, 0x12) r3 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000002c0), 0x4) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz1\x00', 0x1ff) r4 = perf_event_open$cgroup(&(0x7f0000000600)={0x0, 0x70, 0x9, 0x6, 0x8, 0x6, 0x0, 0xfffffffffffff49f, 0x2, 0x6, 0x3ff, 0x0, 0x20, 0x0, 0x1, 0x0, 0x1, 0x400, 0x4, 0xfac, 0x4, 0x1, 0x10000, 0xf1, 0xd3, 0x92b, 0x200, 0x1, 0x100000000, 0x2, 0x100000000, 0xfff, 0xfff, 0xffff, 0x3, 0xfffffffffffffffd, 0x0, 0x6, 0x0, 0x50, 0x0, @perf_config_ext={0x3f, 0x9}, 0x20000, 0x8, 0xef3, 0x7, 0x100000000, 0x8, 0xfff}, 0xffffffffffffffff, 0x2, r0, 0x8) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000b40)='cgroup.subtree_control\x00') ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x2400, 0x1) r5 = getpid() socketpair$unix(0x1, 0x7, 0x0, &(0x7f0000000540)={0xffffffffffffffff}) setsockopt$sock_attach_bpf(r6, 0x1, 0x32, &(0x7f00000005c0)=r3, 0x4) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={0x0, 0xffffffffffffffff, 0x0, 0x12, &(0x7f0000000480)='./cgroup.cpu/syz1\x00', r1}, 0x30) perf_event_open(&(0x7f0000000300)={0x5, 0x70, 0xff, 0x4, 0x1000, 0xe5af, 0x0, 0x8000, 0xd0440, 0x2, 0xffff, 0x1, 0x4, 0x1f, 0x3, 0xfffffffffffffffa, 0x5, 0x9, 0x8, 0x1, 0x3, 0x400, 0x6, 0x5, 0x401, 0x10000, 0xff, 0xb24, 0xffffffffffff8000, 0xc8a, 0x3f, 0xfffffffffffffffa, 0xffffffffffff8001, 0x200, 0x5, 0x3, 0x2, 0x93a, 0x0, 0x7fff, 0x2, @perf_bp={&(0x7f0000000100), 0x1}, 0x0, 0x0, 0xffffffffffffff4e, 0x6, 0x0, 0x4, 0xfffffffffffffffd}, r5, 0x0, r7, 0x8) r8 = openat$tun(0xffffffffffffff9c, &(0x7f0000000580)='/dev/net/tun\x00', 0x40000, 0x0) ioctl$TUNSETPERSIST(r8, 0x400454cb, 0x1) r9 = socket$kcm(0x29, 0x5, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000800)={0x0, r0, 0x1, 0x2}, 0x14) ioctl$sock_kcm_SIOCKCMUNATTACH(r9, 0x89e1, &(0x7f0000000900)={r2}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r3, 0x0, 0x8b, 0x0, &(0x7f0000000680)="3ce41f426b7dd449ae14b08e1868c456d4fe9c7993884cf18f4dd5a0bc57250243da4203e0640859184bc4c4690afefd7736e8842cd88030448e918bdb5bd9bbbd680a51261557c0477c18049c832005ebb5b185c6f233df73a21d3b3ddad8426fba2d5f8aac5df904d5e5f2e7dc4a517079e08d5b2175a276f2a5c49cc2957cb367f269898570852dd63a", 0x0, 0x5}, 0x28) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000500)='./cgroup/syz0\x00', 0x200002, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000740)={r3, 0x50, &(0x7f00000003c0)}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r2, 0x50, &(0x7f0000000840)}, 0x10) openat$cgroup_subtree(r2, &(0x7f0000000940)='cgroup.subtree_control\x00', 0x2, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x1ff, 0x0, 0x0, 0x0, 0x200000, 0xffffffffffffffff, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280), 0x2}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r10 = socket$kcm(0xa, 0x400000000002, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffc59) ioctl$sock_kcm_SIOCKCMCLONE(r10, 0x890b, &(0x7f0000000000)) ioctl$sock_kcm_SIOCKCMCLONE(r10, 0x890c, &(0x7f0000000000)) 03:53:37 executing program 0: r0 = getpid() sched_rr_get_interval(r0, &(0x7f0000000000)) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r1 = creat(&(0x7f0000000040)='./file1\x00', 0x0) lremovexattr(&(0x7f0000000340)='./bus\x00', &(0x7f00000003c0)=@known='user.syz\x00') pwritev(r1, &(0x7f0000003440)=[{&(0x7f0000001100)}], 0x1, 0x40000) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000380)='./file0\x00', 0x0) r2 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x104) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)) ioctl$RTC_WIE_OFF(r2, 0x7010) sendmsg$key(0xffffffffffffffff, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000440)=ANY=[@ANYBLOB="0202ce0d1700000026bd7000fddbdf25030005007ca0000002004e20e00000020000000000000000050007007ea000000a004e230000800000000000000000000000ffffac1414aaffff000000000000040003007b000000400000000000000054b7000000000000c57700000000000005001a00fe880000000000000000000000000001fe8000000000000000000000000000aa1b00141004000400fbffffff9c89000000000000ff7f00000000000056a5bd6b00000000"], 0xb8}}, 0x24008801) mount(0x0, &(0x7f000000aff8)='./file0\x00', &(0x7f0000000400)='devtmpfs\x00', 0x0, &(0x7f000001c000)) chdir(&(0x7f0000000180)='./file0\x00') execve(&(0x7f0000000580)='./bus\x00', &(0x7f0000000700)=[&(0x7f0000000600)='user.syz\x00', &(0x7f0000000640)='devtmpfs\x00', &(0x7f0000000680)='devtmpfs\x00', &(0x7f00000006c0)='devtmpfs\x00'], &(0x7f0000000880)=[0x0, &(0x7f0000000780)='eth0+-\xabuser#-wlan0em1\x00', &(0x7f00000007c0)=':\x00', &(0x7f0000000840)='lomd5sum}\x00']) r3 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) write$eventfd(r3, &(0x7f0000000080), 0xfffffe5e) ioctl$PIO_SCRNMAP(r1, 0x4b41, &(0x7f00000002c0)="ff79c46f7dc0c1030275849d0d1fb49953964b66b022f1faa3e84bbf8ced98d326f21b16bb1db6c6be2c05074ac8d999882dfd53c5f571714eff775ad190473fd8") r4 = socket$inet(0x2, 0x4000000000000001, 0x0) getsockopt$inet_buf(r4, 0x0, 0x4, 0x0, &(0x7f0000000100)) r5 = perf_event_open$cgroup(&(0x7f0000000080)={0x5, 0x70, 0x7, 0x40, 0x40, 0x5, 0x0, 0x1, 0x42100, 0x8, 0xdb, 0x80000000, 0x1, 0x20, 0x6, 0x1, 0x40000000000000, 0x60, 0x9, 0x6, 0xfffffffffffffe01, 0x44, 0x9, 0x8, 0xd5, 0x5, 0xde6a, 0x7fffffff, 0x4, 0x5, 0x7, 0x5, 0x6, 0xd8, 0x1f, 0x3ba0, 0x9, 0xa79, 0x0, 0x5, 0x4, @perf_config_ext={0x1000, 0x3}, 0x100, 0x7fffffff, 0x1f, 0x2, 0x6, 0x8, 0x1000}, 0xffffffffffffff9c, 0x10, 0xffffffffffffffff, 0x7) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x7, 0x400, 0x5, 0x3, 0x0, 0xfffffffffffffffb, 0x40, 0x8, 0x0, 0x2, 0x7, 0x0, 0x80, 0x4, 0xfffffffffffffffa, 0x7ff, 0x0, 0xfff, 0x7, 0x6, 0x7, 0x7, 0x80000001, 0x8, 0x1, 0x5, 0x5, 0x8, 0x3, 0x7, 0x1, 0xffffffff80000000, 0x1f, 0x9, 0x8, 0x7, 0x0, 0x5, 0x2, @perf_config_ext={0x1, 0x72}, 0x28020, 0x20, 0x46de, 0x5, 0x7, 0x4, 0x5}, 0x0, 0xb, r5, 0x3) r6 = inotify_init() r7 = inotify_add_watch(r6, &(0x7f0000000040)='./file0\x00', 0x0) inotify_rm_watch(r6, r7) 03:53:37 executing program 4: r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000037c0), 0x0, 0x0, &(0x7f0000003700)={0x77359400}) 03:53:37 executing program 3: r0 = getpid() sched_rr_get_interval(r0, &(0x7f0000000000)) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r1 = creat(&(0x7f0000000040)='./file1\x00', 0x0) lremovexattr(&(0x7f0000000340)='./bus\x00', &(0x7f00000003c0)=@known='user.syz\x00') pwritev(r1, &(0x7f0000003440)=[{&(0x7f0000001100)}], 0x1, 0x40000) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000380)='./file0\x00', 0x0) r2 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x104) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)) ioctl$RTC_WIE_OFF(r2, 0x7010) sendmsg$key(0xffffffffffffffff, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000440)=ANY=[@ANYBLOB="0202ce0d1700000026bd7000fddbdf25030005007ca0000002004e20e00000020000000000000000050007007ea000000a004e230000800000000000000000000000ffffac1414aaffff000000000000040003007b000000400000000000000054b7000000000000c57700000000000005001a00fe880000000000000000000000000001fe8000000000000000000000000000aa1b00141004000400fbffffff9c89000000000000ff7f00000000000056a5bd6b00000000"], 0xb8}}, 0x24008801) mount(0x0, &(0x7f000000aff8)='./file0\x00', &(0x7f0000000400)='devtmpfs\x00', 0x0, &(0x7f000001c000)) chdir(&(0x7f0000000180)='./file0\x00') execve(&(0x7f0000000580)='./bus\x00', &(0x7f0000000700)=[&(0x7f0000000600)='user.syz\x00', &(0x7f0000000640)='devtmpfs\x00', &(0x7f0000000680)='devtmpfs\x00', &(0x7f00000006c0)='devtmpfs\x00'], &(0x7f0000000880)=[0x0, &(0x7f0000000780)='eth0+-\xabuser#-wlan0em1\x00', &(0x7f00000007c0)=':\x00', &(0x7f0000000840)='lomd5sum}\x00']) r3 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) write$eventfd(r3, &(0x7f0000000080), 0xfffffe5e) ioctl$PIO_SCRNMAP(r1, 0x4b41, &(0x7f00000002c0)="ff79c46f7dc0c1030275849d0d1fb49953964b66b022f1faa3e84bbf8ced98d326f21b16bb1db6c6be2c05074ac8d999882dfd53c5f571714eff775ad190473fd8") r4 = socket$inet(0x2, 0x4000000000000001, 0x0) getsockopt$inet_buf(r4, 0x0, 0x4, 0x0, &(0x7f0000000100)) r5 = perf_event_open$cgroup(&(0x7f0000000080)={0x5, 0x70, 0x7, 0x40, 0x40, 0x5, 0x0, 0x1, 0x42100, 0x8, 0xdb, 0x80000000, 0x1, 0x20, 0x6, 0x1, 0x40000000000000, 0x60, 0x9, 0x6, 0xfffffffffffffe01, 0x44, 0x9, 0x8, 0xd5, 0x5, 0xde6a, 0x7fffffff, 0x4, 0x5, 0x7, 0x5, 0x6, 0xd8, 0x1f, 0x3ba0, 0x9, 0xa79, 0x0, 0x5, 0x4, @perf_config_ext={0x1000, 0x3}, 0x100, 0x7fffffff, 0x1f, 0x2, 0x6, 0x8, 0x1000}, 0xffffffffffffff9c, 0x10, 0xffffffffffffffff, 0x7) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x7, 0x400, 0x5, 0x3, 0x0, 0xfffffffffffffffb, 0x40, 0x8, 0x0, 0x2, 0x7, 0x0, 0x80, 0x4, 0xfffffffffffffffa, 0x7ff, 0x0, 0xfff, 0x7, 0x6, 0x7, 0x7, 0x80000001, 0x8, 0x1, 0x5, 0x5, 0x8, 0x3, 0x7, 0x1, 0xffffffff80000000, 0x1f, 0x9, 0x8, 0x7, 0x0, 0x5, 0x2, @perf_config_ext={0x1, 0x72}, 0x28020, 0x20, 0x46de, 0x5, 0x7, 0x4, 0x5}, 0x0, 0xb, r5, 0x3) r6 = inotify_init() r7 = inotify_add_watch(r6, &(0x7f0000000040)='./file0\x00', 0x0) inotify_rm_watch(r6, r7) 03:53:37 executing program 2: 03:53:37 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x20, &(0x7f0000000b80)=ANY=[@ANYBLOB="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"], 0x0, 0x1625, 0x0, 0x0, 0x41100, 0x1, [], 0x0, 0x4}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r0, 0xdb, &(0x7f0000000200)={0x0, 0x0}}, 0x393) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='cgroup.events\x00', 0x0, 0x0) write$cgroup_int(r2, &(0x7f00000007c0)=0x6, 0x12) r3 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000002c0), 0x4) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz1\x00', 0x1ff) r4 = perf_event_open$cgroup(&(0x7f0000000600)={0x0, 0x70, 0x9, 0x6, 0x8, 0x6, 0x0, 0xfffffffffffff49f, 0x2, 0x6, 0x3ff, 0x0, 0x20, 0x0, 0x1, 0x0, 0x1, 0x400, 0x4, 0xfac, 0x4, 0x1, 0x10000, 0xf1, 0xd3, 0x92b, 0x200, 0x1, 0x100000000, 0x2, 0x100000000, 0xfff, 0xfff, 0xffff, 0x3, 0xfffffffffffffffd, 0x0, 0x6, 0x0, 0x50, 0x0, @perf_config_ext={0x3f, 0x9}, 0x20000, 0x8, 0xef3, 0x7, 0x100000000, 0x8, 0xfff}, 0xffffffffffffffff, 0x2, r0, 0x8) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000b40)='cgroup.subtree_control\x00') ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x2400, 0x1) r5 = getpid() socketpair$unix(0x1, 0x7, 0x0, &(0x7f0000000540)={0xffffffffffffffff}) setsockopt$sock_attach_bpf(r6, 0x1, 0x32, &(0x7f00000005c0)=r3, 0x4) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={0x0, 0xffffffffffffffff, 0x0, 0x12, &(0x7f0000000480)='./cgroup.cpu/syz1\x00', r1}, 0x30) perf_event_open(&(0x7f0000000300)={0x5, 0x70, 0xff, 0x4, 0x1000, 0xe5af, 0x0, 0x8000, 0xd0440, 0x2, 0xffff, 0x1, 0x4, 0x1f, 0x3, 0xfffffffffffffffa, 0x5, 0x9, 0x8, 0x1, 0x3, 0x400, 0x6, 0x5, 0x401, 0x10000, 0xff, 0xb24, 0xffffffffffff8000, 0xc8a, 0x3f, 0xfffffffffffffffa, 0xffffffffffff8001, 0x200, 0x5, 0x3, 0x2, 0x93a, 0x0, 0x7fff, 0x2, @perf_bp={&(0x7f0000000100), 0x1}, 0x0, 0x0, 0xffffffffffffff4e, 0x6, 0x0, 0x4, 0xfffffffffffffffd}, r5, 0x0, r7, 0x8) r8 = openat$tun(0xffffffffffffff9c, &(0x7f0000000580)='/dev/net/tun\x00', 0x40000, 0x0) ioctl$TUNSETPERSIST(r8, 0x400454cb, 0x1) r9 = socket$kcm(0x29, 0x5, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000800)={0x0, r0, 0x1, 0x2}, 0x14) ioctl$sock_kcm_SIOCKCMUNATTACH(r9, 0x89e1, &(0x7f0000000900)={r2}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r3, 0x0, 0x8b, 0x0, &(0x7f0000000680)="3ce41f426b7dd449ae14b08e1868c456d4fe9c7993884cf18f4dd5a0bc57250243da4203e0640859184bc4c4690afefd7736e8842cd88030448e918bdb5bd9bbbd680a51261557c0477c18049c832005ebb5b185c6f233df73a21d3b3ddad8426fba2d5f8aac5df904d5e5f2e7dc4a517079e08d5b2175a276f2a5c49cc2957cb367f269898570852dd63a", 0x0, 0x5}, 0x28) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000500)='./cgroup/syz0\x00', 0x200002, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000740)={r3, 0x50, &(0x7f00000003c0)}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r2, 0x50, &(0x7f0000000840)}, 0x10) openat$cgroup_subtree(r2, &(0x7f0000000940)='cgroup.subtree_control\x00', 0x2, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x1ff, 0x0, 0x0, 0x0, 0x200000, 0xffffffffffffffff, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280), 0x2}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r10 = socket$kcm(0xa, 0x400000000002, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffc59) ioctl$sock_kcm_SIOCKCMCLONE(r10, 0x890b, &(0x7f0000000000)) ioctl$sock_kcm_SIOCKCMCLONE(r10, 0x890c, &(0x7f0000000000)) 03:53:37 executing program 2: 03:53:37 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x20, &(0x7f0000000b80)=ANY=[@ANYBLOB="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"], 0x0, 0x1625, 0x0, 0x0, 0x41100, 0x1, [], 0x0, 0x4}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r0, 0xdb, &(0x7f0000000200)={0x0, 0x0}}, 0x393) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='cgroup.events\x00', 0x0, 0x0) write$cgroup_int(r2, &(0x7f00000007c0)=0x6, 0x12) r3 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000002c0), 0x4) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz1\x00', 0x1ff) r4 = perf_event_open$cgroup(&(0x7f0000000600)={0x0, 0x70, 0x9, 0x6, 0x8, 0x6, 0x0, 0xfffffffffffff49f, 0x2, 0x6, 0x3ff, 0x0, 0x20, 0x0, 0x1, 0x81, 0x0, 0x400, 0x4, 0xfac, 0x4, 0x1, 0x10000, 0xf1, 0xd3, 0x92b, 0x200, 0x1, 0x100000000, 0x2, 0x100000000, 0xfff, 0xfff, 0xffff, 0x3, 0xfffffffffffffffd, 0x0, 0x6, 0x0, 0x50, 0x0, @perf_config_ext={0x3f, 0x9}, 0x20000, 0x8, 0xef3, 0x7, 0x100000000, 0x8, 0xfff}, 0xffffffffffffffff, 0x2, r0, 0x8) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000b40)='cgroup.subtree_control\x00') ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x2400, 0x1) r5 = getpid() socketpair$unix(0x1, 0x7, 0x0, &(0x7f0000000540)={0xffffffffffffffff}) setsockopt$sock_attach_bpf(r6, 0x1, 0x32, &(0x7f00000005c0)=r3, 0x4) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={0x0, 0xffffffffffffffff, 0x0, 0x12, &(0x7f0000000480)='./cgroup.cpu/syz1\x00', r1}, 0x30) perf_event_open(&(0x7f0000000300)={0x5, 0x70, 0xff, 0x4, 0x1000, 0xe5af, 0x0, 0x8000, 0xd0440, 0x2, 0xffff, 0x1, 0x4, 0x1f, 0x3, 0xfffffffffffffffa, 0x5, 0x9, 0x8, 0x1, 0x3, 0x400, 0x6, 0x5, 0x401, 0x10000, 0xff, 0xb24, 0xffffffffffff8000, 0xc8a, 0x3f, 0xfffffffffffffffa, 0xffffffffffff8001, 0x200, 0x5, 0x3, 0x2, 0x93a, 0x0, 0x7fff, 0x2, @perf_bp={&(0x7f0000000100), 0x1}, 0x0, 0x0, 0xffffffffffffff4e, 0x6, 0x0, 0x4, 0xfffffffffffffffd}, r5, 0x0, r7, 0x8) r8 = openat$tun(0xffffffffffffff9c, &(0x7f0000000580)='/dev/net/tun\x00', 0x40000, 0x0) ioctl$TUNSETPERSIST(r8, 0x400454cb, 0x1) r9 = socket$kcm(0x29, 0x5, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000800)={0x0, r0, 0x1, 0x2}, 0x14) ioctl$sock_kcm_SIOCKCMUNATTACH(r9, 0x89e1, &(0x7f0000000900)={r2}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r3, 0x0, 0x8b, 0x0, &(0x7f0000000680)="3ce41f426b7dd449ae14b08e1868c456d4fe9c7993884cf18f4dd5a0bc57250243da4203e0640859184bc4c4690afefd7736e8842cd88030448e918bdb5bd9bbbd680a51261557c0477c18049c832005ebb5b185c6f233df73a21d3b3ddad8426fba2d5f8aac5df904d5e5f2e7dc4a517079e08d5b2175a276f2a5c49cc2957cb367f269898570852dd63a", 0x0, 0x5}, 0x28) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000500)='./cgroup/syz0\x00', 0x200002, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000740)={r3, 0x50, &(0x7f00000003c0)}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r2, 0x50, &(0x7f0000000840)}, 0x10) openat$cgroup_subtree(r2, &(0x7f0000000940)='cgroup.subtree_control\x00', 0x2, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x1ff, 0x0, 0x0, 0x0, 0x200000, 0xffffffffffffffff, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280), 0x2}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r10 = socket$kcm(0xa, 0x400000000002, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffc59) ioctl$sock_kcm_SIOCKCMCLONE(r10, 0x890b, &(0x7f0000000000)) ioctl$sock_kcm_SIOCKCMCLONE(r10, 0x890c, &(0x7f0000000000)) 03:53:37 executing program 5: getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffff9c, 0x84, 0x13, 0x0, 0x0) r0 = syz_open_dev$swradio(&(0x7f0000000000)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$radio(0x0, 0xffffffffffffffff, 0x2) r1 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) getdents64(r1, 0x0, 0x0) r2 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r2, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r2, 0x8) r3 = socket$inet6_sctp(0xa, 0x805, 0x84) r4 = accept4(r2, 0x0, 0x0, 0x0) prctl$PR_SET_ENDIAN(0x14, 0x1) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r3, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) epoll_pwait(0xffffffffffffffff, &(0x7f0000000040)=[{}], 0x1, 0x0, &(0x7f0000000080), 0x8) getpgid(0x0) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r4, 0x84, 0x9, &(0x7f0000000280)={0x0, @in={{0x2, 0x0, @empty}}, 0x0, 0xac14142400000000}, 0x98) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000780)={{{@in=@dev, @in6=@local}}, {{@in6=@mcast2}, 0x0, @in6=@dev}}, 0x0) ioctl$SIOCAX25ADDFWD(r0, 0x89ea, 0x0) syz_mount_image$gfs2(&(0x7f00000003c0)='gfs2\x00', 0x0, 0x87, 0x0, &(0x7f00000005c0), 0x1040040, 0x0) readv(r1, &(0x7f0000000500)=[{&(0x7f0000000400)=""/217, 0xd9}], 0x1) 03:53:37 executing program 4: r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000037c0), 0x0, 0x0, &(0x7f0000003700)={0x77359400}) 03:53:37 executing program 2: 03:53:37 executing program 0: 03:53:37 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x20, &(0x7f0000000b80)=ANY=[@ANYBLOB="cab5674ca80400f902c8d3fc17d4a51472ff5e04a7ed68e9074e865fffffffffff6582e2a0c58f438f1a9b1af27305fb6c1d497851a00d51dddde821f356222d82de15a5bb3ca4d544c3683ff903b30637ee634a8a4fa0e19e57c7d35e4db3a02231b71023a910ac2424326e31258bde7ca760ff3ca3261a92112b3c8db9e0d79dc5ad29e05434154bba1e60d243d8fa466b27518c09e11b78ec43ab7af1d33fbd4885ee5e95b0849345d0edef0a2e68320a47938597cf0fba5ae2e93301ffc38baaf2673b7fd4628a0fe3665006d238567bdb430991e02866ad858345dc86331d91a53051b3284827fc0a870d857ecc180901feb2d1dd3be0c1ebc3fa1d00d550744d9e55"], 0x0, 0x1625, 0x0, 0x0, 0x41100, 0x1, [], 0x0, 0x4}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r0, 0xdb, &(0x7f0000000200)={0x0, 0x0}}, 0x393) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='cgroup.events\x00', 0x0, 0x0) write$cgroup_int(r2, &(0x7f00000007c0)=0x6, 0x12) r3 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000002c0), 0x4) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz1\x00', 0x1ff) r4 = perf_event_open$cgroup(&(0x7f0000000600)={0x0, 0x70, 0x9, 0x6, 0x8, 0x6, 0x0, 0xfffffffffffff49f, 0x2, 0x6, 0x3ff, 0x0, 0x20, 0x0, 0x1, 0x81, 0x0, 0x400, 0x4, 0xfac, 0x4, 0x1, 0x10000, 0xf1, 0xd3, 0x92b, 0x200, 0x1, 0x100000000, 0x2, 0x100000000, 0xfff, 0xfff, 0xffff, 0x3, 0xfffffffffffffffd, 0x0, 0x6, 0x0, 0x50, 0x0, @perf_config_ext={0x3f, 0x9}, 0x20000, 0x8, 0xef3, 0x7, 0x100000000, 0x8, 0xfff}, 0xffffffffffffffff, 0x2, r0, 0x8) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000b40)='cgroup.subtree_control\x00') ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x2400, 0x1) r5 = getpid() socketpair$unix(0x1, 0x7, 0x0, &(0x7f0000000540)={0xffffffffffffffff}) setsockopt$sock_attach_bpf(r6, 0x1, 0x32, &(0x7f00000005c0)=r3, 0x4) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={0x0, 0xffffffffffffffff, 0x0, 0x12, &(0x7f0000000480)='./cgroup.cpu/syz1\x00', r1}, 0x30) perf_event_open(&(0x7f0000000300)={0x5, 0x70, 0xff, 0x4, 0x1000, 0xe5af, 0x0, 0x8000, 0xd0440, 0x2, 0xffff, 0x1, 0x4, 0x1f, 0x3, 0xfffffffffffffffa, 0x5, 0x9, 0x8, 0x1, 0x3, 0x400, 0x6, 0x5, 0x401, 0x10000, 0xff, 0xb24, 0xffffffffffff8000, 0xc8a, 0x3f, 0xfffffffffffffffa, 0xffffffffffff8001, 0x200, 0x5, 0x3, 0x2, 0x93a, 0x0, 0x7fff, 0x2, @perf_bp={&(0x7f0000000100), 0x1}, 0x0, 0x0, 0xffffffffffffff4e, 0x6, 0x0, 0x4, 0xfffffffffffffffd}, r5, 0x0, r7, 0x8) r8 = openat$tun(0xffffffffffffff9c, &(0x7f0000000580)='/dev/net/tun\x00', 0x40000, 0x0) ioctl$TUNSETPERSIST(r8, 0x400454cb, 0x1) r9 = socket$kcm(0x29, 0x5, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000800)={0x0, r0, 0x1, 0x2}, 0x14) ioctl$sock_kcm_SIOCKCMUNATTACH(r9, 0x89e1, &(0x7f0000000900)={r2}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r3, 0x0, 0x8b, 0x0, &(0x7f0000000680)="3ce41f426b7dd449ae14b08e1868c456d4fe9c7993884cf18f4dd5a0bc57250243da4203e0640859184bc4c4690afefd7736e8842cd88030448e918bdb5bd9bbbd680a51261557c0477c18049c832005ebb5b185c6f233df73a21d3b3ddad8426fba2d5f8aac5df904d5e5f2e7dc4a517079e08d5b2175a276f2a5c49cc2957cb367f269898570852dd63a", 0x0, 0x5}, 0x28) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000500)='./cgroup/syz0\x00', 0x200002, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000740)={r3, 0x50, &(0x7f00000003c0)}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r2, 0x50, &(0x7f0000000840)}, 0x10) openat$cgroup_subtree(r2, &(0x7f0000000940)='cgroup.subtree_control\x00', 0x2, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x1ff, 0x0, 0x0, 0x0, 0x200000, 0xffffffffffffffff, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280), 0x2}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r10 = socket$kcm(0xa, 0x400000000002, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffc59) ioctl$sock_kcm_SIOCKCMCLONE(r10, 0x890b, &(0x7f0000000000)) ioctl$sock_kcm_SIOCKCMCLONE(r10, 0x890c, &(0x7f0000000000)) 03:53:37 executing program 4: r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000037c0), 0x0, 0x0, &(0x7f0000003700)={0x77359400}) 03:53:37 executing program 2: 03:53:37 executing program 3: r0 = getpid() sched_rr_get_interval(r0, &(0x7f0000000000)) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r1 = creat(&(0x7f0000000040)='./file1\x00', 0x0) lremovexattr(&(0x7f0000000340)='./bus\x00', &(0x7f00000003c0)=@known='user.syz\x00') pwritev(r1, &(0x7f0000003440)=[{&(0x7f0000001100)}], 0x1, 0x40000) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000380)='./file0\x00', 0x0) r2 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x104) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)) ioctl$RTC_WIE_OFF(r2, 0x7010) sendmsg$key(0xffffffffffffffff, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000440)=ANY=[@ANYBLOB="0202ce0d1700000026bd7000fddbdf25030005007ca0000002004e20e00000020000000000000000050007007ea000000a004e230000800000000000000000000000ffffac1414aaffff000000000000040003007b000000400000000000000054b7000000000000c57700000000000005001a00fe880000000000000000000000000001fe8000000000000000000000000000aa1b00141004000400fbffffff9c89000000000000ff7f00000000000056a5bd6b00000000"], 0xb8}}, 0x24008801) mount(0x0, &(0x7f000000aff8)='./file0\x00', &(0x7f0000000400)='devtmpfs\x00', 0x0, &(0x7f000001c000)) chdir(&(0x7f0000000180)='./file0\x00') execve(&(0x7f0000000580)='./bus\x00', &(0x7f0000000700)=[&(0x7f0000000600)='user.syz\x00', &(0x7f0000000640)='devtmpfs\x00', &(0x7f0000000680)='devtmpfs\x00', &(0x7f00000006c0)='devtmpfs\x00'], &(0x7f0000000880)=[0x0, &(0x7f0000000780)='eth0+-\xabuser#-wlan0em1\x00', &(0x7f00000007c0)=':\x00', &(0x7f0000000840)='lomd5sum}\x00']) r3 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) write$eventfd(r3, &(0x7f0000000080), 0xfffffe5e) ioctl$PIO_SCRNMAP(r1, 0x4b41, &(0x7f00000002c0)="ff79c46f7dc0c1030275849d0d1fb49953964b66b022f1faa3e84bbf8ced98d326f21b16bb1db6c6be2c05074ac8d999882dfd53c5f571714eff775ad190473fd8") r4 = socket$inet(0x2, 0x4000000000000001, 0x0) getsockopt$inet_buf(r4, 0x0, 0x4, 0x0, &(0x7f0000000100)) r5 = perf_event_open$cgroup(&(0x7f0000000080)={0x5, 0x70, 0x7, 0x40, 0x40, 0x5, 0x0, 0x1, 0x42100, 0x8, 0xdb, 0x80000000, 0x1, 0x20, 0x6, 0x1, 0x40000000000000, 0x60, 0x9, 0x6, 0xfffffffffffffe01, 0x44, 0x9, 0x8, 0xd5, 0x5, 0xde6a, 0x7fffffff, 0x4, 0x5, 0x7, 0x5, 0x6, 0xd8, 0x1f, 0x3ba0, 0x9, 0xa79, 0x0, 0x5, 0x4, @perf_config_ext={0x1000, 0x3}, 0x100, 0x7fffffff, 0x1f, 0x2, 0x6, 0x8, 0x1000}, 0xffffffffffffff9c, 0x10, 0xffffffffffffffff, 0x7) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x7, 0x400, 0x5, 0x3, 0x0, 0xfffffffffffffffb, 0x40, 0x8, 0x0, 0x2, 0x7, 0x0, 0x80, 0x4, 0xfffffffffffffffa, 0x7ff, 0x0, 0xfff, 0x7, 0x6, 0x7, 0x7, 0x80000001, 0x8, 0x1, 0x5, 0x5, 0x8, 0x3, 0x7, 0x1, 0xffffffff80000000, 0x1f, 0x9, 0x8, 0x7, 0x0, 0x5, 0x2, @perf_config_ext={0x1, 0x72}, 0x28020, 0x20, 0x46de, 0x5, 0x7, 0x4, 0x5}, 0x0, 0xb, r5, 0x3) r6 = inotify_init() r7 = inotify_add_watch(r6, &(0x7f0000000040)='./file0\x00', 0x0) inotify_rm_watch(r6, r7) 03:53:37 executing program 4: r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{0x0, 0x0, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x5f}, {&(0x7f00000000c0)=""/85, 0x55}, {&(0x7f0000000fc0)=""/4096, 0x1000}, {&(0x7f0000000400)=""/120, 0x78}, {&(0x7f0000000480)=""/60, 0x3c}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f0000000540)=""/154, 0x9a}, {&(0x7f0000000340)=""/22, 0x16}], 0x8, &(0x7f0000002400)=""/191, 0xbf}}], 0x1, 0x0, &(0x7f0000003700)={0x77359400}) 03:53:37 executing program 0: 03:53:37 executing program 5: getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffff9c, 0x84, 0x13, 0x0, 0x0) r0 = syz_open_dev$swradio(&(0x7f0000000000)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$radio(0x0, 0xffffffffffffffff, 0x2) r1 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) getdents64(r1, 0x0, 0x0) r2 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r2, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r2, 0x8) r3 = socket$inet6_sctp(0xa, 0x805, 0x84) r4 = accept4(r2, 0x0, 0x0, 0x0) prctl$PR_SET_ENDIAN(0x14, 0x1) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r3, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) epoll_pwait(0xffffffffffffffff, &(0x7f0000000040)=[{}], 0x1, 0x0, &(0x7f0000000080), 0x8) getpgid(0x0) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r4, 0x84, 0x9, &(0x7f0000000280)={0x0, @in={{0x2, 0x0, @empty}}, 0x0, 0xac14142400000000, 0x0, 0x0, 0x54}, 0x98) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) ioctl$SIOCAX25ADDFWD(r0, 0x89ea, 0x0) syz_mount_image$gfs2(&(0x7f00000003c0)='gfs2\x00', 0x0, 0x87, 0x0, &(0x7f00000005c0), 0x1040040, 0x0) readv(r1, &(0x7f0000000500)=[{&(0x7f0000000400)=""/217, 0xd9}], 0x1) 03:53:37 executing program 4: r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{0x0, 0x0, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x5f}, {&(0x7f00000000c0)=""/85, 0x55}, {&(0x7f0000000fc0)=""/4096, 0x1000}, {&(0x7f0000000400)=""/120, 0x78}, {&(0x7f0000000480)=""/60, 0x3c}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f0000000540)=""/154, 0x9a}, {&(0x7f0000000340)=""/22, 0x16}], 0x8, &(0x7f0000002400)=""/191, 0xbf}}], 0x1, 0x0, &(0x7f0000003700)={0x77359400}) 03:53:37 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x20, &(0x7f0000000b80)=ANY=[@ANYBLOB="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"], 0x0, 0x1625, 0x0, 0x0, 0x41100, 0x1, [], 0x0, 0x4}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r0, 0xdb, &(0x7f0000000200)={0x0, 0x0}}, 0x393) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='cgroup.events\x00', 0x0, 0x0) write$cgroup_int(r2, &(0x7f00000007c0)=0x6, 0x12) r3 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000002c0), 0x4) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz1\x00', 0x1ff) r4 = perf_event_open$cgroup(&(0x7f0000000600)={0x0, 0x70, 0x9, 0x6, 0x8, 0x6, 0x0, 0xfffffffffffff49f, 0x2, 0x6, 0x3ff, 0x0, 0x20, 0x0, 0x1, 0x81, 0x0, 0x400, 0x4, 0xfac, 0x4, 0x1, 0x10000, 0xf1, 0xd3, 0x92b, 0x200, 0x1, 0x100000000, 0x2, 0x100000000, 0xfff, 0xfff, 0xffff, 0x3, 0xfffffffffffffffd, 0x0, 0x6, 0x0, 0x50, 0x0, @perf_config_ext={0x3f, 0x9}, 0x20000, 0x8, 0xef3, 0x7, 0x100000000, 0x8, 0xfff}, 0xffffffffffffffff, 0x2, r0, 0x8) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000b40)='cgroup.subtree_control\x00') ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x2400, 0x1) r5 = getpid() socketpair$unix(0x1, 0x7, 0x0, &(0x7f0000000540)={0xffffffffffffffff}) setsockopt$sock_attach_bpf(r6, 0x1, 0x32, &(0x7f00000005c0)=r3, 0x4) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={0x0, 0xffffffffffffffff, 0x0, 0x12, &(0x7f0000000480)='./cgroup.cpu/syz1\x00', r1}, 0x30) perf_event_open(&(0x7f0000000300)={0x5, 0x70, 0xff, 0x4, 0x1000, 0xe5af, 0x0, 0x8000, 0xd0440, 0x2, 0xffff, 0x1, 0x4, 0x1f, 0x3, 0xfffffffffffffffa, 0x5, 0x9, 0x8, 0x1, 0x3, 0x400, 0x6, 0x5, 0x401, 0x10000, 0xff, 0xb24, 0xffffffffffff8000, 0xc8a, 0x3f, 0xfffffffffffffffa, 0xffffffffffff8001, 0x200, 0x5, 0x3, 0x2, 0x93a, 0x0, 0x7fff, 0x2, @perf_bp={&(0x7f0000000100), 0x1}, 0x0, 0x0, 0xffffffffffffff4e, 0x6, 0x0, 0x4, 0xfffffffffffffffd}, r5, 0x0, r7, 0x8) r8 = openat$tun(0xffffffffffffff9c, &(0x7f0000000580)='/dev/net/tun\x00', 0x40000, 0x0) ioctl$TUNSETPERSIST(r8, 0x400454cb, 0x1) r9 = socket$kcm(0x29, 0x5, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000800)={0x0, r0, 0x1, 0x2}, 0x14) ioctl$sock_kcm_SIOCKCMUNATTACH(r9, 0x89e1, &(0x7f0000000900)={r2}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r3, 0x0, 0x8b, 0x0, &(0x7f0000000680)="3ce41f426b7dd449ae14b08e1868c456d4fe9c7993884cf18f4dd5a0bc57250243da4203e0640859184bc4c4690afefd7736e8842cd88030448e918bdb5bd9bbbd680a51261557c0477c18049c832005ebb5b185c6f233df73a21d3b3ddad8426fba2d5f8aac5df904d5e5f2e7dc4a517079e08d5b2175a276f2a5c49cc2957cb367f269898570852dd63a", 0x0, 0x5}, 0x28) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000500)='./cgroup/syz0\x00', 0x200002, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000740)={r3, 0x50, &(0x7f00000003c0)}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r2, 0x50, &(0x7f0000000840)}, 0x10) openat$cgroup_subtree(r2, &(0x7f0000000940)='cgroup.subtree_control\x00', 0x2, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x1ff, 0x0, 0x0, 0x0, 0x200000, 0xffffffffffffffff, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280), 0x2}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r10 = socket$kcm(0xa, 0x400000000002, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffc59) ioctl$sock_kcm_SIOCKCMCLONE(r10, 0x890b, &(0x7f0000000000)) ioctl$sock_kcm_SIOCKCMCLONE(r10, 0x890c, &(0x7f0000000000)) [ 1845.442605] net_ratelimit: 18 callbacks suppressed [ 1845.442615] protocol 88fb is buggy, dev hsr_slave_0 [ 1845.452767] protocol 88fb is buggy, dev hsr_slave_1 [ 1845.457913] protocol 88fb is buggy, dev hsr_slave_0 [ 1845.463061] protocol 88fb is buggy, dev hsr_slave_1 [ 1845.468247] protocol 88fb is buggy, dev hsr_slave_0 [ 1845.473378] protocol 88fb is buggy, dev hsr_slave_1 [ 1845.478536] protocol 88fb is buggy, dev hsr_slave_0 [ 1845.483668] protocol 88fb is buggy, dev hsr_slave_1 03:53:37 executing program 2: 03:53:37 executing program 0: 03:53:38 executing program 2: 03:53:38 executing program 4: r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{0x0, 0x0, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x5f}, {&(0x7f00000000c0)=""/85, 0x55}, {&(0x7f0000000fc0)=""/4096, 0x1000}, {&(0x7f0000000400)=""/120, 0x78}, {&(0x7f0000000480)=""/60, 0x3c}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f0000000540)=""/154, 0x9a}, {&(0x7f0000000340)=""/22, 0x16}], 0x8, &(0x7f0000002400)=""/191, 0xbf}}], 0x1, 0x0, &(0x7f0000003700)={0x77359400}) 03:53:38 executing program 0: 03:53:38 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x20, &(0x7f0000000b80)=ANY=[@ANYBLOB="cab5674ca80400f902c8d3fc17d4a51472ff5e04a7ed68e9074e865fffffffffff6582e2a0c58f438f1a9b1af27305fb6c1d497851a00d51dddde821f356222d82de15a5bb3ca4d544c3683ff903b30637ee634a8a4fa0e19e57c7d35e4db3a02231b71023a910ac2424326e31258bde7ca760ff3ca3261a92112b3c8db9e0d79dc5ad29e05434154bba1e60d243d8fa466b27518c09e11b78ec43ab7af1d33fbd4885ee5e95b0849345d0edef0a2e68320a47938597cf0fba5ae2e93301ffc38baaf2673b7fd4628a0fe3665006d238567bdb430991e02866ad858345dc86331d91a53051b3284827fc0a870d857ecc180901feb2d1dd3be0c1ebc3fa1d00d550744d9e55"], 0x0, 0x1625, 0x0, 0x0, 0x41100, 0x1, [], 0x0, 0x4}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r0, 0xdb, &(0x7f0000000200)={0x0, 0x0}}, 0x393) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='cgroup.events\x00', 0x0, 0x0) write$cgroup_int(r2, &(0x7f00000007c0)=0x6, 0x12) r3 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000002c0), 0x4) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz1\x00', 0x1ff) r4 = perf_event_open$cgroup(&(0x7f0000000600)={0x0, 0x70, 0x9, 0x6, 0x8, 0x6, 0x0, 0xfffffffffffff49f, 0x2, 0x6, 0x3ff, 0x0, 0x20, 0x0, 0x1, 0x81, 0x1, 0x0, 0x4, 0xfac, 0x4, 0x1, 0x10000, 0xf1, 0xd3, 0x92b, 0x200, 0x1, 0x100000000, 0x2, 0x100000000, 0xfff, 0xfff, 0xffff, 0x3, 0xfffffffffffffffd, 0x0, 0x6, 0x0, 0x50, 0x0, @perf_config_ext={0x3f, 0x9}, 0x20000, 0x8, 0xef3, 0x7, 0x100000000, 0x8, 0xfff}, 0xffffffffffffffff, 0x2, r0, 0x8) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000b40)='cgroup.subtree_control\x00') ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x2400, 0x1) r5 = getpid() socketpair$unix(0x1, 0x7, 0x0, &(0x7f0000000540)={0xffffffffffffffff}) setsockopt$sock_attach_bpf(r6, 0x1, 0x32, &(0x7f00000005c0)=r3, 0x4) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={0x0, 0xffffffffffffffff, 0x0, 0x12, &(0x7f0000000480)='./cgroup.cpu/syz1\x00', r1}, 0x30) perf_event_open(&(0x7f0000000300)={0x5, 0x70, 0xff, 0x4, 0x1000, 0xe5af, 0x0, 0x8000, 0xd0440, 0x2, 0xffff, 0x1, 0x4, 0x1f, 0x3, 0xfffffffffffffffa, 0x5, 0x9, 0x8, 0x1, 0x3, 0x400, 0x6, 0x5, 0x401, 0x10000, 0xff, 0xb24, 0xffffffffffff8000, 0xc8a, 0x3f, 0xfffffffffffffffa, 0xffffffffffff8001, 0x200, 0x5, 0x3, 0x2, 0x93a, 0x0, 0x7fff, 0x2, @perf_bp={&(0x7f0000000100), 0x1}, 0x0, 0x0, 0xffffffffffffff4e, 0x6, 0x0, 0x4, 0xfffffffffffffffd}, r5, 0x0, r7, 0x8) r8 = openat$tun(0xffffffffffffff9c, &(0x7f0000000580)='/dev/net/tun\x00', 0x40000, 0x0) ioctl$TUNSETPERSIST(r8, 0x400454cb, 0x1) r9 = socket$kcm(0x29, 0x5, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000800)={0x0, r0, 0x1, 0x2}, 0x14) ioctl$sock_kcm_SIOCKCMUNATTACH(r9, 0x89e1, &(0x7f0000000900)={r2}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r3, 0x0, 0x8b, 0x0, &(0x7f0000000680)="3ce41f426b7dd449ae14b08e1868c456d4fe9c7993884cf18f4dd5a0bc57250243da4203e0640859184bc4c4690afefd7736e8842cd88030448e918bdb5bd9bbbd680a51261557c0477c18049c832005ebb5b185c6f233df73a21d3b3ddad8426fba2d5f8aac5df904d5e5f2e7dc4a517079e08d5b2175a276f2a5c49cc2957cb367f269898570852dd63a", 0x0, 0x5}, 0x28) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000500)='./cgroup/syz0\x00', 0x200002, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000740)={r3, 0x50, &(0x7f00000003c0)}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r2, 0x50, &(0x7f0000000840)}, 0x10) openat$cgroup_subtree(r2, &(0x7f0000000940)='cgroup.subtree_control\x00', 0x2, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x1ff, 0x0, 0x0, 0x0, 0x200000, 0xffffffffffffffff, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280), 0x2}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r10 = socket$kcm(0xa, 0x400000000002, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffc59) ioctl$sock_kcm_SIOCKCMCLONE(r10, 0x890b, &(0x7f0000000000)) ioctl$sock_kcm_SIOCKCMCLONE(r10, 0x890c, &(0x7f0000000000)) 03:53:38 executing program 3: r0 = getpid() sched_rr_get_interval(r0, &(0x7f0000000000)) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r1 = creat(&(0x7f0000000040)='./file1\x00', 0x0) lremovexattr(&(0x7f0000000340)='./bus\x00', &(0x7f00000003c0)=@known='user.syz\x00') pwritev(r1, &(0x7f0000003440)=[{&(0x7f0000001100)}], 0x1, 0x40000) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000380)='./file0\x00', 0x0) r2 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x104) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)) ioctl$RTC_WIE_OFF(r2, 0x7010) sendmsg$key(0xffffffffffffffff, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000440)=ANY=[@ANYBLOB="0202ce0d1700000026bd7000fddbdf25030005007ca0000002004e20e00000020000000000000000050007007ea000000a004e230000800000000000000000000000ffffac1414aaffff000000000000040003007b000000400000000000000054b7000000000000c57700000000000005001a00fe880000000000000000000000000001fe8000000000000000000000000000aa1b00141004000400fbffffff9c89000000000000ff7f00000000000056a5bd6b00000000"], 0xb8}}, 0x24008801) mount(0x0, &(0x7f000000aff8)='./file0\x00', &(0x7f0000000400)='devtmpfs\x00', 0x0, &(0x7f000001c000)) chdir(&(0x7f0000000180)='./file0\x00') execve(&(0x7f0000000580)='./bus\x00', &(0x7f0000000700)=[&(0x7f0000000600)='user.syz\x00', &(0x7f0000000640)='devtmpfs\x00', &(0x7f0000000680)='devtmpfs\x00', &(0x7f00000006c0)='devtmpfs\x00'], &(0x7f0000000880)=[0x0, &(0x7f0000000780)='eth0+-\xabuser#-wlan0em1\x00', &(0x7f00000007c0)=':\x00', &(0x7f0000000840)='lomd5sum}\x00']) r3 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) write$eventfd(r3, &(0x7f0000000080), 0xfffffe5e) ioctl$PIO_SCRNMAP(r1, 0x4b41, &(0x7f00000002c0)="ff79c46f7dc0c1030275849d0d1fb49953964b66b022f1faa3e84bbf8ced98d326f21b16bb1db6c6be2c05074ac8d999882dfd53c5f571714eff775ad190473fd8") r4 = socket$inet(0x2, 0x4000000000000001, 0x0) getsockopt$inet_buf(r4, 0x0, 0x4, 0x0, &(0x7f0000000100)) r5 = perf_event_open$cgroup(&(0x7f0000000080)={0x5, 0x70, 0x7, 0x40, 0x40, 0x5, 0x0, 0x1, 0x42100, 0x8, 0xdb, 0x80000000, 0x1, 0x20, 0x6, 0x1, 0x40000000000000, 0x60, 0x9, 0x6, 0xfffffffffffffe01, 0x44, 0x9, 0x8, 0xd5, 0x5, 0xde6a, 0x7fffffff, 0x4, 0x5, 0x7, 0x5, 0x6, 0xd8, 0x1f, 0x3ba0, 0x9, 0xa79, 0x0, 0x5, 0x4, @perf_config_ext={0x1000, 0x3}, 0x100, 0x7fffffff, 0x1f, 0x2, 0x6, 0x8, 0x1000}, 0xffffffffffffff9c, 0x10, 0xffffffffffffffff, 0x7) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x7, 0x400, 0x5, 0x3, 0x0, 0xfffffffffffffffb, 0x40, 0x8, 0x0, 0x2, 0x7, 0x0, 0x80, 0x4, 0xfffffffffffffffa, 0x7ff, 0x0, 0xfff, 0x7, 0x6, 0x7, 0x7, 0x80000001, 0x8, 0x1, 0x5, 0x5, 0x8, 0x3, 0x7, 0x1, 0xffffffff80000000, 0x1f, 0x9, 0x8, 0x7, 0x0, 0x5, 0x2, @perf_config_ext={0x1, 0x72}, 0x28020, 0x20, 0x46de, 0x5, 0x7, 0x4, 0x5}, 0x0, 0xb, r5, 0x3) r6 = inotify_init() r7 = inotify_add_watch(r6, &(0x7f0000000040)='./file0\x00', 0x0) inotify_rm_watch(r6, r7) 03:53:38 executing program 2: 03:53:38 executing program 0: [ 1846.333471] protocol 88fb is buggy, dev hsr_slave_0 [ 1846.340225] protocol 88fb is buggy, dev hsr_slave_1 03:53:38 executing program 5: getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffff9c, 0x84, 0x13, 0x0, 0x0) r0 = syz_open_dev$swradio(&(0x7f0000000000)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$radio(0x0, 0xffffffffffffffff, 0x2) r1 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) getdents64(r1, 0x0, 0x0) r2 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r2, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r2, 0x8) r3 = socket$inet6_sctp(0xa, 0x805, 0x84) r4 = accept4(r2, 0x0, 0x0, 0x0) prctl$PR_SET_ENDIAN(0x14, 0x1) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r3, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) epoll_pwait(0xffffffffffffffff, &(0x7f0000000040)=[{}], 0x1, 0x0, &(0x7f0000000080), 0x8) getpgid(0x0) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r4, 0x84, 0x9, &(0x7f0000000280)={0x0, @in={{0x2, 0x0, @empty}}, 0x0, 0xac14142400000000, 0x0, 0x0, 0x54}, 0x98) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) ioctl$SIOCAX25ADDFWD(r0, 0x89ea, 0x0) syz_mount_image$gfs2(&(0x7f00000003c0)='gfs2\x00', 0x0, 0x87, 0x0, &(0x7f00000005c0), 0x1040040, 0x0) readv(r1, &(0x7f0000000500)=[{&(0x7f0000000400)=""/217, 0xd9}], 0x1) 03:53:38 executing program 0: 03:53:38 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x20, &(0x7f0000000b80)=ANY=[@ANYBLOB="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"], 0x0, 0x1625, 0x0, 0x0, 0x41100, 0x1, [], 0x0, 0x4}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r0, 0xdb, &(0x7f0000000200)={0x0, 0x0}}, 0x393) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='cgroup.events\x00', 0x0, 0x0) write$cgroup_int(r2, &(0x7f00000007c0)=0x6, 0x12) r3 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000002c0), 0x4) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz1\x00', 0x1ff) r4 = perf_event_open$cgroup(&(0x7f0000000600)={0x0, 0x70, 0x9, 0x6, 0x8, 0x6, 0x0, 0xfffffffffffff49f, 0x2, 0x6, 0x3ff, 0x0, 0x20, 0x0, 0x1, 0x81, 0x1, 0x0, 0x4, 0xfac, 0x4, 0x1, 0x10000, 0xf1, 0xd3, 0x92b, 0x200, 0x1, 0x100000000, 0x2, 0x100000000, 0xfff, 0xfff, 0xffff, 0x3, 0xfffffffffffffffd, 0x0, 0x6, 0x0, 0x50, 0x0, @perf_config_ext={0x3f, 0x9}, 0x20000, 0x8, 0xef3, 0x7, 0x100000000, 0x8, 0xfff}, 0xffffffffffffffff, 0x2, r0, 0x8) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000b40)='cgroup.subtree_control\x00') ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x2400, 0x1) r5 = getpid() socketpair$unix(0x1, 0x7, 0x0, &(0x7f0000000540)={0xffffffffffffffff}) setsockopt$sock_attach_bpf(r6, 0x1, 0x32, &(0x7f00000005c0)=r3, 0x4) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={0x0, 0xffffffffffffffff, 0x0, 0x12, &(0x7f0000000480)='./cgroup.cpu/syz1\x00', r1}, 0x30) perf_event_open(&(0x7f0000000300)={0x5, 0x70, 0xff, 0x4, 0x1000, 0xe5af, 0x0, 0x8000, 0xd0440, 0x2, 0xffff, 0x1, 0x4, 0x1f, 0x3, 0xfffffffffffffffa, 0x5, 0x9, 0x8, 0x1, 0x3, 0x400, 0x6, 0x5, 0x401, 0x10000, 0xff, 0xb24, 0xffffffffffff8000, 0xc8a, 0x3f, 0xfffffffffffffffa, 0xffffffffffff8001, 0x200, 0x5, 0x3, 0x2, 0x93a, 0x0, 0x7fff, 0x2, @perf_bp={&(0x7f0000000100), 0x1}, 0x0, 0x0, 0xffffffffffffff4e, 0x6, 0x0, 0x4, 0xfffffffffffffffd}, r5, 0x0, r7, 0x8) r8 = openat$tun(0xffffffffffffff9c, &(0x7f0000000580)='/dev/net/tun\x00', 0x40000, 0x0) ioctl$TUNSETPERSIST(r8, 0x400454cb, 0x1) r9 = socket$kcm(0x29, 0x5, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000800)={0x0, r0, 0x1, 0x2}, 0x14) ioctl$sock_kcm_SIOCKCMUNATTACH(r9, 0x89e1, &(0x7f0000000900)={r2}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r3, 0x0, 0x8b, 0x0, &(0x7f0000000680)="3ce41f426b7dd449ae14b08e1868c456d4fe9c7993884cf18f4dd5a0bc57250243da4203e0640859184bc4c4690afefd7736e8842cd88030448e918bdb5bd9bbbd680a51261557c0477c18049c832005ebb5b185c6f233df73a21d3b3ddad8426fba2d5f8aac5df904d5e5f2e7dc4a517079e08d5b2175a276f2a5c49cc2957cb367f269898570852dd63a", 0x0, 0x5}, 0x28) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000500)='./cgroup/syz0\x00', 0x200002, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000740)={r3, 0x50, &(0x7f00000003c0)}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r2, 0x50, &(0x7f0000000840)}, 0x10) openat$cgroup_subtree(r2, &(0x7f0000000940)='cgroup.subtree_control\x00', 0x2, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x1ff, 0x0, 0x0, 0x0, 0x200000, 0xffffffffffffffff, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280), 0x2}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r10 = socket$kcm(0xa, 0x400000000002, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffc59) ioctl$sock_kcm_SIOCKCMCLONE(r10, 0x890b, &(0x7f0000000000)) ioctl$sock_kcm_SIOCKCMCLONE(r10, 0x890c, &(0x7f0000000000)) 03:53:38 executing program 4: r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, 0x0, 0x0, &(0x7f0000002400)=""/191, 0xbf}}], 0x1, 0x0, &(0x7f0000003700)={0x77359400}) 03:53:38 executing program 2: 03:53:38 executing program 0: 03:53:38 executing program 2: 03:53:38 executing program 4: r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, 0x0, 0x0, &(0x7f0000002400)=""/191, 0xbf}}], 0x1, 0x0, &(0x7f0000003700)={0x77359400}) 03:53:38 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x20, &(0x7f0000000b80)=ANY=[@ANYBLOB="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"], 0x0, 0x1625, 0x0, 0x0, 0x41100, 0x1, [], 0x0, 0x4}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r0, 0xdb, &(0x7f0000000200)={0x0, 0x0}}, 0x393) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='cgroup.events\x00', 0x0, 0x0) write$cgroup_int(r2, &(0x7f00000007c0)=0x6, 0x12) r3 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000002c0), 0x4) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz1\x00', 0x1ff) r4 = perf_event_open$cgroup(&(0x7f0000000600)={0x0, 0x70, 0x9, 0x6, 0x8, 0x6, 0x0, 0xfffffffffffff49f, 0x2, 0x6, 0x3ff, 0x0, 0x20, 0x0, 0x1, 0x81, 0x1, 0x0, 0x4, 0xfac, 0x4, 0x1, 0x10000, 0xf1, 0xd3, 0x92b, 0x200, 0x1, 0x100000000, 0x2, 0x100000000, 0xfff, 0xfff, 0xffff, 0x3, 0xfffffffffffffffd, 0x0, 0x6, 0x0, 0x50, 0x0, @perf_config_ext={0x3f, 0x9}, 0x20000, 0x8, 0xef3, 0x7, 0x100000000, 0x8, 0xfff}, 0xffffffffffffffff, 0x2, r0, 0x8) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000b40)='cgroup.subtree_control\x00') ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x2400, 0x1) r5 = getpid() socketpair$unix(0x1, 0x7, 0x0, &(0x7f0000000540)={0xffffffffffffffff}) setsockopt$sock_attach_bpf(r6, 0x1, 0x32, &(0x7f00000005c0)=r3, 0x4) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={0x0, 0xffffffffffffffff, 0x0, 0x12, &(0x7f0000000480)='./cgroup.cpu/syz1\x00', r1}, 0x30) perf_event_open(&(0x7f0000000300)={0x5, 0x70, 0xff, 0x4, 0x1000, 0xe5af, 0x0, 0x8000, 0xd0440, 0x2, 0xffff, 0x1, 0x4, 0x1f, 0x3, 0xfffffffffffffffa, 0x5, 0x9, 0x8, 0x1, 0x3, 0x400, 0x6, 0x5, 0x401, 0x10000, 0xff, 0xb24, 0xffffffffffff8000, 0xc8a, 0x3f, 0xfffffffffffffffa, 0xffffffffffff8001, 0x200, 0x5, 0x3, 0x2, 0x93a, 0x0, 0x7fff, 0x2, @perf_bp={&(0x7f0000000100), 0x1}, 0x0, 0x0, 0xffffffffffffff4e, 0x6, 0x0, 0x4, 0xfffffffffffffffd}, r5, 0x0, r7, 0x8) r8 = openat$tun(0xffffffffffffff9c, &(0x7f0000000580)='/dev/net/tun\x00', 0x40000, 0x0) ioctl$TUNSETPERSIST(r8, 0x400454cb, 0x1) r9 = socket$kcm(0x29, 0x5, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000800)={0x0, r0, 0x1, 0x2}, 0x14) ioctl$sock_kcm_SIOCKCMUNATTACH(r9, 0x89e1, &(0x7f0000000900)={r2}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r3, 0x0, 0x8b, 0x0, &(0x7f0000000680)="3ce41f426b7dd449ae14b08e1868c456d4fe9c7993884cf18f4dd5a0bc57250243da4203e0640859184bc4c4690afefd7736e8842cd88030448e918bdb5bd9bbbd680a51261557c0477c18049c832005ebb5b185c6f233df73a21d3b3ddad8426fba2d5f8aac5df904d5e5f2e7dc4a517079e08d5b2175a276f2a5c49cc2957cb367f269898570852dd63a", 0x0, 0x5}, 0x28) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000500)='./cgroup/syz0\x00', 0x200002, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000740)={r3, 0x50, &(0x7f00000003c0)}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r2, 0x50, &(0x7f0000000840)}, 0x10) openat$cgroup_subtree(r2, &(0x7f0000000940)='cgroup.subtree_control\x00', 0x2, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x1ff, 0x0, 0x0, 0x0, 0x200000, 0xffffffffffffffff, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280), 0x2}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r10 = socket$kcm(0xa, 0x400000000002, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffc59) ioctl$sock_kcm_SIOCKCMCLONE(r10, 0x890b, &(0x7f0000000000)) ioctl$sock_kcm_SIOCKCMCLONE(r10, 0x890c, &(0x7f0000000000)) 03:53:39 executing program 3: 03:53:39 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x20, &(0x7f0000000b80)=ANY=[@ANYBLOB="cab5674ca80400f902c8d3fc17d4a51472ff5e04a7ed68e9074e865fffffffffff6582e2a0c58f438f1a9b1af27305fb6c1d497851a00d51dddde821f356222d82de15a5bb3ca4d544c3683ff903b30637ee634a8a4fa0e19e57c7d35e4db3a02231b71023a910ac2424326e31258bde7ca760ff3ca3261a92112b3c8db9e0d79dc5ad29e05434154bba1e60d243d8fa466b27518c09e11b78ec43ab7af1d33fbd4885ee5e95b0849345d0edef0a2e68320a47938597cf0fba5ae2e93301ffc38baaf2673b7fd4628a0fe3665006d238567bdb430991e02866ad858345dc86331d91a53051b3284827fc0a870d857ecc180901feb2d1dd3be0c1ebc3fa1d00d550744d9e55"], 0x0, 0x1625, 0x0, 0x0, 0x41100, 0x1, [], 0x0, 0x4}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r0, 0xdb, &(0x7f0000000200)={0x0, 0x0}}, 0x393) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='cgroup.events\x00', 0x0, 0x0) write$cgroup_int(r2, &(0x7f00000007c0)=0x6, 0x12) r3 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000002c0), 0x4) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz1\x00', 0x1ff) r4 = perf_event_open$cgroup(&(0x7f0000000600)={0x0, 0x70, 0x9, 0x6, 0x8, 0x6, 0x0, 0xfffffffffffff49f, 0x2, 0x6, 0x3ff, 0x0, 0x20, 0x0, 0x1, 0x81, 0x1, 0x400, 0x0, 0xfac, 0x4, 0x1, 0x10000, 0xf1, 0xd3, 0x92b, 0x200, 0x1, 0x100000000, 0x2, 0x100000000, 0xfff, 0xfff, 0xffff, 0x3, 0xfffffffffffffffd, 0x0, 0x6, 0x0, 0x50, 0x0, @perf_config_ext={0x3f, 0x9}, 0x20000, 0x8, 0xef3, 0x7, 0x100000000, 0x8, 0xfff}, 0xffffffffffffffff, 0x2, r0, 0x8) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000b40)='cgroup.subtree_control\x00') ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x2400, 0x1) r5 = getpid() socketpair$unix(0x1, 0x7, 0x0, &(0x7f0000000540)={0xffffffffffffffff}) setsockopt$sock_attach_bpf(r6, 0x1, 0x32, &(0x7f00000005c0)=r3, 0x4) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={0x0, 0xffffffffffffffff, 0x0, 0x12, &(0x7f0000000480)='./cgroup.cpu/syz1\x00', r1}, 0x30) perf_event_open(&(0x7f0000000300)={0x5, 0x70, 0xff, 0x4, 0x1000, 0xe5af, 0x0, 0x8000, 0xd0440, 0x2, 0xffff, 0x1, 0x4, 0x1f, 0x3, 0xfffffffffffffffa, 0x5, 0x9, 0x8, 0x1, 0x3, 0x400, 0x6, 0x5, 0x401, 0x10000, 0xff, 0xb24, 0xffffffffffff8000, 0xc8a, 0x3f, 0xfffffffffffffffa, 0xffffffffffff8001, 0x200, 0x5, 0x3, 0x2, 0x93a, 0x0, 0x7fff, 0x2, @perf_bp={&(0x7f0000000100), 0x1}, 0x0, 0x0, 0xffffffffffffff4e, 0x6, 0x0, 0x4, 0xfffffffffffffffd}, r5, 0x0, r7, 0x8) r8 = openat$tun(0xffffffffffffff9c, &(0x7f0000000580)='/dev/net/tun\x00', 0x40000, 0x0) ioctl$TUNSETPERSIST(r8, 0x400454cb, 0x1) r9 = socket$kcm(0x29, 0x5, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000800)={0x0, r0, 0x1, 0x2}, 0x14) ioctl$sock_kcm_SIOCKCMUNATTACH(r9, 0x89e1, &(0x7f0000000900)={r2}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r3, 0x0, 0x8b, 0x0, &(0x7f0000000680)="3ce41f426b7dd449ae14b08e1868c456d4fe9c7993884cf18f4dd5a0bc57250243da4203e0640859184bc4c4690afefd7736e8842cd88030448e918bdb5bd9bbbd680a51261557c0477c18049c832005ebb5b185c6f233df73a21d3b3ddad8426fba2d5f8aac5df904d5e5f2e7dc4a517079e08d5b2175a276f2a5c49cc2957cb367f269898570852dd63a", 0x0, 0x5}, 0x28) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000500)='./cgroup/syz0\x00', 0x200002, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000740)={r3, 0x50, &(0x7f00000003c0)}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r2, 0x50, &(0x7f0000000840)}, 0x10) openat$cgroup_subtree(r2, &(0x7f0000000940)='cgroup.subtree_control\x00', 0x2, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x1ff, 0x0, 0x0, 0x0, 0x200000, 0xffffffffffffffff, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280), 0x2}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r10 = socket$kcm(0xa, 0x400000000002, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffc59) ioctl$sock_kcm_SIOCKCMCLONE(r10, 0x890b, &(0x7f0000000000)) ioctl$sock_kcm_SIOCKCMCLONE(r10, 0x890c, &(0x7f0000000000)) 03:53:39 executing program 2: 03:53:39 executing program 0: 03:53:39 executing program 4: r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, 0x0, 0x0, &(0x7f0000002400)=""/191, 0xbf}}], 0x1, 0x0, &(0x7f0000003700)={0x77359400}) 03:53:39 executing program 5: getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffff9c, 0x84, 0x13, 0x0, 0x0) r0 = syz_open_dev$swradio(&(0x7f0000000000)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$radio(0x0, 0xffffffffffffffff, 0x2) r1 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) getdents64(r1, 0x0, 0x0) r2 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r2, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r2, 0x8) r3 = socket$inet6_sctp(0xa, 0x805, 0x84) r4 = accept4(r2, 0x0, 0x0, 0x0) prctl$PR_SET_ENDIAN(0x14, 0x1) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r3, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) epoll_pwait(0xffffffffffffffff, &(0x7f0000000040)=[{}], 0x1, 0x0, &(0x7f0000000080), 0x8) getpgid(0x0) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r4, 0x84, 0x9, &(0x7f0000000280)={0x0, @in={{0x2, 0x0, @empty}}, 0x0, 0xac14142400000000, 0x0, 0x0, 0x54}, 0x98) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) ioctl$SIOCAX25ADDFWD(r0, 0x89ea, 0x0) syz_mount_image$gfs2(&(0x7f00000003c0)='gfs2\x00', 0x0, 0x87, 0x0, &(0x7f00000005c0), 0x1040040, 0x0) readv(r1, &(0x7f0000000500)=[{&(0x7f0000000400)=""/217, 0xd9}], 0x1) 03:53:39 executing program 0: 03:53:39 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x20, &(0x7f0000000b80)=ANY=[@ANYBLOB="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"], 0x0, 0x1625, 0x0, 0x0, 0x41100, 0x1, [], 0x0, 0x4}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r0, 0xdb, &(0x7f0000000200)={0x0, 0x0}}, 0x393) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='cgroup.events\x00', 0x0, 0x0) write$cgroup_int(r2, &(0x7f00000007c0)=0x6, 0x12) r3 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000002c0), 0x4) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz1\x00', 0x1ff) r4 = perf_event_open$cgroup(&(0x7f0000000600)={0x0, 0x70, 0x9, 0x6, 0x8, 0x6, 0x0, 0xfffffffffffff49f, 0x2, 0x6, 0x3ff, 0x0, 0x20, 0x0, 0x1, 0x81, 0x1, 0x400, 0x0, 0xfac, 0x4, 0x1, 0x10000, 0xf1, 0xd3, 0x92b, 0x200, 0x1, 0x100000000, 0x2, 0x100000000, 0xfff, 0xfff, 0xffff, 0x3, 0xfffffffffffffffd, 0x0, 0x6, 0x0, 0x50, 0x0, @perf_config_ext={0x3f, 0x9}, 0x20000, 0x8, 0xef3, 0x7, 0x100000000, 0x8, 0xfff}, 0xffffffffffffffff, 0x2, r0, 0x8) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000b40)='cgroup.subtree_control\x00') ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x2400, 0x1) r5 = getpid() socketpair$unix(0x1, 0x7, 0x0, &(0x7f0000000540)={0xffffffffffffffff}) setsockopt$sock_attach_bpf(r6, 0x1, 0x32, &(0x7f00000005c0)=r3, 0x4) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={0x0, 0xffffffffffffffff, 0x0, 0x12, &(0x7f0000000480)='./cgroup.cpu/syz1\x00', r1}, 0x30) perf_event_open(&(0x7f0000000300)={0x5, 0x70, 0xff, 0x4, 0x1000, 0xe5af, 0x0, 0x8000, 0xd0440, 0x2, 0xffff, 0x1, 0x4, 0x1f, 0x3, 0xfffffffffffffffa, 0x5, 0x9, 0x8, 0x1, 0x3, 0x400, 0x6, 0x5, 0x401, 0x10000, 0xff, 0xb24, 0xffffffffffff8000, 0xc8a, 0x3f, 0xfffffffffffffffa, 0xffffffffffff8001, 0x200, 0x5, 0x3, 0x2, 0x93a, 0x0, 0x7fff, 0x2, @perf_bp={&(0x7f0000000100), 0x1}, 0x0, 0x0, 0xffffffffffffff4e, 0x6, 0x0, 0x4, 0xfffffffffffffffd}, r5, 0x0, r7, 0x8) r8 = openat$tun(0xffffffffffffff9c, &(0x7f0000000580)='/dev/net/tun\x00', 0x40000, 0x0) ioctl$TUNSETPERSIST(r8, 0x400454cb, 0x1) r9 = socket$kcm(0x29, 0x5, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000800)={0x0, r0, 0x1, 0x2}, 0x14) ioctl$sock_kcm_SIOCKCMUNATTACH(r9, 0x89e1, &(0x7f0000000900)={r2}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r3, 0x0, 0x8b, 0x0, &(0x7f0000000680)="3ce41f426b7dd449ae14b08e1868c456d4fe9c7993884cf18f4dd5a0bc57250243da4203e0640859184bc4c4690afefd7736e8842cd88030448e918bdb5bd9bbbd680a51261557c0477c18049c832005ebb5b185c6f233df73a21d3b3ddad8426fba2d5f8aac5df904d5e5f2e7dc4a517079e08d5b2175a276f2a5c49cc2957cb367f269898570852dd63a", 0x0, 0x5}, 0x28) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000500)='./cgroup/syz0\x00', 0x200002, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000740)={r3, 0x50, &(0x7f00000003c0)}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r2, 0x50, &(0x7f0000000840)}, 0x10) openat$cgroup_subtree(r2, &(0x7f0000000940)='cgroup.subtree_control\x00', 0x2, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x1ff, 0x0, 0x0, 0x0, 0x200000, 0xffffffffffffffff, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280), 0x2}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r10 = socket$kcm(0xa, 0x400000000002, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffc59) ioctl$sock_kcm_SIOCKCMCLONE(r10, 0x890b, &(0x7f0000000000)) ioctl$sock_kcm_SIOCKCMCLONE(r10, 0x890c, &(0x7f0000000000)) 03:53:39 executing program 2: 03:53:39 executing program 3: 03:53:39 executing program 4: r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x5f}, {&(0x7f00000000c0)=""/85, 0x55}, {&(0x7f0000000fc0)=""/4096, 0x1000}, {&(0x7f0000000400)=""/120, 0x78}, {&(0x7f0000000480)=""/60, 0x3c}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f0000000540)=""/154, 0x9a}], 0x7, &(0x7f0000002400)=""/191, 0xbf}}], 0x1, 0x0, &(0x7f0000003700)={0x77359400}) 03:53:39 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x20, &(0x7f0000000b80)=ANY=[@ANYBLOB="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"], 0x0, 0x1625, 0x0, 0x0, 0x41100, 0x1, [], 0x0, 0x4}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r0, 0xdb, &(0x7f0000000200)={0x0, 0x0}}, 0x393) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='cgroup.events\x00', 0x0, 0x0) write$cgroup_int(r2, &(0x7f00000007c0)=0x6, 0x12) r3 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000002c0), 0x4) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz1\x00', 0x1ff) r4 = perf_event_open$cgroup(&(0x7f0000000600)={0x0, 0x70, 0x9, 0x6, 0x8, 0x6, 0x0, 0xfffffffffffff49f, 0x2, 0x6, 0x3ff, 0x0, 0x20, 0x0, 0x1, 0x81, 0x1, 0x400, 0x0, 0xfac, 0x4, 0x1, 0x10000, 0xf1, 0xd3, 0x92b, 0x200, 0x1, 0x100000000, 0x2, 0x100000000, 0xfff, 0xfff, 0xffff, 0x3, 0xfffffffffffffffd, 0x0, 0x6, 0x0, 0x50, 0x0, @perf_config_ext={0x3f, 0x9}, 0x20000, 0x8, 0xef3, 0x7, 0x100000000, 0x8, 0xfff}, 0xffffffffffffffff, 0x2, r0, 0x8) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000b40)='cgroup.subtree_control\x00') ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x2400, 0x1) r5 = getpid() socketpair$unix(0x1, 0x7, 0x0, &(0x7f0000000540)={0xffffffffffffffff}) setsockopt$sock_attach_bpf(r6, 0x1, 0x32, &(0x7f00000005c0)=r3, 0x4) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={0x0, 0xffffffffffffffff, 0x0, 0x12, &(0x7f0000000480)='./cgroup.cpu/syz1\x00', r1}, 0x30) perf_event_open(&(0x7f0000000300)={0x5, 0x70, 0xff, 0x4, 0x1000, 0xe5af, 0x0, 0x8000, 0xd0440, 0x2, 0xffff, 0x1, 0x4, 0x1f, 0x3, 0xfffffffffffffffa, 0x5, 0x9, 0x8, 0x1, 0x3, 0x400, 0x6, 0x5, 0x401, 0x10000, 0xff, 0xb24, 0xffffffffffff8000, 0xc8a, 0x3f, 0xfffffffffffffffa, 0xffffffffffff8001, 0x200, 0x5, 0x3, 0x2, 0x93a, 0x0, 0x7fff, 0x2, @perf_bp={&(0x7f0000000100), 0x1}, 0x0, 0x0, 0xffffffffffffff4e, 0x6, 0x0, 0x4, 0xfffffffffffffffd}, r5, 0x0, r7, 0x8) r8 = openat$tun(0xffffffffffffff9c, &(0x7f0000000580)='/dev/net/tun\x00', 0x40000, 0x0) ioctl$TUNSETPERSIST(r8, 0x400454cb, 0x1) r9 = socket$kcm(0x29, 0x5, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000800)={0x0, r0, 0x1, 0x2}, 0x14) ioctl$sock_kcm_SIOCKCMUNATTACH(r9, 0x89e1, &(0x7f0000000900)={r2}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r3, 0x0, 0x8b, 0x0, &(0x7f0000000680)="3ce41f426b7dd449ae14b08e1868c456d4fe9c7993884cf18f4dd5a0bc57250243da4203e0640859184bc4c4690afefd7736e8842cd88030448e918bdb5bd9bbbd680a51261557c0477c18049c832005ebb5b185c6f233df73a21d3b3ddad8426fba2d5f8aac5df904d5e5f2e7dc4a517079e08d5b2175a276f2a5c49cc2957cb367f269898570852dd63a", 0x0, 0x5}, 0x28) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000500)='./cgroup/syz0\x00', 0x200002, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000740)={r3, 0x50, &(0x7f00000003c0)}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r2, 0x50, &(0x7f0000000840)}, 0x10) openat$cgroup_subtree(r2, &(0x7f0000000940)='cgroup.subtree_control\x00', 0x2, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x1ff, 0x0, 0x0, 0x0, 0x200000, 0xffffffffffffffff, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280), 0x2}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r10 = socket$kcm(0xa, 0x400000000002, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffc59) ioctl$sock_kcm_SIOCKCMCLONE(r10, 0x890b, &(0x7f0000000000)) ioctl$sock_kcm_SIOCKCMCLONE(r10, 0x890c, &(0x7f0000000000)) 03:53:39 executing program 0: 03:53:39 executing program 2: 03:53:39 executing program 3: 03:53:39 executing program 4: r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x5f}, {&(0x7f00000000c0)=""/85, 0x55}, {&(0x7f0000000fc0)=""/4096, 0x1000}, {&(0x7f0000000400)=""/120, 0x78}, {&(0x7f0000000480)=""/60, 0x3c}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f0000000540)=""/154, 0x9a}], 0x7, &(0x7f0000002400)=""/191, 0xbf}}], 0x1, 0x0, &(0x7f0000003700)={0x77359400}) 03:53:39 executing program 2: 03:53:40 executing program 3: 03:53:40 executing program 0: 03:53:40 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x20, &(0x7f0000000b80)=ANY=[@ANYBLOB="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"], 0x0, 0x1625, 0x0, 0x0, 0x41100, 0x1, [], 0x0, 0x4}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r0, 0xdb, &(0x7f0000000200)={0x0, 0x0}}, 0x393) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='cgroup.events\x00', 0x0, 0x0) write$cgroup_int(r2, &(0x7f00000007c0)=0x6, 0x12) r3 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000002c0), 0x4) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz1\x00', 0x1ff) r4 = perf_event_open$cgroup(&(0x7f0000000600)={0x0, 0x70, 0x9, 0x6, 0x8, 0x6, 0x0, 0xfffffffffffff49f, 0x2, 0x6, 0x3ff, 0x0, 0x20, 0x0, 0x1, 0x81, 0x1, 0x400, 0x4, 0x0, 0x4, 0x1, 0x10000, 0xf1, 0xd3, 0x92b, 0x200, 0x1, 0x100000000, 0x2, 0x100000000, 0xfff, 0xfff, 0xffff, 0x3, 0xfffffffffffffffd, 0x0, 0x6, 0x0, 0x50, 0x0, @perf_config_ext={0x3f, 0x9}, 0x20000, 0x8, 0xef3, 0x7, 0x100000000, 0x8, 0xfff}, 0xffffffffffffffff, 0x2, r0, 0x8) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000b40)='cgroup.subtree_control\x00') ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x2400, 0x1) r5 = getpid() socketpair$unix(0x1, 0x7, 0x0, &(0x7f0000000540)={0xffffffffffffffff}) setsockopt$sock_attach_bpf(r6, 0x1, 0x32, &(0x7f00000005c0)=r3, 0x4) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={0x0, 0xffffffffffffffff, 0x0, 0x12, &(0x7f0000000480)='./cgroup.cpu/syz1\x00', r1}, 0x30) perf_event_open(&(0x7f0000000300)={0x5, 0x70, 0xff, 0x4, 0x1000, 0xe5af, 0x0, 0x8000, 0xd0440, 0x2, 0xffff, 0x1, 0x4, 0x1f, 0x3, 0xfffffffffffffffa, 0x5, 0x9, 0x8, 0x1, 0x3, 0x400, 0x6, 0x5, 0x401, 0x10000, 0xff, 0xb24, 0xffffffffffff8000, 0xc8a, 0x3f, 0xfffffffffffffffa, 0xffffffffffff8001, 0x200, 0x5, 0x3, 0x2, 0x93a, 0x0, 0x7fff, 0x2, @perf_bp={&(0x7f0000000100), 0x1}, 0x0, 0x0, 0xffffffffffffff4e, 0x6, 0x0, 0x4, 0xfffffffffffffffd}, r5, 0x0, r7, 0x8) r8 = openat$tun(0xffffffffffffff9c, &(0x7f0000000580)='/dev/net/tun\x00', 0x40000, 0x0) ioctl$TUNSETPERSIST(r8, 0x400454cb, 0x1) r9 = socket$kcm(0x29, 0x5, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000800)={0x0, r0, 0x1, 0x2}, 0x14) ioctl$sock_kcm_SIOCKCMUNATTACH(r9, 0x89e1, &(0x7f0000000900)={r2}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r3, 0x0, 0x8b, 0x0, &(0x7f0000000680)="3ce41f426b7dd449ae14b08e1868c456d4fe9c7993884cf18f4dd5a0bc57250243da4203e0640859184bc4c4690afefd7736e8842cd88030448e918bdb5bd9bbbd680a51261557c0477c18049c832005ebb5b185c6f233df73a21d3b3ddad8426fba2d5f8aac5df904d5e5f2e7dc4a517079e08d5b2175a276f2a5c49cc2957cb367f269898570852dd63a", 0x0, 0x5}, 0x28) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000500)='./cgroup/syz0\x00', 0x200002, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000740)={r3, 0x50, &(0x7f00000003c0)}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r2, 0x50, &(0x7f0000000840)}, 0x10) openat$cgroup_subtree(r2, &(0x7f0000000940)='cgroup.subtree_control\x00', 0x2, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x1ff, 0x0, 0x0, 0x0, 0x200000, 0xffffffffffffffff, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280), 0x2}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r10 = socket$kcm(0xa, 0x400000000002, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffc59) ioctl$sock_kcm_SIOCKCMCLONE(r10, 0x890b, &(0x7f0000000000)) ioctl$sock_kcm_SIOCKCMCLONE(r10, 0x890c, &(0x7f0000000000)) 03:53:40 executing program 2: 03:53:40 executing program 4: r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x5f}, {&(0x7f00000000c0)=""/85, 0x55}, {&(0x7f0000000fc0)=""/4096, 0x1000}, {&(0x7f0000000400)=""/120, 0x78}, {&(0x7f0000000480)=""/60, 0x3c}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f0000000540)=""/154, 0x9a}], 0x7, &(0x7f0000002400)=""/191, 0xbf}}], 0x1, 0x0, &(0x7f0000003700)={0x77359400}) 03:53:40 executing program 5: getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffff9c, 0x84, 0x13, 0x0, 0x0) syz_open_dev$swradio(&(0x7f0000000000)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$radio(0x0, 0xffffffffffffffff, 0x2) r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) getdents64(r0, 0x0, 0x0) r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r1, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r1, 0x8) r2 = socket$inet6_sctp(0xa, 0x805, 0x84) r3 = accept4(r1, 0x0, 0x0, 0x0) prctl$PR_SET_ENDIAN(0x14, 0x1) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r2, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) epoll_pwait(0xffffffffffffffff, &(0x7f0000000040)=[{}], 0x1, 0x0, &(0x7f0000000080), 0x8) getpgid(0x0) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r3, 0x84, 0x9, &(0x7f0000000280)={0x0, @in={{0x2, 0x0, @empty}}, 0x0, 0xac14142400000000, 0x0, 0x0, 0x54}, 0x98) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) ioctl$SIOCAX25ADDFWD(0xffffffffffffffff, 0x89ea, 0x0) syz_mount_image$gfs2(&(0x7f00000003c0)='gfs2\x00', 0x0, 0x87, 0x0, &(0x7f00000005c0), 0x1040040, 0x0) readv(r0, &(0x7f0000000500)=[{&(0x7f0000000400)=""/217, 0xd9}], 0x1) 03:53:40 executing program 3: 03:53:40 executing program 2: 03:53:40 executing program 0: 03:53:40 executing program 4: r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x5f}, {&(0x7f00000000c0)=""/85, 0x55}, {&(0x7f0000000fc0)=""/4096, 0x1000}, {&(0x7f0000000400)=""/120, 0x78}, {&(0x7f0000000480)=""/60, 0x3c}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f0000000540)=""/154, 0x9a}, {0x0}], 0x8, &(0x7f0000002400)=""/191, 0xbf}}], 0x1, 0x0, &(0x7f0000003700)={0x77359400}) 03:53:40 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x20, &(0x7f0000000b80)=ANY=[@ANYBLOB="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"], 0x0, 0x1625, 0x0, 0x0, 0x41100, 0x1, [], 0x0, 0x4}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r0, 0xdb, &(0x7f0000000200)={0x0, 0x0}}, 0x393) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='cgroup.events\x00', 0x0, 0x0) write$cgroup_int(r2, &(0x7f00000007c0)=0x6, 0x12) r3 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000002c0), 0x4) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz1\x00', 0x1ff) r4 = perf_event_open$cgroup(&(0x7f0000000600)={0x0, 0x70, 0x9, 0x6, 0x8, 0x6, 0x0, 0xfffffffffffff49f, 0x2, 0x6, 0x3ff, 0x0, 0x20, 0x0, 0x1, 0x81, 0x1, 0x400, 0x4, 0x0, 0x4, 0x1, 0x10000, 0xf1, 0xd3, 0x92b, 0x200, 0x1, 0x100000000, 0x2, 0x100000000, 0xfff, 0xfff, 0xffff, 0x3, 0xfffffffffffffffd, 0x0, 0x6, 0x0, 0x50, 0x0, @perf_config_ext={0x3f, 0x9}, 0x20000, 0x8, 0xef3, 0x7, 0x100000000, 0x8, 0xfff}, 0xffffffffffffffff, 0x2, r0, 0x8) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000b40)='cgroup.subtree_control\x00') ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x2400, 0x1) r5 = getpid() socketpair$unix(0x1, 0x7, 0x0, &(0x7f0000000540)={0xffffffffffffffff}) setsockopt$sock_attach_bpf(r6, 0x1, 0x32, &(0x7f00000005c0)=r3, 0x4) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={0x0, 0xffffffffffffffff, 0x0, 0x12, &(0x7f0000000480)='./cgroup.cpu/syz1\x00', r1}, 0x30) perf_event_open(&(0x7f0000000300)={0x5, 0x70, 0xff, 0x4, 0x1000, 0xe5af, 0x0, 0x8000, 0xd0440, 0x2, 0xffff, 0x1, 0x4, 0x1f, 0x3, 0xfffffffffffffffa, 0x5, 0x9, 0x8, 0x1, 0x3, 0x400, 0x6, 0x5, 0x401, 0x10000, 0xff, 0xb24, 0xffffffffffff8000, 0xc8a, 0x3f, 0xfffffffffffffffa, 0xffffffffffff8001, 0x200, 0x5, 0x3, 0x2, 0x93a, 0x0, 0x7fff, 0x2, @perf_bp={&(0x7f0000000100), 0x1}, 0x0, 0x0, 0xffffffffffffff4e, 0x6, 0x0, 0x4, 0xfffffffffffffffd}, r5, 0x0, r7, 0x8) r8 = openat$tun(0xffffffffffffff9c, &(0x7f0000000580)='/dev/net/tun\x00', 0x40000, 0x0) ioctl$TUNSETPERSIST(r8, 0x400454cb, 0x1) r9 = socket$kcm(0x29, 0x5, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000800)={0x0, r0, 0x1, 0x2}, 0x14) ioctl$sock_kcm_SIOCKCMUNATTACH(r9, 0x89e1, &(0x7f0000000900)={r2}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r3, 0x0, 0x8b, 0x0, &(0x7f0000000680)="3ce41f426b7dd449ae14b08e1868c456d4fe9c7993884cf18f4dd5a0bc57250243da4203e0640859184bc4c4690afefd7736e8842cd88030448e918bdb5bd9bbbd680a51261557c0477c18049c832005ebb5b185c6f233df73a21d3b3ddad8426fba2d5f8aac5df904d5e5f2e7dc4a517079e08d5b2175a276f2a5c49cc2957cb367f269898570852dd63a", 0x0, 0x5}, 0x28) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000500)='./cgroup/syz0\x00', 0x200002, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000740)={r3, 0x50, &(0x7f00000003c0)}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r2, 0x50, &(0x7f0000000840)}, 0x10) openat$cgroup_subtree(r2, &(0x7f0000000940)='cgroup.subtree_control\x00', 0x2, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x1ff, 0x0, 0x0, 0x0, 0x200000, 0xffffffffffffffff, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280), 0x2}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r10 = socket$kcm(0xa, 0x400000000002, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffc59) ioctl$sock_kcm_SIOCKCMCLONE(r10, 0x890b, &(0x7f0000000000)) ioctl$sock_kcm_SIOCKCMCLONE(r10, 0x890c, &(0x7f0000000000)) 03:53:40 executing program 2: 03:53:40 executing program 0: 03:53:40 executing program 3: 03:53:40 executing program 2: 03:53:40 executing program 0: 03:53:40 executing program 4: r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x5f}, {&(0x7f00000000c0)=""/85, 0x55}, {&(0x7f0000000fc0)=""/4096, 0x1000}, {&(0x7f0000000400)=""/120, 0x78}, {&(0x7f0000000480)=""/60, 0x3c}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f0000000540)=""/154, 0x9a}, {0x0}], 0x8, &(0x7f0000002400)=""/191, 0xbf}}], 0x1, 0x0, &(0x7f0000003700)={0x77359400}) 03:53:40 executing program 5: getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffff9c, 0x84, 0x13, 0x0, 0x0) syz_open_dev$swradio(&(0x7f0000000000)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$radio(0x0, 0xffffffffffffffff, 0x2) r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) getdents64(r0, 0x0, 0x0) r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r1, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r1, 0x8) r2 = socket$inet6_sctp(0xa, 0x805, 0x84) r3 = accept4(r1, 0x0, 0x0, 0x0) prctl$PR_SET_ENDIAN(0x14, 0x1) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r2, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) epoll_pwait(0xffffffffffffffff, &(0x7f0000000040)=[{}], 0x1, 0x0, &(0x7f0000000080), 0x8) getpgid(0x0) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r3, 0x84, 0x9, &(0x7f0000000280)={0x0, @in={{0x2, 0x0, @empty}}, 0x0, 0xac14142400000000, 0x0, 0x0, 0x54}, 0x98) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) ioctl$SIOCAX25ADDFWD(0xffffffffffffffff, 0x89ea, 0x0) syz_mount_image$gfs2(&(0x7f00000003c0)='gfs2\x00', 0x0, 0x87, 0x0, &(0x7f00000005c0), 0x1040040, 0x0) readv(r0, &(0x7f0000000500)=[{&(0x7f0000000400)=""/217, 0xd9}], 0x1) 03:53:40 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x20, &(0x7f0000000b80)=ANY=[@ANYBLOB="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"], 0x0, 0x1625, 0x0, 0x0, 0x41100, 0x1, [], 0x0, 0x4}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r0, 0xdb, &(0x7f0000000200)={0x0, 0x0}}, 0x393) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='cgroup.events\x00', 0x0, 0x0) write$cgroup_int(r2, &(0x7f00000007c0)=0x6, 0x12) r3 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000002c0), 0x4) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz1\x00', 0x1ff) r4 = perf_event_open$cgroup(&(0x7f0000000600)={0x0, 0x70, 0x9, 0x6, 0x8, 0x6, 0x0, 0xfffffffffffff49f, 0x2, 0x6, 0x3ff, 0x0, 0x20, 0x0, 0x1, 0x81, 0x1, 0x400, 0x4, 0x0, 0x4, 0x1, 0x10000, 0xf1, 0xd3, 0x92b, 0x200, 0x1, 0x100000000, 0x2, 0x100000000, 0xfff, 0xfff, 0xffff, 0x3, 0xfffffffffffffffd, 0x0, 0x6, 0x0, 0x50, 0x0, @perf_config_ext={0x3f, 0x9}, 0x20000, 0x8, 0xef3, 0x7, 0x100000000, 0x8, 0xfff}, 0xffffffffffffffff, 0x2, r0, 0x8) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000b40)='cgroup.subtree_control\x00') ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x2400, 0x1) r5 = getpid() socketpair$unix(0x1, 0x7, 0x0, &(0x7f0000000540)={0xffffffffffffffff}) setsockopt$sock_attach_bpf(r6, 0x1, 0x32, &(0x7f00000005c0)=r3, 0x4) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={0x0, 0xffffffffffffffff, 0x0, 0x12, &(0x7f0000000480)='./cgroup.cpu/syz1\x00', r1}, 0x30) perf_event_open(&(0x7f0000000300)={0x5, 0x70, 0xff, 0x4, 0x1000, 0xe5af, 0x0, 0x8000, 0xd0440, 0x2, 0xffff, 0x1, 0x4, 0x1f, 0x3, 0xfffffffffffffffa, 0x5, 0x9, 0x8, 0x1, 0x3, 0x400, 0x6, 0x5, 0x401, 0x10000, 0xff, 0xb24, 0xffffffffffff8000, 0xc8a, 0x3f, 0xfffffffffffffffa, 0xffffffffffff8001, 0x200, 0x5, 0x3, 0x2, 0x93a, 0x0, 0x7fff, 0x2, @perf_bp={&(0x7f0000000100), 0x1}, 0x0, 0x0, 0xffffffffffffff4e, 0x6, 0x0, 0x4, 0xfffffffffffffffd}, r5, 0x0, r7, 0x8) r8 = openat$tun(0xffffffffffffff9c, &(0x7f0000000580)='/dev/net/tun\x00', 0x40000, 0x0) ioctl$TUNSETPERSIST(r8, 0x400454cb, 0x1) r9 = socket$kcm(0x29, 0x5, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000800)={0x0, r0, 0x1, 0x2}, 0x14) ioctl$sock_kcm_SIOCKCMUNATTACH(r9, 0x89e1, &(0x7f0000000900)={r2}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r3, 0x0, 0x8b, 0x0, &(0x7f0000000680)="3ce41f426b7dd449ae14b08e1868c456d4fe9c7993884cf18f4dd5a0bc57250243da4203e0640859184bc4c4690afefd7736e8842cd88030448e918bdb5bd9bbbd680a51261557c0477c18049c832005ebb5b185c6f233df73a21d3b3ddad8426fba2d5f8aac5df904d5e5f2e7dc4a517079e08d5b2175a276f2a5c49cc2957cb367f269898570852dd63a", 0x0, 0x5}, 0x28) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000500)='./cgroup/syz0\x00', 0x200002, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000740)={r3, 0x50, &(0x7f00000003c0)}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r2, 0x50, &(0x7f0000000840)}, 0x10) openat$cgroup_subtree(r2, &(0x7f0000000940)='cgroup.subtree_control\x00', 0x2, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x1ff, 0x0, 0x0, 0x0, 0x200000, 0xffffffffffffffff, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280), 0x2}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r10 = socket$kcm(0xa, 0x400000000002, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffc59) ioctl$sock_kcm_SIOCKCMCLONE(r10, 0x890b, &(0x7f0000000000)) ioctl$sock_kcm_SIOCKCMCLONE(r10, 0x890c, &(0x7f0000000000)) 03:53:40 executing program 0: 03:53:40 executing program 2: 03:53:40 executing program 3: 03:53:40 executing program 4: r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x5f}, {&(0x7f00000000c0)=""/85, 0x55}, {&(0x7f0000000fc0)=""/4096, 0x1000}, {&(0x7f0000000400)=""/120, 0x78}, {&(0x7f0000000480)=""/60, 0x3c}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f0000000540)=""/154, 0x9a}, {0x0}], 0x8, &(0x7f0000002400)=""/191, 0xbf}}], 0x1, 0x0, &(0x7f0000003700)={0x77359400}) 03:53:40 executing program 2: 03:53:40 executing program 0: 03:53:41 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x20, &(0x7f0000000b80)=ANY=[@ANYBLOB="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"], 0x0, 0x1625, 0x0, 0x0, 0x41100, 0x1, [], 0x0, 0x4}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r0, 0xdb, &(0x7f0000000200)={0x0, 0x0}}, 0x393) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='cgroup.events\x00', 0x0, 0x0) write$cgroup_int(r2, &(0x7f00000007c0)=0x6, 0x12) r3 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000002c0), 0x4) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz1\x00', 0x1ff) r4 = perf_event_open$cgroup(&(0x7f0000000600)={0x0, 0x70, 0x9, 0x6, 0x8, 0x6, 0x0, 0xfffffffffffff49f, 0x2, 0x6, 0x3ff, 0x0, 0x20, 0x0, 0x1, 0x81, 0x1, 0x400, 0x4, 0xfac, 0x0, 0x1, 0x10000, 0xf1, 0xd3, 0x92b, 0x200, 0x1, 0x100000000, 0x2, 0x100000000, 0xfff, 0xfff, 0xffff, 0x3, 0xfffffffffffffffd, 0x0, 0x6, 0x0, 0x50, 0x0, @perf_config_ext={0x3f, 0x9}, 0x20000, 0x8, 0xef3, 0x7, 0x100000000, 0x8, 0xfff}, 0xffffffffffffffff, 0x2, r0, 0x8) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000b40)='cgroup.subtree_control\x00') ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x2400, 0x1) r5 = getpid() socketpair$unix(0x1, 0x7, 0x0, &(0x7f0000000540)={0xffffffffffffffff}) setsockopt$sock_attach_bpf(r6, 0x1, 0x32, &(0x7f00000005c0)=r3, 0x4) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={0x0, 0xffffffffffffffff, 0x0, 0x12, &(0x7f0000000480)='./cgroup.cpu/syz1\x00', r1}, 0x30) perf_event_open(&(0x7f0000000300)={0x5, 0x70, 0xff, 0x4, 0x1000, 0xe5af, 0x0, 0x8000, 0xd0440, 0x2, 0xffff, 0x1, 0x4, 0x1f, 0x3, 0xfffffffffffffffa, 0x5, 0x9, 0x8, 0x1, 0x3, 0x400, 0x6, 0x5, 0x401, 0x10000, 0xff, 0xb24, 0xffffffffffff8000, 0xc8a, 0x3f, 0xfffffffffffffffa, 0xffffffffffff8001, 0x200, 0x5, 0x3, 0x2, 0x93a, 0x0, 0x7fff, 0x2, @perf_bp={&(0x7f0000000100), 0x1}, 0x0, 0x0, 0xffffffffffffff4e, 0x6, 0x0, 0x4, 0xfffffffffffffffd}, r5, 0x0, r7, 0x8) r8 = openat$tun(0xffffffffffffff9c, &(0x7f0000000580)='/dev/net/tun\x00', 0x40000, 0x0) ioctl$TUNSETPERSIST(r8, 0x400454cb, 0x1) r9 = socket$kcm(0x29, 0x5, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000800)={0x0, r0, 0x1, 0x2}, 0x14) ioctl$sock_kcm_SIOCKCMUNATTACH(r9, 0x89e1, &(0x7f0000000900)={r2}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r3, 0x0, 0x8b, 0x0, &(0x7f0000000680)="3ce41f426b7dd449ae14b08e1868c456d4fe9c7993884cf18f4dd5a0bc57250243da4203e0640859184bc4c4690afefd7736e8842cd88030448e918bdb5bd9bbbd680a51261557c0477c18049c832005ebb5b185c6f233df73a21d3b3ddad8426fba2d5f8aac5df904d5e5f2e7dc4a517079e08d5b2175a276f2a5c49cc2957cb367f269898570852dd63a", 0x0, 0x5}, 0x28) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000500)='./cgroup/syz0\x00', 0x200002, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000740)={r3, 0x50, &(0x7f00000003c0)}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r2, 0x50, &(0x7f0000000840)}, 0x10) openat$cgroup_subtree(r2, &(0x7f0000000940)='cgroup.subtree_control\x00', 0x2, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x1ff, 0x0, 0x0, 0x0, 0x200000, 0xffffffffffffffff, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280), 0x2}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r10 = socket$kcm(0xa, 0x400000000002, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffc59) ioctl$sock_kcm_SIOCKCMCLONE(r10, 0x890b, &(0x7f0000000000)) ioctl$sock_kcm_SIOCKCMCLONE(r10, 0x890c, &(0x7f0000000000)) 03:53:41 executing program 3: 03:53:41 executing program 4: r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x5f}, {&(0x7f00000000c0)=""/85, 0x55}, {&(0x7f0000000fc0)=""/4096, 0x1000}, {&(0x7f0000000400)=""/120, 0x78}, {&(0x7f0000000480)=""/60, 0x3c}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f0000000340)=""/22, 0x16}], 0x7, &(0x7f0000002400)=""/191, 0xbf}}], 0x1, 0x0, &(0x7f0000003700)={0x77359400}) 03:53:41 executing program 0: 03:53:41 executing program 5: getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffff9c, 0x84, 0x13, 0x0, 0x0) syz_open_dev$swradio(&(0x7f0000000000)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$radio(0x0, 0xffffffffffffffff, 0x2) r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) getdents64(r0, 0x0, 0x0) r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r1, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r1, 0x8) r2 = socket$inet6_sctp(0xa, 0x805, 0x84) r3 = accept4(r1, 0x0, 0x0, 0x0) prctl$PR_SET_ENDIAN(0x14, 0x1) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r2, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) epoll_pwait(0xffffffffffffffff, &(0x7f0000000040)=[{}], 0x1, 0x0, &(0x7f0000000080), 0x8) getpgid(0x0) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r3, 0x84, 0x9, &(0x7f0000000280)={0x0, @in={{0x2, 0x0, @empty}}, 0x0, 0xac14142400000000, 0x0, 0x0, 0x54}, 0x98) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) ioctl$SIOCAX25ADDFWD(0xffffffffffffffff, 0x89ea, 0x0) syz_mount_image$gfs2(&(0x7f00000003c0)='gfs2\x00', 0x0, 0x87, 0x0, &(0x7f00000005c0), 0x1040040, 0x0) readv(r0, &(0x7f0000000500)=[{&(0x7f0000000400)=""/217, 0xd9}], 0x1) 03:53:41 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x20, &(0x7f0000000b80)=ANY=[@ANYBLOB="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"], 0x0, 0x1625, 0x0, 0x0, 0x41100, 0x1, [], 0x0, 0x4}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r0, 0xdb, &(0x7f0000000200)={0x0, 0x0}}, 0x393) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='cgroup.events\x00', 0x0, 0x0) write$cgroup_int(r2, &(0x7f00000007c0)=0x6, 0x12) r3 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000002c0), 0x4) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz1\x00', 0x1ff) r4 = perf_event_open$cgroup(&(0x7f0000000600)={0x0, 0x70, 0x9, 0x6, 0x8, 0x6, 0x0, 0xfffffffffffff49f, 0x2, 0x6, 0x3ff, 0x0, 0x20, 0x0, 0x1, 0x81, 0x1, 0x400, 0x4, 0xfac, 0x0, 0x1, 0x10000, 0xf1, 0xd3, 0x92b, 0x200, 0x1, 0x100000000, 0x2, 0x100000000, 0xfff, 0xfff, 0xffff, 0x3, 0xfffffffffffffffd, 0x0, 0x6, 0x0, 0x50, 0x0, @perf_config_ext={0x3f, 0x9}, 0x20000, 0x8, 0xef3, 0x7, 0x100000000, 0x8, 0xfff}, 0xffffffffffffffff, 0x2, r0, 0x8) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000b40)='cgroup.subtree_control\x00') ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x2400, 0x1) r5 = getpid() socketpair$unix(0x1, 0x7, 0x0, &(0x7f0000000540)={0xffffffffffffffff}) setsockopt$sock_attach_bpf(r6, 0x1, 0x32, &(0x7f00000005c0)=r3, 0x4) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={0x0, 0xffffffffffffffff, 0x0, 0x12, &(0x7f0000000480)='./cgroup.cpu/syz1\x00', r1}, 0x30) perf_event_open(&(0x7f0000000300)={0x5, 0x70, 0xff, 0x4, 0x1000, 0xe5af, 0x0, 0x8000, 0xd0440, 0x2, 0xffff, 0x1, 0x4, 0x1f, 0x3, 0xfffffffffffffffa, 0x5, 0x9, 0x8, 0x1, 0x3, 0x400, 0x6, 0x5, 0x401, 0x10000, 0xff, 0xb24, 0xffffffffffff8000, 0xc8a, 0x3f, 0xfffffffffffffffa, 0xffffffffffff8001, 0x200, 0x5, 0x3, 0x2, 0x93a, 0x0, 0x7fff, 0x2, @perf_bp={&(0x7f0000000100), 0x1}, 0x0, 0x0, 0xffffffffffffff4e, 0x6, 0x0, 0x4, 0xfffffffffffffffd}, r5, 0x0, r7, 0x8) r8 = openat$tun(0xffffffffffffff9c, &(0x7f0000000580)='/dev/net/tun\x00', 0x40000, 0x0) ioctl$TUNSETPERSIST(r8, 0x400454cb, 0x1) r9 = socket$kcm(0x29, 0x5, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000800)={0x0, r0, 0x1, 0x2}, 0x14) ioctl$sock_kcm_SIOCKCMUNATTACH(r9, 0x89e1, &(0x7f0000000900)={r2}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r3, 0x0, 0x8b, 0x0, &(0x7f0000000680)="3ce41f426b7dd449ae14b08e1868c456d4fe9c7993884cf18f4dd5a0bc57250243da4203e0640859184bc4c4690afefd7736e8842cd88030448e918bdb5bd9bbbd680a51261557c0477c18049c832005ebb5b185c6f233df73a21d3b3ddad8426fba2d5f8aac5df904d5e5f2e7dc4a517079e08d5b2175a276f2a5c49cc2957cb367f269898570852dd63a", 0x0, 0x5}, 0x28) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000500)='./cgroup/syz0\x00', 0x200002, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000740)={r3, 0x50, &(0x7f00000003c0)}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r2, 0x50, &(0x7f0000000840)}, 0x10) openat$cgroup_subtree(r2, &(0x7f0000000940)='cgroup.subtree_control\x00', 0x2, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x1ff, 0x0, 0x0, 0x0, 0x200000, 0xffffffffffffffff, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280), 0x2}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r10 = socket$kcm(0xa, 0x400000000002, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffc59) ioctl$sock_kcm_SIOCKCMCLONE(r10, 0x890b, &(0x7f0000000000)) ioctl$sock_kcm_SIOCKCMCLONE(r10, 0x890c, &(0x7f0000000000)) 03:53:41 executing program 0: 03:53:41 executing program 2: 03:53:41 executing program 4: r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x5f}, {&(0x7f00000000c0)=""/85, 0x55}, {&(0x7f0000000fc0)=""/4096, 0x1000}, {&(0x7f0000000400)=""/120, 0x78}, {&(0x7f0000000480)=""/60, 0x3c}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f0000000340)=""/22, 0x16}], 0x7, &(0x7f0000002400)=""/191, 0xbf}}], 0x1, 0x0, &(0x7f0000003700)={0x77359400}) 03:53:41 executing program 3: 03:53:41 executing program 2: 03:53:41 executing program 0: 03:53:41 executing program 3: 03:53:41 executing program 4: r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x5f}, {&(0x7f00000000c0)=""/85, 0x55}, {&(0x7f0000000fc0)=""/4096, 0x1000}, {&(0x7f0000000400)=""/120, 0x78}, {&(0x7f0000000480)=""/60, 0x3c}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f0000000340)=""/22, 0x16}], 0x7, &(0x7f0000002400)=""/191, 0xbf}}], 0x1, 0x0, &(0x7f0000003700)={0x77359400}) 03:53:41 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x20, &(0x7f0000000b80)=ANY=[@ANYBLOB="cab5674ca80400f902c8d3fc17d4a51472ff5e04a7ed68e9074e865fffffffffff6582e2a0c58f438f1a9b1af27305fb6c1d497851a00d51dddde821f356222d82de15a5bb3ca4d544c3683ff903b30637ee634a8a4fa0e19e57c7d35e4db3a02231b71023a910ac2424326e31258bde7ca760ff3ca3261a92112b3c8db9e0d79dc5ad29e05434154bba1e60d243d8fa466b27518c09e11b78ec43ab7af1d33fbd4885ee5e95b0849345d0edef0a2e68320a47938597cf0fba5ae2e93301ffc38baaf2673b7fd4628a0fe3665006d238567bdb430991e02866ad858345dc86331d91a53051b3284827fc0a870d857ecc180901feb2d1dd3be0c1ebc3fa1d00d550744d9e55"], 0x0, 0x1625, 0x0, 0x0, 0x41100, 0x1, [], 0x0, 0x4}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r0, 0xdb, &(0x7f0000000200)={0x0, 0x0}}, 0x393) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='cgroup.events\x00', 0x0, 0x0) write$cgroup_int(r2, &(0x7f00000007c0)=0x6, 0x12) r3 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000002c0), 0x4) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz1\x00', 0x1ff) r4 = perf_event_open$cgroup(&(0x7f0000000600)={0x0, 0x70, 0x9, 0x6, 0x8, 0x6, 0x0, 0xfffffffffffff49f, 0x2, 0x6, 0x3ff, 0x0, 0x20, 0x0, 0x1, 0x81, 0x1, 0x400, 0x4, 0xfac, 0x0, 0x1, 0x10000, 0xf1, 0xd3, 0x92b, 0x200, 0x1, 0x100000000, 0x2, 0x100000000, 0xfff, 0xfff, 0xffff, 0x3, 0xfffffffffffffffd, 0x0, 0x6, 0x0, 0x50, 0x0, @perf_config_ext={0x3f, 0x9}, 0x20000, 0x8, 0xef3, 0x7, 0x100000000, 0x8, 0xfff}, 0xffffffffffffffff, 0x2, r0, 0x8) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000b40)='cgroup.subtree_control\x00') ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x2400, 0x1) r5 = getpid() socketpair$unix(0x1, 0x7, 0x0, &(0x7f0000000540)={0xffffffffffffffff}) setsockopt$sock_attach_bpf(r6, 0x1, 0x32, &(0x7f00000005c0)=r3, 0x4) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={0x0, 0xffffffffffffffff, 0x0, 0x12, &(0x7f0000000480)='./cgroup.cpu/syz1\x00', r1}, 0x30) perf_event_open(&(0x7f0000000300)={0x5, 0x70, 0xff, 0x4, 0x1000, 0xe5af, 0x0, 0x8000, 0xd0440, 0x2, 0xffff, 0x1, 0x4, 0x1f, 0x3, 0xfffffffffffffffa, 0x5, 0x9, 0x8, 0x1, 0x3, 0x400, 0x6, 0x5, 0x401, 0x10000, 0xff, 0xb24, 0xffffffffffff8000, 0xc8a, 0x3f, 0xfffffffffffffffa, 0xffffffffffff8001, 0x200, 0x5, 0x3, 0x2, 0x93a, 0x0, 0x7fff, 0x2, @perf_bp={&(0x7f0000000100), 0x1}, 0x0, 0x0, 0xffffffffffffff4e, 0x6, 0x0, 0x4, 0xfffffffffffffffd}, r5, 0x0, r7, 0x8) r8 = openat$tun(0xffffffffffffff9c, &(0x7f0000000580)='/dev/net/tun\x00', 0x40000, 0x0) ioctl$TUNSETPERSIST(r8, 0x400454cb, 0x1) r9 = socket$kcm(0x29, 0x5, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000800)={0x0, r0, 0x1, 0x2}, 0x14) ioctl$sock_kcm_SIOCKCMUNATTACH(r9, 0x89e1, &(0x7f0000000900)={r2}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r3, 0x0, 0x8b, 0x0, &(0x7f0000000680)="3ce41f426b7dd449ae14b08e1868c456d4fe9c7993884cf18f4dd5a0bc57250243da4203e0640859184bc4c4690afefd7736e8842cd88030448e918bdb5bd9bbbd680a51261557c0477c18049c832005ebb5b185c6f233df73a21d3b3ddad8426fba2d5f8aac5df904d5e5f2e7dc4a517079e08d5b2175a276f2a5c49cc2957cb367f269898570852dd63a", 0x0, 0x5}, 0x28) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000500)='./cgroup/syz0\x00', 0x200002, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000740)={r3, 0x50, &(0x7f00000003c0)}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r2, 0x50, &(0x7f0000000840)}, 0x10) openat$cgroup_subtree(r2, &(0x7f0000000940)='cgroup.subtree_control\x00', 0x2, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x1ff, 0x0, 0x0, 0x0, 0x200000, 0xffffffffffffffff, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280), 0x2}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r10 = socket$kcm(0xa, 0x400000000002, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffc59) ioctl$sock_kcm_SIOCKCMCLONE(r10, 0x890b, &(0x7f0000000000)) ioctl$sock_kcm_SIOCKCMCLONE(r10, 0x890c, &(0x7f0000000000)) 03:53:41 executing program 3: 03:53:42 executing program 5: getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffff9c, 0x84, 0x13, 0x0, 0x0) r0 = syz_open_dev$swradio(&(0x7f0000000000)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$radio(0x0, 0xffffffffffffffff, 0x2) r1 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) getdents64(r1, 0x0, 0x0) r2 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r2, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r2, 0x8) r3 = socket$inet6_sctp(0xa, 0x805, 0x84) r4 = accept4(r2, 0x0, 0x0, 0x0) prctl$PR_SET_ENDIAN(0x14, 0x1) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r3, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) epoll_pwait(0xffffffffffffffff, &(0x7f0000000040)=[{}], 0x1, 0x0, &(0x7f0000000080), 0x8) getpgid(0x0) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r4, 0x84, 0x9, &(0x7f0000000280)={0x0, @in={{0x2, 0x0, @empty}}, 0x0, 0xac14142400000000, 0x0, 0x0, 0x54}, 0x98) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) ioctl$SIOCAX25ADDFWD(r0, 0x89ea, 0x0) syz_mount_image$gfs2(0x0, 0x0, 0x87, 0x0, &(0x7f00000005c0), 0x1040040, 0x0) readv(r1, &(0x7f0000000500)=[{&(0x7f0000000400)=""/217, 0xd9}], 0x1) 03:53:42 executing program 2: 03:53:42 executing program 0: 03:53:42 executing program 4: r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x5f}, {&(0x7f00000000c0)=""/85, 0x55}, {&(0x7f0000000fc0)=""/4096, 0x1000}, {&(0x7f0000000400)=""/120, 0x78}, {&(0x7f0000000480)=""/60, 0x3c}, {&(0x7f0000000200)=""/77, 0x4d}, {0x0}, {&(0x7f0000000340)=""/22, 0x16}], 0x8, &(0x7f0000002400)=""/191, 0xbf}}], 0x1, 0x0, &(0x7f0000003700)={0x77359400}) 03:53:42 executing program 3: 03:53:42 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x20, &(0x7f0000000b80)=ANY=[@ANYBLOB="cab5674ca80400f902c8d3fc17d4a51472ff5e04a7ed68e9074e865fffffffffff6582e2a0c58f438f1a9b1af27305fb6c1d497851a00d51dddde821f356222d82de15a5bb3ca4d544c3683ff903b30637ee634a8a4fa0e19e57c7d35e4db3a02231b71023a910ac2424326e31258bde7ca760ff3ca3261a92112b3c8db9e0d79dc5ad29e05434154bba1e60d243d8fa466b27518c09e11b78ec43ab7af1d33fbd4885ee5e95b0849345d0edef0a2e68320a47938597cf0fba5ae2e93301ffc38baaf2673b7fd4628a0fe3665006d238567bdb430991e02866ad858345dc86331d91a53051b3284827fc0a870d857ecc180901feb2d1dd3be0c1ebc3fa1d00d550744d9e55"], 0x0, 0x1625, 0x0, 0x0, 0x41100, 0x1, [], 0x0, 0x4}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r0, 0xdb, &(0x7f0000000200)={0x0, 0x0}}, 0x393) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='cgroup.events\x00', 0x0, 0x0) write$cgroup_int(r2, &(0x7f00000007c0)=0x6, 0x12) r3 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000002c0), 0x4) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz1\x00', 0x1ff) r4 = perf_event_open$cgroup(&(0x7f0000000600)={0x0, 0x70, 0x9, 0x6, 0x8, 0x6, 0x0, 0xfffffffffffff49f, 0x2, 0x6, 0x3ff, 0x0, 0x20, 0x0, 0x1, 0x81, 0x1, 0x400, 0x4, 0xfac, 0x4, 0x0, 0x10000, 0xf1, 0xd3, 0x92b, 0x200, 0x1, 0x100000000, 0x2, 0x100000000, 0xfff, 0xfff, 0xffff, 0x3, 0xfffffffffffffffd, 0x0, 0x6, 0x0, 0x50, 0x0, @perf_config_ext={0x3f, 0x9}, 0x20000, 0x8, 0xef3, 0x7, 0x100000000, 0x8, 0xfff}, 0xffffffffffffffff, 0x2, r0, 0x8) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000b40)='cgroup.subtree_control\x00') ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x2400, 0x1) r5 = getpid() socketpair$unix(0x1, 0x7, 0x0, &(0x7f0000000540)={0xffffffffffffffff}) setsockopt$sock_attach_bpf(r6, 0x1, 0x32, &(0x7f00000005c0)=r3, 0x4) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={0x0, 0xffffffffffffffff, 0x0, 0x12, &(0x7f0000000480)='./cgroup.cpu/syz1\x00', r1}, 0x30) perf_event_open(&(0x7f0000000300)={0x5, 0x70, 0xff, 0x4, 0x1000, 0xe5af, 0x0, 0x8000, 0xd0440, 0x2, 0xffff, 0x1, 0x4, 0x1f, 0x3, 0xfffffffffffffffa, 0x5, 0x9, 0x8, 0x1, 0x3, 0x400, 0x6, 0x5, 0x401, 0x10000, 0xff, 0xb24, 0xffffffffffff8000, 0xc8a, 0x3f, 0xfffffffffffffffa, 0xffffffffffff8001, 0x200, 0x5, 0x3, 0x2, 0x93a, 0x0, 0x7fff, 0x2, @perf_bp={&(0x7f0000000100), 0x1}, 0x0, 0x0, 0xffffffffffffff4e, 0x6, 0x0, 0x4, 0xfffffffffffffffd}, r5, 0x0, r7, 0x8) r8 = openat$tun(0xffffffffffffff9c, &(0x7f0000000580)='/dev/net/tun\x00', 0x40000, 0x0) ioctl$TUNSETPERSIST(r8, 0x400454cb, 0x1) r9 = socket$kcm(0x29, 0x5, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000800)={0x0, r0, 0x1, 0x2}, 0x14) ioctl$sock_kcm_SIOCKCMUNATTACH(r9, 0x89e1, &(0x7f0000000900)={r2}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r3, 0x0, 0x8b, 0x0, &(0x7f0000000680)="3ce41f426b7dd449ae14b08e1868c456d4fe9c7993884cf18f4dd5a0bc57250243da4203e0640859184bc4c4690afefd7736e8842cd88030448e918bdb5bd9bbbd680a51261557c0477c18049c832005ebb5b185c6f233df73a21d3b3ddad8426fba2d5f8aac5df904d5e5f2e7dc4a517079e08d5b2175a276f2a5c49cc2957cb367f269898570852dd63a", 0x0, 0x5}, 0x28) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000500)='./cgroup/syz0\x00', 0x200002, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000740)={r3, 0x50, &(0x7f00000003c0)}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r2, 0x50, &(0x7f0000000840)}, 0x10) openat$cgroup_subtree(r2, &(0x7f0000000940)='cgroup.subtree_control\x00', 0x2, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x1ff, 0x0, 0x0, 0x0, 0x200000, 0xffffffffffffffff, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280), 0x2}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r10 = socket$kcm(0xa, 0x400000000002, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffc59) ioctl$sock_kcm_SIOCKCMCLONE(r10, 0x890b, &(0x7f0000000000)) ioctl$sock_kcm_SIOCKCMCLONE(r10, 0x890c, &(0x7f0000000000)) 03:53:42 executing program 0: 03:53:42 executing program 3: 03:53:42 executing program 2: 03:53:42 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x20, &(0x7f0000000b80)=ANY=[@ANYBLOB="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"], 0x0, 0x1625, 0x0, 0x0, 0x41100, 0x1, [], 0x0, 0x4}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r0, 0xdb, &(0x7f0000000200)={0x0, 0x0}}, 0x393) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='cgroup.events\x00', 0x0, 0x0) write$cgroup_int(r2, &(0x7f00000007c0)=0x6, 0x12) r3 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000002c0), 0x4) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz1\x00', 0x1ff) r4 = perf_event_open$cgroup(&(0x7f0000000600)={0x0, 0x70, 0x9, 0x6, 0x8, 0x6, 0x0, 0xfffffffffffff49f, 0x2, 0x6, 0x3ff, 0x0, 0x20, 0x0, 0x1, 0x81, 0x1, 0x400, 0x4, 0xfac, 0x4, 0x0, 0x10000, 0xf1, 0xd3, 0x92b, 0x200, 0x1, 0x100000000, 0x2, 0x100000000, 0xfff, 0xfff, 0xffff, 0x3, 0xfffffffffffffffd, 0x0, 0x6, 0x0, 0x50, 0x0, @perf_config_ext={0x3f, 0x9}, 0x20000, 0x8, 0xef3, 0x7, 0x100000000, 0x8, 0xfff}, 0xffffffffffffffff, 0x2, r0, 0x8) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000b40)='cgroup.subtree_control\x00') ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x2400, 0x1) r5 = getpid() socketpair$unix(0x1, 0x7, 0x0, &(0x7f0000000540)={0xffffffffffffffff}) setsockopt$sock_attach_bpf(r6, 0x1, 0x32, &(0x7f00000005c0)=r3, 0x4) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={0x0, 0xffffffffffffffff, 0x0, 0x12, &(0x7f0000000480)='./cgroup.cpu/syz1\x00', r1}, 0x30) perf_event_open(&(0x7f0000000300)={0x5, 0x70, 0xff, 0x4, 0x1000, 0xe5af, 0x0, 0x8000, 0xd0440, 0x2, 0xffff, 0x1, 0x4, 0x1f, 0x3, 0xfffffffffffffffa, 0x5, 0x9, 0x8, 0x1, 0x3, 0x400, 0x6, 0x5, 0x401, 0x10000, 0xff, 0xb24, 0xffffffffffff8000, 0xc8a, 0x3f, 0xfffffffffffffffa, 0xffffffffffff8001, 0x200, 0x5, 0x3, 0x2, 0x93a, 0x0, 0x7fff, 0x2, @perf_bp={&(0x7f0000000100), 0x1}, 0x0, 0x0, 0xffffffffffffff4e, 0x6, 0x0, 0x4, 0xfffffffffffffffd}, r5, 0x0, r7, 0x8) r8 = openat$tun(0xffffffffffffff9c, &(0x7f0000000580)='/dev/net/tun\x00', 0x40000, 0x0) ioctl$TUNSETPERSIST(r8, 0x400454cb, 0x1) r9 = socket$kcm(0x29, 0x5, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000800)={0x0, r0, 0x1, 0x2}, 0x14) ioctl$sock_kcm_SIOCKCMUNATTACH(r9, 0x89e1, &(0x7f0000000900)={r2}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r3, 0x0, 0x8b, 0x0, &(0x7f0000000680)="3ce41f426b7dd449ae14b08e1868c456d4fe9c7993884cf18f4dd5a0bc57250243da4203e0640859184bc4c4690afefd7736e8842cd88030448e918bdb5bd9bbbd680a51261557c0477c18049c832005ebb5b185c6f233df73a21d3b3ddad8426fba2d5f8aac5df904d5e5f2e7dc4a517079e08d5b2175a276f2a5c49cc2957cb367f269898570852dd63a", 0x0, 0x5}, 0x28) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000500)='./cgroup/syz0\x00', 0x200002, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000740)={r3, 0x50, &(0x7f00000003c0)}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r2, 0x50, &(0x7f0000000840)}, 0x10) openat$cgroup_subtree(r2, &(0x7f0000000940)='cgroup.subtree_control\x00', 0x2, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x1ff, 0x0, 0x0, 0x0, 0x200000, 0xffffffffffffffff, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280), 0x2}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r10 = socket$kcm(0xa, 0x400000000002, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffc59) ioctl$sock_kcm_SIOCKCMCLONE(r10, 0x890b, &(0x7f0000000000)) ioctl$sock_kcm_SIOCKCMCLONE(r10, 0x890c, &(0x7f0000000000)) 03:53:42 executing program 4: r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x5f}, {&(0x7f00000000c0)=""/85, 0x55}, {&(0x7f0000000fc0)=""/4096, 0x1000}, {&(0x7f0000000400)=""/120, 0x78}, {&(0x7f0000000480)=""/60, 0x3c}, {&(0x7f0000000200)=""/77, 0x4d}, {0x0}, {&(0x7f0000000340)=""/22, 0x16}], 0x8, &(0x7f0000002400)=""/191, 0xbf}}], 0x1, 0x0, &(0x7f0000003700)={0x77359400}) 03:53:42 executing program 3: 03:53:42 executing program 5: getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffff9c, 0x84, 0x13, 0x0, 0x0) r0 = syz_open_dev$swradio(&(0x7f0000000000)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$radio(0x0, 0xffffffffffffffff, 0x2) r1 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) getdents64(r1, 0x0, 0x0) r2 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r2, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r2, 0x8) r3 = socket$inet6_sctp(0xa, 0x805, 0x84) r4 = accept4(r2, 0x0, 0x0, 0x0) prctl$PR_SET_ENDIAN(0x14, 0x1) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r3, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) epoll_pwait(0xffffffffffffffff, &(0x7f0000000040)=[{}], 0x1, 0x0, &(0x7f0000000080), 0x8) getpgid(0x0) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r4, 0x84, 0x9, &(0x7f0000000280)={0x0, @in={{0x2, 0x0, @empty}}, 0x0, 0xac14142400000000, 0x0, 0x0, 0x54}, 0x98) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) ioctl$SIOCAX25ADDFWD(r0, 0x89ea, 0x0) syz_mount_image$gfs2(0x0, 0x0, 0x87, 0x0, &(0x7f00000005c0), 0x1040040, 0x0) readv(r1, &(0x7f0000000500)=[{&(0x7f0000000400)=""/217, 0xd9}], 0x1) 03:53:42 executing program 0: 03:53:42 executing program 2: 03:53:42 executing program 3: 03:53:42 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x20, &(0x7f0000000b80)=ANY=[@ANYBLOB="cab5674ca80400f902c8d3fc17d4a51472ff5e04a7ed68e9074e865fffffffffff6582e2a0c58f438f1a9b1af27305fb6c1d497851a00d51dddde821f356222d82de15a5bb3ca4d544c3683ff903b30637ee634a8a4fa0e19e57c7d35e4db3a02231b71023a910ac2424326e31258bde7ca760ff3ca3261a92112b3c8db9e0d79dc5ad29e05434154bba1e60d243d8fa466b27518c09e11b78ec43ab7af1d33fbd4885ee5e95b0849345d0edef0a2e68320a47938597cf0fba5ae2e93301ffc38baaf2673b7fd4628a0fe3665006d238567bdb430991e02866ad858345dc86331d91a53051b3284827fc0a870d857ecc180901feb2d1dd3be0c1ebc3fa1d00d550744d9e55"], 0x0, 0x1625, 0x0, 0x0, 0x41100, 0x1, [], 0x0, 0x4}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r0, 0xdb, &(0x7f0000000200)={0x0, 0x0}}, 0x393) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='cgroup.events\x00', 0x0, 0x0) write$cgroup_int(r2, &(0x7f00000007c0)=0x6, 0x12) r3 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000002c0), 0x4) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz1\x00', 0x1ff) r4 = perf_event_open$cgroup(&(0x7f0000000600)={0x0, 0x70, 0x9, 0x6, 0x8, 0x6, 0x0, 0xfffffffffffff49f, 0x2, 0x6, 0x3ff, 0x0, 0x20, 0x0, 0x1, 0x81, 0x1, 0x400, 0x4, 0xfac, 0x4, 0x0, 0x10000, 0xf1, 0xd3, 0x92b, 0x200, 0x1, 0x100000000, 0x2, 0x100000000, 0xfff, 0xfff, 0xffff, 0x3, 0xfffffffffffffffd, 0x0, 0x6, 0x0, 0x50, 0x0, @perf_config_ext={0x3f, 0x9}, 0x20000, 0x8, 0xef3, 0x7, 0x100000000, 0x8, 0xfff}, 0xffffffffffffffff, 0x2, r0, 0x8) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000b40)='cgroup.subtree_control\x00') ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x2400, 0x1) r5 = getpid() socketpair$unix(0x1, 0x7, 0x0, &(0x7f0000000540)={0xffffffffffffffff}) setsockopt$sock_attach_bpf(r6, 0x1, 0x32, &(0x7f00000005c0)=r3, 0x4) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={0x0, 0xffffffffffffffff, 0x0, 0x12, &(0x7f0000000480)='./cgroup.cpu/syz1\x00', r1}, 0x30) perf_event_open(&(0x7f0000000300)={0x5, 0x70, 0xff, 0x4, 0x1000, 0xe5af, 0x0, 0x8000, 0xd0440, 0x2, 0xffff, 0x1, 0x4, 0x1f, 0x3, 0xfffffffffffffffa, 0x5, 0x9, 0x8, 0x1, 0x3, 0x400, 0x6, 0x5, 0x401, 0x10000, 0xff, 0xb24, 0xffffffffffff8000, 0xc8a, 0x3f, 0xfffffffffffffffa, 0xffffffffffff8001, 0x200, 0x5, 0x3, 0x2, 0x93a, 0x0, 0x7fff, 0x2, @perf_bp={&(0x7f0000000100), 0x1}, 0x0, 0x0, 0xffffffffffffff4e, 0x6, 0x0, 0x4, 0xfffffffffffffffd}, r5, 0x0, r7, 0x8) r8 = openat$tun(0xffffffffffffff9c, &(0x7f0000000580)='/dev/net/tun\x00', 0x40000, 0x0) ioctl$TUNSETPERSIST(r8, 0x400454cb, 0x1) r9 = socket$kcm(0x29, 0x5, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000800)={0x0, r0, 0x1, 0x2}, 0x14) ioctl$sock_kcm_SIOCKCMUNATTACH(r9, 0x89e1, &(0x7f0000000900)={r2}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r3, 0x0, 0x8b, 0x0, &(0x7f0000000680)="3ce41f426b7dd449ae14b08e1868c456d4fe9c7993884cf18f4dd5a0bc57250243da4203e0640859184bc4c4690afefd7736e8842cd88030448e918bdb5bd9bbbd680a51261557c0477c18049c832005ebb5b185c6f233df73a21d3b3ddad8426fba2d5f8aac5df904d5e5f2e7dc4a517079e08d5b2175a276f2a5c49cc2957cb367f269898570852dd63a", 0x0, 0x5}, 0x28) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000500)='./cgroup/syz0\x00', 0x200002, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000740)={r3, 0x50, &(0x7f00000003c0)}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r2, 0x50, &(0x7f0000000840)}, 0x10) openat$cgroup_subtree(r2, &(0x7f0000000940)='cgroup.subtree_control\x00', 0x2, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x1ff, 0x0, 0x0, 0x0, 0x200000, 0xffffffffffffffff, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280), 0x2}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r10 = socket$kcm(0xa, 0x400000000002, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffc59) ioctl$sock_kcm_SIOCKCMCLONE(r10, 0x890b, &(0x7f0000000000)) ioctl$sock_kcm_SIOCKCMCLONE(r10, 0x890c, &(0x7f0000000000)) 03:53:42 executing program 4: r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x5f}, {&(0x7f00000000c0)=""/85, 0x55}, {&(0x7f0000000fc0)=""/4096, 0x1000}, {&(0x7f0000000400)=""/120, 0x78}, {&(0x7f0000000480)=""/60, 0x3c}, {&(0x7f0000000200)=""/77, 0x4d}, {0x0}, {&(0x7f0000000340)=""/22, 0x16}], 0x8, &(0x7f0000002400)=""/191, 0xbf}}], 0x1, 0x0, &(0x7f0000003700)={0x77359400}) 03:53:42 executing program 0: 03:53:42 executing program 2: 03:53:42 executing program 3: 03:53:42 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x20, &(0x7f0000000b80)=ANY=[@ANYBLOB="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"], 0x0, 0x1625, 0x0, 0x0, 0x41100, 0x1, [], 0x0, 0x4}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r0, 0xdb, &(0x7f0000000200)={0x0, 0x0}}, 0x393) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='cgroup.events\x00', 0x0, 0x0) write$cgroup_int(r2, &(0x7f00000007c0)=0x6, 0x12) r3 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000002c0), 0x4) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz1\x00', 0x1ff) r4 = perf_event_open$cgroup(&(0x7f0000000600)={0x0, 0x70, 0x9, 0x6, 0x8, 0x6, 0x0, 0xfffffffffffff49f, 0x2, 0x6, 0x3ff, 0x0, 0x20, 0x0, 0x1, 0x81, 0x1, 0x400, 0x4, 0xfac, 0x4, 0x1, 0x0, 0xf1, 0xd3, 0x92b, 0x200, 0x1, 0x100000000, 0x2, 0x100000000, 0xfff, 0xfff, 0xffff, 0x3, 0xfffffffffffffffd, 0x0, 0x6, 0x0, 0x50, 0x0, @perf_config_ext={0x3f, 0x9}, 0x20000, 0x8, 0xef3, 0x7, 0x100000000, 0x8, 0xfff}, 0xffffffffffffffff, 0x2, r0, 0x8) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000b40)='cgroup.subtree_control\x00') ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x2400, 0x1) r5 = getpid() socketpair$unix(0x1, 0x7, 0x0, &(0x7f0000000540)={0xffffffffffffffff}) setsockopt$sock_attach_bpf(r6, 0x1, 0x32, &(0x7f00000005c0)=r3, 0x4) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={0x0, 0xffffffffffffffff, 0x0, 0x12, &(0x7f0000000480)='./cgroup.cpu/syz1\x00', r1}, 0x30) perf_event_open(&(0x7f0000000300)={0x5, 0x70, 0xff, 0x4, 0x1000, 0xe5af, 0x0, 0x8000, 0xd0440, 0x2, 0xffff, 0x1, 0x4, 0x1f, 0x3, 0xfffffffffffffffa, 0x5, 0x9, 0x8, 0x1, 0x3, 0x400, 0x6, 0x5, 0x401, 0x10000, 0xff, 0xb24, 0xffffffffffff8000, 0xc8a, 0x3f, 0xfffffffffffffffa, 0xffffffffffff8001, 0x200, 0x5, 0x3, 0x2, 0x93a, 0x0, 0x7fff, 0x2, @perf_bp={&(0x7f0000000100), 0x1}, 0x0, 0x0, 0xffffffffffffff4e, 0x6, 0x0, 0x4, 0xfffffffffffffffd}, r5, 0x0, r7, 0x8) r8 = openat$tun(0xffffffffffffff9c, &(0x7f0000000580)='/dev/net/tun\x00', 0x40000, 0x0) ioctl$TUNSETPERSIST(r8, 0x400454cb, 0x1) r9 = socket$kcm(0x29, 0x5, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000800)={0x0, r0, 0x1, 0x2}, 0x14) ioctl$sock_kcm_SIOCKCMUNATTACH(r9, 0x89e1, &(0x7f0000000900)={r2}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r3, 0x0, 0x8b, 0x0, &(0x7f0000000680)="3ce41f426b7dd449ae14b08e1868c456d4fe9c7993884cf18f4dd5a0bc57250243da4203e0640859184bc4c4690afefd7736e8842cd88030448e918bdb5bd9bbbd680a51261557c0477c18049c832005ebb5b185c6f233df73a21d3b3ddad8426fba2d5f8aac5df904d5e5f2e7dc4a517079e08d5b2175a276f2a5c49cc2957cb367f269898570852dd63a", 0x0, 0x5}, 0x28) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000500)='./cgroup/syz0\x00', 0x200002, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000740)={r3, 0x50, &(0x7f00000003c0)}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r2, 0x50, &(0x7f0000000840)}, 0x10) openat$cgroup_subtree(r2, &(0x7f0000000940)='cgroup.subtree_control\x00', 0x2, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x1ff, 0x0, 0x0, 0x0, 0x200000, 0xffffffffffffffff, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280), 0x2}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r10 = socket$kcm(0xa, 0x400000000002, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffc59) ioctl$sock_kcm_SIOCKCMCLONE(r10, 0x890b, &(0x7f0000000000)) ioctl$sock_kcm_SIOCKCMCLONE(r10, 0x890c, &(0x7f0000000000)) [ 1850.482705] net_ratelimit: 22 callbacks suppressed [ 1850.482714] protocol 88fb is buggy, dev hsr_slave_0 [ 1850.492844] protocol 88fb is buggy, dev hsr_slave_1 [ 1850.498022] protocol 88fb is buggy, dev hsr_slave_0 [ 1850.503148] protocol 88fb is buggy, dev hsr_slave_1 03:53:42 executing program 4: r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x5f}, {&(0x7f00000000c0)=""/85, 0x55}, {&(0x7f0000000fc0)=""/4096, 0x1000}, {&(0x7f0000000400)=""/120, 0x78}, {&(0x7f0000000480)=""/60, 0x3c}, {&(0x7f0000000540)=""/154, 0x9a}, {&(0x7f0000000340)=""/22, 0x16}], 0x7, &(0x7f0000002400)=""/191, 0xbf}}], 0x1, 0x0, &(0x7f0000003700)={0x77359400}) 03:53:42 executing program 0: 03:53:43 executing program 2: bpf$OBJ_GET_PROG(0x7, 0x0, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt(r0, 0xff, 0x1, &(0x7f0000000040), 0x2f1) 03:53:43 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x3, 0x24, &(0x7f0000001000)=ANY=[@ANYBLOB="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"], 0x0}, 0x48) 03:53:43 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/route\x00') r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") preadv(r0, &(0x7f0000002480)=[{&(0x7f0000000180)=""/4096, 0x1000}], 0x1, 0x0) 03:53:43 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x20, &(0x7f0000000b80)=ANY=[@ANYBLOB="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"], 0x0, 0x1625, 0x0, 0x0, 0x41100, 0x1, [], 0x0, 0x4}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r0, 0xdb, &(0x7f0000000200)={0x0, 0x0}}, 0x393) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='cgroup.events\x00', 0x0, 0x0) write$cgroup_int(r2, &(0x7f00000007c0)=0x6, 0x12) r3 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000002c0), 0x4) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz1\x00', 0x1ff) r4 = perf_event_open$cgroup(&(0x7f0000000600)={0x0, 0x70, 0x9, 0x6, 0x8, 0x6, 0x0, 0xfffffffffffff49f, 0x2, 0x6, 0x3ff, 0x0, 0x20, 0x0, 0x1, 0x81, 0x1, 0x400, 0x4, 0xfac, 0x4, 0x1, 0x0, 0xf1, 0xd3, 0x92b, 0x200, 0x1, 0x100000000, 0x2, 0x100000000, 0xfff, 0xfff, 0xffff, 0x3, 0xfffffffffffffffd, 0x0, 0x6, 0x0, 0x50, 0x0, @perf_config_ext={0x3f, 0x9}, 0x20000, 0x8, 0xef3, 0x7, 0x100000000, 0x8, 0xfff}, 0xffffffffffffffff, 0x2, r0, 0x8) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000b40)='cgroup.subtree_control\x00') ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x2400, 0x1) r5 = getpid() socketpair$unix(0x1, 0x7, 0x0, &(0x7f0000000540)={0xffffffffffffffff}) setsockopt$sock_attach_bpf(r6, 0x1, 0x32, &(0x7f00000005c0)=r3, 0x4) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={0x0, 0xffffffffffffffff, 0x0, 0x12, &(0x7f0000000480)='./cgroup.cpu/syz1\x00', r1}, 0x30) perf_event_open(&(0x7f0000000300)={0x5, 0x70, 0xff, 0x4, 0x1000, 0xe5af, 0x0, 0x8000, 0xd0440, 0x2, 0xffff, 0x1, 0x4, 0x1f, 0x3, 0xfffffffffffffffa, 0x5, 0x9, 0x8, 0x1, 0x3, 0x400, 0x6, 0x5, 0x401, 0x10000, 0xff, 0xb24, 0xffffffffffff8000, 0xc8a, 0x3f, 0xfffffffffffffffa, 0xffffffffffff8001, 0x200, 0x5, 0x3, 0x2, 0x93a, 0x0, 0x7fff, 0x2, @perf_bp={&(0x7f0000000100), 0x1}, 0x0, 0x0, 0xffffffffffffff4e, 0x6, 0x0, 0x4, 0xfffffffffffffffd}, r5, 0x0, r7, 0x8) r8 = openat$tun(0xffffffffffffff9c, &(0x7f0000000580)='/dev/net/tun\x00', 0x40000, 0x0) ioctl$TUNSETPERSIST(r8, 0x400454cb, 0x1) r9 = socket$kcm(0x29, 0x5, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000800)={0x0, r0, 0x1, 0x2}, 0x14) ioctl$sock_kcm_SIOCKCMUNATTACH(r9, 0x89e1, &(0x7f0000000900)={r2}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r3, 0x0, 0x8b, 0x0, &(0x7f0000000680)="3ce41f426b7dd449ae14b08e1868c456d4fe9c7993884cf18f4dd5a0bc57250243da4203e0640859184bc4c4690afefd7736e8842cd88030448e918bdb5bd9bbbd680a51261557c0477c18049c832005ebb5b185c6f233df73a21d3b3ddad8426fba2d5f8aac5df904d5e5f2e7dc4a517079e08d5b2175a276f2a5c49cc2957cb367f269898570852dd63a", 0x0, 0x5}, 0x28) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000500)='./cgroup/syz0\x00', 0x200002, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000740)={r3, 0x50, &(0x7f00000003c0)}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r2, 0x50, &(0x7f0000000840)}, 0x10) openat$cgroup_subtree(r2, &(0x7f0000000940)='cgroup.subtree_control\x00', 0x2, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x1ff, 0x0, 0x0, 0x0, 0x200000, 0xffffffffffffffff, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280), 0x2}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r10 = socket$kcm(0xa, 0x400000000002, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffc59) ioctl$sock_kcm_SIOCKCMCLONE(r10, 0x890b, &(0x7f0000000000)) ioctl$sock_kcm_SIOCKCMCLONE(r10, 0x890c, &(0x7f0000000000)) 03:53:43 executing program 5: getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffff9c, 0x84, 0x13, 0x0, 0x0) r0 = syz_open_dev$swradio(&(0x7f0000000000)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$radio(0x0, 0xffffffffffffffff, 0x2) r1 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) getdents64(r1, 0x0, 0x0) r2 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r2, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r2, 0x8) r3 = socket$inet6_sctp(0xa, 0x805, 0x84) r4 = accept4(r2, 0x0, 0x0, 0x0) prctl$PR_SET_ENDIAN(0x14, 0x1) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r3, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) epoll_pwait(0xffffffffffffffff, &(0x7f0000000040)=[{}], 0x1, 0x0, &(0x7f0000000080), 0x8) getpgid(0x0) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r4, 0x84, 0x9, &(0x7f0000000280)={0x0, @in={{0x2, 0x0, @empty}}, 0x0, 0xac14142400000000, 0x0, 0x0, 0x54}, 0x98) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) ioctl$SIOCAX25ADDFWD(r0, 0x89ea, 0x0) syz_mount_image$gfs2(0x0, 0x0, 0x87, 0x0, &(0x7f00000005c0), 0x1040040, 0x0) readv(r1, &(0x7f0000000500)=[{&(0x7f0000000400)=""/217, 0xd9}], 0x1) 03:53:43 executing program 4: r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x5f}, {&(0x7f00000000c0)=""/85, 0x55}, {&(0x7f0000000fc0)=""/4096, 0x1000}, {&(0x7f0000000400)=""/120, 0x78}, {&(0x7f0000000480)=""/60, 0x3c}, {&(0x7f0000000540)=""/154, 0x9a}, {&(0x7f0000000340)=""/22, 0x16}], 0x7, &(0x7f0000002400)=""/191, 0xbf}}], 0x1, 0x0, &(0x7f0000003700)={0x77359400}) 03:53:43 executing program 3: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000000)=""/148, 0x94}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/sockstat\x00') preadv(r0, &(0x7f0000000700), 0x31f, 0x10400003) 03:53:43 executing program 2: r0 = syz_open_dev$sndtimer(&(0x7f0000000140)='/dev/snd/timer\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x0) r1 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000440)='/selinux/policy\x00', 0x0, 0x0) link(0x0, 0x0) r2 = syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x105082) syz_genetlink_get_family_id$fou(&(0x7f0000000380)='fou\x00') getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, 0x0, 0x0) lstat(0x0, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000003c0)={&(0x7f00000002c0)='./bus\x00'}, 0x10) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) syz_genetlink_get_family_id$team(&(0x7f0000000040)='team\x00') getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000000500)={{{@in6=@ipv4={[], [], @broadcast}, @in6=@dev}}, {{@in=@remote}, 0x0, @in=@local}}, &(0x7f0000000080)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000600)={{{@in6}}, {{@in=@local}, 0x0, @in6}}, &(0x7f00000001c0)=0xe8) getsockopt$inet6_mreq(r1, 0x29, 0x1f, &(0x7f0000000200)={@mcast2}, &(0x7f0000000300)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, 0x0) sendmsg$TEAM_CMD_PORT_LIST_GET(r1, &(0x7f0000000880)={0x0, 0x0, &(0x7f0000000840)={&(0x7f0000000b40)=ANY=[@ANYBLOB="7c00020038000100240001006d636173745f72656a6f696e5f636f756e74000000000000000000000000000008000300030000000800040000020000", @ANYRES32], 0x2}}, 0x20000000) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$LOOP_CHANGE_FD(r2, 0x4c00, 0xffffffffffffffff) fallocate(r2, 0x11, 0x0, 0x100000001) 03:53:43 executing program 4: r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x5f}, {&(0x7f00000000c0)=""/85, 0x55}, {&(0x7f0000000fc0)=""/4096, 0x1000}, {&(0x7f0000000400)=""/120, 0x78}, {&(0x7f0000000480)=""/60, 0x3c}, {&(0x7f0000000540)=""/154, 0x9a}, {&(0x7f0000000340)=""/22, 0x16}], 0x7, &(0x7f0000002400)=""/191, 0xbf}}], 0x1, 0x0, &(0x7f0000003700)={0x77359400}) 03:53:43 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x20, &(0x7f0000000b80)=ANY=[@ANYBLOB="cab5674ca80400f902c8d3fc17d4a51472ff5e04a7ed68e9074e865fffffffffff6582e2a0c58f438f1a9b1af27305fb6c1d497851a00d51dddde821f356222d82de15a5bb3ca4d544c3683ff903b30637ee634a8a4fa0e19e57c7d35e4db3a02231b71023a910ac2424326e31258bde7ca760ff3ca3261a92112b3c8db9e0d79dc5ad29e05434154bba1e60d243d8fa466b27518c09e11b78ec43ab7af1d33fbd4885ee5e95b0849345d0edef0a2e68320a47938597cf0fba5ae2e93301ffc38baaf2673b7fd4628a0fe3665006d238567bdb430991e02866ad858345dc86331d91a53051b3284827fc0a870d857ecc180901feb2d1dd3be0c1ebc3fa1d00d550744d9e55"], 0x0, 0x1625, 0x0, 0x0, 0x41100, 0x1, [], 0x0, 0x4}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r0, 0xdb, &(0x7f0000000200)={0x0, 0x0}}, 0x393) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='cgroup.events\x00', 0x0, 0x0) write$cgroup_int(r2, &(0x7f00000007c0)=0x6, 0x12) r3 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000002c0), 0x4) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz1\x00', 0x1ff) r4 = perf_event_open$cgroup(&(0x7f0000000600)={0x0, 0x70, 0x9, 0x6, 0x8, 0x6, 0x0, 0xfffffffffffff49f, 0x2, 0x6, 0x3ff, 0x0, 0x20, 0x0, 0x1, 0x81, 0x1, 0x400, 0x4, 0xfac, 0x4, 0x1, 0x0, 0xf1, 0xd3, 0x92b, 0x200, 0x1, 0x100000000, 0x2, 0x100000000, 0xfff, 0xfff, 0xffff, 0x3, 0xfffffffffffffffd, 0x0, 0x6, 0x0, 0x50, 0x0, @perf_config_ext={0x3f, 0x9}, 0x20000, 0x8, 0xef3, 0x7, 0x100000000, 0x8, 0xfff}, 0xffffffffffffffff, 0x2, r0, 0x8) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000b40)='cgroup.subtree_control\x00') ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x2400, 0x1) r5 = getpid() socketpair$unix(0x1, 0x7, 0x0, &(0x7f0000000540)={0xffffffffffffffff}) setsockopt$sock_attach_bpf(r6, 0x1, 0x32, &(0x7f00000005c0)=r3, 0x4) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={0x0, 0xffffffffffffffff, 0x0, 0x12, &(0x7f0000000480)='./cgroup.cpu/syz1\x00', r1}, 0x30) perf_event_open(&(0x7f0000000300)={0x5, 0x70, 0xff, 0x4, 0x1000, 0xe5af, 0x0, 0x8000, 0xd0440, 0x2, 0xffff, 0x1, 0x4, 0x1f, 0x3, 0xfffffffffffffffa, 0x5, 0x9, 0x8, 0x1, 0x3, 0x400, 0x6, 0x5, 0x401, 0x10000, 0xff, 0xb24, 0xffffffffffff8000, 0xc8a, 0x3f, 0xfffffffffffffffa, 0xffffffffffff8001, 0x200, 0x5, 0x3, 0x2, 0x93a, 0x0, 0x7fff, 0x2, @perf_bp={&(0x7f0000000100), 0x1}, 0x0, 0x0, 0xffffffffffffff4e, 0x6, 0x0, 0x4, 0xfffffffffffffffd}, r5, 0x0, r7, 0x8) r8 = openat$tun(0xffffffffffffff9c, &(0x7f0000000580)='/dev/net/tun\x00', 0x40000, 0x0) ioctl$TUNSETPERSIST(r8, 0x400454cb, 0x1) r9 = socket$kcm(0x29, 0x5, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000800)={0x0, r0, 0x1, 0x2}, 0x14) ioctl$sock_kcm_SIOCKCMUNATTACH(r9, 0x89e1, &(0x7f0000000900)={r2}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r3, 0x0, 0x8b, 0x0, &(0x7f0000000680)="3ce41f426b7dd449ae14b08e1868c456d4fe9c7993884cf18f4dd5a0bc57250243da4203e0640859184bc4c4690afefd7736e8842cd88030448e918bdb5bd9bbbd680a51261557c0477c18049c832005ebb5b185c6f233df73a21d3b3ddad8426fba2d5f8aac5df904d5e5f2e7dc4a517079e08d5b2175a276f2a5c49cc2957cb367f269898570852dd63a", 0x0, 0x5}, 0x28) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000500)='./cgroup/syz0\x00', 0x200002, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000740)={r3, 0x50, &(0x7f00000003c0)}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r2, 0x50, &(0x7f0000000840)}, 0x10) openat$cgroup_subtree(r2, &(0x7f0000000940)='cgroup.subtree_control\x00', 0x2, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x1ff, 0x0, 0x0, 0x0, 0x200000, 0xffffffffffffffff, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280), 0x2}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r10 = socket$kcm(0xa, 0x400000000002, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffc59) ioctl$sock_kcm_SIOCKCMCLONE(r10, 0x890b, &(0x7f0000000000)) ioctl$sock_kcm_SIOCKCMCLONE(r10, 0x890c, &(0x7f0000000000)) 03:53:43 executing program 0: unshare(0x24020400) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syncfs(0xffffffffffffffff) 03:53:43 executing program 3: 03:53:43 executing program 2: 03:53:43 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x20, &(0x7f0000000b80)=ANY=[@ANYBLOB="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"], 0x0, 0x1625, 0x0, 0x0, 0x41100, 0x1, [], 0x0, 0x4}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r0, 0xdb, &(0x7f0000000200)={0x0, 0x0}}, 0x393) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='cgroup.events\x00', 0x0, 0x0) write$cgroup_int(r2, &(0x7f00000007c0)=0x6, 0x12) r3 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000002c0), 0x4) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz1\x00', 0x1ff) r4 = perf_event_open$cgroup(&(0x7f0000000600)={0x0, 0x70, 0x9, 0x6, 0x8, 0x6, 0x0, 0xfffffffffffff49f, 0x2, 0x6, 0x3ff, 0x0, 0x20, 0x0, 0x1, 0x81, 0x1, 0x400, 0x4, 0xfac, 0x4, 0x1, 0x10000, 0x0, 0xd3, 0x92b, 0x200, 0x1, 0x100000000, 0x2, 0x100000000, 0xfff, 0xfff, 0xffff, 0x3, 0xfffffffffffffffd, 0x0, 0x6, 0x0, 0x50, 0x0, @perf_config_ext={0x3f, 0x9}, 0x20000, 0x8, 0xef3, 0x7, 0x100000000, 0x8, 0xfff}, 0xffffffffffffffff, 0x2, r0, 0x8) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000b40)='cgroup.subtree_control\x00') ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x2400, 0x1) r5 = getpid() socketpair$unix(0x1, 0x7, 0x0, &(0x7f0000000540)={0xffffffffffffffff}) setsockopt$sock_attach_bpf(r6, 0x1, 0x32, &(0x7f00000005c0)=r3, 0x4) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={0x0, 0xffffffffffffffff, 0x0, 0x12, &(0x7f0000000480)='./cgroup.cpu/syz1\x00', r1}, 0x30) perf_event_open(&(0x7f0000000300)={0x5, 0x70, 0xff, 0x4, 0x1000, 0xe5af, 0x0, 0x8000, 0xd0440, 0x2, 0xffff, 0x1, 0x4, 0x1f, 0x3, 0xfffffffffffffffa, 0x5, 0x9, 0x8, 0x1, 0x3, 0x400, 0x6, 0x5, 0x401, 0x10000, 0xff, 0xb24, 0xffffffffffff8000, 0xc8a, 0x3f, 0xfffffffffffffffa, 0xffffffffffff8001, 0x200, 0x5, 0x3, 0x2, 0x93a, 0x0, 0x7fff, 0x2, @perf_bp={&(0x7f0000000100), 0x1}, 0x0, 0x0, 0xffffffffffffff4e, 0x6, 0x0, 0x4, 0xfffffffffffffffd}, r5, 0x0, r7, 0x8) r8 = openat$tun(0xffffffffffffff9c, &(0x7f0000000580)='/dev/net/tun\x00', 0x40000, 0x0) ioctl$TUNSETPERSIST(r8, 0x400454cb, 0x1) r9 = socket$kcm(0x29, 0x5, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000800)={0x0, r0, 0x1, 0x2}, 0x14) ioctl$sock_kcm_SIOCKCMUNATTACH(r9, 0x89e1, &(0x7f0000000900)={r2}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r3, 0x0, 0x8b, 0x0, &(0x7f0000000680)="3ce41f426b7dd449ae14b08e1868c456d4fe9c7993884cf18f4dd5a0bc57250243da4203e0640859184bc4c4690afefd7736e8842cd88030448e918bdb5bd9bbbd680a51261557c0477c18049c832005ebb5b185c6f233df73a21d3b3ddad8426fba2d5f8aac5df904d5e5f2e7dc4a517079e08d5b2175a276f2a5c49cc2957cb367f269898570852dd63a", 0x0, 0x5}, 0x28) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000500)='./cgroup/syz0\x00', 0x200002, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000740)={r3, 0x50, &(0x7f00000003c0)}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r2, 0x50, &(0x7f0000000840)}, 0x10) openat$cgroup_subtree(r2, &(0x7f0000000940)='cgroup.subtree_control\x00', 0x2, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x1ff, 0x0, 0x0, 0x0, 0x200000, 0xffffffffffffffff, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280), 0x2}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r10 = socket$kcm(0xa, 0x400000000002, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffc59) ioctl$sock_kcm_SIOCKCMCLONE(r10, 0x890b, &(0x7f0000000000)) ioctl$sock_kcm_SIOCKCMCLONE(r10, 0x890c, &(0x7f0000000000)) 03:53:43 executing program 4: r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x5f}, {&(0x7f00000000c0)=""/85, 0x55}, {&(0x7f0000000fc0)=""/4096, 0x1000}, {&(0x7f0000000400)=""/120, 0x78}, {&(0x7f0000000480)=""/60, 0x3c}, {0x0}, {&(0x7f0000000540)=""/154, 0x9a}, {&(0x7f0000000340)=""/22, 0x16}], 0x8, &(0x7f0000002400)=""/191, 0xbf}}], 0x1, 0x0, &(0x7f0000003700)={0x77359400}) 03:53:43 executing program 0: [ 1851.682599] protocol 88fb is buggy, dev hsr_slave_0 [ 1851.687808] protocol 88fb is buggy, dev hsr_slave_1 [ 1851.693003] protocol 88fb is buggy, dev hsr_slave_0 [ 1851.698082] protocol 88fb is buggy, dev hsr_slave_1 [ 1851.703289] protocol 88fb is buggy, dev hsr_slave_0 [ 1851.708400] protocol 88fb is buggy, dev hsr_slave_1 03:53:44 executing program 5: getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffff9c, 0x84, 0x13, 0x0, 0x0) r0 = syz_open_dev$swradio(&(0x7f0000000000)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$radio(0x0, 0xffffffffffffffff, 0x2) r1 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) getdents64(r1, 0x0, 0x0) r2 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r2, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r2, 0x8) r3 = socket$inet6_sctp(0xa, 0x805, 0x84) r4 = accept4(r2, 0x0, 0x0, 0x0) prctl$PR_SET_ENDIAN(0x14, 0x1) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r3, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) epoll_pwait(0xffffffffffffffff, &(0x7f0000000040)=[{}], 0x1, 0x0, &(0x7f0000000080), 0x8) getpgid(0x0) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r4, 0x84, 0x9, &(0x7f0000000280)={0x0, @in={{0x2, 0x0, @empty}}, 0x0, 0xac14142400000000, 0x0, 0x0, 0x54}, 0x98) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) ioctl$SIOCAX25ADDFWD(r0, 0x89ea, 0x0) syz_mount_image$gfs2(0x0, 0x0, 0x0, 0x0, &(0x7f00000005c0), 0x1040040, 0x0) readv(r1, &(0x7f0000000500)=[{&(0x7f0000000400)=""/217, 0xd9}], 0x1) 03:53:44 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x20, &(0x7f0000000b80)=ANY=[@ANYBLOB="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"], 0x0, 0x1625, 0x0, 0x0, 0x41100, 0x1, [], 0x0, 0x4}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r0, 0xdb, &(0x7f0000000200)={0x0, 0x0}}, 0x393) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='cgroup.events\x00', 0x0, 0x0) write$cgroup_int(r2, &(0x7f00000007c0)=0x6, 0x12) r3 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000002c0), 0x4) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz1\x00', 0x1ff) r4 = perf_event_open$cgroup(&(0x7f0000000600)={0x0, 0x70, 0x9, 0x6, 0x8, 0x6, 0x0, 0xfffffffffffff49f, 0x2, 0x6, 0x3ff, 0x0, 0x20, 0x0, 0x1, 0x81, 0x1, 0x400, 0x4, 0xfac, 0x4, 0x1, 0x10000, 0x0, 0xd3, 0x92b, 0x200, 0x1, 0x100000000, 0x2, 0x100000000, 0xfff, 0xfff, 0xffff, 0x3, 0xfffffffffffffffd, 0x0, 0x6, 0x0, 0x50, 0x0, @perf_config_ext={0x3f, 0x9}, 0x20000, 0x8, 0xef3, 0x7, 0x100000000, 0x8, 0xfff}, 0xffffffffffffffff, 0x2, r0, 0x8) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000b40)='cgroup.subtree_control\x00') ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x2400, 0x1) r5 = getpid() socketpair$unix(0x1, 0x7, 0x0, &(0x7f0000000540)={0xffffffffffffffff}) setsockopt$sock_attach_bpf(r6, 0x1, 0x32, &(0x7f00000005c0)=r3, 0x4) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={0x0, 0xffffffffffffffff, 0x0, 0x12, &(0x7f0000000480)='./cgroup.cpu/syz1\x00', r1}, 0x30) perf_event_open(&(0x7f0000000300)={0x5, 0x70, 0xff, 0x4, 0x1000, 0xe5af, 0x0, 0x8000, 0xd0440, 0x2, 0xffff, 0x1, 0x4, 0x1f, 0x3, 0xfffffffffffffffa, 0x5, 0x9, 0x8, 0x1, 0x3, 0x400, 0x6, 0x5, 0x401, 0x10000, 0xff, 0xb24, 0xffffffffffff8000, 0xc8a, 0x3f, 0xfffffffffffffffa, 0xffffffffffff8001, 0x200, 0x5, 0x3, 0x2, 0x93a, 0x0, 0x7fff, 0x2, @perf_bp={&(0x7f0000000100), 0x1}, 0x0, 0x0, 0xffffffffffffff4e, 0x6, 0x0, 0x4, 0xfffffffffffffffd}, r5, 0x0, r7, 0x8) r8 = openat$tun(0xffffffffffffff9c, &(0x7f0000000580)='/dev/net/tun\x00', 0x40000, 0x0) ioctl$TUNSETPERSIST(r8, 0x400454cb, 0x1) r9 = socket$kcm(0x29, 0x5, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000800)={0x0, r0, 0x1, 0x2}, 0x14) ioctl$sock_kcm_SIOCKCMUNATTACH(r9, 0x89e1, &(0x7f0000000900)={r2}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r3, 0x0, 0x8b, 0x0, &(0x7f0000000680)="3ce41f426b7dd449ae14b08e1868c456d4fe9c7993884cf18f4dd5a0bc57250243da4203e0640859184bc4c4690afefd7736e8842cd88030448e918bdb5bd9bbbd680a51261557c0477c18049c832005ebb5b185c6f233df73a21d3b3ddad8426fba2d5f8aac5df904d5e5f2e7dc4a517079e08d5b2175a276f2a5c49cc2957cb367f269898570852dd63a", 0x0, 0x5}, 0x28) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000500)='./cgroup/syz0\x00', 0x200002, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000740)={r3, 0x50, &(0x7f00000003c0)}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r2, 0x50, &(0x7f0000000840)}, 0x10) openat$cgroup_subtree(r2, &(0x7f0000000940)='cgroup.subtree_control\x00', 0x2, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x1ff, 0x0, 0x0, 0x0, 0x200000, 0xffffffffffffffff, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280), 0x2}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r10 = socket$kcm(0xa, 0x400000000002, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffc59) ioctl$sock_kcm_SIOCKCMCLONE(r10, 0x890b, &(0x7f0000000000)) ioctl$sock_kcm_SIOCKCMCLONE(r10, 0x890c, &(0x7f0000000000)) 03:53:44 executing program 2: 03:53:44 executing program 3: 03:53:44 executing program 0: 03:53:44 executing program 4: r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x5f}, {&(0x7f00000000c0)=""/85, 0x55}, {&(0x7f0000000fc0)=""/4096, 0x1000}, {&(0x7f0000000400)=""/120, 0x78}, {&(0x7f0000000480)=""/60, 0x3c}, {0x0}, {&(0x7f0000000540)=""/154, 0x9a}, {&(0x7f0000000340)=""/22, 0x16}], 0x8, &(0x7f0000002400)=""/191, 0xbf}}], 0x1, 0x0, &(0x7f0000003700)={0x77359400}) 03:53:44 executing program 2: 03:53:44 executing program 3: 03:53:44 executing program 0: 03:53:44 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x20, &(0x7f0000000b80)=ANY=[@ANYBLOB="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"], 0x0, 0x1625, 0x0, 0x0, 0x41100, 0x1, [], 0x0, 0x4}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r0, 0xdb, &(0x7f0000000200)={0x0, 0x0}}, 0x393) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='cgroup.events\x00', 0x0, 0x0) write$cgroup_int(r2, &(0x7f00000007c0)=0x6, 0x12) r3 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000002c0), 0x4) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz1\x00', 0x1ff) r4 = perf_event_open$cgroup(&(0x7f0000000600)={0x0, 0x70, 0x9, 0x6, 0x8, 0x6, 0x0, 0xfffffffffffff49f, 0x2, 0x6, 0x3ff, 0x0, 0x20, 0x0, 0x1, 0x81, 0x1, 0x400, 0x4, 0xfac, 0x4, 0x1, 0x10000, 0x0, 0xd3, 0x92b, 0x200, 0x1, 0x100000000, 0x2, 0x100000000, 0xfff, 0xfff, 0xffff, 0x3, 0xfffffffffffffffd, 0x0, 0x6, 0x0, 0x50, 0x0, @perf_config_ext={0x3f, 0x9}, 0x20000, 0x8, 0xef3, 0x7, 0x100000000, 0x8, 0xfff}, 0xffffffffffffffff, 0x2, r0, 0x8) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000b40)='cgroup.subtree_control\x00') ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x2400, 0x1) r5 = getpid() socketpair$unix(0x1, 0x7, 0x0, &(0x7f0000000540)={0xffffffffffffffff}) setsockopt$sock_attach_bpf(r6, 0x1, 0x32, &(0x7f00000005c0)=r3, 0x4) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={0x0, 0xffffffffffffffff, 0x0, 0x12, &(0x7f0000000480)='./cgroup.cpu/syz1\x00', r1}, 0x30) perf_event_open(&(0x7f0000000300)={0x5, 0x70, 0xff, 0x4, 0x1000, 0xe5af, 0x0, 0x8000, 0xd0440, 0x2, 0xffff, 0x1, 0x4, 0x1f, 0x3, 0xfffffffffffffffa, 0x5, 0x9, 0x8, 0x1, 0x3, 0x400, 0x6, 0x5, 0x401, 0x10000, 0xff, 0xb24, 0xffffffffffff8000, 0xc8a, 0x3f, 0xfffffffffffffffa, 0xffffffffffff8001, 0x200, 0x5, 0x3, 0x2, 0x93a, 0x0, 0x7fff, 0x2, @perf_bp={&(0x7f0000000100), 0x1}, 0x0, 0x0, 0xffffffffffffff4e, 0x6, 0x0, 0x4, 0xfffffffffffffffd}, r5, 0x0, r7, 0x8) r8 = openat$tun(0xffffffffffffff9c, &(0x7f0000000580)='/dev/net/tun\x00', 0x40000, 0x0) ioctl$TUNSETPERSIST(r8, 0x400454cb, 0x1) r9 = socket$kcm(0x29, 0x5, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000800)={0x0, r0, 0x1, 0x2}, 0x14) ioctl$sock_kcm_SIOCKCMUNATTACH(r9, 0x89e1, &(0x7f0000000900)={r2}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r3, 0x0, 0x8b, 0x0, &(0x7f0000000680)="3ce41f426b7dd449ae14b08e1868c456d4fe9c7993884cf18f4dd5a0bc57250243da4203e0640859184bc4c4690afefd7736e8842cd88030448e918bdb5bd9bbbd680a51261557c0477c18049c832005ebb5b185c6f233df73a21d3b3ddad8426fba2d5f8aac5df904d5e5f2e7dc4a517079e08d5b2175a276f2a5c49cc2957cb367f269898570852dd63a", 0x0, 0x5}, 0x28) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000500)='./cgroup/syz0\x00', 0x200002, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000740)={r3, 0x50, &(0x7f00000003c0)}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r2, 0x50, &(0x7f0000000840)}, 0x10) openat$cgroup_subtree(r2, &(0x7f0000000940)='cgroup.subtree_control\x00', 0x2, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x1ff, 0x0, 0x0, 0x0, 0x200000, 0xffffffffffffffff, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280), 0x2}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r10 = socket$kcm(0xa, 0x400000000002, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffc59) ioctl$sock_kcm_SIOCKCMCLONE(r10, 0x890b, &(0x7f0000000000)) ioctl$sock_kcm_SIOCKCMCLONE(r10, 0x890c, &(0x7f0000000000)) 03:53:44 executing program 4: r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x5f}, {&(0x7f00000000c0)=""/85, 0x55}, {&(0x7f0000000fc0)=""/4096, 0x1000}, {&(0x7f0000000400)=""/120, 0x78}, {&(0x7f0000000480)=""/60, 0x3c}, {0x0}, {&(0x7f0000000540)=""/154, 0x9a}, {&(0x7f0000000340)=""/22, 0x16}], 0x8, &(0x7f0000002400)=""/191, 0xbf}}], 0x1, 0x0, &(0x7f0000003700)={0x77359400}) 03:53:44 executing program 0: 03:53:45 executing program 5: getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffff9c, 0x84, 0x13, 0x0, 0x0) r0 = syz_open_dev$swradio(&(0x7f0000000000)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$radio(0x0, 0xffffffffffffffff, 0x2) r1 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) getdents64(r1, 0x0, 0x0) r2 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r2, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r2, 0x8) r3 = socket$inet6_sctp(0xa, 0x805, 0x84) r4 = accept4(r2, 0x0, 0x0, 0x0) prctl$PR_SET_ENDIAN(0x14, 0x1) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r3, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) epoll_pwait(0xffffffffffffffff, &(0x7f0000000040)=[{}], 0x1, 0x0, &(0x7f0000000080), 0x8) getpgid(0x0) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r4, 0x84, 0x9, &(0x7f0000000280)={0x0, @in={{0x2, 0x0, @empty}}, 0x0, 0xac14142400000000, 0x0, 0x0, 0x54}, 0x98) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) ioctl$SIOCAX25ADDFWD(r0, 0x89ea, 0x0) syz_mount_image$gfs2(0x0, 0x0, 0x0, 0x0, &(0x7f00000005c0), 0x1040040, 0x0) readv(r1, &(0x7f0000000500)=[{&(0x7f0000000400)=""/217, 0xd9}], 0x1) 03:53:45 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x20, &(0x7f0000000b80)=ANY=[@ANYBLOB="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"], 0x0, 0x1625, 0x0, 0x0, 0x41100, 0x1, [], 0x0, 0x4}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r0, 0xdb, &(0x7f0000000200)={0x0, 0x0}}, 0x393) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='cgroup.events\x00', 0x0, 0x0) write$cgroup_int(r2, &(0x7f00000007c0)=0x6, 0x12) r3 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000002c0), 0x4) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz1\x00', 0x1ff) r4 = perf_event_open$cgroup(&(0x7f0000000600)={0x0, 0x70, 0x9, 0x6, 0x8, 0x6, 0x0, 0xfffffffffffff49f, 0x2, 0x6, 0x3ff, 0x0, 0x20, 0x0, 0x1, 0x81, 0x1, 0x400, 0x4, 0xfac, 0x4, 0x1, 0x10000, 0xf1, 0x0, 0x92b, 0x200, 0x1, 0x100000000, 0x2, 0x100000000, 0xfff, 0xfff, 0xffff, 0x3, 0xfffffffffffffffd, 0x0, 0x6, 0x0, 0x50, 0x0, @perf_config_ext={0x3f, 0x9}, 0x20000, 0x8, 0xef3, 0x7, 0x100000000, 0x8, 0xfff}, 0xffffffffffffffff, 0x2, r0, 0x8) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000b40)='cgroup.subtree_control\x00') ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x2400, 0x1) r5 = getpid() socketpair$unix(0x1, 0x7, 0x0, &(0x7f0000000540)={0xffffffffffffffff}) setsockopt$sock_attach_bpf(r6, 0x1, 0x32, &(0x7f00000005c0)=r3, 0x4) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={0x0, 0xffffffffffffffff, 0x0, 0x12, &(0x7f0000000480)='./cgroup.cpu/syz1\x00', r1}, 0x30) perf_event_open(&(0x7f0000000300)={0x5, 0x70, 0xff, 0x4, 0x1000, 0xe5af, 0x0, 0x8000, 0xd0440, 0x2, 0xffff, 0x1, 0x4, 0x1f, 0x3, 0xfffffffffffffffa, 0x5, 0x9, 0x8, 0x1, 0x3, 0x400, 0x6, 0x5, 0x401, 0x10000, 0xff, 0xb24, 0xffffffffffff8000, 0xc8a, 0x3f, 0xfffffffffffffffa, 0xffffffffffff8001, 0x200, 0x5, 0x3, 0x2, 0x93a, 0x0, 0x7fff, 0x2, @perf_bp={&(0x7f0000000100), 0x1}, 0x0, 0x0, 0xffffffffffffff4e, 0x6, 0x0, 0x4, 0xfffffffffffffffd}, r5, 0x0, r7, 0x8) r8 = openat$tun(0xffffffffffffff9c, &(0x7f0000000580)='/dev/net/tun\x00', 0x40000, 0x0) ioctl$TUNSETPERSIST(r8, 0x400454cb, 0x1) r9 = socket$kcm(0x29, 0x5, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000800)={0x0, r0, 0x1, 0x2}, 0x14) ioctl$sock_kcm_SIOCKCMUNATTACH(r9, 0x89e1, &(0x7f0000000900)={r2}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r3, 0x0, 0x8b, 0x0, &(0x7f0000000680)="3ce41f426b7dd449ae14b08e1868c456d4fe9c7993884cf18f4dd5a0bc57250243da4203e0640859184bc4c4690afefd7736e8842cd88030448e918bdb5bd9bbbd680a51261557c0477c18049c832005ebb5b185c6f233df73a21d3b3ddad8426fba2d5f8aac5df904d5e5f2e7dc4a517079e08d5b2175a276f2a5c49cc2957cb367f269898570852dd63a", 0x0, 0x5}, 0x28) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000500)='./cgroup/syz0\x00', 0x200002, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000740)={r3, 0x50, &(0x7f00000003c0)}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r2, 0x50, &(0x7f0000000840)}, 0x10) openat$cgroup_subtree(r2, &(0x7f0000000940)='cgroup.subtree_control\x00', 0x2, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x1ff, 0x0, 0x0, 0x0, 0x200000, 0xffffffffffffffff, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280), 0x2}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r10 = socket$kcm(0xa, 0x400000000002, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffc59) ioctl$sock_kcm_SIOCKCMCLONE(r10, 0x890b, &(0x7f0000000000)) ioctl$sock_kcm_SIOCKCMCLONE(r10, 0x890c, &(0x7f0000000000)) 03:53:45 executing program 2: 03:53:45 executing program 3: 03:53:45 executing program 4: r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x5f}, {&(0x7f00000000c0)=""/85, 0x55}, {&(0x7f0000000fc0)=""/4096, 0x1000}, {&(0x7f0000000400)=""/120, 0x78}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f0000000540)=""/154, 0x9a}, {&(0x7f0000000340)=""/22, 0x16}], 0x7, &(0x7f0000002400)=""/191, 0xbf}}], 0x1, 0x0, &(0x7f0000003700)={0x77359400}) 03:53:45 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f00000001c0), 0xfffffef3) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r3 = creat(&(0x7f00000001c0)='./bus\x00', 0x0) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vga_arbiter\x00', 0x0, 0x0) r4 = open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r5) r6 = creat(&(0x7f0000000700)='./bus\x00', 0x0) truncate(&(0x7f0000000240)='./bus\x00', 0x800) r7 = open(&(0x7f0000000140)='./bus\x00', 0x400000008, 0x0) lseek(r6, 0x0, 0x2) getgroups(0x0, 0x0) getresgid(&(0x7f00000003c0), 0x0, &(0x7f0000000400)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000580)='./bus\x00', 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB], 0x1, 0x0) fstat(r6, &(0x7f00000004c0)) stat(0x0, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0}) sysinfo(0x0) sendfile(r6, r7, 0x0, 0x8000fffffffe) creat(&(0x7f0000000700)='./bus\x00', 0x0) r9 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) ftruncate(r0, 0x3) getsockopt$inet6_IPV6_XFRM_POLICY(r3, 0x29, 0x23, 0x0, &(0x7f0000000180)) setreuid(r8, 0x0) fallocate(r2, 0x0, 0x0, 0x0) getsockopt$inet_pktinfo(r6, 0x0, 0x8, 0x0, &(0x7f0000000480)) lseek(r9, 0x0, 0x3) pread64(r4, &(0x7f0000005000)=""/4096, 0xffffffffffffffb3, 0x0) 03:53:45 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000000100)=0x1, 0xfb) connect$inet(r0, &(0x7f0000000180)={0x2, 0x0, @local}, 0x10) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000700)={0x0, 0x40000007fff, 0x80000001}, 0x14) shutdown(r0, 0x1) 03:53:45 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x20, &(0x7f0000000b80)=ANY=[@ANYBLOB="cab5674ca80400f902c8d3fc17d4a51472ff5e04a7ed68e9074e865fffffffffff6582e2a0c58f438f1a9b1af27305fb6c1d497851a00d51dddde821f356222d82de15a5bb3ca4d544c3683ff903b30637ee634a8a4fa0e19e57c7d35e4db3a02231b71023a910ac2424326e31258bde7ca760ff3ca3261a92112b3c8db9e0d79dc5ad29e05434154bba1e60d243d8fa466b27518c09e11b78ec43ab7af1d33fbd4885ee5e95b0849345d0edef0a2e68320a47938597cf0fba5ae2e93301ffc38baaf2673b7fd4628a0fe3665006d238567bdb430991e02866ad858345dc86331d91a53051b3284827fc0a870d857ecc180901feb2d1dd3be0c1ebc3fa1d00d550744d9e55"], 0x0, 0x1625, 0x0, 0x0, 0x41100, 0x1, [], 0x0, 0x4}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r0, 0xdb, &(0x7f0000000200)={0x0, 0x0}}, 0x393) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='cgroup.events\x00', 0x0, 0x0) write$cgroup_int(r2, &(0x7f00000007c0)=0x6, 0x12) r3 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000002c0), 0x4) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz1\x00', 0x1ff) r4 = perf_event_open$cgroup(&(0x7f0000000600)={0x0, 0x70, 0x9, 0x6, 0x8, 0x6, 0x0, 0xfffffffffffff49f, 0x2, 0x6, 0x3ff, 0x0, 0x20, 0x0, 0x1, 0x81, 0x1, 0x400, 0x4, 0xfac, 0x4, 0x1, 0x10000, 0xf1, 0x0, 0x92b, 0x200, 0x1, 0x100000000, 0x2, 0x100000000, 0xfff, 0xfff, 0xffff, 0x3, 0xfffffffffffffffd, 0x0, 0x6, 0x0, 0x50, 0x0, @perf_config_ext={0x3f, 0x9}, 0x20000, 0x8, 0xef3, 0x7, 0x100000000, 0x8, 0xfff}, 0xffffffffffffffff, 0x2, r0, 0x8) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000b40)='cgroup.subtree_control\x00') ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x2400, 0x1) r5 = getpid() socketpair$unix(0x1, 0x7, 0x0, &(0x7f0000000540)={0xffffffffffffffff}) setsockopt$sock_attach_bpf(r6, 0x1, 0x32, &(0x7f00000005c0)=r3, 0x4) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={0x0, 0xffffffffffffffff, 0x0, 0x12, &(0x7f0000000480)='./cgroup.cpu/syz1\x00', r1}, 0x30) perf_event_open(&(0x7f0000000300)={0x5, 0x70, 0xff, 0x4, 0x1000, 0xe5af, 0x0, 0x8000, 0xd0440, 0x2, 0xffff, 0x1, 0x4, 0x1f, 0x3, 0xfffffffffffffffa, 0x5, 0x9, 0x8, 0x1, 0x3, 0x400, 0x6, 0x5, 0x401, 0x10000, 0xff, 0xb24, 0xffffffffffff8000, 0xc8a, 0x3f, 0xfffffffffffffffa, 0xffffffffffff8001, 0x200, 0x5, 0x3, 0x2, 0x93a, 0x0, 0x7fff, 0x2, @perf_bp={&(0x7f0000000100), 0x1}, 0x0, 0x0, 0xffffffffffffff4e, 0x6, 0x0, 0x4, 0xfffffffffffffffd}, r5, 0x0, r7, 0x8) r8 = openat$tun(0xffffffffffffff9c, &(0x7f0000000580)='/dev/net/tun\x00', 0x40000, 0x0) ioctl$TUNSETPERSIST(r8, 0x400454cb, 0x1) r9 = socket$kcm(0x29, 0x5, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000800)={0x0, r0, 0x1, 0x2}, 0x14) ioctl$sock_kcm_SIOCKCMUNATTACH(r9, 0x89e1, &(0x7f0000000900)={r2}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r3, 0x0, 0x8b, 0x0, &(0x7f0000000680)="3ce41f426b7dd449ae14b08e1868c456d4fe9c7993884cf18f4dd5a0bc57250243da4203e0640859184bc4c4690afefd7736e8842cd88030448e918bdb5bd9bbbd680a51261557c0477c18049c832005ebb5b185c6f233df73a21d3b3ddad8426fba2d5f8aac5df904d5e5f2e7dc4a517079e08d5b2175a276f2a5c49cc2957cb367f269898570852dd63a", 0x0, 0x5}, 0x28) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000500)='./cgroup/syz0\x00', 0x200002, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000740)={r3, 0x50, &(0x7f00000003c0)}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r2, 0x50, &(0x7f0000000840)}, 0x10) openat$cgroup_subtree(r2, &(0x7f0000000940)='cgroup.subtree_control\x00', 0x2, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x1ff, 0x0, 0x0, 0x0, 0x200000, 0xffffffffffffffff, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280), 0x2}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r10 = socket$kcm(0xa, 0x400000000002, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffc59) ioctl$sock_kcm_SIOCKCMCLONE(r10, 0x890b, &(0x7f0000000000)) ioctl$sock_kcm_SIOCKCMCLONE(r10, 0x890c, &(0x7f0000000000)) 03:53:45 executing program 4: r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x5f}, {&(0x7f00000000c0)=""/85, 0x55}, {&(0x7f0000000fc0)=""/4096, 0x1000}, {&(0x7f0000000400)=""/120, 0x78}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f0000000540)=""/154, 0x9a}, {&(0x7f0000000340)=""/22, 0x16}], 0x7, &(0x7f0000002400)=""/191, 0xbf}}], 0x1, 0x0, &(0x7f0000003700)={0x77359400}) 03:53:45 executing program 3: write$P9_ROPEN(0xffffffffffffffff, 0x0, 0x0) ioprio_set$pid(0x0, 0x0, 0x2) socketpair(0x0, 0x0, 0x0, 0x0) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, 0x0, &(0x7f0000048000), 0x0) ioctl$EVIOCREVOKE(0xffffffffffffffff, 0x40044591, &(0x7f0000000080)=0x3) ioctl$sock_inet_SIOCSARP(0xffffffffffffffff, 0x8955, 0x0) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, 0x0, &(0x7f0000048000), 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f00000000c0)='IPVS\x00') futex(&(0x7f000000cffc), 0xc, 0x1, &(0x7f0000fd7ff0)={0x77359400}, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc)=0x4, 0xb, 0x4, 0x0, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc), 0xc, 0x1, 0x0, &(0x7f0000048000)=0x1c0000000, 0x0) 03:53:45 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x20, &(0x7f0000000b80)=ANY=[@ANYBLOB="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"], 0x0, 0x1625, 0x0, 0x0, 0x41100, 0x1, [], 0x0, 0x4}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r0, 0xdb, &(0x7f0000000200)={0x0, 0x0}}, 0x393) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='cgroup.events\x00', 0x0, 0x0) write$cgroup_int(r2, &(0x7f00000007c0)=0x6, 0x12) r3 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000002c0), 0x4) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz1\x00', 0x1ff) r4 = perf_event_open$cgroup(&(0x7f0000000600)={0x0, 0x70, 0x9, 0x6, 0x8, 0x6, 0x0, 0xfffffffffffff49f, 0x2, 0x6, 0x3ff, 0x0, 0x20, 0x0, 0x1, 0x81, 0x1, 0x400, 0x4, 0xfac, 0x4, 0x1, 0x10000, 0xf1, 0x0, 0x92b, 0x200, 0x1, 0x100000000, 0x2, 0x100000000, 0xfff, 0xfff, 0xffff, 0x3, 0xfffffffffffffffd, 0x0, 0x6, 0x0, 0x50, 0x0, @perf_config_ext={0x3f, 0x9}, 0x20000, 0x8, 0xef3, 0x7, 0x100000000, 0x8, 0xfff}, 0xffffffffffffffff, 0x2, r0, 0x8) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000b40)='cgroup.subtree_control\x00') ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x2400, 0x1) r5 = getpid() socketpair$unix(0x1, 0x7, 0x0, &(0x7f0000000540)={0xffffffffffffffff}) setsockopt$sock_attach_bpf(r6, 0x1, 0x32, &(0x7f00000005c0)=r3, 0x4) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={0x0, 0xffffffffffffffff, 0x0, 0x12, &(0x7f0000000480)='./cgroup.cpu/syz1\x00', r1}, 0x30) perf_event_open(&(0x7f0000000300)={0x5, 0x70, 0xff, 0x4, 0x1000, 0xe5af, 0x0, 0x8000, 0xd0440, 0x2, 0xffff, 0x1, 0x4, 0x1f, 0x3, 0xfffffffffffffffa, 0x5, 0x9, 0x8, 0x1, 0x3, 0x400, 0x6, 0x5, 0x401, 0x10000, 0xff, 0xb24, 0xffffffffffff8000, 0xc8a, 0x3f, 0xfffffffffffffffa, 0xffffffffffff8001, 0x200, 0x5, 0x3, 0x2, 0x93a, 0x0, 0x7fff, 0x2, @perf_bp={&(0x7f0000000100), 0x1}, 0x0, 0x0, 0xffffffffffffff4e, 0x6, 0x0, 0x4, 0xfffffffffffffffd}, r5, 0x0, r7, 0x8) r8 = openat$tun(0xffffffffffffff9c, &(0x7f0000000580)='/dev/net/tun\x00', 0x40000, 0x0) ioctl$TUNSETPERSIST(r8, 0x400454cb, 0x1) r9 = socket$kcm(0x29, 0x5, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000800)={0x0, r0, 0x1, 0x2}, 0x14) ioctl$sock_kcm_SIOCKCMUNATTACH(r9, 0x89e1, &(0x7f0000000900)={r2}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r3, 0x0, 0x8b, 0x0, &(0x7f0000000680)="3ce41f426b7dd449ae14b08e1868c456d4fe9c7993884cf18f4dd5a0bc57250243da4203e0640859184bc4c4690afefd7736e8842cd88030448e918bdb5bd9bbbd680a51261557c0477c18049c832005ebb5b185c6f233df73a21d3b3ddad8426fba2d5f8aac5df904d5e5f2e7dc4a517079e08d5b2175a276f2a5c49cc2957cb367f269898570852dd63a", 0x0, 0x5}, 0x28) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000500)='./cgroup/syz0\x00', 0x200002, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000740)={r3, 0x50, &(0x7f00000003c0)}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r2, 0x50, &(0x7f0000000840)}, 0x10) openat$cgroup_subtree(r2, &(0x7f0000000940)='cgroup.subtree_control\x00', 0x2, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x1ff, 0x0, 0x0, 0x0, 0x200000, 0xffffffffffffffff, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280), 0x2}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r10 = socket$kcm(0xa, 0x400000000002, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffc59) ioctl$sock_kcm_SIOCKCMCLONE(r10, 0x890b, &(0x7f0000000000)) ioctl$sock_kcm_SIOCKCMCLONE(r10, 0x890c, &(0x7f0000000000)) 03:53:45 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x8, &(0x7f0000000300)=ANY=[@ANYBLOB="7a0af8ff75256400bfa100000000000007010000f8ffffffb7020000040034167b110000000000008500000005000000b70500000000ea9a9500000600000000"], 0x0}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000002540)={r0, 0x0, 0xe, 0x0, &(0x7f0000002480)="e4691a18d261eda75c328ec11b1a", 0x0, 0xf000}, 0x28) [ 1853.384422] audit: type=1804 audit(2000001225.700:647): pid=28814 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor0" name="/root/syzkaller-testdir498485449/syzkaller.cqcGk7/2852/bus" dev="sda1" ino=18659 res=1 [ 1853.468343] audit: type=1804 audit(2000001225.740:648): pid=28814 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=ToMToU comm="syz-executor0" name="/root/syzkaller-testdir498485449/syzkaller.cqcGk7/2852/bus" dev="sda1" ino=18659 res=1 [ 1853.513133] audit: type=1804 audit(2000001225.740:649): pid=28814 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor0" name="/root/syzkaller-testdir498485449/syzkaller.cqcGk7/2852/bus" dev="sda1" ino=18659 res=1 [ 1853.597723] audit: type=1804 audit(2000001225.780:650): pid=28827 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=ToMToU comm="syz-executor0" name="/root/syzkaller-testdir498485449/syzkaller.cqcGk7/2852/bus" dev="sda1" ino=18659 res=1 [ 1853.646005] audit: type=1804 audit(2000001225.830:651): pid=28827 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor0" name="/root/syzkaller-testdir498485449/syzkaller.cqcGk7/2852/bus" dev="sda1" ino=18659 res=1 [ 1854.069032] audit: type=1804 audit(2000001226.380:652): pid=28827 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=ToMToU comm="syz-executor0" name="/root/syzkaller-testdir498485449/syzkaller.cqcGk7/2852/bus" dev="sda1" ino=18659 res=1 03:53:46 executing program 5: getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffff9c, 0x84, 0x13, 0x0, 0x0) r0 = syz_open_dev$swradio(&(0x7f0000000000)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$radio(0x0, 0xffffffffffffffff, 0x2) r1 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) getdents64(r1, 0x0, 0x0) r2 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r2, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r2, 0x8) r3 = socket$inet6_sctp(0xa, 0x805, 0x84) r4 = accept4(r2, 0x0, 0x0, 0x0) prctl$PR_SET_ENDIAN(0x14, 0x1) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r3, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) epoll_pwait(0xffffffffffffffff, &(0x7f0000000040)=[{}], 0x1, 0x0, &(0x7f0000000080), 0x8) getpgid(0x0) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r4, 0x84, 0x9, &(0x7f0000000280)={0x0, @in={{0x2, 0x0, @empty}}, 0x0, 0xac14142400000000, 0x0, 0x0, 0x54}, 0x98) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) ioctl$SIOCAX25ADDFWD(r0, 0x89ea, 0x0) syz_mount_image$gfs2(0x0, 0x0, 0x0, 0x0, &(0x7f00000005c0), 0x1040040, 0x0) readv(r1, &(0x7f0000000500)=[{&(0x7f0000000400)=""/217, 0xd9}], 0x1) 03:53:46 executing program 4: r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x5f}, {&(0x7f00000000c0)=""/85, 0x55}, {&(0x7f0000000fc0)=""/4096, 0x1000}, {&(0x7f0000000400)=""/120, 0x78}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f0000000540)=""/154, 0x9a}, {&(0x7f0000000340)=""/22, 0x16}], 0x7, &(0x7f0000002400)=""/191, 0xbf}}], 0x1, 0x0, &(0x7f0000003700)={0x77359400}) 03:53:46 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x20, &(0x7f0000000b80)=ANY=[@ANYBLOB="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"], 0x0, 0x1625, 0x0, 0x0, 0x41100, 0x1, [], 0x0, 0x4}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r0, 0xdb, &(0x7f0000000200)={0x0, 0x0}}, 0x393) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='cgroup.events\x00', 0x0, 0x0) write$cgroup_int(r2, &(0x7f00000007c0)=0x6, 0x12) r3 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000002c0), 0x4) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz1\x00', 0x1ff) r4 = perf_event_open$cgroup(&(0x7f0000000600)={0x0, 0x70, 0x9, 0x6, 0x8, 0x6, 0x0, 0xfffffffffffff49f, 0x2, 0x6, 0x3ff, 0x0, 0x20, 0x0, 0x1, 0x81, 0x1, 0x400, 0x4, 0xfac, 0x4, 0x1, 0x10000, 0xf1, 0xd3, 0x0, 0x200, 0x1, 0x100000000, 0x2, 0x100000000, 0xfff, 0xfff, 0xffff, 0x3, 0xfffffffffffffffd, 0x0, 0x6, 0x0, 0x50, 0x0, @perf_config_ext={0x3f, 0x9}, 0x20000, 0x8, 0xef3, 0x7, 0x100000000, 0x8, 0xfff}, 0xffffffffffffffff, 0x2, r0, 0x8) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000b40)='cgroup.subtree_control\x00') ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x2400, 0x1) r5 = getpid() socketpair$unix(0x1, 0x7, 0x0, &(0x7f0000000540)={0xffffffffffffffff}) setsockopt$sock_attach_bpf(r6, 0x1, 0x32, &(0x7f00000005c0)=r3, 0x4) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={0x0, 0xffffffffffffffff, 0x0, 0x12, &(0x7f0000000480)='./cgroup.cpu/syz1\x00', r1}, 0x30) perf_event_open(&(0x7f0000000300)={0x5, 0x70, 0xff, 0x4, 0x1000, 0xe5af, 0x0, 0x8000, 0xd0440, 0x2, 0xffff, 0x1, 0x4, 0x1f, 0x3, 0xfffffffffffffffa, 0x5, 0x9, 0x8, 0x1, 0x3, 0x400, 0x6, 0x5, 0x401, 0x10000, 0xff, 0xb24, 0xffffffffffff8000, 0xc8a, 0x3f, 0xfffffffffffffffa, 0xffffffffffff8001, 0x200, 0x5, 0x3, 0x2, 0x93a, 0x0, 0x7fff, 0x2, @perf_bp={&(0x7f0000000100), 0x1}, 0x0, 0x0, 0xffffffffffffff4e, 0x6, 0x0, 0x4, 0xfffffffffffffffd}, r5, 0x0, r7, 0x8) r8 = openat$tun(0xffffffffffffff9c, &(0x7f0000000580)='/dev/net/tun\x00', 0x40000, 0x0) ioctl$TUNSETPERSIST(r8, 0x400454cb, 0x1) r9 = socket$kcm(0x29, 0x5, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000800)={0x0, r0, 0x1, 0x2}, 0x14) ioctl$sock_kcm_SIOCKCMUNATTACH(r9, 0x89e1, &(0x7f0000000900)={r2}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r3, 0x0, 0x8b, 0x0, &(0x7f0000000680)="3ce41f426b7dd449ae14b08e1868c456d4fe9c7993884cf18f4dd5a0bc57250243da4203e0640859184bc4c4690afefd7736e8842cd88030448e918bdb5bd9bbbd680a51261557c0477c18049c832005ebb5b185c6f233df73a21d3b3ddad8426fba2d5f8aac5df904d5e5f2e7dc4a517079e08d5b2175a276f2a5c49cc2957cb367f269898570852dd63a", 0x0, 0x5}, 0x28) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000500)='./cgroup/syz0\x00', 0x200002, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000740)={r3, 0x50, &(0x7f00000003c0)}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r2, 0x50, &(0x7f0000000840)}, 0x10) openat$cgroup_subtree(r2, &(0x7f0000000940)='cgroup.subtree_control\x00', 0x2, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x1ff, 0x0, 0x0, 0x0, 0x200000, 0xffffffffffffffff, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280), 0x2}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r10 = socket$kcm(0xa, 0x400000000002, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffc59) ioctl$sock_kcm_SIOCKCMCLONE(r10, 0x890b, &(0x7f0000000000)) ioctl$sock_kcm_SIOCKCMCLONE(r10, 0x890c, &(0x7f0000000000)) 03:53:46 executing program 2: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f0000000180)='cgroup2\x00', 0x0, &(0x7f000000a000)) [ 1854.107710] audit: type=1804 audit(2000001226.420:653): pid=28827 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor0" name="/root/syzkaller-testdir498485449/syzkaller.cqcGk7/2852/bus" dev="sda1" ino=18659 res=1 [ 1854.205163] audit: type=1804 audit(2000001226.420:654): pid=28827 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor0" name="/root/syzkaller-testdir498485449/syzkaller.cqcGk7/2852/bus" dev="sda1" ino=18659 res=1 [ 1854.287226] audit: type=1804 audit(2000001226.460:655): pid=28814 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=ToMToU comm="syz-executor0" name="/root/syzkaller-testdir498485449/syzkaller.cqcGk7/2852/bus" dev="sda1" ino=18659 res=1 03:53:46 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x20, &(0x7f0000000b80)=ANY=[@ANYBLOB="cab5674ca80400f902c8d3fc17d4a51472ff5e04a7ed68e9074e865fffffffffff6582e2a0c58f438f1a9b1af27305fb6c1d497851a00d51dddde821f356222d82de15a5bb3ca4d544c3683ff903b30637ee634a8a4fa0e19e57c7d35e4db3a02231b71023a910ac2424326e31258bde7ca760ff3ca3261a92112b3c8db9e0d79dc5ad29e05434154bba1e60d243d8fa466b27518c09e11b78ec43ab7af1d33fbd4885ee5e95b0849345d0edef0a2e68320a47938597cf0fba5ae2e93301ffc38baaf2673b7fd4628a0fe3665006d238567bdb430991e02866ad858345dc86331d91a53051b3284827fc0a870d857ecc180901feb2d1dd3be0c1ebc3fa1d00d550744d9e55"], 0x0, 0x1625, 0x0, 0x0, 0x41100, 0x1, [], 0x0, 0x4}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r0, 0xdb, &(0x7f0000000200)={0x0, 0x0}}, 0x393) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='cgroup.events\x00', 0x0, 0x0) write$cgroup_int(r2, &(0x7f00000007c0)=0x6, 0x12) r3 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000002c0), 0x4) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz1\x00', 0x1ff) r4 = perf_event_open$cgroup(&(0x7f0000000600)={0x0, 0x70, 0x9, 0x6, 0x8, 0x6, 0x0, 0xfffffffffffff49f, 0x2, 0x6, 0x3ff, 0x0, 0x20, 0x0, 0x1, 0x81, 0x1, 0x400, 0x4, 0xfac, 0x4, 0x1, 0x10000, 0xf1, 0xd3, 0x0, 0x200, 0x1, 0x100000000, 0x2, 0x100000000, 0xfff, 0xfff, 0xffff, 0x3, 0xfffffffffffffffd, 0x0, 0x6, 0x0, 0x50, 0x0, @perf_config_ext={0x3f, 0x9}, 0x20000, 0x8, 0xef3, 0x7, 0x100000000, 0x8, 0xfff}, 0xffffffffffffffff, 0x2, r0, 0x8) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000b40)='cgroup.subtree_control\x00') ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x2400, 0x1) r5 = getpid() socketpair$unix(0x1, 0x7, 0x0, &(0x7f0000000540)={0xffffffffffffffff}) setsockopt$sock_attach_bpf(r6, 0x1, 0x32, &(0x7f00000005c0)=r3, 0x4) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={0x0, 0xffffffffffffffff, 0x0, 0x12, &(0x7f0000000480)='./cgroup.cpu/syz1\x00', r1}, 0x30) perf_event_open(&(0x7f0000000300)={0x5, 0x70, 0xff, 0x4, 0x1000, 0xe5af, 0x0, 0x8000, 0xd0440, 0x2, 0xffff, 0x1, 0x4, 0x1f, 0x3, 0xfffffffffffffffa, 0x5, 0x9, 0x8, 0x1, 0x3, 0x400, 0x6, 0x5, 0x401, 0x10000, 0xff, 0xb24, 0xffffffffffff8000, 0xc8a, 0x3f, 0xfffffffffffffffa, 0xffffffffffff8001, 0x200, 0x5, 0x3, 0x2, 0x93a, 0x0, 0x7fff, 0x2, @perf_bp={&(0x7f0000000100), 0x1}, 0x0, 0x0, 0xffffffffffffff4e, 0x6, 0x0, 0x4, 0xfffffffffffffffd}, r5, 0x0, r7, 0x8) r8 = openat$tun(0xffffffffffffff9c, &(0x7f0000000580)='/dev/net/tun\x00', 0x40000, 0x0) ioctl$TUNSETPERSIST(r8, 0x400454cb, 0x1) r9 = socket$kcm(0x29, 0x5, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000800)={0x0, r0, 0x1, 0x2}, 0x14) ioctl$sock_kcm_SIOCKCMUNATTACH(r9, 0x89e1, &(0x7f0000000900)={r2}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r3, 0x0, 0x8b, 0x0, &(0x7f0000000680)="3ce41f426b7dd449ae14b08e1868c456d4fe9c7993884cf18f4dd5a0bc57250243da4203e0640859184bc4c4690afefd7736e8842cd88030448e918bdb5bd9bbbd680a51261557c0477c18049c832005ebb5b185c6f233df73a21d3b3ddad8426fba2d5f8aac5df904d5e5f2e7dc4a517079e08d5b2175a276f2a5c49cc2957cb367f269898570852dd63a", 0x0, 0x5}, 0x28) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000500)='./cgroup/syz0\x00', 0x200002, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000740)={r3, 0x50, &(0x7f00000003c0)}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r2, 0x50, &(0x7f0000000840)}, 0x10) openat$cgroup_subtree(r2, &(0x7f0000000940)='cgroup.subtree_control\x00', 0x2, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x1ff, 0x0, 0x0, 0x0, 0x200000, 0xffffffffffffffff, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280), 0x2}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r10 = socket$kcm(0xa, 0x400000000002, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffc59) ioctl$sock_kcm_SIOCKCMCLONE(r10, 0x890b, &(0x7f0000000000)) ioctl$sock_kcm_SIOCKCMCLONE(r10, 0x890c, &(0x7f0000000000)) 03:53:46 executing program 4: r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x5f}, {&(0x7f00000000c0)=""/85, 0x55}, {&(0x7f0000000fc0)=""/4096, 0x1000}, {&(0x7f0000000400)=""/120, 0x78}, {0x0}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f0000000540)=""/154, 0x9a}, {&(0x7f0000000340)=""/22, 0x16}], 0x8, &(0x7f0000002400)=""/191, 0xbf}}], 0x1, 0x0, &(0x7f0000003700)={0x77359400}) 03:53:46 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f00000001c0), 0xfffffef3) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r3 = creat(&(0x7f00000001c0)='./bus\x00', 0x0) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vga_arbiter\x00', 0x0, 0x0) r4 = open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r5) r6 = creat(&(0x7f0000000700)='./bus\x00', 0x0) truncate(&(0x7f0000000240)='./bus\x00', 0x800) r7 = open(&(0x7f0000000140)='./bus\x00', 0x400000008, 0x0) lseek(r6, 0x0, 0x2) getgroups(0x0, 0x0) getresgid(&(0x7f00000003c0), 0x0, &(0x7f0000000400)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000580)='./bus\x00', 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB], 0x1, 0x0) fstat(r6, &(0x7f00000004c0)) stat(0x0, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0}) sysinfo(0x0) sendfile(r6, r7, 0x0, 0x8000fffffffe) creat(&(0x7f0000000700)='./bus\x00', 0x0) r9 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) ftruncate(r0, 0x3) getsockopt$inet6_IPV6_XFRM_POLICY(r3, 0x29, 0x23, 0x0, &(0x7f0000000180)) setreuid(r8, 0x0) fallocate(r2, 0x0, 0x0, 0x0) getsockopt$inet_pktinfo(r6, 0x0, 0x8, 0x0, &(0x7f0000000480)) lseek(r9, 0x0, 0x3) pread64(r4, &(0x7f0000005000)=""/4096, 0xffffffffffffffb3, 0x0) 03:53:46 executing program 2: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount$fuseblk(&(0x7f0000000000)='/dev/loop0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='fuseblk\x00', 0x200001, 0x0) 03:53:46 executing program 3: openat$proc_capi20ncci(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$KDSETLED(0xffffffffffffffff, 0x4b32, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$RTC_AIE_ON(0xffffffffffffffff, 0x7001) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 1854.325970] audit: type=1804 audit(2000001226.460:656): pid=28827 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=ToMToU comm="syz-executor0" name="/root/syzkaller-testdir498485449/syzkaller.cqcGk7/2852/bus" dev="sda1" ino=18659 res=1 03:53:46 executing program 4: r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x5f}, {&(0x7f00000000c0)=""/85, 0x55}, {&(0x7f0000000fc0)=""/4096, 0x1000}, {&(0x7f0000000400)=""/120, 0x78}, {0x0}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f0000000540)=""/154, 0x9a}, {&(0x7f0000000340)=""/22, 0x16}], 0x8, &(0x7f0000002400)=""/191, 0xbf}}], 0x1, 0x0, &(0x7f0000003700)={0x77359400}) 03:53:46 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x20, &(0x7f0000000b80)=ANY=[@ANYBLOB="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"], 0x0, 0x1625, 0x0, 0x0, 0x41100, 0x1, [], 0x0, 0x4}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r0, 0xdb, &(0x7f0000000200)={0x0, 0x0}}, 0x393) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='cgroup.events\x00', 0x0, 0x0) write$cgroup_int(r2, &(0x7f00000007c0)=0x6, 0x12) r3 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000002c0), 0x4) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz1\x00', 0x1ff) r4 = perf_event_open$cgroup(&(0x7f0000000600)={0x0, 0x70, 0x9, 0x6, 0x8, 0x6, 0x0, 0xfffffffffffff49f, 0x2, 0x6, 0x3ff, 0x0, 0x20, 0x0, 0x1, 0x81, 0x1, 0x400, 0x4, 0xfac, 0x4, 0x1, 0x10000, 0xf1, 0xd3, 0x0, 0x200, 0x1, 0x100000000, 0x2, 0x100000000, 0xfff, 0xfff, 0xffff, 0x3, 0xfffffffffffffffd, 0x0, 0x6, 0x0, 0x50, 0x0, @perf_config_ext={0x3f, 0x9}, 0x20000, 0x8, 0xef3, 0x7, 0x100000000, 0x8, 0xfff}, 0xffffffffffffffff, 0x2, r0, 0x8) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000b40)='cgroup.subtree_control\x00') ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x2400, 0x1) r5 = getpid() socketpair$unix(0x1, 0x7, 0x0, &(0x7f0000000540)={0xffffffffffffffff}) setsockopt$sock_attach_bpf(r6, 0x1, 0x32, &(0x7f00000005c0)=r3, 0x4) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={0x0, 0xffffffffffffffff, 0x0, 0x12, &(0x7f0000000480)='./cgroup.cpu/syz1\x00', r1}, 0x30) perf_event_open(&(0x7f0000000300)={0x5, 0x70, 0xff, 0x4, 0x1000, 0xe5af, 0x0, 0x8000, 0xd0440, 0x2, 0xffff, 0x1, 0x4, 0x1f, 0x3, 0xfffffffffffffffa, 0x5, 0x9, 0x8, 0x1, 0x3, 0x400, 0x6, 0x5, 0x401, 0x10000, 0xff, 0xb24, 0xffffffffffff8000, 0xc8a, 0x3f, 0xfffffffffffffffa, 0xffffffffffff8001, 0x200, 0x5, 0x3, 0x2, 0x93a, 0x0, 0x7fff, 0x2, @perf_bp={&(0x7f0000000100), 0x1}, 0x0, 0x0, 0xffffffffffffff4e, 0x6, 0x0, 0x4, 0xfffffffffffffffd}, r5, 0x0, r7, 0x8) r8 = openat$tun(0xffffffffffffff9c, &(0x7f0000000580)='/dev/net/tun\x00', 0x40000, 0x0) ioctl$TUNSETPERSIST(r8, 0x400454cb, 0x1) r9 = socket$kcm(0x29, 0x5, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000800)={0x0, r0, 0x1, 0x2}, 0x14) ioctl$sock_kcm_SIOCKCMUNATTACH(r9, 0x89e1, &(0x7f0000000900)={r2}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r3, 0x0, 0x8b, 0x0, &(0x7f0000000680)="3ce41f426b7dd449ae14b08e1868c456d4fe9c7993884cf18f4dd5a0bc57250243da4203e0640859184bc4c4690afefd7736e8842cd88030448e918bdb5bd9bbbd680a51261557c0477c18049c832005ebb5b185c6f233df73a21d3b3ddad8426fba2d5f8aac5df904d5e5f2e7dc4a517079e08d5b2175a276f2a5c49cc2957cb367f269898570852dd63a", 0x0, 0x5}, 0x28) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000500)='./cgroup/syz0\x00', 0x200002, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000740)={r3, 0x50, &(0x7f00000003c0)}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r2, 0x50, &(0x7f0000000840)}, 0x10) openat$cgroup_subtree(r2, &(0x7f0000000940)='cgroup.subtree_control\x00', 0x2, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x1ff, 0x0, 0x0, 0x0, 0x200000, 0xffffffffffffffff, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280), 0x2}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r10 = socket$kcm(0xa, 0x400000000002, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffc59) ioctl$sock_kcm_SIOCKCMCLONE(r10, 0x890b, &(0x7f0000000000)) ioctl$sock_kcm_SIOCKCMCLONE(r10, 0x890c, &(0x7f0000000000)) 03:53:46 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_ENABLE_CAP(r1, 0x4068aea3, &(0x7f0000000480)={0x79}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, r2, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_SET_LAPIC(r2, 0x4400ae8f, &(0x7f0000001940)={"a523fb9656eb871ffcd7ffeb51d84e738a55eba841ae487e33cdd921e8a51ce6c924020f0ac3562dd8cdeb31deac16f46da4ac16ee8165bce439eddce671c5b0a1103ea3f86a43cbb78504f6f9c77c2f09dc27632ec6036ee52a87e321e707c0cfe15576c26d52d0334c8d4693e127b3a046a5ed7796c9c5017cfd58ec871ed76369846fea9ebfa2f7f96496abf4ef57ed1ecd930eb9e13396875f01e932804ffe8a34c8fbedd97cdfb3176ec59fbbfd20a6ff17795431c341a35eb0f5f703480a5211cc6a7e2084e4a9b6aedf60b7b8084b00ca2cbed255b4cc4679c967432fea5e95119f9635e94794aab6ef54f290677fa08d0ee2cc8eae468efd02417055d3f3ccc86b629dfb878c4d115c16c75fe352cffa93648cf49577256b5d2faf0634335c97ffff966ae90cbf81250df3613c25d2789c869c9cc95a6e9d364c4c684059c593f9950e66cf81cd9f36d73fade4f0cbb795010364d13ff32c12efd91d0ebb6533700945f2db6113a630bd521eec89a74c46e1733b72d6e4d2ccee3b40f99809a9a4fb5fc2d1c53e1366d455bcbe81893100ab56b2556b55c1a0c5787356b464c3bf7011488e55f587a6d4420d46d69a74ee5bbfbcb0d6cb00aae8c3dfd6dd2e9f76d7a542f20553207b668dce69f1b463ee9166e81bb109f461b8885f15c9e525d72260ccdbd69e3345612158114780b9409ea856cb724faa6ed27ba836b35c10e7c7d43f2fa34f98f16a00f31565e16a213eaf4a7f438c89733ebe6d16328b930fd942bc64d631dd1f2aa1cc2ccdaff2324076c83e1ba4d2a0e40e010c96b42e7a4a76cd7a89ef592b9b3030f62d9fbd565ee5908ab90b42620b61e5d1e08621a31d21003cd12a450461636472fa64a7e1b98778bfb482fb4b4da31b42ee98b10f9c0f4c085d08c37ee2e3a9e4a5aff72a0ab844fcbfa224842c85f6cdfd25829c44760e3859624f891df4824f7d17938ac2dee1412cf3083e1d5ee2d29b63267ccba535409da7bef05d3fa79a3ef037ee609e01ad345ee17f48b5e8510f767de35df4dfb856f7533ad88866c6b01fe345107ba7191a8809e2e014492acf9c4f35cad664198a65c55f884490f4b30b4526324be842c393f336f16bea2bf6c6b917fdb751e12ff689ab4ffa44625a8b2bc1de4e88682abe5ce9d1942792747681ad23c31046d825140987f19a9cf10323c3f50a20f35a6d1dd8ca6758296b4537a0da1a853011b777623c8774b3689897cf9264a7782470847f36a8093f04000000663438ab39d8a777fb3e10cb4a2402a939a98d387087c5ca5fd8fbc4d96ae698b5bb84a0a8484e2b85743e623a033eb5b1889ccfb4b95885bc69d4c1cb819b95e7923e557c9ec9ec10e94d1e1295fc2f256fa095036f6cfc04c414fc57fc72c120614a586089c93741e97a61c46600"}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$dlm_monitor(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 03:53:47 executing program 5: getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffff9c, 0x84, 0x13, 0x0, 0x0) r0 = syz_open_dev$swradio(&(0x7f0000000000)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$radio(0x0, 0xffffffffffffffff, 0x2) r1 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) getdents64(r1, 0x0, 0x0) r2 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r2, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r2, 0x8) r3 = socket$inet6_sctp(0xa, 0x805, 0x84) r4 = accept4(r2, 0x0, 0x0, 0x0) prctl$PR_SET_ENDIAN(0x14, 0x1) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r3, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) epoll_pwait(0xffffffffffffffff, &(0x7f0000000040)=[{}], 0x1, 0x0, &(0x7f0000000080), 0x8) getpgid(0x0) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r4, 0x84, 0x9, &(0x7f0000000280)={0x0, @in={{0x2, 0x0, @empty}}, 0x0, 0xac14142400000000, 0x0, 0x0, 0x54}, 0x98) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) ioctl$SIOCAX25ADDFWD(r0, 0x89ea, 0x0) syz_mount_image$gfs2(0x0, 0x0, 0x87, 0x0, 0x0, 0x1040040, 0x0) readv(r1, &(0x7f0000000500)=[{&(0x7f0000000400)=""/217, 0xd9}], 0x1) 03:53:47 executing program 2: pipe(&(0x7f00000002c0)={0xffffffffffffffff}) ioctl$sock_TIOCINQ(r0, 0x541b, &(0x7f0000000000)) 03:53:47 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") syz_mount_image$jfs(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x5000, 0x0) 03:53:47 executing program 4: r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x5f}, {&(0x7f00000000c0)=""/85, 0x55}, {&(0x7f0000000fc0)=""/4096, 0x1000}, {&(0x7f0000000400)=""/120, 0x78}, {0x0}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f0000000540)=""/154, 0x9a}, {&(0x7f0000000340)=""/22, 0x16}], 0x8, &(0x7f0000002400)=""/191, 0xbf}}], 0x1, 0x0, &(0x7f0000003700)={0x77359400}) 03:53:47 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x20, &(0x7f0000000b80)=ANY=[@ANYBLOB="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"], 0x0, 0x1625, 0x0, 0x0, 0x41100, 0x1, [], 0x0, 0x4}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r0, 0xdb, &(0x7f0000000200)={0x0, 0x0}}, 0x393) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='cgroup.events\x00', 0x0, 0x0) write$cgroup_int(r2, &(0x7f00000007c0)=0x6, 0x12) r3 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000002c0), 0x4) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz1\x00', 0x1ff) r4 = perf_event_open$cgroup(&(0x7f0000000600)={0x0, 0x70, 0x9, 0x6, 0x8, 0x6, 0x0, 0xfffffffffffff49f, 0x2, 0x6, 0x3ff, 0x0, 0x20, 0x0, 0x1, 0x81, 0x1, 0x400, 0x4, 0xfac, 0x4, 0x1, 0x10000, 0xf1, 0xd3, 0x92b, 0x0, 0x1, 0x100000000, 0x2, 0x100000000, 0xfff, 0xfff, 0xffff, 0x3, 0xfffffffffffffffd, 0x0, 0x6, 0x0, 0x50, 0x0, @perf_config_ext={0x3f, 0x9}, 0x20000, 0x8, 0xef3, 0x7, 0x100000000, 0x8, 0xfff}, 0xffffffffffffffff, 0x2, r0, 0x8) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000b40)='cgroup.subtree_control\x00') ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x2400, 0x1) r5 = getpid() socketpair$unix(0x1, 0x7, 0x0, &(0x7f0000000540)={0xffffffffffffffff}) setsockopt$sock_attach_bpf(r6, 0x1, 0x32, &(0x7f00000005c0)=r3, 0x4) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={0x0, 0xffffffffffffffff, 0x0, 0x12, &(0x7f0000000480)='./cgroup.cpu/syz1\x00', r1}, 0x30) perf_event_open(&(0x7f0000000300)={0x5, 0x70, 0xff, 0x4, 0x1000, 0xe5af, 0x0, 0x8000, 0xd0440, 0x2, 0xffff, 0x1, 0x4, 0x1f, 0x3, 0xfffffffffffffffa, 0x5, 0x9, 0x8, 0x1, 0x3, 0x400, 0x6, 0x5, 0x401, 0x10000, 0xff, 0xb24, 0xffffffffffff8000, 0xc8a, 0x3f, 0xfffffffffffffffa, 0xffffffffffff8001, 0x200, 0x5, 0x3, 0x2, 0x93a, 0x0, 0x7fff, 0x2, @perf_bp={&(0x7f0000000100), 0x1}, 0x0, 0x0, 0xffffffffffffff4e, 0x6, 0x0, 0x4, 0xfffffffffffffffd}, r5, 0x0, r7, 0x8) r8 = openat$tun(0xffffffffffffff9c, &(0x7f0000000580)='/dev/net/tun\x00', 0x40000, 0x0) ioctl$TUNSETPERSIST(r8, 0x400454cb, 0x1) r9 = socket$kcm(0x29, 0x5, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000800)={0x0, r0, 0x1, 0x2}, 0x14) ioctl$sock_kcm_SIOCKCMUNATTACH(r9, 0x89e1, &(0x7f0000000900)={r2}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r3, 0x0, 0x8b, 0x0, &(0x7f0000000680)="3ce41f426b7dd449ae14b08e1868c456d4fe9c7993884cf18f4dd5a0bc57250243da4203e0640859184bc4c4690afefd7736e8842cd88030448e918bdb5bd9bbbd680a51261557c0477c18049c832005ebb5b185c6f233df73a21d3b3ddad8426fba2d5f8aac5df904d5e5f2e7dc4a517079e08d5b2175a276f2a5c49cc2957cb367f269898570852dd63a", 0x0, 0x5}, 0x28) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000500)='./cgroup/syz0\x00', 0x200002, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000740)={r3, 0x50, &(0x7f00000003c0)}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r2, 0x50, &(0x7f0000000840)}, 0x10) openat$cgroup_subtree(r2, &(0x7f0000000940)='cgroup.subtree_control\x00', 0x2, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x1ff, 0x0, 0x0, 0x0, 0x200000, 0xffffffffffffffff, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280), 0x2}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r10 = socket$kcm(0xa, 0x400000000002, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffc59) ioctl$sock_kcm_SIOCKCMCLONE(r10, 0x890b, &(0x7f0000000000)) ioctl$sock_kcm_SIOCKCMCLONE(r10, 0x890c, &(0x7f0000000000)) 03:53:47 executing program 4: r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x5f}, {&(0x7f00000000c0)=""/85, 0x55}, {&(0x7f0000000fc0)=""/4096, 0x1000}, {&(0x7f0000000480)=""/60, 0x3c}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f0000000540)=""/154, 0x9a}, {&(0x7f0000000340)=""/22, 0x16}], 0x7, &(0x7f0000002400)=""/191, 0xbf}}], 0x1, 0x0, &(0x7f0000003700)={0x77359400}) 03:53:48 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f00000001c0), 0xfffffef3) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r3 = creat(&(0x7f00000001c0)='./bus\x00', 0x0) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vga_arbiter\x00', 0x0, 0x0) r4 = open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r5) r6 = creat(&(0x7f0000000700)='./bus\x00', 0x0) truncate(&(0x7f0000000240)='./bus\x00', 0x800) r7 = open(&(0x7f0000000140)='./bus\x00', 0x400000008, 0x0) lseek(r6, 0x0, 0x2) getgroups(0x0, 0x0) getresgid(&(0x7f00000003c0), 0x0, &(0x7f0000000400)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000580)='./bus\x00', 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB], 0x1, 0x0) fstat(r6, &(0x7f00000004c0)) stat(0x0, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0}) sysinfo(0x0) sendfile(r6, r7, 0x0, 0x8000fffffffe) creat(&(0x7f0000000700)='./bus\x00', 0x0) r9 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) ftruncate(r0, 0x3) getsockopt$inet6_IPV6_XFRM_POLICY(r3, 0x29, 0x23, 0x0, &(0x7f0000000180)) setreuid(r8, 0x0) fallocate(r2, 0x0, 0x0, 0x0) getsockopt$inet_pktinfo(r6, 0x0, 0x8, 0x0, &(0x7f0000000480)) lseek(r9, 0x0, 0x3) pread64(r4, &(0x7f0000005000)=""/4096, 0xffffffffffffffb3, 0x0) 03:53:48 executing program 3: r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) bind$inet6(r0, &(0x7f0000000600)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r2 = open(&(0x7f00000034c0)='./bus\x00', 0x100000141042, 0x0) write$uinput_user_dev(r1, &(0x7f0000000640)={'syz0\x00', {0x0, 0x0, 0x99, 0x7}, 0x1b, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x10000, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x2e, 0xfffffffffffffffc, 0x7d, 0xc8, 0x0, 0x7, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfff, 0x1, 0x1f, 0x3, 0xae8, 0x2, 0x6, 0x4, 0x7ff, 0x100000001, 0x5, 0x4, 0x8, 0x18d1, 0x7, 0x7f, 0x5, 0x100000000, 0x1, 0x963, 0x8a65, 0x5, 0x7, 0x4c898c93, 0xbda, 0x6, 0x7, 0x1, 0x9, 0x1, 0x1, 0x3cda0b89, 0x3834fab3], [0x3, 0x6, 0x0, 0x0, 0x9], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0xff, 0x9, 0x0, 0x0, 0x1, 0x100000000, 0xcd, 0x0, 0x0, 0x73, 0x0, 0x7]}, 0x45c) ftruncate(r2, 0x10099b7) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000200)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x1005}]}, 0x10) sendfile(r1, r2, 0x0, 0x8000fffffffe) connect$unix(r1, &(0x7f0000006780)=@file={0x0, './bus\x00'}, 0x27) 03:53:48 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x20, &(0x7f0000000b80)=ANY=[@ANYBLOB="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"], 0x0, 0x1625, 0x0, 0x0, 0x41100, 0x1, [], 0x0, 0x4}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r0, 0xdb, &(0x7f0000000200)={0x0, 0x0}}, 0x393) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='cgroup.events\x00', 0x0, 0x0) write$cgroup_int(r2, &(0x7f00000007c0)=0x6, 0x12) r3 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000002c0), 0x4) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz1\x00', 0x1ff) r4 = perf_event_open$cgroup(&(0x7f0000000600)={0x0, 0x70, 0x9, 0x6, 0x8, 0x6, 0x0, 0xfffffffffffff49f, 0x2, 0x6, 0x3ff, 0x0, 0x20, 0x0, 0x1, 0x81, 0x1, 0x400, 0x4, 0xfac, 0x4, 0x1, 0x10000, 0xf1, 0xd3, 0x92b, 0x0, 0x1, 0x100000000, 0x2, 0x100000000, 0xfff, 0xfff, 0xffff, 0x3, 0xfffffffffffffffd, 0x0, 0x6, 0x0, 0x50, 0x0, @perf_config_ext={0x3f, 0x9}, 0x20000, 0x8, 0xef3, 0x7, 0x100000000, 0x8, 0xfff}, 0xffffffffffffffff, 0x2, r0, 0x8) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000b40)='cgroup.subtree_control\x00') ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x2400, 0x1) r5 = getpid() socketpair$unix(0x1, 0x7, 0x0, &(0x7f0000000540)={0xffffffffffffffff}) setsockopt$sock_attach_bpf(r6, 0x1, 0x32, &(0x7f00000005c0)=r3, 0x4) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={0x0, 0xffffffffffffffff, 0x0, 0x12, &(0x7f0000000480)='./cgroup.cpu/syz1\x00', r1}, 0x30) perf_event_open(&(0x7f0000000300)={0x5, 0x70, 0xff, 0x4, 0x1000, 0xe5af, 0x0, 0x8000, 0xd0440, 0x2, 0xffff, 0x1, 0x4, 0x1f, 0x3, 0xfffffffffffffffa, 0x5, 0x9, 0x8, 0x1, 0x3, 0x400, 0x6, 0x5, 0x401, 0x10000, 0xff, 0xb24, 0xffffffffffff8000, 0xc8a, 0x3f, 0xfffffffffffffffa, 0xffffffffffff8001, 0x200, 0x5, 0x3, 0x2, 0x93a, 0x0, 0x7fff, 0x2, @perf_bp={&(0x7f0000000100), 0x1}, 0x0, 0x0, 0xffffffffffffff4e, 0x6, 0x0, 0x4, 0xfffffffffffffffd}, r5, 0x0, r7, 0x8) r8 = openat$tun(0xffffffffffffff9c, &(0x7f0000000580)='/dev/net/tun\x00', 0x40000, 0x0) ioctl$TUNSETPERSIST(r8, 0x400454cb, 0x1) r9 = socket$kcm(0x29, 0x5, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000800)={0x0, r0, 0x1, 0x2}, 0x14) ioctl$sock_kcm_SIOCKCMUNATTACH(r9, 0x89e1, &(0x7f0000000900)={r2}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r3, 0x0, 0x8b, 0x0, &(0x7f0000000680)="3ce41f426b7dd449ae14b08e1868c456d4fe9c7993884cf18f4dd5a0bc57250243da4203e0640859184bc4c4690afefd7736e8842cd88030448e918bdb5bd9bbbd680a51261557c0477c18049c832005ebb5b185c6f233df73a21d3b3ddad8426fba2d5f8aac5df904d5e5f2e7dc4a517079e08d5b2175a276f2a5c49cc2957cb367f269898570852dd63a", 0x0, 0x5}, 0x28) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000500)='./cgroup/syz0\x00', 0x200002, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000740)={r3, 0x50, &(0x7f00000003c0)}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r2, 0x50, &(0x7f0000000840)}, 0x10) openat$cgroup_subtree(r2, &(0x7f0000000940)='cgroup.subtree_control\x00', 0x2, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x1ff, 0x0, 0x0, 0x0, 0x200000, 0xffffffffffffffff, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280), 0x2}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r10 = socket$kcm(0xa, 0x400000000002, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffc59) ioctl$sock_kcm_SIOCKCMCLONE(r10, 0x890b, &(0x7f0000000000)) ioctl$sock_kcm_SIOCKCMCLONE(r10, 0x890c, &(0x7f0000000000)) 03:53:48 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) ioctl$SIOCRSSL2CALL(r0, 0x89e2, &(0x7f0000000000)=@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}) 03:53:48 executing program 4: r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x5f}, {&(0x7f00000000c0)=""/85, 0x55}, {&(0x7f0000000fc0)=""/4096, 0x1000}, {&(0x7f0000000480)=""/60, 0x3c}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f0000000540)=""/154, 0x9a}, {&(0x7f0000000340)=""/22, 0x16}], 0x7, &(0x7f0000002400)=""/191, 0xbf}}], 0x1, 0x0, &(0x7f0000003700)={0x77359400}) [ 1855.842584] net_ratelimit: 18 callbacks suppressed [ 1855.842594] protocol 88fb is buggy, dev hsr_slave_0 [ 1855.852675] protocol 88fb is buggy, dev hsr_slave_1 [ 1855.857756] protocol 88fb is buggy, dev hsr_slave_0 [ 1855.862820] protocol 88fb is buggy, dev hsr_slave_1 [ 1855.867921] protocol 88fb is buggy, dev hsr_slave_0 [ 1855.873704] protocol 88fb is buggy, dev hsr_slave_1 [ 1855.878793] protocol 88fb is buggy, dev hsr_slave_0 [ 1855.883852] protocol 88fb is buggy, dev hsr_slave_1 03:53:48 executing program 4: r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x5f}, {&(0x7f00000000c0)=""/85, 0x55}, {&(0x7f0000000fc0)=""/4096, 0x1000}, {&(0x7f0000000480)=""/60, 0x3c}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f0000000540)=""/154, 0x9a}, {&(0x7f0000000340)=""/22, 0x16}], 0x7, &(0x7f0000002400)=""/191, 0xbf}}], 0x1, 0x0, &(0x7f0000003700)={0x77359400}) 03:53:48 executing program 5: getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffff9c, 0x84, 0x13, 0x0, 0x0) r0 = syz_open_dev$swradio(&(0x7f0000000000)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$radio(0x0, 0xffffffffffffffff, 0x2) r1 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) getdents64(r1, 0x0, 0x0) r2 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r2, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r2, 0x8) r3 = socket$inet6_sctp(0xa, 0x805, 0x84) r4 = accept4(r2, 0x0, 0x0, 0x0) prctl$PR_SET_ENDIAN(0x14, 0x1) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r3, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) epoll_pwait(0xffffffffffffffff, &(0x7f0000000040)=[{}], 0x1, 0x0, &(0x7f0000000080), 0x8) getpgid(0x0) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r4, 0x84, 0x9, &(0x7f0000000280)={0x0, @in={{0x2, 0x0, @empty}}, 0x0, 0xac14142400000000, 0x0, 0x0, 0x54}, 0x98) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) ioctl$SIOCAX25ADDFWD(r0, 0x89ea, 0x0) syz_mount_image$gfs2(0x0, 0x0, 0x87, 0x0, 0x0, 0x1040040, 0x0) readv(r1, &(0x7f0000000500)=[{&(0x7f0000000400)=""/217, 0xd9}], 0x1) 03:53:48 executing program 4: r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x5f}, {&(0x7f00000000c0)=""/85, 0x55}, {&(0x7f0000000fc0)=""/4096, 0x1000}, {0x0}, {&(0x7f0000000480)=""/60, 0x3c}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f0000000540)=""/154, 0x9a}, {&(0x7f0000000340)=""/22, 0x16}], 0x8, &(0x7f0000002400)=""/191, 0xbf}}], 0x1, 0x0, &(0x7f0000003700)={0x77359400}) 03:53:48 executing program 2: 03:53:48 executing program 3: 03:53:48 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x20, &(0x7f0000000b80)=ANY=[@ANYBLOB="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"], 0x0, 0x1625, 0x0, 0x0, 0x41100, 0x1, [], 0x0, 0x4}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r0, 0xdb, &(0x7f0000000200)={0x0, 0x0}}, 0x393) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='cgroup.events\x00', 0x0, 0x0) write$cgroup_int(r2, &(0x7f00000007c0)=0x6, 0x12) r3 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000002c0), 0x4) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz1\x00', 0x1ff) r4 = perf_event_open$cgroup(&(0x7f0000000600)={0x0, 0x70, 0x9, 0x6, 0x8, 0x6, 0x0, 0xfffffffffffff49f, 0x2, 0x6, 0x3ff, 0x0, 0x20, 0x0, 0x1, 0x81, 0x1, 0x400, 0x4, 0xfac, 0x4, 0x1, 0x10000, 0xf1, 0xd3, 0x92b, 0x0, 0x1, 0x100000000, 0x2, 0x100000000, 0xfff, 0xfff, 0xffff, 0x3, 0xfffffffffffffffd, 0x0, 0x6, 0x0, 0x50, 0x0, @perf_config_ext={0x3f, 0x9}, 0x20000, 0x8, 0xef3, 0x7, 0x100000000, 0x8, 0xfff}, 0xffffffffffffffff, 0x2, r0, 0x8) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000b40)='cgroup.subtree_control\x00') ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x2400, 0x1) r5 = getpid() socketpair$unix(0x1, 0x7, 0x0, &(0x7f0000000540)={0xffffffffffffffff}) setsockopt$sock_attach_bpf(r6, 0x1, 0x32, &(0x7f00000005c0)=r3, 0x4) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={0x0, 0xffffffffffffffff, 0x0, 0x12, &(0x7f0000000480)='./cgroup.cpu/syz1\x00', r1}, 0x30) perf_event_open(&(0x7f0000000300)={0x5, 0x70, 0xff, 0x4, 0x1000, 0xe5af, 0x0, 0x8000, 0xd0440, 0x2, 0xffff, 0x1, 0x4, 0x1f, 0x3, 0xfffffffffffffffa, 0x5, 0x9, 0x8, 0x1, 0x3, 0x400, 0x6, 0x5, 0x401, 0x10000, 0xff, 0xb24, 0xffffffffffff8000, 0xc8a, 0x3f, 0xfffffffffffffffa, 0xffffffffffff8001, 0x200, 0x5, 0x3, 0x2, 0x93a, 0x0, 0x7fff, 0x2, @perf_bp={&(0x7f0000000100), 0x1}, 0x0, 0x0, 0xffffffffffffff4e, 0x6, 0x0, 0x4, 0xfffffffffffffffd}, r5, 0x0, r7, 0x8) r8 = openat$tun(0xffffffffffffff9c, &(0x7f0000000580)='/dev/net/tun\x00', 0x40000, 0x0) ioctl$TUNSETPERSIST(r8, 0x400454cb, 0x1) r9 = socket$kcm(0x29, 0x5, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000800)={0x0, r0, 0x1, 0x2}, 0x14) ioctl$sock_kcm_SIOCKCMUNATTACH(r9, 0x89e1, &(0x7f0000000900)={r2}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r3, 0x0, 0x8b, 0x0, &(0x7f0000000680)="3ce41f426b7dd449ae14b08e1868c456d4fe9c7993884cf18f4dd5a0bc57250243da4203e0640859184bc4c4690afefd7736e8842cd88030448e918bdb5bd9bbbd680a51261557c0477c18049c832005ebb5b185c6f233df73a21d3b3ddad8426fba2d5f8aac5df904d5e5f2e7dc4a517079e08d5b2175a276f2a5c49cc2957cb367f269898570852dd63a", 0x0, 0x5}, 0x28) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000500)='./cgroup/syz0\x00', 0x200002, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000740)={r3, 0x50, &(0x7f00000003c0)}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r2, 0x50, &(0x7f0000000840)}, 0x10) openat$cgroup_subtree(r2, &(0x7f0000000940)='cgroup.subtree_control\x00', 0x2, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x1ff, 0x0, 0x0, 0x0, 0x200000, 0xffffffffffffffff, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280), 0x2}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r10 = socket$kcm(0xa, 0x400000000002, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffc59) ioctl$sock_kcm_SIOCKCMCLONE(r10, 0x890b, &(0x7f0000000000)) ioctl$sock_kcm_SIOCKCMCLONE(r10, 0x890c, &(0x7f0000000000)) 03:53:48 executing program 2: 03:53:49 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f00000001c0), 0xfffffef3) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r3 = creat(&(0x7f00000001c0)='./bus\x00', 0x0) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vga_arbiter\x00', 0x0, 0x0) r4 = open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r5) r6 = creat(&(0x7f0000000700)='./bus\x00', 0x0) truncate(&(0x7f0000000240)='./bus\x00', 0x800) r7 = open(&(0x7f0000000140)='./bus\x00', 0x400000008, 0x0) lseek(r6, 0x0, 0x2) getgroups(0x0, 0x0) getresgid(&(0x7f00000003c0), 0x0, &(0x7f0000000400)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000580)='./bus\x00', 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB], 0x1, 0x0) fstat(r6, &(0x7f00000004c0)) stat(0x0, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0}) sysinfo(0x0) sendfile(r6, r7, 0x0, 0x8000fffffffe) creat(&(0x7f0000000700)='./bus\x00', 0x0) r9 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) ftruncate(r0, 0x3) getsockopt$inet6_IPV6_XFRM_POLICY(r3, 0x29, 0x23, 0x0, &(0x7f0000000180)) setreuid(r8, 0x0) fallocate(r2, 0x0, 0x0, 0x0) getsockopt$inet_pktinfo(r6, 0x0, 0x8, 0x0, &(0x7f0000000480)) lseek(r9, 0x0, 0x3) pread64(r4, &(0x7f0000005000)=""/4096, 0xffffffffffffffb3, 0x0) 03:53:49 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x20, &(0x7f0000000b80)=ANY=[@ANYBLOB="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"], 0x0, 0x1625, 0x0, 0x0, 0x41100, 0x1, [], 0x0, 0x4}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r0, 0xdb, &(0x7f0000000200)={0x0, 0x0}}, 0x393) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='cgroup.events\x00', 0x0, 0x0) write$cgroup_int(r2, &(0x7f00000007c0)=0x6, 0x12) r3 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000002c0), 0x4) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz1\x00', 0x1ff) r4 = perf_event_open$cgroup(&(0x7f0000000600)={0x0, 0x70, 0x9, 0x6, 0x8, 0x6, 0x0, 0xfffffffffffff49f, 0x2, 0x6, 0x3ff, 0x0, 0x20, 0x0, 0x1, 0x81, 0x1, 0x400, 0x4, 0xfac, 0x4, 0x1, 0x10000, 0xf1, 0xd3, 0x92b, 0x200, 0x0, 0x100000000, 0x2, 0x100000000, 0xfff, 0xfff, 0xffff, 0x3, 0xfffffffffffffffd, 0x0, 0x6, 0x0, 0x50, 0x0, @perf_config_ext={0x3f, 0x9}, 0x20000, 0x8, 0xef3, 0x7, 0x100000000, 0x8, 0xfff}, 0xffffffffffffffff, 0x2, r0, 0x8) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000b40)='cgroup.subtree_control\x00') ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x2400, 0x1) r5 = getpid() socketpair$unix(0x1, 0x7, 0x0, &(0x7f0000000540)={0xffffffffffffffff}) setsockopt$sock_attach_bpf(r6, 0x1, 0x32, &(0x7f00000005c0)=r3, 0x4) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={0x0, 0xffffffffffffffff, 0x0, 0x12, &(0x7f0000000480)='./cgroup.cpu/syz1\x00', r1}, 0x30) perf_event_open(&(0x7f0000000300)={0x5, 0x70, 0xff, 0x4, 0x1000, 0xe5af, 0x0, 0x8000, 0xd0440, 0x2, 0xffff, 0x1, 0x4, 0x1f, 0x3, 0xfffffffffffffffa, 0x5, 0x9, 0x8, 0x1, 0x3, 0x400, 0x6, 0x5, 0x401, 0x10000, 0xff, 0xb24, 0xffffffffffff8000, 0xc8a, 0x3f, 0xfffffffffffffffa, 0xffffffffffff8001, 0x200, 0x5, 0x3, 0x2, 0x93a, 0x0, 0x7fff, 0x2, @perf_bp={&(0x7f0000000100), 0x1}, 0x0, 0x0, 0xffffffffffffff4e, 0x6, 0x0, 0x4, 0xfffffffffffffffd}, r5, 0x0, r7, 0x8) r8 = openat$tun(0xffffffffffffff9c, &(0x7f0000000580)='/dev/net/tun\x00', 0x40000, 0x0) ioctl$TUNSETPERSIST(r8, 0x400454cb, 0x1) r9 = socket$kcm(0x29, 0x5, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000800)={0x0, r0, 0x1, 0x2}, 0x14) ioctl$sock_kcm_SIOCKCMUNATTACH(r9, 0x89e1, &(0x7f0000000900)={r2}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r3, 0x0, 0x8b, 0x0, &(0x7f0000000680)="3ce41f426b7dd449ae14b08e1868c456d4fe9c7993884cf18f4dd5a0bc57250243da4203e0640859184bc4c4690afefd7736e8842cd88030448e918bdb5bd9bbbd680a51261557c0477c18049c832005ebb5b185c6f233df73a21d3b3ddad8426fba2d5f8aac5df904d5e5f2e7dc4a517079e08d5b2175a276f2a5c49cc2957cb367f269898570852dd63a", 0x0, 0x5}, 0x28) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000500)='./cgroup/syz0\x00', 0x200002, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000740)={r3, 0x50, &(0x7f00000003c0)}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r2, 0x50, &(0x7f0000000840)}, 0x10) openat$cgroup_subtree(r2, &(0x7f0000000940)='cgroup.subtree_control\x00', 0x2, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x1ff, 0x0, 0x0, 0x0, 0x200000, 0xffffffffffffffff, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280), 0x2}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r10 = socket$kcm(0xa, 0x400000000002, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffc59) ioctl$sock_kcm_SIOCKCMCLONE(r10, 0x890b, &(0x7f0000000000)) ioctl$sock_kcm_SIOCKCMCLONE(r10, 0x890c, &(0x7f0000000000)) 03:53:49 executing program 3: 03:53:49 executing program 4: r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x5f}, {&(0x7f00000000c0)=""/85, 0x55}, {&(0x7f0000000fc0)=""/4096, 0x1000}, {0x0}, {&(0x7f0000000480)=""/60, 0x3c}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f0000000540)=""/154, 0x9a}, {&(0x7f0000000340)=""/22, 0x16}], 0x8, &(0x7f0000002400)=""/191, 0xbf}}], 0x1, 0x0, &(0x7f0000003700)={0x77359400}) 03:53:49 executing program 2: [ 1856.724404] protocol 88fb is buggy, dev hsr_slave_0 [ 1856.729548] protocol 88fb is buggy, dev hsr_slave_1 03:53:49 executing program 2: 03:53:49 executing program 5: getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffff9c, 0x84, 0x13, 0x0, 0x0) r0 = syz_open_dev$swradio(&(0x7f0000000000)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$radio(0x0, 0xffffffffffffffff, 0x2) r1 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) getdents64(r1, 0x0, 0x0) r2 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r2, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r2, 0x8) r3 = socket$inet6_sctp(0xa, 0x805, 0x84) r4 = accept4(r2, 0x0, 0x0, 0x0) prctl$PR_SET_ENDIAN(0x14, 0x1) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r3, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) epoll_pwait(0xffffffffffffffff, &(0x7f0000000040)=[{}], 0x1, 0x0, &(0x7f0000000080), 0x8) getpgid(0x0) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r4, 0x84, 0x9, &(0x7f0000000280)={0x0, @in={{0x2, 0x0, @empty}}, 0x0, 0xac14142400000000, 0x0, 0x0, 0x54}, 0x98) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) ioctl$SIOCAX25ADDFWD(r0, 0x89ea, 0x0) syz_mount_image$gfs2(0x0, 0x0, 0x87, 0x0, 0x0, 0x1040040, 0x0) readv(r1, &(0x7f0000000500)=[{&(0x7f0000000400)=""/217, 0xd9}], 0x1) 03:53:49 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x20, &(0x7f0000000b80)=ANY=[@ANYBLOB="cab5674ca80400f902c8d3fc17d4a51472ff5e04a7ed68e9074e865fffffffffff6582e2a0c58f438f1a9b1af27305fb6c1d497851a00d51dddde821f356222d82de15a5bb3ca4d544c3683ff903b30637ee634a8a4fa0e19e57c7d35e4db3a02231b71023a910ac2424326e31258bde7ca760ff3ca3261a92112b3c8db9e0d79dc5ad29e05434154bba1e60d243d8fa466b27518c09e11b78ec43ab7af1d33fbd4885ee5e95b0849345d0edef0a2e68320a47938597cf0fba5ae2e93301ffc38baaf2673b7fd4628a0fe3665006d238567bdb430991e02866ad858345dc86331d91a53051b3284827fc0a870d857ecc180901feb2d1dd3be0c1ebc3fa1d00d550744d9e55"], 0x0, 0x1625, 0x0, 0x0, 0x41100, 0x1, [], 0x0, 0x4}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r0, 0xdb, &(0x7f0000000200)={0x0, 0x0}}, 0x393) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='cgroup.events\x00', 0x0, 0x0) write$cgroup_int(r2, &(0x7f00000007c0)=0x6, 0x12) r3 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000002c0), 0x4) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz1\x00', 0x1ff) r4 = perf_event_open$cgroup(&(0x7f0000000600)={0x0, 0x70, 0x9, 0x6, 0x8, 0x6, 0x0, 0xfffffffffffff49f, 0x2, 0x6, 0x3ff, 0x0, 0x20, 0x0, 0x1, 0x81, 0x1, 0x400, 0x4, 0xfac, 0x4, 0x1, 0x10000, 0xf1, 0xd3, 0x92b, 0x200, 0x0, 0x100000000, 0x2, 0x100000000, 0xfff, 0xfff, 0xffff, 0x3, 0xfffffffffffffffd, 0x0, 0x6, 0x0, 0x50, 0x0, @perf_config_ext={0x3f, 0x9}, 0x20000, 0x8, 0xef3, 0x7, 0x100000000, 0x8, 0xfff}, 0xffffffffffffffff, 0x2, r0, 0x8) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000b40)='cgroup.subtree_control\x00') ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x2400, 0x1) r5 = getpid() socketpair$unix(0x1, 0x7, 0x0, &(0x7f0000000540)={0xffffffffffffffff}) setsockopt$sock_attach_bpf(r6, 0x1, 0x32, &(0x7f00000005c0)=r3, 0x4) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={0x0, 0xffffffffffffffff, 0x0, 0x12, &(0x7f0000000480)='./cgroup.cpu/syz1\x00', r1}, 0x30) perf_event_open(&(0x7f0000000300)={0x5, 0x70, 0xff, 0x4, 0x1000, 0xe5af, 0x0, 0x8000, 0xd0440, 0x2, 0xffff, 0x1, 0x4, 0x1f, 0x3, 0xfffffffffffffffa, 0x5, 0x9, 0x8, 0x1, 0x3, 0x400, 0x6, 0x5, 0x401, 0x10000, 0xff, 0xb24, 0xffffffffffff8000, 0xc8a, 0x3f, 0xfffffffffffffffa, 0xffffffffffff8001, 0x200, 0x5, 0x3, 0x2, 0x93a, 0x0, 0x7fff, 0x2, @perf_bp={&(0x7f0000000100), 0x1}, 0x0, 0x0, 0xffffffffffffff4e, 0x6, 0x0, 0x4, 0xfffffffffffffffd}, r5, 0x0, r7, 0x8) r8 = openat$tun(0xffffffffffffff9c, &(0x7f0000000580)='/dev/net/tun\x00', 0x40000, 0x0) ioctl$TUNSETPERSIST(r8, 0x400454cb, 0x1) r9 = socket$kcm(0x29, 0x5, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000800)={0x0, r0, 0x1, 0x2}, 0x14) ioctl$sock_kcm_SIOCKCMUNATTACH(r9, 0x89e1, &(0x7f0000000900)={r2}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r3, 0x0, 0x8b, 0x0, &(0x7f0000000680)="3ce41f426b7dd449ae14b08e1868c456d4fe9c7993884cf18f4dd5a0bc57250243da4203e0640859184bc4c4690afefd7736e8842cd88030448e918bdb5bd9bbbd680a51261557c0477c18049c832005ebb5b185c6f233df73a21d3b3ddad8426fba2d5f8aac5df904d5e5f2e7dc4a517079e08d5b2175a276f2a5c49cc2957cb367f269898570852dd63a", 0x0, 0x5}, 0x28) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000500)='./cgroup/syz0\x00', 0x200002, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000740)={r3, 0x50, &(0x7f00000003c0)}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r2, 0x50, &(0x7f0000000840)}, 0x10) openat$cgroup_subtree(r2, &(0x7f0000000940)='cgroup.subtree_control\x00', 0x2, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x1ff, 0x0, 0x0, 0x0, 0x200000, 0xffffffffffffffff, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280), 0x2}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r10 = socket$kcm(0xa, 0x400000000002, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffc59) ioctl$sock_kcm_SIOCKCMCLONE(r10, 0x890b, &(0x7f0000000000)) ioctl$sock_kcm_SIOCKCMCLONE(r10, 0x890c, &(0x7f0000000000)) 03:53:49 executing program 2: 03:53:49 executing program 3: 03:53:49 executing program 4: r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x5f}, {&(0x7f00000000c0)=""/85, 0x55}, {&(0x7f0000000fc0)=""/4096, 0x1000}, {0x0}, {&(0x7f0000000480)=""/60, 0x3c}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f0000000540)=""/154, 0x9a}, {&(0x7f0000000340)=""/22, 0x16}], 0x8, &(0x7f0000002400)=""/191, 0xbf}}], 0x1, 0x0, &(0x7f0000003700)={0x77359400}) 03:53:49 executing program 2: 03:53:49 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f00000001c0), 0xfffffef3) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r3 = creat(&(0x7f00000001c0)='./bus\x00', 0x0) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vga_arbiter\x00', 0x0, 0x0) open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r4) r5 = creat(&(0x7f0000000700)='./bus\x00', 0x0) truncate(&(0x7f0000000240)='./bus\x00', 0x800) r6 = open(&(0x7f0000000140)='./bus\x00', 0x400000008, 0x0) lseek(r5, 0x0, 0x2) getgroups(0x0, 0x0) getresgid(&(0x7f00000003c0), 0x0, &(0x7f0000000400)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000580)='./bus\x00', 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB], 0x1, 0x0) fstat(r5, &(0x7f00000004c0)) stat(0x0, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0}) sysinfo(0x0) sendfile(r5, r6, 0x0, 0x8000fffffffe) creat(&(0x7f0000000700)='./bus\x00', 0x0) r8 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) ftruncate(r0, 0x3) getsockopt$inet6_IPV6_XFRM_POLICY(r3, 0x29, 0x23, 0x0, &(0x7f0000000180)) setreuid(r7, 0x0) fallocate(r2, 0x0, 0x0, 0x0) getsockopt$inet_pktinfo(r5, 0x0, 0x8, 0x0, &(0x7f0000000480)) lseek(r8, 0x0, 0x3) 03:53:49 executing program 4: r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x5f}, {&(0x7f00000000c0)=""/85, 0x55}, {&(0x7f0000000400)=""/120, 0x78}, {&(0x7f0000000480)=""/60, 0x3c}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f0000000540)=""/154, 0x9a}, {&(0x7f0000000340)=""/22, 0x16}], 0x7, &(0x7f0000002400)=""/191, 0xbf}}], 0x1, 0x0, &(0x7f0000003700)={0x77359400}) 03:53:49 executing program 3: 03:53:49 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x20, &(0x7f0000000b80)=ANY=[@ANYBLOB="cab5674ca80400f902c8d3fc17d4a51472ff5e04a7ed68e9074e865fffffffffff6582e2a0c58f438f1a9b1af27305fb6c1d497851a00d51dddde821f356222d82de15a5bb3ca4d544c3683ff903b30637ee634a8a4fa0e19e57c7d35e4db3a02231b71023a910ac2424326e31258bde7ca760ff3ca3261a92112b3c8db9e0d79dc5ad29e05434154bba1e60d243d8fa466b27518c09e11b78ec43ab7af1d33fbd4885ee5e95b0849345d0edef0a2e68320a47938597cf0fba5ae2e93301ffc38baaf2673b7fd4628a0fe3665006d238567bdb430991e02866ad858345dc86331d91a53051b3284827fc0a870d857ecc180901feb2d1dd3be0c1ebc3fa1d00d550744d9e55"], 0x0, 0x1625, 0x0, 0x0, 0x41100, 0x1, [], 0x0, 0x4}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r0, 0xdb, &(0x7f0000000200)={0x0, 0x0}}, 0x393) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='cgroup.events\x00', 0x0, 0x0) write$cgroup_int(r2, &(0x7f00000007c0)=0x6, 0x12) r3 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000002c0), 0x4) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz1\x00', 0x1ff) r4 = perf_event_open$cgroup(&(0x7f0000000600)={0x0, 0x70, 0x9, 0x6, 0x8, 0x6, 0x0, 0xfffffffffffff49f, 0x2, 0x6, 0x3ff, 0x0, 0x20, 0x0, 0x1, 0x81, 0x1, 0x400, 0x4, 0xfac, 0x4, 0x1, 0x10000, 0xf1, 0xd3, 0x92b, 0x200, 0x0, 0x100000000, 0x2, 0x100000000, 0xfff, 0xfff, 0xffff, 0x3, 0xfffffffffffffffd, 0x0, 0x6, 0x0, 0x50, 0x0, @perf_config_ext={0x3f, 0x9}, 0x20000, 0x8, 0xef3, 0x7, 0x100000000, 0x8, 0xfff}, 0xffffffffffffffff, 0x2, r0, 0x8) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000b40)='cgroup.subtree_control\x00') ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x2400, 0x1) r5 = getpid() socketpair$unix(0x1, 0x7, 0x0, &(0x7f0000000540)={0xffffffffffffffff}) setsockopt$sock_attach_bpf(r6, 0x1, 0x32, &(0x7f00000005c0)=r3, 0x4) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={0x0, 0xffffffffffffffff, 0x0, 0x12, &(0x7f0000000480)='./cgroup.cpu/syz1\x00', r1}, 0x30) perf_event_open(&(0x7f0000000300)={0x5, 0x70, 0xff, 0x4, 0x1000, 0xe5af, 0x0, 0x8000, 0xd0440, 0x2, 0xffff, 0x1, 0x4, 0x1f, 0x3, 0xfffffffffffffffa, 0x5, 0x9, 0x8, 0x1, 0x3, 0x400, 0x6, 0x5, 0x401, 0x10000, 0xff, 0xb24, 0xffffffffffff8000, 0xc8a, 0x3f, 0xfffffffffffffffa, 0xffffffffffff8001, 0x200, 0x5, 0x3, 0x2, 0x93a, 0x0, 0x7fff, 0x2, @perf_bp={&(0x7f0000000100), 0x1}, 0x0, 0x0, 0xffffffffffffff4e, 0x6, 0x0, 0x4, 0xfffffffffffffffd}, r5, 0x0, r7, 0x8) r8 = openat$tun(0xffffffffffffff9c, &(0x7f0000000580)='/dev/net/tun\x00', 0x40000, 0x0) ioctl$TUNSETPERSIST(r8, 0x400454cb, 0x1) r9 = socket$kcm(0x29, 0x5, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000800)={0x0, r0, 0x1, 0x2}, 0x14) ioctl$sock_kcm_SIOCKCMUNATTACH(r9, 0x89e1, &(0x7f0000000900)={r2}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r3, 0x0, 0x8b, 0x0, &(0x7f0000000680)="3ce41f426b7dd449ae14b08e1868c456d4fe9c7993884cf18f4dd5a0bc57250243da4203e0640859184bc4c4690afefd7736e8842cd88030448e918bdb5bd9bbbd680a51261557c0477c18049c832005ebb5b185c6f233df73a21d3b3ddad8426fba2d5f8aac5df904d5e5f2e7dc4a517079e08d5b2175a276f2a5c49cc2957cb367f269898570852dd63a", 0x0, 0x5}, 0x28) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000500)='./cgroup/syz0\x00', 0x200002, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000740)={r3, 0x50, &(0x7f00000003c0)}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r2, 0x50, &(0x7f0000000840)}, 0x10) openat$cgroup_subtree(r2, &(0x7f0000000940)='cgroup.subtree_control\x00', 0x2, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x1ff, 0x0, 0x0, 0x0, 0x200000, 0xffffffffffffffff, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280), 0x2}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r10 = socket$kcm(0xa, 0x400000000002, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffc59) ioctl$sock_kcm_SIOCKCMCLONE(r10, 0x890b, &(0x7f0000000000)) ioctl$sock_kcm_SIOCKCMCLONE(r10, 0x890c, &(0x7f0000000000)) 03:53:49 executing program 2: 03:53:49 executing program 4: r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x5f}, {&(0x7f00000000c0)=""/85, 0x55}, {&(0x7f0000000400)=""/120, 0x78}, {&(0x7f0000000480)=""/60, 0x3c}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f0000000540)=""/154, 0x9a}, {&(0x7f0000000340)=""/22, 0x16}], 0x7, &(0x7f0000002400)=""/191, 0xbf}}], 0x1, 0x0, &(0x7f0000003700)={0x77359400}) 03:53:50 executing program 3: 03:53:50 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x20, &(0x7f0000000b80)=ANY=[@ANYBLOB="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"], 0x0, 0x1625, 0x0, 0x0, 0x41100, 0x1, [], 0x0, 0x4}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r0, 0xdb, &(0x7f0000000200)={0x0, 0x0}}, 0x393) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='cgroup.events\x00', 0x0, 0x0) write$cgroup_int(r2, &(0x7f00000007c0)=0x6, 0x12) r3 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000002c0), 0x4) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz1\x00', 0x1ff) r4 = perf_event_open$cgroup(&(0x7f0000000600)={0x0, 0x70, 0x9, 0x6, 0x8, 0x6, 0x0, 0xfffffffffffff49f, 0x2, 0x6, 0x3ff, 0x0, 0x20, 0x0, 0x1, 0x81, 0x1, 0x400, 0x4, 0xfac, 0x4, 0x1, 0x10000, 0xf1, 0xd3, 0x92b, 0x200, 0x1, 0x0, 0x2, 0x100000000, 0xfff, 0xfff, 0xffff, 0x3, 0xfffffffffffffffd, 0x0, 0x6, 0x0, 0x50, 0x0, @perf_config_ext={0x3f, 0x9}, 0x20000, 0x8, 0xef3, 0x7, 0x100000000, 0x8, 0xfff}, 0xffffffffffffffff, 0x2, r0, 0x8) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000b40)='cgroup.subtree_control\x00') ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x2400, 0x1) r5 = getpid() socketpair$unix(0x1, 0x7, 0x0, &(0x7f0000000540)={0xffffffffffffffff}) setsockopt$sock_attach_bpf(r6, 0x1, 0x32, &(0x7f00000005c0)=r3, 0x4) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={0x0, 0xffffffffffffffff, 0x0, 0x12, &(0x7f0000000480)='./cgroup.cpu/syz1\x00', r1}, 0x30) perf_event_open(&(0x7f0000000300)={0x5, 0x70, 0xff, 0x4, 0x1000, 0xe5af, 0x0, 0x8000, 0xd0440, 0x2, 0xffff, 0x1, 0x4, 0x1f, 0x3, 0xfffffffffffffffa, 0x5, 0x9, 0x8, 0x1, 0x3, 0x400, 0x6, 0x5, 0x401, 0x10000, 0xff, 0xb24, 0xffffffffffff8000, 0xc8a, 0x3f, 0xfffffffffffffffa, 0xffffffffffff8001, 0x200, 0x5, 0x3, 0x2, 0x93a, 0x0, 0x7fff, 0x2, @perf_bp={&(0x7f0000000100), 0x1}, 0x0, 0x0, 0xffffffffffffff4e, 0x6, 0x0, 0x4, 0xfffffffffffffffd}, r5, 0x0, r7, 0x8) r8 = openat$tun(0xffffffffffffff9c, &(0x7f0000000580)='/dev/net/tun\x00', 0x40000, 0x0) ioctl$TUNSETPERSIST(r8, 0x400454cb, 0x1) r9 = socket$kcm(0x29, 0x5, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000800)={0x0, r0, 0x1, 0x2}, 0x14) ioctl$sock_kcm_SIOCKCMUNATTACH(r9, 0x89e1, &(0x7f0000000900)={r2}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r3, 0x0, 0x8b, 0x0, &(0x7f0000000680)="3ce41f426b7dd449ae14b08e1868c456d4fe9c7993884cf18f4dd5a0bc57250243da4203e0640859184bc4c4690afefd7736e8842cd88030448e918bdb5bd9bbbd680a51261557c0477c18049c832005ebb5b185c6f233df73a21d3b3ddad8426fba2d5f8aac5df904d5e5f2e7dc4a517079e08d5b2175a276f2a5c49cc2957cb367f269898570852dd63a", 0x0, 0x5}, 0x28) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000500)='./cgroup/syz0\x00', 0x200002, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000740)={r3, 0x50, &(0x7f00000003c0)}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r2, 0x50, &(0x7f0000000840)}, 0x10) openat$cgroup_subtree(r2, &(0x7f0000000940)='cgroup.subtree_control\x00', 0x2, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x1ff, 0x0, 0x0, 0x0, 0x200000, 0xffffffffffffffff, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280), 0x2}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r10 = socket$kcm(0xa, 0x400000000002, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffc59) ioctl$sock_kcm_SIOCKCMCLONE(r10, 0x890b, &(0x7f0000000000)) ioctl$sock_kcm_SIOCKCMCLONE(r10, 0x890c, &(0x7f0000000000)) 03:53:50 executing program 2: 03:53:50 executing program 5: getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffff9c, 0x84, 0x13, 0x0, 0x0) r0 = syz_open_dev$swradio(&(0x7f0000000000)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$radio(0x0, 0xffffffffffffffff, 0x2) r1 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) getdents64(r1, 0x0, 0x0) r2 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r2, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r2, 0x8) r3 = socket$inet6_sctp(0xa, 0x805, 0x84) r4 = accept4(r2, 0x0, 0x0, 0x0) prctl$PR_SET_ENDIAN(0x14, 0x1) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r3, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) epoll_pwait(0xffffffffffffffff, &(0x7f0000000040)=[{}], 0x1, 0x0, &(0x7f0000000080), 0x8) getpgid(0x0) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r4, 0x84, 0x9, &(0x7f0000000280)={0x0, @in={{0x2, 0x0, @empty}}, 0x0, 0xac14142400000000, 0x0, 0x0, 0x54}, 0x98) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) ioctl$SIOCAX25ADDFWD(r0, 0x89ea, 0x0) syz_mount_image$gfs2(0x0, 0x0, 0x87, 0x0, &(0x7f00000005c0), 0x0, 0x0) readv(r1, &(0x7f0000000500)=[{&(0x7f0000000400)=""/217, 0xd9}], 0x1) 03:53:50 executing program 4: r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x5f}, {&(0x7f00000000c0)=""/85, 0x55}, {&(0x7f0000000400)=""/120, 0x78}, {&(0x7f0000000480)=""/60, 0x3c}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f0000000540)=""/154, 0x9a}, {&(0x7f0000000340)=""/22, 0x16}], 0x7, &(0x7f0000002400)=""/191, 0xbf}}], 0x1, 0x0, &(0x7f0000003700)={0x77359400}) 03:53:50 executing program 2: 03:53:50 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f00000001c0), 0xfffffef3) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r3 = creat(&(0x7f00000001c0)='./bus\x00', 0x0) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vga_arbiter\x00', 0x0, 0x0) open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r4) r5 = creat(&(0x7f0000000700)='./bus\x00', 0x0) truncate(&(0x7f0000000240)='./bus\x00', 0x800) r6 = open(&(0x7f0000000140)='./bus\x00', 0x400000008, 0x0) lseek(r5, 0x0, 0x2) getgroups(0x0, 0x0) getresgid(&(0x7f00000003c0), 0x0, &(0x7f0000000400)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000580)='./bus\x00', 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB], 0x1, 0x0) fstat(r5, &(0x7f00000004c0)) stat(0x0, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0}) sysinfo(0x0) sendfile(r5, r6, 0x0, 0x8000fffffffe) creat(&(0x7f0000000700)='./bus\x00', 0x0) r8 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) ftruncate(r0, 0x3) getsockopt$inet6_IPV6_XFRM_POLICY(r3, 0x29, 0x23, 0x0, &(0x7f0000000180)) setreuid(r7, 0x0) fallocate(r2, 0x0, 0x0, 0x0) lseek(r8, 0x0, 0x3) 03:53:50 executing program 3: 03:53:50 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x20, &(0x7f0000000b80)=ANY=[@ANYBLOB="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"], 0x0, 0x1625, 0x0, 0x0, 0x41100, 0x1, [], 0x0, 0x4}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r0, 0xdb, &(0x7f0000000200)={0x0, 0x0}}, 0x393) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='cgroup.events\x00', 0x0, 0x0) write$cgroup_int(r2, &(0x7f00000007c0)=0x6, 0x12) r3 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000002c0), 0x4) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz1\x00', 0x1ff) r4 = perf_event_open$cgroup(&(0x7f0000000600)={0x0, 0x70, 0x9, 0x6, 0x8, 0x6, 0x0, 0xfffffffffffff49f, 0x2, 0x6, 0x3ff, 0x0, 0x20, 0x0, 0x1, 0x81, 0x1, 0x400, 0x4, 0xfac, 0x4, 0x1, 0x10000, 0xf1, 0xd3, 0x92b, 0x200, 0x1, 0x0, 0x2, 0x100000000, 0xfff, 0xfff, 0xffff, 0x3, 0xfffffffffffffffd, 0x0, 0x6, 0x0, 0x50, 0x0, @perf_config_ext={0x3f, 0x9}, 0x20000, 0x8, 0xef3, 0x7, 0x100000000, 0x8, 0xfff}, 0xffffffffffffffff, 0x2, r0, 0x8) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000b40)='cgroup.subtree_control\x00') ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x2400, 0x1) r5 = getpid() socketpair$unix(0x1, 0x7, 0x0, &(0x7f0000000540)={0xffffffffffffffff}) setsockopt$sock_attach_bpf(r6, 0x1, 0x32, &(0x7f00000005c0)=r3, 0x4) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={0x0, 0xffffffffffffffff, 0x0, 0x12, &(0x7f0000000480)='./cgroup.cpu/syz1\x00', r1}, 0x30) perf_event_open(&(0x7f0000000300)={0x5, 0x70, 0xff, 0x4, 0x1000, 0xe5af, 0x0, 0x8000, 0xd0440, 0x2, 0xffff, 0x1, 0x4, 0x1f, 0x3, 0xfffffffffffffffa, 0x5, 0x9, 0x8, 0x1, 0x3, 0x400, 0x6, 0x5, 0x401, 0x10000, 0xff, 0xb24, 0xffffffffffff8000, 0xc8a, 0x3f, 0xfffffffffffffffa, 0xffffffffffff8001, 0x200, 0x5, 0x3, 0x2, 0x93a, 0x0, 0x7fff, 0x2, @perf_bp={&(0x7f0000000100), 0x1}, 0x0, 0x0, 0xffffffffffffff4e, 0x6, 0x0, 0x4, 0xfffffffffffffffd}, r5, 0x0, r7, 0x8) r8 = openat$tun(0xffffffffffffff9c, &(0x7f0000000580)='/dev/net/tun\x00', 0x40000, 0x0) ioctl$TUNSETPERSIST(r8, 0x400454cb, 0x1) r9 = socket$kcm(0x29, 0x5, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000800)={0x0, r0, 0x1, 0x2}, 0x14) ioctl$sock_kcm_SIOCKCMUNATTACH(r9, 0x89e1, &(0x7f0000000900)={r2}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r3, 0x0, 0x8b, 0x0, &(0x7f0000000680)="3ce41f426b7dd449ae14b08e1868c456d4fe9c7993884cf18f4dd5a0bc57250243da4203e0640859184bc4c4690afefd7736e8842cd88030448e918bdb5bd9bbbd680a51261557c0477c18049c832005ebb5b185c6f233df73a21d3b3ddad8426fba2d5f8aac5df904d5e5f2e7dc4a517079e08d5b2175a276f2a5c49cc2957cb367f269898570852dd63a", 0x0, 0x5}, 0x28) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000500)='./cgroup/syz0\x00', 0x200002, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000740)={r3, 0x50, &(0x7f00000003c0)}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r2, 0x50, &(0x7f0000000840)}, 0x10) openat$cgroup_subtree(r2, &(0x7f0000000940)='cgroup.subtree_control\x00', 0x2, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x1ff, 0x0, 0x0, 0x0, 0x200000, 0xffffffffffffffff, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280), 0x2}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r10 = socket$kcm(0xa, 0x400000000002, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffc59) ioctl$sock_kcm_SIOCKCMCLONE(r10, 0x890b, &(0x7f0000000000)) ioctl$sock_kcm_SIOCKCMCLONE(r10, 0x890c, &(0x7f0000000000)) 03:53:50 executing program 2: 03:53:50 executing program 4: r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x5f}, {&(0x7f00000000c0)=""/85, 0x55}, {0x0}, {&(0x7f0000000400)=""/120, 0x78}, {&(0x7f0000000480)=""/60, 0x3c}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f0000000540)=""/154, 0x9a}, {&(0x7f0000000340)=""/22, 0x16}], 0x8, &(0x7f0000002400)=""/191, 0xbf}}], 0x1, 0x0, &(0x7f0000003700)={0x77359400}) 03:53:51 executing program 2: 03:53:51 executing program 3: 03:53:51 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x20, &(0x7f0000000b80)=ANY=[@ANYBLOB="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"], 0x0, 0x1625, 0x0, 0x0, 0x41100, 0x1, [], 0x0, 0x4}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r0, 0xdb, &(0x7f0000000200)={0x0, 0x0}}, 0x393) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='cgroup.events\x00', 0x0, 0x0) write$cgroup_int(r2, &(0x7f00000007c0)=0x6, 0x12) r3 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000002c0), 0x4) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz1\x00', 0x1ff) r4 = perf_event_open$cgroup(&(0x7f0000000600)={0x0, 0x70, 0x9, 0x6, 0x8, 0x6, 0x0, 0xfffffffffffff49f, 0x2, 0x6, 0x3ff, 0x0, 0x20, 0x0, 0x1, 0x81, 0x1, 0x400, 0x4, 0xfac, 0x4, 0x1, 0x10000, 0xf1, 0xd3, 0x92b, 0x200, 0x1, 0x0, 0x2, 0x100000000, 0xfff, 0xfff, 0xffff, 0x3, 0xfffffffffffffffd, 0x0, 0x6, 0x0, 0x50, 0x0, @perf_config_ext={0x3f, 0x9}, 0x20000, 0x8, 0xef3, 0x7, 0x100000000, 0x8, 0xfff}, 0xffffffffffffffff, 0x2, r0, 0x8) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000b40)='cgroup.subtree_control\x00') ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x2400, 0x1) r5 = getpid() socketpair$unix(0x1, 0x7, 0x0, &(0x7f0000000540)={0xffffffffffffffff}) setsockopt$sock_attach_bpf(r6, 0x1, 0x32, &(0x7f00000005c0)=r3, 0x4) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={0x0, 0xffffffffffffffff, 0x0, 0x12, &(0x7f0000000480)='./cgroup.cpu/syz1\x00', r1}, 0x30) perf_event_open(&(0x7f0000000300)={0x5, 0x70, 0xff, 0x4, 0x1000, 0xe5af, 0x0, 0x8000, 0xd0440, 0x2, 0xffff, 0x1, 0x4, 0x1f, 0x3, 0xfffffffffffffffa, 0x5, 0x9, 0x8, 0x1, 0x3, 0x400, 0x6, 0x5, 0x401, 0x10000, 0xff, 0xb24, 0xffffffffffff8000, 0xc8a, 0x3f, 0xfffffffffffffffa, 0xffffffffffff8001, 0x200, 0x5, 0x3, 0x2, 0x93a, 0x0, 0x7fff, 0x2, @perf_bp={&(0x7f0000000100), 0x1}, 0x0, 0x0, 0xffffffffffffff4e, 0x6, 0x0, 0x4, 0xfffffffffffffffd}, r5, 0x0, r7, 0x8) r8 = openat$tun(0xffffffffffffff9c, &(0x7f0000000580)='/dev/net/tun\x00', 0x40000, 0x0) ioctl$TUNSETPERSIST(r8, 0x400454cb, 0x1) r9 = socket$kcm(0x29, 0x5, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000800)={0x0, r0, 0x1, 0x2}, 0x14) ioctl$sock_kcm_SIOCKCMUNATTACH(r9, 0x89e1, &(0x7f0000000900)={r2}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r3, 0x0, 0x8b, 0x0, &(0x7f0000000680)="3ce41f426b7dd449ae14b08e1868c456d4fe9c7993884cf18f4dd5a0bc57250243da4203e0640859184bc4c4690afefd7736e8842cd88030448e918bdb5bd9bbbd680a51261557c0477c18049c832005ebb5b185c6f233df73a21d3b3ddad8426fba2d5f8aac5df904d5e5f2e7dc4a517079e08d5b2175a276f2a5c49cc2957cb367f269898570852dd63a", 0x0, 0x5}, 0x28) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000500)='./cgroup/syz0\x00', 0x200002, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000740)={r3, 0x50, &(0x7f00000003c0)}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r2, 0x50, &(0x7f0000000840)}, 0x10) openat$cgroup_subtree(r2, &(0x7f0000000940)='cgroup.subtree_control\x00', 0x2, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x1ff, 0x0, 0x0, 0x0, 0x200000, 0xffffffffffffffff, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280), 0x2}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r10 = socket$kcm(0xa, 0x400000000002, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffc59) ioctl$sock_kcm_SIOCKCMCLONE(r10, 0x890b, &(0x7f0000000000)) ioctl$sock_kcm_SIOCKCMCLONE(r10, 0x890c, &(0x7f0000000000)) 03:53:51 executing program 4: r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x5f}, {&(0x7f00000000c0)=""/85, 0x55}, {0x0}, {&(0x7f0000000400)=""/120, 0x78}, {&(0x7f0000000480)=""/60, 0x3c}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f0000000540)=""/154, 0x9a}, {&(0x7f0000000340)=""/22, 0x16}], 0x8, &(0x7f0000002400)=""/191, 0xbf}}], 0x1, 0x0, &(0x7f0000003700)={0x77359400}) 03:53:51 executing program 5: getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffff9c, 0x84, 0x13, 0x0, 0x0) r0 = syz_open_dev$swradio(&(0x7f0000000000)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$radio(0x0, 0xffffffffffffffff, 0x2) r1 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) getdents64(r1, 0x0, 0x0) r2 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r2, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r2, 0x8) r3 = socket$inet6_sctp(0xa, 0x805, 0x84) r4 = accept4(r2, 0x0, 0x0, 0x0) prctl$PR_SET_ENDIAN(0x14, 0x1) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r3, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) epoll_pwait(0xffffffffffffffff, &(0x7f0000000040)=[{}], 0x1, 0x0, &(0x7f0000000080), 0x8) getpgid(0x0) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r4, 0x84, 0x9, &(0x7f0000000280)={0x0, @in={{0x2, 0x0, @empty}}, 0x0, 0xac14142400000000, 0x0, 0x0, 0x54}, 0x98) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) ioctl$SIOCAX25ADDFWD(r0, 0x89ea, 0x0) syz_mount_image$gfs2(0x0, 0x0, 0x87, 0x0, &(0x7f00000005c0), 0x0, 0x0) readv(r1, &(0x7f0000000500)=[{&(0x7f0000000400)=""/217, 0xd9}], 0x1) 03:53:51 executing program 2: 03:53:51 executing program 3: [ 1858.902064] kauditd_printk_skb: 21 callbacks suppressed [ 1858.902097] audit: type=1804 audit(2000001231.210:678): pid=28972 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor0" name="/root/syzkaller-testdir498485449/syzkaller.cqcGk7/2857/bus" dev="sda1" ino=17731 res=1 [ 1859.033139] audit: type=1804 audit(2000001231.270:679): pid=28972 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=ToMToU comm="syz-executor0" name="/root/syzkaller-testdir498485449/syzkaller.cqcGk7/2857/bus" dev="sda1" ino=17731 res=1 [ 1859.067432] audit: type=1804 audit(2000001231.280:680): pid=28972 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor0" name="/root/syzkaller-testdir498485449/syzkaller.cqcGk7/2857/bus" dev="sda1" ino=17731 res=1 [ 1859.106660] audit: type=1804 audit(2000001231.410:681): pid=28974 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=ToMToU comm="syz-executor0" name="/root/syzkaller-testdir498485449/syzkaller.cqcGk7/2857/bus" dev="sda1" ino=17731 res=1 [ 1859.135286] audit: type=1804 audit(2000001231.410:682): pid=28980 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor0" name="/root/syzkaller-testdir498485449/syzkaller.cqcGk7/2857/bus" dev="sda1" ino=17731 res=1 03:53:51 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f00000001c0), 0xfffffef3) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r3 = creat(&(0x7f00000001c0)='./bus\x00', 0x0) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vga_arbiter\x00', 0x0, 0x0) open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r4) r5 = creat(&(0x7f0000000700)='./bus\x00', 0x0) truncate(&(0x7f0000000240)='./bus\x00', 0x800) r6 = open(&(0x7f0000000140)='./bus\x00', 0x400000008, 0x0) lseek(r5, 0x0, 0x2) getgroups(0x0, 0x0) getresgid(&(0x7f00000003c0), 0x0, &(0x7f0000000400)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000580)='./bus\x00', 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB], 0x1, 0x0) fstat(r5, &(0x7f00000004c0)) stat(0x0, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0}) sysinfo(0x0) sendfile(r5, r6, 0x0, 0x8000fffffffe) creat(&(0x7f0000000700)='./bus\x00', 0x0) r8 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) ftruncate(r0, 0x3) getsockopt$inet6_IPV6_XFRM_POLICY(r3, 0x29, 0x23, 0x0, &(0x7f0000000180)) setreuid(r7, 0x0) getsockopt$inet_pktinfo(r5, 0x0, 0x8, 0x0, &(0x7f0000000480)) lseek(r8, 0x0, 0x3) 03:53:51 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x20, &(0x7f0000000b80)=ANY=[@ANYBLOB="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"], 0x0, 0x1625, 0x0, 0x0, 0x41100, 0x1, [], 0x0, 0x4}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r0, 0xdb, &(0x7f0000000200)={0x0, 0x0}}, 0x393) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='cgroup.events\x00', 0x0, 0x0) write$cgroup_int(r2, &(0x7f00000007c0)=0x6, 0x12) r3 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000002c0), 0x4) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz1\x00', 0x1ff) r4 = perf_event_open$cgroup(&(0x7f0000000600)={0x0, 0x70, 0x9, 0x6, 0x8, 0x6, 0x0, 0xfffffffffffff49f, 0x2, 0x6, 0x3ff, 0x0, 0x20, 0x0, 0x1, 0x81, 0x1, 0x400, 0x4, 0xfac, 0x4, 0x1, 0x10000, 0xf1, 0xd3, 0x92b, 0x200, 0x1, 0x100000000, 0x0, 0x100000000, 0xfff, 0xfff, 0xffff, 0x3, 0xfffffffffffffffd, 0x0, 0x6, 0x0, 0x50, 0x0, @perf_config_ext={0x3f, 0x9}, 0x20000, 0x8, 0xef3, 0x7, 0x100000000, 0x8, 0xfff}, 0xffffffffffffffff, 0x2, r0, 0x8) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000b40)='cgroup.subtree_control\x00') ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x2400, 0x1) r5 = getpid() socketpair$unix(0x1, 0x7, 0x0, &(0x7f0000000540)={0xffffffffffffffff}) setsockopt$sock_attach_bpf(r6, 0x1, 0x32, &(0x7f00000005c0)=r3, 0x4) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={0x0, 0xffffffffffffffff, 0x0, 0x12, &(0x7f0000000480)='./cgroup.cpu/syz1\x00', r1}, 0x30) perf_event_open(&(0x7f0000000300)={0x5, 0x70, 0xff, 0x4, 0x1000, 0xe5af, 0x0, 0x8000, 0xd0440, 0x2, 0xffff, 0x1, 0x4, 0x1f, 0x3, 0xfffffffffffffffa, 0x5, 0x9, 0x8, 0x1, 0x3, 0x400, 0x6, 0x5, 0x401, 0x10000, 0xff, 0xb24, 0xffffffffffff8000, 0xc8a, 0x3f, 0xfffffffffffffffa, 0xffffffffffff8001, 0x200, 0x5, 0x3, 0x2, 0x93a, 0x0, 0x7fff, 0x2, @perf_bp={&(0x7f0000000100), 0x1}, 0x0, 0x0, 0xffffffffffffff4e, 0x6, 0x0, 0x4, 0xfffffffffffffffd}, r5, 0x0, r7, 0x8) r8 = openat$tun(0xffffffffffffff9c, &(0x7f0000000580)='/dev/net/tun\x00', 0x40000, 0x0) ioctl$TUNSETPERSIST(r8, 0x400454cb, 0x1) r9 = socket$kcm(0x29, 0x5, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000800)={0x0, r0, 0x1, 0x2}, 0x14) ioctl$sock_kcm_SIOCKCMUNATTACH(r9, 0x89e1, &(0x7f0000000900)={r2}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r3, 0x0, 0x8b, 0x0, &(0x7f0000000680)="3ce41f426b7dd449ae14b08e1868c456d4fe9c7993884cf18f4dd5a0bc57250243da4203e0640859184bc4c4690afefd7736e8842cd88030448e918bdb5bd9bbbd680a51261557c0477c18049c832005ebb5b185c6f233df73a21d3b3ddad8426fba2d5f8aac5df904d5e5f2e7dc4a517079e08d5b2175a276f2a5c49cc2957cb367f269898570852dd63a", 0x0, 0x5}, 0x28) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000500)='./cgroup/syz0\x00', 0x200002, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000740)={r3, 0x50, &(0x7f00000003c0)}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r2, 0x50, &(0x7f0000000840)}, 0x10) openat$cgroup_subtree(r2, &(0x7f0000000940)='cgroup.subtree_control\x00', 0x2, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x1ff, 0x0, 0x0, 0x0, 0x200000, 0xffffffffffffffff, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280), 0x2}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r10 = socket$kcm(0xa, 0x400000000002, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffc59) ioctl$sock_kcm_SIOCKCMCLONE(r10, 0x890b, &(0x7f0000000000)) ioctl$sock_kcm_SIOCKCMCLONE(r10, 0x890c, &(0x7f0000000000)) 03:53:51 executing program 4: r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x5f}, {&(0x7f00000000c0)=""/85, 0x55}, {0x0}, {&(0x7f0000000400)=""/120, 0x78}, {&(0x7f0000000480)=""/60, 0x3c}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f0000000540)=""/154, 0x9a}, {&(0x7f0000000340)=""/22, 0x16}], 0x8, &(0x7f0000002400)=""/191, 0xbf}}], 0x1, 0x0, &(0x7f0000003700)={0x77359400}) 03:53:51 executing program 2: 03:53:51 executing program 3: 03:53:51 executing program 3: 03:53:51 executing program 2: 03:53:51 executing program 4: r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x5f}, {&(0x7f0000000fc0)=""/4096, 0x1000}, {&(0x7f0000000400)=""/120, 0x78}, {&(0x7f0000000480)=""/60, 0x3c}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f0000000540)=""/154, 0x9a}, {&(0x7f0000000340)=""/22, 0x16}], 0x7, &(0x7f0000002400)=""/191, 0xbf}}], 0x1, 0x0, &(0x7f0000003700)={0x77359400}) 03:53:51 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x20, &(0x7f0000000b80)=ANY=[@ANYBLOB="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"], 0x0, 0x1625, 0x0, 0x0, 0x41100, 0x1, [], 0x0, 0x4}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r0, 0xdb, &(0x7f0000000200)={0x0, 0x0}}, 0x393) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='cgroup.events\x00', 0x0, 0x0) write$cgroup_int(r2, &(0x7f00000007c0)=0x6, 0x12) r3 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000002c0), 0x4) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz1\x00', 0x1ff) r4 = perf_event_open$cgroup(&(0x7f0000000600)={0x0, 0x70, 0x9, 0x6, 0x8, 0x6, 0x0, 0xfffffffffffff49f, 0x2, 0x6, 0x3ff, 0x0, 0x20, 0x0, 0x1, 0x81, 0x1, 0x400, 0x4, 0xfac, 0x4, 0x1, 0x10000, 0xf1, 0xd3, 0x92b, 0x200, 0x1, 0x100000000, 0x0, 0x100000000, 0xfff, 0xfff, 0xffff, 0x3, 0xfffffffffffffffd, 0x0, 0x6, 0x0, 0x50, 0x0, @perf_config_ext={0x3f, 0x9}, 0x20000, 0x8, 0xef3, 0x7, 0x100000000, 0x8, 0xfff}, 0xffffffffffffffff, 0x2, r0, 0x8) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000b40)='cgroup.subtree_control\x00') ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x2400, 0x1) r5 = getpid() socketpair$unix(0x1, 0x7, 0x0, &(0x7f0000000540)={0xffffffffffffffff}) setsockopt$sock_attach_bpf(r6, 0x1, 0x32, &(0x7f00000005c0)=r3, 0x4) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={0x0, 0xffffffffffffffff, 0x0, 0x12, &(0x7f0000000480)='./cgroup.cpu/syz1\x00', r1}, 0x30) perf_event_open(&(0x7f0000000300)={0x5, 0x70, 0xff, 0x4, 0x1000, 0xe5af, 0x0, 0x8000, 0xd0440, 0x2, 0xffff, 0x1, 0x4, 0x1f, 0x3, 0xfffffffffffffffa, 0x5, 0x9, 0x8, 0x1, 0x3, 0x400, 0x6, 0x5, 0x401, 0x10000, 0xff, 0xb24, 0xffffffffffff8000, 0xc8a, 0x3f, 0xfffffffffffffffa, 0xffffffffffff8001, 0x200, 0x5, 0x3, 0x2, 0x93a, 0x0, 0x7fff, 0x2, @perf_bp={&(0x7f0000000100), 0x1}, 0x0, 0x0, 0xffffffffffffff4e, 0x6, 0x0, 0x4, 0xfffffffffffffffd}, r5, 0x0, r7, 0x8) r8 = openat$tun(0xffffffffffffff9c, &(0x7f0000000580)='/dev/net/tun\x00', 0x40000, 0x0) ioctl$TUNSETPERSIST(r8, 0x400454cb, 0x1) r9 = socket$kcm(0x29, 0x5, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000800)={0x0, r0, 0x1, 0x2}, 0x14) ioctl$sock_kcm_SIOCKCMUNATTACH(r9, 0x89e1, &(0x7f0000000900)={r2}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r3, 0x0, 0x8b, 0x0, &(0x7f0000000680)="3ce41f426b7dd449ae14b08e1868c456d4fe9c7993884cf18f4dd5a0bc57250243da4203e0640859184bc4c4690afefd7736e8842cd88030448e918bdb5bd9bbbd680a51261557c0477c18049c832005ebb5b185c6f233df73a21d3b3ddad8426fba2d5f8aac5df904d5e5f2e7dc4a517079e08d5b2175a276f2a5c49cc2957cb367f269898570852dd63a", 0x0, 0x5}, 0x28) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000500)='./cgroup/syz0\x00', 0x200002, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000740)={r3, 0x50, &(0x7f00000003c0)}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r2, 0x50, &(0x7f0000000840)}, 0x10) openat$cgroup_subtree(r2, &(0x7f0000000940)='cgroup.subtree_control\x00', 0x2, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x1ff, 0x0, 0x0, 0x0, 0x200000, 0xffffffffffffffff, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280), 0x2}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r10 = socket$kcm(0xa, 0x400000000002, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffc59) ioctl$sock_kcm_SIOCKCMCLONE(r10, 0x890b, &(0x7f0000000000)) ioctl$sock_kcm_SIOCKCMCLONE(r10, 0x890c, &(0x7f0000000000)) [ 1859.708674] audit: type=1804 audit(2000001232.020:683): pid=28996 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor0" name="/root/syzkaller-testdir498485449/syzkaller.cqcGk7/2858/bus" dev="sda1" ino=17762 res=1 03:53:52 executing program 5: getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffff9c, 0x84, 0x13, 0x0, 0x0) r0 = syz_open_dev$swradio(&(0x7f0000000000)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$radio(0x0, 0xffffffffffffffff, 0x2) r1 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) getdents64(r1, 0x0, 0x0) r2 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r2, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r2, 0x8) r3 = socket$inet6_sctp(0xa, 0x805, 0x84) r4 = accept4(r2, 0x0, 0x0, 0x0) prctl$PR_SET_ENDIAN(0x14, 0x1) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r3, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) epoll_pwait(0xffffffffffffffff, &(0x7f0000000040)=[{}], 0x1, 0x0, &(0x7f0000000080), 0x8) getpgid(0x0) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r4, 0x84, 0x9, &(0x7f0000000280)={0x0, @in={{0x2, 0x0, @empty}}, 0x0, 0xac14142400000000, 0x0, 0x0, 0x54}, 0x98) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) ioctl$SIOCAX25ADDFWD(r0, 0x89ea, 0x0) syz_mount_image$gfs2(0x0, 0x0, 0x87, 0x0, &(0x7f00000005c0), 0x0, 0x0) readv(r1, &(0x7f0000000500)=[{&(0x7f0000000400)=""/217, 0xd9}], 0x1) 03:53:52 executing program 4: r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x5f}, {&(0x7f0000000fc0)=""/4096, 0x1000}, {&(0x7f0000000400)=""/120, 0x78}, {&(0x7f0000000480)=""/60, 0x3c}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f0000000540)=""/154, 0x9a}, {&(0x7f0000000340)=""/22, 0x16}], 0x7, &(0x7f0000002400)=""/191, 0xbf}}], 0x1, 0x0, &(0x7f0000003700)={0x77359400}) 03:53:52 executing program 2: [ 1859.802318] audit: type=1804 audit(2000001232.030:684): pid=28996 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=ToMToU comm="syz-executor0" name="/root/syzkaller-testdir498485449/syzkaller.cqcGk7/2858/bus" dev="sda1" ino=17762 res=1 [ 1859.901022] audit: type=1804 audit(2000001232.050:685): pid=28996 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor0" name="/root/syzkaller-testdir498485449/syzkaller.cqcGk7/2858/bus" dev="sda1" ino=17762 res=1 [ 1859.982066] audit: type=1804 audit(2000001232.170:686): pid=28999 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=ToMToU comm="syz-executor0" name="/root/syzkaller-testdir498485449/syzkaller.cqcGk7/2858/bus" dev="sda1" ino=17762 res=1 [ 1860.033089] audit: type=1804 audit(2000001232.170:687): pid=28999 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor0" name="/root/syzkaller-testdir498485449/syzkaller.cqcGk7/2858/bus" dev="sda1" ino=17762 res=1 03:53:52 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f00000001c0), 0xfffffef3) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r3 = creat(&(0x7f00000001c0)='./bus\x00', 0x0) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vga_arbiter\x00', 0x0, 0x0) open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r4) r5 = creat(&(0x7f0000000700)='./bus\x00', 0x0) truncate(&(0x7f0000000240)='./bus\x00', 0x800) r6 = open(&(0x7f0000000140)='./bus\x00', 0x400000008, 0x0) lseek(r5, 0x0, 0x2) getgroups(0x0, 0x0) getresgid(&(0x7f00000003c0), 0x0, &(0x7f0000000400)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000580)='./bus\x00', 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB], 0x1, 0x0) fstat(r5, &(0x7f00000004c0)) stat(0x0, &(0x7f0000000640)) sysinfo(0x0) sendfile(r5, r6, 0x0, 0x8000fffffffe) creat(&(0x7f0000000700)='./bus\x00', 0x0) r7 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) ftruncate(r0, 0x3) getsockopt$inet6_IPV6_XFRM_POLICY(r3, 0x29, 0x23, 0x0, &(0x7f0000000180)) fallocate(r2, 0x0, 0x0, 0x0) getsockopt$inet_pktinfo(r5, 0x0, 0x8, 0x0, &(0x7f0000000480)) lseek(r7, 0x0, 0x3) 03:53:52 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x20, &(0x7f0000000b80)=ANY=[@ANYBLOB="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"], 0x0, 0x1625, 0x0, 0x0, 0x41100, 0x1, [], 0x0, 0x4}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r0, 0xdb, &(0x7f0000000200)={0x0, 0x0}}, 0x393) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='cgroup.events\x00', 0x0, 0x0) write$cgroup_int(r2, &(0x7f00000007c0)=0x6, 0x12) r3 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000002c0), 0x4) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz1\x00', 0x1ff) r4 = perf_event_open$cgroup(&(0x7f0000000600)={0x0, 0x70, 0x9, 0x6, 0x8, 0x6, 0x0, 0xfffffffffffff49f, 0x2, 0x6, 0x3ff, 0x0, 0x20, 0x0, 0x1, 0x81, 0x1, 0x400, 0x4, 0xfac, 0x4, 0x1, 0x10000, 0xf1, 0xd3, 0x92b, 0x200, 0x1, 0x100000000, 0x0, 0x100000000, 0xfff, 0xfff, 0xffff, 0x3, 0xfffffffffffffffd, 0x0, 0x6, 0x0, 0x50, 0x0, @perf_config_ext={0x3f, 0x9}, 0x20000, 0x8, 0xef3, 0x7, 0x100000000, 0x8, 0xfff}, 0xffffffffffffffff, 0x2, r0, 0x8) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000b40)='cgroup.subtree_control\x00') ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x2400, 0x1) r5 = getpid() socketpair$unix(0x1, 0x7, 0x0, &(0x7f0000000540)={0xffffffffffffffff}) setsockopt$sock_attach_bpf(r6, 0x1, 0x32, &(0x7f00000005c0)=r3, 0x4) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={0x0, 0xffffffffffffffff, 0x0, 0x12, &(0x7f0000000480)='./cgroup.cpu/syz1\x00', r1}, 0x30) perf_event_open(&(0x7f0000000300)={0x5, 0x70, 0xff, 0x4, 0x1000, 0xe5af, 0x0, 0x8000, 0xd0440, 0x2, 0xffff, 0x1, 0x4, 0x1f, 0x3, 0xfffffffffffffffa, 0x5, 0x9, 0x8, 0x1, 0x3, 0x400, 0x6, 0x5, 0x401, 0x10000, 0xff, 0xb24, 0xffffffffffff8000, 0xc8a, 0x3f, 0xfffffffffffffffa, 0xffffffffffff8001, 0x200, 0x5, 0x3, 0x2, 0x93a, 0x0, 0x7fff, 0x2, @perf_bp={&(0x7f0000000100), 0x1}, 0x0, 0x0, 0xffffffffffffff4e, 0x6, 0x0, 0x4, 0xfffffffffffffffd}, r5, 0x0, r7, 0x8) r8 = openat$tun(0xffffffffffffff9c, &(0x7f0000000580)='/dev/net/tun\x00', 0x40000, 0x0) ioctl$TUNSETPERSIST(r8, 0x400454cb, 0x1) r9 = socket$kcm(0x29, 0x5, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000800)={0x0, r0, 0x1, 0x2}, 0x14) ioctl$sock_kcm_SIOCKCMUNATTACH(r9, 0x89e1, &(0x7f0000000900)={r2}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r3, 0x0, 0x8b, 0x0, &(0x7f0000000680)="3ce41f426b7dd449ae14b08e1868c456d4fe9c7993884cf18f4dd5a0bc57250243da4203e0640859184bc4c4690afefd7736e8842cd88030448e918bdb5bd9bbbd680a51261557c0477c18049c832005ebb5b185c6f233df73a21d3b3ddad8426fba2d5f8aac5df904d5e5f2e7dc4a517079e08d5b2175a276f2a5c49cc2957cb367f269898570852dd63a", 0x0, 0x5}, 0x28) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000500)='./cgroup/syz0\x00', 0x200002, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000740)={r3, 0x50, &(0x7f00000003c0)}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r2, 0x50, &(0x7f0000000840)}, 0x10) openat$cgroup_subtree(r2, &(0x7f0000000940)='cgroup.subtree_control\x00', 0x2, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x1ff, 0x0, 0x0, 0x0, 0x200000, 0xffffffffffffffff, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280), 0x2}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r10 = socket$kcm(0xa, 0x400000000002, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffc59) ioctl$sock_kcm_SIOCKCMCLONE(r10, 0x890b, &(0x7f0000000000)) ioctl$sock_kcm_SIOCKCMCLONE(r10, 0x890c, &(0x7f0000000000)) 03:53:52 executing program 3: 03:53:52 executing program 2: 03:53:52 executing program 4: r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x5f}, {&(0x7f0000000fc0)=""/4096, 0x1000}, {&(0x7f0000000400)=""/120, 0x78}, {&(0x7f0000000480)=""/60, 0x3c}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f0000000540)=""/154, 0x9a}, {&(0x7f0000000340)=""/22, 0x16}], 0x7, &(0x7f0000002400)=""/191, 0xbf}}], 0x1, 0x0, &(0x7f0000003700)={0x77359400}) 03:53:52 executing program 2: 03:53:52 executing program 3: 03:53:53 executing program 4: r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x5f}, {0x0}, {&(0x7f0000000fc0)=""/4096, 0x1000}, {&(0x7f0000000400)=""/120, 0x78}, {&(0x7f0000000480)=""/60, 0x3c}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f0000000540)=""/154, 0x9a}, {&(0x7f0000000340)=""/22, 0x16}], 0x8, &(0x7f0000002400)=""/191, 0xbf}}], 0x1, 0x0, &(0x7f0000003700)={0x77359400}) 03:53:53 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x20, &(0x7f0000000b80)=ANY=[@ANYBLOB="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"], 0x0, 0x1625, 0x0, 0x0, 0x41100, 0x1, [], 0x0, 0x4}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r0, 0xdb, &(0x7f0000000200)={0x0, 0x0}}, 0x393) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='cgroup.events\x00', 0x0, 0x0) write$cgroup_int(r2, &(0x7f00000007c0)=0x6, 0x12) r3 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000002c0), 0x4) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz1\x00', 0x1ff) r4 = perf_event_open$cgroup(&(0x7f0000000600)={0x0, 0x70, 0x9, 0x6, 0x8, 0x6, 0x0, 0xfffffffffffff49f, 0x2, 0x6, 0x3ff, 0x0, 0x20, 0x0, 0x1, 0x81, 0x1, 0x400, 0x4, 0xfac, 0x4, 0x1, 0x10000, 0xf1, 0xd3, 0x92b, 0x200, 0x1, 0x100000000, 0x2, 0x0, 0xfff, 0xfff, 0xffff, 0x3, 0xfffffffffffffffd, 0x0, 0x6, 0x0, 0x50, 0x0, @perf_config_ext={0x3f, 0x9}, 0x20000, 0x8, 0xef3, 0x7, 0x100000000, 0x8, 0xfff}, 0xffffffffffffffff, 0x2, r0, 0x8) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000b40)='cgroup.subtree_control\x00') ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x2400, 0x1) r5 = getpid() socketpair$unix(0x1, 0x7, 0x0, &(0x7f0000000540)={0xffffffffffffffff}) setsockopt$sock_attach_bpf(r6, 0x1, 0x32, &(0x7f00000005c0)=r3, 0x4) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={0x0, 0xffffffffffffffff, 0x0, 0x12, &(0x7f0000000480)='./cgroup.cpu/syz1\x00', r1}, 0x30) perf_event_open(&(0x7f0000000300)={0x5, 0x70, 0xff, 0x4, 0x1000, 0xe5af, 0x0, 0x8000, 0xd0440, 0x2, 0xffff, 0x1, 0x4, 0x1f, 0x3, 0xfffffffffffffffa, 0x5, 0x9, 0x8, 0x1, 0x3, 0x400, 0x6, 0x5, 0x401, 0x10000, 0xff, 0xb24, 0xffffffffffff8000, 0xc8a, 0x3f, 0xfffffffffffffffa, 0xffffffffffff8001, 0x200, 0x5, 0x3, 0x2, 0x93a, 0x0, 0x7fff, 0x2, @perf_bp={&(0x7f0000000100), 0x1}, 0x0, 0x0, 0xffffffffffffff4e, 0x6, 0x0, 0x4, 0xfffffffffffffffd}, r5, 0x0, r7, 0x8) r8 = openat$tun(0xffffffffffffff9c, &(0x7f0000000580)='/dev/net/tun\x00', 0x40000, 0x0) ioctl$TUNSETPERSIST(r8, 0x400454cb, 0x1) r9 = socket$kcm(0x29, 0x5, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000800)={0x0, r0, 0x1, 0x2}, 0x14) ioctl$sock_kcm_SIOCKCMUNATTACH(r9, 0x89e1, &(0x7f0000000900)={r2}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r3, 0x0, 0x8b, 0x0, &(0x7f0000000680)="3ce41f426b7dd449ae14b08e1868c456d4fe9c7993884cf18f4dd5a0bc57250243da4203e0640859184bc4c4690afefd7736e8842cd88030448e918bdb5bd9bbbd680a51261557c0477c18049c832005ebb5b185c6f233df73a21d3b3ddad8426fba2d5f8aac5df904d5e5f2e7dc4a517079e08d5b2175a276f2a5c49cc2957cb367f269898570852dd63a", 0x0, 0x5}, 0x28) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000500)='./cgroup/syz0\x00', 0x200002, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000740)={r3, 0x50, &(0x7f00000003c0)}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r2, 0x50, &(0x7f0000000840)}, 0x10) openat$cgroup_subtree(r2, &(0x7f0000000940)='cgroup.subtree_control\x00', 0x2, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x1ff, 0x0, 0x0, 0x0, 0x200000, 0xffffffffffffffff, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280), 0x2}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r10 = socket$kcm(0xa, 0x400000000002, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffc59) ioctl$sock_kcm_SIOCKCMCLONE(r10, 0x890b, &(0x7f0000000000)) ioctl$sock_kcm_SIOCKCMCLONE(r10, 0x890c, &(0x7f0000000000)) 03:53:53 executing program 5: getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffff9c, 0x84, 0x13, 0x0, 0x0) r0 = syz_open_dev$swradio(&(0x7f0000000000)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$radio(0x0, 0xffffffffffffffff, 0x2) r1 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) getdents64(r1, 0x0, 0x0) r2 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r2, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r2, 0x8) r3 = socket$inet6_sctp(0xa, 0x805, 0x84) r4 = accept4(r2, 0x0, 0x0, 0x0) prctl$PR_SET_ENDIAN(0x14, 0x1) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r3, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) epoll_pwait(0xffffffffffffffff, &(0x7f0000000040)=[{}], 0x1, 0x0, &(0x7f0000000080), 0x8) getpgid(0x0) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r4, 0x84, 0x9, &(0x7f0000000280)={0x0, @in={{0x2, 0x0, @empty}}, 0x0, 0xac14142400000000, 0x0, 0x0, 0x54}, 0x98) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) ioctl$SIOCAX25ADDFWD(r0, 0x89ea, 0x0) syz_mount_image$gfs2(0x0, 0x0, 0x87, 0x0, &(0x7f00000005c0), 0x1040040, 0x0) readv(0xffffffffffffffff, &(0x7f0000000500)=[{&(0x7f0000000400)=""/217, 0xd9}], 0x1) 03:53:53 executing program 2: 03:53:53 executing program 3: [ 1860.882571] net_ratelimit: 22 callbacks suppressed [ 1860.882579] protocol 88fb is buggy, dev hsr_slave_0 [ 1860.892693] protocol 88fb is buggy, dev hsr_slave_1 [ 1860.897801] protocol 88fb is buggy, dev hsr_slave_0 [ 1860.902929] protocol 88fb is buggy, dev hsr_slave_1 03:53:53 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x20, &(0x7f0000000b80)=ANY=[@ANYBLOB="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"], 0x0, 0x1625, 0x0, 0x0, 0x41100, 0x1, [], 0x0, 0x4}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r0, 0xdb, &(0x7f0000000200)={0x0, 0x0}}, 0x393) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='cgroup.events\x00', 0x0, 0x0) write$cgroup_int(r2, &(0x7f00000007c0)=0x6, 0x12) r3 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000002c0), 0x4) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz1\x00', 0x1ff) r4 = perf_event_open$cgroup(&(0x7f0000000600)={0x0, 0x70, 0x9, 0x6, 0x8, 0x6, 0x0, 0xfffffffffffff49f, 0x2, 0x6, 0x3ff, 0x0, 0x20, 0x0, 0x1, 0x81, 0x1, 0x400, 0x4, 0xfac, 0x4, 0x1, 0x10000, 0xf1, 0xd3, 0x92b, 0x200, 0x1, 0x100000000, 0x2, 0x0, 0xfff, 0xfff, 0xffff, 0x3, 0xfffffffffffffffd, 0x0, 0x6, 0x0, 0x50, 0x0, @perf_config_ext={0x3f, 0x9}, 0x20000, 0x8, 0xef3, 0x7, 0x100000000, 0x8, 0xfff}, 0xffffffffffffffff, 0x2, r0, 0x8) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000b40)='cgroup.subtree_control\x00') ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x2400, 0x1) r5 = getpid() socketpair$unix(0x1, 0x7, 0x0, &(0x7f0000000540)={0xffffffffffffffff}) setsockopt$sock_attach_bpf(r6, 0x1, 0x32, &(0x7f00000005c0)=r3, 0x4) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={0x0, 0xffffffffffffffff, 0x0, 0x12, &(0x7f0000000480)='./cgroup.cpu/syz1\x00', r1}, 0x30) perf_event_open(&(0x7f0000000300)={0x5, 0x70, 0xff, 0x4, 0x1000, 0xe5af, 0x0, 0x8000, 0xd0440, 0x2, 0xffff, 0x1, 0x4, 0x1f, 0x3, 0xfffffffffffffffa, 0x5, 0x9, 0x8, 0x1, 0x3, 0x400, 0x6, 0x5, 0x401, 0x10000, 0xff, 0xb24, 0xffffffffffff8000, 0xc8a, 0x3f, 0xfffffffffffffffa, 0xffffffffffff8001, 0x200, 0x5, 0x3, 0x2, 0x93a, 0x0, 0x7fff, 0x2, @perf_bp={&(0x7f0000000100), 0x1}, 0x0, 0x0, 0xffffffffffffff4e, 0x6, 0x0, 0x4, 0xfffffffffffffffd}, r5, 0x0, r7, 0x8) r8 = openat$tun(0xffffffffffffff9c, &(0x7f0000000580)='/dev/net/tun\x00', 0x40000, 0x0) ioctl$TUNSETPERSIST(r8, 0x400454cb, 0x1) r9 = socket$kcm(0x29, 0x5, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000800)={0x0, r0, 0x1, 0x2}, 0x14) ioctl$sock_kcm_SIOCKCMUNATTACH(r9, 0x89e1, &(0x7f0000000900)={r2}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r3, 0x0, 0x8b, 0x0, &(0x7f0000000680)="3ce41f426b7dd449ae14b08e1868c456d4fe9c7993884cf18f4dd5a0bc57250243da4203e0640859184bc4c4690afefd7736e8842cd88030448e918bdb5bd9bbbd680a51261557c0477c18049c832005ebb5b185c6f233df73a21d3b3ddad8426fba2d5f8aac5df904d5e5f2e7dc4a517079e08d5b2175a276f2a5c49cc2957cb367f269898570852dd63a", 0x0, 0x5}, 0x28) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000500)='./cgroup/syz0\x00', 0x200002, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000740)={r3, 0x50, &(0x7f00000003c0)}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r2, 0x50, &(0x7f0000000840)}, 0x10) openat$cgroup_subtree(r2, &(0x7f0000000940)='cgroup.subtree_control\x00', 0x2, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x1ff, 0x0, 0x0, 0x0, 0x200000, 0xffffffffffffffff, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280), 0x2}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r10 = socket$kcm(0xa, 0x400000000002, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffc59) ioctl$sock_kcm_SIOCKCMCLONE(r10, 0x890b, &(0x7f0000000000)) ioctl$sock_kcm_SIOCKCMCLONE(r10, 0x890c, &(0x7f0000000000)) 03:53:53 executing program 4: r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x5f}, {0x0}, {&(0x7f0000000fc0)=""/4096, 0x1000}, {&(0x7f0000000400)=""/120, 0x78}, {&(0x7f0000000480)=""/60, 0x3c}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f0000000540)=""/154, 0x9a}, {&(0x7f0000000340)=""/22, 0x16}], 0x8, &(0x7f0000002400)=""/191, 0xbf}}], 0x1, 0x0, &(0x7f0000003700)={0x77359400}) 03:53:53 executing program 2: 03:53:53 executing program 3: 03:53:53 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f00000001c0), 0xfffffef3) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) creat(&(0x7f00000001c0)='./bus\x00', 0x0) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vga_arbiter\x00', 0x0, 0x0) open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r3) r4 = creat(&(0x7f0000000700)='./bus\x00', 0x0) truncate(&(0x7f0000000240)='./bus\x00', 0x800) r5 = open(&(0x7f0000000140)='./bus\x00', 0x400000008, 0x0) lseek(r4, 0x0, 0x2) getgroups(0x0, 0x0) getresgid(&(0x7f00000003c0), 0x0, &(0x7f0000000400)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000580)='./bus\x00', 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB], 0x1, 0x0) fstat(r4, &(0x7f00000004c0)) stat(0x0, &(0x7f0000000640)) sysinfo(0x0) sendfile(r4, r5, 0x0, 0x8000fffffffe) creat(&(0x7f0000000700)='./bus\x00', 0x0) r6 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) ftruncate(r0, 0x3) fallocate(r2, 0x0, 0x0, 0x0) getsockopt$inet_pktinfo(r4, 0x0, 0x8, 0x0, &(0x7f0000000480)) lseek(r6, 0x0, 0x3) 03:53:53 executing program 5: getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffff9c, 0x84, 0x13, 0x0, 0x0) r0 = syz_open_dev$swradio(&(0x7f0000000000)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$radio(0x0, 0xffffffffffffffff, 0x2) r1 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) getdents64(r1, 0x0, 0x0) r2 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r2, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r2, 0x8) r3 = socket$inet6_sctp(0xa, 0x805, 0x84) r4 = accept4(r2, 0x0, 0x0, 0x0) prctl$PR_SET_ENDIAN(0x14, 0x1) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r3, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) epoll_pwait(0xffffffffffffffff, &(0x7f0000000040)=[{}], 0x1, 0x0, &(0x7f0000000080), 0x8) getpgid(0x0) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r4, 0x84, 0x9, &(0x7f0000000280)={0x0, @in={{0x2, 0x0, @empty}}, 0x0, 0xac14142400000000, 0x0, 0x0, 0x54}, 0x98) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) ioctl$SIOCAX25ADDFWD(r0, 0x89ea, 0x0) syz_mount_image$gfs2(0x0, 0x0, 0x87, 0x0, &(0x7f00000005c0), 0x1040040, 0x0) readv(0xffffffffffffffff, &(0x7f0000000500)=[{&(0x7f0000000400)=""/217, 0xd9}], 0x1) 03:53:53 executing program 2: 03:53:53 executing program 3: 03:53:53 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x20, &(0x7f0000000b80)=ANY=[@ANYBLOB="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"], 0x0, 0x1625, 0x0, 0x0, 0x41100, 0x1, [], 0x0, 0x4}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r0, 0xdb, &(0x7f0000000200)={0x0, 0x0}}, 0x393) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='cgroup.events\x00', 0x0, 0x0) write$cgroup_int(r2, &(0x7f00000007c0)=0x6, 0x12) r3 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000002c0), 0x4) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz1\x00', 0x1ff) r4 = perf_event_open$cgroup(&(0x7f0000000600)={0x0, 0x70, 0x9, 0x6, 0x8, 0x6, 0x0, 0xfffffffffffff49f, 0x2, 0x6, 0x3ff, 0x0, 0x20, 0x0, 0x1, 0x81, 0x1, 0x400, 0x4, 0xfac, 0x4, 0x1, 0x10000, 0xf1, 0xd3, 0x92b, 0x200, 0x1, 0x100000000, 0x2, 0x0, 0xfff, 0xfff, 0xffff, 0x3, 0xfffffffffffffffd, 0x0, 0x6, 0x0, 0x50, 0x0, @perf_config_ext={0x3f, 0x9}, 0x20000, 0x8, 0xef3, 0x7, 0x100000000, 0x8, 0xfff}, 0xffffffffffffffff, 0x2, r0, 0x8) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000b40)='cgroup.subtree_control\x00') ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x2400, 0x1) r5 = getpid() socketpair$unix(0x1, 0x7, 0x0, &(0x7f0000000540)={0xffffffffffffffff}) setsockopt$sock_attach_bpf(r6, 0x1, 0x32, &(0x7f00000005c0)=r3, 0x4) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={0x0, 0xffffffffffffffff, 0x0, 0x12, &(0x7f0000000480)='./cgroup.cpu/syz1\x00', r1}, 0x30) perf_event_open(&(0x7f0000000300)={0x5, 0x70, 0xff, 0x4, 0x1000, 0xe5af, 0x0, 0x8000, 0xd0440, 0x2, 0xffff, 0x1, 0x4, 0x1f, 0x3, 0xfffffffffffffffa, 0x5, 0x9, 0x8, 0x1, 0x3, 0x400, 0x6, 0x5, 0x401, 0x10000, 0xff, 0xb24, 0xffffffffffff8000, 0xc8a, 0x3f, 0xfffffffffffffffa, 0xffffffffffff8001, 0x200, 0x5, 0x3, 0x2, 0x93a, 0x0, 0x7fff, 0x2, @perf_bp={&(0x7f0000000100), 0x1}, 0x0, 0x0, 0xffffffffffffff4e, 0x6, 0x0, 0x4, 0xfffffffffffffffd}, r5, 0x0, r7, 0x8) r8 = openat$tun(0xffffffffffffff9c, &(0x7f0000000580)='/dev/net/tun\x00', 0x40000, 0x0) ioctl$TUNSETPERSIST(r8, 0x400454cb, 0x1) r9 = socket$kcm(0x29, 0x5, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000800)={0x0, r0, 0x1, 0x2}, 0x14) ioctl$sock_kcm_SIOCKCMUNATTACH(r9, 0x89e1, &(0x7f0000000900)={r2}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r3, 0x0, 0x8b, 0x0, &(0x7f0000000680)="3ce41f426b7dd449ae14b08e1868c456d4fe9c7993884cf18f4dd5a0bc57250243da4203e0640859184bc4c4690afefd7736e8842cd88030448e918bdb5bd9bbbd680a51261557c0477c18049c832005ebb5b185c6f233df73a21d3b3ddad8426fba2d5f8aac5df904d5e5f2e7dc4a517079e08d5b2175a276f2a5c49cc2957cb367f269898570852dd63a", 0x0, 0x5}, 0x28) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000500)='./cgroup/syz0\x00', 0x200002, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000740)={r3, 0x50, &(0x7f00000003c0)}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r2, 0x50, &(0x7f0000000840)}, 0x10) openat$cgroup_subtree(r2, &(0x7f0000000940)='cgroup.subtree_control\x00', 0x2, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x1ff, 0x0, 0x0, 0x0, 0x200000, 0xffffffffffffffff, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280), 0x2}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r10 = socket$kcm(0xa, 0x400000000002, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffc59) ioctl$sock_kcm_SIOCKCMCLONE(r10, 0x890b, &(0x7f0000000000)) ioctl$sock_kcm_SIOCKCMCLONE(r10, 0x890c, &(0x7f0000000000)) 03:53:54 executing program 4: r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x5f}, {0x0}, {&(0x7f0000000fc0)=""/4096, 0x1000}, {&(0x7f0000000400)=""/120, 0x78}, {&(0x7f0000000480)=""/60, 0x3c}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f0000000540)=""/154, 0x9a}, {&(0x7f0000000340)=""/22, 0x16}], 0x8, &(0x7f0000002400)=""/191, 0xbf}}], 0x1, 0x0, &(0x7f0000003700)={0x77359400}) 03:53:54 executing program 2: 03:53:54 executing program 3: 03:53:54 executing program 2: 03:53:54 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x20, &(0x7f0000000b80)=ANY=[@ANYBLOB="cab5674ca80400f902c8d3fc17d4a51472ff5e04a7ed68e9074e865fffffffffff6582e2a0c58f438f1a9b1af27305fb6c1d497851a00d51dddde821f356222d82de15a5bb3ca4d544c3683ff903b30637ee634a8a4fa0e19e57c7d35e4db3a02231b71023a910ac2424326e31258bde7ca760ff3ca3261a92112b3c8db9e0d79dc5ad29e05434154bba1e60d243d8fa466b27518c09e11b78ec43ab7af1d33fbd4885ee5e95b0849345d0edef0a2e68320a47938597cf0fba5ae2e93301ffc38baaf2673b7fd4628a0fe3665006d238567bdb430991e02866ad858345dc86331d91a53051b3284827fc0a870d857ecc180901feb2d1dd3be0c1ebc3fa1d00d550744d9e55"], 0x0, 0x1625, 0x0, 0x0, 0x41100, 0x1, [], 0x0, 0x4}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r0, 0xdb, &(0x7f0000000200)={0x0, 0x0}}, 0x393) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='cgroup.events\x00', 0x0, 0x0) write$cgroup_int(r2, &(0x7f00000007c0)=0x6, 0x12) r3 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000002c0), 0x4) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz1\x00', 0x1ff) r4 = perf_event_open$cgroup(&(0x7f0000000600)={0x0, 0x70, 0x9, 0x6, 0x8, 0x6, 0x0, 0xfffffffffffff49f, 0x2, 0x6, 0x3ff, 0x0, 0x20, 0x0, 0x1, 0x81, 0x1, 0x400, 0x4, 0xfac, 0x4, 0x1, 0x10000, 0xf1, 0xd3, 0x92b, 0x200, 0x1, 0x100000000, 0x2, 0x100000000, 0x0, 0xfff, 0xffff, 0x3, 0xfffffffffffffffd, 0x0, 0x6, 0x0, 0x50, 0x0, @perf_config_ext={0x3f, 0x9}, 0x20000, 0x8, 0xef3, 0x7, 0x100000000, 0x8, 0xfff}, 0xffffffffffffffff, 0x2, r0, 0x8) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000b40)='cgroup.subtree_control\x00') ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x2400, 0x1) r5 = getpid() socketpair$unix(0x1, 0x7, 0x0, &(0x7f0000000540)={0xffffffffffffffff}) setsockopt$sock_attach_bpf(r6, 0x1, 0x32, &(0x7f00000005c0)=r3, 0x4) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={0x0, 0xffffffffffffffff, 0x0, 0x12, &(0x7f0000000480)='./cgroup.cpu/syz1\x00', r1}, 0x30) perf_event_open(&(0x7f0000000300)={0x5, 0x70, 0xff, 0x4, 0x1000, 0xe5af, 0x0, 0x8000, 0xd0440, 0x2, 0xffff, 0x1, 0x4, 0x1f, 0x3, 0xfffffffffffffffa, 0x5, 0x9, 0x8, 0x1, 0x3, 0x400, 0x6, 0x5, 0x401, 0x10000, 0xff, 0xb24, 0xffffffffffff8000, 0xc8a, 0x3f, 0xfffffffffffffffa, 0xffffffffffff8001, 0x200, 0x5, 0x3, 0x2, 0x93a, 0x0, 0x7fff, 0x2, @perf_bp={&(0x7f0000000100), 0x1}, 0x0, 0x0, 0xffffffffffffff4e, 0x6, 0x0, 0x4, 0xfffffffffffffffd}, r5, 0x0, r7, 0x8) r8 = openat$tun(0xffffffffffffff9c, &(0x7f0000000580)='/dev/net/tun\x00', 0x40000, 0x0) ioctl$TUNSETPERSIST(r8, 0x400454cb, 0x1) r9 = socket$kcm(0x29, 0x5, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000800)={0x0, r0, 0x1, 0x2}, 0x14) ioctl$sock_kcm_SIOCKCMUNATTACH(r9, 0x89e1, &(0x7f0000000900)={r2}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r3, 0x0, 0x8b, 0x0, &(0x7f0000000680)="3ce41f426b7dd449ae14b08e1868c456d4fe9c7993884cf18f4dd5a0bc57250243da4203e0640859184bc4c4690afefd7736e8842cd88030448e918bdb5bd9bbbd680a51261557c0477c18049c832005ebb5b185c6f233df73a21d3b3ddad8426fba2d5f8aac5df904d5e5f2e7dc4a517079e08d5b2175a276f2a5c49cc2957cb367f269898570852dd63a", 0x0, 0x5}, 0x28) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000500)='./cgroup/syz0\x00', 0x200002, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000740)={r3, 0x50, &(0x7f00000003c0)}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r2, 0x50, &(0x7f0000000840)}, 0x10) openat$cgroup_subtree(r2, &(0x7f0000000940)='cgroup.subtree_control\x00', 0x2, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x1ff, 0x0, 0x0, 0x0, 0x200000, 0xffffffffffffffff, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280), 0x2}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r10 = socket$kcm(0xa, 0x400000000002, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffc59) ioctl$sock_kcm_SIOCKCMCLONE(r10, 0x890b, &(0x7f0000000000)) ioctl$sock_kcm_SIOCKCMCLONE(r10, 0x890c, &(0x7f0000000000)) 03:53:54 executing program 4: r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f00000000c0)=""/85, 0x55}, {&(0x7f0000000fc0)=""/4096, 0x1000}, {&(0x7f0000000400)=""/120, 0x78}, {&(0x7f0000000480)=""/60, 0x3c}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f0000000540)=""/154, 0x9a}, {&(0x7f0000000340)=""/22, 0x16}], 0x7, &(0x7f0000002400)=""/191, 0xbf}}], 0x1, 0x0, &(0x7f0000003700)={0x77359400}) 03:53:54 executing program 5: getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffff9c, 0x84, 0x13, 0x0, 0x0) r0 = syz_open_dev$swradio(&(0x7f0000000000)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$radio(0x0, 0xffffffffffffffff, 0x2) r1 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) getdents64(r1, 0x0, 0x0) r2 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r2, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r2, 0x8) r3 = socket$inet6_sctp(0xa, 0x805, 0x84) r4 = accept4(r2, 0x0, 0x0, 0x0) prctl$PR_SET_ENDIAN(0x14, 0x1) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r3, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) epoll_pwait(0xffffffffffffffff, &(0x7f0000000040)=[{}], 0x1, 0x0, &(0x7f0000000080), 0x8) getpgid(0x0) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r4, 0x84, 0x9, &(0x7f0000000280)={0x0, @in={{0x2, 0x0, @empty}}, 0x0, 0xac14142400000000, 0x0, 0x0, 0x54}, 0x98) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) ioctl$SIOCAX25ADDFWD(r0, 0x89ea, 0x0) syz_mount_image$gfs2(0x0, 0x0, 0x87, 0x0, &(0x7f00000005c0), 0x1040040, 0x0) readv(0xffffffffffffffff, &(0x7f0000000500)=[{&(0x7f0000000400)=""/217, 0xd9}], 0x1) [ 1862.082556] protocol 88fb is buggy, dev hsr_slave_0 [ 1862.087698] protocol 88fb is buggy, dev hsr_slave_1 [ 1862.093655] protocol 88fb is buggy, dev hsr_slave_0 [ 1862.098728] protocol 88fb is buggy, dev hsr_slave_1 [ 1862.103919] protocol 88fb is buggy, dev hsr_slave_0 [ 1862.108991] protocol 88fb is buggy, dev hsr_slave_1 03:53:55 executing program 0: socket$inet6_tcp(0xa, 0x1, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xfffffef3) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) creat(&(0x7f00000001c0)='./bus\x00', 0x0) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vga_arbiter\x00', 0x0, 0x0) open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r2) r3 = creat(&(0x7f0000000700)='./bus\x00', 0x0) truncate(&(0x7f0000000240)='./bus\x00', 0x800) r4 = open(&(0x7f0000000140)='./bus\x00', 0x400000008, 0x0) lseek(r3, 0x0, 0x2) getgroups(0x0, 0x0) getresgid(&(0x7f00000003c0), 0x0, &(0x7f0000000400)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000580)='./bus\x00', 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB], 0x1, 0x0) fstat(r3, &(0x7f00000004c0)) stat(0x0, &(0x7f0000000640)) sysinfo(0x0) sendfile(r3, r4, 0x0, 0x8000fffffffe) creat(&(0x7f0000000700)='./bus\x00', 0x0) r5 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) fallocate(r1, 0x0, 0x0, 0x0) getsockopt$inet_pktinfo(r3, 0x0, 0x8, 0x0, &(0x7f0000000480)) lseek(r5, 0x0, 0x3) 03:53:55 executing program 2: 03:53:55 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x20, &(0x7f0000000b80)=ANY=[@ANYBLOB="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"], 0x0, 0x1625, 0x0, 0x0, 0x41100, 0x1, [], 0x0, 0x4}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r0, 0xdb, &(0x7f0000000200)={0x0, 0x0}}, 0x393) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='cgroup.events\x00', 0x0, 0x0) write$cgroup_int(r2, &(0x7f00000007c0)=0x6, 0x12) r3 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000002c0), 0x4) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz1\x00', 0x1ff) r4 = perf_event_open$cgroup(&(0x7f0000000600)={0x0, 0x70, 0x9, 0x6, 0x8, 0x6, 0x0, 0xfffffffffffff49f, 0x2, 0x6, 0x3ff, 0x0, 0x20, 0x0, 0x1, 0x81, 0x1, 0x400, 0x4, 0xfac, 0x4, 0x1, 0x10000, 0xf1, 0xd3, 0x92b, 0x200, 0x1, 0x100000000, 0x2, 0x100000000, 0x0, 0xfff, 0xffff, 0x3, 0xfffffffffffffffd, 0x0, 0x6, 0x0, 0x50, 0x0, @perf_config_ext={0x3f, 0x9}, 0x20000, 0x8, 0xef3, 0x7, 0x100000000, 0x8, 0xfff}, 0xffffffffffffffff, 0x2, r0, 0x8) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000b40)='cgroup.subtree_control\x00') ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x2400, 0x1) r5 = getpid() socketpair$unix(0x1, 0x7, 0x0, &(0x7f0000000540)={0xffffffffffffffff}) setsockopt$sock_attach_bpf(r6, 0x1, 0x32, &(0x7f00000005c0)=r3, 0x4) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={0x0, 0xffffffffffffffff, 0x0, 0x12, &(0x7f0000000480)='./cgroup.cpu/syz1\x00', r1}, 0x30) perf_event_open(&(0x7f0000000300)={0x5, 0x70, 0xff, 0x4, 0x1000, 0xe5af, 0x0, 0x8000, 0xd0440, 0x2, 0xffff, 0x1, 0x4, 0x1f, 0x3, 0xfffffffffffffffa, 0x5, 0x9, 0x8, 0x1, 0x3, 0x400, 0x6, 0x5, 0x401, 0x10000, 0xff, 0xb24, 0xffffffffffff8000, 0xc8a, 0x3f, 0xfffffffffffffffa, 0xffffffffffff8001, 0x200, 0x5, 0x3, 0x2, 0x93a, 0x0, 0x7fff, 0x2, @perf_bp={&(0x7f0000000100), 0x1}, 0x0, 0x0, 0xffffffffffffff4e, 0x6, 0x0, 0x4, 0xfffffffffffffffd}, r5, 0x0, r7, 0x8) r8 = openat$tun(0xffffffffffffff9c, &(0x7f0000000580)='/dev/net/tun\x00', 0x40000, 0x0) ioctl$TUNSETPERSIST(r8, 0x400454cb, 0x1) r9 = socket$kcm(0x29, 0x5, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000800)={0x0, r0, 0x1, 0x2}, 0x14) ioctl$sock_kcm_SIOCKCMUNATTACH(r9, 0x89e1, &(0x7f0000000900)={r2}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r3, 0x0, 0x8b, 0x0, &(0x7f0000000680)="3ce41f426b7dd449ae14b08e1868c456d4fe9c7993884cf18f4dd5a0bc57250243da4203e0640859184bc4c4690afefd7736e8842cd88030448e918bdb5bd9bbbd680a51261557c0477c18049c832005ebb5b185c6f233df73a21d3b3ddad8426fba2d5f8aac5df904d5e5f2e7dc4a517079e08d5b2175a276f2a5c49cc2957cb367f269898570852dd63a", 0x0, 0x5}, 0x28) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000500)='./cgroup/syz0\x00', 0x200002, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000740)={r3, 0x50, &(0x7f00000003c0)}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r2, 0x50, &(0x7f0000000840)}, 0x10) openat$cgroup_subtree(r2, &(0x7f0000000940)='cgroup.subtree_control\x00', 0x2, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x1ff, 0x0, 0x0, 0x0, 0x200000, 0xffffffffffffffff, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280), 0x2}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r10 = socket$kcm(0xa, 0x400000000002, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffc59) ioctl$sock_kcm_SIOCKCMCLONE(r10, 0x890b, &(0x7f0000000000)) ioctl$sock_kcm_SIOCKCMCLONE(r10, 0x890c, &(0x7f0000000000)) 03:53:55 executing program 3: 03:53:55 executing program 4: r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f00000000c0)=""/85, 0x55}, {&(0x7f0000000fc0)=""/4096, 0x1000}, {&(0x7f0000000400)=""/120, 0x78}, {&(0x7f0000000480)=""/60, 0x3c}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f0000000540)=""/154, 0x9a}, {&(0x7f0000000340)=""/22, 0x16}], 0x7, &(0x7f0000002400)=""/191, 0xbf}}], 0x1, 0x0, &(0x7f0000003700)={0x77359400}) 03:53:55 executing program 3: 03:53:55 executing program 5: getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffff9c, 0x84, 0x13, 0x0, 0x0) r0 = syz_open_dev$swradio(&(0x7f0000000000)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$radio(0x0, 0xffffffffffffffff, 0x2) r1 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) getdents64(r1, 0x0, 0x0) r2 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r2, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r2, 0x8) r3 = socket$inet6_sctp(0xa, 0x805, 0x84) r4 = accept4(r2, 0x0, 0x0, 0x0) prctl$PR_SET_ENDIAN(0x14, 0x1) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r3, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) epoll_pwait(0xffffffffffffffff, &(0x7f0000000040)=[{}], 0x1, 0x0, &(0x7f0000000080), 0x8) getpgid(0x0) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r4, 0x84, 0x9, &(0x7f0000000280)={0x0, @in={{0x2, 0x0, @empty}}, 0x0, 0xac14142400000000, 0x0, 0x0, 0x54}, 0x98) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) ioctl$SIOCAX25ADDFWD(r0, 0x89ea, 0x0) syz_mount_image$gfs2(0x0, 0x0, 0x87, 0x0, &(0x7f00000005c0), 0x1040040, 0x0) readv(r1, 0x0, 0x0) 03:53:55 executing program 4: r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f00000000c0)=""/85, 0x55}, {&(0x7f0000000fc0)=""/4096, 0x1000}, {&(0x7f0000000400)=""/120, 0x78}, {&(0x7f0000000480)=""/60, 0x3c}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f0000000540)=""/154, 0x9a}, {&(0x7f0000000340)=""/22, 0x16}], 0x7, &(0x7f0000002400)=""/191, 0xbf}}], 0x1, 0x0, &(0x7f0000003700)={0x77359400}) 03:53:55 executing program 2: 03:53:55 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x20, &(0x7f0000000b80)=ANY=[@ANYBLOB="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"], 0x0, 0x1625, 0x0, 0x0, 0x41100, 0x1, [], 0x0, 0x4}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r0, 0xdb, &(0x7f0000000200)={0x0, 0x0}}, 0x393) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='cgroup.events\x00', 0x0, 0x0) write$cgroup_int(r2, &(0x7f00000007c0)=0x6, 0x12) r3 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000002c0), 0x4) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz1\x00', 0x1ff) r4 = perf_event_open$cgroup(&(0x7f0000000600)={0x0, 0x70, 0x9, 0x6, 0x8, 0x6, 0x0, 0xfffffffffffff49f, 0x2, 0x6, 0x3ff, 0x0, 0x20, 0x0, 0x1, 0x81, 0x1, 0x400, 0x4, 0xfac, 0x4, 0x1, 0x10000, 0xf1, 0xd3, 0x92b, 0x200, 0x1, 0x100000000, 0x2, 0x100000000, 0x0, 0xfff, 0xffff, 0x3, 0xfffffffffffffffd, 0x0, 0x6, 0x0, 0x50, 0x0, @perf_config_ext={0x3f, 0x9}, 0x20000, 0x8, 0xef3, 0x7, 0x100000000, 0x8, 0xfff}, 0xffffffffffffffff, 0x2, r0, 0x8) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000b40)='cgroup.subtree_control\x00') ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x2400, 0x1) r5 = getpid() socketpair$unix(0x1, 0x7, 0x0, &(0x7f0000000540)={0xffffffffffffffff}) setsockopt$sock_attach_bpf(r6, 0x1, 0x32, &(0x7f00000005c0)=r3, 0x4) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={0x0, 0xffffffffffffffff, 0x0, 0x12, &(0x7f0000000480)='./cgroup.cpu/syz1\x00', r1}, 0x30) perf_event_open(&(0x7f0000000300)={0x5, 0x70, 0xff, 0x4, 0x1000, 0xe5af, 0x0, 0x8000, 0xd0440, 0x2, 0xffff, 0x1, 0x4, 0x1f, 0x3, 0xfffffffffffffffa, 0x5, 0x9, 0x8, 0x1, 0x3, 0x400, 0x6, 0x5, 0x401, 0x10000, 0xff, 0xb24, 0xffffffffffff8000, 0xc8a, 0x3f, 0xfffffffffffffffa, 0xffffffffffff8001, 0x200, 0x5, 0x3, 0x2, 0x93a, 0x0, 0x7fff, 0x2, @perf_bp={&(0x7f0000000100), 0x1}, 0x0, 0x0, 0xffffffffffffff4e, 0x6, 0x0, 0x4, 0xfffffffffffffffd}, r5, 0x0, r7, 0x8) r8 = openat$tun(0xffffffffffffff9c, &(0x7f0000000580)='/dev/net/tun\x00', 0x40000, 0x0) ioctl$TUNSETPERSIST(r8, 0x400454cb, 0x1) r9 = socket$kcm(0x29, 0x5, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000800)={0x0, r0, 0x1, 0x2}, 0x14) ioctl$sock_kcm_SIOCKCMUNATTACH(r9, 0x89e1, &(0x7f0000000900)={r2}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r3, 0x0, 0x8b, 0x0, &(0x7f0000000680)="3ce41f426b7dd449ae14b08e1868c456d4fe9c7993884cf18f4dd5a0bc57250243da4203e0640859184bc4c4690afefd7736e8842cd88030448e918bdb5bd9bbbd680a51261557c0477c18049c832005ebb5b185c6f233df73a21d3b3ddad8426fba2d5f8aac5df904d5e5f2e7dc4a517079e08d5b2175a276f2a5c49cc2957cb367f269898570852dd63a", 0x0, 0x5}, 0x28) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000500)='./cgroup/syz0\x00', 0x200002, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000740)={r3, 0x50, &(0x7f00000003c0)}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r2, 0x50, &(0x7f0000000840)}, 0x10) openat$cgroup_subtree(r2, &(0x7f0000000940)='cgroup.subtree_control\x00', 0x2, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x1ff, 0x0, 0x0, 0x0, 0x200000, 0xffffffffffffffff, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280), 0x2}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r10 = socket$kcm(0xa, 0x400000000002, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffc59) ioctl$sock_kcm_SIOCKCMCLONE(r10, 0x890b, &(0x7f0000000000)) ioctl$sock_kcm_SIOCKCMCLONE(r10, 0x890c, &(0x7f0000000000)) 03:53:55 executing program 3: syz_execute_func(&(0x7f0000000140)="3666440f50f564ff0941c3c4e2c9975842c4c27d794e0066420fe2e33e0f1110c442019dccd3196f") clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) read(0xffffffffffffffff, 0x0, 0x0) open$dir(0x0, 0x0, 0x0) ioctl$sock_inet_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) 03:53:55 executing program 2: creat(0x0, 0x8) getpgrp(0xffffffffffffffff) clone(0x1000202102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0xa102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f00000002c0)={@ipv4, 0x0, 0x0, 0x0, 0x5}, 0x16d) getsockopt$EBT_SO_GET_INIT_ENTRIES(r0, 0x0, 0x83, 0x0, &(0x7f0000000180)) getrandom(&(0x7f0000000140)=""/29, 0x1d, 0x2) 03:53:56 executing program 0: socket$inet6_tcp(0xa, 0x1, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xfffffef3) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) creat(&(0x7f00000001c0)='./bus\x00', 0x0) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vga_arbiter\x00', 0x0, 0x0) open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r2) r3 = creat(&(0x7f0000000700)='./bus\x00', 0x0) truncate(&(0x7f0000000240)='./bus\x00', 0x800) r4 = open(&(0x7f0000000140)='./bus\x00', 0x400000008, 0x0) lseek(r3, 0x0, 0x2) getgroups(0x0, 0x0) getresgid(&(0x7f00000003c0), 0x0, &(0x7f0000000400)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000580)='./bus\x00', 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB], 0x1, 0x0) fstat(r3, &(0x7f00000004c0)) stat(0x0, &(0x7f0000000640)) sysinfo(0x0) sendfile(r3, r4, 0x0, 0x8000fffffffe) creat(&(0x7f0000000700)='./bus\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x0) getsockopt$inet_pktinfo(r3, 0x0, 0x8, 0x0, &(0x7f0000000480)) lseek(0xffffffffffffffff, 0x0, 0x3) 03:53:56 executing program 4: r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{0x0}, {&(0x7f00000000c0)=""/85, 0x55}, {&(0x7f0000000fc0)=""/4096, 0x1000}, {&(0x7f0000000400)=""/120, 0x78}, {&(0x7f0000000480)=""/60, 0x3c}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f0000000540)=""/154, 0x9a}, {&(0x7f0000000340)=""/22, 0x16}], 0x8, &(0x7f0000002400)=""/191, 0xbf}}], 0x1, 0x0, &(0x7f0000003700)={0x77359400}) 03:53:56 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x20, &(0x7f0000000b80)=ANY=[@ANYBLOB="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"], 0x0, 0x1625, 0x0, 0x0, 0x41100, 0x1, [], 0x0, 0x4}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r0, 0xdb, &(0x7f0000000200)={0x0, 0x0}}, 0x393) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='cgroup.events\x00', 0x0, 0x0) write$cgroup_int(r2, &(0x7f00000007c0)=0x6, 0x12) r3 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000002c0), 0x4) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz1\x00', 0x1ff) r4 = perf_event_open$cgroup(&(0x7f0000000600)={0x0, 0x70, 0x9, 0x6, 0x8, 0x6, 0x0, 0xfffffffffffff49f, 0x2, 0x6, 0x3ff, 0x0, 0x20, 0x0, 0x1, 0x81, 0x1, 0x400, 0x4, 0xfac, 0x4, 0x1, 0x10000, 0xf1, 0xd3, 0x92b, 0x200, 0x1, 0x100000000, 0x2, 0x100000000, 0xfff, 0x0, 0xffff, 0x3, 0xfffffffffffffffd, 0x0, 0x6, 0x0, 0x50, 0x0, @perf_config_ext={0x3f, 0x9}, 0x20000, 0x8, 0xef3, 0x7, 0x100000000, 0x8, 0xfff}, 0xffffffffffffffff, 0x2, r0, 0x8) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000b40)='cgroup.subtree_control\x00') ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x2400, 0x1) r5 = getpid() socketpair$unix(0x1, 0x7, 0x0, &(0x7f0000000540)={0xffffffffffffffff}) setsockopt$sock_attach_bpf(r6, 0x1, 0x32, &(0x7f00000005c0)=r3, 0x4) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={0x0, 0xffffffffffffffff, 0x0, 0x12, &(0x7f0000000480)='./cgroup.cpu/syz1\x00', r1}, 0x30) perf_event_open(&(0x7f0000000300)={0x5, 0x70, 0xff, 0x4, 0x1000, 0xe5af, 0x0, 0x8000, 0xd0440, 0x2, 0xffff, 0x1, 0x4, 0x1f, 0x3, 0xfffffffffffffffa, 0x5, 0x9, 0x8, 0x1, 0x3, 0x400, 0x6, 0x5, 0x401, 0x10000, 0xff, 0xb24, 0xffffffffffff8000, 0xc8a, 0x3f, 0xfffffffffffffffa, 0xffffffffffff8001, 0x200, 0x5, 0x3, 0x2, 0x93a, 0x0, 0x7fff, 0x2, @perf_bp={&(0x7f0000000100), 0x1}, 0x0, 0x0, 0xffffffffffffff4e, 0x6, 0x0, 0x4, 0xfffffffffffffffd}, r5, 0x0, r7, 0x8) r8 = openat$tun(0xffffffffffffff9c, &(0x7f0000000580)='/dev/net/tun\x00', 0x40000, 0x0) ioctl$TUNSETPERSIST(r8, 0x400454cb, 0x1) r9 = socket$kcm(0x29, 0x5, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000800)={0x0, r0, 0x1, 0x2}, 0x14) ioctl$sock_kcm_SIOCKCMUNATTACH(r9, 0x89e1, &(0x7f0000000900)={r2}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r3, 0x0, 0x8b, 0x0, &(0x7f0000000680)="3ce41f426b7dd449ae14b08e1868c456d4fe9c7993884cf18f4dd5a0bc57250243da4203e0640859184bc4c4690afefd7736e8842cd88030448e918bdb5bd9bbbd680a51261557c0477c18049c832005ebb5b185c6f233df73a21d3b3ddad8426fba2d5f8aac5df904d5e5f2e7dc4a517079e08d5b2175a276f2a5c49cc2957cb367f269898570852dd63a", 0x0, 0x5}, 0x28) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000500)='./cgroup/syz0\x00', 0x200002, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000740)={r3, 0x50, &(0x7f00000003c0)}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r2, 0x50, &(0x7f0000000840)}, 0x10) openat$cgroup_subtree(r2, &(0x7f0000000940)='cgroup.subtree_control\x00', 0x2, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x1ff, 0x0, 0x0, 0x0, 0x200000, 0xffffffffffffffff, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280), 0x2}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r10 = socket$kcm(0xa, 0x400000000002, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffc59) ioctl$sock_kcm_SIOCKCMCLONE(r10, 0x890b, &(0x7f0000000000)) ioctl$sock_kcm_SIOCKCMCLONE(r10, 0x890c, &(0x7f0000000000)) 03:53:56 executing program 3: syz_execute_func(&(0x7f0000000180)="3666440f50f564ff0941c3c4e2c9975842c4c27d794e007943e24a3666450f38f6f60fa16f") clone(0x20002102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000280)=0x100000001, 0x4) connect$inet6(r0, &(0x7f0000000240)={0xa, 0x0, 0x0, @dev, 0x3}, 0x1c) clone(0x1fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0xfdf2) setsockopt$inet6_IPV6_ADDRFORM(r0, 0x29, 0x1, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_int(r1, 0x6, 0x0, 0x0, 0x0) 03:53:56 executing program 2: creat(0x0, 0x8) getpgrp(0xffffffffffffffff) clone(0x1000202102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0xa102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f00000002c0)={@ipv4, 0x0, 0x0, 0x0, 0x5}, 0x16d) getsockopt$EBT_SO_GET_INIT_ENTRIES(r0, 0x0, 0x83, 0x0, &(0x7f0000000180)) getrandom(&(0x7f0000000140)=""/29, 0x1d, 0x2) 03:53:56 executing program 5: getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffff9c, 0x84, 0x13, 0x0, 0x0) r0 = syz_open_dev$swradio(&(0x7f0000000000)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$radio(0x0, 0xffffffffffffffff, 0x2) r1 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) getdents64(r1, 0x0, 0x0) r2 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r2, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r2, 0x8) r3 = socket$inet6_sctp(0xa, 0x805, 0x84) r4 = accept4(r2, 0x0, 0x0, 0x0) prctl$PR_SET_ENDIAN(0x14, 0x1) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r3, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) epoll_pwait(0xffffffffffffffff, &(0x7f0000000040)=[{}], 0x1, 0x0, &(0x7f0000000080), 0x8) getpgid(0x0) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r4, 0x84, 0x9, &(0x7f0000000280)={0x0, @in={{0x2, 0x0, @empty}}, 0x0, 0xac14142400000000, 0x0, 0x0, 0x54}, 0x98) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) ioctl$SIOCAX25ADDFWD(r0, 0x89ea, 0x0) syz_mount_image$gfs2(0x0, 0x0, 0x87, 0x0, &(0x7f00000005c0), 0x1040040, 0x0) readv(r1, 0x0, 0x0) 03:53:56 executing program 4: r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{0x0}, {&(0x7f00000000c0)=""/85, 0x55}, {&(0x7f0000000fc0)=""/4096, 0x1000}, {&(0x7f0000000400)=""/120, 0x78}, {&(0x7f0000000480)=""/60, 0x3c}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f0000000540)=""/154, 0x9a}, {&(0x7f0000000340)=""/22, 0x16}], 0x8, &(0x7f0000002400)=""/191, 0xbf}}], 0x1, 0x0, &(0x7f0000003700)={0x77359400}) 03:53:56 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x20, &(0x7f0000000b80)=ANY=[@ANYBLOB="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"], 0x0, 0x1625, 0x0, 0x0, 0x41100, 0x1, [], 0x0, 0x4}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r0, 0xdb, &(0x7f0000000200)={0x0, 0x0}}, 0x393) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='cgroup.events\x00', 0x0, 0x0) write$cgroup_int(r2, &(0x7f00000007c0)=0x6, 0x12) r3 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000002c0), 0x4) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz1\x00', 0x1ff) r4 = perf_event_open$cgroup(&(0x7f0000000600)={0x0, 0x70, 0x9, 0x6, 0x8, 0x6, 0x0, 0xfffffffffffff49f, 0x2, 0x6, 0x3ff, 0x0, 0x20, 0x0, 0x1, 0x81, 0x1, 0x400, 0x4, 0xfac, 0x4, 0x1, 0x10000, 0xf1, 0xd3, 0x92b, 0x200, 0x1, 0x100000000, 0x2, 0x100000000, 0xfff, 0x0, 0xffff, 0x3, 0xfffffffffffffffd, 0x0, 0x6, 0x0, 0x50, 0x0, @perf_config_ext={0x3f, 0x9}, 0x20000, 0x8, 0xef3, 0x7, 0x100000000, 0x8, 0xfff}, 0xffffffffffffffff, 0x2, r0, 0x8) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000b40)='cgroup.subtree_control\x00') ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x2400, 0x1) r5 = getpid() socketpair$unix(0x1, 0x7, 0x0, &(0x7f0000000540)={0xffffffffffffffff}) setsockopt$sock_attach_bpf(r6, 0x1, 0x32, &(0x7f00000005c0)=r3, 0x4) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={0x0, 0xffffffffffffffff, 0x0, 0x12, &(0x7f0000000480)='./cgroup.cpu/syz1\x00', r1}, 0x30) perf_event_open(&(0x7f0000000300)={0x5, 0x70, 0xff, 0x4, 0x1000, 0xe5af, 0x0, 0x8000, 0xd0440, 0x2, 0xffff, 0x1, 0x4, 0x1f, 0x3, 0xfffffffffffffffa, 0x5, 0x9, 0x8, 0x1, 0x3, 0x400, 0x6, 0x5, 0x401, 0x10000, 0xff, 0xb24, 0xffffffffffff8000, 0xc8a, 0x3f, 0xfffffffffffffffa, 0xffffffffffff8001, 0x200, 0x5, 0x3, 0x2, 0x93a, 0x0, 0x7fff, 0x2, @perf_bp={&(0x7f0000000100), 0x1}, 0x0, 0x0, 0xffffffffffffff4e, 0x6, 0x0, 0x4, 0xfffffffffffffffd}, r5, 0x0, r7, 0x8) r8 = openat$tun(0xffffffffffffff9c, &(0x7f0000000580)='/dev/net/tun\x00', 0x40000, 0x0) ioctl$TUNSETPERSIST(r8, 0x400454cb, 0x1) r9 = socket$kcm(0x29, 0x5, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000800)={0x0, r0, 0x1, 0x2}, 0x14) ioctl$sock_kcm_SIOCKCMUNATTACH(r9, 0x89e1, &(0x7f0000000900)={r2}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r3, 0x0, 0x8b, 0x0, &(0x7f0000000680)="3ce41f426b7dd449ae14b08e1868c456d4fe9c7993884cf18f4dd5a0bc57250243da4203e0640859184bc4c4690afefd7736e8842cd88030448e918bdb5bd9bbbd680a51261557c0477c18049c832005ebb5b185c6f233df73a21d3b3ddad8426fba2d5f8aac5df904d5e5f2e7dc4a517079e08d5b2175a276f2a5c49cc2957cb367f269898570852dd63a", 0x0, 0x5}, 0x28) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000500)='./cgroup/syz0\x00', 0x200002, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000740)={r3, 0x50, &(0x7f00000003c0)}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r2, 0x50, &(0x7f0000000840)}, 0x10) openat$cgroup_subtree(r2, &(0x7f0000000940)='cgroup.subtree_control\x00', 0x2, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x1ff, 0x0, 0x0, 0x0, 0x200000, 0xffffffffffffffff, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280), 0x2}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r10 = socket$kcm(0xa, 0x400000000002, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffc59) ioctl$sock_kcm_SIOCKCMCLONE(r10, 0x890b, &(0x7f0000000000)) ioctl$sock_kcm_SIOCKCMCLONE(r10, 0x890c, &(0x7f0000000000)) 03:53:56 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r1, r0) sendmsg$IPVS_CMD_ZERO(r2, &(0x7f0000000180)={&(0x7f0000000000), 0xc, 0x0, 0x1, 0x0, 0x0, 0x20000041}, 0x4000000) 03:53:56 executing program 4: r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{0x0}, {&(0x7f00000000c0)=""/85, 0x55}, {&(0x7f0000000fc0)=""/4096, 0x1000}, {&(0x7f0000000400)=""/120, 0x78}, {&(0x7f0000000480)=""/60, 0x3c}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f0000000540)=""/154, 0x9a}, {&(0x7f0000000340)=""/22, 0x16}], 0x8, &(0x7f0000002400)=""/191, 0xbf}}], 0x1, 0x0, &(0x7f0000003700)={0x77359400}) 03:53:56 executing program 4: r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x5f}, {&(0x7f00000000c0)=""/85, 0x55}, {&(0x7f0000000fc0)=""/4096, 0x1000}, {&(0x7f0000000400)=""/120, 0x78}, {&(0x7f0000000480)=""/60, 0x3c}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f0000000540)=""/154, 0x9a}, {&(0x7f0000000340)=""/22, 0x16}], 0x8}}], 0x1, 0x0, &(0x7f0000003700)={0x77359400}) 03:53:56 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x20, &(0x7f0000000b80)=ANY=[@ANYBLOB="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"], 0x0, 0x1625, 0x0, 0x0, 0x41100, 0x1, [], 0x0, 0x4}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r0, 0xdb, &(0x7f0000000200)={0x0, 0x0}}, 0x393) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='cgroup.events\x00', 0x0, 0x0) write$cgroup_int(r2, &(0x7f00000007c0)=0x6, 0x12) r3 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000002c0), 0x4) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz1\x00', 0x1ff) r4 = perf_event_open$cgroup(&(0x7f0000000600)={0x0, 0x70, 0x9, 0x6, 0x8, 0x6, 0x0, 0xfffffffffffff49f, 0x2, 0x6, 0x3ff, 0x0, 0x20, 0x0, 0x1, 0x81, 0x1, 0x400, 0x4, 0xfac, 0x4, 0x1, 0x10000, 0xf1, 0xd3, 0x92b, 0x200, 0x1, 0x100000000, 0x2, 0x100000000, 0xfff, 0x0, 0xffff, 0x3, 0xfffffffffffffffd, 0x0, 0x6, 0x0, 0x50, 0x0, @perf_config_ext={0x3f, 0x9}, 0x20000, 0x8, 0xef3, 0x7, 0x100000000, 0x8, 0xfff}, 0xffffffffffffffff, 0x2, r0, 0x8) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000b40)='cgroup.subtree_control\x00') ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x2400, 0x1) r5 = getpid() socketpair$unix(0x1, 0x7, 0x0, &(0x7f0000000540)={0xffffffffffffffff}) setsockopt$sock_attach_bpf(r6, 0x1, 0x32, &(0x7f00000005c0)=r3, 0x4) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={0x0, 0xffffffffffffffff, 0x0, 0x12, &(0x7f0000000480)='./cgroup.cpu/syz1\x00', r1}, 0x30) perf_event_open(&(0x7f0000000300)={0x5, 0x70, 0xff, 0x4, 0x1000, 0xe5af, 0x0, 0x8000, 0xd0440, 0x2, 0xffff, 0x1, 0x4, 0x1f, 0x3, 0xfffffffffffffffa, 0x5, 0x9, 0x8, 0x1, 0x3, 0x400, 0x6, 0x5, 0x401, 0x10000, 0xff, 0xb24, 0xffffffffffff8000, 0xc8a, 0x3f, 0xfffffffffffffffa, 0xffffffffffff8001, 0x200, 0x5, 0x3, 0x2, 0x93a, 0x0, 0x7fff, 0x2, @perf_bp={&(0x7f0000000100), 0x1}, 0x0, 0x0, 0xffffffffffffff4e, 0x6, 0x0, 0x4, 0xfffffffffffffffd}, r5, 0x0, r7, 0x8) r8 = openat$tun(0xffffffffffffff9c, &(0x7f0000000580)='/dev/net/tun\x00', 0x40000, 0x0) ioctl$TUNSETPERSIST(r8, 0x400454cb, 0x1) r9 = socket$kcm(0x29, 0x5, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000800)={0x0, r0, 0x1, 0x2}, 0x14) ioctl$sock_kcm_SIOCKCMUNATTACH(r9, 0x89e1, &(0x7f0000000900)={r2}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r3, 0x0, 0x8b, 0x0, &(0x7f0000000680)="3ce41f426b7dd449ae14b08e1868c456d4fe9c7993884cf18f4dd5a0bc57250243da4203e0640859184bc4c4690afefd7736e8842cd88030448e918bdb5bd9bbbd680a51261557c0477c18049c832005ebb5b185c6f233df73a21d3b3ddad8426fba2d5f8aac5df904d5e5f2e7dc4a517079e08d5b2175a276f2a5c49cc2957cb367f269898570852dd63a", 0x0, 0x5}, 0x28) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000500)='./cgroup/syz0\x00', 0x200002, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000740)={r3, 0x50, &(0x7f00000003c0)}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r2, 0x50, &(0x7f0000000840)}, 0x10) openat$cgroup_subtree(r2, &(0x7f0000000940)='cgroup.subtree_control\x00', 0x2, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x1ff, 0x0, 0x0, 0x0, 0x200000, 0xffffffffffffffff, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280), 0x2}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r10 = socket$kcm(0xa, 0x400000000002, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffc59) ioctl$sock_kcm_SIOCKCMCLONE(r10, 0x890b, &(0x7f0000000000)) ioctl$sock_kcm_SIOCKCMCLONE(r10, 0x890c, &(0x7f0000000000)) [ 1864.238256] kauditd_printk_skb: 15 callbacks suppressed [ 1864.238272] audit: type=1804 audit(2000001236.550:703): pid=29125 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor0" name="/root/syzkaller-testdir498485449/syzkaller.cqcGk7/2862/bus" dev="sda1" ino=17947 res=1 [ 1864.343569] audit: type=1804 audit(2000001236.560:704): pid=29125 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=ToMToU comm="syz-executor0" name="/root/syzkaller-testdir498485449/syzkaller.cqcGk7/2862/bus" dev="sda1" ino=17947 res=1 [ 1864.435261] audit: type=1804 audit(2000001236.570:705): pid=29125 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor0" name="/root/syzkaller-testdir498485449/syzkaller.cqcGk7/2862/bus" dev="sda1" ino=17947 res=1 [ 1864.481137] audit: type=1804 audit(2000001236.780:706): pid=29129 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=ToMToU comm="syz-executor0" name="/root/syzkaller-testdir498485449/syzkaller.cqcGk7/2862/bus" dev="sda1" ino=17947 res=1 03:53:57 executing program 0: socket$inet6_tcp(0xa, 0x1, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xfffffef3) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) creat(&(0x7f00000001c0)='./bus\x00', 0x0) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vga_arbiter\x00', 0x0, 0x0) open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r2) r3 = creat(&(0x7f0000000700)='./bus\x00', 0x0) truncate(&(0x7f0000000240)='./bus\x00', 0x800) r4 = open(&(0x7f0000000140)='./bus\x00', 0x400000008, 0x0) lseek(r3, 0x0, 0x2) getgroups(0x0, 0x0) getresgid(&(0x7f00000003c0), 0x0, &(0x7f0000000400)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000580)='./bus\x00', 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB], 0x1, 0x0) fstat(r3, &(0x7f00000004c0)) stat(0x0, &(0x7f0000000640)) sysinfo(0x0) sendfile(r3, r4, 0x0, 0x8000fffffffe) r5 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) fallocate(r1, 0x0, 0x0, 0x0) getsockopt$inet_pktinfo(r3, 0x0, 0x8, 0x0, &(0x7f0000000480)) lseek(r5, 0x0, 0x3) 03:53:57 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ptmx\x00', 0x0, 0x0) read(r0, &(0x7f0000000240)=""/11, 0xb) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000000)) r1 = fcntl$dupfd(r0, 0x0, r0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$sock_SIOCOUTQNSD(r1, 0x894b, 0x0) 03:53:57 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x20, &(0x7f0000000b80)=ANY=[@ANYBLOB="cab5674ca80400f902c8d3fc17d4a51472ff5e04a7ed68e9074e865fffffffffff6582e2a0c58f438f1a9b1af27305fb6c1d497851a00d51dddde821f356222d82de15a5bb3ca4d544c3683ff903b30637ee634a8a4fa0e19e57c7d35e4db3a02231b71023a910ac2424326e31258bde7ca760ff3ca3261a92112b3c8db9e0d79dc5ad29e05434154bba1e60d243d8fa466b27518c09e11b78ec43ab7af1d33fbd4885ee5e95b0849345d0edef0a2e68320a47938597cf0fba5ae2e93301ffc38baaf2673b7fd4628a0fe3665006d238567bdb430991e02866ad858345dc86331d91a53051b3284827fc0a870d857ecc180901feb2d1dd3be0c1ebc3fa1d00d550744d9e55"], 0x0, 0x1625, 0x0, 0x0, 0x41100, 0x1, [], 0x0, 0x4}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r0, 0xdb, &(0x7f0000000200)={0x0, 0x0}}, 0x393) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='cgroup.events\x00', 0x0, 0x0) write$cgroup_int(r2, &(0x7f00000007c0)=0x6, 0x12) r3 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000002c0), 0x4) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz1\x00', 0x1ff) r4 = perf_event_open$cgroup(&(0x7f0000000600)={0x0, 0x70, 0x9, 0x6, 0x8, 0x6, 0x0, 0xfffffffffffff49f, 0x2, 0x6, 0x3ff, 0x0, 0x20, 0x0, 0x1, 0x81, 0x1, 0x400, 0x4, 0xfac, 0x4, 0x1, 0x10000, 0xf1, 0xd3, 0x92b, 0x200, 0x1, 0x100000000, 0x2, 0x100000000, 0xfff, 0xfff, 0x0, 0x3, 0xfffffffffffffffd, 0x0, 0x6, 0x0, 0x50, 0x0, @perf_config_ext={0x3f, 0x9}, 0x20000, 0x8, 0xef3, 0x7, 0x100000000, 0x8, 0xfff}, 0xffffffffffffffff, 0x2, r0, 0x8) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000b40)='cgroup.subtree_control\x00') ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x2400, 0x1) r5 = getpid() socketpair$unix(0x1, 0x7, 0x0, &(0x7f0000000540)={0xffffffffffffffff}) setsockopt$sock_attach_bpf(r6, 0x1, 0x32, &(0x7f00000005c0)=r3, 0x4) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={0x0, 0xffffffffffffffff, 0x0, 0x12, &(0x7f0000000480)='./cgroup.cpu/syz1\x00', r1}, 0x30) perf_event_open(&(0x7f0000000300)={0x5, 0x70, 0xff, 0x4, 0x1000, 0xe5af, 0x0, 0x8000, 0xd0440, 0x2, 0xffff, 0x1, 0x4, 0x1f, 0x3, 0xfffffffffffffffa, 0x5, 0x9, 0x8, 0x1, 0x3, 0x400, 0x6, 0x5, 0x401, 0x10000, 0xff, 0xb24, 0xffffffffffff8000, 0xc8a, 0x3f, 0xfffffffffffffffa, 0xffffffffffff8001, 0x200, 0x5, 0x3, 0x2, 0x93a, 0x0, 0x7fff, 0x2, @perf_bp={&(0x7f0000000100), 0x1}, 0x0, 0x0, 0xffffffffffffff4e, 0x6, 0x0, 0x4, 0xfffffffffffffffd}, r5, 0x0, r7, 0x8) r8 = openat$tun(0xffffffffffffff9c, &(0x7f0000000580)='/dev/net/tun\x00', 0x40000, 0x0) ioctl$TUNSETPERSIST(r8, 0x400454cb, 0x1) r9 = socket$kcm(0x29, 0x5, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000800)={0x0, r0, 0x1, 0x2}, 0x14) ioctl$sock_kcm_SIOCKCMUNATTACH(r9, 0x89e1, &(0x7f0000000900)={r2}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r3, 0x0, 0x8b, 0x0, &(0x7f0000000680)="3ce41f426b7dd449ae14b08e1868c456d4fe9c7993884cf18f4dd5a0bc57250243da4203e0640859184bc4c4690afefd7736e8842cd88030448e918bdb5bd9bbbd680a51261557c0477c18049c832005ebb5b185c6f233df73a21d3b3ddad8426fba2d5f8aac5df904d5e5f2e7dc4a517079e08d5b2175a276f2a5c49cc2957cb367f269898570852dd63a", 0x0, 0x5}, 0x28) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000500)='./cgroup/syz0\x00', 0x200002, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000740)={r3, 0x50, &(0x7f00000003c0)}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r2, 0x50, &(0x7f0000000840)}, 0x10) openat$cgroup_subtree(r2, &(0x7f0000000940)='cgroup.subtree_control\x00', 0x2, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x1ff, 0x0, 0x0, 0x0, 0x200000, 0xffffffffffffffff, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280), 0x2}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r10 = socket$kcm(0xa, 0x400000000002, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffc59) ioctl$sock_kcm_SIOCKCMCLONE(r10, 0x890b, &(0x7f0000000000)) ioctl$sock_kcm_SIOCKCMCLONE(r10, 0x890c, &(0x7f0000000000)) 03:53:57 executing program 2: creat(0x0, 0x8) getpgrp(0xffffffffffffffff) clone(0x1000202102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0xa102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f00000002c0)={@ipv4, 0x0, 0x0, 0x0, 0x5}, 0x16d) getsockopt$EBT_SO_GET_INIT_ENTRIES(r0, 0x0, 0x83, 0x0, &(0x7f0000000180)) getrandom(&(0x7f0000000140)=""/29, 0x1d, 0x2) 03:53:57 executing program 4: r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x5f}, {&(0x7f00000000c0)=""/85, 0x55}, {&(0x7f0000000fc0)=""/4096, 0x1000}, {&(0x7f0000000400)=""/120, 0x78}, {&(0x7f0000000480)=""/60, 0x3c}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f0000000540)=""/154, 0x9a}, {&(0x7f0000000340)=""/22, 0x16}], 0x8}}], 0x1, 0x0, &(0x7f0000003700)={0x77359400}) 03:53:57 executing program 5: getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffff9c, 0x84, 0x13, 0x0, 0x0) r0 = syz_open_dev$swradio(&(0x7f0000000000)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$radio(0x0, 0xffffffffffffffff, 0x2) r1 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) getdents64(r1, 0x0, 0x0) r2 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r2, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r2, 0x8) r3 = socket$inet6_sctp(0xa, 0x805, 0x84) r4 = accept4(r2, 0x0, 0x0, 0x0) prctl$PR_SET_ENDIAN(0x14, 0x1) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r3, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) epoll_pwait(0xffffffffffffffff, &(0x7f0000000040)=[{}], 0x1, 0x0, &(0x7f0000000080), 0x8) getpgid(0x0) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r4, 0x84, 0x9, &(0x7f0000000280)={0x0, @in={{0x2, 0x0, @empty}}, 0x0, 0xac14142400000000, 0x0, 0x0, 0x54}, 0x98) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) ioctl$SIOCAX25ADDFWD(r0, 0x89ea, 0x0) syz_mount_image$gfs2(0x0, 0x0, 0x87, 0x0, &(0x7f00000005c0), 0x1040040, 0x0) readv(r1, 0x0, 0x0) 03:53:57 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000180)='dctcp\x00', 0x2d4) bind$inet6(r0, &(0x7f0000000200)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f00000000c0)="8e35e5abe336f0b03083664828b7df20e0190db805ef7ad82e6890e1635eb2ce42feaab660d0000000c869b39ef07b064a88a84e2a887eafa8f3f862bbb019bc25") r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.swap.current\x00', 0x0, 0x0) bind$pptp(r2, &(0x7f0000000240)={0x18, 0x2, {0x0, @multicast1}}, 0x1e) sendto$inet6(r0, 0x0, 0x0, 0x20000010, &(0x7f0000000440)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='rdma.current\x00', 0x0, 0x0) openat$cgroup_ro(r3, &(0x7f0000000140)='memory.stat\x00', 0x0, 0x0) 03:53:57 executing program 2: creat(0x0, 0x8) getpgrp(0xffffffffffffffff) clone(0x1000202102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0xa102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f00000002c0)={@ipv4, 0x0, 0x0, 0x0, 0x5}, 0x16d) getsockopt$EBT_SO_GET_INIT_ENTRIES(r0, 0x0, 0x83, 0x0, &(0x7f0000000180)) getrandom(&(0x7f0000000140)=""/29, 0x1d, 0x2) 03:53:57 executing program 4: r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x5f}, {&(0x7f00000000c0)=""/85, 0x55}, {&(0x7f0000000fc0)=""/4096, 0x1000}, {&(0x7f0000000400)=""/120, 0x78}, {&(0x7f0000000480)=""/60, 0x3c}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f0000000540)=""/154, 0x9a}, {&(0x7f0000000340)=""/22, 0x16}], 0x8}}], 0x1, 0x0, &(0x7f0000003700)={0x77359400}) 03:53:57 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x20, &(0x7f0000000b80)=ANY=[@ANYBLOB="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"], 0x0, 0x1625, 0x0, 0x0, 0x41100, 0x1, [], 0x0, 0x4}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r0, 0xdb, &(0x7f0000000200)={0x0, 0x0}}, 0x393) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='cgroup.events\x00', 0x0, 0x0) write$cgroup_int(r2, &(0x7f00000007c0)=0x6, 0x12) r3 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000002c0), 0x4) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz1\x00', 0x1ff) r4 = perf_event_open$cgroup(&(0x7f0000000600)={0x0, 0x70, 0x9, 0x6, 0x8, 0x6, 0x0, 0xfffffffffffff49f, 0x2, 0x6, 0x3ff, 0x0, 0x20, 0x0, 0x1, 0x81, 0x1, 0x400, 0x4, 0xfac, 0x4, 0x1, 0x10000, 0xf1, 0xd3, 0x92b, 0x200, 0x1, 0x100000000, 0x2, 0x100000000, 0xfff, 0xfff, 0x0, 0x3, 0xfffffffffffffffd, 0x0, 0x6, 0x0, 0x50, 0x0, @perf_config_ext={0x3f, 0x9}, 0x20000, 0x8, 0xef3, 0x7, 0x100000000, 0x8, 0xfff}, 0xffffffffffffffff, 0x2, r0, 0x8) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000b40)='cgroup.subtree_control\x00') ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x2400, 0x1) r5 = getpid() socketpair$unix(0x1, 0x7, 0x0, &(0x7f0000000540)={0xffffffffffffffff}) setsockopt$sock_attach_bpf(r6, 0x1, 0x32, &(0x7f00000005c0)=r3, 0x4) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={0x0, 0xffffffffffffffff, 0x0, 0x12, &(0x7f0000000480)='./cgroup.cpu/syz1\x00', r1}, 0x30) perf_event_open(&(0x7f0000000300)={0x5, 0x70, 0xff, 0x4, 0x1000, 0xe5af, 0x0, 0x8000, 0xd0440, 0x2, 0xffff, 0x1, 0x4, 0x1f, 0x3, 0xfffffffffffffffa, 0x5, 0x9, 0x8, 0x1, 0x3, 0x400, 0x6, 0x5, 0x401, 0x10000, 0xff, 0xb24, 0xffffffffffff8000, 0xc8a, 0x3f, 0xfffffffffffffffa, 0xffffffffffff8001, 0x200, 0x5, 0x3, 0x2, 0x93a, 0x0, 0x7fff, 0x2, @perf_bp={&(0x7f0000000100), 0x1}, 0x0, 0x0, 0xffffffffffffff4e, 0x6, 0x0, 0x4, 0xfffffffffffffffd}, r5, 0x0, r7, 0x8) r8 = openat$tun(0xffffffffffffff9c, &(0x7f0000000580)='/dev/net/tun\x00', 0x40000, 0x0) ioctl$TUNSETPERSIST(r8, 0x400454cb, 0x1) r9 = socket$kcm(0x29, 0x5, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000800)={0x0, r0, 0x1, 0x2}, 0x14) ioctl$sock_kcm_SIOCKCMUNATTACH(r9, 0x89e1, &(0x7f0000000900)={r2}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r3, 0x0, 0x8b, 0x0, &(0x7f0000000680)="3ce41f426b7dd449ae14b08e1868c456d4fe9c7993884cf18f4dd5a0bc57250243da4203e0640859184bc4c4690afefd7736e8842cd88030448e918bdb5bd9bbbd680a51261557c0477c18049c832005ebb5b185c6f233df73a21d3b3ddad8426fba2d5f8aac5df904d5e5f2e7dc4a517079e08d5b2175a276f2a5c49cc2957cb367f269898570852dd63a", 0x0, 0x5}, 0x28) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000500)='./cgroup/syz0\x00', 0x200002, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000740)={r3, 0x50, &(0x7f00000003c0)}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r2, 0x50, &(0x7f0000000840)}, 0x10) openat$cgroup_subtree(r2, &(0x7f0000000940)='cgroup.subtree_control\x00', 0x2, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x1ff, 0x0, 0x0, 0x0, 0x200000, 0xffffffffffffffff, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280), 0x2}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r10 = socket$kcm(0xa, 0x400000000002, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffc59) ioctl$sock_kcm_SIOCKCMCLONE(r10, 0x890b, &(0x7f0000000000)) ioctl$sock_kcm_SIOCKCMCLONE(r10, 0x890c, &(0x7f0000000000)) 03:53:57 executing program 2: creat(0x0, 0x8) getpgrp(0xffffffffffffffff) clone(0x1000202102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0xa102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f00000002c0)={@ipv4, 0x0, 0x0, 0x0, 0x5}, 0x16d) getrandom(&(0x7f0000000140)=""/29, 0x1d, 0x2) 03:53:57 executing program 3: [ 1865.300644] audit: type=1804 audit(2000001237.610:707): pid=29163 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor0" name="/root/syzkaller-testdir498485449/syzkaller.cqcGk7/2863/bus" dev="sda1" ino=17981 res=1 [ 1865.366055] audit: type=1804 audit(2000001237.640:708): pid=29163 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=ToMToU comm="syz-executor0" name="/root/syzkaller-testdir498485449/syzkaller.cqcGk7/2863/bus" dev="sda1" ino=17981 res=1 [ 1865.442671] audit: type=1804 audit(2000001237.640:709): pid=29163 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor0" name="/root/syzkaller-testdir498485449/syzkaller.cqcGk7/2863/bus" dev="sda1" ino=17981 res=1 [ 1865.506373] audit: type=1804 audit(2000001237.750:710): pid=29168 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor0" name="/root/syzkaller-testdir498485449/syzkaller.cqcGk7/2863/bus" dev="sda1" ino=17981 res=1 03:53:58 executing program 0: socket$inet6_tcp(0xa, 0x1, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xfffffef3) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) creat(&(0x7f00000001c0)='./bus\x00', 0x0) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vga_arbiter\x00', 0x0, 0x0) open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r2) r3 = creat(&(0x7f0000000700)='./bus\x00', 0x0) truncate(&(0x7f0000000240)='./bus\x00', 0x800) open(&(0x7f0000000140)='./bus\x00', 0x400000008, 0x0) lseek(r3, 0x0, 0x2) getgroups(0x0, 0x0) getresgid(&(0x7f00000003c0), 0x0, &(0x7f0000000400)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000580)='./bus\x00', 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB], 0x1, 0x0) fstat(r3, &(0x7f00000004c0)) stat(0x0, &(0x7f0000000640)) sysinfo(0x0) r4 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) fallocate(r1, 0x0, 0x0, 0x0) getsockopt$inet_pktinfo(r3, 0x0, 0x8, 0x0, &(0x7f0000000480)) lseek(r4, 0x0, 0x3) 03:53:58 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x20, &(0x7f0000000b80)=ANY=[@ANYBLOB="cab5674ca80400f902c8d3fc17d4a51472ff5e04a7ed68e9074e865fffffffffff6582e2a0c58f438f1a9b1af27305fb6c1d497851a00d51dddde821f356222d82de15a5bb3ca4d544c3683ff903b30637ee634a8a4fa0e19e57c7d35e4db3a02231b71023a910ac2424326e31258bde7ca760ff3ca3261a92112b3c8db9e0d79dc5ad29e05434154bba1e60d243d8fa466b27518c09e11b78ec43ab7af1d33fbd4885ee5e95b0849345d0edef0a2e68320a47938597cf0fba5ae2e93301ffc38baaf2673b7fd4628a0fe3665006d238567bdb430991e02866ad858345dc86331d91a53051b3284827fc0a870d857ecc180901feb2d1dd3be0c1ebc3fa1d00d550744d9e55"], 0x0, 0x1625, 0x0, 0x0, 0x41100, 0x1, [], 0x0, 0x4}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r0, 0xdb, &(0x7f0000000200)={0x0, 0x0}}, 0x393) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='cgroup.events\x00', 0x0, 0x0) write$cgroup_int(r2, &(0x7f00000007c0)=0x6, 0x12) r3 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000002c0), 0x4) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz1\x00', 0x1ff) r4 = perf_event_open$cgroup(&(0x7f0000000600)={0x0, 0x70, 0x9, 0x6, 0x8, 0x6, 0x0, 0xfffffffffffff49f, 0x2, 0x6, 0x3ff, 0x0, 0x20, 0x0, 0x1, 0x81, 0x1, 0x400, 0x4, 0xfac, 0x4, 0x1, 0x10000, 0xf1, 0xd3, 0x92b, 0x200, 0x1, 0x100000000, 0x2, 0x100000000, 0xfff, 0xfff, 0x0, 0x3, 0xfffffffffffffffd, 0x0, 0x6, 0x0, 0x50, 0x0, @perf_config_ext={0x3f, 0x9}, 0x20000, 0x8, 0xef3, 0x7, 0x100000000, 0x8, 0xfff}, 0xffffffffffffffff, 0x2, r0, 0x8) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000b40)='cgroup.subtree_control\x00') ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x2400, 0x1) r5 = getpid() socketpair$unix(0x1, 0x7, 0x0, &(0x7f0000000540)={0xffffffffffffffff}) setsockopt$sock_attach_bpf(r6, 0x1, 0x32, &(0x7f00000005c0)=r3, 0x4) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={0x0, 0xffffffffffffffff, 0x0, 0x12, &(0x7f0000000480)='./cgroup.cpu/syz1\x00', r1}, 0x30) perf_event_open(&(0x7f0000000300)={0x5, 0x70, 0xff, 0x4, 0x1000, 0xe5af, 0x0, 0x8000, 0xd0440, 0x2, 0xffff, 0x1, 0x4, 0x1f, 0x3, 0xfffffffffffffffa, 0x5, 0x9, 0x8, 0x1, 0x3, 0x400, 0x6, 0x5, 0x401, 0x10000, 0xff, 0xb24, 0xffffffffffff8000, 0xc8a, 0x3f, 0xfffffffffffffffa, 0xffffffffffff8001, 0x200, 0x5, 0x3, 0x2, 0x93a, 0x0, 0x7fff, 0x2, @perf_bp={&(0x7f0000000100), 0x1}, 0x0, 0x0, 0xffffffffffffff4e, 0x6, 0x0, 0x4, 0xfffffffffffffffd}, r5, 0x0, r7, 0x8) r8 = openat$tun(0xffffffffffffff9c, &(0x7f0000000580)='/dev/net/tun\x00', 0x40000, 0x0) ioctl$TUNSETPERSIST(r8, 0x400454cb, 0x1) r9 = socket$kcm(0x29, 0x5, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000800)={0x0, r0, 0x1, 0x2}, 0x14) ioctl$sock_kcm_SIOCKCMUNATTACH(r9, 0x89e1, &(0x7f0000000900)={r2}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r3, 0x0, 0x8b, 0x0, &(0x7f0000000680)="3ce41f426b7dd449ae14b08e1868c456d4fe9c7993884cf18f4dd5a0bc57250243da4203e0640859184bc4c4690afefd7736e8842cd88030448e918bdb5bd9bbbd680a51261557c0477c18049c832005ebb5b185c6f233df73a21d3b3ddad8426fba2d5f8aac5df904d5e5f2e7dc4a517079e08d5b2175a276f2a5c49cc2957cb367f269898570852dd63a", 0x0, 0x5}, 0x28) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000500)='./cgroup/syz0\x00', 0x200002, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000740)={r3, 0x50, &(0x7f00000003c0)}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r2, 0x50, &(0x7f0000000840)}, 0x10) openat$cgroup_subtree(r2, &(0x7f0000000940)='cgroup.subtree_control\x00', 0x2, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x1ff, 0x0, 0x0, 0x0, 0x200000, 0xffffffffffffffff, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280), 0x2}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r10 = socket$kcm(0xa, 0x400000000002, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffc59) ioctl$sock_kcm_SIOCKCMCLONE(r10, 0x890b, &(0x7f0000000000)) ioctl$sock_kcm_SIOCKCMCLONE(r10, 0x890c, &(0x7f0000000000)) 03:53:58 executing program 2: creat(0x0, 0x8) getpgrp(0xffffffffffffffff) clone(0x1000202102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0xa102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f00000002c0)={@ipv4, 0x0, 0x0, 0x0, 0x5}, 0x16d) getrandom(&(0x7f0000000140)=""/29, 0x1d, 0x2) 03:53:58 executing program 4: r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x5f}, {&(0x7f00000000c0)=""/85, 0x55}, {&(0x7f0000000fc0)=""/4096, 0x1000}, {&(0x7f0000000400)=""/120, 0x78}, {&(0x7f0000000480)=""/60, 0x3c}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f0000000540)=""/154, 0x9a}, {&(0x7f0000000340)=""/22, 0x16}], 0x8, &(0x7f0000002400)=""/191, 0xbf}}], 0x1, 0x0, 0x0) 03:53:58 executing program 3: 03:53:58 executing program 5: getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffff9c, 0x84, 0x13, 0x0, 0x0) r0 = syz_open_dev$swradio(&(0x7f0000000000)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$radio(0x0, 0xffffffffffffffff, 0x2) r1 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) getdents64(r1, 0x0, 0x0) r2 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r2, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r2, 0x8) r3 = socket$inet6_sctp(0xa, 0x805, 0x84) r4 = accept4(r2, 0x0, 0x0, 0x0) prctl$PR_SET_ENDIAN(0x14, 0x1) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r3, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) epoll_pwait(0xffffffffffffffff, &(0x7f0000000040)=[{}], 0x1, 0x0, &(0x7f0000000080), 0x8) getpgid(0x0) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r4, 0x84, 0x9, &(0x7f0000000280)={0x0, @in={{0x2, 0x0, @empty}}, 0x0, 0xac14142400000000, 0x0, 0x0, 0x54}, 0x98) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) ioctl$SIOCAX25ADDFWD(r0, 0x89ea, 0x0) syz_mount_image$gfs2(0x0, 0x0, 0x87, 0x0, &(0x7f00000005c0), 0x1040040, 0x0) readv(r1, &(0x7f0000000500), 0x0) 03:53:58 executing program 3: [ 1866.122416] net_ratelimit: 22 callbacks suppressed [ 1866.122424] Can not set IPV6_FL_F_REFLECT if flowlabel_consistency sysctl is enable 03:53:58 executing program 4: r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x5f}, {&(0x7f00000000c0)=""/85, 0x55}, {&(0x7f0000000fc0)=""/4096, 0x1000}, {&(0x7f0000000400)=""/120, 0x78}, {&(0x7f0000000480)=""/60, 0x3c}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f0000000540)=""/154, 0x9a}, {&(0x7f0000000340)=""/22, 0x16}], 0x8, &(0x7f0000002400)=""/191, 0xbf}}], 0x1, 0x0, 0x0) 03:53:58 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x20, &(0x7f0000000b80)=ANY=[@ANYBLOB="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"], 0x0, 0x1625, 0x0, 0x0, 0x41100, 0x1, [], 0x0, 0x4}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r0, 0xdb, &(0x7f0000000200)={0x0, 0x0}}, 0x393) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='cgroup.events\x00', 0x0, 0x0) write$cgroup_int(r2, &(0x7f00000007c0)=0x6, 0x12) r3 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000002c0), 0x4) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz1\x00', 0x1ff) r4 = perf_event_open$cgroup(&(0x7f0000000600)={0x0, 0x70, 0x9, 0x6, 0x8, 0x6, 0x0, 0xfffffffffffff49f, 0x2, 0x6, 0x3ff, 0x0, 0x20, 0x0, 0x1, 0x81, 0x1, 0x400, 0x4, 0xfac, 0x4, 0x1, 0x10000, 0xf1, 0xd3, 0x92b, 0x200, 0x1, 0x100000000, 0x2, 0x100000000, 0xfff, 0xfff, 0xffff, 0x0, 0xfffffffffffffffd, 0x0, 0x6, 0x0, 0x50, 0x0, @perf_config_ext={0x3f, 0x9}, 0x20000, 0x8, 0xef3, 0x7, 0x100000000, 0x8, 0xfff}, 0xffffffffffffffff, 0x2, r0, 0x8) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000b40)='cgroup.subtree_control\x00') ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x2400, 0x1) r5 = getpid() socketpair$unix(0x1, 0x7, 0x0, &(0x7f0000000540)={0xffffffffffffffff}) setsockopt$sock_attach_bpf(r6, 0x1, 0x32, &(0x7f00000005c0)=r3, 0x4) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={0x0, 0xffffffffffffffff, 0x0, 0x12, &(0x7f0000000480)='./cgroup.cpu/syz1\x00', r1}, 0x30) perf_event_open(&(0x7f0000000300)={0x5, 0x70, 0xff, 0x4, 0x1000, 0xe5af, 0x0, 0x8000, 0xd0440, 0x2, 0xffff, 0x1, 0x4, 0x1f, 0x3, 0xfffffffffffffffa, 0x5, 0x9, 0x8, 0x1, 0x3, 0x400, 0x6, 0x5, 0x401, 0x10000, 0xff, 0xb24, 0xffffffffffff8000, 0xc8a, 0x3f, 0xfffffffffffffffa, 0xffffffffffff8001, 0x200, 0x5, 0x3, 0x2, 0x93a, 0x0, 0x7fff, 0x2, @perf_bp={&(0x7f0000000100), 0x1}, 0x0, 0x0, 0xffffffffffffff4e, 0x6, 0x0, 0x4, 0xfffffffffffffffd}, r5, 0x0, r7, 0x8) r8 = openat$tun(0xffffffffffffff9c, &(0x7f0000000580)='/dev/net/tun\x00', 0x40000, 0x0) ioctl$TUNSETPERSIST(r8, 0x400454cb, 0x1) r9 = socket$kcm(0x29, 0x5, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000800)={0x0, r0, 0x1, 0x2}, 0x14) ioctl$sock_kcm_SIOCKCMUNATTACH(r9, 0x89e1, &(0x7f0000000900)={r2}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r3, 0x0, 0x8b, 0x0, &(0x7f0000000680)="3ce41f426b7dd449ae14b08e1868c456d4fe9c7993884cf18f4dd5a0bc57250243da4203e0640859184bc4c4690afefd7736e8842cd88030448e918bdb5bd9bbbd680a51261557c0477c18049c832005ebb5b185c6f233df73a21d3b3ddad8426fba2d5f8aac5df904d5e5f2e7dc4a517079e08d5b2175a276f2a5c49cc2957cb367f269898570852dd63a", 0x0, 0x5}, 0x28) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000500)='./cgroup/syz0\x00', 0x200002, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000740)={r3, 0x50, &(0x7f00000003c0)}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r2, 0x50, &(0x7f0000000840)}, 0x10) openat$cgroup_subtree(r2, &(0x7f0000000940)='cgroup.subtree_control\x00', 0x2, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x1ff, 0x0, 0x0, 0x0, 0x200000, 0xffffffffffffffff, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280), 0x2}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r10 = socket$kcm(0xa, 0x400000000002, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffc59) ioctl$sock_kcm_SIOCKCMCLONE(r10, 0x890b, &(0x7f0000000000)) ioctl$sock_kcm_SIOCKCMCLONE(r10, 0x890c, &(0x7f0000000000)) 03:53:58 executing program 2: creat(0x0, 0x8) getpgrp(0xffffffffffffffff) clone(0x1000202102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0xa102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f00000002c0)={@ipv4, 0x0, 0x0, 0x0, 0x5}, 0x16d) getrandom(&(0x7f0000000140)=""/29, 0x1d, 0x2) [ 1866.242646] protocol 88fb is buggy, dev hsr_slave_0 [ 1866.247770] protocol 88fb is buggy, dev hsr_slave_1 [ 1866.252932] protocol 88fb is buggy, dev hsr_slave_0 [ 1866.258005] protocol 88fb is buggy, dev hsr_slave_1 [ 1866.263187] protocol 88fb is buggy, dev hsr_slave_0 [ 1866.268248] protocol 88fb is buggy, dev hsr_slave_1 [ 1866.273396] protocol 88fb is buggy, dev hsr_slave_0 [ 1866.278454] protocol 88fb is buggy, dev hsr_slave_1 03:53:58 executing program 3: 03:53:58 executing program 4: r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x5f}, {&(0x7f00000000c0)=""/85, 0x55}, {&(0x7f0000000fc0)=""/4096, 0x1000}, {&(0x7f0000000400)=""/120, 0x78}, {&(0x7f0000000480)=""/60, 0x3c}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f0000000540)=""/154, 0x9a}, {&(0x7f0000000340)=""/22, 0x16}], 0x8, &(0x7f0000002400)=""/191, 0xbf}}], 0x1, 0x0, 0x0) [ 1866.383869] audit: type=1804 audit(2000001238.690:711): pid=29192 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor0" name="/root/syzkaller-testdir498485449/syzkaller.cqcGk7/2864/bus" dev="sda1" ino=17984 res=1 [ 1866.428171] Can not set IPV6_FL_F_REFLECT if flowlabel_consistency sysctl is enable [ 1866.470073] audit: type=1804 audit(2000001238.700:712): pid=29192 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=ToMToU comm="syz-executor0" name="/root/syzkaller-testdir498485449/syzkaller.cqcGk7/2864/bus" dev="sda1" ino=17984 res=1 03:53:59 executing program 0: socket$inet6_tcp(0xa, 0x1, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xfffffef3) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) creat(&(0x7f00000001c0)='./bus\x00', 0x0) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vga_arbiter\x00', 0x0, 0x0) open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r2) r3 = creat(&(0x7f0000000700)='./bus\x00', 0x0) truncate(&(0x7f0000000240)='./bus\x00', 0x800) r4 = open(&(0x7f0000000140)='./bus\x00', 0x400000008, 0x0) lseek(r3, 0x0, 0x2) getgroups(0x0, 0x0) getresgid(&(0x7f00000003c0), 0x0, &(0x7f0000000400)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000580)='./bus\x00', 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB], 0x1, 0x0) fstat(r3, &(0x7f00000004c0)) stat(0x0, &(0x7f0000000640)) sendfile(r3, r4, 0x0, 0x8000fffffffe) r5 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) fallocate(r1, 0x0, 0x0, 0x0) getsockopt$inet_pktinfo(r3, 0x0, 0x8, 0x0, &(0x7f0000000480)) lseek(r5, 0x0, 0x3) 03:53:59 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x20, &(0x7f0000000b80)=ANY=[@ANYBLOB="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"], 0x0, 0x1625, 0x0, 0x0, 0x41100, 0x1, [], 0x0, 0x4}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r0, 0xdb, &(0x7f0000000200)={0x0, 0x0}}, 0x393) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='cgroup.events\x00', 0x0, 0x0) write$cgroup_int(r2, &(0x7f00000007c0)=0x6, 0x12) r3 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000002c0), 0x4) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz1\x00', 0x1ff) r4 = perf_event_open$cgroup(&(0x7f0000000600)={0x0, 0x70, 0x9, 0x6, 0x8, 0x6, 0x0, 0xfffffffffffff49f, 0x2, 0x6, 0x3ff, 0x0, 0x20, 0x0, 0x1, 0x81, 0x1, 0x400, 0x4, 0xfac, 0x4, 0x1, 0x10000, 0xf1, 0xd3, 0x92b, 0x200, 0x1, 0x100000000, 0x2, 0x100000000, 0xfff, 0xfff, 0xffff, 0x0, 0xfffffffffffffffd, 0x0, 0x6, 0x0, 0x50, 0x0, @perf_config_ext={0x3f, 0x9}, 0x20000, 0x8, 0xef3, 0x7, 0x100000000, 0x8, 0xfff}, 0xffffffffffffffff, 0x2, r0, 0x8) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000b40)='cgroup.subtree_control\x00') ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x2400, 0x1) r5 = getpid() socketpair$unix(0x1, 0x7, 0x0, &(0x7f0000000540)={0xffffffffffffffff}) setsockopt$sock_attach_bpf(r6, 0x1, 0x32, &(0x7f00000005c0)=r3, 0x4) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={0x0, 0xffffffffffffffff, 0x0, 0x12, &(0x7f0000000480)='./cgroup.cpu/syz1\x00', r1}, 0x30) perf_event_open(&(0x7f0000000300)={0x5, 0x70, 0xff, 0x4, 0x1000, 0xe5af, 0x0, 0x8000, 0xd0440, 0x2, 0xffff, 0x1, 0x4, 0x1f, 0x3, 0xfffffffffffffffa, 0x5, 0x9, 0x8, 0x1, 0x3, 0x400, 0x6, 0x5, 0x401, 0x10000, 0xff, 0xb24, 0xffffffffffff8000, 0xc8a, 0x3f, 0xfffffffffffffffa, 0xffffffffffff8001, 0x200, 0x5, 0x3, 0x2, 0x93a, 0x0, 0x7fff, 0x2, @perf_bp={&(0x7f0000000100), 0x1}, 0x0, 0x0, 0xffffffffffffff4e, 0x6, 0x0, 0x4, 0xfffffffffffffffd}, r5, 0x0, r7, 0x8) r8 = openat$tun(0xffffffffffffff9c, &(0x7f0000000580)='/dev/net/tun\x00', 0x40000, 0x0) ioctl$TUNSETPERSIST(r8, 0x400454cb, 0x1) r9 = socket$kcm(0x29, 0x5, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000800)={0x0, r0, 0x1, 0x2}, 0x14) ioctl$sock_kcm_SIOCKCMUNATTACH(r9, 0x89e1, &(0x7f0000000900)={r2}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r3, 0x0, 0x8b, 0x0, &(0x7f0000000680)="3ce41f426b7dd449ae14b08e1868c456d4fe9c7993884cf18f4dd5a0bc57250243da4203e0640859184bc4c4690afefd7736e8842cd88030448e918bdb5bd9bbbd680a51261557c0477c18049c832005ebb5b185c6f233df73a21d3b3ddad8426fba2d5f8aac5df904d5e5f2e7dc4a517079e08d5b2175a276f2a5c49cc2957cb367f269898570852dd63a", 0x0, 0x5}, 0x28) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000500)='./cgroup/syz0\x00', 0x200002, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000740)={r3, 0x50, &(0x7f00000003c0)}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r2, 0x50, &(0x7f0000000840)}, 0x10) openat$cgroup_subtree(r2, &(0x7f0000000940)='cgroup.subtree_control\x00', 0x2, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x1ff, 0x0, 0x0, 0x0, 0x200000, 0xffffffffffffffff, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280), 0x2}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r10 = socket$kcm(0xa, 0x400000000002, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffc59) ioctl$sock_kcm_SIOCKCMCLONE(r10, 0x890b, &(0x7f0000000000)) ioctl$sock_kcm_SIOCKCMCLONE(r10, 0x890c, &(0x7f0000000000)) 03:53:59 executing program 5: getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffff9c, 0x84, 0x13, 0x0, 0x0) r0 = syz_open_dev$swradio(&(0x7f0000000000)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$radio(0x0, 0xffffffffffffffff, 0x2) r1 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) getdents64(r1, 0x0, 0x0) r2 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r2, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r2, 0x8) r3 = socket$inet6_sctp(0xa, 0x805, 0x84) r4 = accept4(r2, 0x0, 0x0, 0x0) prctl$PR_SET_ENDIAN(0x14, 0x1) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r3, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) epoll_pwait(0xffffffffffffffff, &(0x7f0000000040)=[{}], 0x1, 0x0, &(0x7f0000000080), 0x8) getpgid(0x0) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r4, 0x84, 0x9, &(0x7f0000000280)={0x0, @in={{0x2, 0x0, @empty}}, 0x0, 0xac14142400000000, 0x0, 0x0, 0x54}, 0x98) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) ioctl$SIOCAX25ADDFWD(r0, 0x89ea, 0x0) syz_mount_image$gfs2(0x0, 0x0, 0x87, 0x0, &(0x7f00000005c0), 0x1040040, 0x0) readv(r1, &(0x7f0000000500), 0x0) 03:53:59 executing program 3: 03:53:59 executing program 2: creat(0x0, 0x8) getpgrp(0xffffffffffffffff) clone(0x1000202102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0xa102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket(0xa, 0x2, 0x0) getsockopt$EBT_SO_GET_INIT_ENTRIES(r0, 0x0, 0x83, 0x0, &(0x7f0000000180)) getrandom(&(0x7f0000000140)=""/29, 0x1d, 0x2) 03:53:59 executing program 4: 03:53:59 executing program 2: creat(0x0, 0x8) getpgrp(0xffffffffffffffff) clone(0x1000202102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0xa102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getsockopt$EBT_SO_GET_INIT_ENTRIES(0xffffffffffffffff, 0x0, 0x83, 0x0, &(0x7f0000000180)) getrandom(&(0x7f0000000140)=""/29, 0x1d, 0x2) 03:53:59 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x20, &(0x7f0000000b80)=ANY=[@ANYBLOB="cab5674ca80400f902c8d3fc17d4a51472ff5e04a7ed68e9074e865fffffffffff6582e2a0c58f438f1a9b1af27305fb6c1d497851a00d51dddde821f356222d82de15a5bb3ca4d544c3683ff903b30637ee634a8a4fa0e19e57c7d35e4db3a02231b71023a910ac2424326e31258bde7ca760ff3ca3261a92112b3c8db9e0d79dc5ad29e05434154bba1e60d243d8fa466b27518c09e11b78ec43ab7af1d33fbd4885ee5e95b0849345d0edef0a2e68320a47938597cf0fba5ae2e93301ffc38baaf2673b7fd4628a0fe3665006d238567bdb430991e02866ad858345dc86331d91a53051b3284827fc0a870d857ecc180901feb2d1dd3be0c1ebc3fa1d00d550744d9e55"], 0x0, 0x1625, 0x0, 0x0, 0x41100, 0x1, [], 0x0, 0x4}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r0, 0xdb, &(0x7f0000000200)={0x0, 0x0}}, 0x393) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='cgroup.events\x00', 0x0, 0x0) write$cgroup_int(r2, &(0x7f00000007c0)=0x6, 0x12) r3 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000002c0), 0x4) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz1\x00', 0x1ff) r4 = perf_event_open$cgroup(&(0x7f0000000600)={0x0, 0x70, 0x9, 0x6, 0x8, 0x6, 0x0, 0xfffffffffffff49f, 0x2, 0x6, 0x3ff, 0x0, 0x20, 0x0, 0x1, 0x81, 0x1, 0x400, 0x4, 0xfac, 0x4, 0x1, 0x10000, 0xf1, 0xd3, 0x92b, 0x200, 0x1, 0x100000000, 0x2, 0x100000000, 0xfff, 0xfff, 0xffff, 0x0, 0xfffffffffffffffd, 0x0, 0x6, 0x0, 0x50, 0x0, @perf_config_ext={0x3f, 0x9}, 0x20000, 0x8, 0xef3, 0x7, 0x100000000, 0x8, 0xfff}, 0xffffffffffffffff, 0x2, r0, 0x8) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000b40)='cgroup.subtree_control\x00') ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x2400, 0x1) r5 = getpid() socketpair$unix(0x1, 0x7, 0x0, &(0x7f0000000540)={0xffffffffffffffff}) setsockopt$sock_attach_bpf(r6, 0x1, 0x32, &(0x7f00000005c0)=r3, 0x4) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={0x0, 0xffffffffffffffff, 0x0, 0x12, &(0x7f0000000480)='./cgroup.cpu/syz1\x00', r1}, 0x30) perf_event_open(&(0x7f0000000300)={0x5, 0x70, 0xff, 0x4, 0x1000, 0xe5af, 0x0, 0x8000, 0xd0440, 0x2, 0xffff, 0x1, 0x4, 0x1f, 0x3, 0xfffffffffffffffa, 0x5, 0x9, 0x8, 0x1, 0x3, 0x400, 0x6, 0x5, 0x401, 0x10000, 0xff, 0xb24, 0xffffffffffff8000, 0xc8a, 0x3f, 0xfffffffffffffffa, 0xffffffffffff8001, 0x200, 0x5, 0x3, 0x2, 0x93a, 0x0, 0x7fff, 0x2, @perf_bp={&(0x7f0000000100), 0x1}, 0x0, 0x0, 0xffffffffffffff4e, 0x6, 0x0, 0x4, 0xfffffffffffffffd}, r5, 0x0, r7, 0x8) r8 = openat$tun(0xffffffffffffff9c, &(0x7f0000000580)='/dev/net/tun\x00', 0x40000, 0x0) ioctl$TUNSETPERSIST(r8, 0x400454cb, 0x1) r9 = socket$kcm(0x29, 0x5, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000800)={0x0, r0, 0x1, 0x2}, 0x14) ioctl$sock_kcm_SIOCKCMUNATTACH(r9, 0x89e1, &(0x7f0000000900)={r2}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r3, 0x0, 0x8b, 0x0, &(0x7f0000000680)="3ce41f426b7dd449ae14b08e1868c456d4fe9c7993884cf18f4dd5a0bc57250243da4203e0640859184bc4c4690afefd7736e8842cd88030448e918bdb5bd9bbbd680a51261557c0477c18049c832005ebb5b185c6f233df73a21d3b3ddad8426fba2d5f8aac5df904d5e5f2e7dc4a517079e08d5b2175a276f2a5c49cc2957cb367f269898570852dd63a", 0x0, 0x5}, 0x28) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000500)='./cgroup/syz0\x00', 0x200002, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000740)={r3, 0x50, &(0x7f00000003c0)}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r2, 0x50, &(0x7f0000000840)}, 0x10) openat$cgroup_subtree(r2, &(0x7f0000000940)='cgroup.subtree_control\x00', 0x2, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x1ff, 0x0, 0x0, 0x0, 0x200000, 0xffffffffffffffff, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280), 0x2}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r10 = socket$kcm(0xa, 0x400000000002, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffc59) ioctl$sock_kcm_SIOCKCMCLONE(r10, 0x890b, &(0x7f0000000000)) ioctl$sock_kcm_SIOCKCMCLONE(r10, 0x890c, &(0x7f0000000000)) 03:53:59 executing program 4: bpf$OBJ_GET_PROG(0x7, &(0x7f0000000280)={0x0, 0x0, 0x10}, 0x10) r0 = syz_open_dev$vcsa(0x0, 0x0, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f00000001c0)=0x5) syz_open_dev$vcsa(&(0x7f0000000040)='/dev/vcsa#\x00', 0x3, 0x401) sendmsg$nl_xfrm(0xffffffffffffffff, 0x0, 0x0) sched_setaffinity(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x803, 0x9) shmctl$SHM_INFO(0x0, 0xe, &(0x7f0000000680)=""/73) r1 = memfd_create(&(0x7f0000000540)='\xe87y\xd8\x0e\xfaE\xbb\x7fH\xbe\xbc\x95\x87\v\xd0\xcd9\xbd(0\xeeG\xaf\xe7\xb3?\xc7x\xbd\xe2R\xc5\r.', 0x0) r2 = syz_open_dev$sndseq(&(0x7f0000000700)='/dev/snd/seq\x00', 0x0, 0x1) r3 = dup2(r2, r1) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r3, 0xc08c5332, &(0x7f0000000280)={0x0, 0x0, 0x0, 'queue1\x00\x00\x00\x00\x00\x00\x00\x001;\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00\x00\x00\x00\x00\xcc\xbf}\xdd\x00'}) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_INFO(0xffffffffffffffff, 0xc08c5334, &(0x7f00000001c0)={0xf48b, 0x0, 0x0, 'queue1\x00'}) write$sndseq(r1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @connect}], 0xffffff76) clock_nanosleep(0x0, 0x0, &(0x7f00000005c0), &(0x7f0000000580)) ioctl$SNDRV_SEQ_IOCTL_GET_NAMED_QUEUE(r3, 0xc08c5336, &(0x7f0000000480)={0x0, 0x0, 0x80000001, 'queue0\x00', 0x10000}) ioctl$DRM_IOCTL_RM_CTX(0xffffffffffffffff, 0xc0086421, &(0x7f0000000380)) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, &(0x7f0000000440)=""/8) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/net/pfkey\x00', 0x80, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) r4 = creat(&(0x7f00000000c0)='./file0/file0\x00', 0x0) write$binfmt_elf64(r4, &(0x7f0000000180)=ANY=[], 0xfffffd97) ioctl$TUNSETVNETHDRSZ(r0, 0x400454d8, &(0x7f0000000240)=0x93) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, 0x0, 0x0) 03:53:59 executing program 3: syz_open_dev$vcsa(&(0x7f0000000040)='/dev/vcsa#\x00', 0x3, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = memfd_create(&(0x7f0000000540)='\xe87y\xd8\x0e\xfaE\xbb\x7fH\xbe\xbc\x95\x87\v\xd0\xcd9\xbd(0\xeeG\xaf\xe7\xb3?\xc7x\xbd\xe2R\xc5\r.', 0x0) r1 = syz_open_dev$sndseq(0x0, 0x0, 0x1) dup2(r1, r0) write$sndseq(r0, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @connect}], 0xffffff76) 03:53:59 executing program 2: creat(0x0, 0x8) getpgrp(0xffffffffffffffff) clone(0x1000202102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getsockopt$EBT_SO_GET_INIT_ENTRIES(0xffffffffffffffff, 0x0, 0x83, 0x0, &(0x7f0000000180)) getrandom(&(0x7f0000000140)=""/29, 0x1d, 0x2) 03:53:59 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x20, &(0x7f0000000b80)=ANY=[@ANYBLOB="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"], 0x0, 0x1625, 0x0, 0x0, 0x41100, 0x1, [], 0x0, 0x4}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r0, 0xdb, &(0x7f0000000200)={0x0, 0x0}}, 0x393) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='cgroup.events\x00', 0x0, 0x0) write$cgroup_int(r2, &(0x7f00000007c0)=0x6, 0x12) r3 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000002c0), 0x4) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz1\x00', 0x1ff) r4 = perf_event_open$cgroup(&(0x7f0000000600)={0x0, 0x70, 0x9, 0x6, 0x8, 0x6, 0x0, 0xfffffffffffff49f, 0x2, 0x6, 0x3ff, 0x0, 0x20, 0x0, 0x1, 0x81, 0x1, 0x400, 0x4, 0xfac, 0x4, 0x1, 0x10000, 0xf1, 0xd3, 0x92b, 0x200, 0x1, 0x100000000, 0x2, 0x100000000, 0xfff, 0xfff, 0xffff, 0x3, 0x0, 0x0, 0x6, 0x0, 0x50, 0x0, @perf_config_ext={0x3f, 0x9}, 0x20000, 0x8, 0xef3, 0x7, 0x100000000, 0x8, 0xfff}, 0xffffffffffffffff, 0x2, r0, 0x8) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000b40)='cgroup.subtree_control\x00') ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x2400, 0x1) r5 = getpid() socketpair$unix(0x1, 0x7, 0x0, &(0x7f0000000540)={0xffffffffffffffff}) setsockopt$sock_attach_bpf(r6, 0x1, 0x32, &(0x7f00000005c0)=r3, 0x4) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={0x0, 0xffffffffffffffff, 0x0, 0x12, &(0x7f0000000480)='./cgroup.cpu/syz1\x00', r1}, 0x30) perf_event_open(&(0x7f0000000300)={0x5, 0x70, 0xff, 0x4, 0x1000, 0xe5af, 0x0, 0x8000, 0xd0440, 0x2, 0xffff, 0x1, 0x4, 0x1f, 0x3, 0xfffffffffffffffa, 0x5, 0x9, 0x8, 0x1, 0x3, 0x400, 0x6, 0x5, 0x401, 0x10000, 0xff, 0xb24, 0xffffffffffff8000, 0xc8a, 0x3f, 0xfffffffffffffffa, 0xffffffffffff8001, 0x200, 0x5, 0x3, 0x2, 0x93a, 0x0, 0x7fff, 0x2, @perf_bp={&(0x7f0000000100), 0x1}, 0x0, 0x0, 0xffffffffffffff4e, 0x6, 0x0, 0x4, 0xfffffffffffffffd}, r5, 0x0, r7, 0x8) r8 = openat$tun(0xffffffffffffff9c, &(0x7f0000000580)='/dev/net/tun\x00', 0x40000, 0x0) ioctl$TUNSETPERSIST(r8, 0x400454cb, 0x1) r9 = socket$kcm(0x29, 0x5, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000800)={0x0, r0, 0x1, 0x2}, 0x14) ioctl$sock_kcm_SIOCKCMUNATTACH(r9, 0x89e1, &(0x7f0000000900)={r2}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r3, 0x0, 0x8b, 0x0, &(0x7f0000000680)="3ce41f426b7dd449ae14b08e1868c456d4fe9c7993884cf18f4dd5a0bc57250243da4203e0640859184bc4c4690afefd7736e8842cd88030448e918bdb5bd9bbbd680a51261557c0477c18049c832005ebb5b185c6f233df73a21d3b3ddad8426fba2d5f8aac5df904d5e5f2e7dc4a517079e08d5b2175a276f2a5c49cc2957cb367f269898570852dd63a", 0x0, 0x5}, 0x28) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000500)='./cgroup/syz0\x00', 0x200002, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000740)={r3, 0x50, &(0x7f00000003c0)}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r2, 0x50, &(0x7f0000000840)}, 0x10) openat$cgroup_subtree(r2, &(0x7f0000000940)='cgroup.subtree_control\x00', 0x2, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x1ff, 0x0, 0x0, 0x0, 0x200000, 0xffffffffffffffff, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280), 0x2}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r10 = socket$kcm(0xa, 0x400000000002, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffc59) ioctl$sock_kcm_SIOCKCMCLONE(r10, 0x890b, &(0x7f0000000000)) ioctl$sock_kcm_SIOCKCMCLONE(r10, 0x890c, &(0x7f0000000000)) [ 1867.739843] syz-executor4 invoked oom-killer: gfp_mask=0x6200ca(GFP_HIGHUSER_MOVABLE), order=0, oom_score_adj=0 [ 1867.750638] CPU: 0 PID: 29234 Comm: syz-executor4 Not tainted 5.0.0-rc2+ #28 [ 1867.757819] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1867.767503] Call Trace: [ 1867.770099] dump_stack+0x1db/0x2d0 [ 1867.773739] ? dump_stack_print_info.cold+0x20/0x20 [ 1867.778760] ? perf_trace_lock+0x12f/0x750 [ 1867.783009] dump_header+0x1e6/0x116c [ 1867.786818] ? add_lock_to_list.isra.0+0x450/0x450 [ 1867.791760] ? print_usage_bug+0xd0/0xd0 [ 1867.795829] ? pagefault_out_of_memory+0x1a1/0x1a1 [ 1867.800763] ? ___ratelimit+0x37c/0x686 [ 1867.804754] ? mark_held_locks+0xb1/0x100 [ 1867.808910] ? _raw_spin_unlock_irqrestore+0x6b/0xe0 [ 1867.814014] ? _raw_spin_unlock_irqrestore+0x6b/0xe0 [ 1867.819119] ? lockdep_hardirqs_on+0x415/0x5d0 [ 1867.823703] ? trace_hardirqs_on+0xbd/0x310 [ 1867.828027] ? kasan_check_read+0x11/0x20 [ 1867.832176] ? ___ratelimit+0x37c/0x686 [ 1867.836153] ? trace_hardirqs_off_caller+0x300/0x300 [ 1867.841256] ? do_raw_spin_trylock+0x270/0x270 [ 1867.845838] ? trace_hardirqs_on_caller+0x310/0x310 [ 1867.850851] ? lock_acquire+0x1db/0x570 [ 1867.854835] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 1867.860303] ? ___ratelimit+0xac/0x686 [ 1867.864199] ? idr_get_free+0xee0/0xee0 [ 1867.868175] ? lockdep_hardirqs_on+0x415/0x5d0 [ 1867.872771] oom_kill_process.cold+0x10/0x9d4 [ 1867.877275] ? cgroup_procs_next+0x70/0x70 [ 1867.881517] ? _raw_spin_unlock_irq+0x5e/0x90 [ 1867.886013] ? oom_badness+0xa50/0xa50 [ 1867.889911] ? oom_evaluate_task+0x540/0x540 [ 1867.894323] ? mem_cgroup_iter_break+0x30/0x30 [ 1867.898904] ? mutex_trylock+0x2d0/0x2d0 [ 1867.902964] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1867.908543] ? rcu_read_unlock_special+0x380/0x380 [ 1867.913490] out_of_memory+0x885/0x1420 [ 1867.917752] ? oom_killer_disable+0x340/0x340 [ 1867.922251] ? mem_cgroup_unmark_under_oom+0x8d/0xb0 [ 1867.927356] ? lock_acquire+0x1db/0x570 [ 1867.931346] mem_cgroup_out_of_memory+0x160/0x210 [ 1867.936188] ? do_raw_spin_unlock+0xa0/0x330 [ 1867.940600] ? memcg_memory_event+0x40/0x40 [ 1867.944919] ? do_raw_spin_trylock+0x270/0x270 [ 1867.949515] ? _raw_spin_unlock+0x2d/0x50 [ 1867.953664] try_charge+0x12a9/0x19b0 [ 1867.957478] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1867.963329] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 1867.968177] ? rcu_read_unlock_special+0x380/0x380 [ 1867.973122] ? get_mem_cgroup_from_mm+0x1ea/0x420 [ 1867.977972] ? get_mem_cgroup_from_page+0x190/0x190 [ 1867.983066] ? cap_capable+0x205/0x270 [ 1867.987246] mem_cgroup_try_charge+0x43a/0xdb0 [ 1867.991830] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1867.997368] ? mem_cgroup_protected+0xa10/0xa10 [ 1868.002046] ? shmem_getattr+0x2c0/0x2c0 [ 1868.006114] ? _raw_spin_unlock_irq+0x28/0x90 [ 1868.010609] ? lockdep_hardirqs_on+0x415/0x5d0 [ 1868.015196] ? trace_hardirqs_on+0xbd/0x310 [ 1868.019515] ? kasan_check_read+0x11/0x20 [ 1868.023681] ? trace_hardirqs_off_caller+0x300/0x300 [ 1868.028792] ? do_raw_spin_trylock+0x270/0x270 [ 1868.033381] mem_cgroup_try_charge_delay+0x1f/0xa0 [ 1868.038314] shmem_getpage_gfp+0xa85/0x4b70 [ 1868.042659] ? shmem_add_to_page_cache+0x19a0/0x19a0 [ 1868.047764] ? page_mapping+0x56d/0xa20 [ 1868.051743] ? __page_mapcount+0x550/0x550 [ 1868.055981] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1868.061827] ? __set_page_dirty_no_writeback+0x3a1/0x690 [ 1868.067283] ? do_writepages+0x1a0/0x1a0 [ 1868.071351] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1868.076899] ? mark_held_locks+0xb1/0x100 [ 1868.081057] ? do_writepages+0x1a0/0x1a0 [ 1868.085127] ? __writepage+0xe0/0xe0 [ 1868.088844] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 1868.094371] ? __mark_inode_dirty+0x2ff/0x1590 [ 1868.098958] ? inode_switch_wbs_work_fn+0x2280/0x2280 [ 1868.104156] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1868.108914] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1868.114461] ? unlock_page+0x2b1/0x4a0 [ 1868.118354] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1868.123992] ? balance_dirty_pages_ratelimited+0x1b0/0x2370 [ 1868.129720] ? balance_dirty_pages+0x3740/0x3740 [ 1868.134517] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1868.140058] ? shmem_write_end+0x384/0xa40 [ 1868.144300] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 1868.149360] ? iov_iter_advance+0x354/0x1490 [ 1868.153768] ? __lock_is_held+0xb6/0x140 [ 1868.157872] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1868.163747] ? iov_iter_fault_in_readable+0x22c/0x450 [ 1868.168946] shmem_write_begin+0x105/0x1e0 [ 1868.173192] generic_perform_write+0x2a0/0x6b0 [ 1868.177790] ? add_page_wait_queue+0x480/0x480 [ 1868.182371] ? current_time+0x1b0/0x1b0 [ 1868.186351] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 1868.191371] ? generic_write_check_limits+0x291/0x380 [ 1868.196569] __generic_file_write_iter+0x25e/0x630 [ 1868.201495] ? __fget+0x499/0x710 [ 1868.204958] generic_file_write_iter+0x34e/0x6a0 [ 1868.209725] ? __generic_file_write_iter+0x630/0x630 [ 1868.214831] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1868.220372] ? iov_iter_init+0xea/0x220 [ 1868.224353] __vfs_write+0x764/0xb40 [ 1868.228075] ? kernel_read+0x120/0x120 [ 1868.231982] ? rcu_read_lock_sched_held+0x110/0x130 [ 1868.237002] ? rcu_sync_lockdep_assert+0x73/0xb0 [ 1868.241755] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1868.247353] ? __sb_start_write+0x1ac/0x360 [ 1868.251680] vfs_write+0x20c/0x580 [ 1868.255228] ksys_write+0x105/0x260 [ 1868.259150] ? __ia32_sys_read+0xb0/0xb0 [ 1868.263217] ? trace_hardirqs_off_caller+0x300/0x300 [ 1868.268313] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1868.273853] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1868.278616] __x64_sys_write+0x73/0xb0 [ 1868.282506] do_syscall_64+0x1a3/0x800 [ 1868.286396] ? syscall_return_slowpath+0x5f0/0x5f0 [ 1868.291336] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 1868.296351] ? __switch_to_asm+0x34/0x70 [ 1868.300417] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1868.305283] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1868.310484] RIP: 0033:0x457ec9 [ 1868.313677] Code: 6d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 3b b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1868.332584] RSP: 002b:00007f9f4ac0cc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 1868.340289] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000457ec9 [ 1868.347557] RDX: 00000000ffffff76 RSI: 0000000020000000 RDI: 0000000000000008 [ 1868.354824] RBP: 000000000073c040 R08: 0000000000000000 R09: 0000000000000000 [ 1868.362431] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f9f4ac0d6d4 [ 1868.369705] R13: 00000000004c731c R14: 00000000004dcc68 R15: 00000000ffffffff [ 1868.377554] memory: usage 307200kB, limit 307200kB, failcnt 627 [ 1868.383658] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 1868.390412] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 1868.396589] Memory cgroup stats for /syz4: cache:15860KB rss:233712KB rss_huge:194560KB shmem:15740KB mapped_file:0KB dirty:0KB writeback:0KB swap:0KB inactive_anon:15908KB active_anon:233652KB inactive_file:4KB active_file:0KB unevictable:12KB [ 1868.418731] oom-kill:constraint=CONSTRAINT_NONE,nodemask=(null),cpuset=syz4,mems_allowed=0-1,oom_memcg=/syz4,task_memcg=/syz4,task=syz-executor4,pid=19468,uid=0 [ 1868.433558] Memory cgroup out of memory: Kill process 19468 (syz-executor4) score 124 or sacrifice child [ 1868.444864] Killed process 19468 (syz-executor4) total-vm:70532kB, anon-rss:4280kB, file-rss:33776kB, shmem-rss:12kB [ 1871.282595] net_ratelimit: 8 callbacks suppressed [ 1871.282604] protocol 88fb is buggy, dev hsr_slave_0 [ 1871.292695] protocol 88fb is buggy, dev hsr_slave_1 [ 1871.297838] protocol 88fb is buggy, dev hsr_slave_0 [ 1871.302952] protocol 88fb is buggy, dev hsr_slave_1 [ 1971.145444] oom_reaper: reaped process 19468 (syz-executor4), now anon-rss:0kB, file-rss:32816kB, shmem-rss:12kB [ 1972.142456] rcu: INFO: rcu_preempt self-detected stall on CPU [ 1972.148746] rcu: 1-...!: (10499 ticks this GP) idle=6b6/1/0x4000000000000002 softirq=214131/214140 fqs=28 [ 1972.159300] rcu: (t=10500 jiffies g=260801 q=1034) [ 1972.164417] rcu: rcu_preempt kthread starved for 8900 jiffies! g260801 f0x0 RCU_GP_WAIT_FQS(5) ->state=0x402 ->cpu=0 [ 1972.175058] rcu: RCU grace-period kthread stack dump: [ 1972.180232] rcu_preempt I25112 10 2 0x80000000 [ 1972.186565] Call Trace: [ 1972.189172] __schedule+0x897/0x1e60 [ 1972.192880] ? pci_mmcfg_check_reserved+0x170/0x170 [ 1972.197894] ? add_timer_on+0x9c0/0x9c0 [ 1972.201857] ? _raw_spin_unlock_irqrestore+0x6b/0xe0 [ 1972.206948] ? trace_hardirqs_on+0xbd/0x310 [ 1972.211290] ? kasan_check_read+0x11/0x20 [ 1972.215430] ? prepare_to_swait_event+0x20a/0x7e0 [ 1972.221303] schedule+0xfe/0x350 [ 1972.224666] ? trace_hardirqs_off_caller+0x300/0x300 [ 1972.229756] ? do_raw_spin_trylock+0x270/0x270 [ 1972.234324] ? __schedule+0x1e60/0x1e60 [ 1972.238294] ? __next_timer_interrupt+0x1a0/0x1a0 [ 1972.243130] schedule_timeout+0x14a/0x250 [ 1972.247266] ? usleep_range+0x1b0/0x1b0 [ 1972.251227] ? __next_timer_interrupt+0x1a0/0x1a0 [ 1972.256060] ? trace_hardirqs_on+0xbd/0x310 [ 1972.260384] ? ___might_sleep+0x1e7/0x310 [ 1972.264543] rcu_gp_fqs_loop+0x6ba/0x970 [ 1972.268600] ? rcu_gp_fqs_check_wake+0x160/0x160 [ 1972.273355] ? rcu_qs+0x110/0x110 [ 1972.276801] ? rcu_gp_kthread+0x867/0xc10 [ 1972.280939] ? find_held_lock+0x35/0x120 [ 1972.284989] ? rcu_gp_kthread+0x867/0xc10 [ 1972.289856] ? rcu_seq_start+0x130/0x130 [ 1972.293911] ? _raw_spin_unlock_irq+0x28/0x90 [ 1972.298391] ? lockdep_hardirqs_on+0x415/0x5d0 [ 1972.302960] ? trace_hardirqs_on+0xbd/0x310 [ 1972.307269] ? kasan_check_read+0x11/0x20 [ 1972.311405] ? trace_hardirqs_off_caller+0x300/0x300 [ 1972.316501] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1972.322047] rcu_gp_kthread+0x2bb/0xc10 [ 1972.326017] ? rcu_gp_init+0x1320/0x1320 [ 1972.330178] ? __kthread_parkme+0xc3/0x1b0 [ 1972.334407] ? find_held_lock+0x35/0x120 [ 1972.338456] ? __kthread_parkme+0xc3/0x1b0 [ 1972.342678] ? __lock_acquire+0x1f81/0x4a30 [ 1972.346999] ? hrtimer_nanosleep_restart+0x41/0x1c0 [ 1972.352001] ? hrtimer_nanosleep_restart+0x41/0x1c0 [ 1972.357017] ? lockdep_hardirqs_on+0x415/0x5d0 [ 1972.361595] ? trace_hardirqs_on+0xbd/0x310 [ 1972.365904] ? __kthread_parkme+0xc3/0x1b0 [ 1972.370124] ? trace_hardirqs_off_caller+0x300/0x300 [ 1972.375217] ? do_raw_spin_trylock+0x270/0x270 [ 1972.379784] ? schedule+0x108/0x350 [ 1972.383426] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 1972.389250] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1972.394773] ? __kthread_parkme+0xfb/0x1b0 [ 1972.398998] kthread+0x357/0x430 [ 1972.402362] ? rcu_gp_init+0x1320/0x1320 [ 1972.406413] ? kthread_stop+0x920/0x920 [ 1972.410464] ret_from_fork+0x3a/0x50 [ 1972.414203] NMI backtrace for cpu 1 [ 1972.417820] CPU: 1 PID: 29222 Comm: syz-executor4 Not tainted 5.0.0-rc2+ #28 [ 1972.425089] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1972.434430] Call Trace: [ 1972.436999] [ 1972.439144] dump_stack+0x1db/0x2d0 [ 1972.442764] ? dump_stack_print_info.cold+0x20/0x20 [ 1972.447771] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1972.453295] ? do_raw_spin_lock+0x156/0x360 [ 1972.457608] nmi_cpu_backtrace.cold+0x63/0xa4 [ 1972.462169] ? lapic_can_unplug_cpu.cold+0x38/0x38 [ 1972.467093] nmi_trigger_cpumask_backtrace+0x1be/0x236 [ 1972.472362] arch_trigger_cpumask_backtrace+0x14/0x20 [ 1972.477544] rcu_dump_cpu_stacks+0x183/0x1cf [ 1972.481945] ? find_next_bit+0x107/0x130 [ 1972.486719] print_cpu_stall.cold+0x227/0x40c [ 1972.491211] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1972.496737] ? rcu_dynticks_snap+0x30/0x30 [ 1972.500963] ? __this_cpu_preempt_check+0x1d/0x30 [ 1972.505789] ? rcu_preempt_need_deferred_qs+0x71/0x1a0 [ 1972.511054] ? do_trace_rcu_torture_read+0x10/0x10 [ 1972.515975] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1972.521504] ? check_preemption_disabled+0x48/0x290 [ 1972.526511] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1972.532037] ? check_preemption_disabled+0x48/0x290 [ 1972.537047] rcu_check_callbacks+0xb32/0x1380 [ 1972.541533] ? rcutree_dead_cpu+0x10/0x10 [ 1972.545672] ? trace_hardirqs_off+0xb8/0x310 [ 1972.550066] ? __lock_is_held+0xb6/0x140 [ 1972.554117] ? trace_hardirqs_on_caller+0x310/0x310 [ 1972.559123] ? check_preemption_disabled+0x48/0x290 [ 1972.564133] ? raise_softirq+0x189/0x430 [ 1972.568185] ? account_system_index_time+0x33f/0x5f0 [ 1972.573450] ? raise_softirq_irqoff+0x2d0/0x2d0 [ 1972.578103] ? check_preemption_disabled+0x48/0x290 [ 1972.583108] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1972.589335] ? hrtimer_run_queues+0x99/0x410 [ 1972.593733] ? run_local_timers+0x194/0x230 [ 1972.598042] ? timer_clear_idle+0x90/0x90 [ 1972.602185] ? account_process_tick+0x27f/0x350 [ 1972.606847] update_process_times+0x32/0x80 [ 1972.611160] tick_sched_handle+0xa2/0x190 [ 1972.615295] tick_sched_timer+0x47/0x130 [ 1972.619357] __hrtimer_run_queues+0x3a7/0x1050 [ 1972.623942] ? tick_sched_do_timer+0x1b0/0x1b0 [ 1972.628519] ? hrtimer_start_range_ns+0xda0/0xda0 [ 1972.633356] ? kvm_clock_read+0x18/0x30 [ 1972.637323] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 1972.642435] ? ktime_get_update_offsets_now+0x3d5/0x5e0 [ 1972.647895] ? do_timer+0x50/0x50 [ 1972.651339] ? add_lock_to_list.isra.0+0x450/0x450 [ 1972.656255] ? rcu_softirq_qs+0x20/0x20 [ 1972.660216] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1972.665762] hrtimer_interrupt+0x314/0x770 [ 1972.670029] smp_apic_timer_interrupt+0x18d/0x760 [ 1972.674863] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1972.679696] ? smp_call_function_single_interrupt+0x640/0x640 [ 1972.685565] ? trace_hardirqs_off+0x310/0x310 [ 1972.690619] ? task_prio+0x50/0x50 [ 1972.694170] ? check_preemption_disabled+0x48/0x290 [ 1972.699179] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1972.704032] apic_timer_interrupt+0xf/0x20 [ 1972.708250] [ 1972.710475] RIP: 0010:write_comp_data+0x1e/0x70 [ 1972.715134] Code: 48 89 34 d1 48 89 11 5d c3 0f 1f 00 65 4c 8b 04 25 40 ee 01 00 65 8b 05 80 ee 7f 7e a9 00 01 1f 00 75 51 41 8b 80 d8 12 00 00 <83> f8 03 75 45 49 8b 80 e0 12 00 00 45 8b 80 dc 12 00 00 4c 8b 08 [ 1972.734024] RSP: 0018:ffff88803100eca0 EFLAGS: 00000246 ORIG_RAX: ffffffffffffff13 [ 1972.741721] RAX: 0000000000000002 RBX: ffff88803100ef88 RCX: ffffffff81a29aa6 [ 1972.748975] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000001 [ 1972.756240] RBP: ffff88803100eca8 R08: ffff888059dc8400 R09: 0000000000000005 [ 1972.763507] R10: 0000000000000000 R11: ffff8880ae72dc7b R12: ffff888041ab0180 [ 1972.770766] R13: 0000000000000000 R14: ffff88803100ef90 R15: 0000000000000000 [ 1972.778036] ? oom_evaluate_task+0x226/0x540 [ 1972.782440] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1972.788524] oom_evaluate_task+0x226/0x540 [ 1972.792747] ? oom_badness+0xa50/0xa50 [ 1972.796624] mem_cgroup_scan_tasks+0x105/0x1f0 [ 1972.801192] ? mem_cgroup_iter_break+0x30/0x30 [ 1972.805762] ? mutex_trylock+0x2d0/0x2d0 [ 1972.809812] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1972.815348] ? rcu_read_unlock_special+0x380/0x380 [ 1972.820287] out_of_memory+0x796/0x1420 [ 1972.824265] ? oom_killer_disable+0x340/0x340 [ 1972.828747] ? mem_cgroup_unmark_under_oom+0x8d/0xb0 [ 1972.833842] ? lock_acquire+0x1db/0x570 [ 1972.837815] mem_cgroup_out_of_memory+0x160/0x210 [ 1972.842643] ? do_raw_spin_unlock+0xa0/0x330 [ 1972.847038] ? memcg_memory_event+0x40/0x40 [ 1972.851347] ? do_raw_spin_trylock+0x270/0x270 [ 1972.855936] ? _raw_spin_unlock+0x2d/0x50 [ 1972.860086] try_charge+0x12a9/0x19b0 [ 1972.863877] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1972.869409] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 1972.874240] ? rcu_read_unlock_special+0x380/0x380 [ 1972.879165] ? get_mem_cgroup_from_mm+0x1ea/0x420 [ 1972.883996] ? get_mem_cgroup_from_page+0x190/0x190 [ 1972.889735] ? cap_capable+0x205/0x270 [ 1972.893615] mem_cgroup_try_charge+0x43a/0xdb0 [ 1972.898184] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1972.903708] ? mem_cgroup_protected+0xa10/0xa10 [ 1972.908366] ? shmem_getattr+0x2c0/0x2c0 [ 1972.912423] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1972.917175] ? retint_kernel+0x2d/0x2d [ 1972.921062] mem_cgroup_try_charge_delay+0x1f/0xa0 [ 1972.925986] shmem_getpage_gfp+0xa85/0x4b70 [ 1972.930315] ? shmem_add_to_page_cache+0x19a0/0x19a0 [ 1972.935430] ? __set_page_dirty_no_writeback+0x388/0x690 [ 1972.940873] ? __set_page_dirty_no_writeback+0x38f/0x690 [ 1972.946321] ? __set_page_dirty_no_writeback+0x3a1/0x690 [ 1972.951761] ? do_writepages+0x1a0/0x1a0 [ 1972.955815] ? print_usage_bug+0xd0/0xd0 [ 1972.959876] ? retint_kernel+0x2d/0x2d [ 1972.963761] ? mark_held_locks+0xb1/0x100 [ 1972.967899] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1972.972647] ? retint_kernel+0x2d/0x2d [ 1972.976521] ? trace_hardirqs_on_caller+0xc0/0x310 [ 1972.981437] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1972.986862] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1972.991607] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 1972.997043] ? print_usage_bug+0xd0/0xd0 [ 1973.001129] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1973.005885] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1973.011408] ? balance_dirty_pages_ratelimited+0x1b0/0x2370 [ 1973.017117] ? retint_kernel+0x2d/0x2d [ 1973.020994] ? balance_dirty_pages+0x3740/0x3740 [ 1973.025738] ? iov_iter_advance+0x193/0x1490 [ 1973.030130] ? write_comp_data+0x9/0x70 [ 1973.034090] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 1973.039100] ? iov_iter_advance+0x354/0x1490 [ 1973.043495] ? __lock_is_held+0xb6/0x140 [ 1973.047549] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1973.053077] ? iov_iter_fault_in_readable+0x22c/0x450 [ 1973.058261] shmem_write_begin+0x105/0x1e0 [ 1973.062494] generic_perform_write+0x2a0/0x6b0 [ 1973.067097] ? add_page_wait_queue+0x480/0x480 [ 1973.071670] ? current_time+0x1b0/0x1b0 [ 1973.075637] ? __generic_file_write_iter+0x129/0x630 [ 1973.080734] __generic_file_write_iter+0x25e/0x630 [ 1973.086320] generic_file_write_iter+0x34e/0x6a0 [ 1973.091068] ? __generic_file_write_iter+0x630/0x630 [ 1973.096161] ? generic_file_write_iter+0x2c/0x6a0 [ 1973.100996] __vfs_write+0x764/0xb40 [ 1973.104700] ? kernel_read+0x120/0x120 [ 1973.108682] ? rcu_read_lock_sched_held+0x110/0x130 [ 1973.113690] ? rcu_sync_lockdep_assert+0x73/0xb0 [ 1973.118431] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1973.123952] ? __sb_start_write+0x1ac/0x360 [ 1973.128262] vfs_write+0x20c/0x580 [ 1973.131799] ksys_write+0x105/0x260 [ 1973.135415] ? __ia32_sys_read+0xb0/0xb0 [ 1973.139465] ? trace_hardirqs_off_caller+0x300/0x300 [ 1973.144556] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1973.149311] __x64_sys_write+0x73/0xb0 [ 1973.153190] do_syscall_64+0x1a3/0x800 [ 1973.157065] ? syscall_return_slowpath+0x5f0/0x5f0 [ 1973.161985] ? prepare_exit_to_usermode+0x232/0x3b0 [ 1973.166993] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1973.171827] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1973.177002] RIP: 0033:0x457ec9 [ 1973.180183] Code: 6d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 3b b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1973.199775] RSP: 002b:00007f9f4ac4ec78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 1973.207469] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000457ec9 [ 1973.214735] RDX: 00000000ffffff76 RSI: 0000000020000000 RDI: 0000000000000005 [ 1973.221993] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1973.229251] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f9f4ac4f6d4 [ 1973.236513] R13: 00000000004c731c R14: 00000000004dcc68 R15: 00000000ffffffff [ 1973.244657] sched: RT throttling activated