_key(0x0, &(0x7f0000001ffb)={'syz', 0x1}, 0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x1004) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0x3, 0x380, 0x0, 0xe0, 0xe0, 0xe0, 0x0, 0x2e8, 0x2e8, 0x2e8, 0x2e8, 0x2e8, 0x7fffffe, 0x0, {[{{@uncond, 0x0, 0x70, 0xe0, 0x0, {0x6020000}}, @common=@unspec=@NFLOG={0x70, 'NFLOG\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, "a4bcf0ebf5d09e8706000000b1000000124ac31d4fda375c7794e420aa63529ebcf847246a5e8846085b0a30510b266347a84ae5ffea89b8654e44c800"}}}, {{@ip={@local, @multicast1, 0x0, 0x0, '\x00', 'wg1\x00'}, 0x0, 0x1c8, 0x208, 0x0, {}, [@common=@inet=@hashlimit3={{0x158}, {'bridge_slave_1\x00', {0x0, 0x8, 0x0, 0x0, 0x0, 0x7fff, 0x8}}}]}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "29f0be44329ad4d94a815c71ad95092b933b5e380a7e5d3c56c51e9d0027"}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x3e0) 23:07:49 executing program 0: r0 = getpgrp(0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x24000000) r1 = gettid() perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000, 0x0, 0x2af}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000080), 0x30200, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) unshare(0x4000000) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r3, 0x0) r4 = syz_open_dev$cec(&(0x7f0000000300), 0x3, 0x2) preadv(r4, &(0x7f00000002c0)=[{&(0x7f00000001c0)=""/251, 0xfb}], 0x1, 0xda3, 0x400001) bpf$ITER_CREATE(0x21, &(0x7f0000000100)={r2}, 0x9) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x26, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = perf_event_open(&(0x7f00000006c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c44}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ID(r5, 0x80042407, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000140)={0x1, 0x80, 0x1, 0x7, 0x6, 0xff, 0x0, 0x2, 0x80200, 0xe, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x400, 0x1, @perf_bp={&(0x7f00000000c0), 0x8}, 0x18000, 0x8000, 0xfffffffc, 0x1, 0x1000000000, 0x8, 0x0, 0x0, 0x8, 0x0, 0x9}, r1, 0x2, r5, 0x2) clone(0x6cb2e100, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r1) wait4(0x0, 0x0, 0x0, 0x0) 23:07:49 executing program 2: r0 = getpgrp(0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x24000000) r1 = gettid() perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000080), 0x30200, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) unshare(0x4000000) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, r3, 0x0) preadv(0xffffffffffffffff, &(0x7f00000002c0)=[{&(0x7f00000001c0)=""/251, 0xfb}], 0x1, 0x0, 0x0) bpf$ITER_CREATE(0x21, &(0x7f0000000100)={r2}, 0x9) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x26, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = perf_event_open(&(0x7f00000006c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c44}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ID(r4, 0x80042407, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000140)={0x1, 0x80, 0x0, 0x7, 0x0, 0xff, 0x0, 0x2, 0x0, 0xe, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x400, 0x1, @perf_bp={&(0x7f00000000c0), 0x8}, 0x18000, 0x8000, 0xfffffffc, 0x1, 0x1000000000, 0x8, 0x3, 0x0, 0x8, 0x0, 0x9}, r1, 0x2, r4, 0x2) clone(0x6cb2e100, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r1) wait4(0x0, 0x0, 0x0, 0x0) 23:07:49 executing program 4: perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0xc7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x12, 0xf7, 0x4, 0x3, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x5000000}, 0x40) 23:07:49 executing program 3: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x15, 0x0, 0x1, 0x0, 0x6, @multicast}, 0x14) clone(0x2000000082148180, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_STRSET_GET(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000640)={&(0x7f00000006c0)=ANY=[@ANYBLOB="cccd30", @ANYRES16=0x0, @ANYBLOB="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", @ANYRES32=0x0, @ANYBLOB="1400020069703667726574617030000000000000140002006970366572f370616e20000000000000fa0ee59a22b338aeb6d3895b934764e9a674c87f74b9c35aaa183a9ea95194a3dc40d9b230a9f627acae68e5f0381078395e744b4197fe3dd12112adacad625f6ae8e22901a3dd5920796e7dc087d5033e12c9e4aea2026a5df4ee89adbeda48287c2840149cf27af2cc0f064680a7b5e90f480b201f70326baca201fea21a0100000000000000"], 0x1cc}, 0x1, 0x0, 0x0, 0x8800}, 0x20040040) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) request_key(0x0, &(0x7f0000001ffb)={'syz', 0x1}, 0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x1004) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0x3, 0x380, 0x0, 0xe0, 0xe0, 0xe0, 0x0, 0x2e8, 0x2e8, 0x2e8, 0x2e8, 0x2e8, 0x7fffffe, 0x0, {[{{@uncond, 0x0, 0x70, 0xe0, 0x0, {0x6020000}}, @common=@unspec=@NFLOG={0x70, 'NFLOG\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, "a4bcf0ebf5d09e8706000000b1000000124ac31d4fda375c7794e420aa63529ebcf847246a5e8846085b0a30510b266347a84ae5ffea89b8654e44e000"}}}, {{@ip={@local, @multicast1, 0x0, 0x0, '\x00', 'wg1\x00'}, 0x0, 0x1c8, 0x208, 0x0, {}, [@common=@inet=@hashlimit3={{0x158}, {'bridge_slave_1\x00', {0x0, 0x8, 0x0, 0x0, 0x0, 0x7fff, 0x8}}}]}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "29f0be44329ad4d94a815c71ad95092b933b5e380a7e5d3c56c51e9d0027"}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x3e0) 23:07:49 executing program 4: perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0xc7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x12, 0xf7, 0x4, 0x3, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x6000000}, 0x40) 23:07:49 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x15, 0x0, 0x1, 0x0, 0x6, @multicast}, 0x14) clone(0x2000000082148180, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_STRSET_GET(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000640)={0x0, 0x1cc}, 0x1, 0x0, 0x0, 0x8800}, 0x20040040) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) request_key(0x0, &(0x7f0000001ffb)={'syz', 0x1}, 0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x1004) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3, 0x3, 0x380, 0x0, 0xe0, 0xe0, 0xe0, 0x0, 0x2e8, 0x2e8, 0x2e8, 0x2e8, 0x2e8, 0x7fffffe, 0x0, {[{{@uncond, 0x0, 0x70, 0xe0, 0x0, {0x6020000}}, @common=@unspec=@NFLOG={0x70, 'NFLOG\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, "a4bcf0ebf5d09e8706580300b1000000124ac31d4fda375c7794e420aa63529ebcf847246a5e8846085b0a30510b266347a84ae5ffea89b8654e4400"}}}, {{@ip={@local, @multicast1, 0x0, 0x0, '\x00', 'wg1\x00'}, 0x0, 0x1c8, 0x208, 0x0, {}, [@common=@inet=@hashlimit3={{0x158}, {'bridge_slave_1\x00', {0x0, 0x8, 0x0, 0x0, 0x0, 0x7fff, 0x8}}}]}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "29f0be44329ad4d94a815c71ad95092b933b5e380a7e5d3c56c51e9d0027"}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x3e0) 23:07:50 executing program 4: perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0xc7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x12, 0xf7, 0x4, 0x3, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x7000000}, 0x40) 23:07:50 executing program 3: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x15, 0x0, 0x1, 0x0, 0x6, @multicast}, 0x14) clone(0x2000000082148180, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_STRSET_GET(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000640)={&(0x7f00000006c0)=ANY=[@ANYBLOB="cccd30", @ANYRES16=0x0, @ANYBLOB="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", @ANYRES32=0x0, @ANYBLOB="1400020069703667726574617030000000000000140002006970366572f370616e20000000000000fa0ee59a22b338aeb6d3895b934764e9a674c87f74b9c35aaa183a9ea95194a3dc40d9b230a9f627acae68e5f0381078395e744b4197fe3dd12112adacad625f6ae8e22901a3dd5920796e7dc087d5033e12c9e4aea2026a5df4ee89adbeda48287c2840149cf27af2cc0f064680a7b5e90f480b201f70326baca201fea21a0100000000000000"], 0x1cc}, 0x1, 0x0, 0x0, 0x8800}, 0x20040040) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) request_key(0x0, &(0x7f0000001ffb)={'syz', 0x1}, 0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x1004) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0x3, 0x380, 0x0, 0xe0, 0xe0, 0xe0, 0x0, 0x2e8, 0x2e8, 0x2e8, 0x2e8, 0x2e8, 0x7fffffe, 0x0, {[{{@uncond, 0x0, 0x70, 0xe0, 0x0, {0x6020000}}, @common=@unspec=@NFLOG={0x70, 'NFLOG\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, "a4bcf0ebf5d09e8706000000b1000000124ac31d4fda375c7794e420aa63529ebcf847246a5e8846085b0a30510b266347a84ae5ffea89b8654e44e400"}}}, {{@ip={@local, @multicast1, 0x0, 0x0, '\x00', 'wg1\x00'}, 0x0, 0x1c8, 0x208, 0x0, {}, [@common=@inet=@hashlimit3={{0x158}, {'bridge_slave_1\x00', {0x0, 0x8, 0x0, 0x0, 0x0, 0x7fff, 0x8}}}]}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "29f0be44329ad4d94a815c71ad95092b933b5e380a7e5d3c56c51e9d0027"}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x3e0) [ 2094.903198] x_tables: duplicate underflow at hook 1 23:07:52 executing program 1: r0 = getpgrp(0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x24000000) r1 = gettid() perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000, 0x0, 0x2af}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000080), 0x30200, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) unshare(0x4000000) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r3, 0x0) r4 = syz_open_dev$cec(&(0x7f0000000300), 0x3, 0x2) preadv(r4, &(0x7f00000002c0)=[{&(0x7f00000001c0)=""/251, 0xfb}], 0x1, 0xda3, 0x400001) bpf$ITER_CREATE(0x21, &(0x7f0000000100)={r2}, 0x9) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x26, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = perf_event_open(&(0x7f00000006c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c44}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ID(r5, 0x80042407, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000140)={0x1, 0x80, 0x1, 0x7, 0x6, 0xff, 0x0, 0x2, 0x80200, 0xe, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x400, 0x1, @perf_bp={&(0x7f00000000c0), 0x8}, 0x18000, 0x8000, 0xfffffffc, 0x1, 0x1000000000, 0x8, 0x3, 0x0, 0x0, 0x0, 0x9}, r1, 0x2, r5, 0x2) clone(0x6cb2e100, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r1) wait4(0x0, 0x0, 0x0, 0x0) 23:07:52 executing program 4: perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0xc7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x12, 0xf7, 0x4, 0x3, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x8000000}, 0x40) 23:07:52 executing program 3: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x15, 0x0, 0x1, 0x0, 0x6, @multicast}, 0x14) clone(0x2000000082148180, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_STRSET_GET(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000640)={&(0x7f00000006c0)=ANY=[@ANYBLOB="cccd30", @ANYRES16=0x0, @ANYBLOB="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", @ANYRES32=0x0, @ANYBLOB="1400020069703667726574617030000000000000140002006970366572f370616e20000000000000fa0ee59a22b338aeb6d3895b934764e9a674c87f74b9c35aaa183a9ea95194a3dc40d9b230a9f627acae68e5f0381078395e744b4197fe3dd12112adacad625f6ae8e22901a3dd5920796e7dc087d5033e12c9e4aea2026a5df4ee89adbeda48287c2840149cf27af2cc0f064680a7b5e90f480b201f70326baca201fea21a0100000000000000"], 0x1cc}, 0x1, 0x0, 0x0, 0x8800}, 0x20040040) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) request_key(0x0, &(0x7f0000001ffb)={'syz', 0x1}, 0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x1004) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0x3, 0x380, 0x0, 0xe0, 0xe0, 0xe0, 0x0, 0x2e8, 0x2e8, 0x2e8, 0x2e8, 0x2e8, 0x7fffffe, 0x0, {[{{@uncond, 0x0, 0x70, 0xe0, 0x0, {0x6020000}}, @common=@unspec=@NFLOG={0x70, 'NFLOG\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, "a4bcf0ebf5d09e8706000000b1000000124ac31d4fda375c7794e420aa63529ebcf847246a5e8846085b0a30510b266347a84ae5ffea89b8654e44fe00"}}}, {{@ip={@local, @multicast1, 0x0, 0x0, '\x00', 'wg1\x00'}, 0x0, 0x1c8, 0x208, 0x0, {}, [@common=@inet=@hashlimit3={{0x158}, {'bridge_slave_1\x00', {0x0, 0x8, 0x0, 0x0, 0x0, 0x7fff, 0x8}}}]}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "29f0be44329ad4d94a815c71ad95092b933b5e380a7e5d3c56c51e9d0027"}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x3e0) 23:07:52 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x15, 0x0, 0x1, 0x0, 0x6, @multicast}, 0x14) clone(0x2000000082148180, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_STRSET_GET(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000640)={0x0, 0x1cc}, 0x1, 0x0, 0x0, 0x8800}, 0x20040040) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) request_key(0x0, &(0x7f0000001ffb)={'syz', 0x1}, 0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x1004) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x4, 0x3, 0x380, 0x0, 0xe0, 0xe0, 0xe0, 0x0, 0x2e8, 0x2e8, 0x2e8, 0x2e8, 0x2e8, 0x7fffffe, 0x0, {[{{@uncond, 0x0, 0x70, 0xe0, 0x0, {0x6020000}}, @common=@unspec=@NFLOG={0x70, 'NFLOG\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, "a4bcf0ebf5d09e8706580300b1000000124ac31d4fda375c7794e420aa63529ebcf847246a5e8846085b0a30510b266347a84ae5ffea89b8654e4400"}}}, {{@ip={@local, @multicast1, 0x0, 0x0, '\x00', 'wg1\x00'}, 0x0, 0x1c8, 0x208, 0x0, {}, [@common=@inet=@hashlimit3={{0x158}, {'bridge_slave_1\x00', {0x0, 0x8, 0x0, 0x0, 0x0, 0x7fff, 0x8}}}]}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "29f0be44329ad4d94a815c71ad95092b933b5e380a7e5d3c56c51e9d0027"}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x3e0) 23:07:52 executing program 0: perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0xc7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x12, 0xf7, 0x4, 0x3, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2}, 0x40) 23:07:52 executing program 2: r0 = getpgrp(0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x24000000) r1 = gettid() perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000080), 0x30200, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) unshare(0x4000000) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, r3, 0x0) preadv(0xffffffffffffffff, &(0x7f00000002c0)=[{&(0x7f00000001c0)=""/251, 0xfb}], 0x1, 0x0, 0x0) bpf$ITER_CREATE(0x21, &(0x7f0000000100)={r2}, 0x9) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x26, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = perf_event_open(&(0x7f00000006c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c44}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ID(r4, 0x80042407, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000140)={0x1, 0x80, 0x0, 0x7, 0x0, 0xff, 0x0, 0x2, 0x0, 0xe, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x400, 0x1, @perf_bp={&(0x7f00000000c0), 0x8}, 0x18000, 0x8000, 0xfffffffc, 0x1, 0x1000000000, 0x8, 0x3, 0x0, 0x8, 0x0, 0x9}, r1, 0x2, r4, 0x2) clone(0x6cb2e100, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r1) wait4(0x0, 0x0, 0x0, 0x0) 23:07:52 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x15, 0x0, 0x1, 0x0, 0x6, @multicast}, 0x14) clone(0x2000000082148180, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_STRSET_GET(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000640)={0x0, 0x1cc}, 0x1, 0x0, 0x0, 0x8800}, 0x20040040) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) request_key(0x0, &(0x7f0000001ffb)={'syz', 0x1}, 0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x1004) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0xeb030000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0x3, 0x380, 0x0, 0xe0, 0xe0, 0xe0, 0x0, 0x2e8, 0x2e8, 0x2e8, 0x2e8, 0x2e8, 0x7fffffe, 0x0, {[{{@uncond, 0x0, 0x70, 0xe0, 0x0, {0x6020000}}, @common=@unspec=@NFLOG={0x70, 'NFLOG\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, "a4bcf0ebf5d09e8706580300b1000000124ac31d4fda375c7794e420aa63529ebcf847246a5e8846085b0a30510b266347a84ae5ffea89b8654e4400"}}}, {{@ip={@local, @multicast1, 0x0, 0x0, '\x00', 'wg1\x00'}, 0x0, 0x1c8, 0x208, 0x0, {}, [@common=@inet=@hashlimit3={{0x158}, {'bridge_slave_1\x00', {0x0, 0x8, 0x0, 0x0, 0x0, 0x7fff, 0x8}}}]}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "29f0be44329ad4d94a815c71ad95092b933b5e380a7e5d3c56c51e9d0027"}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x3e0) 23:07:52 executing program 3: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x15, 0x0, 0x1, 0x0, 0x6, @multicast}, 0x14) clone(0x2000000082148180, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_STRSET_GET(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000640)={&(0x7f00000006c0)=ANY=[@ANYBLOB="cccd30", @ANYRES16=0x0, @ANYBLOB="02002abd7000fbdbdf250100000004000300800102800c00018008000100070000002400018008000100070000000800010008000000080001000100000008000100060000001c0001800800010005000000080001000200000008000100000000002c000180080001000600000008000100070000000800010003000000080001000600000008000100000000005400018008000100060000000800010001000000080001000400000008000100000000000800010000000000080001000000000008000100000000000800010008000000080001000300000008000100020000001c0001800800010008000000080001000100000008000100050000001c0001800800010004000000080001000400000008000100010000002c000180080001000000000008000100040000000800010007000000080001000700000008000100080000004c0001800800010002000000080001000200000008000100050000000800010003000000080001000400000008000100040000000800010000000000080001000400000008000100030000003400018008000100", @ANYRES32=0x0, @ANYBLOB="1400020069703667726574617030000000000000140002006970366572f370616e20000000000000fa0ee59a22b338aeb6d3895b934764e9a674c87f74b9c35aaa183a9ea95194a3dc40d9b230a9f627acae68e5f0381078395e744b4197fe3dd12112adacad625f6ae8e22901a3dd5920796e7dc087d5033e12c9e4aea2026a5df4ee89adbeda48287c2840149cf27af2cc0f064680a7b5e90f480b201f70326baca201fea21a0100000000000000"], 0x1cc}, 0x1, 0x0, 0x0, 0x8800}, 0x20040040) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) request_key(0x0, &(0x7f0000001ffb)={'syz', 0x1}, 0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x1004) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0x3, 0x380, 0x0, 0xe0, 0xe0, 0xe0, 0x0, 0x2e8, 0x2e8, 0x2e8, 0x2e8, 0x2e8, 0x7fffffe, 0x0, {[{{@uncond, 0x0, 0x70, 0xe0, 0x0, {0x6020000}}, @common=@unspec=@NFLOG={0x70, 'NFLOG\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, "a4bcf0ebf5d09e8706000000b1000000124ac31d4fda375c7794e420aa63529ebcf847246a5e8846085b0a30510b266347a84ae5ffea89b8654e44180100"}}}, {{@ip={@local, @multicast1, 0x0, 0x0, '\x00', 'wg1\x00'}, 0x0, 0x1c8, 0x208, 0x0, {}, [@common=@inet=@hashlimit3={{0x158}, {'bridge_slave_1\x00', {0x0, 0x8, 0x0, 0x0, 0x0, 0x7fff, 0x8}}}]}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "29f0be44329ad4d94a815c71ad95092b933b5e380a7e5d3c56c51e9d0027"}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x3e0) 23:07:52 executing program 1: r0 = getpgrp(0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x24000000) r1 = gettid() perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000, 0x0, 0x2af}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000080), 0x30200, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) unshare(0x4000000) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r3, 0x0) r4 = syz_open_dev$cec(&(0x7f0000000300), 0x3, 0x2) preadv(r4, &(0x7f00000002c0)=[{&(0x7f00000001c0)=""/251, 0xfb}], 0x1, 0xda3, 0x400001) bpf$ITER_CREATE(0x21, &(0x7f0000000100)={r2}, 0x9) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x26, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = perf_event_open(&(0x7f00000006c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c44}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ID(r5, 0x80042407, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000140)={0x1, 0x80, 0x1, 0x7, 0x6, 0xff, 0x0, 0x2, 0x80200, 0xe, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x400, 0x1, @perf_bp={&(0x7f00000000c0), 0x8}, 0x18000, 0x8000, 0xfffffffc, 0x1, 0x1000000000, 0x8, 0x3, 0x0, 0x0, 0x0, 0x9}, r1, 0x2, r5, 0x2) clone(0x6cb2e100, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r1) wait4(0x0, 0x0, 0x0, 0x0) 23:07:52 executing program 4: perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0xc7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x12, 0xf7, 0x4, 0x3, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x9000000}, 0x40) 23:07:52 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x15, 0x0, 0x1, 0x0, 0x6, @multicast}, 0x14) clone(0x2000000082148180, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_STRSET_GET(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000640)={0x0, 0x1cc}, 0x1, 0x0, 0x0, 0x8800}, 0x20040040) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) request_key(0x0, &(0x7f0000001ffb)={'syz', 0x1}, 0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x1004) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x5, 0x3, 0x380, 0x0, 0xe0, 0xe0, 0xe0, 0x0, 0x2e8, 0x2e8, 0x2e8, 0x2e8, 0x2e8, 0x7fffffe, 0x0, {[{{@uncond, 0x0, 0x70, 0xe0, 0x0, {0x6020000}}, @common=@unspec=@NFLOG={0x70, 'NFLOG\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, "a4bcf0ebf5d09e8706580300b1000000124ac31d4fda375c7794e420aa63529ebcf847246a5e8846085b0a30510b266347a84ae5ffea89b8654e4400"}}}, {{@ip={@local, @multicast1, 0x0, 0x0, '\x00', 'wg1\x00'}, 0x0, 0x1c8, 0x208, 0x0, {}, [@common=@inet=@hashlimit3={{0x158}, {'bridge_slave_1\x00', {0x0, 0x8, 0x0, 0x0, 0x0, 0x7fff, 0x8}}}]}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "29f0be44329ad4d94a815c71ad95092b933b5e380a7e5d3c56c51e9d0027"}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x3e0) 23:07:53 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x15, 0x0, 0x1, 0x0, 0x6, @multicast}, 0x14) clone(0x2000000082148180, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_STRSET_GET(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000640)={0x0, 0x1cc}, 0x1, 0x0, 0x0, 0x8800}, 0x20040040) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) request_key(0x0, &(0x7f0000001ffb)={'syz', 0x1}, 0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x1004) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0xeb030000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0x3, 0x380, 0x0, 0xe0, 0xe0, 0xe0, 0x0, 0x2e8, 0x2e8, 0x2e8, 0x2e8, 0x2e8, 0x7fffffe, 0x0, {[{{@uncond, 0x0, 0x70, 0xe0, 0x0, {0x6020000}}, @common=@unspec=@NFLOG={0x70, 'NFLOG\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, "a4bcf0ebf5d09e8706580300b1000000124ac31d4fda375c7794e420aa63529ebcf847246a5e8846085b0a30510b266347a84ae5ffea89b8654e4400"}}}, {{@ip={@local, @multicast1, 0x0, 0x0, '\x00', 'wg1\x00'}, 0x0, 0x1c8, 0x208, 0x0, {}, [@common=@inet=@hashlimit3={{0x158}, {'bridge_slave_1\x00', {0x0, 0x8, 0x0, 0x0, 0x0, 0x7fff, 0x8}}}]}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "29f0be44329ad4d94a815c71ad95092b933b5e380a7e5d3c56c51e9d0027"}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x3e0) 23:07:53 executing program 4: perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0xc7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x12, 0xf7, 0x4, 0x3, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0xa000000}, 0x40) 23:07:53 executing program 3: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x15, 0x0, 0x1, 0x0, 0x6, @multicast}, 0x14) clone(0x2000000082148180, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_STRSET_GET(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000640)={&(0x7f00000006c0)=ANY=[@ANYBLOB="cccd30", @ANYRES16=0x0, @ANYBLOB="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", @ANYRES32=0x0, @ANYBLOB="1400020069703667726574617030000000000000140002006970366572f370616e20000000000000fa0ee59a22b338aeb6d3895b934764e9a674c87f74b9c35aaa183a9ea95194a3dc40d9b230a9f627acae68e5f0381078395e744b4197fe3dd12112adacad625f6ae8e22901a3dd5920796e7dc087d5033e12c9e4aea2026a5df4ee89adbeda48287c2840149cf27af2cc0f064680a7b5e90f480b201f70326baca201fea21a0100000000000000"], 0x1cc}, 0x1, 0x0, 0x0, 0x8800}, 0x20040040) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) request_key(0x0, &(0x7f0000001ffb)={'syz', 0x1}, 0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x1004) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0x3, 0x380, 0x0, 0xe0, 0xe0, 0xe0, 0x0, 0x2e8, 0x2e8, 0x2e8, 0x2e8, 0x2e8, 0x7fffffe, 0x0, {[{{@uncond, 0x0, 0x70, 0xe0, 0x0, {0x6020000}}, @common=@unspec=@NFLOG={0x70, 'NFLOG\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, "a4bcf0ebf5d09e8706000000b1000000124ac31d4fda375c7794e420aa63529ebcf847246a5e8846085b0a30510b266347a84ae5ffea89b8654e442b0100"}}}, {{@ip={@local, @multicast1, 0x0, 0x0, '\x00', 'wg1\x00'}, 0x0, 0x1c8, 0x208, 0x0, {}, [@common=@inet=@hashlimit3={{0x158}, {'bridge_slave_1\x00', {0x0, 0x8, 0x0, 0x0, 0x0, 0x7fff, 0x8}}}]}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "29f0be44329ad4d94a815c71ad95092b933b5e380a7e5d3c56c51e9d0027"}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x3e0) 23:07:53 executing program 2: r0 = getpgrp(0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x24000000) r1 = gettid() perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000080), 0x30200, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) unshare(0x4000000) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, r3, 0x0) preadv(0xffffffffffffffff, &(0x7f00000002c0)=[{&(0x7f00000001c0)=""/251, 0xfb}], 0x1, 0x0, 0x0) bpf$ITER_CREATE(0x21, &(0x7f0000000100)={r2}, 0x9) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x26, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = perf_event_open(&(0x7f00000006c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c44}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ID(r4, 0x80042407, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000140)={0x1, 0x80, 0x0, 0x7, 0x0, 0xff, 0x0, 0x2, 0x0, 0xe, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x400, 0x1, @perf_bp={&(0x7f00000000c0), 0x8}, 0x18000, 0x8000, 0xfffffffc, 0x1, 0x1000000000, 0x8, 0x3, 0x0, 0x8, 0x0, 0x9}, r1, 0x2, r4, 0x2) clone(0x6cb2e100, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r1) wait4(0x0, 0x0, 0x0, 0x0) 23:07:53 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x15, 0x0, 0x1, 0x0, 0x6, @multicast}, 0x14) clone(0x2000000082148180, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_STRSET_GET(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000640)={0x0, 0x1cc}, 0x1, 0x0, 0x0, 0x8800}, 0x20040040) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) request_key(0x0, &(0x7f0000001ffb)={'syz', 0x1}, 0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x1004) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0xeb030000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0x3, 0x380, 0x0, 0xe0, 0xe0, 0xe0, 0x0, 0x2e8, 0x2e8, 0x2e8, 0x2e8, 0x2e8, 0x7fffffe, 0x0, {[{{@uncond, 0x0, 0x70, 0xe0, 0x0, {0x6020000}}, @common=@unspec=@NFLOG={0x70, 'NFLOG\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, "a4bcf0ebf5d09e8706580300b1000000124ac31d4fda375c7794e420aa63529ebcf847246a5e8846085b0a30510b266347a84ae5ffea89b8654e4400"}}}, {{@ip={@local, @multicast1, 0x0, 0x0, '\x00', 'wg1\x00'}, 0x0, 0x1c8, 0x208, 0x0, {}, [@common=@inet=@hashlimit3={{0x158}, {'bridge_slave_1\x00', {0x0, 0x8, 0x0, 0x0, 0x0, 0x7fff, 0x8}}}]}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "29f0be44329ad4d94a815c71ad95092b933b5e380a7e5d3c56c51e9d0027"}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x3e0) 23:07:53 executing program 4: perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0xc7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x12, 0xf7, 0x4, 0x3, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0xb000000}, 0x40) 23:07:53 executing program 3: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x15, 0x0, 0x1, 0x0, 0x6, @multicast}, 0x14) clone(0x2000000082148180, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_STRSET_GET(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000640)={&(0x7f00000006c0)=ANY=[@ANYBLOB="cccd30", @ANYRES16=0x0, @ANYBLOB="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", @ANYRES32=0x0, @ANYBLOB="1400020069703667726574617030000000000000140002006970366572f370616e20000000000000fa0ee59a22b338aeb6d3895b934764e9a674c87f74b9c35aaa183a9ea95194a3dc40d9b230a9f627acae68e5f0381078395e744b4197fe3dd12112adacad625f6ae8e22901a3dd5920796e7dc087d5033e12c9e4aea2026a5df4ee89adbeda48287c2840149cf27af2cc0f064680a7b5e90f480b201f70326baca201fea21a0100000000000000"], 0x1cc}, 0x1, 0x0, 0x0, 0x8800}, 0x20040040) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) request_key(0x0, &(0x7f0000001ffb)={'syz', 0x1}, 0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x1004) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0x3, 0x380, 0x0, 0xe0, 0xe0, 0xe0, 0x0, 0x2e8, 0x2e8, 0x2e8, 0x2e8, 0x2e8, 0x7fffffe, 0x0, {[{{@uncond, 0x0, 0x70, 0xe0, 0x0, {0x6020000}}, @common=@unspec=@NFLOG={0x70, 'NFLOG\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, "a4bcf0ebf5d09e8706000000b1000000124ac31d4fda375c7794e420aa63529ebcf847246a5e8846085b0a30510b266347a84ae5ffea89b8654e44420100"}}}, {{@ip={@local, @multicast1, 0x0, 0x0, '\x00', 'wg1\x00'}, 0x0, 0x1c8, 0x208, 0x0, {}, [@common=@inet=@hashlimit3={{0x158}, {'bridge_slave_1\x00', {0x0, 0x8, 0x0, 0x0, 0x0, 0x7fff, 0x8}}}]}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "29f0be44329ad4d94a815c71ad95092b933b5e380a7e5d3c56c51e9d0027"}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x3e0) 23:07:53 executing program 0: r0 = getpgrp(0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x24000000) r1 = gettid() perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000080), 0x30200, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) unshare(0x4000000) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, r3, 0x0) preadv(0xffffffffffffffff, &(0x7f00000002c0)=[{&(0x7f00000001c0)=""/251, 0xfb}], 0x1, 0x0, 0x0) bpf$ITER_CREATE(0x21, &(0x7f0000000100)={r2}, 0x9) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x26, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = perf_event_open(&(0x7f00000006c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c44}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80042407, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000140)={0x1, 0x80, 0x1, 0x7, 0x6, 0xff, 0x0, 0x2, 0x80200, 0xe, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x400, 0x1, @perf_bp={&(0x7f00000000c0), 0x8}, 0x18000, 0x8000, 0xfffffffc, 0x1, 0x1000000000, 0x8, 0x3, 0x0, 0x8, 0x0, 0x9}, r1, 0x2, r4, 0x2) clone(0x6cb2e100, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r1) wait4(0x0, 0x0, 0x0, 0x0) 23:07:53 executing program 4: perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0xc7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x12, 0xf7, 0x4, 0x3, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0xc000000}, 0x40) [ 2098.130472] x_tables: duplicate underflow at hook 2 [ 2100.090815] ieee802154 phy0 wpan0: encryption failed: -22 [ 2100.096561] ieee802154 phy1 wpan1: encryption failed: -22 23:07:55 executing program 1: r0 = getpgrp(0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x24000000) r1 = gettid() perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000, 0x0, 0x2af}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000080), 0x30200, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) unshare(0x4000000) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r3, 0x0) r4 = syz_open_dev$cec(&(0x7f0000000300), 0x3, 0x2) preadv(r4, &(0x7f00000002c0)=[{&(0x7f00000001c0)=""/251, 0xfb}], 0x1, 0xda3, 0x400001) bpf$ITER_CREATE(0x21, &(0x7f0000000100)={r2}, 0x9) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x26, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = perf_event_open(&(0x7f00000006c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c44}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ID(r5, 0x80042407, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000140)={0x1, 0x80, 0x1, 0x7, 0x6, 0xff, 0x0, 0x2, 0x80200, 0xe, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x400, 0x1, @perf_bp={&(0x7f00000000c0), 0x8}, 0x18000, 0x8000, 0xfffffffc, 0x1, 0x1000000000, 0x8, 0x3, 0x0, 0x8}, r1, 0x2, r5, 0x2) clone(0x6cb2e100, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r1) wait4(0x0, 0x0, 0x0, 0x0) 23:07:55 executing program 3: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x15, 0x0, 0x1, 0x0, 0x6, @multicast}, 0x14) clone(0x2000000082148180, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_STRSET_GET(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000640)={&(0x7f00000006c0)=ANY=[@ANYBLOB="cccd30", @ANYRES16=0x0, @ANYBLOB="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", @ANYRES32=0x0, @ANYBLOB="1400020069703667726574617030000000000000140002006970366572f370616e20000000000000fa0ee59a22b338aeb6d3895b934764e9a674c87f74b9c35aaa183a9ea95194a3dc40d9b230a9f627acae68e5f0381078395e744b4197fe3dd12112adacad625f6ae8e22901a3dd5920796e7dc087d5033e12c9e4aea2026a5df4ee89adbeda48287c2840149cf27af2cc0f064680a7b5e90f480b201f70326baca201fea21a0100000000000000"], 0x1cc}, 0x1, 0x0, 0x0, 0x8800}, 0x20040040) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) request_key(0x0, &(0x7f0000001ffb)={'syz', 0x1}, 0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x1004) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0x3, 0x380, 0x0, 0xe0, 0xe0, 0xe0, 0x0, 0x2e8, 0x2e8, 0x2e8, 0x2e8, 0x2e8, 0x7fffffe, 0x0, {[{{@uncond, 0x0, 0x70, 0xe0, 0x0, {0x6020000}}, @common=@unspec=@NFLOG={0x70, 'NFLOG\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, "a4bcf0ebf5d09e8706000000b1000000124ac31d4fda375c7794e420aa63529ebcf847246a5e8846085b0a30510b266347a84ae5ffea89b8654e444a0100"}}}, {{@ip={@local, @multicast1, 0x0, 0x0, '\x00', 'wg1\x00'}, 0x0, 0x1c8, 0x208, 0x0, {}, [@common=@inet=@hashlimit3={{0x158}, {'bridge_slave_1\x00', {0x0, 0x8, 0x0, 0x0, 0x0, 0x7fff, 0x8}}}]}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "29f0be44329ad4d94a815c71ad95092b933b5e380a7e5d3c56c51e9d0027"}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x3e0) 23:07:55 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x15, 0x0, 0x1, 0x0, 0x6, @multicast}, 0x14) clone(0x2000000082148180, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_STRSET_GET(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000640)={0x0, 0x1cc}, 0x1, 0x0, 0x0, 0x8800}, 0x20040040) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) request_key(0x0, &(0x7f0000001ffb)={'syz', 0x1}, 0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x1004) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x8, 0x3, 0x380, 0x0, 0xe0, 0xe0, 0xe0, 0x0, 0x2e8, 0x2e8, 0x2e8, 0x2e8, 0x2e8, 0x7fffffe, 0x0, {[{{@uncond, 0x0, 0x70, 0xe0, 0x0, {0x6020000}}, @common=@unspec=@NFLOG={0x70, 'NFLOG\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, "a4bcf0ebf5d09e8706580300b1000000124ac31d4fda375c7794e420aa63529ebcf847246a5e8846085b0a30510b266347a84ae5ffea89b8654e4400"}}}, {{@ip={@local, @multicast1, 0x0, 0x0, '\x00', 'wg1\x00'}, 0x0, 0x1c8, 0x208, 0x0, {}, [@common=@inet=@hashlimit3={{0x158}, {'bridge_slave_1\x00', {0x0, 0x8, 0x0, 0x0, 0x0, 0x7fff, 0x8}}}]}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "29f0be44329ad4d94a815c71ad95092b933b5e380a7e5d3c56c51e9d0027"}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x3e0) 23:07:55 executing program 4: perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0xc7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x12, 0xf7, 0x4, 0x3, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0xd000000}, 0x40) 23:07:55 executing program 0: r0 = getpgrp(0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x24000000) r1 = gettid() perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000080), 0x30200, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) unshare(0x4000000) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, r3, 0x0) preadv(0xffffffffffffffff, &(0x7f00000002c0)=[{&(0x7f00000001c0)=""/251, 0xfb}], 0x1, 0x0, 0x0) bpf$ITER_CREATE(0x21, &(0x7f0000000100)={r2}, 0x9) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x26, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = perf_event_open(&(0x7f00000006c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c44}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80042407, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000140)={0x1, 0x80, 0x1, 0x7, 0x6, 0xff, 0x0, 0x2, 0x80200, 0xe, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x400, 0x1, @perf_bp={&(0x7f00000000c0), 0x8}, 0x18000, 0x8000, 0xfffffffc, 0x1, 0x1000000000, 0x8, 0x3, 0x0, 0x8, 0x0, 0x9}, r1, 0x2, r4, 0x2) clone(0x6cb2e100, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r1) wait4(0x0, 0x0, 0x0, 0x0) 23:07:56 executing program 3: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x15, 0x0, 0x1, 0x0, 0x6, @multicast}, 0x14) clone(0x2000000082148180, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_STRSET_GET(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000640)={&(0x7f00000006c0)=ANY=[@ANYBLOB="cccd30", @ANYRES16=0x0, @ANYBLOB="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", @ANYRES32=0x0, @ANYBLOB="1400020069703667726574617030000000000000140002006970366572f370616e20000000000000fa0ee59a22b338aeb6d3895b934764e9a674c87f74b9c35aaa183a9ea95194a3dc40d9b230a9f627acae68e5f0381078395e744b4197fe3dd12112adacad625f6ae8e22901a3dd5920796e7dc087d5033e12c9e4aea2026a5df4ee89adbeda48287c2840149cf27af2cc0f064680a7b5e90f480b201f70326baca201fea21a0100000000000000"], 0x1cc}, 0x1, 0x0, 0x0, 0x8800}, 0x20040040) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) request_key(0x0, &(0x7f0000001ffb)={'syz', 0x1}, 0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x1004) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0x3, 0x380, 0x0, 0xe0, 0xe0, 0xe0, 0x0, 0x2e8, 0x2e8, 0x2e8, 0x2e8, 0x2e8, 0x7fffffe, 0x0, {[{{@uncond, 0x0, 0x70, 0xe0, 0x0, {0x6020000}}, @common=@unspec=@NFLOG={0x70, 'NFLOG\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, "a4bcf0ebf5d09e8706000000b1000000124ac31d4fda375c7794e420aa63529ebcf847246a5e8846085b0a30510b266347a84ae5ffea89b8654e446a0100"}}}, {{@ip={@local, @multicast1, 0x0, 0x0, '\x00', 'wg1\x00'}, 0x0, 0x1c8, 0x208, 0x0, {}, [@common=@inet=@hashlimit3={{0x158}, {'bridge_slave_1\x00', {0x0, 0x8, 0x0, 0x0, 0x0, 0x7fff, 0x8}}}]}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "29f0be44329ad4d94a815c71ad95092b933b5e380a7e5d3c56c51e9d0027"}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x3e0) 23:07:56 executing program 2: r0 = getpgrp(0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x24000000) r1 = gettid() perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000080), 0x30200, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) unshare(0x4000000) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, r3, 0x0) preadv(0xffffffffffffffff, &(0x7f00000002c0)=[{&(0x7f00000001c0)=""/251, 0xfb}], 0x1, 0x0, 0x0) bpf$ITER_CREATE(0x21, &(0x7f0000000100)={r2}, 0x9) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x26, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = perf_event_open(&(0x7f00000006c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c44}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ID(r4, 0x80042407, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000140)={0x1, 0x80, 0x0, 0x7, 0x0, 0xff, 0x0, 0x2, 0x0, 0xe, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x400, 0x1, @perf_bp={&(0x7f00000000c0), 0x8}, 0x18000, 0x8000, 0xfffffffc, 0x1, 0x1000000000, 0x8, 0x3, 0x0, 0x8, 0x0, 0x9}, r1, 0x2, r4, 0x2) clone(0x6cb2e100, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r1) wait4(0x0, 0x0, 0x0, 0x0) 23:07:56 executing program 4: perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0xc7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x12, 0xf7, 0x4, 0x3, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0xe000000}, 0x40) 23:07:56 executing program 3: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x15, 0x0, 0x1, 0x0, 0x6, @multicast}, 0x14) clone(0x2000000082148180, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_STRSET_GET(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000640)={&(0x7f00000006c0)=ANY=[@ANYBLOB="cccd30", @ANYRES16=0x0, @ANYBLOB="02002abd7000fbdbdf250100000004000300800102800c00018008000100070000002400018008000100070000000800010008000000080001000100000008000100060000001c0001800800010005000000080001000200000008000100000000002c000180080001000600000008000100070000000800010003000000080001000600000008000100000000005400018008000100060000000800010001000000080001000400000008000100000000000800010000000000080001000000000008000100000000000800010008000000080001000300000008000100020000001c0001800800010008000000080001000100000008000100050000001c0001800800010004000000080001000400000008000100010000002c000180080001000000000008000100040000000800010007000000080001000700000008000100080000004c0001800800010002000000080001000200000008000100050000000800010003000000080001000400000008000100040000000800010000000000080001000400000008000100030000003400018008000100", @ANYRES32=0x0, @ANYBLOB="1400020069703667726574617030000000000000140002006970366572f370616e20000000000000fa0ee59a22b338aeb6d3895b934764e9a674c87f74b9c35aaa183a9ea95194a3dc40d9b230a9f627acae68e5f0381078395e744b4197fe3dd12112adacad625f6ae8e22901a3dd5920796e7dc087d5033e12c9e4aea2026a5df4ee89adbeda48287c2840149cf27af2cc0f064680a7b5e90f480b201f70326baca201fea21a0100000000000000"], 0x1cc}, 0x1, 0x0, 0x0, 0x8800}, 0x20040040) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) request_key(0x0, &(0x7f0000001ffb)={'syz', 0x1}, 0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x1004) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0x3, 0x380, 0x0, 0xe0, 0xe0, 0xe0, 0x0, 0x2e8, 0x2e8, 0x2e8, 0x2e8, 0x2e8, 0x7fffffe, 0x0, {[{{@uncond, 0x0, 0x70, 0xe0, 0x0, {0x6020000}}, @common=@unspec=@NFLOG={0x70, 'NFLOG\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, "a4bcf0ebf5d09e8706000000b1000000124ac31d4fda375c7794e420aa63529ebcf847246a5e8846085b0a30510b266347a84ae5ffea89b8654e446d0100"}}}, {{@ip={@local, @multicast1, 0x0, 0x0, '\x00', 'wg1\x00'}, 0x0, 0x1c8, 0x208, 0x0, {}, [@common=@inet=@hashlimit3={{0x158}, {'bridge_slave_1\x00', {0x0, 0x8, 0x0, 0x0, 0x0, 0x7fff, 0x8}}}]}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "29f0be44329ad4d94a815c71ad95092b933b5e380a7e5d3c56c51e9d0027"}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x3e0) 23:07:56 executing program 1: r0 = getpgrp(0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x24000000) r1 = gettid() perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000, 0x0, 0x2af}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000080), 0x30200, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) unshare(0x4000000) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r3, 0x0) r4 = syz_open_dev$cec(&(0x7f0000000300), 0x3, 0x2) preadv(r4, &(0x7f00000002c0)=[{&(0x7f00000001c0)=""/251, 0xfb}], 0x1, 0xda3, 0x400001) bpf$ITER_CREATE(0x21, &(0x7f0000000100)={r2}, 0x9) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x26, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = perf_event_open(&(0x7f00000006c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c44}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ID(r5, 0x80042407, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000140)={0x1, 0x80, 0x1, 0x7, 0x6, 0xff, 0x0, 0x2, 0x80200, 0xe, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x400, 0x1, @perf_bp={&(0x7f00000000c0), 0x8}, 0x18000, 0x8000, 0xfffffffc, 0x1, 0x1000000000, 0x8, 0x3, 0x0, 0x8}, r1, 0x2, r5, 0x2) clone(0x6cb2e100, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r1) wait4(0x0, 0x0, 0x0, 0x0) 23:07:56 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x15, 0x0, 0x1, 0x0, 0x6, @multicast}, 0x14) clone(0x2000000082148180, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_STRSET_GET(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000640)={0x0, 0x1cc}, 0x1, 0x0, 0x0, 0x8800}, 0x20040040) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) request_key(0x0, &(0x7f0000001ffb)={'syz', 0x1}, 0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x1004) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0xa, 0x3, 0x380, 0x0, 0xe0, 0xe0, 0xe0, 0x0, 0x2e8, 0x2e8, 0x2e8, 0x2e8, 0x2e8, 0x7fffffe, 0x0, {[{{@uncond, 0x0, 0x70, 0xe0, 0x0, {0x6020000}}, @common=@unspec=@NFLOG={0x70, 'NFLOG\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, "a4bcf0ebf5d09e8706580300b1000000124ac31d4fda375c7794e420aa63529ebcf847246a5e8846085b0a30510b266347a84ae5ffea89b8654e4400"}}}, {{@ip={@local, @multicast1, 0x0, 0x0, '\x00', 'wg1\x00'}, 0x0, 0x1c8, 0x208, 0x0, {}, [@common=@inet=@hashlimit3={{0x158}, {'bridge_slave_1\x00', {0x0, 0x8, 0x0, 0x0, 0x0, 0x7fff, 0x8}}}]}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "29f0be44329ad4d94a815c71ad95092b933b5e380a7e5d3c56c51e9d0027"}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x3e0) 23:07:56 executing program 1: r0 = getpgrp(0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x24000000) r1 = gettid() perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000, 0x0, 0x2af}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000080), 0x30200, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) unshare(0x4000000) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r3, 0x0) r4 = syz_open_dev$cec(&(0x7f0000000300), 0x3, 0x2) preadv(r4, &(0x7f00000002c0)=[{&(0x7f00000001c0)=""/251, 0xfb}], 0x1, 0xda3, 0x400001) bpf$ITER_CREATE(0x21, &(0x7f0000000100)={r2}, 0x9) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x26, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = perf_event_open(&(0x7f00000006c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c44}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ID(r5, 0x80042407, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000140)={0x1, 0x80, 0x1, 0x7, 0x6, 0xff, 0x0, 0x2, 0x80200, 0xe, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x400, 0x1, @perf_bp={&(0x7f00000000c0), 0x8}, 0x18000, 0x8000, 0xfffffffc, 0x1, 0x1000000000, 0x8, 0x3, 0x0, 0x8}, r1, 0x2, r5, 0x2) clone(0x6cb2e100, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r1) wait4(0x0, 0x0, 0x0, 0x0) 23:07:56 executing program 4: perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0xc7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x12, 0xf7, 0x4, 0x3, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0xf000000}, 0x40) 23:07:56 executing program 3: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x15, 0x0, 0x1, 0x0, 0x6, @multicast}, 0x14) clone(0x2000000082148180, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_STRSET_GET(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000640)={&(0x7f00000006c0)=ANY=[@ANYBLOB="cccd30", @ANYRES16=0x0, @ANYBLOB="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", @ANYRES32=0x0, @ANYBLOB="1400020069703667726574617030000000000000140002006970366572f370616e20000000000000fa0ee59a22b338aeb6d3895b934764e9a674c87f74b9c35aaa183a9ea95194a3dc40d9b230a9f627acae68e5f0381078395e744b4197fe3dd12112adacad625f6ae8e22901a3dd5920796e7dc087d5033e12c9e4aea2026a5df4ee89adbeda48287c2840149cf27af2cc0f064680a7b5e90f480b201f70326baca201fea21a0100000000000000"], 0x1cc}, 0x1, 0x0, 0x0, 0x8800}, 0x20040040) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) request_key(0x0, &(0x7f0000001ffb)={'syz', 0x1}, 0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x1004) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0x3, 0x380, 0x0, 0xe0, 0xe0, 0xe0, 0x0, 0x2e8, 0x2e8, 0x2e8, 0x2e8, 0x2e8, 0x7fffffe, 0x0, {[{{@uncond, 0x0, 0x70, 0xe0, 0x0, {0x6020000}}, @common=@unspec=@NFLOG={0x70, 'NFLOG\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, "a4bcf0ebf5d09e8706000000b1000000124ac31d4fda375c7794e420aa63529ebcf847246a5e8846085b0a30510b266347a84ae5ffea89b8654e44720100"}}}, {{@ip={@local, @multicast1, 0x0, 0x0, '\x00', 'wg1\x00'}, 0x0, 0x1c8, 0x208, 0x0, {}, [@common=@inet=@hashlimit3={{0x158}, {'bridge_slave_1\x00', {0x0, 0x8, 0x0, 0x0, 0x0, 0x7fff, 0x8}}}]}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "29f0be44329ad4d94a815c71ad95092b933b5e380a7e5d3c56c51e9d0027"}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x3e0) 23:07:56 executing program 2: r0 = getpgrp(0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x24000000) r1 = gettid() perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000080), 0x30200, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) unshare(0x4000000) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, r3, 0x0) preadv(0xffffffffffffffff, &(0x7f00000002c0)=[{&(0x7f00000001c0)=""/251, 0xfb}], 0x1, 0x0, 0x0) bpf$ITER_CREATE(0x21, &(0x7f0000000100)={r2}, 0x9) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x26, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = perf_event_open(&(0x7f00000006c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c44}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ID(r4, 0x80042407, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000140)={0x1, 0x80, 0x0, 0x7, 0x0, 0xff, 0x0, 0x2, 0x0, 0xe, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x400, 0x1, @perf_bp={&(0x7f00000000c0), 0x8}, 0x18000, 0x8000, 0xfffffffc, 0x1, 0x1000000000, 0x8, 0x3, 0x0, 0x8, 0x0, 0x9}, r1, 0x2, r4, 0x2) clone(0x6cb2e100, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r1) wait4(0x0, 0x0, 0x0, 0x0) 23:07:56 executing program 4: perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0xc7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x12, 0xf7, 0x4, 0x3, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x10000000}, 0x40) [ 2101.369320] x_tables: duplicate underflow at hook 3 23:07:58 executing program 0: r0 = getpgrp(0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x24000000) r1 = gettid() perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000, 0x0, 0x2af}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000080), 0x30200, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) unshare(0x4000000) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r3, 0x0) r4 = syz_open_dev$cec(&(0x7f0000000300), 0x3, 0x2) preadv(r4, &(0x7f00000002c0)=[{&(0x7f00000001c0)=""/251, 0xfb}], 0x1, 0xda3, 0x400001) bpf$ITER_CREATE(0x21, &(0x7f0000000100)={r2}, 0x9) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x26, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = perf_event_open(&(0x7f00000006c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c44}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ID(r5, 0x80042407, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000140)={0x1, 0x80, 0x1, 0x7, 0x6, 0xff, 0x0, 0x2, 0x80200, 0xe, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x400, 0x1, @perf_bp={&(0x7f00000000c0), 0x8}, 0x18000, 0x8000, 0xfffffffc, 0x1, 0x1000000000, 0x8, 0x3, 0x0, 0x8, 0x0, 0x9}, r1, 0x2, r5, 0x2) clone(0x6cb2e100, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r1) wait4(0x0, 0x0, 0x0, 0x0) 23:07:58 executing program 3: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x15, 0x0, 0x1, 0x0, 0x6, @multicast}, 0x14) clone(0x2000000082148180, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_STRSET_GET(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000640)={&(0x7f00000006c0)=ANY=[@ANYBLOB="cccd30", @ANYRES16=0x0, @ANYBLOB="02002abd7000fbdbdf250100000004000300800102800c00018008000100070000002400018008000100070000000800010008000000080001000100000008000100060000001c0001800800010005000000080001000200000008000100000000002c000180080001000600000008000100070000000800010003000000080001000600000008000100000000005400018008000100060000000800010001000000080001000400000008000100000000000800010000000000080001000000000008000100000000000800010008000000080001000300000008000100020000001c0001800800010008000000080001000100000008000100050000001c0001800800010004000000080001000400000008000100010000002c000180080001000000000008000100040000000800010007000000080001000700000008000100080000004c0001800800010002000000080001000200000008000100050000000800010003000000080001000400000008000100040000000800010000000000080001000400000008000100030000003400018008000100", @ANYRES32=0x0, @ANYBLOB="1400020069703667726574617030000000000000140002006970366572f370616e20000000000000fa0ee59a22b338aeb6d3895b934764e9a674c87f74b9c35aaa183a9ea95194a3dc40d9b230a9f627acae68e5f0381078395e744b4197fe3dd12112adacad625f6ae8e22901a3dd5920796e7dc087d5033e12c9e4aea2026a5df4ee89adbeda48287c2840149cf27af2cc0f064680a7b5e90f480b201f70326baca201fea21a0100000000000000"], 0x1cc}, 0x1, 0x0, 0x0, 0x8800}, 0x20040040) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) request_key(0x0, &(0x7f0000001ffb)={'syz', 0x1}, 0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x1004) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0x3, 0x380, 0x0, 0xe0, 0xe0, 0xe0, 0x0, 0x2e8, 0x2e8, 0x2e8, 0x2e8, 0x2e8, 0x7fffffe, 0x0, {[{{@uncond, 0x0, 0x70, 0xe0, 0x0, {0x6020000}}, @common=@unspec=@NFLOG={0x70, 'NFLOG\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, "a4bcf0ebf5d09e8706000000b1000000124ac31d4fda375c7794e420aa63529ebcf847246a5e8846085b0a30510b266347a84ae5ffea89b8654e44a00100"}}}, {{@ip={@local, @multicast1, 0x0, 0x0, '\x00', 'wg1\x00'}, 0x0, 0x1c8, 0x208, 0x0, {}, [@common=@inet=@hashlimit3={{0x158}, {'bridge_slave_1\x00', {0x0, 0x8, 0x0, 0x0, 0x0, 0x7fff, 0x8}}}]}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "29f0be44329ad4d94a815c71ad95092b933b5e380a7e5d3c56c51e9d0027"}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x3e0) 23:07:58 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x15, 0x0, 0x1, 0x0, 0x6, @multicast}, 0x14) clone(0x2000000082148180, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_STRSET_GET(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000640)={0x0, 0x1cc}, 0x1, 0x0, 0x0, 0x8800}, 0x20040040) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) request_key(0x0, &(0x7f0000001ffb)={'syz', 0x1}, 0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x1004) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x11, 0x3, 0x380, 0x0, 0xe0, 0xe0, 0xe0, 0x0, 0x2e8, 0x2e8, 0x2e8, 0x2e8, 0x2e8, 0x7fffffe, 0x0, {[{{@uncond, 0x0, 0x70, 0xe0, 0x0, {0x6020000}}, @common=@unspec=@NFLOG={0x70, 'NFLOG\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, "a4bcf0ebf5d09e8706580300b1000000124ac31d4fda375c7794e420aa63529ebcf847246a5e8846085b0a30510b266347a84ae5ffea89b8654e4400"}}}, {{@ip={@local, @multicast1, 0x0, 0x0, '\x00', 'wg1\x00'}, 0x0, 0x1c8, 0x208, 0x0, {}, [@common=@inet=@hashlimit3={{0x158}, {'bridge_slave_1\x00', {0x0, 0x8, 0x0, 0x0, 0x0, 0x7fff, 0x8}}}]}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "29f0be44329ad4d94a815c71ad95092b933b5e380a7e5d3c56c51e9d0027"}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x3e0) 23:07:58 executing program 4: perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0xc7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x12, 0xf7, 0x4, 0x3, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x11000000}, 0x40) 23:07:59 executing program 4: perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0xc7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x12, 0xf7, 0x4, 0x3, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x12000000}, 0x40) [ 2103.806635] x_tables: duplicate underflow at hook 4 23:07:59 executing program 4: perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0xc7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x12, 0xf7, 0x4, 0x3, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x13000000}, 0x40) 23:07:59 executing program 0: r0 = getpgrp(0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x24000000) r1 = gettid() perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000, 0x0, 0x2af}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000080), 0x30200, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) unshare(0x4000000) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r3, 0x0) r4 = syz_open_dev$cec(&(0x7f0000000300), 0x3, 0x2) preadv(r4, &(0x7f00000002c0)=[{&(0x7f00000001c0)=""/251, 0xfb}], 0x1, 0xda3, 0x400001) bpf$ITER_CREATE(0x21, &(0x7f0000000100)={r2}, 0x9) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x26, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = perf_event_open(&(0x7f00000006c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c44}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ID(r5, 0x80042407, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000140)={0x1, 0x80, 0x1, 0x7, 0x6, 0xff, 0x0, 0x2, 0x80200, 0xe, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x400, 0x1, @perf_bp={&(0x7f00000000c0), 0x8}, 0x18000, 0x8000, 0xfffffffc, 0x1, 0x1000000000, 0x8, 0x3, 0x0, 0x8, 0x0, 0x9}, r1, 0x2, r5, 0x2) clone(0x6cb2e100, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r1) wait4(0x0, 0x0, 0x0, 0x0) 23:07:59 executing program 1: r0 = getpgrp(0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x24000000) r1 = gettid() perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000, 0x0, 0x2af}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000080), 0x30200, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) unshare(0x4000000) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r3, 0x0) r4 = syz_open_dev$cec(&(0x7f0000000300), 0x3, 0x2) preadv(r4, &(0x7f00000002c0)=[{&(0x7f00000001c0)=""/251, 0xfb}], 0x1, 0xda3, 0x400001) bpf$ITER_CREATE(0x21, &(0x7f0000000100)={r2}, 0x9) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x26, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = perf_event_open(&(0x7f00000006c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c44}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ID(r5, 0x80042407, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000140)={0x1, 0x80, 0x1, 0x7, 0x6, 0xff, 0x0, 0x2, 0x80200, 0xe, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x400, 0x1, @perf_bp={&(0x7f00000000c0), 0x8}, 0x18000, 0x8000, 0xfffffffc, 0x1, 0x1000000000, 0x8, 0x3, 0x0, 0x8, 0x0, 0x9}, 0x0, 0x2, r5, 0x2) clone(0x6cb2e100, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r1) wait4(0x0, 0x0, 0x0, 0x0) 23:07:59 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x15, 0x0, 0x1, 0x0, 0x6, @multicast}, 0x14) clone(0x2000000082148180, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_STRSET_GET(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000640)={0x0, 0x1cc}, 0x1, 0x0, 0x0, 0x8800}, 0x20040040) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) request_key(0x0, &(0x7f0000001ffb)={'syz', 0x1}, 0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x1004) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x672, 0x3, 0x380, 0x0, 0xe0, 0xe0, 0xe0, 0x0, 0x2e8, 0x2e8, 0x2e8, 0x2e8, 0x2e8, 0x7fffffe, 0x0, {[{{@uncond, 0x0, 0x70, 0xe0, 0x0, {0x6020000}}, @common=@unspec=@NFLOG={0x70, 'NFLOG\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, "a4bcf0ebf5d09e8706580300b1000000124ac31d4fda375c7794e420aa63529ebcf847246a5e8846085b0a30510b266347a84ae5ffea89b8654e4400"}}}, {{@ip={@local, @multicast1, 0x0, 0x0, '\x00', 'wg1\x00'}, 0x0, 0x1c8, 0x208, 0x0, {}, [@common=@inet=@hashlimit3={{0x158}, {'bridge_slave_1\x00', {0x0, 0x8, 0x0, 0x0, 0x0, 0x7fff, 0x8}}}]}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "29f0be44329ad4d94a815c71ad95092b933b5e380a7e5d3c56c51e9d0027"}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x3e0) 23:07:59 executing program 4: perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0xc7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x12, 0xf7, 0x4, 0x3, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x14000000}, 0x40) [ 2104.177418] x_tables: duplicate underflow at hook 4 23:07:59 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x15, 0x0, 0x1, 0x0, 0x6, @multicast}, 0x14) clone(0x2000000082148180, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_STRSET_GET(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000640)={0x0, 0x1cc}, 0x1, 0x0, 0x0, 0x8800}, 0x20040040) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) request_key(0x0, &(0x7f0000001ffb)={'syz', 0x1}, 0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x1004) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2000, 0x3, 0x380, 0x0, 0xe0, 0xe0, 0xe0, 0x0, 0x2e8, 0x2e8, 0x2e8, 0x2e8, 0x2e8, 0x7fffffe, 0x0, {[{{@uncond, 0x0, 0x70, 0xe0, 0x0, {0x6020000}}, @common=@unspec=@NFLOG={0x70, 'NFLOG\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, "a4bcf0ebf5d09e8706580300b1000000124ac31d4fda375c7794e420aa63529ebcf847246a5e8846085b0a30510b266347a84ae5ffea89b8654e4400"}}}, {{@ip={@local, @multicast1, 0x0, 0x0, '\x00', 'wg1\x00'}, 0x0, 0x1c8, 0x208, 0x0, {}, [@common=@inet=@hashlimit3={{0x158}, {'bridge_slave_1\x00', {0x0, 0x8, 0x0, 0x0, 0x0, 0x7fff, 0x8}}}]}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "29f0be44329ad4d94a815c71ad95092b933b5e380a7e5d3c56c51e9d0027"}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x3e0) 23:07:59 executing program 3: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x15, 0x0, 0x1, 0x0, 0x6, @multicast}, 0x14) clone(0x2000000082148180, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_STRSET_GET(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000640)={&(0x7f00000006c0)=ANY=[@ANYBLOB="cccd30", @ANYRES16=0x0, @ANYBLOB="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", @ANYRES32=0x0, @ANYBLOB="1400020069703667726574617030000000000000140002006970366572f370616e20000000000000fa0ee59a22b338aeb6d3895b934764e9a674c87f74b9c35aaa183a9ea95194a3dc40d9b230a9f627acae68e5f0381078395e744b4197fe3dd12112adacad625f6ae8e22901a3dd5920796e7dc087d5033e12c9e4aea2026a5df4ee89adbeda48287c2840149cf27af2cc0f064680a7b5e90f480b201f70326baca201fea21a0100000000000000"], 0x1cc}, 0x1, 0x0, 0x0, 0x8800}, 0x20040040) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) request_key(0x0, &(0x7f0000001ffb)={'syz', 0x1}, 0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x1004) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0x3, 0x380, 0x0, 0xe0, 0xe0, 0xe0, 0x0, 0x2e8, 0x2e8, 0x2e8, 0x2e8, 0x2e8, 0x7fffffe, 0x0, {[{{@uncond, 0x0, 0x70, 0xe0, 0x0, {0x6020000}}, @common=@unspec=@NFLOG={0x70, 'NFLOG\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, "a4bcf0ebf5d09e8706000000b1000000124ac31d4fda375c7794e420aa63529ebcf847246a5e8846085b0a30510b266347a84ae5ffea89b8654e44c70100"}}}, {{@ip={@local, @multicast1, 0x0, 0x0, '\x00', 'wg1\x00'}, 0x0, 0x1c8, 0x208, 0x0, {}, [@common=@inet=@hashlimit3={{0x158}, {'bridge_slave_1\x00', {0x0, 0x8, 0x0, 0x0, 0x0, 0x7fff, 0x8}}}]}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "29f0be44329ad4d94a815c71ad95092b933b5e380a7e5d3c56c51e9d0027"}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x3e0) 23:07:59 executing program 4: perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0xc7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x12, 0xf7, 0x4, 0x3, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x18000000}, 0x40) 23:07:59 executing program 2: r0 = getpgrp(0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x24000000) r1 = gettid() perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000080), 0x30200, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) unshare(0x4000000) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, r3, 0x0) preadv(0xffffffffffffffff, &(0x7f00000002c0)=[{&(0x7f00000001c0)=""/251, 0xfb}], 0x1, 0x0, 0x0) bpf$ITER_CREATE(0x21, &(0x7f0000000100)={r2}, 0x9) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x26, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = perf_event_open(&(0x7f00000006c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c44}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ID(r4, 0x80042407, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000140)={0x1, 0x80, 0x0, 0x7, 0x0, 0xff, 0x0, 0x2, 0x0, 0xe, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x400, 0x1, @perf_bp={&(0x7f00000000c0), 0x8}, 0x18000, 0x8000, 0xfffffffc, 0x1, 0x1000000000, 0x8, 0x3, 0x0, 0x8, 0x0, 0x9}, r1, 0x2, r4, 0x2) clone(0x6cb2e100, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r1) wait4(0x0, 0x0, 0x0, 0x0) 23:07:59 executing program 1: r0 = getpgrp(0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x24000000) r1 = gettid() perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000, 0x0, 0x2af}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000080), 0x30200, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) unshare(0x4000000) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r3, 0x0) r4 = syz_open_dev$cec(&(0x7f0000000300), 0x3, 0x2) preadv(r4, &(0x7f00000002c0)=[{&(0x7f00000001c0)=""/251, 0xfb}], 0x1, 0xda3, 0x400001) bpf$ITER_CREATE(0x21, &(0x7f0000000100)={r2}, 0x9) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x26, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = perf_event_open(&(0x7f00000006c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c44}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ID(r5, 0x80042407, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000140)={0x1, 0x80, 0x1, 0x7, 0x6, 0xff, 0x0, 0x2, 0x80200, 0xe, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x400, 0x1, @perf_bp={&(0x7f00000000c0), 0x8}, 0x18000, 0x8000, 0xfffffffc, 0x1, 0x1000000000, 0x8, 0x3, 0x0, 0x8, 0x0, 0x9}, 0x0, 0x2, r5, 0x2) clone(0x6cb2e100, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r1) wait4(0x0, 0x0, 0x0, 0x0) 23:07:59 executing program 4: perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0xc7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x12, 0xf7, 0x4, 0x3, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x47010000}, 0x40) 23:07:59 executing program 3: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x15, 0x0, 0x1, 0x0, 0x6, @multicast}, 0x14) clone(0x2000000082148180, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_STRSET_GET(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000640)={&(0x7f00000006c0)=ANY=[@ANYBLOB="cccd30", @ANYRES16=0x0, @ANYBLOB="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", @ANYRES32=0x0, @ANYBLOB="1400020069703667726574617030000000000000140002006970366572f370616e20000000000000fa0ee59a22b338aeb6d3895b934764e9a674c87f74b9c35aaa183a9ea95194a3dc40d9b230a9f627acae68e5f0381078395e744b4197fe3dd12112adacad625f6ae8e22901a3dd5920796e7dc087d5033e12c9e4aea2026a5df4ee89adbeda48287c2840149cf27af2cc0f064680a7b5e90f480b201f70326baca201fea21a0100000000000000"], 0x1cc}, 0x1, 0x0, 0x0, 0x8800}, 0x20040040) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) request_key(0x0, &(0x7f0000001ffb)={'syz', 0x1}, 0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x1004) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0x3, 0x380, 0x0, 0xe0, 0xe0, 0xe0, 0x0, 0x2e8, 0x2e8, 0x2e8, 0x2e8, 0x2e8, 0x7fffffe, 0x0, {[{{@uncond, 0x0, 0x70, 0xe0, 0x0, {0x6020000}}, @common=@unspec=@NFLOG={0x70, 'NFLOG\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, "a4bcf0ebf5d09e8706000000b1000000124ac31d4fda375c7794e420aa63529ebcf847246a5e8846085b0a30510b266347a84ae5ffea89b8654e44020200"}}}, {{@ip={@local, @multicast1, 0x0, 0x0, '\x00', 'wg1\x00'}, 0x0, 0x1c8, 0x208, 0x0, {}, [@common=@inet=@hashlimit3={{0x158}, {'bridge_slave_1\x00', {0x0, 0x8, 0x0, 0x0, 0x0, 0x7fff, 0x8}}}]}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "29f0be44329ad4d94a815c71ad95092b933b5e380a7e5d3c56c51e9d0027"}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x3e0) 23:07:59 executing program 4: perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0xc7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x12, 0xf7, 0x4, 0x3, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0xe4ffffff}, 0x40) 23:08:02 executing program 4: perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0xc7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x12, 0xf7, 0x4, 0x3, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0xffff8000}, 0x40) 23:08:02 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x15, 0x0, 0x1, 0x0, 0x6, @multicast}, 0x14) clone(0x2000000082148180, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_STRSET_GET(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000640)={0x0, 0x1cc}, 0x1, 0x0, 0x0, 0x8800}, 0x20040040) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) request_key(0x0, &(0x7f0000001ffb)={'syz', 0x1}, 0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x1004) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0x2, 0x380, 0x0, 0xe0, 0xe0, 0xe0, 0x0, 0x2e8, 0x2e8, 0x2e8, 0x2e8, 0x2e8, 0x7fffffe, 0x0, {[{{@uncond, 0x0, 0x70, 0xe0, 0x0, {0x6020000}}, @common=@unspec=@NFLOG={0x70, 'NFLOG\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, "a4bcf0ebf5d09e8706580300b1000000124ac31d4fda375c7794e420aa63529ebcf847246a5e8846085b0a30510b266347a84ae5ffea89b8654e4400"}}}, {{@ip={@local, @multicast1, 0x0, 0x0, '\x00', 'wg1\x00'}, 0x0, 0x1c8, 0x208, 0x0, {}, [@common=@inet=@hashlimit3={{0x158}, {'bridge_slave_1\x00', {0x0, 0x8, 0x0, 0x0, 0x0, 0x7fff, 0x8}}}]}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "29f0be44329ad4d94a815c71ad95092b933b5e380a7e5d3c56c51e9d0027"}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x3e0) 23:08:02 executing program 0: r0 = getpgrp(0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x24000000) r1 = gettid() perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000, 0x0, 0x2af}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000080), 0x30200, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) unshare(0x4000000) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r3, 0x0) r4 = syz_open_dev$cec(&(0x7f0000000300), 0x3, 0x2) preadv(r4, &(0x7f00000002c0)=[{&(0x7f00000001c0)=""/251, 0xfb}], 0x1, 0xda3, 0x400001) bpf$ITER_CREATE(0x21, &(0x7f0000000100)={r2}, 0x9) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x26, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = perf_event_open(&(0x7f00000006c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c44}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ID(r5, 0x80042407, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000140)={0x1, 0x80, 0x1, 0x7, 0x6, 0xff, 0x0, 0x2, 0x80200, 0xe, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x400, 0x1, @perf_bp={&(0x7f00000000c0), 0x8}, 0x18000, 0x8000, 0xfffffffc, 0x1, 0x1000000000, 0x8, 0x3, 0x0, 0x8, 0x0, 0x9}, r1, 0x2, r5, 0x2) clone(0x6cb2e100, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r1) wait4(0x0, 0x0, 0x0, 0x0) 23:08:02 executing program 3: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x15, 0x0, 0x1, 0x0, 0x6, @multicast}, 0x14) clone(0x2000000082148180, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_STRSET_GET(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000640)={&(0x7f00000006c0)=ANY=[@ANYBLOB="cccd30", @ANYRES16=0x0, @ANYBLOB="02002abd7000fbdbdf250100000004000300800102800c00018008000100070000002400018008000100070000000800010008000000080001000100000008000100060000001c0001800800010005000000080001000200000008000100000000002c000180080001000600000008000100070000000800010003000000080001000600000008000100000000005400018008000100060000000800010001000000080001000400000008000100000000000800010000000000080001000000000008000100000000000800010008000000080001000300000008000100020000001c0001800800010008000000080001000100000008000100050000001c0001800800010004000000080001000400000008000100010000002c000180080001000000000008000100040000000800010007000000080001000700000008000100080000004c0001800800010002000000080001000200000008000100050000000800010003000000080001000400000008000100040000000800010000000000080001000400000008000100030000003400018008000100", @ANYRES32=0x0, @ANYBLOB="1400020069703667726574617030000000000000140002006970366572f370616e20000000000000fa0ee59a22b338aeb6d3895b934764e9a674c87f74b9c35aaa183a9ea95194a3dc40d9b230a9f627acae68e5f0381078395e744b4197fe3dd12112adacad625f6ae8e22901a3dd5920796e7dc087d5033e12c9e4aea2026a5df4ee89adbeda48287c2840149cf27af2cc0f064680a7b5e90f480b201f70326baca201fea21a0100000000000000"], 0x1cc}, 0x1, 0x0, 0x0, 0x8800}, 0x20040040) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) request_key(0x0, &(0x7f0000001ffb)={'syz', 0x1}, 0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x1004) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0x3, 0x380, 0x0, 0xe0, 0xe0, 0xe0, 0x0, 0x2e8, 0x2e8, 0x2e8, 0x2e8, 0x2e8, 0x7fffffe, 0x0, {[{{@uncond, 0x0, 0x70, 0xe0, 0x0, {0x6020000}}, @common=@unspec=@NFLOG={0x70, 'NFLOG\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, "a4bcf0ebf5d09e8706000000b1000000124ac31d4fda375c7794e420aa63529ebcf847246a5e8846085b0a30510b266347a84ae5ffea89b8654e44080200"}}}, {{@ip={@local, @multicast1, 0x0, 0x0, '\x00', 'wg1\x00'}, 0x0, 0x1c8, 0x208, 0x0, {}, [@common=@inet=@hashlimit3={{0x158}, {'bridge_slave_1\x00', {0x0, 0x8, 0x0, 0x0, 0x0, 0x7fff, 0x8}}}]}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "29f0be44329ad4d94a815c71ad95092b933b5e380a7e5d3c56c51e9d0027"}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x3e0) 23:08:02 executing program 4: perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0xc7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x12, 0xf7, 0x4, 0x3, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0xffffffe4}, 0x40) 23:08:02 executing program 4: perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0xc7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x12, 0xf7, 0x4, 0x3}, 0x40) 23:08:02 executing program 1: r0 = getpgrp(0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x24000000) r1 = gettid() perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000, 0x0, 0x2af}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000080), 0x30200, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) unshare(0x4000000) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r3, 0x0) r4 = syz_open_dev$cec(&(0x7f0000000300), 0x3, 0x2) preadv(r4, &(0x7f00000002c0)=[{&(0x7f00000001c0)=""/251, 0xfb}], 0x1, 0xda3, 0x400001) bpf$ITER_CREATE(0x21, &(0x7f0000000100)={r2}, 0x9) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x26, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = perf_event_open(&(0x7f00000006c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c44}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ID(r5, 0x80042407, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000140)={0x1, 0x80, 0x1, 0x7, 0x6, 0xff, 0x0, 0x2, 0x80200, 0xe, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x400, 0x1, @perf_bp={&(0x7f00000000c0), 0x8}, 0x18000, 0x8000, 0xfffffffc, 0x1, 0x1000000000, 0x8, 0x3, 0x0, 0x8, 0x0, 0x9}, 0x0, 0x2, r5, 0x2) clone(0x6cb2e100, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r1) wait4(0x0, 0x0, 0x0, 0x0) 23:08:02 executing program 2: r0 = getpgrp(0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x24000000) r1 = gettid() perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000080), 0x30200, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) unshare(0x4000000) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, r3, 0x0) preadv(0xffffffffffffffff, &(0x7f00000002c0)=[{&(0x7f00000001c0)=""/251, 0xfb}], 0x1, 0x0, 0x0) bpf$ITER_CREATE(0x21, &(0x7f0000000100)={r2}, 0x9) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x26, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = perf_event_open(&(0x7f00000006c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c44}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ID(r4, 0x80042407, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000140)={0x1, 0x80, 0x0, 0x7, 0x0, 0xff, 0x0, 0x2, 0x0, 0xe, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x400, 0x1, @perf_bp={&(0x7f00000000c0), 0x8}, 0x18000, 0x8000, 0xfffffffc, 0x1, 0x1000000000, 0x8, 0x3, 0x0, 0x8, 0x0, 0x9}, r1, 0x2, r4, 0x2) clone(0x6cb2e100, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r1) wait4(0x0, 0x0, 0x0, 0x0) 23:08:02 executing program 4: perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0xc7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x12, 0xf7, 0x4, 0x3, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x2}, 0x40) 23:08:02 executing program 2: r0 = getpgrp(0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x24000000) r1 = gettid() perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000080), 0x30200, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) unshare(0x4000000) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, r3, 0x0) preadv(0xffffffffffffffff, &(0x7f00000002c0)=[{&(0x7f00000001c0)=""/251, 0xfb}], 0x1, 0x0, 0x0) bpf$ITER_CREATE(0x21, &(0x7f0000000100)={r2}, 0x9) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x26, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = perf_event_open(&(0x7f00000006c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c44}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ID(r4, 0x80042407, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000140)={0x1, 0x80, 0x0, 0x7, 0x0, 0xff, 0x0, 0x2, 0x0, 0xe, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x400, 0x1, @perf_bp={&(0x7f00000000c0), 0x8}, 0x18000, 0x8000, 0xfffffffc, 0x1, 0x1000000000, 0x8, 0x3, 0x0, 0x8, 0x0, 0x9}, r1, 0x2, r4, 0x2) clone(0x6cb2e100, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r1) wait4(0x0, 0x0, 0x0, 0x0) 23:08:02 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x15, 0x0, 0x1, 0x0, 0x6, @multicast}, 0x14) clone(0x2000000082148180, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_STRSET_GET(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000640)={0x0, 0x1cc}, 0x1, 0x0, 0x0, 0x8800}, 0x20040040) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) request_key(0x0, &(0x7f0000001ffb)={'syz', 0x1}, 0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x1004) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0x4, 0x380, 0x0, 0xe0, 0xe0, 0xe0, 0x0, 0x2e8, 0x2e8, 0x2e8, 0x2e8, 0x2e8, 0x7fffffe, 0x0, {[{{@uncond, 0x0, 0x70, 0xe0, 0x0, {0x6020000}}, @common=@unspec=@NFLOG={0x70, 'NFLOG\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, "a4bcf0ebf5d09e8706580300b1000000124ac31d4fda375c7794e420aa63529ebcf847246a5e8846085b0a30510b266347a84ae5ffea89b8654e4400"}}}, {{@ip={@local, @multicast1, 0x0, 0x0, '\x00', 'wg1\x00'}, 0x0, 0x1c8, 0x208, 0x0, {}, [@common=@inet=@hashlimit3={{0x158}, {'bridge_slave_1\x00', {0x0, 0x8, 0x0, 0x0, 0x0, 0x7fff, 0x8}}}]}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "29f0be44329ad4d94a815c71ad95092b933b5e380a7e5d3c56c51e9d0027"}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x3e0) 23:08:02 executing program 3: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x15, 0x0, 0x1, 0x0, 0x6, @multicast}, 0x14) clone(0x2000000082148180, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_STRSET_GET(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000640)={&(0x7f00000006c0)=ANY=[@ANYBLOB="cccd30", @ANYRES16=0x0, @ANYBLOB="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", @ANYRES32=0x0, @ANYBLOB="1400020069703667726574617030000000000000140002006970366572f370616e20000000000000fa0ee59a22b338aeb6d3895b934764e9a674c87f74b9c35aaa183a9ea95194a3dc40d9b230a9f627acae68e5f0381078395e744b4197fe3dd12112adacad625f6ae8e22901a3dd5920796e7dc087d5033e12c9e4aea2026a5df4ee89adbeda48287c2840149cf27af2cc0f064680a7b5e90f480b201f70326baca201fea21a0100000000000000"], 0x1cc}, 0x1, 0x0, 0x0, 0x8800}, 0x20040040) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) request_key(0x0, &(0x7f0000001ffb)={'syz', 0x1}, 0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x1004) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0x3, 0x380, 0x0, 0xe0, 0xe0, 0xe0, 0x0, 0x2e8, 0x2e8, 0x2e8, 0x2e8, 0x2e8, 0x7fffffe, 0x0, {[{{@uncond, 0x0, 0x70, 0xe0, 0x0, {0x6020000}}, @common=@unspec=@NFLOG={0x70, 'NFLOG\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, "a4bcf0ebf5d09e8706000000b1000000124ac31d4fda375c7794e420aa63529ebcf847246a5e8846085b0a30510b266347a84ae5ffea89b8654e441a0200"}}}, {{@ip={@local, @multicast1, 0x0, 0x0, '\x00', 'wg1\x00'}, 0x0, 0x1c8, 0x208, 0x0, {}, [@common=@inet=@hashlimit3={{0x158}, {'bridge_slave_1\x00', {0x0, 0x8, 0x0, 0x0, 0x0, 0x7fff, 0x8}}}]}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "29f0be44329ad4d94a815c71ad95092b933b5e380a7e5d3c56c51e9d0027"}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x3e0) 23:08:02 executing program 4: perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0xc7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x12, 0xf7, 0x4, 0x3, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x3}, 0x40) 23:08:02 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x15, 0x0, 0x1, 0x0, 0x6, @multicast}, 0x14) clone(0x2000000082148180, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_STRSET_GET(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000640)={0x0, 0x1cc}, 0x1, 0x0, 0x0, 0x8800}, 0x20040040) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) request_key(0x0, &(0x7f0000001ffb)={'syz', 0x1}, 0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x1004) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0x5, 0x380, 0x0, 0xe0, 0xe0, 0xe0, 0x0, 0x2e8, 0x2e8, 0x2e8, 0x2e8, 0x2e8, 0x7fffffe, 0x0, {[{{@uncond, 0x0, 0x70, 0xe0, 0x0, {0x6020000}}, @common=@unspec=@NFLOG={0x70, 'NFLOG\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, "a4bcf0ebf5d09e8706580300b1000000124ac31d4fda375c7794e420aa63529ebcf847246a5e8846085b0a30510b266347a84ae5ffea89b8654e4400"}}}, {{@ip={@local, @multicast1, 0x0, 0x0, '\x00', 'wg1\x00'}, 0x0, 0x1c8, 0x208, 0x0, {}, [@common=@inet=@hashlimit3={{0x158}, {'bridge_slave_1\x00', {0x0, 0x8, 0x0, 0x0, 0x0, 0x7fff, 0x8}}}]}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "29f0be44329ad4d94a815c71ad95092b933b5e380a7e5d3c56c51e9d0027"}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x3e0) 23:08:05 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x15, 0x0, 0x1, 0x0, 0x6, @multicast}, 0x14) clone(0x2000000082148180, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_STRSET_GET(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000640)={0x0, 0x1cc}, 0x1, 0x0, 0x0, 0x8800}, 0x20040040) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) request_key(0x0, &(0x7f0000001ffb)={'syz', 0x1}, 0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x1004) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0x11, 0x380, 0x0, 0xe0, 0xe0, 0xe0, 0x0, 0x2e8, 0x2e8, 0x2e8, 0x2e8, 0x2e8, 0x7fffffe, 0x0, {[{{@uncond, 0x0, 0x70, 0xe0, 0x0, {0x6020000}}, @common=@unspec=@NFLOG={0x70, 'NFLOG\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, "a4bcf0ebf5d09e8706580300b1000000124ac31d4fda375c7794e420aa63529ebcf847246a5e8846085b0a30510b266347a84ae5ffea89b8654e4400"}}}, {{@ip={@local, @multicast1, 0x0, 0x0, '\x00', 'wg1\x00'}, 0x0, 0x1c8, 0x208, 0x0, {}, [@common=@inet=@hashlimit3={{0x158}, {'bridge_slave_1\x00', {0x0, 0x8, 0x0, 0x0, 0x0, 0x7fff, 0x8}}}]}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "29f0be44329ad4d94a815c71ad95092b933b5e380a7e5d3c56c51e9d0027"}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x3e0) 23:08:05 executing program 4: perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0xc7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x12, 0xf7, 0x4, 0x3, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x4}, 0x40) 23:08:05 executing program 0: r0 = getpgrp(0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x24000000) r1 = gettid() perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000, 0x0, 0x2af}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000080), 0x30200, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) unshare(0x4000000) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r3, 0x0) r4 = syz_open_dev$cec(&(0x7f0000000300), 0x3, 0x2) preadv(r4, &(0x7f00000002c0)=[{&(0x7f00000001c0)=""/251, 0xfb}], 0x1, 0xda3, 0x400001) bpf$ITER_CREATE(0x21, &(0x7f0000000100)={r2}, 0x9) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x26, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = perf_event_open(&(0x7f00000006c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c44}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ID(r5, 0x80042407, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000140)={0x1, 0x80, 0x1, 0x7, 0x6, 0xff, 0x0, 0x2, 0x80200, 0xe, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x400, 0x1, @perf_bp={&(0x7f00000000c0), 0x8}, 0x18000, 0x8000, 0xfffffffc, 0x1, 0x1000000000, 0x8, 0x3, 0x0, 0x8, 0x0, 0x9}, r1, 0x2, r5, 0x2) clone(0x6cb2e100, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r1) wait4(0x0, 0x0, 0x0, 0x0) 23:08:05 executing program 3: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x15, 0x0, 0x1, 0x0, 0x6, @multicast}, 0x14) clone(0x2000000082148180, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_STRSET_GET(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000640)={&(0x7f00000006c0)=ANY=[@ANYBLOB="cccd30", @ANYRES16=0x0, @ANYBLOB="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", @ANYRES32=0x0, @ANYBLOB="1400020069703667726574617030000000000000140002006970366572f370616e20000000000000fa0ee59a22b338aeb6d3895b934764e9a674c87f74b9c35aaa183a9ea95194a3dc40d9b230a9f627acae68e5f0381078395e744b4197fe3dd12112adacad625f6ae8e22901a3dd5920796e7dc087d5033e12c9e4aea2026a5df4ee89adbeda48287c2840149cf27af2cc0f064680a7b5e90f480b201f70326baca201fea21a0100000000000000"], 0x1cc}, 0x1, 0x0, 0x0, 0x8800}, 0x20040040) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) request_key(0x0, &(0x7f0000001ffb)={'syz', 0x1}, 0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x1004) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0x3, 0x380, 0x0, 0xe0, 0xe0, 0xe0, 0x0, 0x2e8, 0x2e8, 0x2e8, 0x2e8, 0x2e8, 0x7fffffe, 0x0, {[{{@uncond, 0x0, 0x70, 0xe0, 0x0, {0x6020000}}, @common=@unspec=@NFLOG={0x70, 'NFLOG\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, "a4bcf0ebf5d09e8706000000b1000000124ac31d4fda375c7794e420aa63529ebcf847246a5e8846085b0a30510b266347a84ae5ffea89b8654e444c0200"}}}, {{@ip={@local, @multicast1, 0x0, 0x0, '\x00', 'wg1\x00'}, 0x0, 0x1c8, 0x208, 0x0, {}, [@common=@inet=@hashlimit3={{0x158}, {'bridge_slave_1\x00', {0x0, 0x8, 0x0, 0x0, 0x0, 0x7fff, 0x8}}}]}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "29f0be44329ad4d94a815c71ad95092b933b5e380a7e5d3c56c51e9d0027"}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x3e0) 23:08:05 executing program 4: perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0xc7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x12, 0xf7, 0x4, 0x3, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x40) 23:08:05 executing program 3: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x15, 0x0, 0x1, 0x0, 0x6, @multicast}, 0x14) clone(0x2000000082148180, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_STRSET_GET(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000640)={&(0x7f00000006c0)=ANY=[@ANYBLOB="cccd30", @ANYRES16=0x0, @ANYBLOB="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", @ANYRES32=0x0, @ANYBLOB="1400020069703667726574617030000000000000140002006970366572f370616e20000000000000fa0ee59a22b338aeb6d3895b934764e9a674c87f74b9c35aaa183a9ea95194a3dc40d9b230a9f627acae68e5f0381078395e744b4197fe3dd12112adacad625f6ae8e22901a3dd5920796e7dc087d5033e12c9e4aea2026a5df4ee89adbeda48287c2840149cf27af2cc0f064680a7b5e90f480b201f70326baca201fea21a0100000000000000"], 0x1cc}, 0x1, 0x0, 0x0, 0x8800}, 0x20040040) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) request_key(0x0, &(0x7f0000001ffb)={'syz', 0x1}, 0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x1004) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0x3, 0x380, 0x0, 0xe0, 0xe0, 0xe0, 0x0, 0x2e8, 0x2e8, 0x2e8, 0x2e8, 0x2e8, 0x7fffffe, 0x0, {[{{@uncond, 0x0, 0x70, 0xe0, 0x0, {0x6020000}}, @common=@unspec=@NFLOG={0x70, 'NFLOG\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, "a4bcf0ebf5d09e8706000000b1000000124ac31d4fda375c7794e420aa63529ebcf847246a5e8846085b0a30510b266347a84ae5ffea89b8654e446e0200"}}}, {{@ip={@local, @multicast1, 0x0, 0x0, '\x00', 'wg1\x00'}, 0x0, 0x1c8, 0x208, 0x0, {}, [@common=@inet=@hashlimit3={{0x158}, {'bridge_slave_1\x00', {0x0, 0x8, 0x0, 0x0, 0x0, 0x7fff, 0x8}}}]}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "29f0be44329ad4d94a815c71ad95092b933b5e380a7e5d3c56c51e9d0027"}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x3e0) 23:08:05 executing program 1: r0 = getpgrp(0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x24000000) r1 = gettid() perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000, 0x0, 0x2af}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000080), 0x30200, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) unshare(0x4000000) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r3, 0x0) r4 = syz_open_dev$cec(&(0x7f0000000300), 0x3, 0x2) preadv(r4, &(0x7f00000002c0)=[{&(0x7f00000001c0)=""/251, 0xfb}], 0x1, 0xda3, 0x400001) bpf$ITER_CREATE(0x21, &(0x7f0000000100)={r2}, 0x9) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x26, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = perf_event_open(&(0x7f00000006c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c44}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ID(r5, 0x80042407, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000140)={0x1, 0x80, 0x1, 0x7, 0x6, 0xff, 0x0, 0x2, 0x80200, 0xe, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x400, 0x1, @perf_bp={&(0x7f00000000c0), 0x8}, 0x18000, 0x8000, 0xfffffffc, 0x1, 0x1000000000, 0x8, 0x3, 0x0, 0x8, 0x0, 0x9}, r1, 0x0, r5, 0x2) clone(0x6cb2e100, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r1) wait4(0x0, 0x0, 0x0, 0x0) 23:08:05 executing program 2: r0 = getpgrp(0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x24000000) r1 = gettid() perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000080), 0x30200, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) unshare(0x4000000) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, r3, 0x0) preadv(0xffffffffffffffff, &(0x7f00000002c0)=[{&(0x7f00000001c0)=""/251, 0xfb}], 0x1, 0x0, 0x0) bpf$ITER_CREATE(0x21, &(0x7f0000000100)={r2}, 0x9) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x26, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = perf_event_open(&(0x7f00000006c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c44}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ID(r4, 0x80042407, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000140)={0x1, 0x80, 0x0, 0x7, 0x0, 0xff, 0x0, 0x2, 0x0, 0xe, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x400, 0x1, @perf_bp={&(0x7f00000000c0), 0x8}, 0x18000, 0x8000, 0xfffffffc, 0x1, 0x1000000000, 0x8, 0x3, 0x0, 0x8, 0x0, 0x9}, r1, 0x2, r4, 0x2) clone(0x6cb2e100, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r1) wait4(0x0, 0x0, 0x0, 0x0) 23:08:05 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x15, 0x0, 0x1, 0x0, 0x6, @multicast}, 0x14) clone(0x2000000082148180, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_STRSET_GET(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000640)={0x0, 0x1cc}, 0x1, 0x0, 0x0, 0x8800}, 0x20040040) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) request_key(0x0, &(0x7f0000001ffb)={'syz', 0x1}, 0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x1004) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0x2000, 0x380, 0x0, 0xe0, 0xe0, 0xe0, 0x0, 0x2e8, 0x2e8, 0x2e8, 0x2e8, 0x2e8, 0x7fffffe, 0x0, {[{{@uncond, 0x0, 0x70, 0xe0, 0x0, {0x6020000}}, @common=@unspec=@NFLOG={0x70, 'NFLOG\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, "a4bcf0ebf5d09e8706580300b1000000124ac31d4fda375c7794e420aa63529ebcf847246a5e8846085b0a30510b266347a84ae5ffea89b8654e4400"}}}, {{@ip={@local, @multicast1, 0x0, 0x0, '\x00', 'wg1\x00'}, 0x0, 0x1c8, 0x208, 0x0, {}, [@common=@inet=@hashlimit3={{0x158}, {'bridge_slave_1\x00', {0x0, 0x8, 0x0, 0x0, 0x0, 0x7fff, 0x8}}}]}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "29f0be44329ad4d94a815c71ad95092b933b5e380a7e5d3c56c51e9d0027"}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x3e0) 23:08:05 executing program 4: perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0xc7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x12, 0xf7, 0x4, 0x3, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x6}, 0x40) 23:08:05 executing program 3: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x15, 0x0, 0x1, 0x0, 0x6, @multicast}, 0x14) clone(0x2000000082148180, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_STRSET_GET(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000640)={&(0x7f00000006c0)=ANY=[@ANYBLOB="cccd30", @ANYRES16=0x0, @ANYBLOB="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", @ANYRES32=0x0, @ANYBLOB="1400020069703667726574617030000000000000140002006970366572f370616e20000000000000fa0ee59a22b338aeb6d3895b934764e9a674c87f74b9c35aaa183a9ea95194a3dc40d9b230a9f627acae68e5f0381078395e744b4197fe3dd12112adacad625f6ae8e22901a3dd5920796e7dc087d5033e12c9e4aea2026a5df4ee89adbeda48287c2840149cf27af2cc0f064680a7b5e90f480b201f70326baca201fea21a0100000000000000"], 0x1cc}, 0x1, 0x0, 0x0, 0x8800}, 0x20040040) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) request_key(0x0, &(0x7f0000001ffb)={'syz', 0x1}, 0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x1004) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0x3, 0x380, 0x0, 0xe0, 0xe0, 0xe0, 0x0, 0x2e8, 0x2e8, 0x2e8, 0x2e8, 0x2e8, 0x7fffffe, 0x0, {[{{@uncond, 0x0, 0x70, 0xe0, 0x0, {0x6020000}}, @common=@unspec=@NFLOG={0x70, 'NFLOG\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, "a4bcf0ebf5d09e8706000000b1000000124ac31d4fda375c7794e420aa63529ebcf847246a5e8846085b0a30510b266347a84ae5ffea89b8654e44700200"}}}, {{@ip={@local, @multicast1, 0x0, 0x0, '\x00', 'wg1\x00'}, 0x0, 0x1c8, 0x208, 0x0, {}, [@common=@inet=@hashlimit3={{0x158}, {'bridge_slave_1\x00', {0x0, 0x8, 0x0, 0x0, 0x0, 0x7fff, 0x8}}}]}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "29f0be44329ad4d94a815c71ad95092b933b5e380a7e5d3c56c51e9d0027"}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x3e0) 23:08:05 executing program 4: perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0xc7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x12, 0xf7, 0x4, 0x3, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x40) 23:08:05 executing program 3: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x15, 0x0, 0x1, 0x0, 0x6, @multicast}, 0x14) clone(0x2000000082148180, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_STRSET_GET(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000640)={&(0x7f00000006c0)=ANY=[@ANYBLOB="cccd30", @ANYRES16=0x0, @ANYBLOB="02002abd7000fbdbdf250100000004000300800102800c00018008000100070000002400018008000100070000000800010008000000080001000100000008000100060000001c0001800800010005000000080001000200000008000100000000002c000180080001000600000008000100070000000800010003000000080001000600000008000100000000005400018008000100060000000800010001000000080001000400000008000100000000000800010000000000080001000000000008000100000000000800010008000000080001000300000008000100020000001c0001800800010008000000080001000100000008000100050000001c0001800800010004000000080001000400000008000100010000002c000180080001000000000008000100040000000800010007000000080001000700000008000100080000004c0001800800010002000000080001000200000008000100050000000800010003000000080001000400000008000100040000000800010000000000080001000400000008000100030000003400018008000100", @ANYRES32=0x0, @ANYBLOB="1400020069703667726574617030000000000000140002006970366572f370616e20000000000000fa0ee59a22b338aeb6d3895b934764e9a674c87f74b9c35aaa183a9ea95194a3dc40d9b230a9f627acae68e5f0381078395e744b4197fe3dd12112adacad625f6ae8e22901a3dd5920796e7dc087d5033e12c9e4aea2026a5df4ee89adbeda48287c2840149cf27af2cc0f064680a7b5e90f480b201f70326baca201fea21a0100000000000000"], 0x1cc}, 0x1, 0x0, 0x0, 0x8800}, 0x20040040) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) request_key(0x0, &(0x7f0000001ffb)={'syz', 0x1}, 0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x1004) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0x3, 0x380, 0x0, 0xe0, 0xe0, 0xe0, 0x0, 0x2e8, 0x2e8, 0x2e8, 0x2e8, 0x2e8, 0x7fffffe, 0x0, {[{{@uncond, 0x0, 0x70, 0xe0, 0x0, {0x6020000}}, @common=@unspec=@NFLOG={0x70, 'NFLOG\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, "a4bcf0ebf5d09e8706000000b1000000124ac31d4fda375c7794e420aa63529ebcf847246a5e8846085b0a30510b266347a84ae5ffea89b8654e44880200"}}}, {{@ip={@local, @multicast1, 0x0, 0x0, '\x00', 'wg1\x00'}, 0x0, 0x1c8, 0x208, 0x0, {}, [@common=@inet=@hashlimit3={{0x158}, {'bridge_slave_1\x00', {0x0, 0x8, 0x0, 0x0, 0x0, 0x7fff, 0x8}}}]}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "29f0be44329ad4d94a815c71ad95092b933b5e380a7e5d3c56c51e9d0027"}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x3e0) 23:08:05 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x15, 0x0, 0x1, 0x0, 0x6, @multicast}, 0x14) clone(0x2000000082148180, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_STRSET_GET(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000640)={0x0, 0x1cc}, 0x1, 0x0, 0x0, 0x8800}, 0x20040040) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) request_key(0x0, &(0x7f0000001ffb)={'syz', 0x1}, 0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x1004) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0x1fffff, 0x380, 0x0, 0xe0, 0xe0, 0xe0, 0x0, 0x2e8, 0x2e8, 0x2e8, 0x2e8, 0x2e8, 0x7fffffe, 0x0, {[{{@uncond, 0x0, 0x70, 0xe0, 0x0, {0x6020000}}, @common=@unspec=@NFLOG={0x70, 'NFLOG\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, "a4bcf0ebf5d09e8706580300b1000000124ac31d4fda375c7794e420aa63529ebcf847246a5e8846085b0a30510b266347a84ae5ffea89b8654e4400"}}}, {{@ip={@local, @multicast1, 0x0, 0x0, '\x00', 'wg1\x00'}, 0x0, 0x1c8, 0x208, 0x0, {}, [@common=@inet=@hashlimit3={{0x158}, {'bridge_slave_1\x00', {0x0, 0x8, 0x0, 0x0, 0x0, 0x7fff, 0x8}}}]}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "29f0be44329ad4d94a815c71ad95092b933b5e380a7e5d3c56c51e9d0027"}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x3e0) 23:08:08 executing program 4: perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0xc7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x12, 0xf7, 0x4, 0x3, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x8}, 0x40) 23:08:08 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x15, 0x0, 0x1, 0x0, 0x6, @multicast}, 0x14) clone(0x2000000082148180, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_STRSET_GET(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000640)={0x0, 0x1cc}, 0x1, 0x0, 0x0, 0x8800}, 0x20040040) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) request_key(0x0, &(0x7f0000001ffb)={'syz', 0x1}, 0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x1004) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0x8000000, 0x380, 0x0, 0xe0, 0xe0, 0xe0, 0x0, 0x2e8, 0x2e8, 0x2e8, 0x2e8, 0x2e8, 0x7fffffe, 0x0, {[{{@uncond, 0x0, 0x70, 0xe0, 0x0, {0x6020000}}, @common=@unspec=@NFLOG={0x70, 'NFLOG\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, "a4bcf0ebf5d09e8706580300b1000000124ac31d4fda375c7794e420aa63529ebcf847246a5e8846085b0a30510b266347a84ae5ffea89b8654e4400"}}}, {{@ip={@local, @multicast1, 0x0, 0x0, '\x00', 'wg1\x00'}, 0x0, 0x1c8, 0x208, 0x0, {}, [@common=@inet=@hashlimit3={{0x158}, {'bridge_slave_1\x00', {0x0, 0x8, 0x0, 0x0, 0x0, 0x7fff, 0x8}}}]}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "29f0be44329ad4d94a815c71ad95092b933b5e380a7e5d3c56c51e9d0027"}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x3e0) 23:08:08 executing program 0: r0 = getpgrp(0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x24000000) r1 = gettid() perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000, 0x0, 0x2af}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000080), 0x30200, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) unshare(0x4000000) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r3, 0x0) r4 = syz_open_dev$cec(&(0x7f0000000300), 0x3, 0x2) preadv(r4, &(0x7f00000002c0)=[{&(0x7f00000001c0)=""/251, 0xfb}], 0x1, 0xda3, 0x400001) bpf$ITER_CREATE(0x21, &(0x7f0000000100)={r2}, 0x9) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x26, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = perf_event_open(&(0x7f00000006c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c44}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ID(r5, 0x80042407, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000140)={0x1, 0x80, 0x1, 0x7, 0x6, 0xff, 0x0, 0x2, 0x80200, 0xe, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x400, 0x1, @perf_bp={&(0x7f00000000c0), 0x8}, 0x18000, 0x8000, 0xfffffffc, 0x1, 0x1000000000, 0x8, 0x3, 0x0, 0x8, 0x0, 0x9}, r1, 0x2, r5, 0x2) clone(0x6cb2e100, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r1) wait4(0x0, 0x0, 0x0, 0x0) 23:08:08 executing program 3: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x15, 0x0, 0x1, 0x0, 0x6, @multicast}, 0x14) clone(0x2000000082148180, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_STRSET_GET(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000640)={&(0x7f00000006c0)=ANY=[@ANYBLOB="cccd30", @ANYRES16=0x0, @ANYBLOB="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", @ANYRES32=0x0, @ANYBLOB="1400020069703667726574617030000000000000140002006970366572f370616e20000000000000fa0ee59a22b338aeb6d3895b934764e9a674c87f74b9c35aaa183a9ea95194a3dc40d9b230a9f627acae68e5f0381078395e744b4197fe3dd12112adacad625f6ae8e22901a3dd5920796e7dc087d5033e12c9e4aea2026a5df4ee89adbeda48287c2840149cf27af2cc0f064680a7b5e90f480b201f70326baca201fea21a0100000000000000"], 0x1cc}, 0x1, 0x0, 0x0, 0x8800}, 0x20040040) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) request_key(0x0, &(0x7f0000001ffb)={'syz', 0x1}, 0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x1004) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0x3, 0x380, 0x0, 0xe0, 0xe0, 0xe0, 0x0, 0x2e8, 0x2e8, 0x2e8, 0x2e8, 0x2e8, 0x7fffffe, 0x0, {[{{@uncond, 0x0, 0x70, 0xe0, 0x0, {0x6020000}}, @common=@unspec=@NFLOG={0x70, 'NFLOG\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, "a4bcf0ebf5d09e8706000000b1000000124ac31d4fda375c7794e420aa63529ebcf847246a5e8846085b0a30510b266347a84ae5ffea89b8654e44910200"}}}, {{@ip={@local, @multicast1, 0x0, 0x0, '\x00', 'wg1\x00'}, 0x0, 0x1c8, 0x208, 0x0, {}, [@common=@inet=@hashlimit3={{0x158}, {'bridge_slave_1\x00', {0x0, 0x8, 0x0, 0x0, 0x0, 0x7fff, 0x8}}}]}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "29f0be44329ad4d94a815c71ad95092b933b5e380a7e5d3c56c51e9d0027"}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x3e0) 23:08:08 executing program 1: r0 = getpgrp(0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x24000000) r1 = gettid() perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000, 0x0, 0x2af}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000080), 0x30200, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) unshare(0x4000000) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r3, 0x0) r4 = syz_open_dev$cec(&(0x7f0000000300), 0x3, 0x2) preadv(r4, &(0x7f00000002c0)=[{&(0x7f00000001c0)=""/251, 0xfb}], 0x1, 0xda3, 0x400001) bpf$ITER_CREATE(0x21, &(0x7f0000000100)={r2}, 0x9) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x26, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = perf_event_open(&(0x7f00000006c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c44}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ID(r5, 0x80042407, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000140)={0x1, 0x80, 0x1, 0x7, 0x6, 0xff, 0x0, 0x2, 0x80200, 0xe, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x400, 0x1, @perf_bp={&(0x7f00000000c0), 0x8}, 0x18000, 0x8000, 0xfffffffc, 0x1, 0x1000000000, 0x8, 0x3, 0x0, 0x8, 0x0, 0x9}, r1, 0x0, r5, 0x2) clone(0x6cb2e100, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r1) wait4(0x0, 0x0, 0x0, 0x0) 23:08:08 executing program 2: r0 = getpgrp(0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x24000000) r1 = gettid() perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000080), 0x30200, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) unshare(0x4000000) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, r3, 0x0) preadv(0xffffffffffffffff, &(0x7f00000002c0)=[{&(0x7f00000001c0)=""/251, 0xfb}], 0x1, 0x0, 0x0) bpf$ITER_CREATE(0x21, &(0x7f0000000100)={r2}, 0x9) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x26, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = perf_event_open(&(0x7f00000006c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c44}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ID(r4, 0x80042407, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000140)={0x1, 0x80, 0x0, 0x7, 0x0, 0xff, 0x0, 0x2, 0x0, 0xe, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x400, 0x1, @perf_bp={&(0x7f00000000c0), 0x8}, 0x18000, 0x8000, 0xfffffffc, 0x1, 0x1000000000, 0x8, 0x3, 0x0, 0x8, 0x0, 0x9}, r1, 0x2, r4, 0x2) clone(0x6cb2e100, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r1) wait4(0x0, 0x0, 0x0, 0x0) 23:08:08 executing program 4: perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0xc7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x12, 0xf7, 0x4, 0x3, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x40) 23:08:08 executing program 1: r0 = getpgrp(0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x24000000) r1 = gettid() perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000, 0x0, 0x2af}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000080), 0x30200, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) unshare(0x4000000) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r3, 0x0) r4 = syz_open_dev$cec(&(0x7f0000000300), 0x3, 0x2) preadv(r4, &(0x7f00000002c0)=[{&(0x7f00000001c0)=""/251, 0xfb}], 0x1, 0xda3, 0x400001) bpf$ITER_CREATE(0x21, &(0x7f0000000100)={r2}, 0x9) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x26, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = perf_event_open(&(0x7f00000006c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c44}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ID(r5, 0x80042407, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000140)={0x1, 0x80, 0x1, 0x7, 0x6, 0xff, 0x0, 0x2, 0x80200, 0xe, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x400, 0x1, @perf_bp={&(0x7f00000000c0), 0x8}, 0x18000, 0x8000, 0xfffffffc, 0x1, 0x1000000000, 0x8, 0x3, 0x0, 0x8, 0x0, 0x9}, r1, 0x0, r5, 0x2) clone(0x6cb2e100, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r1) wait4(0x0, 0x0, 0x0, 0x0) 23:08:08 executing program 3: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x15, 0x0, 0x1, 0x0, 0x6, @multicast}, 0x14) clone(0x2000000082148180, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_STRSET_GET(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000640)={&(0x7f00000006c0)=ANY=[@ANYBLOB="cccd30", @ANYRES16=0x0, @ANYBLOB="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", @ANYRES32=0x0, @ANYBLOB="1400020069703667726574617030000000000000140002006970366572f370616e20000000000000fa0ee59a22b338aeb6d3895b934764e9a674c87f74b9c35aaa183a9ea95194a3dc40d9b230a9f627acae68e5f0381078395e744b4197fe3dd12112adacad625f6ae8e22901a3dd5920796e7dc087d5033e12c9e4aea2026a5df4ee89adbeda48287c2840149cf27af2cc0f064680a7b5e90f480b201f70326baca201fea21a0100000000000000"], 0x1cc}, 0x1, 0x0, 0x0, 0x8800}, 0x20040040) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) request_key(0x0, &(0x7f0000001ffb)={'syz', 0x1}, 0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x1004) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0x3, 0x380, 0x0, 0xe0, 0xe0, 0xe0, 0x0, 0x2e8, 0x2e8, 0x2e8, 0x2e8, 0x2e8, 0x7fffffe, 0x0, {[{{@uncond, 0x0, 0x70, 0xe0, 0x0, {0x6020000}}, @common=@unspec=@NFLOG={0x70, 'NFLOG\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, "a4bcf0ebf5d09e8706000000b1000000124ac31d4fda375c7794e420aa63529ebcf847246a5e8846085b0a30510b266347a84ae5ffea89b8654e44aa0200"}}}, {{@ip={@local, @multicast1, 0x0, 0x0, '\x00', 'wg1\x00'}, 0x0, 0x1c8, 0x208, 0x0, {}, [@common=@inet=@hashlimit3={{0x158}, {'bridge_slave_1\x00', {0x0, 0x8, 0x0, 0x0, 0x0, 0x7fff, 0x8}}}]}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "29f0be44329ad4d94a815c71ad95092b933b5e380a7e5d3c56c51e9d0027"}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x3e0) 23:08:08 executing program 4: perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0xc7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x12, 0xf7, 0x4, 0x3, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0xa}, 0x40) 23:08:08 executing program 3: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x15, 0x0, 0x1, 0x0, 0x6, @multicast}, 0x14) clone(0x2000000082148180, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_STRSET_GET(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000640)={&(0x7f00000006c0)=ANY=[@ANYBLOB="cccd30", @ANYRES16=0x0, @ANYBLOB="02002abd7000fbdbdf250100000004000300800102800c00018008000100070000002400018008000100070000000800010008000000080001000100000008000100060000001c0001800800010005000000080001000200000008000100000000002c000180080001000600000008000100070000000800010003000000080001000600000008000100000000005400018008000100060000000800010001000000080001000400000008000100000000000800010000000000080001000000000008000100000000000800010008000000080001000300000008000100020000001c0001800800010008000000080001000100000008000100050000001c0001800800010004000000080001000400000008000100010000002c000180080001000000000008000100040000000800010007000000080001000700000008000100080000004c0001800800010002000000080001000200000008000100050000000800010003000000080001000400000008000100040000000800010000000000080001000400000008000100030000003400018008000100", @ANYRES32=0x0, @ANYBLOB="1400020069703667726574617030000000000000140002006970366572f370616e20000000000000fa0ee59a22b338aeb6d3895b934764e9a674c87f74b9c35aaa183a9ea95194a3dc40d9b230a9f627acae68e5f0381078395e744b4197fe3dd12112adacad625f6ae8e22901a3dd5920796e7dc087d5033e12c9e4aea2026a5df4ee89adbeda48287c2840149cf27af2cc0f064680a7b5e90f480b201f70326baca201fea21a0100000000000000"], 0x1cc}, 0x1, 0x0, 0x0, 0x8800}, 0x20040040) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) request_key(0x0, &(0x7f0000001ffb)={'syz', 0x1}, 0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x1004) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0x3, 0x380, 0x0, 0xe0, 0xe0, 0xe0, 0x0, 0x2e8, 0x2e8, 0x2e8, 0x2e8, 0x2e8, 0x7fffffe, 0x0, {[{{@uncond, 0x0, 0x70, 0xe0, 0x0, {0x6020000}}, @common=@unspec=@NFLOG={0x70, 'NFLOG\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, "a4bcf0ebf5d09e8706000000b1000000124ac31d4fda375c7794e420aa63529ebcf847246a5e8846085b0a30510b266347a84ae5ffea89b8654e44ae0200"}}}, {{@ip={@local, @multicast1, 0x0, 0x0, '\x00', 'wg1\x00'}, 0x0, 0x1c8, 0x208, 0x0, {}, [@common=@inet=@hashlimit3={{0x158}, {'bridge_slave_1\x00', {0x0, 0x8, 0x0, 0x0, 0x0, 0x7fff, 0x8}}}]}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "29f0be44329ad4d94a815c71ad95092b933b5e380a7e5d3c56c51e9d0027"}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x3e0) 23:08:08 executing program 4: perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0xc7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x12, 0xf7, 0x4, 0x3, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0xb}, 0x40) 23:08:09 executing program 3: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x15, 0x0, 0x1, 0x0, 0x6, @multicast}, 0x14) clone(0x2000000082148180, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_STRSET_GET(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000640)={&(0x7f00000006c0)=ANY=[@ANYBLOB="cccd30", @ANYRES16=0x0, @ANYBLOB="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", @ANYRES32=0x0, @ANYBLOB="1400020069703667726574617030000000000000140002006970366572f370616e20000000000000fa0ee59a22b338aeb6d3895b934764e9a674c87f74b9c35aaa183a9ea95194a3dc40d9b230a9f627acae68e5f0381078395e744b4197fe3dd12112adacad625f6ae8e22901a3dd5920796e7dc087d5033e12c9e4aea2026a5df4ee89adbeda48287c2840149cf27af2cc0f064680a7b5e90f480b201f70326baca201fea21a0100000000000000"], 0x1cc}, 0x1, 0x0, 0x0, 0x8800}, 0x20040040) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) request_key(0x0, &(0x7f0000001ffb)={'syz', 0x1}, 0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x1004) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0x3, 0x380, 0x0, 0xe0, 0xe0, 0xe0, 0x0, 0x2e8, 0x2e8, 0x2e8, 0x2e8, 0x2e8, 0x7fffffe, 0x0, {[{{@uncond, 0x0, 0x70, 0xe0, 0x0, {0x6020000}}, @common=@unspec=@NFLOG={0x70, 'NFLOG\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, "a4bcf0ebf5d09e8706000000b1000000124ac31d4fda375c7794e420aa63529ebcf847246a5e8846085b0a30510b266347a84ae5ffea89b8654e44b40200"}}}, {{@ip={@local, @multicast1, 0x0, 0x0, '\x00', 'wg1\x00'}, 0x0, 0x1c8, 0x208, 0x0, {}, [@common=@inet=@hashlimit3={{0x158}, {'bridge_slave_1\x00', {0x0, 0x8, 0x0, 0x0, 0x0, 0x7fff, 0x8}}}]}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "29f0be44329ad4d94a815c71ad95092b933b5e380a7e5d3c56c51e9d0027"}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x3e0) 23:08:10 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x15, 0x0, 0x1, 0x0, 0x6, @multicast}, 0x14) clone(0x2000000082148180, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_STRSET_GET(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000640)={0x0, 0x1cc}, 0x1, 0x0, 0x0, 0x8800}, 0x20040040) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) request_key(0x0, &(0x7f0000001ffb)={'syz', 0x1}, 0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x1004) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0x3, 0x2e8, 0x0, 0xe0, 0xe0, 0xe0, 0x0, 0x2e8, 0x2e8, 0x2e8, 0x2e8, 0x2e8, 0x7fffffe, 0x0, {[{{@uncond, 0x0, 0x70, 0xe0, 0x0, {0x6020000}}, @common=@unspec=@NFLOG={0x70, 'NFLOG\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, "a4bcf0ebf5d09e8706580300b1000000124ac31d4fda375c7794e420aa63529ebcf847246a5e8846085b0a30510b266347a84ae5ffea89b8654e4400"}}}, {{@ip={@local, @multicast1, 0x0, 0x0, '\x00', 'wg1\x00'}, 0x0, 0x1c8, 0x208, 0x0, {}, [@common=@inet=@hashlimit3={{0x158}, {'bridge_slave_1\x00', {0x0, 0x8, 0x0, 0x0, 0x0, 0x7fff, 0x8}}}]}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "29f0be44329ad4d94a815c71ad95092b933b5e380a7e5d3c56c51e9d0027"}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x3e0) 23:08:11 executing program 4: perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0xc7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x12, 0xf7, 0x4, 0x3, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0xc}, 0x40) 23:08:11 executing program 1: r0 = getpgrp(0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x24000000) r1 = gettid() perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000, 0x0, 0x2af}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000080), 0x30200, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) unshare(0x4000000) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r3, 0x0) r4 = syz_open_dev$cec(&(0x7f0000000300), 0x3, 0x2) preadv(r4, &(0x7f00000002c0)=[{&(0x7f00000001c0)=""/251, 0xfb}], 0x1, 0xda3, 0x400001) bpf$ITER_CREATE(0x21, &(0x7f0000000100)={r2}, 0x9) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x26, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = perf_event_open(&(0x7f00000006c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c44}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ID(r5, 0x80042407, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000140)={0x1, 0x80, 0x1, 0x7, 0x6, 0xff, 0x0, 0x2, 0x80200, 0xe, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x400, 0x1, @perf_bp={&(0x7f00000000c0), 0x8}, 0x18000, 0x8000, 0xfffffffc, 0x1, 0x1000000000, 0x8, 0x3, 0x0, 0x8, 0x0, 0x9}, r1, 0x2, 0xffffffffffffffff, 0x2) clone(0x6cb2e100, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r1) wait4(0x0, 0x0, 0x0, 0x0) 23:08:11 executing program 3: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x15, 0x0, 0x1, 0x0, 0x6, @multicast}, 0x14) clone(0x2000000082148180, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_STRSET_GET(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000640)={&(0x7f00000006c0)=ANY=[@ANYBLOB="cccd30", @ANYRES16=0x0, @ANYBLOB="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", @ANYRES32=0x0, @ANYBLOB="1400020069703667726574617030000000000000140002006970366572f370616e20000000000000fa0ee59a22b338aeb6d3895b934764e9a674c87f74b9c35aaa183a9ea95194a3dc40d9b230a9f627acae68e5f0381078395e744b4197fe3dd12112adacad625f6ae8e22901a3dd5920796e7dc087d5033e12c9e4aea2026a5df4ee89adbeda48287c2840149cf27af2cc0f064680a7b5e90f480b201f70326baca201fea21a0100000000000000"], 0x1cc}, 0x1, 0x0, 0x0, 0x8800}, 0x20040040) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) request_key(0x0, &(0x7f0000001ffb)={'syz', 0x1}, 0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x1004) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0x3, 0x380, 0x0, 0xe0, 0xe0, 0xe0, 0x0, 0x2e8, 0x2e8, 0x2e8, 0x2e8, 0x2e8, 0x7fffffe, 0x0, {[{{@uncond, 0x0, 0x70, 0xe0, 0x0, {0x6020000}}, @common=@unspec=@NFLOG={0x70, 'NFLOG\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, "a4bcf0ebf5d09e8706000000b1000000124ac31d4fda375c7794e420aa63529ebcf847246a5e8846085b0a30510b266347a84ae5ffea89b8654e44ce0200"}}}, {{@ip={@local, @multicast1, 0x0, 0x0, '\x00', 'wg1\x00'}, 0x0, 0x1c8, 0x208, 0x0, {}, [@common=@inet=@hashlimit3={{0x158}, {'bridge_slave_1\x00', {0x0, 0x8, 0x0, 0x0, 0x0, 0x7fff, 0x8}}}]}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "29f0be44329ad4d94a815c71ad95092b933b5e380a7e5d3c56c51e9d0027"}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x3e0) 23:08:11 executing program 2: r0 = getpgrp(0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x24000000) r1 = gettid() perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000080), 0x30200, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) unshare(0x4000000) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, r3, 0x0) preadv(0xffffffffffffffff, &(0x7f00000002c0)=[{&(0x7f00000001c0)=""/251, 0xfb}], 0x1, 0x0, 0x0) bpf$ITER_CREATE(0x21, &(0x7f0000000100)={r2}, 0x9) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x26, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = perf_event_open(&(0x7f00000006c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c44}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ID(r4, 0x80042407, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000140)={0x1, 0x80, 0x0, 0x7, 0x0, 0xff, 0x0, 0x2, 0x0, 0xe, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x400, 0x1, @perf_bp={&(0x7f00000000c0), 0x8}, 0x18000, 0x8000, 0xfffffffc, 0x1, 0x1000000000, 0x8, 0x3, 0x0, 0x8, 0x0, 0x9}, r1, 0x2, r4, 0x2) clone(0x6cb2e100, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r1) wait4(0x0, 0x0, 0x0, 0x0) 23:08:11 executing program 0: r0 = getpgrp(0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x24000000) r1 = gettid() perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000, 0x0, 0x2af}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000080), 0x30200, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) unshare(0x4000000) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r3, 0x0) r4 = syz_open_dev$cec(&(0x7f0000000300), 0x3, 0x2) preadv(r4, &(0x7f00000002c0)=[{&(0x7f00000001c0)=""/251, 0xfb}], 0x1, 0xda3, 0x400001) bpf$ITER_CREATE(0x21, &(0x7f0000000100)={r2}, 0x9) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x26, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = perf_event_open(&(0x7f00000006c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c44}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ID(r5, 0x80042407, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000140)={0x1, 0x80, 0x1, 0x7, 0x6, 0xff, 0x0, 0x2, 0x80200, 0xe, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x400, 0x1, @perf_bp={&(0x7f00000000c0), 0x8}, 0x18000, 0x8000, 0xfffffffc, 0x1, 0x1000000000, 0x8, 0x3, 0x0, 0x8, 0x0, 0x9}, r1, 0x0, r5, 0x2) clone(0x6cb2e100, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r1) wait4(0x0, 0x0, 0x0, 0x0) 23:08:11 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x15, 0x0, 0x1, 0x0, 0x6, @multicast}, 0x14) clone(0x2000000082148180, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_STRSET_GET(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000640)={0x0, 0x1cc}, 0x1, 0x0, 0x0, 0x8800}, 0x20040040) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) request_key(0x0, &(0x7f0000001ffb)={'syz', 0x1}, 0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x1004) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0x3, 0x2000, 0x0, 0xe0, 0xe0, 0xe0, 0x0, 0x2e8, 0x2e8, 0x2e8, 0x2e8, 0x2e8, 0x7fffffe, 0x0, {[{{@uncond, 0x0, 0x70, 0xe0, 0x0, {0x6020000}}, @common=@unspec=@NFLOG={0x70, 'NFLOG\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, "a4bcf0ebf5d09e8706580300b1000000124ac31d4fda375c7794e420aa63529ebcf847246a5e8846085b0a30510b266347a84ae5ffea89b8654e4400"}}}, {{@ip={@local, @multicast1, 0x0, 0x0, '\x00', 'wg1\x00'}, 0x0, 0x1c8, 0x208, 0x0, {}, [@common=@inet=@hashlimit3={{0x158}, {'bridge_slave_1\x00', {0x0, 0x8, 0x0, 0x0, 0x0, 0x7fff, 0x8}}}]}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "29f0be44329ad4d94a815c71ad95092b933b5e380a7e5d3c56c51e9d0027"}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x3e0) 23:08:11 executing program 4: perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0xc7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x12, 0xf7, 0x4, 0x3, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0xd}, 0x40) 23:08:11 executing program 3: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x15, 0x0, 0x1, 0x0, 0x6, @multicast}, 0x14) clone(0x2000000082148180, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_STRSET_GET(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000640)={&(0x7f00000006c0)=ANY=[@ANYBLOB="cccd30", @ANYRES16=0x0, @ANYBLOB="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", @ANYRES32=0x0, @ANYBLOB="1400020069703667726574617030000000000000140002006970366572f370616e20000000000000fa0ee59a22b338aeb6d3895b934764e9a674c87f74b9c35aaa183a9ea95194a3dc40d9b230a9f627acae68e5f0381078395e744b4197fe3dd12112adacad625f6ae8e22901a3dd5920796e7dc087d5033e12c9e4aea2026a5df4ee89adbeda48287c2840149cf27af2cc0f064680a7b5e90f480b201f70326baca201fea21a0100000000000000"], 0x1cc}, 0x1, 0x0, 0x0, 0x8800}, 0x20040040) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) request_key(0x0, &(0x7f0000001ffb)={'syz', 0x1}, 0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x1004) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0x3, 0x380, 0x0, 0xe0, 0xe0, 0xe0, 0x0, 0x2e8, 0x2e8, 0x2e8, 0x2e8, 0x2e8, 0x7fffffe, 0x0, {[{{@uncond, 0x0, 0x70, 0xe0, 0x0, {0x6020000}}, @common=@unspec=@NFLOG={0x70, 'NFLOG\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, "a4bcf0ebf5d09e8706000000b1000000124ac31d4fda375c7794e420aa63529ebcf847246a5e8846085b0a30510b266347a84ae5ffea89b8654e44e80200"}}}, {{@ip={@local, @multicast1, 0x0, 0x0, '\x00', 'wg1\x00'}, 0x0, 0x1c8, 0x208, 0x0, {}, [@common=@inet=@hashlimit3={{0x158}, {'bridge_slave_1\x00', {0x0, 0x8, 0x0, 0x0, 0x0, 0x7fff, 0x8}}}]}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "29f0be44329ad4d94a815c71ad95092b933b5e380a7e5d3c56c51e9d0027"}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x3e0) 23:08:11 executing program 4: perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0xc7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x12, 0xf7, 0x4, 0x3, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0xe}, 0x40) 23:08:11 executing program 3: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x15, 0x0, 0x1, 0x0, 0x6, @multicast}, 0x14) clone(0x2000000082148180, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_STRSET_GET(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000640)={&(0x7f00000006c0)=ANY=[@ANYBLOB="cccd30", @ANYRES16=0x0, @ANYBLOB="02002abd7000fbdbdf250100000004000300800102800c00018008000100070000002400018008000100070000000800010008000000080001000100000008000100060000001c0001800800010005000000080001000200000008000100000000002c000180080001000600000008000100070000000800010003000000080001000600000008000100000000005400018008000100060000000800010001000000080001000400000008000100000000000800010000000000080001000000000008000100000000000800010008000000080001000300000008000100020000001c0001800800010008000000080001000100000008000100050000001c0001800800010004000000080001000400000008000100010000002c000180080001000000000008000100040000000800010007000000080001000700000008000100080000004c0001800800010002000000080001000200000008000100050000000800010003000000080001000400000008000100040000000800010000000000080001000400000008000100030000003400018008000100", @ANYRES32=0x0, @ANYBLOB="1400020069703667726574617030000000000000140002006970366572f370616e20000000000000fa0ee59a22b338aeb6d3895b934764e9a674c87f74b9c35aaa183a9ea95194a3dc40d9b230a9f627acae68e5f0381078395e744b4197fe3dd12112adacad625f6ae8e22901a3dd5920796e7dc087d5033e12c9e4aea2026a5df4ee89adbeda48287c2840149cf27af2cc0f064680a7b5e90f480b201f70326baca201fea21a0100000000000000"], 0x1cc}, 0x1, 0x0, 0x0, 0x8800}, 0x20040040) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) request_key(0x0, &(0x7f0000001ffb)={'syz', 0x1}, 0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x1004) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0x3, 0x380, 0x0, 0xe0, 0xe0, 0xe0, 0x0, 0x2e8, 0x2e8, 0x2e8, 0x2e8, 0x2e8, 0x7fffffe, 0x0, {[{{@uncond, 0x0, 0x70, 0xe0, 0x0, {0x6020000}}, @common=@unspec=@NFLOG={0x70, 'NFLOG\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, "a4bcf0ebf5d09e8706000000b1000000124ac31d4fda375c7794e420aa63529ebcf847246a5e8846085b0a30510b266347a84ae5ffea89b8654e44f40200"}}}, {{@ip={@local, @multicast1, 0x0, 0x0, '\x00', 'wg1\x00'}, 0x0, 0x1c8, 0x208, 0x0, {}, [@common=@inet=@hashlimit3={{0x158}, {'bridge_slave_1\x00', {0x0, 0x8, 0x0, 0x0, 0x0, 0x7fff, 0x8}}}]}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "29f0be44329ad4d94a815c71ad95092b933b5e380a7e5d3c56c51e9d0027"}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x3e0) 23:08:12 executing program 4: perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0xc7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x12, 0xf7, 0x4, 0x3, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0xf}, 0x40) 23:08:12 executing program 4: perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0xc7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x12, 0xf7, 0x4, 0x3, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x10}, 0x40) 23:08:12 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x15, 0x0, 0x1, 0x0, 0x6, @multicast}, 0x14) clone(0x2000000082148180, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_STRSET_GET(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000640)={0x0, 0x1cc}, 0x1, 0x0, 0x0, 0x8800}, 0x20040040) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) request_key(0x0, &(0x7f0000001ffb)={'syz', 0x1}, 0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x1004) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0x3, 0x1fffffbf, 0x0, 0xe0, 0xe0, 0xe0, 0x0, 0x2e8, 0x2e8, 0x2e8, 0x2e8, 0x2e8, 0x7fffffe, 0x0, {[{{@uncond, 0x0, 0x70, 0xe0, 0x0, {0x6020000}}, @common=@unspec=@NFLOG={0x70, 'NFLOG\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, "a4bcf0ebf5d09e8706580300b1000000124ac31d4fda375c7794e420aa63529ebcf847246a5e8846085b0a30510b266347a84ae5ffea89b8654e4400"}}}, {{@ip={@local, @multicast1, 0x0, 0x0, '\x00', 'wg1\x00'}, 0x0, 0x1c8, 0x208, 0x0, {}, [@common=@inet=@hashlimit3={{0x158}, {'bridge_slave_1\x00', {0x0, 0x8, 0x0, 0x0, 0x0, 0x7fff, 0x8}}}]}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "29f0be44329ad4d94a815c71ad95092b933b5e380a7e5d3c56c51e9d0027"}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x3e0) 23:08:14 executing program 1: r0 = getpgrp(0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x24000000) r1 = gettid() perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000, 0x0, 0x2af}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000080), 0x30200, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) unshare(0x4000000) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r3, 0x0) r4 = syz_open_dev$cec(&(0x7f0000000300), 0x3, 0x2) preadv(r4, &(0x7f00000002c0)=[{&(0x7f00000001c0)=""/251, 0xfb}], 0x1, 0xda3, 0x400001) bpf$ITER_CREATE(0x21, &(0x7f0000000100)={r2}, 0x9) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x26, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = perf_event_open(&(0x7f00000006c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c44}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ID(r5, 0x80042407, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000140)={0x1, 0x80, 0x1, 0x7, 0x6, 0xff, 0x0, 0x2, 0x80200, 0xe, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x400, 0x1, @perf_bp={&(0x7f00000000c0), 0x8}, 0x18000, 0x8000, 0xfffffffc, 0x1, 0x1000000000, 0x8, 0x3, 0x0, 0x8, 0x0, 0x9}, r1, 0x2, 0xffffffffffffffff, 0x2) clone(0x6cb2e100, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r1) wait4(0x0, 0x0, 0x0, 0x0) 23:08:14 executing program 4: perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0xc7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x12, 0xf7, 0x4, 0x3, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x11}, 0x40) 23:08:14 executing program 2: r0 = getpgrp(0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x24000000) r1 = gettid() perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000080), 0x30200, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) unshare(0x4000000) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, r3, 0x0) preadv(0xffffffffffffffff, &(0x7f00000002c0)=[{&(0x7f00000001c0)=""/251, 0xfb}], 0x1, 0x0, 0x0) bpf$ITER_CREATE(0x21, &(0x7f0000000100)={r2}, 0x9) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x26, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = perf_event_open(&(0x7f00000006c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c44}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ID(r4, 0x80042407, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000140)={0x1, 0x80, 0x0, 0x7, 0x0, 0xff, 0x0, 0x2, 0x0, 0xe, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x400, 0x1, @perf_bp={&(0x7f00000000c0), 0x8}, 0x18000, 0x8000, 0xfffffffc, 0x1, 0x1000000000, 0x8, 0x3, 0x0, 0x8, 0x0, 0x9}, r1, 0x2, r4, 0x2) clone(0x6cb2e100, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r1) wait4(0x0, 0x0, 0x0, 0x0) 23:08:14 executing program 3: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x15, 0x0, 0x1, 0x0, 0x6, @multicast}, 0x14) clone(0x2000000082148180, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_STRSET_GET(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000640)={&(0x7f00000006c0)=ANY=[@ANYBLOB="cccd30", @ANYRES16=0x0, @ANYBLOB="02002abd7000fbdbdf250100000004000300800102800c00018008000100070000002400018008000100070000000800010008000000080001000100000008000100060000001c0001800800010005000000080001000200000008000100000000002c000180080001000600000008000100070000000800010003000000080001000600000008000100000000005400018008000100060000000800010001000000080001000400000008000100000000000800010000000000080001000000000008000100000000000800010008000000080001000300000008000100020000001c0001800800010008000000080001000100000008000100050000001c0001800800010004000000080001000400000008000100010000002c000180080001000000000008000100040000000800010007000000080001000700000008000100080000004c0001800800010002000000080001000200000008000100050000000800010003000000080001000400000008000100040000000800010000000000080001000400000008000100030000003400018008000100", @ANYRES32=0x0, @ANYBLOB="1400020069703667726574617030000000000000140002006970366572f370616e20000000000000fa0ee59a22b338aeb6d3895b934764e9a674c87f74b9c35aaa183a9ea95194a3dc40d9b230a9f627acae68e5f0381078395e744b4197fe3dd12112adacad625f6ae8e22901a3dd5920796e7dc087d5033e12c9e4aea2026a5df4ee89adbeda48287c2840149cf27af2cc0f064680a7b5e90f480b201f70326baca201fea21a0100000000000000"], 0x1cc}, 0x1, 0x0, 0x0, 0x8800}, 0x20040040) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) request_key(0x0, &(0x7f0000001ffb)={'syz', 0x1}, 0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x1004) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0x3, 0x380, 0x0, 0xe0, 0xe0, 0xe0, 0x0, 0x2e8, 0x2e8, 0x2e8, 0x2e8, 0x2e8, 0x7fffffe, 0x0, {[{{@uncond, 0x0, 0x70, 0xe0, 0x0, {0x6020000}}, @common=@unspec=@NFLOG={0x70, 'NFLOG\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, "a4bcf0ebf5d09e8706000000b1000000124ac31d4fda375c7794e420aa63529ebcf847246a5e8846085b0a30510b266347a84ae5ffea89b8654e44000300"}}}, {{@ip={@local, @multicast1, 0x0, 0x0, '\x00', 'wg1\x00'}, 0x0, 0x1c8, 0x208, 0x0, {}, [@common=@inet=@hashlimit3={{0x158}, {'bridge_slave_1\x00', {0x0, 0x8, 0x0, 0x0, 0x0, 0x7fff, 0x8}}}]}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "29f0be44329ad4d94a815c71ad95092b933b5e380a7e5d3c56c51e9d0027"}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x3e0) 23:08:14 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x15, 0x0, 0x1, 0x0, 0x6, @multicast}, 0x14) clone(0x2000000082148180, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_STRSET_GET(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000640)={0x0, 0x1cc}, 0x1, 0x0, 0x0, 0x8800}, 0x20040040) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) request_key(0x0, &(0x7f0000001ffb)={'syz', 0x1}, 0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x1004) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0x3, 0x200003e0, 0x0, 0xe0, 0xe0, 0xe0, 0x0, 0x2e8, 0x2e8, 0x2e8, 0x2e8, 0x2e8, 0x7fffffe, 0x0, {[{{@uncond, 0x0, 0x70, 0xe0, 0x0, {0x6020000}}, @common=@unspec=@NFLOG={0x70, 'NFLOG\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, "a4bcf0ebf5d09e8706580300b1000000124ac31d4fda375c7794e420aa63529ebcf847246a5e8846085b0a30510b266347a84ae5ffea89b8654e4400"}}}, {{@ip={@local, @multicast1, 0x0, 0x0, '\x00', 'wg1\x00'}, 0x0, 0x1c8, 0x208, 0x0, {}, [@common=@inet=@hashlimit3={{0x158}, {'bridge_slave_1\x00', {0x0, 0x8, 0x0, 0x0, 0x0, 0x7fff, 0x8}}}]}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "29f0be44329ad4d94a815c71ad95092b933b5e380a7e5d3c56c51e9d0027"}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x3e0) 23:08:14 executing program 4: perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0xc7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x12, 0xf7, 0x4, 0x3, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x12}, 0x40) 23:08:14 executing program 0: r0 = getpgrp(0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x24000000) r1 = gettid() perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000080), 0x30200, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) unshare(0x4000000) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, r3, 0x0) preadv(0xffffffffffffffff, &(0x7f00000002c0)=[{&(0x7f00000001c0)=""/251, 0xfb}], 0x1, 0x0, 0x0) bpf$ITER_CREATE(0x21, &(0x7f0000000100)={r2}, 0x9) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x26, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = perf_event_open(&(0x7f00000006c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c44}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ID(r4, 0x80042407, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000140)={0x1, 0x80, 0x1, 0x7, 0x6, 0xff, 0x0, 0x2, 0x80200, 0xe, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x400, 0x1, @perf_bp={&(0x7f00000000c0), 0x8}, 0x18000, 0x8000, 0xfffffffc, 0x1, 0x1000000000, 0x8, 0x3, 0x0, 0x8, 0x0, 0x9}, r1, 0x2, r4, 0x2) clone(0x6cb2e100, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r1) wait4(0x0, 0x0, 0x0, 0x0) 23:08:15 executing program 4: perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0xc7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x12, 0xf7, 0x4, 0x3, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x13}, 0x40) 23:08:15 executing program 3: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x15, 0x0, 0x1, 0x0, 0x6, @multicast}, 0x14) clone(0x2000000082148180, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_STRSET_GET(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000640)={&(0x7f00000006c0)=ANY=[@ANYBLOB="cccd30", @ANYRES16=0x0, @ANYBLOB="02002abd7000fbdbdf250100000004000300800102800c00018008000100070000002400018008000100070000000800010008000000080001000100000008000100060000001c0001800800010005000000080001000200000008000100000000002c000180080001000600000008000100070000000800010003000000080001000600000008000100000000005400018008000100060000000800010001000000080001000400000008000100000000000800010000000000080001000000000008000100000000000800010008000000080001000300000008000100020000001c0001800800010008000000080001000100000008000100050000001c0001800800010004000000080001000400000008000100010000002c000180080001000000000008000100040000000800010007000000080001000700000008000100080000004c0001800800010002000000080001000200000008000100050000000800010003000000080001000400000008000100040000000800010000000000080001000400000008000100030000003400018008000100", @ANYRES32=0x0, @ANYBLOB="1400020069703667726574617030000000000000140002006970366572f370616e20000000000000fa0ee59a22b338aeb6d3895b934764e9a674c87f74b9c35aaa183a9ea95194a3dc40d9b230a9f627acae68e5f0381078395e744b4197fe3dd12112adacad625f6ae8e22901a3dd5920796e7dc087d5033e12c9e4aea2026a5df4ee89adbeda48287c2840149cf27af2cc0f064680a7b5e90f480b201f70326baca201fea21a0100000000000000"], 0x1cc}, 0x1, 0x0, 0x0, 0x8800}, 0x20040040) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) request_key(0x0, &(0x7f0000001ffb)={'syz', 0x1}, 0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x1004) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0x3, 0x380, 0x0, 0xe0, 0xe0, 0xe0, 0x0, 0x2e8, 0x2e8, 0x2e8, 0x2e8, 0x2e8, 0x7fffffe, 0x0, {[{{@uncond, 0x0, 0x70, 0xe0, 0x0, {0x6020000}}, @common=@unspec=@NFLOG={0x70, 'NFLOG\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, "a4bcf0ebf5d09e8706000000b1000000124ac31d4fda375c7794e420aa63529ebcf847246a5e8846085b0a30510b266347a84ae5ffea89b8654e44240300"}}}, {{@ip={@local, @multicast1, 0x0, 0x0, '\x00', 'wg1\x00'}, 0x0, 0x1c8, 0x208, 0x0, {}, [@common=@inet=@hashlimit3={{0x158}, {'bridge_slave_1\x00', {0x0, 0x8, 0x0, 0x0, 0x0, 0x7fff, 0x8}}}]}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "29f0be44329ad4d94a815c71ad95092b933b5e380a7e5d3c56c51e9d0027"}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x3e0) 23:08:15 executing program 4: perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0xc7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x12, 0xf7, 0x4, 0x3, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x14}, 0x40) 23:08:15 executing program 2: r0 = getpgrp(0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x24000000) r1 = gettid() perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000080), 0x30200, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) unshare(0x4000000) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, r3, 0x0) preadv(0xffffffffffffffff, &(0x7f00000002c0)=[{&(0x7f00000001c0)=""/251, 0xfb}], 0x1, 0x0, 0x0) bpf$ITER_CREATE(0x21, &(0x7f0000000100)={r2}, 0x9) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x26, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = perf_event_open(&(0x7f00000006c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c44}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ID(r4, 0x80042407, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000140)={0x1, 0x80, 0x0, 0x7, 0x0, 0xff, 0x0, 0x2, 0x0, 0xe, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x400, 0x1, @perf_bp={&(0x7f00000000c0), 0x8}, 0x18000, 0x8000, 0xfffffffc, 0x1, 0x1000000000, 0x8, 0x3, 0x0, 0x8, 0x0, 0x9}, r1, 0x2, r4, 0x2) clone(0x6cb2e100, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r1) wait4(0x0, 0x0, 0x0, 0x0) 23:08:15 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x15, 0x0, 0x1, 0x0, 0x6, @multicast}, 0x14) clone(0x2000000082148180, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_STRSET_GET(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000640)={0x0, 0x1cc}, 0x1, 0x0, 0x0, 0x8800}, 0x20040040) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) request_key(0x0, &(0x7f0000001ffb)={'syz', 0x1}, 0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x1004) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0x3, 0x380, 0x0, 0xe0, 0xe0, 0xe0, 0x0, 0x2e8, 0x2e8, 0x2e8, 0x2e8, 0x2e8, 0x7fffffe, 0x0, {[{{@uncond, 0x0, 0x70, 0xe0, 0x0, {0x6020000}}, @common=@unspec=@NFLOG={0x70, 'NFLOG\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, "a4bcf0ebf5d09e8706580300b1000000124ac31d4fda375c7794e420aa63529ebcf847246a5e8846085b0a30510b266347a84ae5ffea89b8654e4400"}}}, {{@ip={@local, @multicast1, 0x0, 0x0, '\x00', 'wg1\x00'}, 0x0, 0x1c8, 0x208, 0x0, {}, [@common=@inet=@hashlimit3={{0x158}, {'bridge_slave_1\x00', {0x0, 0x8, 0x0, 0x0, 0x0, 0x7fff, 0x8}}}]}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "29f0be44329ad4d94a815c71ad95092b933b5e380a7e5d3c56c51e9d0027"}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x3e0) 23:08:17 executing program 1: r0 = getpgrp(0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x24000000) r1 = gettid() perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000, 0x0, 0x2af}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000080), 0x30200, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) unshare(0x4000000) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r3, 0x0) r4 = syz_open_dev$cec(&(0x7f0000000300), 0x3, 0x2) preadv(r4, &(0x7f00000002c0)=[{&(0x7f00000001c0)=""/251, 0xfb}], 0x1, 0xda3, 0x400001) bpf$ITER_CREATE(0x21, &(0x7f0000000100)={r2}, 0x9) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x26, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = perf_event_open(&(0x7f00000006c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c44}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ID(r5, 0x80042407, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000140)={0x1, 0x80, 0x1, 0x7, 0x6, 0xff, 0x0, 0x2, 0x80200, 0xe, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x400, 0x1, @perf_bp={&(0x7f00000000c0), 0x8}, 0x18000, 0x8000, 0xfffffffc, 0x1, 0x1000000000, 0x8, 0x3, 0x0, 0x8, 0x0, 0x9}, r1, 0x2, 0xffffffffffffffff, 0x2) clone(0x6cb2e100, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r1) wait4(0x0, 0x0, 0x0, 0x0) 23:08:17 executing program 4: perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0xc7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x12, 0xf7, 0x4, 0x3, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x18}, 0x40) 23:08:17 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x15, 0x0, 0x1, 0x0, 0x6, @multicast}, 0x14) clone(0x2000000082148180, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_STRSET_GET(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000640)={0x0, 0x1cc}, 0x1, 0x0, 0x0, 0x8800}, 0x20040040) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) request_key(0x0, &(0x7f0000001ffb)={'syz', 0x1}, 0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x1004) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0x3, 0x380, 0x2, 0xe0, 0xe0, 0xe0, 0x0, 0x2e8, 0x2e8, 0x2e8, 0x2e8, 0x2e8, 0x7fffffe, 0x0, {[{{@uncond, 0x0, 0x70, 0xe0, 0x0, {0x6020000}}, @common=@unspec=@NFLOG={0x70, 'NFLOG\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, "a4bcf0ebf5d09e8706580300b1000000124ac31d4fda375c7794e420aa63529ebcf847246a5e8846085b0a30510b266347a84ae5ffea89b8654e4400"}}}, {{@ip={@local, @multicast1, 0x0, 0x0, '\x00', 'wg1\x00'}, 0x0, 0x1c8, 0x208, 0x0, {}, [@common=@inet=@hashlimit3={{0x158}, {'bridge_slave_1\x00', {0x0, 0x8, 0x0, 0x0, 0x0, 0x7fff, 0x8}}}]}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "29f0be44329ad4d94a815c71ad95092b933b5e380a7e5d3c56c51e9d0027"}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x3e0) 23:08:17 executing program 3: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x15, 0x0, 0x1, 0x0, 0x6, @multicast}, 0x14) clone(0x2000000082148180, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_STRSET_GET(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000640)={&(0x7f00000006c0)=ANY=[@ANYBLOB="cccd30", @ANYRES16=0x0, @ANYBLOB="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", @ANYRES32=0x0, @ANYBLOB="1400020069703667726574617030000000000000140002006970366572f370616e20000000000000fa0ee59a22b338aeb6d3895b934764e9a674c87f74b9c35aaa183a9ea95194a3dc40d9b230a9f627acae68e5f0381078395e744b4197fe3dd12112adacad625f6ae8e22901a3dd5920796e7dc087d5033e12c9e4aea2026a5df4ee89adbeda48287c2840149cf27af2cc0f064680a7b5e90f480b201f70326baca201fea21a0100000000000000"], 0x1cc}, 0x1, 0x0, 0x0, 0x8800}, 0x20040040) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) request_key(0x0, &(0x7f0000001ffb)={'syz', 0x1}, 0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x1004) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0x3, 0x380, 0x0, 0xe0, 0xe0, 0xe0, 0x0, 0x2e8, 0x2e8, 0x2e8, 0x2e8, 0x2e8, 0x7fffffe, 0x0, {[{{@uncond, 0x0, 0x70, 0xe0, 0x0, {0x6020000}}, @common=@unspec=@NFLOG={0x70, 'NFLOG\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, "a4bcf0ebf5d09e8706000000b1000000124ac31d4fda375c7794e420aa63529ebcf847246a5e8846085b0a30510b266347a84ae5ffea89b8654e44580300"}}}, {{@ip={@local, @multicast1, 0x0, 0x0, '\x00', 'wg1\x00'}, 0x0, 0x1c8, 0x208, 0x0, {}, [@common=@inet=@hashlimit3={{0x158}, {'bridge_slave_1\x00', {0x0, 0x8, 0x0, 0x0, 0x0, 0x7fff, 0x8}}}]}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "29f0be44329ad4d94a815c71ad95092b933b5e380a7e5d3c56c51e9d0027"}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x3e0) 23:08:17 executing program 3: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x15, 0x0, 0x1, 0x0, 0x6, @multicast}, 0x14) clone(0x2000000082148180, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_STRSET_GET(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000640)={&(0x7f00000006c0)=ANY=[@ANYBLOB="cccd30", @ANYRES16=0x0, @ANYBLOB="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", @ANYRES32=0x0, @ANYBLOB="1400020069703667726574617030000000000000140002006970366572f370616e20000000000000fa0ee59a22b338aeb6d3895b934764e9a674c87f74b9c35aaa183a9ea95194a3dc40d9b230a9f627acae68e5f0381078395e744b4197fe3dd12112adacad625f6ae8e22901a3dd5920796e7dc087d5033e12c9e4aea2026a5df4ee89adbeda48287c2840149cf27af2cc0f064680a7b5e90f480b201f70326baca201fea21a0100000000000000"], 0x1cc}, 0x1, 0x0, 0x0, 0x8800}, 0x20040040) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) request_key(0x0, &(0x7f0000001ffb)={'syz', 0x1}, 0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x1004) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0x3, 0x380, 0x0, 0xe0, 0xe0, 0xe0, 0x0, 0x2e8, 0x2e8, 0x2e8, 0x2e8, 0x2e8, 0x7fffffe, 0x0, {[{{@uncond, 0x0, 0x70, 0xe0, 0x0, {0x6020000}}, @common=@unspec=@NFLOG={0x70, 'NFLOG\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, "a4bcf0ebf5d09e8706000000b1000000124ac31d4fda375c7794e420aa63529ebcf847246a5e8846085b0a30510b266347a84ae5ffea89b8654e447a0300"}}}, {{@ip={@local, @multicast1, 0x0, 0x0, '\x00', 'wg1\x00'}, 0x0, 0x1c8, 0x208, 0x0, {}, [@common=@inet=@hashlimit3={{0x158}, {'bridge_slave_1\x00', {0x0, 0x8, 0x0, 0x0, 0x0, 0x7fff, 0x8}}}]}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "29f0be44329ad4d94a815c71ad95092b933b5e380a7e5d3c56c51e9d0027"}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x3e0) 23:08:17 executing program 4: perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0xc7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x12, 0xf7, 0x4, 0x3, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x147}, 0x40) 23:08:17 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x15, 0x0, 0x1, 0x0, 0x6, @multicast}, 0x14) clone(0x2000000082148180, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_STRSET_GET(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000640)={&(0x7f00000006c0)=ANY=[@ANYBLOB="cccd30", @ANYRES16=0x0, @ANYBLOB="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", @ANYRES32=0x0, @ANYBLOB="1400020069703667726574617030000000000000140002006970366572f370616e20000000000000fa0ee59a22b338aeb6d3895b934764e9a674c87f74b9c35aaa183a9ea95194a3dc40d9b230a9f627acae68e5f0381078395e744b4197fe3dd12112adacad625f6ae8e22901a3dd5920796e7dc087d5033e12c9e4aea2026a5df4ee89adbeda48287c2840149cf27af2cc0f064680a7b5e90f480b201f70326baca201fea21a0100000000000000"], 0x1cc}, 0x1, 0x0, 0x0, 0x8800}, 0x20040040) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) request_key(0x0, &(0x7f0000001ffb)={'syz', 0x1}, 0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x1004) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0x3, 0x380, 0x0, 0xe0, 0xe0, 0xe0, 0x0, 0x2e8, 0x2e8, 0x2e8, 0x2e8, 0x2e8, 0x7fffffe, 0x0, {[{{@uncond, 0x0, 0x70, 0xe0, 0x0, {0x6020000}}, @common=@unspec=@NFLOG={0x70, 'NFLOG\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, "a4bcf0ebf5d09e8706000000b100c600124ac31d4fda375c7794e420aa63529ebcf847246a5e8846085b0a30510b266347a84ae5ffea89b8654e4400"}}}, {{@ip={@local, @multicast1, 0x0, 0x0, '\x00', 'wg1\x00'}, 0x0, 0x1c8, 0x208, 0x0, {}, [@common=@inet=@hashlimit3={{0x158}, {'bridge_slave_1\x00', {0x0, 0x8, 0x0, 0x0, 0x0, 0x7fff, 0x8}}}]}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "29f0be44329ad4d94a815c71ad95092b933b5e380a7e5d3c56c51e9d0027"}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x3e0) 23:08:17 executing program 3: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x15, 0x0, 0x1, 0x0, 0x6, @multicast}, 0x14) clone(0x2000000082148180, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_STRSET_GET(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000640)={&(0x7f00000006c0)=ANY=[@ANYBLOB="cccd30", @ANYRES16=0x0, @ANYBLOB="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", @ANYRES32=0x0, @ANYBLOB="1400020069703667726574617030000000000000140002006970366572f370616e20000000000000fa0ee59a22b338aeb6d3895b934764e9a674c87f74b9c35aaa183a9ea95194a3dc40d9b230a9f627acae68e5f0381078395e744b4197fe3dd12112adacad625f6ae8e22901a3dd5920796e7dc087d5033e12c9e4aea2026a5df4ee89adbeda48287c2840149cf27af2cc0f064680a7b5e90f480b201f70326baca201fea21a0100000000000000"], 0x1cc}, 0x1, 0x0, 0x0, 0x8800}, 0x20040040) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) request_key(0x0, &(0x7f0000001ffb)={'syz', 0x1}, 0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x1004) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0x3, 0x380, 0x0, 0xe0, 0xe0, 0xe0, 0x0, 0x2e8, 0x2e8, 0x2e8, 0x2e8, 0x2e8, 0x7fffffe, 0x0, {[{{@uncond, 0x0, 0x70, 0xe0, 0x0, {0x6020000}}, @common=@unspec=@NFLOG={0x70, 'NFLOG\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, "a4bcf0ebf5d09e8706000000b1000000124ac31d4fda375c7794e420aa63529ebcf847246a5e8846085b0a30510b266347a84ae5ffea89b8654e448c0300"}}}, {{@ip={@local, @multicast1, 0x0, 0x0, '\x00', 'wg1\x00'}, 0x0, 0x1c8, 0x208, 0x0, {}, [@common=@inet=@hashlimit3={{0x158}, {'bridge_slave_1\x00', {0x0, 0x8, 0x0, 0x0, 0x0, 0x7fff, 0x8}}}]}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "29f0be44329ad4d94a815c71ad95092b933b5e380a7e5d3c56c51e9d0027"}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x3e0) 23:08:17 executing program 4: perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0xc7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x12, 0xf7, 0x4, 0x3, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x300}, 0x40) 23:08:17 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x15, 0x0, 0x1, 0x0, 0x6, @multicast}, 0x14) clone(0x2000000082148180, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_STRSET_GET(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000640)={0x0, 0x1cc}, 0x1, 0x0, 0x0, 0x8800}, 0x20040040) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) request_key(0x0, &(0x7f0000001ffb)={'syz', 0x1}, 0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x1004) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0x3, 0x380, 0x3, 0xe0, 0xe0, 0xe0, 0x0, 0x2e8, 0x2e8, 0x2e8, 0x2e8, 0x2e8, 0x7fffffe, 0x0, {[{{@uncond, 0x0, 0x70, 0xe0, 0x0, {0x6020000}}, @common=@unspec=@NFLOG={0x70, 'NFLOG\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, "a4bcf0ebf5d09e8706580300b1000000124ac31d4fda375c7794e420aa63529ebcf847246a5e8846085b0a30510b266347a84ae5ffea89b8654e4400"}}}, {{@ip={@local, @multicast1, 0x0, 0x0, '\x00', 'wg1\x00'}, 0x0, 0x1c8, 0x208, 0x0, {}, [@common=@inet=@hashlimit3={{0x158}, {'bridge_slave_1\x00', {0x0, 0x8, 0x0, 0x0, 0x0, 0x7fff, 0x8}}}]}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "29f0be44329ad4d94a815c71ad95092b933b5e380a7e5d3c56c51e9d0027"}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x3e0) 23:08:18 executing program 2: r0 = getpgrp(0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x24000000) r1 = gettid() perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000080), 0x30200, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) unshare(0x4000000) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, r3, 0x0) preadv(0xffffffffffffffff, &(0x7f00000002c0)=[{&(0x7f00000001c0)=""/251, 0xfb}], 0x1, 0x0, 0x0) bpf$ITER_CREATE(0x21, &(0x7f0000000100)={r2}, 0x9) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x26, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = perf_event_open(&(0x7f00000006c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c44}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ID(r4, 0x80042407, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000140)={0x1, 0x80, 0x0, 0x7, 0x0, 0xff, 0x0, 0x2, 0x0, 0xe, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x400, 0x1, @perf_bp={&(0x7f00000000c0), 0x8}, 0x18000, 0x8000, 0xfffffffc, 0x1, 0x1000000000, 0x8, 0x3, 0x0, 0x8, 0x0, 0x9}, r1, 0x2, r4, 0x2) clone(0x6cb2e100, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r1) wait4(0x0, 0x0, 0x0, 0x0) 23:08:18 executing program 3: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x15, 0x0, 0x1, 0x0, 0x6, @multicast}, 0x14) clone(0x2000000082148180, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_STRSET_GET(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000640)={&(0x7f00000006c0)=ANY=[@ANYBLOB="cccd30", @ANYRES16=0x0, @ANYBLOB="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", @ANYRES32=0x0, @ANYBLOB="1400020069703667726574617030000000000000140002006970366572f370616e20000000000000fa0ee59a22b338aeb6d3895b934764e9a674c87f74b9c35aaa183a9ea95194a3dc40d9b230a9f627acae68e5f0381078395e744b4197fe3dd12112adacad625f6ae8e22901a3dd5920796e7dc087d5033e12c9e4aea2026a5df4ee89adbeda48287c2840149cf27af2cc0f064680a7b5e90f480b201f70326baca201fea21a0100000000000000"], 0x1cc}, 0x1, 0x0, 0x0, 0x8800}, 0x20040040) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) request_key(0x0, &(0x7f0000001ffb)={'syz', 0x1}, 0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x1004) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0x3, 0x380, 0x0, 0xe0, 0xe0, 0xe0, 0x0, 0x2e8, 0x2e8, 0x2e8, 0x2e8, 0x2e8, 0x7fffffe, 0x0, {[{{@uncond, 0x0, 0x70, 0xe0, 0x0, {0x6020000}}, @common=@unspec=@NFLOG={0x70, 'NFLOG\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, "a4bcf0ebf5d09e8706000000b1000000124ac31d4fda375c7794e420aa63529ebcf847246a5e8846085b0a30510b266347a84ae5ffea89b8654e448e0300"}}}, {{@ip={@local, @multicast1, 0x0, 0x0, '\x00', 'wg1\x00'}, 0x0, 0x1c8, 0x208, 0x0, {}, [@common=@inet=@hashlimit3={{0x158}, {'bridge_slave_1\x00', {0x0, 0x8, 0x0, 0x0, 0x0, 0x7fff, 0x8}}}]}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "29f0be44329ad4d94a815c71ad95092b933b5e380a7e5d3c56c51e9d0027"}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x3e0) 23:08:20 executing program 1: r0 = getpgrp(0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x24000000) r1 = gettid() perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000, 0x0, 0x2af}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000080), 0x30200, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) unshare(0x4000000) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r3, 0x0) r4 = syz_open_dev$cec(&(0x7f0000000300), 0x3, 0x2) preadv(r4, &(0x7f00000002c0)=[{&(0x7f00000001c0)=""/251, 0xfb}], 0x1, 0xda3, 0x400001) bpf$ITER_CREATE(0x21, &(0x7f0000000100)={r2}, 0x9) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x26, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = perf_event_open(&(0x7f00000006c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c44}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ID(r5, 0x80042407, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000140)={0x1, 0x80, 0x1, 0x7, 0x6, 0xff, 0x0, 0x2, 0x80200, 0xe, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x400, 0x1, @perf_bp={&(0x7f00000000c0), 0x8}, 0x18000, 0x8000, 0xfffffffc, 0x1, 0x1000000000, 0x8, 0x3, 0x0, 0x8, 0x0, 0x9}, r1, 0x2, r5, 0x0) clone(0x6cb2e100, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r1) wait4(0x0, 0x0, 0x0, 0x0) 23:08:20 executing program 4: perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0xc7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x12, 0xf7, 0x4, 0x3, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x500}, 0x40) 23:08:20 executing program 0: r0 = getpgrp(0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x24000000) r1 = gettid() perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000, 0x0, 0x2af}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000080), 0x30200, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) unshare(0x4000000) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r3, 0x0) r4 = syz_open_dev$cec(&(0x7f0000000300), 0x3, 0x2) preadv(r4, &(0x7f00000002c0)=[{&(0x7f00000001c0)=""/251, 0xfb}], 0x1, 0xda3, 0x400001) bpf$ITER_CREATE(0x21, &(0x7f0000000100)={r2}, 0x9) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x26, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = perf_event_open(&(0x7f00000006c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c44}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ID(r5, 0x80042407, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000140)={0x1, 0x80, 0x1, 0x7, 0x6, 0xff, 0x0, 0x2, 0x80200, 0xe, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x400, 0x1, @perf_bp={&(0x7f00000000c0), 0x8}, 0x18000, 0x8000, 0xfffffffc, 0x1, 0x1000000000, 0x8, 0x3, 0x0, 0x8, 0x0, 0x9}, r1, 0x2, r5, 0x2) clone(0x6cb2e100, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r1) wait4(0x0, 0x0, 0x0, 0x0) 23:08:20 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x15, 0x0, 0x1, 0x0, 0x6, @multicast}, 0x14) clone(0x2000000082148180, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_STRSET_GET(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000640)={0x0, 0x1cc}, 0x1, 0x0, 0x0, 0x8800}, 0x20040040) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) request_key(0x0, &(0x7f0000001ffb)={'syz', 0x1}, 0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x1004) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0x3, 0x380, 0x4, 0xe0, 0xe0, 0xe0, 0x0, 0x2e8, 0x2e8, 0x2e8, 0x2e8, 0x2e8, 0x7fffffe, 0x0, {[{{@uncond, 0x0, 0x70, 0xe0, 0x0, {0x6020000}}, @common=@unspec=@NFLOG={0x70, 'NFLOG\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, "a4bcf0ebf5d09e8706580300b1000000124ac31d4fda375c7794e420aa63529ebcf847246a5e8846085b0a30510b266347a84ae5ffea89b8654e4400"}}}, {{@ip={@local, @multicast1, 0x0, 0x0, '\x00', 'wg1\x00'}, 0x0, 0x1c8, 0x208, 0x0, {}, [@common=@inet=@hashlimit3={{0x158}, {'bridge_slave_1\x00', {0x0, 0x8, 0x0, 0x0, 0x0, 0x7fff, 0x8}}}]}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "29f0be44329ad4d94a815c71ad95092b933b5e380a7e5d3c56c51e9d0027"}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x3e0) 23:08:20 executing program 3: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x15, 0x0, 0x1, 0x0, 0x6, @multicast}, 0x14) clone(0x2000000082148180, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_STRSET_GET(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000640)={&(0x7f00000006c0)=ANY=[@ANYBLOB="cccd30", @ANYRES16=0x0, @ANYBLOB="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", @ANYRES32=0x0, @ANYBLOB="1400020069703667726574617030000000000000140002006970366572f370616e20000000000000fa0ee59a22b338aeb6d3895b934764e9a674c87f74b9c35aaa183a9ea95194a3dc40d9b230a9f627acae68e5f0381078395e744b4197fe3dd12112adacad625f6ae8e22901a3dd5920796e7dc087d5033e12c9e4aea2026a5df4ee89adbeda48287c2840149cf27af2cc0f064680a7b5e90f480b201f70326baca201fea21a0100000000000000"], 0x1cc}, 0x1, 0x0, 0x0, 0x8800}, 0x20040040) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) request_key(0x0, &(0x7f0000001ffb)={'syz', 0x1}, 0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x1004) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0x3, 0x380, 0x0, 0xe0, 0xe0, 0xe0, 0x0, 0x2e8, 0x2e8, 0x2e8, 0x2e8, 0x2e8, 0x7fffffe, 0x0, {[{{@uncond, 0x0, 0x70, 0xe0, 0x0, {0x6020000}}, @common=@unspec=@NFLOG={0x70, 'NFLOG\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, "a4bcf0ebf5d09e8706000000b1000000124ac31d4fda375c7794e420aa63529ebcf847246a5e8846085b0a30510b266347a84ae5ffea89b8654e449b0300"}}}, {{@ip={@local, @multicast1, 0x0, 0x0, '\x00', 'wg1\x00'}, 0x0, 0x1c8, 0x208, 0x0, {}, [@common=@inet=@hashlimit3={{0x158}, {'bridge_slave_1\x00', {0x0, 0x8, 0x0, 0x0, 0x0, 0x7fff, 0x8}}}]}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "29f0be44329ad4d94a815c71ad95092b933b5e380a7e5d3c56c51e9d0027"}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x3e0) 23:08:20 executing program 3: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x15, 0x0, 0x1, 0x0, 0x6, @multicast}, 0x14) clone(0x2000000082148180, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_STRSET_GET(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000640)={&(0x7f00000006c0)=ANY=[@ANYBLOB="cccd30", @ANYRES16=0x0, @ANYBLOB="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", @ANYRES32=0x0, @ANYBLOB="1400020069703667726574617030000000000000140002006970366572f370616e20000000000000fa0ee59a22b338aeb6d3895b934764e9a674c87f74b9c35aaa183a9ea95194a3dc40d9b230a9f627acae68e5f0381078395e744b4197fe3dd12112adacad625f6ae8e22901a3dd5920796e7dc087d5033e12c9e4aea2026a5df4ee89adbeda48287c2840149cf27af2cc0f064680a7b5e90f480b201f70326baca201fea21a0100000000000000"], 0x1cc}, 0x1, 0x0, 0x0, 0x8800}, 0x20040040) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) request_key(0x0, &(0x7f0000001ffb)={'syz', 0x1}, 0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x1004) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0x3, 0x380, 0x0, 0xe0, 0xe0, 0xe0, 0x0, 0x2e8, 0x2e8, 0x2e8, 0x2e8, 0x2e8, 0x7fffffe, 0x0, {[{{@uncond, 0x0, 0x70, 0xe0, 0x0, {0x6020000}}, @common=@unspec=@NFLOG={0x70, 'NFLOG\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, "a4bcf0ebf5d09e8706000000b1000000124ac31d4fda375c7794e420aa63529ebcf847246a5e8846085b0a30510b266347a84ae5ffea89b8654e44aa0300"}}}, {{@ip={@local, @multicast1, 0x0, 0x0, '\x00', 'wg1\x00'}, 0x0, 0x1c8, 0x208, 0x0, {}, [@common=@inet=@hashlimit3={{0x158}, {'bridge_slave_1\x00', {0x0, 0x8, 0x0, 0x0, 0x0, 0x7fff, 0x8}}}]}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "29f0be44329ad4d94a815c71ad95092b933b5e380a7e5d3c56c51e9d0027"}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x3e0) 23:08:20 executing program 4: perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0xc7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x12, 0xf7, 0x4, 0x3, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x600}, 0x40) 23:08:20 executing program 0: r0 = getpgrp(0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x24000000) r1 = gettid() perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000, 0x0, 0x2af}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000080), 0x30200, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) unshare(0x4000000) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r3, 0x0) r4 = syz_open_dev$cec(&(0x7f0000000300), 0x3, 0x2) preadv(r4, &(0x7f00000002c0)=[{&(0x7f00000001c0)=""/251, 0xfb}], 0x1, 0xda3, 0x400001) bpf$ITER_CREATE(0x21, &(0x7f0000000100)={r2}, 0x9) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x26, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = perf_event_open(&(0x7f00000006c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c44}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ID(r5, 0x80042407, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000140)={0x1, 0x80, 0x1, 0x7, 0x6, 0xff, 0x0, 0x2, 0x80200, 0xe, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x400, 0x1, @perf_bp={&(0x7f00000000c0), 0x8}, 0x18000, 0x8000, 0xfffffffc, 0x1, 0x1000000000, 0x8, 0x3, 0x0, 0x8, 0x0, 0x9}, r1, 0x2, r5, 0x2) clone(0x6cb2e100, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r1) wait4(0x0, 0x0, 0x0, 0x0) 23:08:20 executing program 1: r0 = getpgrp(0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x24000000) r1 = gettid() perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000, 0x0, 0x2af}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000080), 0x30200, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) unshare(0x4000000) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r3, 0x0) r4 = syz_open_dev$cec(&(0x7f0000000300), 0x3, 0x2) preadv(r4, &(0x7f00000002c0)=[{&(0x7f00000001c0)=""/251, 0xfb}], 0x1, 0xda3, 0x400001) bpf$ITER_CREATE(0x21, &(0x7f0000000100)={r2}, 0x9) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x26, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = perf_event_open(&(0x7f00000006c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c44}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ID(r5, 0x80042407, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000140)={0x1, 0x80, 0x1, 0x7, 0x6, 0xff, 0x0, 0x2, 0x80200, 0xe, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x400, 0x1, @perf_bp={&(0x7f00000000c0), 0x8}, 0x18000, 0x8000, 0xfffffffc, 0x1, 0x1000000000, 0x8, 0x3, 0x0, 0x8, 0x0, 0x9}, r1, 0x2, r5, 0x0) clone(0x6cb2e100, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r1) wait4(0x0, 0x0, 0x0, 0x0) 23:08:20 executing program 4: perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0xc7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x12, 0xf7, 0x4, 0x3, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x700}, 0x40) [ 2125.557732] cgroup: fork rejected by pids controller in /system.slice/ssh.service 23:08:22 executing program 0: r0 = getpgrp(0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x24000000) r1 = gettid() perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000, 0x0, 0x2af}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000080), 0x30200, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) unshare(0x4000000) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r3, 0x0) r4 = syz_open_dev$cec(&(0x7f0000000300), 0x3, 0x2) preadv(r4, &(0x7f00000002c0)=[{&(0x7f00000001c0)=""/251, 0xfb}], 0x1, 0xda3, 0x400001) bpf$ITER_CREATE(0x21, &(0x7f0000000100)={r2}, 0x9) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x26, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = perf_event_open(&(0x7f00000006c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c44}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ID(r5, 0x80042407, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000140)={0x1, 0x80, 0x1, 0x7, 0x6, 0xff, 0x0, 0x2, 0x80200, 0xe, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x400, 0x1, @perf_bp={&(0x7f00000000c0), 0x8}, 0x18000, 0x8000, 0xfffffffc, 0x1, 0x1000000000, 0x8, 0x3, 0x0, 0x8, 0x0, 0x9}, r1, 0x2, r5, 0x2) clone(0x6cb2e100, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r1) wait4(0x0, 0x0, 0x0, 0x0) 23:08:22 executing program 3: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x15, 0x0, 0x1, 0x0, 0x6, @multicast}, 0x14) clone(0x2000000082148180, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_STRSET_GET(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000640)={&(0x7f00000006c0)=ANY=[@ANYBLOB="cccd30", @ANYRES16=0x0, @ANYBLOB="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", @ANYRES32=0x0, @ANYBLOB="1400020069703667726574617030000000000000140002006970366572f370616e20000000000000fa0ee59a22b338aeb6d3895b934764e9a674c87f74b9c35aaa183a9ea95194a3dc40d9b230a9f627acae68e5f0381078395e744b4197fe3dd12112adacad625f6ae8e22901a3dd5920796e7dc087d5033e12c9e4aea2026a5df4ee89adbeda48287c2840149cf27af2cc0f064680a7b5e90f480b201f70326baca201fea21a0100000000000000"], 0x1cc}, 0x1, 0x0, 0x0, 0x8800}, 0x20040040) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) request_key(0x0, &(0x7f0000001ffb)={'syz', 0x1}, 0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x1004) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0x3, 0x380, 0x0, 0xe0, 0xe0, 0xe0, 0x0, 0x2e8, 0x2e8, 0x2e8, 0x2e8, 0x2e8, 0x7fffffe, 0x0, {[{{@uncond, 0x0, 0x70, 0xe0, 0x0, {0x6020000}}, @common=@unspec=@NFLOG={0x70, 'NFLOG\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, "a4bcf0ebf5d09e8706000000b1000000124ac31d4fda375c7794e420aa63529ebcf847246a5e8846085b0a30510b266347a84ae5ffea89b8654e44ae0300"}}}, {{@ip={@local, @multicast1, 0x0, 0x0, '\x00', 'wg1\x00'}, 0x0, 0x1c8, 0x208, 0x0, {}, [@common=@inet=@hashlimit3={{0x158}, {'bridge_slave_1\x00', {0x0, 0x8, 0x0, 0x0, 0x0, 0x7fff, 0x8}}}]}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "29f0be44329ad4d94a815c71ad95092b933b5e380a7e5d3c56c51e9d0027"}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x3e0) 23:08:22 executing program 2: r0 = getpgrp(0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x24000000) r1 = gettid() perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000080), 0x30200, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) unshare(0x4000000) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, r3, 0x0) preadv(0xffffffffffffffff, &(0x7f00000002c0)=[{&(0x7f00000001c0)=""/251, 0xfb}], 0x1, 0x0, 0x0) bpf$ITER_CREATE(0x21, &(0x7f0000000100)={r2}, 0x9) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x26, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = perf_event_open(&(0x7f00000006c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c44}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ID(r4, 0x80042407, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000140)={0x1, 0x80, 0x0, 0x7, 0x0, 0xff, 0x0, 0x2, 0x0, 0xe, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x400, 0x1, @perf_bp={&(0x7f00000000c0), 0x8}, 0x18000, 0x8000, 0xfffffffc, 0x1, 0x1000000000, 0x8, 0x3, 0x0, 0x8, 0x0, 0x9}, r1, 0x2, r4, 0x2) clone(0x6cb2e100, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r1) wait4(0x0, 0x0, 0x0, 0x0) 23:08:22 executing program 4: perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0xc7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x12, 0xf7, 0x4, 0x3, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x900}, 0x40) 23:08:22 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x15, 0x0, 0x1, 0x0, 0x6, @multicast}, 0x14) clone(0x2000000082148180, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_STRSET_GET(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000640)={0x0, 0x1cc}, 0x1, 0x0, 0x0, 0x8800}, 0x20040040) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) request_key(0x0, &(0x7f0000001ffb)={'syz', 0x1}, 0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x1004) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0x3, 0x380, 0x7, 0xe0, 0xe0, 0xe0, 0x0, 0x2e8, 0x2e8, 0x2e8, 0x2e8, 0x2e8, 0x7fffffe, 0x0, {[{{@uncond, 0x0, 0x70, 0xe0, 0x0, {0x6020000}}, @common=@unspec=@NFLOG={0x70, 'NFLOG\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, "a4bcf0ebf5d09e8706580300b1000000124ac31d4fda375c7794e420aa63529ebcf847246a5e8846085b0a30510b266347a84ae5ffea89b8654e4400"}}}, {{@ip={@local, @multicast1, 0x0, 0x0, '\x00', 'wg1\x00'}, 0x0, 0x1c8, 0x208, 0x0, {}, [@common=@inet=@hashlimit3={{0x158}, {'bridge_slave_1\x00', {0x0, 0x8, 0x0, 0x0, 0x0, 0x7fff, 0x8}}}]}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "29f0be44329ad4d94a815c71ad95092b933b5e380a7e5d3c56c51e9d0027"}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x3e0) 23:08:22 executing program 3: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x15, 0x0, 0x1, 0x0, 0x6, @multicast}, 0x14) clone(0x2000000082148180, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_STRSET_GET(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000640)={&(0x7f00000006c0)=ANY=[@ANYBLOB="cccd30", @ANYRES16=0x0, @ANYBLOB="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", @ANYRES32=0x0, @ANYBLOB="1400020069703667726574617030000000000000140002006970366572f370616e20000000000000fa0ee59a22b338aeb6d3895b934764e9a674c87f74b9c35aaa183a9ea95194a3dc40d9b230a9f627acae68e5f0381078395e744b4197fe3dd12112adacad625f6ae8e22901a3dd5920796e7dc087d5033e12c9e4aea2026a5df4ee89adbeda48287c2840149cf27af2cc0f064680a7b5e90f480b201f70326baca201fea21a0100000000000000"], 0x1cc}, 0x1, 0x0, 0x0, 0x8800}, 0x20040040) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) request_key(0x0, &(0x7f0000001ffb)={'syz', 0x1}, 0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x1004) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0x3, 0x380, 0x0, 0xe0, 0xe0, 0xe0, 0x0, 0x2e8, 0x2e8, 0x2e8, 0x2e8, 0x2e8, 0x7fffffe, 0x0, {[{{@uncond, 0x0, 0x70, 0xe0, 0x0, {0x6020000}}, @common=@unspec=@NFLOG={0x70, 'NFLOG\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, "a4bcf0ebf5d09e8706000000b1000000124ac31d4fda375c7794e420aa63529ebcf847246a5e8846085b0a30510b266347a84ae5ffea89b8654e44c60300"}}}, {{@ip={@local, @multicast1, 0x0, 0x0, '\x00', 'wg1\x00'}, 0x0, 0x1c8, 0x208, 0x0, {}, [@common=@inet=@hashlimit3={{0x158}, {'bridge_slave_1\x00', {0x0, 0x8, 0x0, 0x0, 0x0, 0x7fff, 0x8}}}]}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "29f0be44329ad4d94a815c71ad95092b933b5e380a7e5d3c56c51e9d0027"}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x3e0) 23:08:22 executing program 4: perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0xc7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x12, 0xf7, 0x4, 0x3, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0xa00}, 0x40) 23:08:22 executing program 4: perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0xc7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x12, 0xf7, 0x4, 0x3, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0xb00}, 0x40) 23:08:22 executing program 4: perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0xc7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x12, 0xf7, 0x4, 0x3, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0xc00}, 0x40) 23:08:22 executing program 3: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x15, 0x0, 0x1, 0x0, 0x6, @multicast}, 0x14) clone(0x2000000082148180, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_STRSET_GET(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000640)={&(0x7f00000006c0)=ANY=[@ANYBLOB="cccd30", @ANYRES16=0x0, @ANYBLOB="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", @ANYRES32=0x0, @ANYBLOB="1400020069703667726574617030000000000000140002006970366572f370616e20000000000000fa0ee59a22b338aeb6d3895b934764e9a674c87f74b9c35aaa183a9ea95194a3dc40d9b230a9f627acae68e5f0381078395e744b4197fe3dd12112adacad625f6ae8e22901a3dd5920796e7dc087d5033e12c9e4aea2026a5df4ee89adbeda48287c2840149cf27af2cc0f064680a7b5e90f480b201f70326baca201fea21a0100000000000000"], 0x1cc}, 0x1, 0x0, 0x0, 0x8800}, 0x20040040) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) request_key(0x0, &(0x7f0000001ffb)={'syz', 0x1}, 0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x1004) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0x3, 0x380, 0x0, 0xe0, 0xe0, 0xe0, 0x0, 0x2e8, 0x2e8, 0x2e8, 0x2e8, 0x2e8, 0x7fffffe, 0x0, {[{{@uncond, 0x0, 0x70, 0xe0, 0x0, {0x6020000}}, @common=@unspec=@NFLOG={0x70, 'NFLOG\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, "a4bcf0ebf5d09e8706000000b1000000124ac31d4fda375c7794e420aa63529ebcf847246a5e8846085b0a30510b266347a84ae5ffea89b8654e44d40300"}}}, {{@ip={@local, @multicast1, 0x0, 0x0, '\x00', 'wg1\x00'}, 0x0, 0x1c8, 0x208, 0x0, {}, [@common=@inet=@hashlimit3={{0x158}, {'bridge_slave_1\x00', {0x0, 0x8, 0x0, 0x0, 0x0, 0x7fff, 0x8}}}]}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "29f0be44329ad4d94a815c71ad95092b933b5e380a7e5d3c56c51e9d0027"}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x3e0) [ 2129.790391] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 2129.797234] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 2129.805841] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 2129.813190] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 2129.821678] device bridge_slave_1 left promiscuous mode [ 2129.827152] bridge0: port 2(bridge_slave_1) entered disabled state [ 2129.835516] device bridge_slave_0 left promiscuous mode [ 2129.841379] bridge0: port 1(bridge_slave_0) entered disabled state [ 2129.866699] device bond0 left promiscuous mode [ 2129.871878] device bond_slave_0 left promiscuous mode [ 2129.877089] device bond_slave_1 left promiscuous mode [ 2129.884645] device veth1_macvtap left promiscuous mode [ 2129.890921] device veth0_macvtap left promiscuous mode [ 2129.896454] device veth1_vlan left promiscuous mode [ 2129.902470] device veth0_vlan left promiscuous mode [ 2130.115461] device hsr_slave_1 left promiscuous mode [ 2130.123272] device hsr_slave_0 left promiscuous mode [ 2130.141347] team0 (unregistering): Port device team_slave_1 removed [ 2130.154457] team0 (unregistering): Port device team_slave_0 removed [ 2130.164554] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 2130.177363] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 2130.213332] bond0 (unregistering): Released all slaves [ 2131.088469] IPVS: ftp: loaded support on port[0] = 21 [ 2131.223359] chnl_net:caif_netlink_parms(): no params data found [ 2131.283108] bridge0: port 1(bridge_slave_0) entered blocking state [ 2131.290259] bridge0: port 1(bridge_slave_0) entered disabled state [ 2131.299512] device bridge_slave_0 entered promiscuous mode [ 2131.308853] bridge0: port 2(bridge_slave_1) entered blocking state [ 2131.315275] bridge0: port 2(bridge_slave_1) entered disabled state [ 2131.323052] device bridge_slave_1 entered promiscuous mode [ 2131.342726] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 2131.351871] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 2131.372215] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 2131.379974] team0: Port device team_slave_0 added [ 2131.385692] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 2131.393987] team0: Port device team_slave_1 added [ 2131.411631] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 2131.418607] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 2131.444421] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 2131.455811] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 2131.462308] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 2131.487586] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 2131.498775] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 2131.506281] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 2131.528448] device hsr_slave_0 entered promiscuous mode [ 2131.534544] device hsr_slave_1 entered promiscuous mode [ 2131.541065] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 2131.548475] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 2131.616341] bridge0: port 2(bridge_slave_1) entered blocking state [ 2131.622737] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2131.629532] bridge0: port 1(bridge_slave_0) entered blocking state [ 2131.636003] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2131.672926] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 2131.679697] 8021q: adding VLAN 0 to HW filter on device bond0 [ 2131.688540] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 2131.696788] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 2131.704399] bridge0: port 1(bridge_slave_0) entered disabled state [ 2131.711600] bridge0: port 2(bridge_slave_1) entered disabled state [ 2131.719844] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 2131.728338] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 2131.735268] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 2131.744747] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 2131.751225] 8021q: adding VLAN 0 to HW filter on device team0 [ 2131.761441] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 2131.769275] bridge0: port 1(bridge_slave_0) entered blocking state [ 2131.775615] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2131.786259] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 2131.794362] bridge0: port 2(bridge_slave_1) entered blocking state [ 2131.801303] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2131.821274] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 2131.829292] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 2131.836997] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 2131.847113] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 2131.858664] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 2131.868551] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 2131.874611] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 2131.890852] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 2131.899463] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 2131.905724] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 2131.913532] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 2131.925586] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 2131.939267] IPv6: ADDRCONF(NETDEV_UP): veth0_virt_wifi: link is not ready [ 2131.949543] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 2131.989152] IPv6: ADDRCONF(NETDEV_UP): veth0_vlan: link is not ready [ 2131.999483] IPv6: ADDRCONF(NETDEV_UP): vlan0: link is not ready [ 2132.006738] IPv6: ADDRCONF(NETDEV_UP): vlan1: link is not ready [ 2132.021462] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 2132.029035] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 2132.035892] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 2132.045562] device veth0_vlan entered promiscuous mode [ 2132.055270] device veth1_vlan entered promiscuous mode [ 2132.062239] IPv6: ADDRCONF(NETDEV_UP): macvlan0: link is not ready [ 2132.071947] IPv6: ADDRCONF(NETDEV_UP): macvlan1: link is not ready [ 2132.084460] IPv6: ADDRCONF(NETDEV_UP): veth0_macvtap: link is not ready [ 2132.095011] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 2132.102645] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 2132.111389] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 2132.125063] device veth0_macvtap entered promiscuous mode [ 2132.131795] IPv6: ADDRCONF(NETDEV_UP): macvtap0: link is not ready [ 2132.140929] device veth1_macvtap entered promiscuous mode [ 2132.151462] IPv6: ADDRCONF(NETDEV_UP): veth0_to_batadv: link is not ready [ 2132.161816] IPv6: ADDRCONF(NETDEV_UP): veth1_to_batadv: link is not ready [ 2132.171316] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 2132.182643] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2132.192238] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 2132.202305] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2132.211664] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 2132.221519] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2132.230856] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 2132.240772] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2132.252234] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 2132.260872] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 2132.269735] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 2132.278936] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 2132.289049] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2132.299581] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 2132.310082] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2132.319969] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 2132.330677] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2132.341469] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_1: link is not ready [ 2132.349177] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 2132.356197] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 2132.364751] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 2132.475734] IPv6: ADDRCONF(NETDEV_UP): wlan0: link is not ready [ 2132.483201] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 2132.505131] IPv6: ADDRCONF(NETDEV_UP): wlan1: link is not ready [ 2132.511401] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 2132.521069] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 2132.522363] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 2132.536570] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 2132.544722] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready 23:08:27 executing program 1: r0 = getpgrp(0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x24000000) r1 = gettid() perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000, 0x0, 0x2af}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000080), 0x30200, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) unshare(0x4000000) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r3, 0x0) r4 = syz_open_dev$cec(&(0x7f0000000300), 0x3, 0x2) preadv(r4, &(0x7f00000002c0)=[{&(0x7f00000001c0)=""/251, 0xfb}], 0x1, 0xda3, 0x400001) bpf$ITER_CREATE(0x21, &(0x7f0000000100)={r2}, 0x9) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x26, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = perf_event_open(&(0x7f00000006c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c44}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ID(r5, 0x80042407, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000140)={0x1, 0x80, 0x1, 0x7, 0x6, 0xff, 0x0, 0x2, 0x80200, 0xe, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x400, 0x1, @perf_bp={&(0x7f00000000c0), 0x8}, 0x18000, 0x8000, 0xfffffffc, 0x1, 0x1000000000, 0x8, 0x3, 0x0, 0x8, 0x0, 0x9}, r1, 0x2, r5, 0x0) clone(0x6cb2e100, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r1) wait4(0x0, 0x0, 0x0, 0x0) 23:08:27 executing program 4: perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0xc7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x12, 0xf7, 0x4, 0x3, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0xd00}, 0x40) 23:08:27 executing program 3: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x15, 0x0, 0x1, 0x0, 0x6, @multicast}, 0x14) clone(0x2000000082148180, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_STRSET_GET(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000640)={&(0x7f00000006c0)=ANY=[@ANYBLOB="cccd30", @ANYRES16=0x0, @ANYBLOB="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", @ANYRES32=0x0, @ANYBLOB="1400020069703667726574617030000000000000140002006970366572f370616e20000000000000fa0ee59a22b338aeb6d3895b934764e9a674c87f74b9c35aaa183a9ea95194a3dc40d9b230a9f627acae68e5f0381078395e744b4197fe3dd12112adacad625f6ae8e22901a3dd5920796e7dc087d5033e12c9e4aea2026a5df4ee89adbeda48287c2840149cf27af2cc0f064680a7b5e90f480b201f70326baca201fea21a0100000000000000"], 0x1cc}, 0x1, 0x0, 0x0, 0x8800}, 0x20040040) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) request_key(0x0, &(0x7f0000001ffb)={'syz', 0x1}, 0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x1004) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0x3, 0x380, 0x0, 0xe0, 0xe0, 0xe0, 0x0, 0x2e8, 0x2e8, 0x2e8, 0x2e8, 0x2e8, 0x7fffffe, 0x0, {[{{@uncond, 0x0, 0x70, 0xe0, 0x0, {0x6020000}}, @common=@unspec=@NFLOG={0x70, 'NFLOG\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, "a4bcf0ebf5d09e8706000000b1000000124ac31d4fda375c7794e420aa63529ebcf847246a5e8846085b0a30510b266347a84ae5ffea89b8654e44da0300"}}}, {{@ip={@local, @multicast1, 0x0, 0x0, '\x00', 'wg1\x00'}, 0x0, 0x1c8, 0x208, 0x0, {}, [@common=@inet=@hashlimit3={{0x158}, {'bridge_slave_1\x00', {0x0, 0x8, 0x0, 0x0, 0x0, 0x7fff, 0x8}}}]}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "29f0be44329ad4d94a815c71ad95092b933b5e380a7e5d3c56c51e9d0027"}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x3e0) 23:08:27 executing program 0: r0 = getpgrp(0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x24000000) r1 = gettid() perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000080), 0x30200, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) unshare(0x4000000) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, r3, 0x0) preadv(0xffffffffffffffff, &(0x7f00000002c0)=[{&(0x7f00000001c0)=""/251, 0xfb}], 0x1, 0x0, 0x0) bpf$ITER_CREATE(0x21, &(0x7f0000000100)={r2}, 0x9) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x26, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = perf_event_open(&(0x7f00000006c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c44}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ID(r4, 0x80042407, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000140)={0x1, 0x80, 0x1, 0x7, 0x6, 0xff, 0x0, 0x2, 0x80200, 0xe, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x400, 0x1, @perf_bp={&(0x7f00000000c0), 0x8}, 0x18000, 0x8000, 0xfffffffc, 0x1, 0x1000000000, 0x8, 0x3, 0x0, 0x8, 0x0, 0x9}, r1, 0x2, r4, 0x2) clone(0x6cb2e100, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r1) wait4(0x0, 0x0, 0x0, 0x0) 23:08:27 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x15, 0x0, 0x1, 0x0, 0x6, @multicast}, 0x14) clone(0x2000000082148180, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_STRSET_GET(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000640)={0x0, 0x1cc}, 0x1, 0x0, 0x0, 0x8800}, 0x20040040) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) request_key(0x0, &(0x7f0000001ffb)={'syz', 0x1}, 0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x1004) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0x3, 0x380, 0x8, 0xe0, 0xe0, 0xe0, 0x0, 0x2e8, 0x2e8, 0x2e8, 0x2e8, 0x2e8, 0x7fffffe, 0x0, {[{{@uncond, 0x0, 0x70, 0xe0, 0x0, {0x6020000}}, @common=@unspec=@NFLOG={0x70, 'NFLOG\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, "a4bcf0ebf5d09e8706580300b1000000124ac31d4fda375c7794e420aa63529ebcf847246a5e8846085b0a30510b266347a84ae5ffea89b8654e4400"}}}, {{@ip={@local, @multicast1, 0x0, 0x0, '\x00', 'wg1\x00'}, 0x0, 0x1c8, 0x208, 0x0, {}, [@common=@inet=@hashlimit3={{0x158}, {'bridge_slave_1\x00', {0x0, 0x8, 0x0, 0x0, 0x0, 0x7fff, 0x8}}}]}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "29f0be44329ad4d94a815c71ad95092b933b5e380a7e5d3c56c51e9d0027"}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x3e0) 23:08:27 executing program 2: r0 = getpgrp(0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x24000000) r1 = gettid() perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000080), 0x30200, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) unshare(0x4000000) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, r3, 0x0) preadv(0xffffffffffffffff, &(0x7f00000002c0)=[{&(0x7f00000001c0)=""/251, 0xfb}], 0x1, 0x0, 0x0) bpf$ITER_CREATE(0x21, &(0x7f0000000100)={r2}, 0x9) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x26, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = perf_event_open(&(0x7f00000006c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c44}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ID(r4, 0x80042407, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000140)={0x1, 0x80, 0x0, 0x7, 0x0, 0xff, 0x0, 0x2, 0x0, 0xe, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x400, 0x1, @perf_bp={&(0x7f00000000c0), 0x8}, 0x18000, 0x8000, 0xfffffffc, 0x1, 0x1000000000, 0x8, 0x3, 0x0, 0x8, 0x0, 0x9}, r1, 0x2, r4, 0x2) clone(0x6cb2e100, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r1) wait4(0x0, 0x0, 0x0, 0x0) 23:08:28 executing program 3: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x15, 0x0, 0x1, 0x0, 0x6, @multicast}, 0x14) clone(0x2000000082148180, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_STRSET_GET(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000640)={&(0x7f00000006c0)=ANY=[@ANYBLOB="cccd30", @ANYRES16=0x0, @ANYBLOB="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", @ANYRES32=0x0, @ANYBLOB="1400020069703667726574617030000000000000140002006970366572f370616e20000000000000fa0ee59a22b338aeb6d3895b934764e9a674c87f74b9c35aaa183a9ea95194a3dc40d9b230a9f627acae68e5f0381078395e744b4197fe3dd12112adacad625f6ae8e22901a3dd5920796e7dc087d5033e12c9e4aea2026a5df4ee89adbeda48287c2840149cf27af2cc0f064680a7b5e90f480b201f70326baca201fea21a0100000000000000"], 0x1cc}, 0x1, 0x0, 0x0, 0x8800}, 0x20040040) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) request_key(0x0, &(0x7f0000001ffb)={'syz', 0x1}, 0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x1004) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0x3, 0x380, 0x0, 0xe0, 0xe0, 0xe0, 0x0, 0x2e8, 0x2e8, 0x2e8, 0x2e8, 0x2e8, 0x7fffffe, 0x0, {[{{@uncond, 0x0, 0x70, 0xe0, 0x0, {0x6020000}}, @common=@unspec=@NFLOG={0x70, 'NFLOG\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, "a4bcf0ebf5d09e8706000000b1000000124ac31d4fda375c7794e420aa63529ebcf847246a5e8846085b0a30510b266347a84ae5ffea89b8654e44e00300"}}}, {{@ip={@local, @multicast1, 0x0, 0x0, '\x00', 'wg1\x00'}, 0x0, 0x1c8, 0x208, 0x0, {}, [@common=@inet=@hashlimit3={{0x158}, {'bridge_slave_1\x00', {0x0, 0x8, 0x0, 0x0, 0x0, 0x7fff, 0x8}}}]}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "29f0be44329ad4d94a815c71ad95092b933b5e380a7e5d3c56c51e9d0027"}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x3e0) 23:08:28 executing program 4: perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0xc7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x12, 0xf7, 0x4, 0x3, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0xe00}, 0x40) 23:08:28 executing program 3: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x15, 0x0, 0x1, 0x0, 0x6, @multicast}, 0x14) clone(0x2000000082148180, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_STRSET_GET(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000640)={&(0x7f00000006c0)=ANY=[@ANYBLOB="cccd30", @ANYRES16=0x0, @ANYBLOB="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", @ANYRES32=0x0, @ANYBLOB="1400020069703667726574617030000000000000140002006970366572f370616e20000000000000fa0ee59a22b338aeb6d3895b934764e9a674c87f74b9c35aaa183a9ea95194a3dc40d9b230a9f627acae68e5f0381078395e744b4197fe3dd12112adacad625f6ae8e22901a3dd5920796e7dc087d5033e12c9e4aea2026a5df4ee89adbeda48287c2840149cf27af2cc0f064680a7b5e90f480b201f70326baca201fea21a0100000000000000"], 0x1cc}, 0x1, 0x0, 0x0, 0x8800}, 0x20040040) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) request_key(0x0, &(0x7f0000001ffb)={'syz', 0x1}, 0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x1004) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0x3, 0x380, 0x0, 0xe0, 0xe0, 0xe0, 0x0, 0x2e8, 0x2e8, 0x2e8, 0x2e8, 0x2e8, 0x7fffffe, 0x0, {[{{@uncond, 0x0, 0x70, 0xe0, 0x0, {0x6020000}}, @common=@unspec=@NFLOG={0x70, 'NFLOG\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, "a4bcf0ebf5d09e8706000000b1000000124ac31d4fda375c7794e420aa63529ebcf847246a5e8846085b0a30510b266347a84ae5ffea89b8654e44e40300"}}}, {{@ip={@local, @multicast1, 0x0, 0x0, '\x00', 'wg1\x00'}, 0x0, 0x1c8, 0x208, 0x0, {}, [@common=@inet=@hashlimit3={{0x158}, {'bridge_slave_1\x00', {0x0, 0x8, 0x0, 0x0, 0x0, 0x7fff, 0x8}}}]}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "29f0be44329ad4d94a815c71ad95092b933b5e380a7e5d3c56c51e9d0027"}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x3e0) 23:08:28 executing program 0: r0 = getpgrp(0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x24000000) r1 = gettid() perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000080), 0x30200, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) unshare(0x4000000) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, r3, 0x0) preadv(0xffffffffffffffff, &(0x7f00000002c0)=[{&(0x7f00000001c0)=""/251, 0xfb}], 0x1, 0x0, 0x0) bpf$ITER_CREATE(0x21, &(0x7f0000000100)={r2}, 0x9) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x26, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = perf_event_open(&(0x7f00000006c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c44}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ID(r4, 0x80042407, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000140)={0x1, 0x80, 0x1, 0x7, 0x6, 0xff, 0x0, 0x2, 0x80200, 0xe, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x400, 0x1, @perf_bp={&(0x7f00000000c0), 0x8}, 0x18000, 0x8000, 0xfffffffc, 0x1, 0x1000000000, 0x8, 0x3, 0x0, 0x8, 0x0, 0x9}, r1, 0x2, r4, 0x2) clone(0x6cb2e100, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r1) wait4(0x0, 0x0, 0x0, 0x0) 23:08:28 executing program 3: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x15, 0x0, 0x1, 0x0, 0x6, @multicast}, 0x14) clone(0x2000000082148180, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_STRSET_GET(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000640)={&(0x7f00000006c0)=ANY=[@ANYBLOB="cccd30", @ANYRES16=0x0, @ANYBLOB="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", @ANYRES32=0x0, @ANYBLOB="1400020069703667726574617030000000000000140002006970366572f370616e20000000000000fa0ee59a22b338aeb6d3895b934764e9a674c87f74b9c35aaa183a9ea95194a3dc40d9b230a9f627acae68e5f0381078395e744b4197fe3dd12112adacad625f6ae8e22901a3dd5920796e7dc087d5033e12c9e4aea2026a5df4ee89adbeda48287c2840149cf27af2cc0f064680a7b5e90f480b201f70326baca201fea21a0100000000000000"], 0x1cc}, 0x1, 0x0, 0x0, 0x8800}, 0x20040040) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) request_key(0x0, &(0x7f0000001ffb)={'syz', 0x1}, 0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x1004) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0x3, 0x380, 0x0, 0xe0, 0xe0, 0xe0, 0x0, 0x2e8, 0x2e8, 0x2e8, 0x2e8, 0x2e8, 0x7fffffe, 0x0, {[{{@uncond, 0x0, 0x70, 0xe0, 0x0, {0x6020000}}, @common=@unspec=@NFLOG={0x70, 'NFLOG\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, "a4bcf0ebf5d09e8706000000b1000000124ac31d4fda375c7794e420aa63529ebcf847246a5e8846085b0a30510b266347a84ae5ffea89b8654e44ea0300"}}}, {{@ip={@local, @multicast1, 0x0, 0x0, '\x00', 'wg1\x00'}, 0x0, 0x1c8, 0x208, 0x0, {}, [@common=@inet=@hashlimit3={{0x158}, {'bridge_slave_1\x00', {0x0, 0x8, 0x0, 0x0, 0x0, 0x7fff, 0x8}}}]}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "29f0be44329ad4d94a815c71ad95092b933b5e380a7e5d3c56c51e9d0027"}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x3e0) 23:08:28 executing program 4: perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0xc7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x12, 0xf7, 0x4, 0x3, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0xf00}, 0x40) [ 2133.129089] Bluetooth: hci1: command 0x0409 tx timeout [ 2135.207612] Bluetooth: hci1: command 0x041b tx timeout 23:08:30 executing program 1: r0 = getpgrp(0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x24000000) r1 = gettid() perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000, 0x0, 0x2af}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000080), 0x30200, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) unshare(0x4000000) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r3, 0x0) r4 = syz_open_dev$cec(&(0x7f0000000300), 0x3, 0x2) preadv(r4, &(0x7f00000002c0)=[{&(0x7f00000001c0)=""/251, 0xfb}], 0x1, 0xda3, 0x400001) bpf$ITER_CREATE(0x21, &(0x7f0000000100)={r2}, 0x9) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x26, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = perf_event_open(&(0x7f00000006c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c44}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ID(r5, 0x80042407, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000140)={0x1, 0x80, 0x1, 0x7, 0x6, 0xff, 0x0, 0x2, 0x80200, 0xe, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x400, 0x1, @perf_bp={&(0x7f00000000c0), 0x8}, 0x18000, 0x8000, 0xfffffffc, 0x1, 0x1000000000, 0x8, 0x3, 0x0, 0x8, 0x0, 0x9}, r1, 0x2, r5, 0x2) clone(0x0, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r1) wait4(0x0, 0x0, 0x0, 0x0) 23:08:30 executing program 3: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x15, 0x0, 0x1, 0x0, 0x6, @multicast}, 0x14) clone(0x2000000082148180, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_STRSET_GET(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000640)={&(0x7f00000006c0)=ANY=[@ANYBLOB="cccd30", @ANYRES16=0x0, @ANYBLOB="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", @ANYRES32=0x0, @ANYBLOB="1400020069703667726574617030000000000000140002006970366572f370616e20000000000000fa0ee59a22b338aeb6d3895b934764e9a674c87f74b9c35aaa183a9ea95194a3dc40d9b230a9f627acae68e5f0381078395e744b4197fe3dd12112adacad625f6ae8e22901a3dd5920796e7dc087d5033e12c9e4aea2026a5df4ee89adbeda48287c2840149cf27af2cc0f064680a7b5e90f480b201f70326baca201fea21a0100000000000000"], 0x1cc}, 0x1, 0x0, 0x0, 0x8800}, 0x20040040) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) request_key(0x0, &(0x7f0000001ffb)={'syz', 0x1}, 0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x1004) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0x3, 0x380, 0x0, 0xe0, 0xe0, 0xe0, 0x0, 0x2e8, 0x2e8, 0x2e8, 0x2e8, 0x2e8, 0x7fffffe, 0x0, {[{{@uncond, 0x0, 0x70, 0xe0, 0x0, {0x6020000}}, @common=@unspec=@NFLOG={0x70, 'NFLOG\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, "a4bcf0ebf5d09e8706000000b1000000124ac31d4fda375c7794e420aa63529ebcf847246a5e8846085b0a30510b266347a84ae5ffea89b8654e44020800"}}}, {{@ip={@local, @multicast1, 0x0, 0x0, '\x00', 'wg1\x00'}, 0x0, 0x1c8, 0x208, 0x0, {}, [@common=@inet=@hashlimit3={{0x158}, {'bridge_slave_1\x00', {0x0, 0x8, 0x0, 0x0, 0x0, 0x7fff, 0x8}}}]}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "29f0be44329ad4d94a815c71ad95092b933b5e380a7e5d3c56c51e9d0027"}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x3e0) 23:08:30 executing program 4: perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0xc7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x12, 0xf7, 0x4, 0x3, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x1100}, 0x40) 23:08:30 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x15, 0x0, 0x1, 0x0, 0x6, @multicast}, 0x14) clone(0x2000000082148180, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_STRSET_GET(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000640)={0x0, 0x1cc}, 0x1, 0x0, 0x0, 0x8800}, 0x20040040) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) request_key(0x0, &(0x7f0000001ffb)={'syz', 0x1}, 0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x1004) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0x3, 0x380, 0xc, 0xe0, 0xe0, 0xe0, 0x0, 0x2e8, 0x2e8, 0x2e8, 0x2e8, 0x2e8, 0x7fffffe, 0x0, {[{{@uncond, 0x0, 0x70, 0xe0, 0x0, {0x6020000}}, @common=@unspec=@NFLOG={0x70, 'NFLOG\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, "a4bcf0ebf5d09e8706580300b1000000124ac31d4fda375c7794e420aa63529ebcf847246a5e8846085b0a30510b266347a84ae5ffea89b8654e4400"}}}, {{@ip={@local, @multicast1, 0x0, 0x0, '\x00', 'wg1\x00'}, 0x0, 0x1c8, 0x208, 0x0, {}, [@common=@inet=@hashlimit3={{0x158}, {'bridge_slave_1\x00', {0x0, 0x8, 0x0, 0x0, 0x0, 0x7fff, 0x8}}}]}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "29f0be44329ad4d94a815c71ad95092b933b5e380a7e5d3c56c51e9d0027"}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x3e0) 23:08:30 executing program 2: r0 = getpgrp(0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x24000000) r1 = gettid() perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000080), 0x30200, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) unshare(0x4000000) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, r3, 0x0) preadv(0xffffffffffffffff, &(0x7f00000002c0)=[{&(0x7f00000001c0)=""/251, 0xfb}], 0x1, 0x0, 0x0) bpf$ITER_CREATE(0x21, &(0x7f0000000100)={r2}, 0x9) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x26, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = perf_event_open(&(0x7f00000006c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c44}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ID(r4, 0x80042407, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000140)={0x1, 0x80, 0x0, 0x7, 0x0, 0xff, 0x0, 0x2, 0x0, 0xe, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x400, 0x1, @perf_bp={&(0x7f00000000c0), 0x8}, 0x18000, 0x8000, 0xfffffffc, 0x1, 0x1000000000, 0x8, 0x3, 0x0, 0x8, 0x0, 0x9}, r1, 0x2, r4, 0x2) clone(0x6cb2e100, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r1) wait4(0x0, 0x0, 0x0, 0x0) 23:08:31 executing program 4: perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0xc7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x12, 0xf7, 0x4, 0x3, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x1200}, 0x40) 23:08:31 executing program 4: perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0xc7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x12, 0xf7, 0x4, 0x3, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x1300}, 0x40) 23:08:31 executing program 3: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x15, 0x0, 0x1, 0x0, 0x6, @multicast}, 0x14) clone(0x2000000082148180, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_STRSET_GET(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000640)={&(0x7f00000006c0)=ANY=[@ANYBLOB="cccd30", @ANYRES16=0x0, @ANYBLOB="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", @ANYRES32=0x0, @ANYBLOB="1400020069703667726574617030000000000000140002006970366572f370616e20000000000000fa0ee59a22b338aeb6d3895b934764e9a674c87f74b9c35aaa183a9ea95194a3dc40d9b230a9f627acae68e5f0381078395e744b4197fe3dd12112adacad625f6ae8e22901a3dd5920796e7dc087d5033e12c9e4aea2026a5df4ee89adbeda48287c2840149cf27af2cc0f064680a7b5e90f480b201f70326baca201fea21a0100000000000000"], 0x1cc}, 0x1, 0x0, 0x0, 0x8800}, 0x20040040) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) request_key(0x0, &(0x7f0000001ffb)={'syz', 0x1}, 0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x1004) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0x3, 0x380, 0x0, 0xe0, 0xe0, 0xe0, 0x0, 0x2e8, 0x2e8, 0x2e8, 0x2e8, 0x2e8, 0x7fffffe, 0x0, {[{{@uncond, 0x0, 0x70, 0xe0, 0x0, {0x6020000}}, @common=@unspec=@NFLOG={0x70, 'NFLOG\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, "a4bcf0ebf5d09e8706000000b1000000124ac31d4fda375c7794e420aa63529ebcf847246a5e8846085b0a30510b266347a84ae5ffea89b8654e44011800"}}}, {{@ip={@local, @multicast1, 0x0, 0x0, '\x00', 'wg1\x00'}, 0x0, 0x1c8, 0x208, 0x0, {}, [@common=@inet=@hashlimit3={{0x158}, {'bridge_slave_1\x00', {0x0, 0x8, 0x0, 0x0, 0x0, 0x7fff, 0x8}}}]}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "29f0be44329ad4d94a815c71ad95092b933b5e380a7e5d3c56c51e9d0027"}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x3e0) 23:08:31 executing program 3: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x15, 0x0, 0x1, 0x0, 0x6, @multicast}, 0x14) clone(0x2000000082148180, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_STRSET_GET(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000640)={&(0x7f00000006c0)=ANY=[@ANYBLOB="cccd30", @ANYRES16=0x0, @ANYBLOB="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", @ANYRES32=0x0, @ANYBLOB="1400020069703667726574617030000000000000140002006970366572f370616e20000000000000fa0ee59a22b338aeb6d3895b934764e9a674c87f74b9c35aaa183a9ea95194a3dc40d9b230a9f627acae68e5f0381078395e744b4197fe3dd12112adacad625f6ae8e22901a3dd5920796e7dc087d5033e12c9e4aea2026a5df4ee89adbeda48287c2840149cf27af2cc0f064680a7b5e90f480b201f70326baca201fea21a0100000000000000"], 0x1cc}, 0x1, 0x0, 0x0, 0x8800}, 0x20040040) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) request_key(0x0, &(0x7f0000001ffb)={'syz', 0x1}, 0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x1004) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0x3, 0x380, 0x0, 0xe0, 0xe0, 0xe0, 0x0, 0x2e8, 0x2e8, 0x2e8, 0x2e8, 0x2e8, 0x7fffffe, 0x0, {[{{@uncond, 0x0, 0x70, 0xe0, 0x0, {0x6020000}}, @common=@unspec=@NFLOG={0x70, 'NFLOG\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, "a4bcf0ebf5d09e8706000000b1000000124ac31d4fda375c7794e420aa63529ebcf847246a5e8846085b0a30510b266347a84ae5ffea89b8654e44021a00"}}}, {{@ip={@local, @multicast1, 0x0, 0x0, '\x00', 'wg1\x00'}, 0x0, 0x1c8, 0x208, 0x0, {}, [@common=@inet=@hashlimit3={{0x158}, {'bridge_slave_1\x00', {0x0, 0x8, 0x0, 0x0, 0x0, 0x7fff, 0x8}}}]}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "29f0be44329ad4d94a815c71ad95092b933b5e380a7e5d3c56c51e9d0027"}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x3e0) 23:08:31 executing program 2: r0 = getpgrp(0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x24000000) r1 = gettid() perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000080), 0x30200, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) unshare(0x4000000) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, r3, 0x0) preadv(0xffffffffffffffff, &(0x7f00000002c0)=[{&(0x7f00000001c0)=""/251, 0xfb}], 0x1, 0x0, 0x0) bpf$ITER_CREATE(0x21, &(0x7f0000000100)={r2}, 0x9) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x26, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = perf_event_open(&(0x7f00000006c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c44}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ID(r4, 0x80042407, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000140)={0x1, 0x80, 0x0, 0x7, 0x0, 0xff, 0x0, 0x2, 0x0, 0xe, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x400, 0x1, @perf_bp={&(0x7f00000000c0), 0x8}, 0x18000, 0x8000, 0xfffffffc, 0x1, 0x1000000000, 0x8, 0x3, 0x0, 0x8, 0x0, 0x9}, r1, 0x2, r4, 0x2) clone(0x6cb2e100, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r1) wait4(0x0, 0x0, 0x0, 0x0) 23:08:31 executing program 0: r0 = getpgrp(0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x24000000) r1 = gettid() perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000, 0x0, 0x2af}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000080), 0x30200, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) unshare(0x4000000) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r3, 0x0) r4 = syz_open_dev$cec(&(0x7f0000000300), 0x3, 0x2) preadv(r4, &(0x7f00000002c0)=[{&(0x7f00000001c0)=""/251, 0xfb}], 0x1, 0xda3, 0x400001) bpf$ITER_CREATE(0x21, &(0x7f0000000100)={r2}, 0x9) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x26, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = perf_event_open(&(0x7f00000006c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c44}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ID(r5, 0x80042407, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000140)={0x1, 0x80, 0x1, 0x7, 0x6, 0xff, 0x0, 0x2, 0x80200, 0xe, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x400, 0x1, @perf_bp={&(0x7f00000000c0), 0x8}, 0x18000, 0x8000, 0xfffffffc, 0x1, 0x1000000000, 0x8, 0x3, 0x0, 0x8, 0x0, 0x9}, r1, 0x2, r5, 0x2) clone(0x6cb2e100, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r1) wait4(0x0, 0x0, 0x0, 0x0) 23:08:31 executing program 4: perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0xc7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x12, 0xf7, 0x4, 0x3, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x1400}, 0x40) 23:08:31 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x15, 0x0, 0x1, 0x0, 0x6, @multicast}, 0x14) clone(0x2000000082148180, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_STRSET_GET(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000640)={0x0, 0x1cc}, 0x1, 0x0, 0x0, 0x8800}, 0x20040040) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) request_key(0x0, &(0x7f0000001ffb)={'syz', 0x1}, 0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x1004) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0x3, 0x380, 0xd, 0xe0, 0xe0, 0xe0, 0x0, 0x2e8, 0x2e8, 0x2e8, 0x2e8, 0x2e8, 0x7fffffe, 0x0, {[{{@uncond, 0x0, 0x70, 0xe0, 0x0, {0x6020000}}, @common=@unspec=@NFLOG={0x70, 'NFLOG\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, "a4bcf0ebf5d09e8706580300b1000000124ac31d4fda375c7794e420aa63529ebcf847246a5e8846085b0a30510b266347a84ae5ffea89b8654e4400"}}}, {{@ip={@local, @multicast1, 0x0, 0x0, '\x00', 'wg1\x00'}, 0x0, 0x1c8, 0x208, 0x0, {}, [@common=@inet=@hashlimit3={{0x158}, {'bridge_slave_1\x00', {0x0, 0x8, 0x0, 0x0, 0x0, 0x7fff, 0x8}}}]}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "29f0be44329ad4d94a815c71ad95092b933b5e380a7e5d3c56c51e9d0027"}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x3e0) 23:08:31 executing program 1: r0 = getpgrp(0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x24000000) r1 = gettid() perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000, 0x0, 0x2af}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000080), 0x30200, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) unshare(0x4000000) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r3, 0x0) r4 = syz_open_dev$cec(&(0x7f0000000300), 0x3, 0x2) preadv(r4, &(0x7f00000002c0)=[{&(0x7f00000001c0)=""/251, 0xfb}], 0x1, 0xda3, 0x400001) bpf$ITER_CREATE(0x21, &(0x7f0000000100)={r2}, 0x9) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x26, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = perf_event_open(&(0x7f00000006c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c44}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ID(r5, 0x80042407, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000140)={0x1, 0x80, 0x1, 0x7, 0x6, 0xff, 0x0, 0x2, 0x80200, 0xe, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x400, 0x1, @perf_bp={&(0x7f00000000c0), 0x8}, 0x18000, 0x8000, 0xfffffffc, 0x1, 0x1000000000, 0x8, 0x3, 0x0, 0x8, 0x0, 0x9}, r1, 0x2, r5, 0x2) clone(0x0, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r1) wait4(0x0, 0x0, 0x0, 0x0) 23:08:31 executing program 4: perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0xc7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x12, 0xf7, 0x4, 0x3, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x1800}, 0x40) 23:08:31 executing program 3: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x15, 0x0, 0x1, 0x0, 0x6, @multicast}, 0x14) clone(0x2000000082148180, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_STRSET_GET(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000640)={&(0x7f00000006c0)=ANY=[@ANYBLOB="cccd30", @ANYRES16=0x0, @ANYBLOB="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", @ANYRES32=0x0, @ANYBLOB="1400020069703667726574617030000000000000140002006970366572f370616e20000000000000fa0ee59a22b338aeb6d3895b934764e9a674c87f74b9c35aaa183a9ea95194a3dc40d9b230a9f627acae68e5f0381078395e744b4197fe3dd12112adacad625f6ae8e22901a3dd5920796e7dc087d5033e12c9e4aea2026a5df4ee89adbeda48287c2840149cf27af2cc0f064680a7b5e90f480b201f70326baca201fea21a0100000000000000"], 0x1cc}, 0x1, 0x0, 0x0, 0x8800}, 0x20040040) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) request_key(0x0, &(0x7f0000001ffb)={'syz', 0x1}, 0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x1004) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0x3, 0x380, 0x0, 0xe0, 0xe0, 0xe0, 0x0, 0x2e8, 0x2e8, 0x2e8, 0x2e8, 0x2e8, 0x7fffffe, 0x0, {[{{@uncond, 0x0, 0x70, 0xe0, 0x0, {0x6020000}}, @common=@unspec=@NFLOG={0x70, 'NFLOG\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, "a4bcf0ebf5d09e8706000000b1000000124ac31d4fda375c7794e420aa63529ebcf847246a5e8846085b0a30510b266347a84ae5ffea89b8654e44001d00"}}}, {{@ip={@local, @multicast1, 0x0, 0x0, '\x00', 'wg1\x00'}, 0x0, 0x1c8, 0x208, 0x0, {}, [@common=@inet=@hashlimit3={{0x158}, {'bridge_slave_1\x00', {0x0, 0x8, 0x0, 0x0, 0x0, 0x7fff, 0x8}}}]}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "29f0be44329ad4d94a815c71ad95092b933b5e380a7e5d3c56c51e9d0027"}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x3e0) 23:08:31 executing program 2: r0 = getpgrp(0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x24000000) r1 = gettid() perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000080), 0x30200, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) unshare(0x4000000) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, r3, 0x0) preadv(0xffffffffffffffff, &(0x7f00000002c0)=[{&(0x7f00000001c0)=""/251, 0xfb}], 0x1, 0x0, 0x0) bpf$ITER_CREATE(0x21, &(0x7f0000000100)={r2}, 0x9) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x26, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = perf_event_open(&(0x7f00000006c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c44}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ID(r4, 0x80042407, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000140)={0x1, 0x80, 0x0, 0x7, 0x0, 0xff, 0x0, 0x2, 0x0, 0xe, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x400, 0x1, @perf_bp={&(0x7f00000000c0), 0x8}, 0x18000, 0x8000, 0xfffffffc, 0x1, 0x1000000000, 0x8, 0x3, 0x0, 0x8, 0x0, 0x9}, r1, 0x2, r4, 0x2) clone(0x6cb2e100, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r1) wait4(0x0, 0x0, 0x0, 0x0) 23:08:31 executing program 4: perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0xc7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x12, 0xf7, 0x4, 0x3, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x4000}, 0x40) 23:08:31 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x15, 0x0, 0x1, 0x0, 0x6, @multicast}, 0x14) clone(0x2000000082148180, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_STRSET_GET(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000640)={0x0, 0x1cc}, 0x1, 0x0, 0x0, 0x8800}, 0x20040040) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) request_key(0x0, &(0x7f0000001ffb)={'syz', 0x1}, 0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x1004) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0x3, 0x380, 0x1d, 0xe0, 0xe0, 0xe0, 0x0, 0x2e8, 0x2e8, 0x2e8, 0x2e8, 0x2e8, 0x7fffffe, 0x0, {[{{@uncond, 0x0, 0x70, 0xe0, 0x0, {0x6020000}}, @common=@unspec=@NFLOG={0x70, 'NFLOG\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, "a4bcf0ebf5d09e8706580300b1000000124ac31d4fda375c7794e420aa63529ebcf847246a5e8846085b0a30510b266347a84ae5ffea89b8654e4400"}}}, {{@ip={@local, @multicast1, 0x0, 0x0, '\x00', 'wg1\x00'}, 0x0, 0x1c8, 0x208, 0x0, {}, [@common=@inet=@hashlimit3={{0x158}, {'bridge_slave_1\x00', {0x0, 0x8, 0x0, 0x0, 0x0, 0x7fff, 0x8}}}]}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "29f0be44329ad4d94a815c71ad95092b933b5e380a7e5d3c56c51e9d0027"}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x3e0) 23:08:31 executing program 3: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x15, 0x0, 0x1, 0x0, 0x6, @multicast}, 0x14) clone(0x2000000082148180, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_STRSET_GET(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000640)={&(0x7f00000006c0)=ANY=[@ANYBLOB="cccd30", @ANYRES16=0x0, @ANYBLOB="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", @ANYRES32=0x0, @ANYBLOB="1400020069703667726574617030000000000000140002006970366572f370616e20000000000000fa0ee59a22b338aeb6d3895b934764e9a674c87f74b9c35aaa183a9ea95194a3dc40d9b230a9f627acae68e5f0381078395e744b4197fe3dd12112adacad625f6ae8e22901a3dd5920796e7dc087d5033e12c9e4aea2026a5df4ee89adbeda48287c2840149cf27af2cc0f064680a7b5e90f480b201f70326baca201fea21a0100000000000000"], 0x1cc}, 0x1, 0x0, 0x0, 0x8800}, 0x20040040) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) request_key(0x0, &(0x7f0000001ffb)={'syz', 0x1}, 0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x1004) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0x3, 0x380, 0x0, 0xe0, 0xe0, 0xe0, 0x0, 0x2e8, 0x2e8, 0x2e8, 0x2e8, 0x2e8, 0x7fffffe, 0x0, {[{{@uncond, 0x0, 0x70, 0xe0, 0x0, {0x6020000}}, @common=@unspec=@NFLOG={0x70, 'NFLOG\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, "a4bcf0ebf5d09e8706000000b1000000124ac31d4fda375c7794e420aa63529ebcf847246a5e8846085b0a30510b266347a84ae5ffea89b8654e44002000"}}}, {{@ip={@local, @multicast1, 0x0, 0x0, '\x00', 'wg1\x00'}, 0x0, 0x1c8, 0x208, 0x0, {}, [@common=@inet=@hashlimit3={{0x158}, {'bridge_slave_1\x00', {0x0, 0x8, 0x0, 0x0, 0x0, 0x7fff, 0x8}}}]}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "29f0be44329ad4d94a815c71ad95092b933b5e380a7e5d3c56c51e9d0027"}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x3e0) 23:08:31 executing program 4: perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0xc7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x12, 0xf7, 0x4, 0x3, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x4701}, 0x40) 23:08:31 executing program 4: perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0xc7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x12, 0xf7, 0x4, 0x3, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x400000}, 0x40) [ 2137.287776] Bluetooth: hci1: command 0x040f tx timeout 23:08:34 executing program 3: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x15, 0x0, 0x1, 0x0, 0x6, @multicast}, 0x14) clone(0x2000000082148180, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_STRSET_GET(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000640)={&(0x7f00000006c0)=ANY=[@ANYBLOB="cccd30", @ANYRES16=0x0, @ANYBLOB="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", @ANYRES32=0x0, @ANYBLOB="1400020069703667726574617030000000000000140002006970366572f370616e20000000000000fa0ee59a22b338aeb6d3895b934764e9a674c87f74b9c35aaa183a9ea95194a3dc40d9b230a9f627acae68e5f0381078395e744b4197fe3dd12112adacad625f6ae8e22901a3dd5920796e7dc087d5033e12c9e4aea2026a5df4ee89adbeda48287c2840149cf27af2cc0f064680a7b5e90f480b201f70326baca201fea21a0100000000000000"], 0x1cc}, 0x1, 0x0, 0x0, 0x8800}, 0x20040040) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) request_key(0x0, &(0x7f0000001ffb)={'syz', 0x1}, 0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x1004) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0x3, 0x380, 0x0, 0xe0, 0xe0, 0xe0, 0x0, 0x2e8, 0x2e8, 0x2e8, 0x2e8, 0x2e8, 0x7fffffe, 0x0, {[{{@uncond, 0x0, 0x70, 0xe0, 0x0, {0x6020000}}, @common=@unspec=@NFLOG={0x70, 'NFLOG\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, "a4bcf0ebf5d09e8706000000b1000000124ac31d4fda375c7794e420aa63529ebcf847246a5e8846085b0a30510b266347a84ae5ffea89b8654e44002200"}}}, {{@ip={@local, @multicast1, 0x0, 0x0, '\x00', 'wg1\x00'}, 0x0, 0x1c8, 0x208, 0x0, {}, [@common=@inet=@hashlimit3={{0x158}, {'bridge_slave_1\x00', {0x0, 0x8, 0x0, 0x0, 0x0, 0x7fff, 0x8}}}]}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "29f0be44329ad4d94a815c71ad95092b933b5e380a7e5d3c56c51e9d0027"}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x3e0) 23:08:34 executing program 0: r0 = getpgrp(0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x24000000) r1 = gettid() perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000, 0x0, 0x2af}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000080), 0x30200, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) unshare(0x4000000) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r3, 0x0) r4 = syz_open_dev$cec(&(0x7f0000000300), 0x3, 0x2) preadv(r4, &(0x7f00000002c0)=[{&(0x7f00000001c0)=""/251, 0xfb}], 0x1, 0xda3, 0x400001) bpf$ITER_CREATE(0x21, &(0x7f0000000100)={r2}, 0x9) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x26, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = perf_event_open(&(0x7f00000006c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c44}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ID(r5, 0x80042407, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000140)={0x1, 0x80, 0x1, 0x7, 0x6, 0xff, 0x0, 0x2, 0x80200, 0xe, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x400, 0x1, @perf_bp={&(0x7f00000000c0), 0x8}, 0x18000, 0x8000, 0xfffffffc, 0x1, 0x1000000000, 0x8, 0x3, 0x0, 0x8, 0x0, 0x9}, r1, 0x2, r5, 0x2) clone(0x6cb2e100, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r1) wait4(0x0, 0x0, 0x0, 0x0) 23:08:34 executing program 4: perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0xc7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x12, 0xf7, 0x4, 0x3, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x80ffff}, 0x40) 23:08:34 executing program 1: r0 = getpgrp(0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x24000000) r1 = gettid() perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000, 0x0, 0x2af}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000080), 0x30200, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) unshare(0x4000000) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r3, 0x0) r4 = syz_open_dev$cec(&(0x7f0000000300), 0x3, 0x2) preadv(r4, &(0x7f00000002c0)=[{&(0x7f00000001c0)=""/251, 0xfb}], 0x1, 0xda3, 0x400001) bpf$ITER_CREATE(0x21, &(0x7f0000000100)={r2}, 0x9) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x26, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = perf_event_open(&(0x7f00000006c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c44}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ID(r5, 0x80042407, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000140)={0x1, 0x80, 0x1, 0x7, 0x6, 0xff, 0x0, 0x2, 0x80200, 0xe, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x400, 0x1, @perf_bp={&(0x7f00000000c0), 0x8}, 0x18000, 0x8000, 0xfffffffc, 0x1, 0x1000000000, 0x8, 0x3, 0x0, 0x8, 0x0, 0x9}, r1, 0x2, r5, 0x2) clone(0x0, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r1) wait4(0x0, 0x0, 0x0, 0x0) 23:08:34 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x15, 0x0, 0x1, 0x0, 0x6, @multicast}, 0x14) clone(0x2000000082148180, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_STRSET_GET(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000640)={0x0, 0x1cc}, 0x1, 0x0, 0x0, 0x8800}, 0x20040040) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) request_key(0x0, &(0x7f0000001ffb)={'syz', 0x1}, 0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x1004) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0x3, 0x380, 0x2c, 0xe0, 0xe0, 0xe0, 0x0, 0x2e8, 0x2e8, 0x2e8, 0x2e8, 0x2e8, 0x7fffffe, 0x0, {[{{@uncond, 0x0, 0x70, 0xe0, 0x0, {0x6020000}}, @common=@unspec=@NFLOG={0x70, 'NFLOG\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, "a4bcf0ebf5d09e8706580300b1000000124ac31d4fda375c7794e420aa63529ebcf847246a5e8846085b0a30510b266347a84ae5ffea89b8654e4400"}}}, {{@ip={@local, @multicast1, 0x0, 0x0, '\x00', 'wg1\x00'}, 0x0, 0x1c8, 0x208, 0x0, {}, [@common=@inet=@hashlimit3={{0x158}, {'bridge_slave_1\x00', {0x0, 0x8, 0x0, 0x0, 0x0, 0x7fff, 0x8}}}]}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "29f0be44329ad4d94a815c71ad95092b933b5e380a7e5d3c56c51e9d0027"}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x3e0) 23:08:34 executing program 4: perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0xc7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x12, 0xf7, 0x4, 0x3, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x1000000}, 0x40) 23:08:34 executing program 2: r0 = getpgrp(0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x24000000) r1 = gettid() perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000080), 0x30200, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) unshare(0x4000000) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, r3, 0x0) preadv(0xffffffffffffffff, &(0x7f00000002c0)=[{&(0x7f00000001c0)=""/251, 0xfb}], 0x1, 0x0, 0x0) bpf$ITER_CREATE(0x21, &(0x7f0000000100)={r2}, 0x9) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x26, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = perf_event_open(&(0x7f00000006c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c44}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ID(r4, 0x80042407, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000140)={0x1, 0x80, 0x0, 0x7, 0x0, 0xff, 0x0, 0x2, 0x0, 0xe, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x400, 0x1, @perf_bp={&(0x7f00000000c0), 0x8}, 0x18000, 0x8000, 0xfffffffc, 0x1, 0x1000000000, 0x8, 0x3, 0x0, 0x8, 0x0, 0x9}, r1, 0x2, r4, 0x2) clone(0x6cb2e100, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r1) wait4(0x0, 0x0, 0x0, 0x0) 23:08:34 executing program 3: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x15, 0x0, 0x1, 0x0, 0x6, @multicast}, 0x14) clone(0x2000000082148180, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_STRSET_GET(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000640)={&(0x7f00000006c0)=ANY=[@ANYBLOB="cccd30", @ANYRES16=0x0, @ANYBLOB="02002abd7000fbdbdf250100000004000300800102800c00018008000100070000002400018008000100070000000800010008000000080001000100000008000100060000001c0001800800010005000000080001000200000008000100000000002c000180080001000600000008000100070000000800010003000000080001000600000008000100000000005400018008000100060000000800010001000000080001000400000008000100000000000800010000000000080001000000000008000100000000000800010008000000080001000300000008000100020000001c0001800800010008000000080001000100000008000100050000001c0001800800010004000000080001000400000008000100010000002c000180080001000000000008000100040000000800010007000000080001000700000008000100080000004c0001800800010002000000080001000200000008000100050000000800010003000000080001000400000008000100040000000800010000000000080001000400000008000100030000003400018008000100", @ANYRES32=0x0, @ANYBLOB="1400020069703667726574617030000000000000140002006970366572f370616e20000000000000fa0ee59a22b338aeb6d3895b934764e9a674c87f74b9c35aaa183a9ea95194a3dc40d9b230a9f627acae68e5f0381078395e744b4197fe3dd12112adacad625f6ae8e22901a3dd5920796e7dc087d5033e12c9e4aea2026a5df4ee89adbeda48287c2840149cf27af2cc0f064680a7b5e90f480b201f70326baca201fea21a0100000000000000"], 0x1cc}, 0x1, 0x0, 0x0, 0x8800}, 0x20040040) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) request_key(0x0, &(0x7f0000001ffb)={'syz', 0x1}, 0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x1004) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0x3, 0x380, 0x0, 0xe0, 0xe0, 0xe0, 0x0, 0x2e8, 0x2e8, 0x2e8, 0x2e8, 0x2e8, 0x7fffffe, 0x0, {[{{@uncond, 0x0, 0x70, 0xe0, 0x0, {0x6020000}}, @common=@unspec=@NFLOG={0x70, 'NFLOG\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, "a4bcf0ebf5d09e8706000000b1000000124ac31d4fda375c7794e420aa63529ebcf847246a5e8846085b0a30510b266347a84ae5ffea89b8654e44032400"}}}, {{@ip={@local, @multicast1, 0x0, 0x0, '\x00', 'wg1\x00'}, 0x0, 0x1c8, 0x208, 0x0, {}, [@common=@inet=@hashlimit3={{0x158}, {'bridge_slave_1\x00', {0x0, 0x8, 0x0, 0x0, 0x0, 0x7fff, 0x8}}}]}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "29f0be44329ad4d94a815c71ad95092b933b5e380a7e5d3c56c51e9d0027"}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x3e0) 23:08:34 executing program 4: perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0xc7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x12, 0xf7, 0x4, 0x3, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x2000000}, 0x40) 23:08:34 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x15, 0x0, 0x1, 0x0, 0x6, @multicast}, 0x14) clone(0x2000000082148180, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_STRSET_GET(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000640)={0x0, 0x1cc}, 0x1, 0x0, 0x0, 0x8800}, 0x20040040) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) request_key(0x0, &(0x7f0000001ffb)={'syz', 0x1}, 0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x1004) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0x3, 0x380, 0x4a, 0xe0, 0xe0, 0xe0, 0x0, 0x2e8, 0x2e8, 0x2e8, 0x2e8, 0x2e8, 0x7fffffe, 0x0, {[{{@uncond, 0x0, 0x70, 0xe0, 0x0, {0x6020000}}, @common=@unspec=@NFLOG={0x70, 'NFLOG\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, "a4bcf0ebf5d09e8706580300b1000000124ac31d4fda375c7794e420aa63529ebcf847246a5e8846085b0a30510b266347a84ae5ffea89b8654e4400"}}}, {{@ip={@local, @multicast1, 0x0, 0x0, '\x00', 'wg1\x00'}, 0x0, 0x1c8, 0x208, 0x0, {}, [@common=@inet=@hashlimit3={{0x158}, {'bridge_slave_1\x00', {0x0, 0x8, 0x0, 0x0, 0x0, 0x7fff, 0x8}}}]}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "29f0be44329ad4d94a815c71ad95092b933b5e380a7e5d3c56c51e9d0027"}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x3e0) 23:08:34 executing program 4: perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0xc7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x12, 0xf7, 0x4, 0x3, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x3000000}, 0x40) [ 2139.367548] Bluetooth: hci1: command 0x0419 tx timeout 23:08:34 executing program 3: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x15, 0x0, 0x1, 0x0, 0x6, @multicast}, 0x14) clone(0x2000000082148180, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_STRSET_GET(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000640)={&(0x7f00000006c0)=ANY=[@ANYBLOB="cccd30", @ANYRES16=0x0, @ANYBLOB="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", @ANYRES32=0x0, @ANYBLOB="1400020069703667726574617030000000000000140002006970366572f370616e20000000000000fa0ee59a22b338aeb6d3895b934764e9a674c87f74b9c35aaa183a9ea95194a3dc40d9b230a9f627acae68e5f0381078395e744b4197fe3dd12112adacad625f6ae8e22901a3dd5920796e7dc087d5033e12c9e4aea2026a5df4ee89adbeda48287c2840149cf27af2cc0f064680a7b5e90f480b201f70326baca201fea21a0100000000000000"], 0x1cc}, 0x1, 0x0, 0x0, 0x8800}, 0x20040040) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) request_key(0x0, &(0x7f0000001ffb)={'syz', 0x1}, 0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x1004) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0x3, 0x380, 0x0, 0xe0, 0xe0, 0xe0, 0x0, 0x2e8, 0x2e8, 0x2e8, 0x2e8, 0x2e8, 0x7fffffe, 0x0, {[{{@uncond, 0x0, 0x70, 0xe0, 0x0, {0x6020000}}, @common=@unspec=@NFLOG={0x70, 'NFLOG\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, "a4bcf0ebf5d09e8706000000b1000000124ac31d4fda375c7794e420aa63529ebcf847246a5e8846085b0a30510b266347a84ae5ffea89b8654e44012b00"}}}, {{@ip={@local, @multicast1, 0x0, 0x0, '\x00', 'wg1\x00'}, 0x0, 0x1c8, 0x208, 0x0, {}, [@common=@inet=@hashlimit3={{0x158}, {'bridge_slave_1\x00', {0x0, 0x8, 0x0, 0x0, 0x0, 0x7fff, 0x8}}}]}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "29f0be44329ad4d94a815c71ad95092b933b5e380a7e5d3c56c51e9d0027"}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x3e0) 23:08:34 executing program 4: perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0xc7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x12, 0xf7, 0x4, 0x3, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x4000000}, 0x40) 23:08:37 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x15, 0x0, 0x1, 0x0, 0x6, @multicast}, 0x14) clone(0x2000000082148180, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_STRSET_GET(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000640)={&(0x7f00000006c0)=ANY=[@ANYBLOB="cccd30", @ANYRES16=0x0, @ANYBLOB="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", @ANYRES32=0x0, @ANYBLOB="1400020069703667726574617030000000000000140002006970366572f370616e20000000000000fa0ee59a22b338aeb6d3895b934764e9a674c87f74b9c35aaa183a9ea95194a3dc40d9b230a9f627acae68e5f0381078395e744b4197fe3dd12112adacad625f6ae8e22901a3dd5920796e7dc087d5033e12c9e4aea2026a5df4ee89adbeda48287c2840149cf27af2cc0f064680a7b5e90f480b201f70326baca201fea21a0100000000000000"], 0x1cc}, 0x1, 0x0, 0x0, 0x8800}, 0x20040040) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) request_key(0x0, &(0x7f0000001ffb)={'syz', 0x1}, 0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x1004) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0x3, 0x380, 0x0, 0xe0, 0xe0, 0xe0, 0x0, 0x2e8, 0x2e8, 0x2e8, 0x2e8, 0x2e8, 0x7fffffe, 0x0, {[{{@uncond, 0x0, 0x70, 0xe0, 0x0, {0x6020000}}, @common=@unspec=@NFLOG={0x70, 'NFLOG\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, "a4bcf0ebf5d09e8706000000b100e400124ac31d4fda375c7794e420aa63529ebcf847246a5e8846085b0a30510b266347a84ae5ffea89b8654e4400"}}}, {{@ip={@local, @multicast1, 0x0, 0x0, '\x00', 'wg1\x00'}, 0x0, 0x1c8, 0x208, 0x0, {}, [@common=@inet=@hashlimit3={{0x158}, {'bridge_slave_1\x00', {0x0, 0x8, 0x0, 0x0, 0x0, 0x7fff, 0x8}}}]}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "29f0be44329ad4d94a815c71ad95092b933b5e380a7e5d3c56c51e9d0027"}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x3e0) 23:08:37 executing program 3: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x15, 0x0, 0x1, 0x0, 0x6, @multicast}, 0x14) clone(0x2000000082148180, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_STRSET_GET(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000640)={&(0x7f00000006c0)=ANY=[@ANYBLOB="cccd30", @ANYRES16=0x0, @ANYBLOB="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", @ANYRES32=0x0, @ANYBLOB="1400020069703667726574617030000000000000140002006970366572f370616e20000000000000fa0ee59a22b338aeb6d3895b934764e9a674c87f74b9c35aaa183a9ea95194a3dc40d9b230a9f627acae68e5f0381078395e744b4197fe3dd12112adacad625f6ae8e22901a3dd5920796e7dc087d5033e12c9e4aea2026a5df4ee89adbeda48287c2840149cf27af2cc0f064680a7b5e90f480b201f70326baca201fea21a0100000000000000"], 0x1cc}, 0x1, 0x0, 0x0, 0x8800}, 0x20040040) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) request_key(0x0, &(0x7f0000001ffb)={'syz', 0x1}, 0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x1004) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0x3, 0x380, 0x0, 0xe0, 0xe0, 0xe0, 0x0, 0x2e8, 0x2e8, 0x2e8, 0x2e8, 0x2e8, 0x7fffffe, 0x0, {[{{@uncond, 0x0, 0x70, 0xe0, 0x0, {0x6020000}}, @common=@unspec=@NFLOG={0x70, 'NFLOG\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, "a4bcf0ebf5d09e8706000000b1000000124ac31d4fda375c7794e420aa63529ebcf847246a5e8846085b0a30510b266347a84ae5ffea89b8654e44003f00"}}}, {{@ip={@local, @multicast1, 0x0, 0x0, '\x00', 'wg1\x00'}, 0x0, 0x1c8, 0x208, 0x0, {}, [@common=@inet=@hashlimit3={{0x158}, {'bridge_slave_1\x00', {0x0, 0x8, 0x0, 0x0, 0x0, 0x7fff, 0x8}}}]}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "29f0be44329ad4d94a815c71ad95092b933b5e380a7e5d3c56c51e9d0027"}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x3e0) 23:08:37 executing program 1: r0 = getpgrp(0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x24000000) r1 = gettid() perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000, 0x0, 0x2af}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000080), 0x30200, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) unshare(0x4000000) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r3, 0x0) r4 = syz_open_dev$cec(&(0x7f0000000300), 0x3, 0x2) preadv(r4, &(0x7f00000002c0)=[{&(0x7f00000001c0)=""/251, 0xfb}], 0x1, 0xda3, 0x400001) bpf$ITER_CREATE(0x21, &(0x7f0000000100)={r2}, 0x9) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x26, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = perf_event_open(&(0x7f00000006c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c44}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ID(r5, 0x80042407, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000140)={0x1, 0x80, 0x1, 0x7, 0x6, 0xff, 0x0, 0x2, 0x80200, 0xe, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x400, 0x1, @perf_bp={&(0x7f00000000c0), 0x8}, 0x18000, 0x8000, 0xfffffffc, 0x1, 0x1000000000, 0x8, 0x3, 0x0, 0x8, 0x0, 0x9}, r1, 0x2, r5, 0x2) clone(0x6cb2e100, 0x0, 0x0, 0x0, 0x0) ptrace(0xffffffffffffffff, r1) wait4(0x0, 0x0, 0x0, 0x0) 23:08:37 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x15, 0x0, 0x1, 0x0, 0x6, @multicast}, 0x14) clone(0x2000000082148180, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_STRSET_GET(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000640)={0x0, 0x1cc}, 0x1, 0x0, 0x0, 0x8800}, 0x20040040) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) request_key(0x0, &(0x7f0000001ffb)={'syz', 0x1}, 0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x1004) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0x3, 0x380, 0xe0, 0xe0, 0xe0, 0xe0, 0x0, 0x2e8, 0x2e8, 0x2e8, 0x2e8, 0x2e8, 0x7fffffe, 0x0, {[{{@uncond, 0x0, 0x70, 0xe0, 0x0, {0x6020000}}, @common=@unspec=@NFLOG={0x70, 'NFLOG\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, "a4bcf0ebf5d09e8706580300b1000000124ac31d4fda375c7794e420aa63529ebcf847246a5e8846085b0a30510b266347a84ae5ffea89b8654e4400"}}}, {{@ip={@local, @multicast1, 0x0, 0x0, '\x00', 'wg1\x00'}, 0x0, 0x1c8, 0x208, 0x0, {}, [@common=@inet=@hashlimit3={{0x158}, {'bridge_slave_1\x00', {0x0, 0x8, 0x0, 0x0, 0x0, 0x7fff, 0x8}}}]}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "29f0be44329ad4d94a815c71ad95092b933b5e380a7e5d3c56c51e9d0027"}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x3e0) 23:08:37 executing program 4: perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0xc7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x12, 0xf7, 0x4, 0x3, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5000000}, 0x40) 23:08:37 executing program 2: r0 = getpgrp(0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x24000000) r1 = gettid() perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000080), 0x30200, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) unshare(0x4000000) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, r3, 0x0) preadv(0xffffffffffffffff, &(0x7f00000002c0)=[{&(0x7f00000001c0)=""/251, 0xfb}], 0x1, 0x0, 0x0) bpf$ITER_CREATE(0x21, &(0x7f0000000100)={r2}, 0x9) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x26, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = perf_event_open(&(0x7f00000006c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c44}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ID(r4, 0x80042407, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000140)={0x1, 0x80, 0x0, 0x7, 0x0, 0xff, 0x0, 0x2, 0x0, 0xe, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x400, 0x1, @perf_bp={&(0x7f00000000c0), 0x8}, 0x18000, 0x8000, 0xfffffffc, 0x1, 0x1000000000, 0x8, 0x3, 0x0, 0x8, 0x0, 0x9}, r1, 0x2, r4, 0x2) clone(0x6cb2e100, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r1) wait4(0x0, 0x0, 0x0, 0x0) 23:08:37 executing program 3: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x15, 0x0, 0x1, 0x0, 0x6, @multicast}, 0x14) clone(0x2000000082148180, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_STRSET_GET(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000640)={&(0x7f00000006c0)=ANY=[@ANYBLOB="cccd30", @ANYRES16=0x0, @ANYBLOB="02002abd7000fbdbdf250100000004000300800102800c00018008000100070000002400018008000100070000000800010008000000080001000100000008000100060000001c0001800800010005000000080001000200000008000100000000002c000180080001000600000008000100070000000800010003000000080001000600000008000100000000005400018008000100060000000800010001000000080001000400000008000100000000000800010000000000080001000000000008000100000000000800010008000000080001000300000008000100020000001c0001800800010008000000080001000100000008000100050000001c0001800800010004000000080001000400000008000100010000002c000180080001000000000008000100040000000800010007000000080001000700000008000100080000004c0001800800010002000000080001000200000008000100050000000800010003000000080001000400000008000100040000000800010000000000080001000400000008000100030000003400018008000100", @ANYRES32=0x0, @ANYBLOB="1400020069703667726574617030000000000000140002006970366572f370616e20000000000000fa0ee59a22b338aeb6d3895b934764e9a674c87f74b9c35aaa183a9ea95194a3dc40d9b230a9f627acae68e5f0381078395e744b4197fe3dd12112adacad625f6ae8e22901a3dd5920796e7dc087d5033e12c9e4aea2026a5df4ee89adbeda48287c2840149cf27af2cc0f064680a7b5e90f480b201f70326baca201fea21a0100000000000000"], 0x1cc}, 0x1, 0x0, 0x0, 0x8800}, 0x20040040) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) request_key(0x0, &(0x7f0000001ffb)={'syz', 0x1}, 0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x1004) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0x3, 0x380, 0x0, 0xe0, 0xe0, 0xe0, 0x0, 0x2e8, 0x2e8, 0x2e8, 0x2e8, 0x2e8, 0x7fffffe, 0x0, {[{{@uncond, 0x0, 0x70, 0xe0, 0x0, {0x6020000}}, @common=@unspec=@NFLOG={0x70, 'NFLOG\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, "a4bcf0ebf5d09e8706000000b1000000124ac31d4fda375c7794e420aa63529ebcf847246a5e8846085b0a30510b266347a84ae5ffea89b8654e44014200"}}}, {{@ip={@local, @multicast1, 0x0, 0x0, '\x00', 'wg1\x00'}, 0x0, 0x1c8, 0x208, 0x0, {}, [@common=@inet=@hashlimit3={{0x158}, {'bridge_slave_1\x00', {0x0, 0x8, 0x0, 0x0, 0x0, 0x7fff, 0x8}}}]}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "29f0be44329ad4d94a815c71ad95092b933b5e380a7e5d3c56c51e9d0027"}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x3e0) 23:08:37 executing program 1: r0 = getpgrp(0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x24000000) r1 = gettid() perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000, 0x0, 0x2af}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000080), 0x30200, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) unshare(0x4000000) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r3, 0x0) r4 = syz_open_dev$cec(&(0x7f0000000300), 0x3, 0x2) preadv(r4, &(0x7f00000002c0)=[{&(0x7f00000001c0)=""/251, 0xfb}], 0x1, 0xda3, 0x400001) bpf$ITER_CREATE(0x21, &(0x7f0000000100)={r2}, 0x9) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x26, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = perf_event_open(&(0x7f00000006c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c44}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ID(r5, 0x80042407, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000140)={0x1, 0x80, 0x1, 0x7, 0x6, 0xff, 0x0, 0x2, 0x80200, 0xe, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x400, 0x1, @perf_bp={&(0x7f00000000c0), 0x8}, 0x18000, 0x8000, 0xfffffffc, 0x1, 0x1000000000, 0x8, 0x3, 0x0, 0x8, 0x0, 0x9}, r1, 0x2, r5, 0x2) clone(0x6cb2e100, 0x0, 0x0, 0x0, 0x0) ptrace(0xffffffffffffffff, r1) wait4(0x0, 0x0, 0x0, 0x0) 23:08:37 executing program 4: perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0xc7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x12, 0xf7, 0x4, 0x3, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x6000000}, 0x40) 23:08:37 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x15, 0x0, 0x1, 0x0, 0x6, @multicast}, 0x14) clone(0x2000000082148180, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_STRSET_GET(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000640)={&(0x7f00000006c0)=ANY=[@ANYBLOB="cccd30", @ANYRES16=0x0, @ANYBLOB="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", @ANYRES32=0x0, @ANYBLOB="1400020069703667726574617030000000000000140002006970366572f370616e20000000000000fa0ee59a22b338aeb6d3895b934764e9a674c87f74b9c35aaa183a9ea95194a3dc40d9b230a9f627acae68e5f0381078395e744b4197fe3dd12112adacad625f6ae8e22901a3dd5920796e7dc087d5033e12c9e4aea2026a5df4ee89adbeda48287c2840149cf27af2cc0f064680a7b5e90f480b201f70326baca201fea21a0100000000000000"], 0x1cc}, 0x1, 0x0, 0x0, 0x8800}, 0x20040040) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) request_key(0x0, &(0x7f0000001ffb)={'syz', 0x1}, 0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x1004) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0x3, 0x380, 0x0, 0xe0, 0xe0, 0xe0, 0x0, 0x2e8, 0x2e8, 0x2e8, 0x2e8, 0x2e8, 0x7fffffe, 0x0, {[{{@uncond, 0x0, 0x70, 0xe0, 0x0, {0x6020000}}, @common=@unspec=@NFLOG={0x70, 'NFLOG\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, "a4bcf0ebf5d09e8706000000b103da00124ac31d4fda375c7794e420aa63529ebcf847246a5e8846085b0a30510b266347a84ae5ffea89b8654e4400"}}}, {{@ip={@local, @multicast1, 0x0, 0x0, '\x00', 'wg1\x00'}, 0x0, 0x1c8, 0x208, 0x0, {}, [@common=@inet=@hashlimit3={{0x158}, {'bridge_slave_1\x00', {0x0, 0x8, 0x0, 0x0, 0x0, 0x7fff, 0x8}}}]}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "29f0be44329ad4d94a815c71ad95092b933b5e380a7e5d3c56c51e9d0027"}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x3e0) 23:08:37 executing program 4: perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0xc7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x12, 0xf7, 0x4, 0x3, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x7000000}, 0x40) 23:08:37 executing program 3: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x15, 0x0, 0x1, 0x0, 0x6, @multicast}, 0x14) clone(0x2000000082148180, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_STRSET_GET(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000640)={&(0x7f00000006c0)=ANY=[@ANYBLOB="cccd30", @ANYRES16=0x0, @ANYBLOB="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", @ANYRES32=0x0, @ANYBLOB="1400020069703667726574617030000000000000140002006970366572f370616e20000000000000fa0ee59a22b338aeb6d3895b934764e9a674c87f74b9c35aaa183a9ea95194a3dc40d9b230a9f627acae68e5f0381078395e744b4197fe3dd12112adacad625f6ae8e22901a3dd5920796e7dc087d5033e12c9e4aea2026a5df4ee89adbeda48287c2840149cf27af2cc0f064680a7b5e90f480b201f70326baca201fea21a0100000000000000"], 0x1cc}, 0x1, 0x0, 0x0, 0x8800}, 0x20040040) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) request_key(0x0, &(0x7f0000001ffb)={'syz', 0x1}, 0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x1004) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0x3, 0x380, 0x0, 0xe0, 0xe0, 0xe0, 0x0, 0x2e8, 0x2e8, 0x2e8, 0x2e8, 0x2e8, 0x7fffffe, 0x0, {[{{@uncond, 0x0, 0x70, 0xe0, 0x0, {0x6020000}}, @common=@unspec=@NFLOG={0x70, 'NFLOG\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, "a4bcf0ebf5d09e8706000000b1000000124ac31d4fda375c7794e420aa63529ebcf847246a5e8846085b0a30510b266347a84ae5ffea89b8654e44014a00"}}}, {{@ip={@local, @multicast1, 0x0, 0x0, '\x00', 'wg1\x00'}, 0x0, 0x1c8, 0x208, 0x0, {}, [@common=@inet=@hashlimit3={{0x158}, {'bridge_slave_1\x00', {0x0, 0x8, 0x0, 0x0, 0x0, 0x7fff, 0x8}}}]}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "29f0be44329ad4d94a815c71ad95092b933b5e380a7e5d3c56c51e9d0027"}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x3e0) 23:08:37 executing program 0: r0 = getpgrp(0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x24000000) r1 = gettid() perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000, 0x0, 0x2af}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000080), 0x30200, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) unshare(0x4000000) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r3, 0x0) r4 = syz_open_dev$cec(&(0x7f0000000300), 0x3, 0x2) preadv(r4, &(0x7f00000002c0)=[{&(0x7f00000001c0)=""/251, 0xfb}], 0x1, 0xda3, 0x400001) bpf$ITER_CREATE(0x21, &(0x7f0000000100)={r2}, 0x9) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x26, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = perf_event_open(&(0x7f00000006c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c44}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ID(r5, 0x80042407, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000140)={0x1, 0x80, 0x1, 0x7, 0x6, 0xff, 0x0, 0x2, 0x80200, 0xe, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x400, 0x1, @perf_bp={&(0x7f00000000c0), 0x8}, 0x18000, 0x8000, 0xfffffffc, 0x1, 0x1000000000, 0x8, 0x3, 0x0, 0x8, 0x0, 0x9}, r1, 0x2, r5, 0x2) clone(0x6cb2e100, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r1) wait4(0x0, 0x0, 0x0, 0x0) 23:08:37 executing program 1: r0 = getpgrp(0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x24000000) r1 = gettid() perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000, 0x0, 0x2af}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000080), 0x30200, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) unshare(0x4000000) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r3, 0x0) r4 = syz_open_dev$cec(&(0x7f0000000300), 0x3, 0x2) preadv(r4, &(0x7f00000002c0)=[{&(0x7f00000001c0)=""/251, 0xfb}], 0x1, 0xda3, 0x400001) bpf$ITER_CREATE(0x21, &(0x7f0000000100)={r2}, 0x9) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x26, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = perf_event_open(&(0x7f00000006c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c44}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ID(r5, 0x80042407, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000140)={0x1, 0x80, 0x1, 0x7, 0x6, 0xff, 0x0, 0x2, 0x80200, 0xe, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x400, 0x1, @perf_bp={&(0x7f00000000c0), 0x8}, 0x18000, 0x8000, 0xfffffffc, 0x1, 0x1000000000, 0x8, 0x3, 0x0, 0x8, 0x0, 0x9}, r1, 0x2, r5, 0x2) clone(0x6cb2e100, 0x0, 0x0, 0x0, 0x0) ptrace(0xffffffffffffffff, r1) wait4(0x0, 0x0, 0x0, 0x0) 23:08:37 executing program 4: perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0xc7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x12, 0xf7, 0x4, 0x3, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x8000000}, 0x40) 23:08:38 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x15, 0x0, 0x1, 0x0, 0x6, @multicast}, 0x14) clone(0x2000000082148180, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_STRSET_GET(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000640)={0x0, 0x1cc}, 0x1, 0x0, 0x0, 0x8800}, 0x20040040) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) request_key(0x0, &(0x7f0000001ffb)={'syz', 0x1}, 0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x1004) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0x3, 0x380, 0xe9, 0xe0, 0xe0, 0xe0, 0x0, 0x2e8, 0x2e8, 0x2e8, 0x2e8, 0x2e8, 0x7fffffe, 0x0, {[{{@uncond, 0x0, 0x70, 0xe0, 0x0, {0x6020000}}, @common=@unspec=@NFLOG={0x70, 'NFLOG\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, "a4bcf0ebf5d09e8706580300b1000000124ac31d4fda375c7794e420aa63529ebcf847246a5e8846085b0a30510b266347a84ae5ffea89b8654e4400"}}}, {{@ip={@local, @multicast1, 0x0, 0x0, '\x00', 'wg1\x00'}, 0x0, 0x1c8, 0x208, 0x0, {}, [@common=@inet=@hashlimit3={{0x158}, {'bridge_slave_1\x00', {0x0, 0x8, 0x0, 0x0, 0x0, 0x7fff, 0x8}}}]}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "29f0be44329ad4d94a815c71ad95092b933b5e380a7e5d3c56c51e9d0027"}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x3e0) 23:08:38 executing program 1: r0 = getpgrp(0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x24000000) r1 = gettid() perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000, 0x0, 0x2af}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000080), 0x30200, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) unshare(0x4000000) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r3, 0x0) r4 = syz_open_dev$cec(&(0x7f0000000300), 0x3, 0x2) preadv(r4, &(0x7f00000002c0)=[{&(0x7f00000001c0)=""/251, 0xfb}], 0x1, 0xda3, 0x400001) bpf$ITER_CREATE(0x21, &(0x7f0000000100)={r2}, 0x9) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x26, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = perf_event_open(&(0x7f00000006c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c44}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ID(r5, 0x80042407, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000140)={0x1, 0x80, 0x1, 0x7, 0x6, 0xff, 0x0, 0x2, 0x80200, 0xe, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x400, 0x1, @perf_bp={&(0x7f00000000c0), 0x8}, 0x18000, 0x8000, 0xfffffffc, 0x1, 0x1000000000, 0x8, 0x3, 0x0, 0x8, 0x0, 0x9}, r1, 0x2, r5, 0x2) clone(0x6cb2e100, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, 0x0) wait4(0x0, 0x0, 0x0, 0x0) 23:08:40 executing program 2: r0 = getpgrp(0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x24000000) r1 = gettid() perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000080), 0x30200, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) unshare(0x4000000) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, r3, 0x0) preadv(0xffffffffffffffff, &(0x7f00000002c0)=[{&(0x7f00000001c0)=""/251, 0xfb}], 0x1, 0x0, 0x0) bpf$ITER_CREATE(0x21, &(0x7f0000000100)={r2}, 0x9) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x26, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = perf_event_open(&(0x7f00000006c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c44}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ID(r4, 0x80042407, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000140)={0x1, 0x80, 0x0, 0x7, 0x0, 0xff, 0x0, 0x2, 0x0, 0xe, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x400, 0x1, @perf_bp={&(0x7f00000000c0), 0x8}, 0x18000, 0x8000, 0xfffffffc, 0x1, 0x1000000000, 0x8, 0x3, 0x0, 0x8, 0x0, 0x9}, r1, 0x2, r4, 0x2) clone(0x6cb2e100, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r1) wait4(0x0, 0x0, 0x0, 0x0) 23:08:40 executing program 4: perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0xc7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x12, 0xf7, 0x4, 0x3, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x9000000}, 0x40) 23:08:40 executing program 3: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x15, 0x0, 0x1, 0x0, 0x6, @multicast}, 0x14) clone(0x2000000082148180, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_STRSET_GET(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000640)={&(0x7f00000006c0)=ANY=[@ANYBLOB="cccd30", @ANYRES16=0x0, @ANYBLOB="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", @ANYRES32=0x0, @ANYBLOB="1400020069703667726574617030000000000000140002006970366572f370616e20000000000000fa0ee59a22b338aeb6d3895b934764e9a674c87f74b9c35aaa183a9ea95194a3dc40d9b230a9f627acae68e5f0381078395e744b4197fe3dd12112adacad625f6ae8e22901a3dd5920796e7dc087d5033e12c9e4aea2026a5df4ee89adbeda48287c2840149cf27af2cc0f064680a7b5e90f480b201f70326baca201fea21a0100000000000000"], 0x1cc}, 0x1, 0x0, 0x0, 0x8800}, 0x20040040) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) request_key(0x0, &(0x7f0000001ffb)={'syz', 0x1}, 0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x1004) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0x3, 0x380, 0x0, 0xe0, 0xe0, 0xe0, 0x0, 0x2e8, 0x2e8, 0x2e8, 0x2e8, 0x2e8, 0x7fffffe, 0x0, {[{{@uncond, 0x0, 0x70, 0xe0, 0x0, {0x6020000}}, @common=@unspec=@NFLOG={0x70, 'NFLOG\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, "a4bcf0ebf5d09e8706000000b1000000124ac31d4fda375c7794e420aa63529ebcf847246a5e8846085b0a30510b266347a84ae5ffea89b8654e44004b00"}}}, {{@ip={@local, @multicast1, 0x0, 0x0, '\x00', 'wg1\x00'}, 0x0, 0x1c8, 0x208, 0x0, {}, [@common=@inet=@hashlimit3={{0x158}, {'bridge_slave_1\x00', {0x0, 0x8, 0x0, 0x0, 0x0, 0x7fff, 0x8}}}]}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "29f0be44329ad4d94a815c71ad95092b933b5e380a7e5d3c56c51e9d0027"}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x3e0) 23:08:40 executing program 1: r0 = getpgrp(0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x24000000) r1 = gettid() perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000, 0x0, 0x2af}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000080), 0x30200, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) unshare(0x4000000) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r3, 0x0) r4 = syz_open_dev$cec(&(0x7f0000000300), 0x3, 0x2) preadv(r4, &(0x7f00000002c0)=[{&(0x7f00000001c0)=""/251, 0xfb}], 0x1, 0xda3, 0x400001) bpf$ITER_CREATE(0x21, &(0x7f0000000100)={r2}, 0x9) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x26, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = perf_event_open(&(0x7f00000006c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c44}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ID(r5, 0x80042407, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000140)={0x1, 0x80, 0x1, 0x7, 0x6, 0xff, 0x0, 0x2, 0x80200, 0xe, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x400, 0x1, @perf_bp={&(0x7f00000000c0), 0x8}, 0x18000, 0x8000, 0xfffffffc, 0x1, 0x1000000000, 0x8, 0x3, 0x0, 0x8, 0x0, 0x9}, r1, 0x2, r5, 0x2) clone(0x6cb2e100, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, 0x0) wait4(0x0, 0x0, 0x0, 0x0) 23:08:40 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x15, 0x0, 0x1, 0x0, 0x6, @multicast}, 0x14) clone(0x2000000082148180, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_STRSET_GET(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000640)={0x0, 0x1cc}, 0x1, 0x0, 0x0, 0x8800}, 0x20040040) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) request_key(0x0, &(0x7f0000001ffb)={'syz', 0x1}, 0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x1004) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0x3, 0x380, 0xed, 0xe0, 0xe0, 0xe0, 0x0, 0x2e8, 0x2e8, 0x2e8, 0x2e8, 0x2e8, 0x7fffffe, 0x0, {[{{@uncond, 0x0, 0x70, 0xe0, 0x0, {0x6020000}}, @common=@unspec=@NFLOG={0x70, 'NFLOG\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, "a4bcf0ebf5d09e8706580300b1000000124ac31d4fda375c7794e420aa63529ebcf847246a5e8846085b0a30510b266347a84ae5ffea89b8654e4400"}}}, {{@ip={@local, @multicast1, 0x0, 0x0, '\x00', 'wg1\x00'}, 0x0, 0x1c8, 0x208, 0x0, {}, [@common=@inet=@hashlimit3={{0x158}, {'bridge_slave_1\x00', {0x0, 0x8, 0x0, 0x0, 0x0, 0x7fff, 0x8}}}]}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "29f0be44329ad4d94a815c71ad95092b933b5e380a7e5d3c56c51e9d0027"}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x3e0) 23:08:40 executing program 4: perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0xc7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x12, 0xf7, 0x4, 0x3, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0xa000000}, 0x40) 23:08:40 executing program 3: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x15, 0x0, 0x1, 0x0, 0x6, @multicast}, 0x14) clone(0x2000000082148180, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_STRSET_GET(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000640)={&(0x7f00000006c0)=ANY=[@ANYBLOB="cccd30", @ANYRES16=0x0, @ANYBLOB="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", @ANYRES32=0x0, @ANYBLOB="1400020069703667726574617030000000000000140002006970366572f370616e20000000000000fa0ee59a22b338aeb6d3895b934764e9a674c87f74b9c35aaa183a9ea95194a3dc40d9b230a9f627acae68e5f0381078395e744b4197fe3dd12112adacad625f6ae8e22901a3dd5920796e7dc087d5033e12c9e4aea2026a5df4ee89adbeda48287c2840149cf27af2cc0f064680a7b5e90f480b201f70326baca201fea21a0100000000000000"], 0x1cc}, 0x1, 0x0, 0x0, 0x8800}, 0x20040040) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) request_key(0x0, &(0x7f0000001ffb)={'syz', 0x1}, 0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x1004) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0x3, 0x380, 0x0, 0xe0, 0xe0, 0xe0, 0x0, 0x2e8, 0x2e8, 0x2e8, 0x2e8, 0x2e8, 0x7fffffe, 0x0, {[{{@uncond, 0x0, 0x70, 0xe0, 0x0, {0x6020000}}, @common=@unspec=@NFLOG={0x70, 'NFLOG\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, "a4bcf0ebf5d09e8706000000b1000000124ac31d4fda375c7794e420aa63529ebcf847246a5e8846085b0a30510b266347a84ae5ffea89b8654e44024c00"}}}, {{@ip={@local, @multicast1, 0x0, 0x0, '\x00', 'wg1\x00'}, 0x0, 0x1c8, 0x208, 0x0, {}, [@common=@inet=@hashlimit3={{0x158}, {'bridge_slave_1\x00', {0x0, 0x8, 0x0, 0x0, 0x0, 0x7fff, 0x8}}}]}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "29f0be44329ad4d94a815c71ad95092b933b5e380a7e5d3c56c51e9d0027"}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x3e0) 23:08:40 executing program 0: r0 = getpgrp(0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x24000000) r1 = gettid() perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000, 0x0, 0x2af}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000080), 0x30200, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) unshare(0x4000000) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r3, 0x0) r4 = syz_open_dev$cec(&(0x7f0000000300), 0x3, 0x2) preadv(r4, &(0x7f00000002c0)=[{&(0x7f00000001c0)=""/251, 0xfb}], 0x1, 0xda3, 0x400001) bpf$ITER_CREATE(0x21, &(0x7f0000000100)={r2}, 0x9) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x26, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = perf_event_open(&(0x7f00000006c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c44}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ID(r5, 0x80042407, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000140)={0x1, 0x80, 0x1, 0x7, 0x6, 0xff, 0x0, 0x2, 0x80200, 0xe, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x400, 0x1, @perf_bp={&(0x7f00000000c0), 0x8}, 0x18000, 0x8000, 0xfffffffc, 0x1, 0x1000000000, 0x8, 0x3, 0x0, 0x8, 0x0, 0x9}, r1, 0x2, r5, 0x2) clone(0x6cb2e100, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r1) wait4(0x0, 0x0, 0x0, 0x0) 23:08:40 executing program 1: r0 = getpgrp(0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x24000000) r1 = gettid() perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000, 0x0, 0x2af}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000080), 0x30200, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) unshare(0x4000000) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r3, 0x0) r4 = syz_open_dev$cec(&(0x7f0000000300), 0x3, 0x2) preadv(r4, &(0x7f00000002c0)=[{&(0x7f00000001c0)=""/251, 0xfb}], 0x1, 0xda3, 0x400001) bpf$ITER_CREATE(0x21, &(0x7f0000000100)={r2}, 0x9) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x26, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = perf_event_open(&(0x7f00000006c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c44}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ID(r5, 0x80042407, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000140)={0x1, 0x80, 0x1, 0x7, 0x6, 0xff, 0x0, 0x2, 0x80200, 0xe, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x400, 0x1, @perf_bp={&(0x7f00000000c0), 0x8}, 0x18000, 0x8000, 0xfffffffc, 0x1, 0x1000000000, 0x8, 0x3, 0x0, 0x8, 0x0, 0x9}, r1, 0x2, r5, 0x2) clone(0x6cb2e100, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, 0x0) wait4(0x0, 0x0, 0x0, 0x0) 23:08:40 executing program 4: perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0xc7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x12, 0xf7, 0x4, 0x3, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0xb000000}, 0x40) 23:08:41 executing program 4: perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0xc7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x12, 0xf7, 0x4, 0x3, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0xc000000}, 0x40) 23:08:41 executing program 1: ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000001c0)={'team0\x00', 0x0}) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000680)={0xffffffffffffffff, 0x10, &(0x7f0000000640)={&(0x7f0000000780)=""/4096, 0x1000, 0x0}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000001780)={0x8, 0x7, &(0x7f0000001800)=ANY=[@ANYBLOB="180000009d57000000000000060000001832000005000000000000000000000495000000000000005c150400010000009500000000434e0dae2ef63aab6acde18cddf77c67000000"], &(0x7f0000000180)='GPL\x00', 0x2, 0x0, 0x0, 0x41100, 0xd, '\x00', r0, 0x1d, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x6, 0x5}, 0x8, 0x10, &(0x7f0000000600)={0x5, 0x0, 0x0, 0x10001}, 0x10, r1}, 0x78) r2 = getpgrp(0x0) prctl$PR_SET_PTRACER(0x59616d61, r2) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x24000000) r3 = gettid() perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x2100, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x4}, 0x0, 0x8}, 0x0, 0x8, 0xffffffffffffffff, 0x9) clone(0x6cb2e100, 0x0, 0x0, 0x0, 0x0) r4 = openat$rtc(0xffffffffffffff9c, &(0x7f00000168c0), 0x0, 0x0) ioctl$RTC_UIE_ON(r4, 0x7003) clone(0x59040000, &(0x7f0000000200)="32b026bb2bd5ab05345d05868d1008feb1352fb452659a55b2c8650d5c3b8d9896f83163af0908ddf225ca94e880899df94150b94cce61a62255c2da294ef09dd6df955a8b10081fc4491edeff6bdea1f408c84f564a1702f2429d4ed091a3ef6bb7002cdeb2cb9790f44b23c402166d7ced3ecafcbc5a046b763517bf35421cba1dc4f3b4a67d3882fcad4bd680d79d963ee7d31048c06d6a09d69830d36d80e15be2156e695858a0937e49a60e4623fca37ffd32972d2555bb01a4c5c57e4e6c39ec93e0887c3ed39a172ca646bc8514bdb64ddceb12d7d09546d0c5d8c9fe33f4296409029503d314e0", &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="99d1c32534d9de00af8729fa460ec9d5628744ffe3cb327edbe5d45fed028bf303c434286297cbfe9f121b1bc94969fa74f64c4cb8a1d40cadfe5d1afe1911de07770c57e37c225c0843887e02f6881c533230e4a3d43275e9cd079068012291e77d44bf1f4398518c9d64ae643b1ebff18fb2d4d632098a07dd40847a76374a4a01df2f34c001369ba9b86499548cbb8ce4cda4ae5179f35c9feb4de592a550f357f89d1660d711fac0e2a8") ioctl$RTC_SET_TIME(r4, 0x4024700a, &(0x7f0000000000)={0x0, 0x0, 0x0, 0xf, 0x0, 0xfd}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x9efef75f}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvlan={{0xc}, {0x4}}}, @IFLA_LINK={0x8}]}, 0x3c}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000001940)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000006c0)={&(0x7f0000001880)=@dellinkprop={0xb0, 0x6d, 0x20, 0x70bd28, 0x25dfdbff, {0x0, 0x0, 0x0, 0x0, 0x210, 0xc0018}, [@IFLA_TARGET_NETNSID={0x8, 0x2e, 0x2}, @IFLA_MASTER={0x8}, @IFLA_AF_SPEC={0x70, 0x1a, 0x0, 0x1, [@AF_MPLS={0x4}, @AF_MPLS={0x4}, @AF_INET6={0x28, 0xa, 0x0, 0x1, [@IFLA_INET6_ADDR_GEN_MODE={0x5, 0x8, 0x6b}, @IFLA_INET6_TOKEN={0x14, 0x7, @mcast2}, @IFLA_INET6_ADDR_GEN_MODE={0x5, 0x8, 0x7}]}, @AF_MPLS={0x4}, @AF_INET6={0x28, 0xa, 0x0, 0x1, [@IFLA_INET6_ADDR_GEN_MODE={0x5, 0x8, 0x8}, @IFLA_INET6_ADDR_GEN_MODE={0x5, 0x8, 0x56}, @IFLA_INET6_TOKEN={0x14, 0x7, @ipv4={'\x00', '\xff\xff', @local}}]}, @AF_MPLS={0x4}, @AF_INET6={0xc, 0xa, 0x0, 0x1, [@IFLA_INET6_ADDR_GEN_MODE={0x5, 0x8, 0x9}]}]}, @IFLA_IFALIASn={0x4}, @IFLA_PHYS_PORT_ID={0xb, 0x22, "3df17141c4e8d5"}]}, 0xb0}, 0x1, 0x0, 0x0, 0x4000001}, 0x84000) clone(0x2908000, &(0x7f0000000080)="6028d78584a9523ff3b18b3c7f86b0f46595537c62f1f47ca39e4ff27666a38078b3617669c736e28539aa28b2d44ceec9dc0c3a4d3dd6d901efcff839fc776cc0790c", &(0x7f0000000140), &(0x7f0000000440), &(0x7f0000000480)="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") ptrace(0x10, r3) wait4(0x0, 0x0, 0x0, 0x0) 23:08:43 executing program 4: perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0xc7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x12, 0xf7, 0x4, 0x3, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0xd000000}, 0x40) 23:08:43 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x15, 0x0, 0x1, 0x0, 0x6, @multicast}, 0x14) clone(0x2000000082148180, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_STRSET_GET(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000640)={0x0, 0x1cc}, 0x1, 0x0, 0x0, 0x8800}, 0x20040040) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) request_key(0x0, &(0x7f0000001ffb)={'syz', 0x1}, 0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x1004) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0x3, 0x380, 0x128, 0xe0, 0xe0, 0xe0, 0x0, 0x2e8, 0x2e8, 0x2e8, 0x2e8, 0x2e8, 0x7fffffe, 0x0, {[{{@uncond, 0x0, 0x70, 0xe0, 0x0, {0x6020000}}, @common=@unspec=@NFLOG={0x70, 'NFLOG\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, "a4bcf0ebf5d09e8706580300b1000000124ac31d4fda375c7794e420aa63529ebcf847246a5e8846085b0a30510b266347a84ae5ffea89b8654e4400"}}}, {{@ip={@local, @multicast1, 0x0, 0x0, '\x00', 'wg1\x00'}, 0x0, 0x1c8, 0x208, 0x0, {}, [@common=@inet=@hashlimit3={{0x158}, {'bridge_slave_1\x00', {0x0, 0x8, 0x0, 0x0, 0x0, 0x7fff, 0x8}}}]}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "29f0be44329ad4d94a815c71ad95092b933b5e380a7e5d3c56c51e9d0027"}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x3e0) 23:08:43 executing program 2: r0 = getpgrp(0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x24000000) r1 = gettid() perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000080), 0x30200, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) unshare(0x4000000) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, r3, 0x0) preadv(0xffffffffffffffff, &(0x7f00000002c0)=[{&(0x7f00000001c0)=""/251, 0xfb}], 0x1, 0x0, 0x0) bpf$ITER_CREATE(0x21, &(0x7f0000000100)={r2}, 0x9) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x26, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = perf_event_open(&(0x7f00000006c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c44}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ID(r4, 0x80042407, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000140)={0x1, 0x80, 0x0, 0x7, 0x0, 0xff, 0x0, 0x2, 0x0, 0xe, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x400, 0x1, @perf_bp={&(0x7f00000000c0), 0x8}, 0x18000, 0x8000, 0xfffffffc, 0x1, 0x1000000000, 0x8, 0x3, 0x0, 0x8, 0x0, 0x9}, r1, 0x2, r4, 0x2) clone(0x6cb2e100, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r1) wait4(0x0, 0x0, 0x0, 0x0) 23:08:43 executing program 3: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x15, 0x0, 0x1, 0x0, 0x6, @multicast}, 0x14) clone(0x2000000082148180, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_STRSET_GET(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000640)={&(0x7f00000006c0)=ANY=[@ANYBLOB="cccd30", @ANYRES16=0x0, @ANYBLOB="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", @ANYRES32=0x0, @ANYBLOB="1400020069703667726574617030000000000000140002006970366572f370616e20000000000000fa0ee59a22b338aeb6d3895b934764e9a674c87f74b9c35aaa183a9ea95194a3dc40d9b230a9f627acae68e5f0381078395e744b4197fe3dd12112adacad625f6ae8e22901a3dd5920796e7dc087d5033e12c9e4aea2026a5df4ee89adbeda48287c2840149cf27af2cc0f064680a7b5e90f480b201f70326baca201fea21a0100000000000000"], 0x1cc}, 0x1, 0x0, 0x0, 0x8800}, 0x20040040) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) request_key(0x0, &(0x7f0000001ffb)={'syz', 0x1}, 0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x1004) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0x3, 0x380, 0x0, 0xe0, 0xe0, 0xe0, 0x0, 0x2e8, 0x2e8, 0x2e8, 0x2e8, 0x2e8, 0x7fffffe, 0x0, {[{{@uncond, 0x0, 0x70, 0xe0, 0x0, {0x6020000}}, @common=@unspec=@NFLOG={0x70, 'NFLOG\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, "a4bcf0ebf5d09e8706000000b1000000124ac31d4fda375c7794e420aa63529ebcf847246a5e8846085b0a30510b266347a84ae5ffea89b8654e44035800"}}}, {{@ip={@local, @multicast1, 0x0, 0x0, '\x00', 'wg1\x00'}, 0x0, 0x1c8, 0x208, 0x0, {}, [@common=@inet=@hashlimit3={{0x158}, {'bridge_slave_1\x00', {0x0, 0x8, 0x0, 0x0, 0x0, 0x7fff, 0x8}}}]}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "29f0be44329ad4d94a815c71ad95092b933b5e380a7e5d3c56c51e9d0027"}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x3e0) 23:08:43 executing program 4: perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0xc7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x12, 0xf7, 0x4, 0x3, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0xe000000}, 0x40) 23:08:43 executing program 3: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x15, 0x0, 0x1, 0x0, 0x6, @multicast}, 0x14) clone(0x2000000082148180, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_STRSET_GET(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000640)={&(0x7f00000006c0)=ANY=[@ANYBLOB="cccd30", @ANYRES16=0x0, @ANYBLOB="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", @ANYRES32=0x0, @ANYBLOB="1400020069703667726574617030000000000000140002006970366572f370616e20000000000000fa0ee59a22b338aeb6d3895b934764e9a674c87f74b9c35aaa183a9ea95194a3dc40d9b230a9f627acae68e5f0381078395e744b4197fe3dd12112adacad625f6ae8e22901a3dd5920796e7dc087d5033e12c9e4aea2026a5df4ee89adbeda48287c2840149cf27af2cc0f064680a7b5e90f480b201f70326baca201fea21a0100000000000000"], 0x1cc}, 0x1, 0x0, 0x0, 0x8800}, 0x20040040) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) request_key(0x0, &(0x7f0000001ffb)={'syz', 0x1}, 0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x1004) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0x3, 0x380, 0x0, 0xe0, 0xe0, 0xe0, 0x0, 0x2e8, 0x2e8, 0x2e8, 0x2e8, 0x2e8, 0x7fffffe, 0x0, {[{{@uncond, 0x0, 0x70, 0xe0, 0x0, {0x6020000}}, @common=@unspec=@NFLOG={0x70, 'NFLOG\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, "a4bcf0ebf5d09e8706000000b1000000124ac31d4fda375c7794e420aa63529ebcf847246a5e8846085b0a30510b266347a84ae5ffea89b8654e44006000"}}}, {{@ip={@local, @multicast1, 0x0, 0x0, '\x00', 'wg1\x00'}, 0x0, 0x1c8, 0x208, 0x0, {}, [@common=@inet=@hashlimit3={{0x158}, {'bridge_slave_1\x00', {0x0, 0x8, 0x0, 0x0, 0x0, 0x7fff, 0x8}}}]}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "29f0be44329ad4d94a815c71ad95092b933b5e380a7e5d3c56c51e9d0027"}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x3e0) 23:08:43 executing program 4: perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0xc7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x12, 0xf7, 0x4, 0x3, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0xf000000}, 0x40) 23:08:44 executing program 0: r0 = getpgrp(0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x24000000) r1 = gettid() perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000, 0x0, 0x2af}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000080), 0x30200, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) unshare(0x4000000) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r3, 0x0) r4 = syz_open_dev$cec(&(0x7f0000000300), 0x3, 0x2) preadv(r4, &(0x7f00000002c0)=[{&(0x7f00000001c0)=""/251, 0xfb}], 0x1, 0xda3, 0x400001) bpf$ITER_CREATE(0x21, &(0x7f0000000100)={r2}, 0x9) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x26, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = perf_event_open(&(0x7f00000006c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c44}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ID(r5, 0x80042407, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000140)={0x1, 0x80, 0x1, 0x7, 0x6, 0xff, 0x0, 0x2, 0x80200, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x400, 0x1, @perf_bp={&(0x7f00000000c0), 0x8}, 0x18000, 0x8000, 0xfffffffc, 0x1, 0x1000000000, 0x8, 0x3, 0x0, 0x8, 0x0, 0x9}, r1, 0x2, r5, 0x2) clone(0x6cb2e100, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r1) wait4(0x0, 0x0, 0x0, 0x0) 23:08:44 executing program 4: perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0xc7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x12, 0xf7, 0x4, 0x3, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x10000000}, 0x40) 23:08:44 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x15, 0x0, 0x1, 0x0, 0x6, @multicast}, 0x14) clone(0x2000000082148180, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_STRSET_GET(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000640)={0x0, 0x1cc}, 0x1, 0x0, 0x0, 0x8800}, 0x20040040) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) request_key(0x0, &(0x7f0000001ffb)={'syz', 0x1}, 0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x1004) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0x3, 0x380, 0x16a, 0xe0, 0xe0, 0xe0, 0x0, 0x2e8, 0x2e8, 0x2e8, 0x2e8, 0x2e8, 0x7fffffe, 0x0, {[{{@uncond, 0x0, 0x70, 0xe0, 0x0, {0x6020000}}, @common=@unspec=@NFLOG={0x70, 'NFLOG\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, "a4bcf0ebf5d09e8706580300b1000000124ac31d4fda375c7794e420aa63529ebcf847246a5e8846085b0a30510b266347a84ae5ffea89b8654e4400"}}}, {{@ip={@local, @multicast1, 0x0, 0x0, '\x00', 'wg1\x00'}, 0x0, 0x1c8, 0x208, 0x0, {}, [@common=@inet=@hashlimit3={{0x158}, {'bridge_slave_1\x00', {0x0, 0x8, 0x0, 0x0, 0x0, 0x7fff, 0x8}}}]}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "29f0be44329ad4d94a815c71ad95092b933b5e380a7e5d3c56c51e9d0027"}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x3e0) 23:08:44 executing program 3: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x15, 0x0, 0x1, 0x0, 0x6, @multicast}, 0x14) clone(0x2000000082148180, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_STRSET_GET(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000640)={&(0x7f00000006c0)=ANY=[@ANYBLOB="cccd30", @ANYRES16=0x0, @ANYBLOB="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", @ANYRES32=0x0, @ANYBLOB="1400020069703667726574617030000000000000140002006970366572f370616e20000000000000fa0ee59a22b338aeb6d3895b934764e9a674c87f74b9c35aaa183a9ea95194a3dc40d9b230a9f627acae68e5f0381078395e744b4197fe3dd12112adacad625f6ae8e22901a3dd5920796e7dc087d5033e12c9e4aea2026a5df4ee89adbeda48287c2840149cf27af2cc0f064680a7b5e90f480b201f70326baca201fea21a0100000000000000"], 0x1cc}, 0x1, 0x0, 0x0, 0x8800}, 0x20040040) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) request_key(0x0, &(0x7f0000001ffb)={'syz', 0x1}, 0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x1004) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0x3, 0x380, 0x0, 0xe0, 0xe0, 0xe0, 0x0, 0x2e8, 0x2e8, 0x2e8, 0x2e8, 0x2e8, 0x7fffffe, 0x0, {[{{@uncond, 0x0, 0x70, 0xe0, 0x0, {0x6020000}}, @common=@unspec=@NFLOG={0x70, 'NFLOG\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, "a4bcf0ebf5d09e8706000000b1000000124ac31d4fda375c7794e420aa63529ebcf847246a5e8846085b0a30510b266347a84ae5ffea89b8654e44006a00"}}}, {{@ip={@local, @multicast1, 0x0, 0x0, '\x00', 'wg1\x00'}, 0x0, 0x1c8, 0x208, 0x0, {}, [@common=@inet=@hashlimit3={{0x158}, {'bridge_slave_1\x00', {0x0, 0x8, 0x0, 0x0, 0x0, 0x7fff, 0x8}}}]}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "29f0be44329ad4d94a815c71ad95092b933b5e380a7e5d3c56c51e9d0027"}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x3e0) 23:08:44 executing program 4: perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0xc7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x12, 0xf7, 0x4, 0x3, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x11000000}, 0x40) 23:08:44 executing program 1: ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000001c0)={'team0\x00', 0x0}) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000680)={0xffffffffffffffff, 0x10, &(0x7f0000000640)={&(0x7f0000000780)=""/4096, 0x1000, 0x0}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000001780)={0x8, 0x7, &(0x7f0000001800)=ANY=[@ANYBLOB="180000009d57000000000000060000001832000005000000000000000000000495000000000000005c150400010000009500000000434e0dae2ef63aab6acde18cddf77c67000000"], &(0x7f0000000180)='GPL\x00', 0x2, 0x0, 0x0, 0x41100, 0xd, '\x00', r0, 0x1d, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x6, 0x5}, 0x8, 0x10, &(0x7f0000000600)={0x5, 0x0, 0x0, 0x10001}, 0x10, r1}, 0x78) r2 = getpgrp(0x0) prctl$PR_SET_PTRACER(0x59616d61, r2) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x24000000) r3 = gettid() perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x2100, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x4}, 0x0, 0x8}, 0x0, 0x8, 0xffffffffffffffff, 0x9) clone(0x6cb2e100, 0x0, 0x0, 0x0, 0x0) r4 = openat$rtc(0xffffffffffffff9c, &(0x7f00000168c0), 0x0, 0x0) ioctl$RTC_UIE_ON(r4, 0x7003) clone(0x59040000, &(0x7f0000000200)="32b026bb2bd5ab05345d05868d1008feb1352fb452659a55b2c8650d5c3b8d9896f83163af0908ddf225ca94e880899df94150b94cce61a62255c2da294ef09dd6df955a8b10081fc4491edeff6bdea1f408c84f564a1702f2429d4ed091a3ef6bb7002cdeb2cb9790f44b23c402166d7ced3ecafcbc5a046b763517bf35421cba1dc4f3b4a67d3882fcad4bd680d79d963ee7d31048c06d6a09d69830d36d80e15be2156e695858a0937e49a60e4623fca37ffd32972d2555bb01a4c5c57e4e6c39ec93e0887c3ed39a172ca646bc8514bdb64ddceb12d7d09546d0c5d8c9fe33f4296409029503d314e0", &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="99d1c32534d9de00af8729fa460ec9d5628744ffe3cb327edbe5d45fed028bf303c434286297cbfe9f121b1bc94969fa74f64c4cb8a1d40cadfe5d1afe1911de07770c57e37c225c0843887e02f6881c533230e4a3d43275e9cd079068012291e77d44bf1f4398518c9d64ae643b1ebff18fb2d4d632098a07dd40847a76374a4a01df2f34c001369ba9b86499548cbb8ce4cda4ae5179f35c9feb4de592a550f357f89d1660d711fac0e2a8") ioctl$RTC_SET_TIME(r4, 0x4024700a, &(0x7f0000000000)={0x0, 0x0, 0x0, 0xf, 0x0, 0xfd}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x9efef75f}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvlan={{0xc}, {0x4}}}, @IFLA_LINK={0x8}]}, 0x3c}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000001940)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000006c0)={&(0x7f0000001880)=@dellinkprop={0xb0, 0x6d, 0x20, 0x70bd28, 0x25dfdbff, {0x0, 0x0, 0x0, 0x0, 0x210, 0xc0018}, [@IFLA_TARGET_NETNSID={0x8, 0x2e, 0x2}, @IFLA_MASTER={0x8}, @IFLA_AF_SPEC={0x70, 0x1a, 0x0, 0x1, [@AF_MPLS={0x4}, @AF_MPLS={0x4}, @AF_INET6={0x28, 0xa, 0x0, 0x1, [@IFLA_INET6_ADDR_GEN_MODE={0x5, 0x8, 0x6b}, @IFLA_INET6_TOKEN={0x14, 0x7, @mcast2}, @IFLA_INET6_ADDR_GEN_MODE={0x5, 0x8, 0x7}]}, @AF_MPLS={0x4}, @AF_INET6={0x28, 0xa, 0x0, 0x1, [@IFLA_INET6_ADDR_GEN_MODE={0x5, 0x8, 0x8}, @IFLA_INET6_ADDR_GEN_MODE={0x5, 0x8, 0x56}, @IFLA_INET6_TOKEN={0x14, 0x7, @ipv4={'\x00', '\xff\xff', @local}}]}, @AF_MPLS={0x4}, @AF_INET6={0xc, 0xa, 0x0, 0x1, [@IFLA_INET6_ADDR_GEN_MODE={0x5, 0x8, 0x9}]}]}, @IFLA_IFALIASn={0x4}, @IFLA_PHYS_PORT_ID={0xb, 0x22, "3df17141c4e8d5"}]}, 0xb0}, 0x1, 0x0, 0x0, 0x4000001}, 0x84000) clone(0x2908000, &(0x7f0000000080)="6028d78584a9523ff3b18b3c7f86b0f46595537c62f1f47ca39e4ff27666a38078b3617669c736e28539aa28b2d44ceec9dc0c3a4d3dd6d901efcff839fc776cc0790c", &(0x7f0000000140), &(0x7f0000000440), &(0x7f0000000480)="242ca92137c64d2aa511b44b3c1cfde2dcc859886593cab62548ea4784feceb4575c63296b0fec0d95f9d0545e98ad8a780317be96bf33ee1323c21bbd3408f19cc491fe3e0640ca86d924c1c438cacbc01bffeab0bf8337864bfe29771f0e3982aa64897821d7ed05a7368c7d4dba2eb99c641eca43a27125ea04721f6aba768faf134a4e1031de9e9cdb1e34fe658edb5a21c8473385f8af9d6a2cfecd97300c78c402d2397d81e96505a2b29983671676bb8e195c46240d650efbf9b3fc8d173f7af8cd723628e6be3410c8b8c3a3891d304c729fec5b1491855f932f47fbed742a324ddcd3ec55410e386f95cb48ccaf9124e264d072cff4204404397088bc526deb9cbf07") ptrace(0x10, r3) wait4(0x0, 0x0, 0x0, 0x0) 23:08:44 executing program 3: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x15, 0x0, 0x1, 0x0, 0x6, @multicast}, 0x14) clone(0x2000000082148180, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_STRSET_GET(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000640)={&(0x7f00000006c0)=ANY=[@ANYBLOB="cccd30", @ANYRES16=0x0, @ANYBLOB="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", @ANYRES32=0x0, @ANYBLOB="1400020069703667726574617030000000000000140002006970366572f370616e20000000000000fa0ee59a22b338aeb6d3895b934764e9a674c87f74b9c35aaa183a9ea95194a3dc40d9b230a9f627acae68e5f0381078395e744b4197fe3dd12112adacad625f6ae8e22901a3dd5920796e7dc087d5033e12c9e4aea2026a5df4ee89adbeda48287c2840149cf27af2cc0f064680a7b5e90f480b201f70326baca201fea21a0100000000000000"], 0x1cc}, 0x1, 0x0, 0x0, 0x8800}, 0x20040040) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) request_key(0x0, &(0x7f0000001ffb)={'syz', 0x1}, 0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x1004) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0x3, 0x380, 0x0, 0xe0, 0xe0, 0xe0, 0x0, 0x2e8, 0x2e8, 0x2e8, 0x2e8, 0x2e8, 0x7fffffe, 0x0, {[{{@uncond, 0x0, 0x70, 0xe0, 0x0, {0x6020000}}, @common=@unspec=@NFLOG={0x70, 'NFLOG\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, "a4bcf0ebf5d09e8706000000b1000000124ac31d4fda375c7794e420aa63529ebcf847246a5e8846085b0a30510b266347a84ae5ffea89b8654e44016a00"}}}, {{@ip={@local, @multicast1, 0x0, 0x0, '\x00', 'wg1\x00'}, 0x0, 0x1c8, 0x208, 0x0, {}, [@common=@inet=@hashlimit3={{0x158}, {'bridge_slave_1\x00', {0x0, 0x8, 0x0, 0x0, 0x0, 0x7fff, 0x8}}}]}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "29f0be44329ad4d94a815c71ad95092b933b5e380a7e5d3c56c51e9d0027"}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x3e0) 23:08:46 executing program 2: r0 = getpgrp(0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x24000000) r1 = gettid() perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000080), 0x30200, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) unshare(0x4000000) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, r3, 0x0) preadv(0xffffffffffffffff, &(0x7f00000002c0)=[{&(0x7f00000001c0)=""/251, 0xfb}], 0x1, 0x0, 0x0) bpf$ITER_CREATE(0x21, &(0x7f0000000100)={r2}, 0x9) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x26, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = perf_event_open(&(0x7f00000006c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c44}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ID(r4, 0x80042407, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000140)={0x1, 0x80, 0x0, 0x7, 0x0, 0xff, 0x0, 0x2, 0x0, 0xe, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x400, 0x1, @perf_bp={&(0x7f00000000c0), 0x8}, 0x18000, 0x8000, 0xfffffffc, 0x1, 0x1000000000, 0x8, 0x3, 0x0, 0x8, 0x0, 0x9}, r1, 0x2, r4, 0x2) clone(0x6cb2e100, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r1) wait4(0x0, 0x0, 0x0, 0x0) 23:08:46 executing program 4: perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0xc7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x12, 0xf7, 0x4, 0x3, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x12000000}, 0x40) 23:08:46 executing program 3: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x15, 0x0, 0x1, 0x0, 0x6, @multicast}, 0x14) clone(0x2000000082148180, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_STRSET_GET(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000640)={&(0x7f00000006c0)=ANY=[@ANYBLOB="cccd30", @ANYRES16=0x0, @ANYBLOB="02002abd7000fbdbdf250100000004000300800102800c00018008000100070000002400018008000100070000000800010008000000080001000100000008000100060000001c0001800800010005000000080001000200000008000100000000002c000180080001000600000008000100070000000800010003000000080001000600000008000100000000005400018008000100060000000800010001000000080001000400000008000100000000000800010000000000080001000000000008000100000000000800010008000000080001000300000008000100020000001c0001800800010008000000080001000100000008000100050000001c0001800800010004000000080001000400000008000100010000002c000180080001000000000008000100040000000800010007000000080001000700000008000100080000004c0001800800010002000000080001000200000008000100050000000800010003000000080001000400000008000100040000000800010000000000080001000400000008000100030000003400018008000100", @ANYRES32=0x0, @ANYBLOB="1400020069703667726574617030000000000000140002006970366572f370616e20000000000000fa0ee59a22b338aeb6d3895b934764e9a674c87f74b9c35aaa183a9ea95194a3dc40d9b230a9f627acae68e5f0381078395e744b4197fe3dd12112adacad625f6ae8e22901a3dd5920796e7dc087d5033e12c9e4aea2026a5df4ee89adbeda48287c2840149cf27af2cc0f064680a7b5e90f480b201f70326baca201fea21a0100000000000000"], 0x1cc}, 0x1, 0x0, 0x0, 0x8800}, 0x20040040) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) request_key(0x0, &(0x7f0000001ffb)={'syz', 0x1}, 0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x1004) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0x3, 0x380, 0x0, 0xe0, 0xe0, 0xe0, 0x0, 0x2e8, 0x2e8, 0x2e8, 0x2e8, 0x2e8, 0x7fffffe, 0x0, {[{{@uncond, 0x0, 0x70, 0xe0, 0x0, {0x6020000}}, @common=@unspec=@NFLOG={0x70, 'NFLOG\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, "a4bcf0ebf5d09e8706000000b1000000124ac31d4fda375c7794e420aa63529ebcf847246a5e8846085b0a30510b266347a84ae5ffea89b8654e44016d00"}}}, {{@ip={@local, @multicast1, 0x0, 0x0, '\x00', 'wg1\x00'}, 0x0, 0x1c8, 0x208, 0x0, {}, [@common=@inet=@hashlimit3={{0x158}, {'bridge_slave_1\x00', {0x0, 0x8, 0x0, 0x0, 0x0, 0x7fff, 0x8}}}]}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "29f0be44329ad4d94a815c71ad95092b933b5e380a7e5d3c56c51e9d0027"}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x3e0) 23:08:46 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x15, 0x0, 0x1, 0x0, 0x6, @multicast}, 0x14) clone(0x2000000082148180, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_STRSET_GET(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000640)={0x0, 0x1cc}, 0x1, 0x0, 0x0, 0x8800}, 0x20040040) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) request_key(0x0, &(0x7f0000001ffb)={'syz', 0x1}, 0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x1004) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0x3, 0x380, 0x174, 0xe0, 0xe0, 0xe0, 0x0, 0x2e8, 0x2e8, 0x2e8, 0x2e8, 0x2e8, 0x7fffffe, 0x0, {[{{@uncond, 0x0, 0x70, 0xe0, 0x0, {0x6020000}}, @common=@unspec=@NFLOG={0x70, 'NFLOG\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, "a4bcf0ebf5d09e8706580300b1000000124ac31d4fda375c7794e420aa63529ebcf847246a5e8846085b0a30510b266347a84ae5ffea89b8654e4400"}}}, {{@ip={@local, @multicast1, 0x0, 0x0, '\x00', 'wg1\x00'}, 0x0, 0x1c8, 0x208, 0x0, {}, [@common=@inet=@hashlimit3={{0x158}, {'bridge_slave_1\x00', {0x0, 0x8, 0x0, 0x0, 0x0, 0x7fff, 0x8}}}]}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "29f0be44329ad4d94a815c71ad95092b933b5e380a7e5d3c56c51e9d0027"}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x3e0) 23:08:46 executing program 1: ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000001c0)={'team0\x00', 0x0}) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000680)={0xffffffffffffffff, 0x10, &(0x7f0000000640)={&(0x7f0000000780)=""/4096, 0x1000, 0x0}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000001780)={0x8, 0x7, &(0x7f0000001800)=ANY=[@ANYBLOB="180000009d57000000000000060000001832000005000000000000000000000495000000000000005c150400010000009500000000434e0dae2ef63aab6acde18cddf77c67000000"], &(0x7f0000000180)='GPL\x00', 0x2, 0x0, 0x0, 0x41100, 0xd, '\x00', r0, 0x1d, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x6, 0x5}, 0x8, 0x10, &(0x7f0000000600)={0x5, 0x0, 0x0, 0x10001}, 0x10, r1}, 0x78) r2 = getpgrp(0x0) prctl$PR_SET_PTRACER(0x59616d61, r2) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x24000000) r3 = gettid() perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x2100, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x4}, 0x0, 0x8}, 0x0, 0x8, 0xffffffffffffffff, 0x9) clone(0x6cb2e100, 0x0, 0x0, 0x0, 0x0) r4 = openat$rtc(0xffffffffffffff9c, &(0x7f00000168c0), 0x0, 0x0) ioctl$RTC_UIE_ON(r4, 0x7003) clone(0x59040000, &(0x7f0000000200)="32b026bb2bd5ab05345d05868d1008feb1352fb452659a55b2c8650d5c3b8d9896f83163af0908ddf225ca94e880899df94150b94cce61a62255c2da294ef09dd6df955a8b10081fc4491edeff6bdea1f408c84f564a1702f2429d4ed091a3ef6bb7002cdeb2cb9790f44b23c402166d7ced3ecafcbc5a046b763517bf35421cba1dc4f3b4a67d3882fcad4bd680d79d963ee7d31048c06d6a09d69830d36d80e15be2156e695858a0937e49a60e4623fca37ffd32972d2555bb01a4c5c57e4e6c39ec93e0887c3ed39a172ca646bc8514bdb64ddceb12d7d09546d0c5d8c9fe33f4296409029503d314e0", &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="99d1c32534d9de00af8729fa460ec9d5628744ffe3cb327edbe5d45fed028bf303c434286297cbfe9f121b1bc94969fa74f64c4cb8a1d40cadfe5d1afe1911de07770c57e37c225c0843887e02f6881c533230e4a3d43275e9cd079068012291e77d44bf1f4398518c9d64ae643b1ebff18fb2d4d632098a07dd40847a76374a4a01df2f34c001369ba9b86499548cbb8ce4cda4ae5179f35c9feb4de592a550f357f89d1660d711fac0e2a8") ioctl$RTC_SET_TIME(r4, 0x4024700a, &(0x7f0000000000)={0x0, 0x0, 0x0, 0xf, 0x0, 0xfd}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x9efef75f}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvlan={{0xc}, {0x4}}}, @IFLA_LINK={0x8}]}, 0x3c}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000001940)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000006c0)={&(0x7f0000001880)=@dellinkprop={0xb0, 0x6d, 0x20, 0x70bd28, 0x25dfdbff, {0x0, 0x0, 0x0, 0x0, 0x210, 0xc0018}, [@IFLA_TARGET_NETNSID={0x8, 0x2e, 0x2}, @IFLA_MASTER={0x8}, @IFLA_AF_SPEC={0x70, 0x1a, 0x0, 0x1, [@AF_MPLS={0x4}, @AF_MPLS={0x4}, @AF_INET6={0x28, 0xa, 0x0, 0x1, [@IFLA_INET6_ADDR_GEN_MODE={0x5, 0x8, 0x6b}, @IFLA_INET6_TOKEN={0x14, 0x7, @mcast2}, @IFLA_INET6_ADDR_GEN_MODE={0x5, 0x8, 0x7}]}, @AF_MPLS={0x4}, @AF_INET6={0x28, 0xa, 0x0, 0x1, [@IFLA_INET6_ADDR_GEN_MODE={0x5, 0x8, 0x8}, @IFLA_INET6_ADDR_GEN_MODE={0x5, 0x8, 0x56}, @IFLA_INET6_TOKEN={0x14, 0x7, @ipv4={'\x00', '\xff\xff', @local}}]}, @AF_MPLS={0x4}, @AF_INET6={0xc, 0xa, 0x0, 0x1, [@IFLA_INET6_ADDR_GEN_MODE={0x5, 0x8, 0x9}]}]}, @IFLA_IFALIASn={0x4}, @IFLA_PHYS_PORT_ID={0xb, 0x22, "3df17141c4e8d5"}]}, 0xb0}, 0x1, 0x0, 0x0, 0x4000001}, 0x84000) clone(0x2908000, &(0x7f0000000080)="6028d78584a9523ff3b18b3c7f86b0f46595537c62f1f47ca39e4ff27666a38078b3617669c736e28539aa28b2d44ceec9dc0c3a4d3dd6d901efcff839fc776cc0790c", &(0x7f0000000140), &(0x7f0000000440), &(0x7f0000000480)="242ca92137c64d2aa511b44b3c1cfde2dcc859886593cab62548ea4784feceb4575c63296b0fec0d95f9d0545e98ad8a780317be96bf33ee1323c21bbd3408f19cc491fe3e0640ca86d924c1c438cacbc01bffeab0bf8337864bfe29771f0e3982aa64897821d7ed05a7368c7d4dba2eb99c641eca43a27125ea04721f6aba768faf134a4e1031de9e9cdb1e34fe658edb5a21c8473385f8af9d6a2cfecd97300c78c402d2397d81e96505a2b29983671676bb8e195c46240d650efbf9b3fc8d173f7af8cd723628e6be3410c8b8c3a3891d304c729fec5b1491855f932f47fbed742a324ddcd3ec55410e386f95cb48ccaf9124e264d072cff4204404397088bc526deb9cbf07") ptrace(0x10, r3) wait4(0x0, 0x0, 0x0, 0x0) 23:08:47 executing program 0: r0 = getpgrp(0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x24000000) r1 = gettid() perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000, 0x0, 0x2af}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000080), 0x30200, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) unshare(0x4000000) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r3, 0x0) r4 = syz_open_dev$cec(&(0x7f0000000300), 0x3, 0x2) preadv(r4, &(0x7f00000002c0)=[{&(0x7f00000001c0)=""/251, 0xfb}], 0x1, 0xda3, 0x400001) bpf$ITER_CREATE(0x21, &(0x7f0000000100)={r2}, 0x9) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x26, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = perf_event_open(&(0x7f00000006c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c44}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ID(r5, 0x80042407, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000140)={0x1, 0x80, 0x1, 0x7, 0x6, 0xff, 0x0, 0x0, 0x80200, 0xe, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x400, 0x1, @perf_bp={&(0x7f00000000c0), 0x8}, 0x18000, 0x8000, 0xfffffffc, 0x1, 0x1000000000, 0x8, 0x3, 0x0, 0x8, 0x0, 0x9}, r1, 0x2, r5, 0x2) clone(0x6cb2e100, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r1) wait4(0x0, 0x0, 0x0, 0x0) 23:08:47 executing program 4: perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0xc7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x12, 0xf7, 0x4, 0x3, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x13000000}, 0x40) 23:08:47 executing program 3: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x15, 0x0, 0x1, 0x0, 0x6, @multicast}, 0x14) clone(0x2000000082148180, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_STRSET_GET(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000640)={&(0x7f00000006c0)=ANY=[@ANYBLOB="cccd30", @ANYRES16=0x0, @ANYBLOB="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", @ANYRES32=0x0, @ANYBLOB="1400020069703667726574617030000000000000140002006970366572f370616e20000000000000fa0ee59a22b338aeb6d3895b934764e9a674c87f74b9c35aaa183a9ea95194a3dc40d9b230a9f627acae68e5f0381078395e744b4197fe3dd12112adacad625f6ae8e22901a3dd5920796e7dc087d5033e12c9e4aea2026a5df4ee89adbeda48287c2840149cf27af2cc0f064680a7b5e90f480b201f70326baca201fea21a0100000000000000"], 0x1cc}, 0x1, 0x0, 0x0, 0x8800}, 0x20040040) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) request_key(0x0, &(0x7f0000001ffb)={'syz', 0x1}, 0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x1004) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0x3, 0x380, 0x0, 0xe0, 0xe0, 0xe0, 0x0, 0x2e8, 0x2e8, 0x2e8, 0x2e8, 0x2e8, 0x7fffffe, 0x0, {[{{@uncond, 0x0, 0x70, 0xe0, 0x0, {0x6020000}}, @common=@unspec=@NFLOG={0x70, 'NFLOG\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, "a4bcf0ebf5d09e8706000000b1000000124ac31d4fda375c7794e420aa63529ebcf847246a5e8846085b0a30510b266347a84ae5ffea89b8654e44026e00"}}}, {{@ip={@local, @multicast1, 0x0, 0x0, '\x00', 'wg1\x00'}, 0x0, 0x1c8, 0x208, 0x0, {}, [@common=@inet=@hashlimit3={{0x158}, {'bridge_slave_1\x00', {0x0, 0x8, 0x0, 0x0, 0x0, 0x7fff, 0x8}}}]}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "29f0be44329ad4d94a815c71ad95092b933b5e380a7e5d3c56c51e9d0027"}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x3e0) 23:08:47 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x15, 0x0, 0x1, 0x0, 0x6, @multicast}, 0x14) clone(0x2000000082148180, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_STRSET_GET(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000640)={0x0, 0x1cc}, 0x1, 0x0, 0x0, 0x8800}, 0x20040040) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) request_key(0x0, &(0x7f0000001ffb)={'syz', 0x1}, 0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x1004) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0x3, 0x380, 0x176, 0xe0, 0xe0, 0xe0, 0x0, 0x2e8, 0x2e8, 0x2e8, 0x2e8, 0x2e8, 0x7fffffe, 0x0, {[{{@uncond, 0x0, 0x70, 0xe0, 0x0, {0x6020000}}, @common=@unspec=@NFLOG={0x70, 'NFLOG\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, "a4bcf0ebf5d09e8706580300b1000000124ac31d4fda375c7794e420aa63529ebcf847246a5e8846085b0a30510b266347a84ae5ffea89b8654e4400"}}}, {{@ip={@local, @multicast1, 0x0, 0x0, '\x00', 'wg1\x00'}, 0x0, 0x1c8, 0x208, 0x0, {}, [@common=@inet=@hashlimit3={{0x158}, {'bridge_slave_1\x00', {0x0, 0x8, 0x0, 0x0, 0x0, 0x7fff, 0x8}}}]}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "29f0be44329ad4d94a815c71ad95092b933b5e380a7e5d3c56c51e9d0027"}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x3e0) 23:08:47 executing program 2: r0 = getpgrp(0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x24000000) r1 = gettid() perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000080), 0x30200, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) unshare(0x4000000) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, r3, 0x0) preadv(0xffffffffffffffff, &(0x7f00000002c0)=[{&(0x7f00000001c0)=""/251, 0xfb}], 0x1, 0x0, 0x0) bpf$ITER_CREATE(0x21, &(0x7f0000000100)={r2}, 0x9) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x26, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = perf_event_open(&(0x7f00000006c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c44}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ID(r4, 0x80042407, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000140)={0x1, 0x80, 0x0, 0x7, 0x0, 0xff, 0x0, 0x2, 0x0, 0xe, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x400, 0x1, @perf_bp={&(0x7f00000000c0), 0x8}, 0x18000, 0x8000, 0xfffffffc, 0x1, 0x1000000000, 0x8, 0x3, 0x0, 0x8, 0x0, 0x9}, r1, 0x2, r4, 0x2) clone(0x6cb2e100, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r1) wait4(0x0, 0x0, 0x0, 0x0) 23:08:47 executing program 3: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x15, 0x0, 0x1, 0x0, 0x6, @multicast}, 0x14) clone(0x2000000082148180, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_STRSET_GET(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000640)={&(0x7f00000006c0)=ANY=[@ANYBLOB="cccd30", @ANYRES16=0x0, @ANYBLOB="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", @ANYRES32=0x0, @ANYBLOB="1400020069703667726574617030000000000000140002006970366572f370616e20000000000000fa0ee59a22b338aeb6d3895b934764e9a674c87f74b9c35aaa183a9ea95194a3dc40d9b230a9f627acae68e5f0381078395e744b4197fe3dd12112adacad625f6ae8e22901a3dd5920796e7dc087d5033e12c9e4aea2026a5df4ee89adbeda48287c2840149cf27af2cc0f064680a7b5e90f480b201f70326baca201fea21a0100000000000000"], 0x1cc}, 0x1, 0x0, 0x0, 0x8800}, 0x20040040) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) request_key(0x0, &(0x7f0000001ffb)={'syz', 0x1}, 0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x1004) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0x3, 0x380, 0x0, 0xe0, 0xe0, 0xe0, 0x0, 0x2e8, 0x2e8, 0x2e8, 0x2e8, 0x2e8, 0x7fffffe, 0x0, {[{{@uncond, 0x0, 0x70, 0xe0, 0x0, {0x6020000}}, @common=@unspec=@NFLOG={0x70, 'NFLOG\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, "a4bcf0ebf5d09e8706000000b1000000124ac31d4fda375c7794e420aa63529ebcf847246a5e8846085b0a30510b266347a84ae5ffea89b8654e44027000"}}}, {{@ip={@local, @multicast1, 0x0, 0x0, '\x00', 'wg1\x00'}, 0x0, 0x1c8, 0x208, 0x0, {}, [@common=@inet=@hashlimit3={{0x158}, {'bridge_slave_1\x00', {0x0, 0x8, 0x0, 0x0, 0x0, 0x7fff, 0x8}}}]}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "29f0be44329ad4d94a815c71ad95092b933b5e380a7e5d3c56c51e9d0027"}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x3e0) 23:08:47 executing program 4: perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0xc7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x12, 0xf7, 0x4, 0x3, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x14000000}, 0x40) 23:08:47 executing program 4: perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0xc7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x12, 0xf7, 0x4, 0x3, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x18000000}, 0x40) 23:08:47 executing program 2: r0 = getpgrp(0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x24000000) r1 = gettid() perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000080), 0x30200, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) unshare(0x4000000) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, r3, 0x0) preadv(0xffffffffffffffff, &(0x7f00000002c0)=[{&(0x7f00000001c0)=""/251, 0xfb}], 0x1, 0x0, 0x0) bpf$ITER_CREATE(0x21, &(0x7f0000000100)={r2}, 0x9) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x26, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = perf_event_open(&(0x7f00000006c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c44}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ID(r4, 0x80042407, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000140)={0x1, 0x80, 0x0, 0x7, 0x0, 0xff, 0x0, 0x2, 0x0, 0xe, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x400, 0x1, @perf_bp={&(0x7f00000000c0), 0x8}, 0x18000, 0x8000, 0xfffffffc, 0x1, 0x1000000000, 0x8, 0x3, 0x0, 0x8, 0x0, 0x9}, r1, 0x2, r4, 0x2) clone(0x6cb2e100, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r1) wait4(0x0, 0x0, 0x0, 0x0) 23:08:47 executing program 3: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x15, 0x0, 0x1, 0x0, 0x6, @multicast}, 0x14) clone(0x2000000082148180, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_STRSET_GET(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000640)={&(0x7f00000006c0)=ANY=[@ANYBLOB="cccd30", @ANYRES16=0x0, @ANYBLOB="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", @ANYRES32=0x0, @ANYBLOB="1400020069703667726574617030000000000000140002006970366572f370616e20000000000000fa0ee59a22b338aeb6d3895b934764e9a674c87f74b9c35aaa183a9ea95194a3dc40d9b230a9f627acae68e5f0381078395e744b4197fe3dd12112adacad625f6ae8e22901a3dd5920796e7dc087d5033e12c9e4aea2026a5df4ee89adbeda48287c2840149cf27af2cc0f064680a7b5e90f480b201f70326baca201fea21a0100000000000000"], 0x1cc}, 0x1, 0x0, 0x0, 0x8800}, 0x20040040) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) request_key(0x0, &(0x7f0000001ffb)={'syz', 0x1}, 0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x1004) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0x3, 0x380, 0x0, 0xe0, 0xe0, 0xe0, 0x0, 0x2e8, 0x2e8, 0x2e8, 0x2e8, 0x2e8, 0x7fffffe, 0x0, {[{{@uncond, 0x0, 0x70, 0xe0, 0x0, {0x6020000}}, @common=@unspec=@NFLOG={0x70, 'NFLOG\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, "a4bcf0ebf5d09e8706000000b1000000124ac31d4fda375c7794e420aa63529ebcf847246a5e8846085b0a30510b266347a84ae5ffea89b8654e44017200"}}}, {{@ip={@local, @multicast1, 0x0, 0x0, '\x00', 'wg1\x00'}, 0x0, 0x1c8, 0x208, 0x0, {}, [@common=@inet=@hashlimit3={{0x158}, {'bridge_slave_1\x00', {0x0, 0x8, 0x0, 0x0, 0x0, 0x7fff, 0x8}}}]}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "29f0be44329ad4d94a815c71ad95092b933b5e380a7e5d3c56c51e9d0027"}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x3e0) 23:08:47 executing program 4: perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0xc7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x12, 0xf7, 0x4, 0x3, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x47010000}, 0x40) 23:08:49 executing program 1: ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000001c0)={'team0\x00', 0x0}) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000680)={0xffffffffffffffff, 0x10, &(0x7f0000000640)={&(0x7f0000000780)=""/4096, 0x1000, 0x0}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000001780)={0x8, 0x7, &(0x7f0000001800)=ANY=[@ANYBLOB="180000009d57000000000000060000001832000005000000000000000000000495000000000000005c150400010000009500000000434e0dae2ef63aab6acde18cddf77c67000000"], &(0x7f0000000180)='GPL\x00', 0x2, 0x0, 0x0, 0x41100, 0xd, '\x00', r0, 0x1d, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x6, 0x5}, 0x8, 0x10, &(0x7f0000000600)={0x5, 0x0, 0x0, 0x10001}, 0x10, r1}, 0x78) r2 = getpgrp(0x0) prctl$PR_SET_PTRACER(0x59616d61, r2) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x24000000) gettid() perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x2100, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x4}, 0x0, 0x8}, 0x0, 0x8, 0xffffffffffffffff, 0x9) clone(0x6cb2e100, 0x0, 0x0, 0x0, 0x0) r3 = openat$rtc(0xffffffffffffff9c, &(0x7f00000168c0), 0x0, 0x0) ioctl$RTC_UIE_ON(r3, 0x7003) clone(0x59040000, &(0x7f0000000200)="32b026bb2bd5ab05345d05868d1008feb1352fb452659a55b2c8650d5c3b8d9896f83163af0908ddf225ca94e880899df94150b94cce61a62255c2da294ef09dd6df955a8b10081fc4491edeff6bdea1f408c84f564a1702f2429d4ed091a3ef6bb7002cdeb2cb9790f44b23c402166d7ced3ecafcbc5a046b763517bf35421cba1dc4f3b4a67d3882fcad4bd680d79d963ee7d31048c06d6a09d69830d36d80e15be2156e695858a0937e49a60e4623fca37ffd32972d2555bb01a4c5c57e4e6c39ec93e0887c3ed39a172ca646bc8514bdb64ddceb12d7d09546d0c5d8c9fe33f4296409029503d314e0", &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="99d1c32534d9de00af8729fa460ec9d5628744ffe3cb327edbe5d45fed028bf303c434286297cbfe9f121b1bc94969fa74f64c4cb8a1d40cadfe5d1afe1911de07770c57e37c225c0843887e02f6881c533230e4a3d43275e9cd079068012291e77d44bf1f4398518c9d64ae643b1ebff18fb2d4d632098a07dd40847a76374a4a01df2f34c001369ba9b86499548cbb8ce4cda4ae5179f35c9feb4de592a550f357f89d1660d711fac0e2a8") ioctl$RTC_SET_TIME(r3, 0x4024700a, &(0x7f0000000000)={0x0, 0x0, 0x0, 0xf, 0x0, 0xfd}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x9efef75f}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvlan={{0xc}, {0x4}}}, @IFLA_LINK={0x8}]}, 0x3c}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000001940)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000006c0)={&(0x7f0000001880)=@dellinkprop={0xb0, 0x6d, 0x20, 0x70bd28, 0x25dfdbff, {0x0, 0x0, 0x0, 0x0, 0x210, 0xc0018}, [@IFLA_TARGET_NETNSID={0x8, 0x2e, 0x2}, @IFLA_MASTER={0x8}, @IFLA_AF_SPEC={0x70, 0x1a, 0x0, 0x1, [@AF_MPLS={0x4}, @AF_MPLS={0x4}, @AF_INET6={0x28, 0xa, 0x0, 0x1, [@IFLA_INET6_ADDR_GEN_MODE={0x5, 0x8, 0x6b}, @IFLA_INET6_TOKEN={0x14, 0x7, @mcast2}, @IFLA_INET6_ADDR_GEN_MODE={0x5, 0x8, 0x7}]}, @AF_MPLS={0x4}, @AF_INET6={0x28, 0xa, 0x0, 0x1, [@IFLA_INET6_ADDR_GEN_MODE={0x5, 0x8, 0x8}, @IFLA_INET6_ADDR_GEN_MODE={0x5, 0x8, 0x56}, @IFLA_INET6_TOKEN={0x14, 0x7, @ipv4={'\x00', '\xff\xff', @local}}]}, @AF_MPLS={0x4}, @AF_INET6={0xc, 0xa, 0x0, 0x1, [@IFLA_INET6_ADDR_GEN_MODE={0x5, 0x8, 0x9}]}]}, @IFLA_IFALIASn={0x4}, @IFLA_PHYS_PORT_ID={0xb, 0x22, "3df17141c4e8d5"}]}, 0xb0}, 0x1, 0x0, 0x0, 0x4000001}, 0x84000) clone(0x2908000, &(0x7f0000000080)="6028d78584a9523ff3b18b3c7f86b0f46595537c62f1f47ca39e4ff27666a38078b3617669c736e28539aa28b2d44ceec9dc0c3a4d3dd6d901efcff839fc776cc0790c", &(0x7f0000000140), &(0x7f0000000440), &(0x7f0000000480)="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") wait4(0x0, 0x0, 0x0, 0x0) 23:08:50 executing program 0: r0 = getpgrp(0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x24000000) r1 = gettid() perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000, 0x0, 0x2af}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000080), 0x30200, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) unshare(0x4000000) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r3, 0x0) r4 = syz_open_dev$cec(&(0x7f0000000300), 0x3, 0x2) preadv(r4, &(0x7f00000002c0)=[{&(0x7f00000001c0)=""/251, 0xfb}], 0x1, 0xda3, 0x400001) bpf$ITER_CREATE(0x21, &(0x7f0000000100)={r2}, 0x9) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x26, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = perf_event_open(&(0x7f00000006c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c44}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ID(r5, 0x80042407, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000140)={0x1, 0x80, 0x1, 0x7, 0x6, 0xff, 0x0, 0x0, 0x80200, 0xe, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x400, 0x1, @perf_bp={&(0x7f00000000c0), 0x8}, 0x18000, 0x8000, 0xfffffffc, 0x1, 0x1000000000, 0x8, 0x3, 0x0, 0x8, 0x0, 0x9}, r1, 0x2, r5, 0x2) clone(0x6cb2e100, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r1) wait4(0x0, 0x0, 0x0, 0x0) 23:08:50 executing program 4: perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0xc7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x12, 0xf7, 0x4, 0x3, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0xe4ffffff}, 0x40) 23:08:50 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x15, 0x0, 0x1, 0x0, 0x6, @multicast}, 0x14) clone(0x2000000082148180, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_STRSET_GET(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000640)={0x0, 0x1cc}, 0x1, 0x0, 0x0, 0x8800}, 0x20040040) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) request_key(0x0, &(0x7f0000001ffb)={'syz', 0x1}, 0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x1004) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0x3, 0x380, 0x178, 0xe0, 0xe0, 0xe0, 0x0, 0x2e8, 0x2e8, 0x2e8, 0x2e8, 0x2e8, 0x7fffffe, 0x0, {[{{@uncond, 0x0, 0x70, 0xe0, 0x0, {0x6020000}}, @common=@unspec=@NFLOG={0x70, 'NFLOG\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, "a4bcf0ebf5d09e8706580300b1000000124ac31d4fda375c7794e420aa63529ebcf847246a5e8846085b0a30510b266347a84ae5ffea89b8654e4400"}}}, {{@ip={@local, @multicast1, 0x0, 0x0, '\x00', 'wg1\x00'}, 0x0, 0x1c8, 0x208, 0x0, {}, [@common=@inet=@hashlimit3={{0x158}, {'bridge_slave_1\x00', {0x0, 0x8, 0x0, 0x0, 0x0, 0x7fff, 0x8}}}]}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "29f0be44329ad4d94a815c71ad95092b933b5e380a7e5d3c56c51e9d0027"}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x3e0) 23:08:50 executing program 3: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x15, 0x0, 0x1, 0x0, 0x6, @multicast}, 0x14) clone(0x2000000082148180, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_STRSET_GET(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000640)={&(0x7f00000006c0)=ANY=[@ANYBLOB="cccd30", @ANYRES16=0x0, @ANYBLOB="02002abd7000fbdbdf250100000004000300800102800c00018008000100070000002400018008000100070000000800010008000000080001000100000008000100060000001c0001800800010005000000080001000200000008000100000000002c000180080001000600000008000100070000000800010003000000080001000600000008000100000000005400018008000100060000000800010001000000080001000400000008000100000000000800010000000000080001000000000008000100000000000800010008000000080001000300000008000100020000001c0001800800010008000000080001000100000008000100050000001c0001800800010004000000080001000400000008000100010000002c000180080001000000000008000100040000000800010007000000080001000700000008000100080000004c0001800800010002000000080001000200000008000100050000000800010003000000080001000400000008000100040000000800010000000000080001000400000008000100030000003400018008000100", @ANYRES32=0x0, @ANYBLOB="1400020069703667726574617030000000000000140002006970366572f370616e20000000000000fa0ee59a22b338aeb6d3895b934764e9a674c87f74b9c35aaa183a9ea95194a3dc40d9b230a9f627acae68e5f0381078395e744b4197fe3dd12112adacad625f6ae8e22901a3dd5920796e7dc087d5033e12c9e4aea2026a5df4ee89adbeda48287c2840149cf27af2cc0f064680a7b5e90f480b201f70326baca201fea21a0100000000000000"], 0x1cc}, 0x1, 0x0, 0x0, 0x8800}, 0x20040040) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) request_key(0x0, &(0x7f0000001ffb)={'syz', 0x1}, 0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x1004) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0x3, 0x380, 0x0, 0xe0, 0xe0, 0xe0, 0x0, 0x2e8, 0x2e8, 0x2e8, 0x2e8, 0x2e8, 0x7fffffe, 0x0, {[{{@uncond, 0x0, 0x70, 0xe0, 0x0, {0x6020000}}, @common=@unspec=@NFLOG={0x70, 'NFLOG\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, "a4bcf0ebf5d09e8706000000b1000000124ac31d4fda375c7794e420aa63529ebcf847246a5e8846085b0a30510b266347a84ae5ffea89b8654e44037a00"}}}, {{@ip={@local, @multicast1, 0x0, 0x0, '\x00', 'wg1\x00'}, 0x0, 0x1c8, 0x208, 0x0, {}, [@common=@inet=@hashlimit3={{0x158}, {'bridge_slave_1\x00', {0x0, 0x8, 0x0, 0x0, 0x0, 0x7fff, 0x8}}}]}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "29f0be44329ad4d94a815c71ad95092b933b5e380a7e5d3c56c51e9d0027"}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x3e0) 23:08:50 executing program 1: ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000001c0)={'team0\x00', 0x0}) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000680)={0xffffffffffffffff, 0x10, &(0x7f0000000640)={&(0x7f0000000780)=""/4096, 0x1000, 0x0}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000001780)={0x8, 0x7, &(0x7f0000001800)=ANY=[@ANYBLOB="180000009d57000000000000060000001832000005000000000000000000000495000000000000005c150400010000009500000000434e0dae2ef63aab6acde18cddf77c67000000"], &(0x7f0000000180)='GPL\x00', 0x2, 0x0, 0x0, 0x41100, 0xd, '\x00', r0, 0x1d, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x6, 0x5}, 0x8, 0x10, &(0x7f0000000600)={0x5, 0x0, 0x0, 0x10001}, 0x10, r1}, 0x78) r2 = getpgrp(0x0) prctl$PR_SET_PTRACER(0x59616d61, r2) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x24000000) gettid() perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x2100, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x4}, 0x0, 0x8}, 0x0, 0x8, 0xffffffffffffffff, 0x9) clone(0x6cb2e100, 0x0, 0x0, 0x0, 0x0) r3 = openat$rtc(0xffffffffffffff9c, &(0x7f00000168c0), 0x0, 0x0) ioctl$RTC_UIE_ON(r3, 0x7003) clone(0x59040000, &(0x7f0000000200)="32b026bb2bd5ab05345d05868d1008feb1352fb452659a55b2c8650d5c3b8d9896f83163af0908ddf225ca94e880899df94150b94cce61a62255c2da294ef09dd6df955a8b10081fc4491edeff6bdea1f408c84f564a1702f2429d4ed091a3ef6bb7002cdeb2cb9790f44b23c402166d7ced3ecafcbc5a046b763517bf35421cba1dc4f3b4a67d3882fcad4bd680d79d963ee7d31048c06d6a09d69830d36d80e15be2156e695858a0937e49a60e4623fca37ffd32972d2555bb01a4c5c57e4e6c39ec93e0887c3ed39a172ca646bc8514bdb64ddceb12d7d09546d0c5d8c9fe33f4296409029503d314e0", &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="99d1c32534d9de00af8729fa460ec9d5628744ffe3cb327edbe5d45fed028bf303c434286297cbfe9f121b1bc94969fa74f64c4cb8a1d40cadfe5d1afe1911de07770c57e37c225c0843887e02f6881c533230e4a3d43275e9cd079068012291e77d44bf1f4398518c9d64ae643b1ebff18fb2d4d632098a07dd40847a76374a4a01df2f34c001369ba9b86499548cbb8ce4cda4ae5179f35c9feb4de592a550f357f89d1660d711fac0e2a8") ioctl$RTC_SET_TIME(r3, 0x4024700a, &(0x7f0000000000)={0x0, 0x0, 0x0, 0xf, 0x0, 0xfd}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x9efef75f}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvlan={{0xc}, {0x4}}}, @IFLA_LINK={0x8}]}, 0x3c}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000001940)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000006c0)={&(0x7f0000001880)=@dellinkprop={0xb0, 0x6d, 0x20, 0x70bd28, 0x25dfdbff, {0x0, 0x0, 0x0, 0x0, 0x210, 0xc0018}, [@IFLA_TARGET_NETNSID={0x8, 0x2e, 0x2}, @IFLA_MASTER={0x8}, @IFLA_AF_SPEC={0x70, 0x1a, 0x0, 0x1, [@AF_MPLS={0x4}, @AF_MPLS={0x4}, @AF_INET6={0x28, 0xa, 0x0, 0x1, [@IFLA_INET6_ADDR_GEN_MODE={0x5, 0x8, 0x6b}, @IFLA_INET6_TOKEN={0x14, 0x7, @mcast2}, @IFLA_INET6_ADDR_GEN_MODE={0x5, 0x8, 0x7}]}, @AF_MPLS={0x4}, @AF_INET6={0x28, 0xa, 0x0, 0x1, [@IFLA_INET6_ADDR_GEN_MODE={0x5, 0x8, 0x8}, @IFLA_INET6_ADDR_GEN_MODE={0x5, 0x8, 0x56}, @IFLA_INET6_TOKEN={0x14, 0x7, @ipv4={'\x00', '\xff\xff', @local}}]}, @AF_MPLS={0x4}, @AF_INET6={0xc, 0xa, 0x0, 0x1, [@IFLA_INET6_ADDR_GEN_MODE={0x5, 0x8, 0x9}]}]}, @IFLA_IFALIASn={0x4}, @IFLA_PHYS_PORT_ID={0xb, 0x22, "3df17141c4e8d5"}]}, 0xb0}, 0x1, 0x0, 0x0, 0x4000001}, 0x84000) clone(0x2908000, &(0x7f0000000080)="6028d78584a9523ff3b18b3c7f86b0f46595537c62f1f47ca39e4ff27666a38078b3617669c736e28539aa28b2d44ceec9dc0c3a4d3dd6d901efcff839fc776cc0790c", &(0x7f0000000140), &(0x7f0000000440), &(0x7f0000000480)="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") wait4(0x0, 0x0, 0x0, 0x0) 23:08:50 executing program 4: perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0xc7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x12, 0xf7, 0x4, 0x3, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0xffff8000}, 0x40) 23:08:50 executing program 3: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x15, 0x0, 0x1, 0x0, 0x6, @multicast}, 0x14) clone(0x2000000082148180, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_STRSET_GET(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000640)={&(0x7f00000006c0)=ANY=[@ANYBLOB="cccd30", @ANYRES16=0x0, @ANYBLOB="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", @ANYRES32=0x0, @ANYBLOB="1400020069703667726574617030000000000000140002006970366572f370616e20000000000000fa0ee59a22b338aeb6d3895b934764e9a674c87f74b9c35aaa183a9ea95194a3dc40d9b230a9f627acae68e5f0381078395e744b4197fe3dd12112adacad625f6ae8e22901a3dd5920796e7dc087d5033e12c9e4aea2026a5df4ee89adbeda48287c2840149cf27af2cc0f064680a7b5e90f480b201f70326baca201fea21a0100000000000000"], 0x1cc}, 0x1, 0x0, 0x0, 0x8800}, 0x20040040) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) request_key(0x0, &(0x7f0000001ffb)={'syz', 0x1}, 0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x1004) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0x3, 0x380, 0x0, 0xe0, 0xe0, 0xe0, 0x0, 0x2e8, 0x2e8, 0x2e8, 0x2e8, 0x2e8, 0x7fffffe, 0x0, {[{{@uncond, 0x0, 0x70, 0xe0, 0x0, {0x6020000}}, @common=@unspec=@NFLOG={0x70, 'NFLOG\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, "a4bcf0ebf5d09e8706000000b1000000124ac31d4fda375c7794e420aa63529ebcf847246a5e8846085b0a30510b266347a84ae5ffea89b8654e44028800"}}}, {{@ip={@local, @multicast1, 0x0, 0x0, '\x00', 'wg1\x00'}, 0x0, 0x1c8, 0x208, 0x0, {}, [@common=@inet=@hashlimit3={{0x158}, {'bridge_slave_1\x00', {0x0, 0x8, 0x0, 0x0, 0x0, 0x7fff, 0x8}}}]}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "29f0be44329ad4d94a815c71ad95092b933b5e380a7e5d3c56c51e9d0027"}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x3e0) 23:08:50 executing program 4: perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0xc7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x12, 0xf7, 0x4, 0x3, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0xffffffe4}, 0x40) 23:08:50 executing program 2: r0 = getpgrp(0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x24000000) r1 = gettid() perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000080), 0x30200, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) unshare(0x4000000) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, r3, 0x0) preadv(0xffffffffffffffff, &(0x7f00000002c0)=[{&(0x7f00000001c0)=""/251, 0xfb}], 0x1, 0x0, 0x0) bpf$ITER_CREATE(0x21, &(0x7f0000000100)={r2}, 0x9) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x26, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = perf_event_open(&(0x7f00000006c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c44}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ID(r4, 0x80042407, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000140)={0x1, 0x80, 0x0, 0x7, 0x0, 0xff, 0x0, 0x2, 0x0, 0xe, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x400, 0x1, @perf_bp={&(0x7f00000000c0), 0x8}, 0x18000, 0x8000, 0xfffffffc, 0x1, 0x1000000000, 0x8, 0x3, 0x0, 0x8, 0x0, 0x9}, r1, 0x2, r4, 0x2) clone(0x6cb2e100, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r1) wait4(0x0, 0x0, 0x0, 0x0) 23:08:50 executing program 1: ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000001c0)={'team0\x00', 0x0}) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000680)={0xffffffffffffffff, 0x10, &(0x7f0000000640)={&(0x7f0000000780)=""/4096, 0x1000, 0x0}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000001780)={0x8, 0x7, &(0x7f0000001800)=ANY=[@ANYBLOB="180000009d57000000000000060000001832000005000000000000000000000495000000000000005c150400010000009500000000434e0dae2ef63aab6acde18cddf77c67000000"], &(0x7f0000000180)='GPL\x00', 0x2, 0x0, 0x0, 0x41100, 0xd, '\x00', r0, 0x1d, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x6, 0x5}, 0x8, 0x10, &(0x7f0000000600)={0x5, 0x0, 0x0, 0x10001}, 0x10, r1}, 0x78) r2 = getpgrp(0x0) prctl$PR_SET_PTRACER(0x59616d61, r2) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x24000000) gettid() perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x2100, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x4}, 0x0, 0x8}, 0x0, 0x8, 0xffffffffffffffff, 0x9) clone(0x6cb2e100, 0x0, 0x0, 0x0, 0x0) r3 = openat$rtc(0xffffffffffffff9c, &(0x7f00000168c0), 0x0, 0x0) ioctl$RTC_UIE_ON(r3, 0x7003) clone(0x59040000, &(0x7f0000000200)="32b026bb2bd5ab05345d05868d1008feb1352fb452659a55b2c8650d5c3b8d9896f83163af0908ddf225ca94e880899df94150b94cce61a62255c2da294ef09dd6df955a8b10081fc4491edeff6bdea1f408c84f564a1702f2429d4ed091a3ef6bb7002cdeb2cb9790f44b23c402166d7ced3ecafcbc5a046b763517bf35421cba1dc4f3b4a67d3882fcad4bd680d79d963ee7d31048c06d6a09d69830d36d80e15be2156e695858a0937e49a60e4623fca37ffd32972d2555bb01a4c5c57e4e6c39ec93e0887c3ed39a172ca646bc8514bdb64ddceb12d7d09546d0c5d8c9fe33f4296409029503d314e0", &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="99d1c32534d9de00af8729fa460ec9d5628744ffe3cb327edbe5d45fed028bf303c434286297cbfe9f121b1bc94969fa74f64c4cb8a1d40cadfe5d1afe1911de07770c57e37c225c0843887e02f6881c533230e4a3d43275e9cd079068012291e77d44bf1f4398518c9d64ae643b1ebff18fb2d4d632098a07dd40847a76374a4a01df2f34c001369ba9b86499548cbb8ce4cda4ae5179f35c9feb4de592a550f357f89d1660d711fac0e2a8") ioctl$RTC_SET_TIME(r3, 0x4024700a, &(0x7f0000000000)={0x0, 0x0, 0x0, 0xf, 0x0, 0xfd}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x9efef75f}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvlan={{0xc}, {0x4}}}, @IFLA_LINK={0x8}]}, 0x3c}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000001940)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000006c0)={&(0x7f0000001880)=@dellinkprop={0xb0, 0x6d, 0x20, 0x70bd28, 0x25dfdbff, {0x0, 0x0, 0x0, 0x0, 0x210, 0xc0018}, [@IFLA_TARGET_NETNSID={0x8, 0x2e, 0x2}, @IFLA_MASTER={0x8}, @IFLA_AF_SPEC={0x70, 0x1a, 0x0, 0x1, [@AF_MPLS={0x4}, @AF_MPLS={0x4}, @AF_INET6={0x28, 0xa, 0x0, 0x1, [@IFLA_INET6_ADDR_GEN_MODE={0x5, 0x8, 0x6b}, @IFLA_INET6_TOKEN={0x14, 0x7, @mcast2}, @IFLA_INET6_ADDR_GEN_MODE={0x5, 0x8, 0x7}]}, @AF_MPLS={0x4}, @AF_INET6={0x28, 0xa, 0x0, 0x1, [@IFLA_INET6_ADDR_GEN_MODE={0x5, 0x8, 0x8}, @IFLA_INET6_ADDR_GEN_MODE={0x5, 0x8, 0x56}, @IFLA_INET6_TOKEN={0x14, 0x7, @ipv4={'\x00', '\xff\xff', @local}}]}, @AF_MPLS={0x4}, @AF_INET6={0xc, 0xa, 0x0, 0x1, [@IFLA_INET6_ADDR_GEN_MODE={0x5, 0x8, 0x9}]}]}, @IFLA_IFALIASn={0x4}, @IFLA_PHYS_PORT_ID={0xb, 0x22, "3df17141c4e8d5"}]}, 0xb0}, 0x1, 0x0, 0x0, 0x4000001}, 0x84000) clone(0x2908000, &(0x7f0000000080)="6028d78584a9523ff3b18b3c7f86b0f46595537c62f1f47ca39e4ff27666a38078b3617669c736e28539aa28b2d44ceec9dc0c3a4d3dd6d901efcff839fc776cc0790c", &(0x7f0000000140), &(0x7f0000000440), &(0x7f0000000480)="242ca92137c64d2aa511b44b3c1cfde2dcc859886593cab62548ea4784feceb4575c63296b0fec0d95f9d0545e98ad8a780317be96bf33ee1323c21bbd3408f19cc491fe3e0640ca86d924c1c438cacbc01bffeab0bf8337864bfe29771f0e3982aa64897821d7ed05a7368c7d4dba2eb99c641eca43a27125ea04721f6aba768faf134a4e1031de9e9cdb1e34fe658edb5a21c8473385f8af9d6a2cfecd97300c78c402d2397d81e96505a2b29983671676bb8e195c46240d650efbf9b3fc8d173f7af8cd723628e6be3410c8b8c3a3891d304c729fec5b1491855f932f47fbed742a324ddcd3ec55410e386f95cb48ccaf9124e264d072cff4204404397088bc526deb9cbf07") wait4(0x0, 0x0, 0x0, 0x0) 23:08:50 executing program 0: r0 = getpgrp(0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x24000000) r1 = gettid() perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000, 0x0, 0x2af}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000080), 0x30200, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) unshare(0x4000000) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r3, 0x0) r4 = syz_open_dev$cec(&(0x7f0000000300), 0x3, 0x2) preadv(r4, &(0x7f00000002c0)=[{&(0x7f00000001c0)=""/251, 0xfb}], 0x1, 0xda3, 0x400001) bpf$ITER_CREATE(0x21, &(0x7f0000000100)={r2}, 0x9) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x26, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = perf_event_open(&(0x7f00000006c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c44}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ID(r5, 0x80042407, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000140)={0x1, 0x80, 0x1, 0x7, 0x6, 0xff, 0x0, 0x0, 0x80200, 0xe, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x400, 0x1, @perf_bp={&(0x7f00000000c0), 0x8}, 0x18000, 0x8000, 0xfffffffc, 0x1, 0x1000000000, 0x8, 0x3, 0x0, 0x8, 0x0, 0x9}, r1, 0x2, r5, 0x2) clone(0x6cb2e100, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r1) wait4(0x0, 0x0, 0x0, 0x0) 23:08:50 executing program 4: perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0xc7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x12, 0xf7, 0x4, 0x3}, 0x48) 23:08:50 executing program 1: ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000001c0)={'team0\x00', 0x0}) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000680)={0xffffffffffffffff, 0x10, &(0x7f0000000640)={&(0x7f0000000780)=""/4096, 0x1000, 0x0}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000001780)={0x8, 0x7, &(0x7f0000001800)=ANY=[@ANYBLOB="180000009d57000000000000060000001832000005000000000000000000000495000000000000005c150400010000009500000000434e0dae2ef63aab6acde18cddf77c67000000"], &(0x7f0000000180)='GPL\x00', 0x2, 0x0, 0x0, 0x41100, 0xd, '\x00', r0, 0x1d, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x6, 0x5}, 0x8, 0x10, &(0x7f0000000600)={0x5, 0x0, 0x0, 0x10001}, 0x10, r1}, 0x78) r2 = getpgrp(0x0) prctl$PR_SET_PTRACER(0x59616d61, r2) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x24000000) r3 = gettid() perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x2100, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x4}, 0x0, 0x8}, 0x0, 0x8, 0xffffffffffffffff, 0x9) clone(0x6cb2e100, 0x0, 0x0, 0x0, 0x0) r4 = openat$rtc(0xffffffffffffff9c, &(0x7f00000168c0), 0x0, 0x0) ioctl$RTC_UIE_ON(r4, 0x7003) clone(0x59040000, &(0x7f0000000200)="32b026bb2bd5ab05345d05868d1008feb1352fb452659a55b2c8650d5c3b8d9896f83163af0908ddf225ca94e880899df94150b94cce61a62255c2da294ef09dd6df955a8b10081fc4491edeff6bdea1f408c84f564a1702f2429d4ed091a3ef6bb7002cdeb2cb9790f44b23c402166d7ced3ecafcbc5a046b763517bf35421cba1dc4f3b4a67d3882fcad4bd680d79d963ee7d31048c06d6a09d69830d36d80e15be2156e695858a0937e49a60e4623fca37ffd32972d2555bb01a4c5c57e4e6c39ec93e0887c3ed39a172ca646bc8514bdb64ddceb12d7d09546d0c5d8c9fe33f4296409029503d314e0", &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="99d1c32534d9de00af8729fa460ec9d5628744ffe3cb327edbe5d45fed028bf303c434286297cbfe9f121b1bc94969fa74f64c4cb8a1d40cadfe5d1afe1911de07770c57e37c225c0843887e02f6881c533230e4a3d43275e9cd079068012291e77d44bf1f4398518c9d64ae643b1ebff18fb2d4d632098a07dd40847a76374a4a01df2f34c001369ba9b86499548cbb8ce4cda4ae5179f35c9feb4de592a550f357f89d1660d711fac0e2a8") ioctl$RTC_SET_TIME(r4, 0x4024700a, &(0x7f0000000000)={0x0, 0x0, 0x0, 0xf, 0x0, 0xfd}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x9efef75f}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvlan={{0xc}, {0x4}}}, @IFLA_LINK={0x8}]}, 0x3c}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000001940)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000006c0)={&(0x7f0000001880)=@dellinkprop={0xb0, 0x6d, 0x20, 0x70bd28, 0x25dfdbff, {0x0, 0x0, 0x0, 0x0, 0x210, 0xc0018}, [@IFLA_TARGET_NETNSID={0x8, 0x2e, 0x2}, @IFLA_MASTER={0x8}, @IFLA_AF_SPEC={0x70, 0x1a, 0x0, 0x1, [@AF_MPLS={0x4}, @AF_MPLS={0x4}, @AF_INET6={0x28, 0xa, 0x0, 0x1, [@IFLA_INET6_ADDR_GEN_MODE={0x5, 0x8, 0x6b}, @IFLA_INET6_TOKEN={0x14, 0x7, @mcast2}, @IFLA_INET6_ADDR_GEN_MODE={0x5, 0x8, 0x7}]}, @AF_MPLS={0x4}, @AF_INET6={0x28, 0xa, 0x0, 0x1, [@IFLA_INET6_ADDR_GEN_MODE={0x5, 0x8, 0x8}, @IFLA_INET6_ADDR_GEN_MODE={0x5, 0x8, 0x56}, @IFLA_INET6_TOKEN={0x14, 0x7, @ipv4={'\x00', '\xff\xff', @local}}]}, @AF_MPLS={0x4}, @AF_INET6={0xc, 0xa, 0x0, 0x1, [@IFLA_INET6_ADDR_GEN_MODE={0x5, 0x8, 0x9}]}]}, @IFLA_IFALIASn={0x4}, @IFLA_PHYS_PORT_ID={0xb, 0x22, "3df17141c4e8d5"}]}, 0xb0}, 0x1, 0x0, 0x0, 0x4000001}, 0x84000) ptrace(0x10, r3) wait4(0x0, 0x0, 0x0, 0x0) 23:08:50 executing program 4: perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0xc7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x12, 0xf7, 0x4, 0x3}, 0x200000c0) 23:08:50 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x15, 0x0, 0x1, 0x0, 0x6, @multicast}, 0x14) clone(0x2000000082148180, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_STRSET_GET(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000640)={0x0, 0x1cc}, 0x1, 0x0, 0x0, 0x8800}, 0x20040040) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) request_key(0x0, &(0x7f0000001ffb)={'syz', 0x1}, 0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x1004) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0x3, 0x380, 0x188, 0xe0, 0xe0, 0xe0, 0x0, 0x2e8, 0x2e8, 0x2e8, 0x2e8, 0x2e8, 0x7fffffe, 0x0, {[{{@uncond, 0x0, 0x70, 0xe0, 0x0, {0x6020000}}, @common=@unspec=@NFLOG={0x70, 'NFLOG\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, "a4bcf0ebf5d09e8706580300b1000000124ac31d4fda375c7794e420aa63529ebcf847246a5e8846085b0a30510b266347a84ae5ffea89b8654e4400"}}}, {{@ip={@local, @multicast1, 0x0, 0x0, '\x00', 'wg1\x00'}, 0x0, 0x1c8, 0x208, 0x0, {}, [@common=@inet=@hashlimit3={{0x158}, {'bridge_slave_1\x00', {0x0, 0x8, 0x0, 0x0, 0x0, 0x7fff, 0x8}}}]}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "29f0be44329ad4d94a815c71ad95092b933b5e380a7e5d3c56c51e9d0027"}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x3e0) 23:08:50 executing program 3: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x15, 0x0, 0x1, 0x0, 0x6, @multicast}, 0x14) clone(0x2000000082148180, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_STRSET_GET(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000640)={&(0x7f00000006c0)=ANY=[@ANYBLOB="cccd30", @ANYRES16=0x0, @ANYBLOB="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", @ANYRES32=0x0, @ANYBLOB="1400020069703667726574617030000000000000140002006970366572f370616e20000000000000fa0ee59a22b338aeb6d3895b934764e9a674c87f74b9c35aaa183a9ea95194a3dc40d9b230a9f627acae68e5f0381078395e744b4197fe3dd12112adacad625f6ae8e22901a3dd5920796e7dc087d5033e12c9e4aea2026a5df4ee89adbeda48287c2840149cf27af2cc0f064680a7b5e90f480b201f70326baca201fea21a0100000000000000"], 0x1cc}, 0x1, 0x0, 0x0, 0x8800}, 0x20040040) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) request_key(0x0, &(0x7f0000001ffb)={'syz', 0x1}, 0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x1004) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0x3, 0x380, 0x0, 0xe0, 0xe0, 0xe0, 0x0, 0x2e8, 0x2e8, 0x2e8, 0x2e8, 0x2e8, 0x7fffffe, 0x0, {[{{@uncond, 0x0, 0x70, 0xe0, 0x0, {0x6020000}}, @common=@unspec=@NFLOG={0x70, 'NFLOG\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, "a4bcf0ebf5d09e8706000000b1000000124ac31d4fda375c7794e420aa63529ebcf847246a5e8846085b0a30510b266347a84ae5ffea89b8654e44038c00"}}}, {{@ip={@local, @multicast1, 0x0, 0x0, '\x00', 'wg1\x00'}, 0x0, 0x1c8, 0x208, 0x0, {}, [@common=@inet=@hashlimit3={{0x158}, {'bridge_slave_1\x00', {0x0, 0x8, 0x0, 0x0, 0x0, 0x7fff, 0x8}}}]}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "29f0be44329ad4d94a815c71ad95092b933b5e380a7e5d3c56c51e9d0027"}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x3e0) 23:08:50 executing program 4: perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0xc7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x14001, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, r0, 0x2, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0xda, 0xc5, 0xff, 0x5, 0x0, 0x9, 0x1121, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x8001, 0x1, @perf_config_ext={0x9, 0x9}, 0x2803, 0x8, 0x8, 0x8, 0x0, 0x1f, 0x81, 0x0, 0x3, 0x0, 0xaf}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x12, 0xf7, 0x4, 0x3}, 0x40) 23:08:50 executing program 4: perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0xc7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'bond0\x00', 0x0}) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x9efef75f}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvlan={{0xc}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r1}]}, 0x3c}}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x12, 0xf7, 0x4, 0x3, 0x0, 0xffffffffffffffff, 0x0, '\x00', r1}, 0x40) r3 = perf_event_open(&(0x7f00000006c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c44}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ID(r3, 0x80042407, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000100)={0x3, 0x80, 0x2, 0x80, 0x3, 0xfe, 0x0, 0xf55, 0xc1008, 0xb, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x2, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, @perf_config_ext={0x2, 0x40}, 0x41041, 0x400, 0x200, 0x5, 0x120, 0xfffffff7, 0x4, 0x0, 0x4, 0x0, 0xffffffffffffffff}, 0x0, 0xd, r3, 0x3) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000000c0)={0xffffffffffffffff, 0x10, &(0x7f0000000040)={&(0x7f0000000000)=""/1, 0x1}}, 0x10) [ 2155.734034] device bond_slave_0 entered promiscuous mode [ 2155.739651] device bond_slave_1 entered promiscuous mode [ 2155.754528] device macvlan2 entered promiscuous mode [ 2155.760733] device bond0 entered promiscuous mode [ 2155.776619] 8021q: adding VLAN 0 to HW filter on device macvlan2 23:08:51 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x15, 0x0, 0x1, 0x0, 0x6, @multicast}, 0x14) clone(0x2000000082148180, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_STRSET_GET(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000640)={0x0, 0x1cc}, 0x1, 0x0, 0x0, 0x8800}, 0x20040040) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) request_key(0x0, &(0x7f0000001ffb)={'syz', 0x1}, 0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x1004) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0x3, 0x380, 0x1dc, 0xe0, 0xe0, 0xe0, 0x0, 0x2e8, 0x2e8, 0x2e8, 0x2e8, 0x2e8, 0x7fffffe, 0x0, {[{{@uncond, 0x0, 0x70, 0xe0, 0x0, {0x6020000}}, @common=@unspec=@NFLOG={0x70, 'NFLOG\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, "a4bcf0ebf5d09e8706580300b1000000124ac31d4fda375c7794e420aa63529ebcf847246a5e8846085b0a30510b266347a84ae5ffea89b8654e4400"}}}, {{@ip={@local, @multicast1, 0x0, 0x0, '\x00', 'wg1\x00'}, 0x0, 0x1c8, 0x208, 0x0, {}, [@common=@inet=@hashlimit3={{0x158}, {'bridge_slave_1\x00', {0x0, 0x8, 0x0, 0x0, 0x0, 0x7fff, 0x8}}}]}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "29f0be44329ad4d94a815c71ad95092b933b5e380a7e5d3c56c51e9d0027"}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x3e0) [ 2155.802190] device macvlan3 entered promiscuous mode [ 2155.810405] 8021q: adding VLAN 0 to HW filter on device macvlan3 23:08:51 executing program 4: recvmmsg(0xffffffffffffffff, &(0x7f0000001740)=[{{&(0x7f0000000000)=@un=@abs, 0x80, 0xffffffffffffffff}, 0x1}, {{&(0x7f00000000c0)=@alg, 0x80, &(0x7f0000000380)=[{&(0x7f0000000140)=""/41, 0x29}, {&(0x7f0000000180)=""/44, 0x2c}, {&(0x7f0000000280)=""/242, 0xf2}, {&(0x7f00000001c0)=""/14, 0xe}], 0x4, &(0x7f00000003c0)=""/28, 0x1c}, 0xa0c}, {{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000400)=""/150, 0x96}], 0x1}, 0x40}, {{&(0x7f0000000500)=@nl=@proc, 0x80, &(0x7f0000001700)=[{&(0x7f0000000580)=""/245, 0xf5}, {&(0x7f0000000680)=""/108, 0x6c}, {&(0x7f0000000700)=""/4096, 0x1000}], 0x3}, 0x928}], 0x4, 0x10000, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0xc7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x12, 0xf7, 0x4, 0x3}, 0x40) 23:08:53 executing program 2: r0 = getpgrp(0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x24000000) r1 = gettid() perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000080), 0x30200, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) unshare(0x4000000) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, r3, 0x0) preadv(0xffffffffffffffff, &(0x7f00000002c0)=[{&(0x7f00000001c0)=""/251, 0xfb}], 0x1, 0x0, 0x0) bpf$ITER_CREATE(0x21, &(0x7f0000000100)={r2}, 0x9) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x26, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = perf_event_open(&(0x7f00000006c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c44}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ID(r4, 0x80042407, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000140)={0x1, 0x80, 0x0, 0x7, 0x0, 0xff, 0x0, 0x2, 0x0, 0xe, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x400, 0x1, @perf_bp={&(0x7f00000000c0), 0x8}, 0x18000, 0x8000, 0xfffffffc, 0x1, 0x1000000000, 0x8, 0x3, 0x0, 0x8, 0x0, 0x9}, r1, 0x2, r4, 0x2) clone(0x6cb2e100, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r1) wait4(0x0, 0x0, 0x0, 0x0) 23:08:53 executing program 3: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x15, 0x0, 0x1, 0x0, 0x6, @multicast}, 0x14) clone(0x2000000082148180, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_STRSET_GET(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000640)={&(0x7f00000006c0)=ANY=[@ANYBLOB="cccd30", @ANYRES16=0x0, @ANYBLOB="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", @ANYRES32=0x0, @ANYBLOB="1400020069703667726574617030000000000000140002006970366572f370616e20000000000000fa0ee59a22b338aeb6d3895b934764e9a674c87f74b9c35aaa183a9ea95194a3dc40d9b230a9f627acae68e5f0381078395e744b4197fe3dd12112adacad625f6ae8e22901a3dd5920796e7dc087d5033e12c9e4aea2026a5df4ee89adbeda48287c2840149cf27af2cc0f064680a7b5e90f480b201f70326baca201fea21a0100000000000000"], 0x1cc}, 0x1, 0x0, 0x0, 0x8800}, 0x20040040) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) request_key(0x0, &(0x7f0000001ffb)={'syz', 0x1}, 0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x1004) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0x3, 0x380, 0x0, 0xe0, 0xe0, 0xe0, 0x0, 0x2e8, 0x2e8, 0x2e8, 0x2e8, 0x2e8, 0x7fffffe, 0x0, {[{{@uncond, 0x0, 0x70, 0xe0, 0x0, {0x6020000}}, @common=@unspec=@NFLOG={0x70, 'NFLOG\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, "a4bcf0ebf5d09e8706000000b1000000124ac31d4fda375c7794e420aa63529ebcf847246a5e8846085b0a30510b266347a84ae5ffea89b8654e44038e00"}}}, {{@ip={@local, @multicast1, 0x0, 0x0, '\x00', 'wg1\x00'}, 0x0, 0x1c8, 0x208, 0x0, {}, [@common=@inet=@hashlimit3={{0x158}, {'bridge_slave_1\x00', {0x0, 0x8, 0x0, 0x0, 0x0, 0x7fff, 0x8}}}]}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "29f0be44329ad4d94a815c71ad95092b933b5e380a7e5d3c56c51e9d0027"}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x3e0) 23:08:53 executing program 0: r0 = getpgrp(0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x24000000) r1 = gettid() perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000080), 0x30200, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) unshare(0x4000000) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, r3, 0x0) preadv(0xffffffffffffffff, &(0x7f00000002c0)=[{&(0x7f00000001c0)=""/251, 0xfb}], 0x1, 0x0, 0x0) bpf$ITER_CREATE(0x21, &(0x7f0000000100)={r2}, 0x9) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x26, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = perf_event_open(&(0x7f00000006c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c44}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ID(r4, 0x80042407, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000140)={0x1, 0x80, 0x0, 0x7, 0x0, 0xff, 0x0, 0x2, 0x0, 0xe, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x400, 0x1, @perf_bp={&(0x7f00000000c0), 0x8}, 0x18000, 0x8000, 0xfffffffc, 0x1, 0x1000000000, 0x8, 0x3, 0x0, 0x8, 0x0, 0x9}, r1, 0x2, r4, 0x2) clone(0x6cb2e100, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r1) wait4(0x0, 0x0, 0x0, 0x0) 23:08:53 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x15, 0x0, 0x1, 0x0, 0x6, @multicast}, 0x14) clone(0x2000000082148180, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_STRSET_GET(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000640)={0x0, 0x1cc}, 0x1, 0x0, 0x0, 0x8800}, 0x20040040) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) request_key(0x0, &(0x7f0000001ffb)={'syz', 0x1}, 0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x1004) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0x3, 0x380, 0x22f, 0xe0, 0xe0, 0xe0, 0x0, 0x2e8, 0x2e8, 0x2e8, 0x2e8, 0x2e8, 0x7fffffe, 0x0, {[{{@uncond, 0x0, 0x70, 0xe0, 0x0, {0x6020000}}, @common=@unspec=@NFLOG={0x70, 'NFLOG\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, "a4bcf0ebf5d09e8706580300b1000000124ac31d4fda375c7794e420aa63529ebcf847246a5e8846085b0a30510b266347a84ae5ffea89b8654e4400"}}}, {{@ip={@local, @multicast1, 0x0, 0x0, '\x00', 'wg1\x00'}, 0x0, 0x1c8, 0x208, 0x0, {}, [@common=@inet=@hashlimit3={{0x158}, {'bridge_slave_1\x00', {0x0, 0x8, 0x0, 0x0, 0x0, 0x7fff, 0x8}}}]}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "29f0be44329ad4d94a815c71ad95092b933b5e380a7e5d3c56c51e9d0027"}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x3e0) 23:08:53 executing program 1: ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000001c0)={'team0\x00', 0x0}) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000680)={0xffffffffffffffff, 0x10, &(0x7f0000000640)={&(0x7f0000000780)=""/4096, 0x1000, 0x0}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000001780)={0x8, 0x7, &(0x7f0000001800)=ANY=[@ANYBLOB="180000009d57000000000000060000001832000005000000000000000000000495000000000000005c150400010000009500000000434e0dae2ef63aab6acde18cddf77c67000000"], &(0x7f0000000180)='GPL\x00', 0x2, 0x0, 0x0, 0x41100, 0xd, '\x00', r0, 0x1d, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x6, 0x5}, 0x8, 0x10, &(0x7f0000000600)={0x5, 0x0, 0x0, 0x10001}, 0x10, r1}, 0x78) r2 = getpgrp(0x0) prctl$PR_SET_PTRACER(0x59616d61, r2) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x24000000) r3 = gettid() perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x2100, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x4}, 0x0, 0x8}, 0x0, 0x8, 0xffffffffffffffff, 0x9) clone(0x6cb2e100, 0x0, 0x0, 0x0, 0x0) r4 = openat$rtc(0xffffffffffffff9c, &(0x7f00000168c0), 0x0, 0x0) ioctl$RTC_UIE_ON(r4, 0x7003) clone(0x59040000, &(0x7f0000000200)="32b026bb2bd5ab05345d05868d1008feb1352fb452659a55b2c8650d5c3b8d9896f83163af0908ddf225ca94e880899df94150b94cce61a62255c2da294ef09dd6df955a8b10081fc4491edeff6bdea1f408c84f564a1702f2429d4ed091a3ef6bb7002cdeb2cb9790f44b23c402166d7ced3ecafcbc5a046b763517bf35421cba1dc4f3b4a67d3882fcad4bd680d79d963ee7d31048c06d6a09d69830d36d80e15be2156e695858a0937e49a60e4623fca37ffd32972d2555bb01a4c5c57e4e6c39ec93e0887c3ed39a172ca646bc8514bdb64ddceb12d7d09546d0c5d8c9fe33f4296409029503d314e0", &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="99d1c32534d9de00af8729fa460ec9d5628744ffe3cb327edbe5d45fed028bf303c434286297cbfe9f121b1bc94969fa74f64c4cb8a1d40cadfe5d1afe1911de07770c57e37c225c0843887e02f6881c533230e4a3d43275e9cd079068012291e77d44bf1f4398518c9d64ae643b1ebff18fb2d4d632098a07dd40847a76374a4a01df2f34c001369ba9b86499548cbb8ce4cda4ae5179f35c9feb4de592a550f357f89d1660d711fac0e2a8") ioctl$RTC_SET_TIME(r4, 0x4024700a, &(0x7f0000000000)={0x0, 0x0, 0x0, 0xf, 0x0, 0xfd}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x9efef75f}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvlan={{0xc}, {0x4}}}, @IFLA_LINK={0x8}]}, 0x3c}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000001940)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000006c0)={&(0x7f0000001880)=@dellinkprop={0xb0, 0x6d, 0x20, 0x70bd28, 0x25dfdbff, {0x0, 0x0, 0x0, 0x0, 0x210, 0xc0018}, [@IFLA_TARGET_NETNSID={0x8, 0x2e, 0x2}, @IFLA_MASTER={0x8}, @IFLA_AF_SPEC={0x70, 0x1a, 0x0, 0x1, [@AF_MPLS={0x4}, @AF_MPLS={0x4}, @AF_INET6={0x28, 0xa, 0x0, 0x1, [@IFLA_INET6_ADDR_GEN_MODE={0x5, 0x8, 0x6b}, @IFLA_INET6_TOKEN={0x14, 0x7, @mcast2}, @IFLA_INET6_ADDR_GEN_MODE={0x5, 0x8, 0x7}]}, @AF_MPLS={0x4}, @AF_INET6={0x28, 0xa, 0x0, 0x1, [@IFLA_INET6_ADDR_GEN_MODE={0x5, 0x8, 0x8}, @IFLA_INET6_ADDR_GEN_MODE={0x5, 0x8, 0x56}, @IFLA_INET6_TOKEN={0x14, 0x7, @ipv4={'\x00', '\xff\xff', @local}}]}, @AF_MPLS={0x4}, @AF_INET6={0xc, 0xa, 0x0, 0x1, [@IFLA_INET6_ADDR_GEN_MODE={0x5, 0x8, 0x9}]}]}, @IFLA_IFALIASn={0x4}, @IFLA_PHYS_PORT_ID={0xb, 0x22, "3df17141c4e8d5"}]}, 0xb0}, 0x1, 0x0, 0x0, 0x4000001}, 0x84000) ptrace(0x10, r3) wait4(0x0, 0x0, 0x0, 0x0) 23:08:53 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x12, 0xf7, 0x4, 0x3}, 0x40) 23:08:53 executing program 3: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x15, 0x0, 0x1, 0x0, 0x6, @multicast}, 0x14) clone(0x2000000082148180, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_STRSET_GET(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000640)={&(0x7f00000006c0)=ANY=[@ANYBLOB="cccd30", @ANYRES16=0x0, @ANYBLOB="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", @ANYRES32=0x0, @ANYBLOB="1400020069703667726574617030000000000000140002006970366572f370616e20000000000000fa0ee59a22b338aeb6d3895b934764e9a674c87f74b9c35aaa183a9ea95194a3dc40d9b230a9f627acae68e5f0381078395e744b4197fe3dd12112adacad625f6ae8e22901a3dd5920796e7dc087d5033e12c9e4aea2026a5df4ee89adbeda48287c2840149cf27af2cc0f064680a7b5e90f480b201f70326baca201fea21a0100000000000000"], 0x1cc}, 0x1, 0x0, 0x0, 0x8800}, 0x20040040) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) request_key(0x0, &(0x7f0000001ffb)={'syz', 0x1}, 0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x1004) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0x3, 0x380, 0x0, 0xe0, 0xe0, 0xe0, 0x0, 0x2e8, 0x2e8, 0x2e8, 0x2e8, 0x2e8, 0x7fffffe, 0x0, {[{{@uncond, 0x0, 0x70, 0xe0, 0x0, {0x6020000}}, @common=@unspec=@NFLOG={0x70, 'NFLOG\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, "a4bcf0ebf5d09e8706000000b1000000124ac31d4fda375c7794e420aa63529ebcf847246a5e8846085b0a30510b266347a84ae5ffea89b8654e44029100"}}}, {{@ip={@local, @multicast1, 0x0, 0x0, '\x00', 'wg1\x00'}, 0x0, 0x1c8, 0x208, 0x0, {}, [@common=@inet=@hashlimit3={{0x158}, {'bridge_slave_1\x00', {0x0, 0x8, 0x0, 0x0, 0x0, 0x7fff, 0x8}}}]}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "29f0be44329ad4d94a815c71ad95092b933b5e380a7e5d3c56c51e9d0027"}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x3e0) 23:08:53 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x15, 0x0, 0x1, 0x0, 0x6, @multicast}, 0x14) clone(0x2000000082148180, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_STRSET_GET(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000640)={0x0, 0x1cc}, 0x1, 0x0, 0x0, 0x8800}, 0x20040040) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) request_key(0x0, &(0x7f0000001ffb)={'syz', 0x1}, 0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x1004) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0x3, 0x380, 0x2b4, 0xe0, 0xe0, 0xe0, 0x0, 0x2e8, 0x2e8, 0x2e8, 0x2e8, 0x2e8, 0x7fffffe, 0x0, {[{{@uncond, 0x0, 0x70, 0xe0, 0x0, {0x6020000}}, @common=@unspec=@NFLOG={0x70, 'NFLOG\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, "a4bcf0ebf5d09e8706580300b1000000124ac31d4fda375c7794e420aa63529ebcf847246a5e8846085b0a30510b266347a84ae5ffea89b8654e4400"}}}, {{@ip={@local, @multicast1, 0x0, 0x0, '\x00', 'wg1\x00'}, 0x0, 0x1c8, 0x208, 0x0, {}, [@common=@inet=@hashlimit3={{0x158}, {'bridge_slave_1\x00', {0x0, 0x8, 0x0, 0x0, 0x0, 0x7fff, 0x8}}}]}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "29f0be44329ad4d94a815c71ad95092b933b5e380a7e5d3c56c51e9d0027"}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x3e0) 23:08:53 executing program 3: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x15, 0x0, 0x1, 0x0, 0x6, @multicast}, 0x14) clone(0x2000000082148180, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_STRSET_GET(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000640)={&(0x7f00000006c0)=ANY=[@ANYBLOB="cccd30", @ANYRES16=0x0, @ANYBLOB="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", @ANYRES32=0x0, @ANYBLOB="1400020069703667726574617030000000000000140002006970366572f370616e20000000000000fa0ee59a22b338aeb6d3895b934764e9a674c87f74b9c35aaa183a9ea95194a3dc40d9b230a9f627acae68e5f0381078395e744b4197fe3dd12112adacad625f6ae8e22901a3dd5920796e7dc087d5033e12c9e4aea2026a5df4ee89adbeda48287c2840149cf27af2cc0f064680a7b5e90f480b201f70326baca201fea21a0100000000000000"], 0x1cc}, 0x1, 0x0, 0x0, 0x8800}, 0x20040040) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) request_key(0x0, &(0x7f0000001ffb)={'syz', 0x1}, 0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x1004) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0x3, 0x380, 0x0, 0xe0, 0xe0, 0xe0, 0x0, 0x2e8, 0x2e8, 0x2e8, 0x2e8, 0x2e8, 0x7fffffe, 0x0, {[{{@uncond, 0x0, 0x70, 0xe0, 0x0, {0x6020000}}, @common=@unspec=@NFLOG={0x70, 'NFLOG\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, "a4bcf0ebf5d09e8706000000b1000000124ac31d4fda375c7794e420aa63529ebcf847246a5e8846085b0a30510b266347a84ae5ffea89b8654e44039b00"}}}, {{@ip={@local, @multicast1, 0x0, 0x0, '\x00', 'wg1\x00'}, 0x0, 0x1c8, 0x208, 0x0, {}, [@common=@inet=@hashlimit3={{0x158}, {'bridge_slave_1\x00', {0x0, 0x8, 0x0, 0x0, 0x0, 0x7fff, 0x8}}}]}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "29f0be44329ad4d94a815c71ad95092b933b5e380a7e5d3c56c51e9d0027"}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x3e0) 23:08:53 executing program 4: perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0xc7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'bond0\x00', 0x0}) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x9efef75f}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvlan={{0xc}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r1}]}, 0x3c}}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x12, 0xf7, 0x4, 0x3, 0x0, 0xffffffffffffffff, 0x0, '\x00', r1}, 0x40) 23:08:53 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x15, 0x0, 0x1, 0x0, 0x6, @multicast}, 0x14) clone(0x2000000082148180, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_STRSET_GET(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000640)={0x0, 0x1cc}, 0x1, 0x0, 0x0, 0x8800}, 0x20040040) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) request_key(0x0, &(0x7f0000001ffb)={'syz', 0x1}, 0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x1004) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0x3, 0x380, 0x2bc, 0xe0, 0xe0, 0xe0, 0x0, 0x2e8, 0x2e8, 0x2e8, 0x2e8, 0x2e8, 0x7fffffe, 0x0, {[{{@uncond, 0x0, 0x70, 0xe0, 0x0, {0x6020000}}, @common=@unspec=@NFLOG={0x70, 'NFLOG\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, "a4bcf0ebf5d09e8706580300b1000000124ac31d4fda375c7794e420aa63529ebcf847246a5e8846085b0a30510b266347a84ae5ffea89b8654e4400"}}}, {{@ip={@local, @multicast1, 0x0, 0x0, '\x00', 'wg1\x00'}, 0x0, 0x1c8, 0x208, 0x0, {}, [@common=@inet=@hashlimit3={{0x158}, {'bridge_slave_1\x00', {0x0, 0x8, 0x0, 0x0, 0x0, 0x7fff, 0x8}}}]}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "29f0be44329ad4d94a815c71ad95092b933b5e380a7e5d3c56c51e9d0027"}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x3e0) 23:08:53 executing program 3: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x15, 0x0, 0x1, 0x0, 0x6, @multicast}, 0x14) clone(0x2000000082148180, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_STRSET_GET(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000640)={&(0x7f00000006c0)=ANY=[@ANYBLOB="cccd30", @ANYRES16=0x0, @ANYBLOB="02002abd7000fbdbdf250100000004000300800102800c00018008000100070000002400018008000100070000000800010008000000080001000100000008000100060000001c0001800800010005000000080001000200000008000100000000002c000180080001000600000008000100070000000800010003000000080001000600000008000100000000005400018008000100060000000800010001000000080001000400000008000100000000000800010000000000080001000000000008000100000000000800010008000000080001000300000008000100020000001c0001800800010008000000080001000100000008000100050000001c0001800800010004000000080001000400000008000100010000002c000180080001000000000008000100040000000800010007000000080001000700000008000100080000004c0001800800010002000000080001000200000008000100050000000800010003000000080001000400000008000100040000000800010000000000080001000400000008000100030000003400018008000100", @ANYRES32=0x0, @ANYBLOB="1400020069703667726574617030000000000000140002006970366572f370616e20000000000000fa0ee59a22b338aeb6d3895b934764e9a674c87f74b9c35aaa183a9ea95194a3dc40d9b230a9f627acae68e5f0381078395e744b4197fe3dd12112adacad625f6ae8e22901a3dd5920796e7dc087d5033e12c9e4aea2026a5df4ee89adbeda48287c2840149cf27af2cc0f064680a7b5e90f480b201f70326baca201fea21a0100000000000000"], 0x1cc}, 0x1, 0x0, 0x0, 0x8800}, 0x20040040) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) request_key(0x0, &(0x7f0000001ffb)={'syz', 0x1}, 0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x1004) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0x3, 0x380, 0x0, 0xe0, 0xe0, 0xe0, 0x0, 0x2e8, 0x2e8, 0x2e8, 0x2e8, 0x2e8, 0x7fffffe, 0x0, {[{{@uncond, 0x0, 0x70, 0xe0, 0x0, {0x6020000}}, @common=@unspec=@NFLOG={0x70, 'NFLOG\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, "a4bcf0ebf5d09e8706000000b1000000124ac31d4fda375c7794e420aa63529ebcf847246a5e8846085b0a30510b266347a84ae5ffea89b8654e4400a000"}}}, {{@ip={@local, @multicast1, 0x0, 0x0, '\x00', 'wg1\x00'}, 0x0, 0x1c8, 0x208, 0x0, {}, [@common=@inet=@hashlimit3={{0x158}, {'bridge_slave_1\x00', {0x0, 0x8, 0x0, 0x0, 0x0, 0x7fff, 0x8}}}]}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "29f0be44329ad4d94a815c71ad95092b933b5e380a7e5d3c56c51e9d0027"}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x3e0) [ 2158.533177] device macvlan4 entered promiscuous mode [ 2158.541736] 8021q: adding VLAN 0 to HW filter on device macvlan4 [ 2158.573327] device macvlan5 entered promiscuous mode [ 2158.581413] 8021q: adding VLAN 0 to HW filter on device macvlan5 23:08:56 executing program 2: r0 = getpgrp(0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x24000000) r1 = gettid() perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000080), 0x30200, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) unshare(0x4000000) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, r3, 0x0) preadv(0xffffffffffffffff, &(0x7f00000002c0)=[{&(0x7f00000001c0)=""/251, 0xfb}], 0x1, 0x0, 0x0) bpf$ITER_CREATE(0x21, &(0x7f0000000100)={r2}, 0x9) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x26, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = perf_event_open(&(0x7f00000006c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c44}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ID(r4, 0x80042407, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000140)={0x1, 0x80, 0x0, 0x7, 0x0, 0xff, 0x0, 0x2, 0x0, 0xe, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x400, 0x1, @perf_bp={&(0x7f00000000c0), 0x8}, 0x18000, 0x8000, 0xfffffffc, 0x1, 0x1000000000, 0x8, 0x3, 0x0, 0x8, 0x0, 0x9}, r1, 0x2, r4, 0x2) clone(0x6cb2e100, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r1) wait4(0x0, 0x0, 0x0, 0x0) 23:08:56 executing program 4: perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0xc7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x12, 0xf7, 0x4, 0x3}, 0x40) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/consoles\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x1) 23:08:56 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x15, 0x0, 0x1, 0x0, 0x6, @multicast}, 0x14) clone(0x2000000082148180, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_STRSET_GET(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000640)={0x0, 0x1cc}, 0x1, 0x0, 0x0, 0x8800}, 0x20040040) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) request_key(0x0, &(0x7f0000001ffb)={'syz', 0x1}, 0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x1004) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0x3, 0x380, 0x178, 0xe0, 0xe0, 0xe0, 0x0, 0x2e8, 0x2e8, 0x2e8, 0x2e8, 0x2e8, 0x7fffffe, 0x0, {[{{@uncond, 0x0, 0x70, 0xe0, 0x0, {0x6020000}}, @common=@unspec=@NFLOG={0x70, 'NFLOG\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, "a4bcf0ebf5d09e8706580300b1000000124ac31d4fda375c7794e420aa63529ebcf847246a5e8846085b0a30510b266347a84ae5ffea89b8654e4400"}}}, {{@ip={@local, @multicast1, 0x0, 0x0, '\x00', 'wg1\x00'}, 0x0, 0x1c8, 0x208, 0x0, {}, [@common=@inet=@hashlimit3={{0x158}, {'bridge_slave_1\x00', {0x0, 0x8, 0x0, 0x0, 0x0, 0x7fff, 0x8}}}]}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "29f0be44329ad4d94a815c71ad95092b933b5e380a7e5d3c56c51e9d0027"}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x3e0) 23:08:56 executing program 3: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x15, 0x0, 0x1, 0x0, 0x6, @multicast}, 0x14) clone(0x2000000082148180, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_STRSET_GET(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000640)={&(0x7f00000006c0)=ANY=[@ANYBLOB="cccd30", @ANYRES16=0x0, @ANYBLOB="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", @ANYRES32=0x0, @ANYBLOB="1400020069703667726574617030000000000000140002006970366572f370616e20000000000000fa0ee59a22b338aeb6d3895b934764e9a674c87f74b9c35aaa183a9ea95194a3dc40d9b230a9f627acae68e5f0381078395e744b4197fe3dd12112adacad625f6ae8e22901a3dd5920796e7dc087d5033e12c9e4aea2026a5df4ee89adbeda48287c2840149cf27af2cc0f064680a7b5e90f480b201f70326baca201fea21a0100000000000000"], 0x1cc}, 0x1, 0x0, 0x0, 0x8800}, 0x20040040) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) request_key(0x0, &(0x7f0000001ffb)={'syz', 0x1}, 0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x1004) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0x3, 0x380, 0x0, 0xe0, 0xe0, 0xe0, 0x0, 0x2e8, 0x2e8, 0x2e8, 0x2e8, 0x2e8, 0x7fffffe, 0x0, {[{{@uncond, 0x0, 0x70, 0xe0, 0x0, {0x6020000}}, @common=@unspec=@NFLOG={0x70, 'NFLOG\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, "a4bcf0ebf5d09e8706000000b1000000124ac31d4fda375c7794e420aa63529ebcf847246a5e8846085b0a30510b266347a84ae5ffea89b8654e4401a000"}}}, {{@ip={@local, @multicast1, 0x0, 0x0, '\x00', 'wg1\x00'}, 0x0, 0x1c8, 0x208, 0x0, {}, [@common=@inet=@hashlimit3={{0x158}, {'bridge_slave_1\x00', {0x0, 0x8, 0x0, 0x0, 0x0, 0x7fff, 0x8}}}]}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "29f0be44329ad4d94a815c71ad95092b933b5e380a7e5d3c56c51e9d0027"}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x3e0) 23:08:56 executing program 1: ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000001c0)={'team0\x00', 0x0}) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000680)={0xffffffffffffffff, 0x10, &(0x7f0000000640)={&(0x7f0000000780)=""/4096, 0x1000, 0x0}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000001780)={0x8, 0x7, &(0x7f0000001800)=ANY=[@ANYBLOB="180000009d57000000000000060000001832000005000000000000000000000495000000000000005c150400010000009500000000434e0dae2ef63aab6acde18cddf77c67000000"], &(0x7f0000000180)='GPL\x00', 0x2, 0x0, 0x0, 0x41100, 0xd, '\x00', r0, 0x1d, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x6, 0x5}, 0x8, 0x10, &(0x7f0000000600)={0x5, 0x0, 0x0, 0x10001}, 0x10, r1}, 0x78) r2 = getpgrp(0x0) prctl$PR_SET_PTRACER(0x59616d61, r2) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x24000000) r3 = gettid() perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x2100, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x4}, 0x0, 0x8}, 0x0, 0x8, 0xffffffffffffffff, 0x9) clone(0x6cb2e100, 0x0, 0x0, 0x0, 0x0) r4 = openat$rtc(0xffffffffffffff9c, &(0x7f00000168c0), 0x0, 0x0) ioctl$RTC_UIE_ON(r4, 0x7003) clone(0x59040000, &(0x7f0000000200)="32b026bb2bd5ab05345d05868d1008feb1352fb452659a55b2c8650d5c3b8d9896f83163af0908ddf225ca94e880899df94150b94cce61a62255c2da294ef09dd6df955a8b10081fc4491edeff6bdea1f408c84f564a1702f2429d4ed091a3ef6bb7002cdeb2cb9790f44b23c402166d7ced3ecafcbc5a046b763517bf35421cba1dc4f3b4a67d3882fcad4bd680d79d963ee7d31048c06d6a09d69830d36d80e15be2156e695858a0937e49a60e4623fca37ffd32972d2555bb01a4c5c57e4e6c39ec93e0887c3ed39a172ca646bc8514bdb64ddceb12d7d09546d0c5d8c9fe33f4296409029503d314e0", &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="99d1c32534d9de00af8729fa460ec9d5628744ffe3cb327edbe5d45fed028bf303c434286297cbfe9f121b1bc94969fa74f64c4cb8a1d40cadfe5d1afe1911de07770c57e37c225c0843887e02f6881c533230e4a3d43275e9cd079068012291e77d44bf1f4398518c9d64ae643b1ebff18fb2d4d632098a07dd40847a76374a4a01df2f34c001369ba9b86499548cbb8ce4cda4ae5179f35c9feb4de592a550f357f89d1660d711fac0e2a8") ioctl$RTC_SET_TIME(r4, 0x4024700a, &(0x7f0000000000)={0x0, 0x0, 0x0, 0xf, 0x0, 0xfd}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x9efef75f}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvlan={{0xc}, {0x4}}}, @IFLA_LINK={0x8}]}, 0x3c}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000001940)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000006c0)={&(0x7f0000001880)=@dellinkprop={0xb0, 0x6d, 0x20, 0x70bd28, 0x25dfdbff, {0x0, 0x0, 0x0, 0x0, 0x210, 0xc0018}, [@IFLA_TARGET_NETNSID={0x8, 0x2e, 0x2}, @IFLA_MASTER={0x8}, @IFLA_AF_SPEC={0x70, 0x1a, 0x0, 0x1, [@AF_MPLS={0x4}, @AF_MPLS={0x4}, @AF_INET6={0x28, 0xa, 0x0, 0x1, [@IFLA_INET6_ADDR_GEN_MODE={0x5, 0x8, 0x6b}, @IFLA_INET6_TOKEN={0x14, 0x7, @mcast2}, @IFLA_INET6_ADDR_GEN_MODE={0x5, 0x8, 0x7}]}, @AF_MPLS={0x4}, @AF_INET6={0x28, 0xa, 0x0, 0x1, [@IFLA_INET6_ADDR_GEN_MODE={0x5, 0x8, 0x8}, @IFLA_INET6_ADDR_GEN_MODE={0x5, 0x8, 0x56}, @IFLA_INET6_TOKEN={0x14, 0x7, @ipv4={'\x00', '\xff\xff', @local}}]}, @AF_MPLS={0x4}, @AF_INET6={0xc, 0xa, 0x0, 0x1, [@IFLA_INET6_ADDR_GEN_MODE={0x5, 0x8, 0x9}]}]}, @IFLA_IFALIASn={0x4}, @IFLA_PHYS_PORT_ID={0xb, 0x22, "3df17141c4e8d5"}]}, 0xb0}, 0x1, 0x0, 0x0, 0x4000001}, 0x84000) ptrace(0x10, r3) wait4(0x0, 0x0, 0x0, 0x0) 23:08:56 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x15, 0x0, 0x1, 0x0, 0x6, @multicast}, 0x14) clone(0x2000000082148180, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_STRSET_GET(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000640)={0x0, 0x1cc}, 0x1, 0x0, 0x0, 0x8800}, 0x20040040) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) request_key(0x0, &(0x7f0000001ffb)={'syz', 0x1}, 0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x1004) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0x3, 0x380, 0x2cb, 0xe0, 0xe0, 0xe0, 0x0, 0x2e8, 0x2e8, 0x2e8, 0x2e8, 0x2e8, 0x7fffffe, 0x0, {[{{@uncond, 0x0, 0x70, 0xe0, 0x0, {0x6020000}}, @common=@unspec=@NFLOG={0x70, 'NFLOG\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, "a4bcf0ebf5d09e8706580300b1000000124ac31d4fda375c7794e420aa63529ebcf847246a5e8846085b0a30510b266347a84ae5ffea89b8654e4400"}}}, {{@ip={@local, @multicast1, 0x0, 0x0, '\x00', 'wg1\x00'}, 0x0, 0x1c8, 0x208, 0x0, {}, [@common=@inet=@hashlimit3={{0x158}, {'bridge_slave_1\x00', {0x0, 0x8, 0x0, 0x0, 0x0, 0x7fff, 0x8}}}]}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "29f0be44329ad4d94a815c71ad95092b933b5e380a7e5d3c56c51e9d0027"}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x3e0) 23:08:56 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x12, 0xf7, 0x4, 0x3}, 0x40) 23:08:56 executing program 0: r0 = getpgrp(0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x24000000) r1 = gettid() perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000080), 0x30200, 0x0) r3 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) unshare(0x4000000) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r3, 0x0) preadv(0xffffffffffffffff, &(0x7f00000002c0)=[{&(0x7f00000001c0)=""/251, 0xfb}], 0x1, 0xda3, 0x0) bpf$ITER_CREATE(0x21, &(0x7f0000000100)={r2}, 0x9) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x26, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = perf_event_open(&(0x7f00000006c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c44}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ID(r4, 0x80042407, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000140)={0x1, 0x80, 0x1, 0x7, 0x6, 0xff, 0x0, 0x2, 0x80200, 0xe, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x400, 0x1, @perf_bp={&(0x7f00000000c0), 0x8}, 0x18000, 0x8000, 0xfffffffc, 0x1, 0x1000000000, 0x8, 0x3, 0x0, 0x8, 0x0, 0x9}, r1, 0x2, r4, 0x2) clone(0x6cb2e100, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r1) wait4(0x0, 0x0, 0x0, 0x0) 23:08:56 executing program 3: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x15, 0x0, 0x1, 0x0, 0x6, @multicast}, 0x14) clone(0x2000000082148180, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_STRSET_GET(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000640)={&(0x7f00000006c0)=ANY=[@ANYBLOB="cccd30", @ANYRES16=0x0, @ANYBLOB="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", @ANYRES32=0x0, @ANYBLOB="1400020069703667726574617030000000000000140002006970366572f370616e20000000000000fa0ee59a22b338aeb6d3895b934764e9a674c87f74b9c35aaa183a9ea95194a3dc40d9b230a9f627acae68e5f0381078395e744b4197fe3dd12112adacad625f6ae8e22901a3dd5920796e7dc087d5033e12c9e4aea2026a5df4ee89adbeda48287c2840149cf27af2cc0f064680a7b5e90f480b201f70326baca201fea21a0100000000000000"], 0x1cc}, 0x1, 0x0, 0x0, 0x8800}, 0x20040040) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) request_key(0x0, &(0x7f0000001ffb)={'syz', 0x1}, 0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x1004) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0x3, 0x380, 0x0, 0xe0, 0xe0, 0xe0, 0x0, 0x2e8, 0x2e8, 0x2e8, 0x2e8, 0x2e8, 0x7fffffe, 0x0, {[{{@uncond, 0x0, 0x70, 0xe0, 0x0, {0x6020000}}, @common=@unspec=@NFLOG={0x70, 'NFLOG\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, "a4bcf0ebf5d09e8706000000b1000000124ac31d4fda375c7794e420aa63529ebcf847246a5e8846085b0a30510b266347a84ae5ffea89b8654e4402aa00"}}}, {{@ip={@local, @multicast1, 0x0, 0x0, '\x00', 'wg1\x00'}, 0x0, 0x1c8, 0x208, 0x0, {}, [@common=@inet=@hashlimit3={{0x158}, {'bridge_slave_1\x00', {0x0, 0x8, 0x0, 0x0, 0x0, 0x7fff, 0x8}}}]}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "29f0be44329ad4d94a815c71ad95092b933b5e380a7e5d3c56c51e9d0027"}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x3e0) 23:08:56 executing program 4: r0 = perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0xc7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000000)={0x3, 0x80, 0x4, 0xf6, 0xff, 0x3d, 0x0, 0x20, 0x1200, 0x2, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x9, 0x4, @perf_config_ext={0xa31b}, 0x1060, 0x5, 0x4, 0x9, 0x4ea2, 0x2685, 0x0, 0x0, 0x10000, 0x0, 0xffffffffffffffff}, 0x0, 0xb, r0, 0xa) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x12, 0xf7, 0x4, 0x3}, 0x40) 23:08:56 executing program 1: ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000001c0)={'team0\x00', 0x0}) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000680)={0xffffffffffffffff, 0x10, &(0x7f0000000640)={&(0x7f0000000780)=""/4096, 0x1000, 0x0}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000001780)={0x8, 0x7, &(0x7f0000001800)=ANY=[@ANYBLOB="180000009d57000000000000060000001832000005000000000000000000000495000000000000005c150400010000009500000000434e0dae2ef63aab6acde18cddf77c67000000"], &(0x7f0000000180)='GPL\x00', 0x2, 0x0, 0x0, 0x41100, 0xd, '\x00', r0, 0x1d, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x6, 0x5}, 0x8, 0x10, &(0x7f0000000600)={0x5, 0x0, 0x0, 0x10001}, 0x10, r1}, 0x78) r2 = getpgrp(0x0) prctl$PR_SET_PTRACER(0x59616d61, r2) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x24000000) r3 = gettid() perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x2100, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x4}, 0x0, 0x8}, 0x0, 0x8, 0xffffffffffffffff, 0x9) clone(0x6cb2e100, 0x0, 0x0, 0x0, 0x0) r4 = openat$rtc(0xffffffffffffff9c, &(0x7f00000168c0), 0x0, 0x0) ioctl$RTC_UIE_ON(r4, 0x7003) clone(0x59040000, &(0x7f0000000200)="32b026bb2bd5ab05345d05868d1008feb1352fb452659a55b2c8650d5c3b8d9896f83163af0908ddf225ca94e880899df94150b94cce61a62255c2da294ef09dd6df955a8b10081fc4491edeff6bdea1f408c84f564a1702f2429d4ed091a3ef6bb7002cdeb2cb9790f44b23c402166d7ced3ecafcbc5a046b763517bf35421cba1dc4f3b4a67d3882fcad4bd680d79d963ee7d31048c06d6a09d69830d36d80e15be2156e695858a0937e49a60e4623fca37ffd32972d2555bb01a4c5c57e4e6c39ec93e0887c3ed39a172ca646bc8514bdb64ddceb12d7d09546d0c5d8c9fe33f4296409029503d314e0", &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="99d1c32534d9de00af8729fa460ec9d5628744ffe3cb327edbe5d45fed028bf303c434286297cbfe9f121b1bc94969fa74f64c4cb8a1d40cadfe5d1afe1911de07770c57e37c225c0843887e02f6881c533230e4a3d43275e9cd079068012291e77d44bf1f4398518c9d64ae643b1ebff18fb2d4d632098a07dd40847a76374a4a01df2f34c001369ba9b86499548cbb8ce4cda4ae5179f35c9feb4de592a550f357f89d1660d711fac0e2a8") ioctl$RTC_SET_TIME(r4, 0x4024700a, &(0x7f0000000000)={0x0, 0x0, 0x0, 0xf, 0x0, 0xfd}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x9efef75f}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvlan={{0xc}, {0x4}}}, @IFLA_LINK={0x8}]}, 0x3c}}, 0x0) clone(0x2908000, &(0x7f0000000080)="6028d78584a9523ff3b18b3c7f86b0f46595537c62f1f47ca39e4ff27666a38078b3617669c736e28539aa28b2d44ceec9dc0c3a4d3dd6d901efcff839fc776cc0790c", &(0x7f0000000140), &(0x7f0000000440), &(0x7f0000000480)="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") ptrace(0x10, r3) wait4(0x0, 0x0, 0x0, 0x0) 23:08:56 executing program 3: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x15, 0x0, 0x1, 0x0, 0x6, @multicast}, 0x14) clone(0x2000000082148180, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_STRSET_GET(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000640)={&(0x7f00000006c0)=ANY=[@ANYBLOB="cccd30", @ANYRES16=0x0, @ANYBLOB="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", @ANYRES32=0x0, @ANYBLOB="1400020069703667726574617030000000000000140002006970366572f370616e20000000000000fa0ee59a22b338aeb6d3895b934764e9a674c87f74b9c35aaa183a9ea95194a3dc40d9b230a9f627acae68e5f0381078395e744b4197fe3dd12112adacad625f6ae8e22901a3dd5920796e7dc087d5033e12c9e4aea2026a5df4ee89adbeda48287c2840149cf27af2cc0f064680a7b5e90f480b201f70326baca201fea21a0100000000000000"], 0x1cc}, 0x1, 0x0, 0x0, 0x8800}, 0x20040040) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) request_key(0x0, &(0x7f0000001ffb)={'syz', 0x1}, 0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x1004) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0x3, 0x380, 0x0, 0xe0, 0xe0, 0xe0, 0x0, 0x2e8, 0x2e8, 0x2e8, 0x2e8, 0x2e8, 0x7fffffe, 0x0, {[{{@uncond, 0x0, 0x70, 0xe0, 0x0, {0x6020000}}, @common=@unspec=@NFLOG={0x70, 'NFLOG\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, "a4bcf0ebf5d09e8706000000b1000000124ac31d4fda375c7794e420aa63529ebcf847246a5e8846085b0a30510b266347a84ae5ffea89b8654e4403aa00"}}}, {{@ip={@local, @multicast1, 0x0, 0x0, '\x00', 'wg1\x00'}, 0x0, 0x1c8, 0x208, 0x0, {}, [@common=@inet=@hashlimit3={{0x158}, {'bridge_slave_1\x00', {0x0, 0x8, 0x0, 0x0, 0x0, 0x7fff, 0x8}}}]}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "29f0be44329ad4d94a815c71ad95092b933b5e380a7e5d3c56c51e9d0027"}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x3e0) [ 2161.528808] ieee802154 phy0 wpan0: encryption failed: -22 [ 2161.534427] ieee802154 phy1 wpan1: encryption failed: -22 23:08:59 executing program 2: r0 = getpgrp(0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x24000000) r1 = gettid() perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000080), 0x30200, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) unshare(0x4000000) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, r3, 0x0) preadv(0xffffffffffffffff, &(0x7f00000002c0)=[{&(0x7f00000001c0)=""/251, 0xfb}], 0x1, 0x0, 0x0) bpf$ITER_CREATE(0x21, &(0x7f0000000100)={r2}, 0x9) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x26, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = perf_event_open(&(0x7f00000006c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c44}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ID(r4, 0x80042407, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000140)={0x1, 0x80, 0x0, 0x7, 0x0, 0xff, 0x0, 0x2, 0x0, 0xe, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x400, 0x1, @perf_bp={&(0x7f00000000c0), 0x8}, 0x18000, 0x8000, 0xfffffffc, 0x1, 0x1000000000, 0x8, 0x3, 0x0, 0x8, 0x0, 0x9}, r1, 0x2, r4, 0x2) clone(0x6cb2e100, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r1) wait4(0x0, 0x0, 0x0, 0x0) 23:08:59 executing program 3: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x15, 0x0, 0x1, 0x0, 0x6, @multicast}, 0x14) clone(0x2000000082148180, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_STRSET_GET(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000640)={&(0x7f00000006c0)=ANY=[@ANYBLOB="cccd30", @ANYRES16=0x0, @ANYBLOB="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", @ANYRES32=0x0, @ANYBLOB="1400020069703667726574617030000000000000140002006970366572f370616e20000000000000fa0ee59a22b338aeb6d3895b934764e9a674c87f74b9c35aaa183a9ea95194a3dc40d9b230a9f627acae68e5f0381078395e744b4197fe3dd12112adacad625f6ae8e22901a3dd5920796e7dc087d5033e12c9e4aea2026a5df4ee89adbeda48287c2840149cf27af2cc0f064680a7b5e90f480b201f70326baca201fea21a0100000000000000"], 0x1cc}, 0x1, 0x0, 0x0, 0x8800}, 0x20040040) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) request_key(0x0, &(0x7f0000001ffb)={'syz', 0x1}, 0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x1004) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0x3, 0x380, 0x0, 0xe0, 0xe0, 0xe0, 0x0, 0x2e8, 0x2e8, 0x2e8, 0x2e8, 0x2e8, 0x7fffffe, 0x0, {[{{@uncond, 0x0, 0x70, 0xe0, 0x0, {0x6020000}}, @common=@unspec=@NFLOG={0x70, 'NFLOG\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, "a4bcf0ebf5d09e8706000000b1000000124ac31d4fda375c7794e420aa63529ebcf847246a5e8846085b0a30510b266347a84ae5ffea89b8654e4400ac00"}}}, {{@ip={@local, @multicast1, 0x0, 0x0, '\x00', 'wg1\x00'}, 0x0, 0x1c8, 0x208, 0x0, {}, [@common=@inet=@hashlimit3={{0x158}, {'bridge_slave_1\x00', {0x0, 0x8, 0x0, 0x0, 0x0, 0x7fff, 0x8}}}]}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "29f0be44329ad4d94a815c71ad95092b933b5e380a7e5d3c56c51e9d0027"}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x3e0) 23:08:59 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000200), 0xffffffffffffffff) sendmsg$L2TP_CMD_TUNNEL_CREATE(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000001c40)={&(0x7f0000000000)=ANY=[@ANYBLOB='\\\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="17090000000000000000010000600500070000000000080009000000000014001f000000000000000000000000000000000008000a00000000000600020001000000140020"], 0x5c}}, 0x0) sendmsg$L2TP_CMD_SESSION_GET(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000040)={0x28, r1, 0x20, 0x70bd2b, 0x25dfdbfd, {}, [@L2TP_ATTR_IFNAME={0x14, 0x8, 'veth1_to_hsr\x00'}]}, 0x28}, 0x1, 0x0, 0x0, 0x1}, 0x4000004) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0xc7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x12, 0xf7, 0x4, 0x3}, 0x40) 23:08:59 executing program 1: ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000001c0)={'team0\x00', 0x0}) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000680)={0xffffffffffffffff, 0x10, &(0x7f0000000640)={&(0x7f0000000780)=""/4096, 0x1000, 0x0}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000001780)={0x8, 0x7, &(0x7f0000001800)=ANY=[@ANYBLOB="180000009d57000000000000060000001832000005000000000000000000000495000000000000005c150400010000009500000000434e0dae2ef63aab6acde18cddf77c67000000"], &(0x7f0000000180)='GPL\x00', 0x2, 0x0, 0x0, 0x41100, 0xd, '\x00', r0, 0x1d, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x6, 0x5}, 0x8, 0x10, &(0x7f0000000600)={0x5, 0x0, 0x0, 0x10001}, 0x10, r1}, 0x78) r2 = getpgrp(0x0) prctl$PR_SET_PTRACER(0x59616d61, r2) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x24000000) r3 = gettid() perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x2100, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x4}, 0x0, 0x8}, 0x0, 0x8, 0xffffffffffffffff, 0x9) clone(0x6cb2e100, 0x0, 0x0, 0x0, 0x0) r4 = openat$rtc(0xffffffffffffff9c, &(0x7f00000168c0), 0x0, 0x0) ioctl$RTC_UIE_ON(r4, 0x7003) clone(0x59040000, &(0x7f0000000200)="32b026bb2bd5ab05345d05868d1008feb1352fb452659a55b2c8650d5c3b8d9896f83163af0908ddf225ca94e880899df94150b94cce61a62255c2da294ef09dd6df955a8b10081fc4491edeff6bdea1f408c84f564a1702f2429d4ed091a3ef6bb7002cdeb2cb9790f44b23c402166d7ced3ecafcbc5a046b763517bf35421cba1dc4f3b4a67d3882fcad4bd680d79d963ee7d31048c06d6a09d69830d36d80e15be2156e695858a0937e49a60e4623fca37ffd32972d2555bb01a4c5c57e4e6c39ec93e0887c3ed39a172ca646bc8514bdb64ddceb12d7d09546d0c5d8c9fe33f4296409029503d314e0", &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="99d1c32534d9de00af8729fa460ec9d5628744ffe3cb327edbe5d45fed028bf303c434286297cbfe9f121b1bc94969fa74f64c4cb8a1d40cadfe5d1afe1911de07770c57e37c225c0843887e02f6881c533230e4a3d43275e9cd079068012291e77d44bf1f4398518c9d64ae643b1ebff18fb2d4d632098a07dd40847a76374a4a01df2f34c001369ba9b86499548cbb8ce4cda4ae5179f35c9feb4de592a550f357f89d1660d711fac0e2a8") ioctl$RTC_SET_TIME(r4, 0x4024700a, &(0x7f0000000000)={0x0, 0x0, 0x0, 0xf, 0x0, 0xfd}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x9efef75f}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvlan={{0xc}, {0x4}}}, @IFLA_LINK={0x8}]}, 0x3c}}, 0x0) clone(0x2908000, &(0x7f0000000080)="6028d78584a9523ff3b18b3c7f86b0f46595537c62f1f47ca39e4ff27666a38078b3617669c736e28539aa28b2d44ceec9dc0c3a4d3dd6d901efcff839fc776cc0790c", &(0x7f0000000140), &(0x7f0000000440), &(0x7f0000000480)="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") ptrace(0x10, r3) wait4(0x0, 0x0, 0x0, 0x0) 23:08:59 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x15, 0x0, 0x1, 0x0, 0x6, @multicast}, 0x14) clone(0x2000000082148180, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_STRSET_GET(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000640)={0x0, 0x1cc}, 0x1, 0x0, 0x0, 0x8800}, 0x20040040) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) request_key(0x0, &(0x7f0000001ffb)={'syz', 0x1}, 0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x1004) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0x3, 0x380, 0x2cc, 0xe0, 0xe0, 0xe0, 0x0, 0x2e8, 0x2e8, 0x2e8, 0x2e8, 0x2e8, 0x7fffffe, 0x0, {[{{@uncond, 0x0, 0x70, 0xe0, 0x0, {0x6020000}}, @common=@unspec=@NFLOG={0x70, 'NFLOG\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, "a4bcf0ebf5d09e8706580300b1000000124ac31d4fda375c7794e420aa63529ebcf847246a5e8846085b0a30510b266347a84ae5ffea89b8654e4400"}}}, {{@ip={@local, @multicast1, 0x0, 0x0, '\x00', 'wg1\x00'}, 0x0, 0x1c8, 0x208, 0x0, {}, [@common=@inet=@hashlimit3={{0x158}, {'bridge_slave_1\x00', {0x0, 0x8, 0x0, 0x0, 0x0, 0x7fff, 0x8}}}]}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "29f0be44329ad4d94a815c71ad95092b933b5e380a7e5d3c56c51e9d0027"}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x3e0) 23:08:59 executing program 4: r0 = perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0xc7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xe, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x12, 0xf7, 0x4, 0x3}, 0x40) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x8) 23:08:59 executing program 3: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x15, 0x0, 0x1, 0x0, 0x6, @multicast}, 0x14) clone(0x2000000082148180, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_STRSET_GET(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000640)={&(0x7f00000006c0)=ANY=[@ANYBLOB="cccd30", @ANYRES16=0x0, @ANYBLOB="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", @ANYRES32=0x0, @ANYBLOB="1400020069703667726574617030000000000000140002006970366572f370616e20000000000000fa0ee59a22b338aeb6d3895b934764e9a674c87f74b9c35aaa183a9ea95194a3dc40d9b230a9f627acae68e5f0381078395e744b4197fe3dd12112adacad625f6ae8e22901a3dd5920796e7dc087d5033e12c9e4aea2026a5df4ee89adbeda48287c2840149cf27af2cc0f064680a7b5e90f480b201f70326baca201fea21a0100000000000000"], 0x1cc}, 0x1, 0x0, 0x0, 0x8800}, 0x20040040) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) request_key(0x0, &(0x7f0000001ffb)={'syz', 0x1}, 0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x1004) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0x3, 0x380, 0x0, 0xe0, 0xe0, 0xe0, 0x0, 0x2e8, 0x2e8, 0x2e8, 0x2e8, 0x2e8, 0x7fffffe, 0x0, {[{{@uncond, 0x0, 0x70, 0xe0, 0x0, {0x6020000}}, @common=@unspec=@NFLOG={0x70, 'NFLOG\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, "a4bcf0ebf5d09e8706000000b1000000124ac31d4fda375c7794e420aa63529ebcf847246a5e8846085b0a30510b266347a84ae5ffea89b8654e4402ae00"}}}, {{@ip={@local, @multicast1, 0x0, 0x0, '\x00', 'wg1\x00'}, 0x0, 0x1c8, 0x208, 0x0, {}, [@common=@inet=@hashlimit3={{0x158}, {'bridge_slave_1\x00', {0x0, 0x8, 0x0, 0x0, 0x0, 0x7fff, 0x8}}}]}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "29f0be44329ad4d94a815c71ad95092b933b5e380a7e5d3c56c51e9d0027"}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x3e0) 23:08:59 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x15, 0x0, 0x1, 0x0, 0x6, @multicast}, 0x14) clone(0x2000000082148180, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_STRSET_GET(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000640)={&(0x7f00000006c0)=ANY=[@ANYBLOB="cccd30", @ANYRES16=0x0, @ANYBLOB="02002abd7000fbdbdf250100000004000300800102800c00018008000100070000002400018008000100070000000800010008000000080001000100000008000100060000001c0001800800010005000000080001000200000008000100000000002c000180080001000600000008000100070000000800010003000000080001000600000008000100000000005400018008000100060000000800010001000000080001000400000008000100000000000800010000000000080001000000000008000100000000000800010008000000080001000300000008000100020000001c0001800800010008000000080001000100000008000100050000001c0001800800010004000000080001000400000008000100010000002c000180080001000000000008000100040000000800010007000000080001000700000008000100080000004c0001800800010002000000080001000200000008000100050000000800010003000000080001000400000008000100040000000800010000000000080001000400000008000100030000003400018008000100", @ANYRES32=0x0, @ANYBLOB="1400020069703667726574617030000000000000140002006970366572f370616e20000000000000fa0ee59a22b338aeb6d3895b934764e9a674c87f74b9c35aaa183a9ea95194a3dc40d9b230a9f627acae68e5f0381078395e744b4197fe3dd12112adacad625f6ae8e22901a3dd5920796e7dc087d5033e12c9e4aea2026a5df4ee89adbeda48287c2840149cf27af2cc0f064680a7b5e90f480b201f70326baca201fea21a0100000000000000"], 0x1cc}, 0x1, 0x0, 0x0, 0x8800}, 0x20040040) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) request_key(0x0, &(0x7f0000001ffb)={'syz', 0x1}, 0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x1004) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0x3, 0x380, 0x0, 0xe0, 0xe0, 0xe0, 0x0, 0x2e8, 0x2e8, 0x2e8, 0x2e8, 0x2e8, 0x7fffffe, 0x0, {[{{@uncond, 0x0, 0x70, 0xe0, 0x0, {0x6020000}}, @common=@unspec=@NFLOG={0x70, 'NFLOG\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, "a4bcf0ebf5d09e8706000000b1000000124ac31d4fda375c7794e420aa63529ebcf847246a5e8846085b0a30510b266347a84ae5ffea89b8654e4401a000"}}}, {{@ip={@local, @multicast1, 0x0, 0x0, '\x00', 'wg1\x00'}, 0x0, 0x1c8, 0x208, 0x0, {}, [@common=@inet=@hashlimit3={{0x158}, {'bridge_slave_1\x00', {0x0, 0x8, 0x0, 0x0, 0x0, 0x7fff, 0x8}}}]}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "29f0be44329ad4d94a815c71ad95092b933b5e380a7e5d3c56c51e9d0027"}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x3e0) 23:08:59 executing program 1: ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000001c0)={'team0\x00', 0x0}) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000680)={0xffffffffffffffff, 0x10, &(0x7f0000000640)={&(0x7f0000000780)=""/4096, 0x1000, 0x0}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000001780)={0x8, 0x7, &(0x7f0000001800)=ANY=[@ANYBLOB="180000009d57000000000000060000001832000005000000000000000000000495000000000000005c150400010000009500000000434e0dae2ef63aab6acde18cddf77c67000000"], &(0x7f0000000180)='GPL\x00', 0x2, 0x0, 0x0, 0x41100, 0xd, '\x00', r0, 0x1d, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x6, 0x5}, 0x8, 0x10, &(0x7f0000000600)={0x5, 0x0, 0x0, 0x10001}, 0x10, r1}, 0x78) r2 = getpgrp(0x0) prctl$PR_SET_PTRACER(0x59616d61, r2) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x24000000) r3 = gettid() perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x2100, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x4}, 0x0, 0x8}, 0x0, 0x8, 0xffffffffffffffff, 0x9) clone(0x6cb2e100, 0x0, 0x0, 0x0, 0x0) r4 = openat$rtc(0xffffffffffffff9c, &(0x7f00000168c0), 0x0, 0x0) ioctl$RTC_UIE_ON(r4, 0x7003) clone(0x59040000, &(0x7f0000000200)="32b026bb2bd5ab05345d05868d1008feb1352fb452659a55b2c8650d5c3b8d9896f83163af0908ddf225ca94e880899df94150b94cce61a62255c2da294ef09dd6df955a8b10081fc4491edeff6bdea1f408c84f564a1702f2429d4ed091a3ef6bb7002cdeb2cb9790f44b23c402166d7ced3ecafcbc5a046b763517bf35421cba1dc4f3b4a67d3882fcad4bd680d79d963ee7d31048c06d6a09d69830d36d80e15be2156e695858a0937e49a60e4623fca37ffd32972d2555bb01a4c5c57e4e6c39ec93e0887c3ed39a172ca646bc8514bdb64ddceb12d7d09546d0c5d8c9fe33f4296409029503d314e0", &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="99d1c32534d9de00af8729fa460ec9d5628744ffe3cb327edbe5d45fed028bf303c434286297cbfe9f121b1bc94969fa74f64c4cb8a1d40cadfe5d1afe1911de07770c57e37c225c0843887e02f6881c533230e4a3d43275e9cd079068012291e77d44bf1f4398518c9d64ae643b1ebff18fb2d4d632098a07dd40847a76374a4a01df2f34c001369ba9b86499548cbb8ce4cda4ae5179f35c9feb4de592a550f357f89d1660d711fac0e2a8") ioctl$RTC_SET_TIME(r4, 0x4024700a, &(0x7f0000000000)={0x0, 0x0, 0x0, 0xf, 0x0, 0xfd}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x9efef75f}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvlan={{0xc}, {0x4}}}, @IFLA_LINK={0x8}]}, 0x3c}}, 0x0) clone(0x2908000, &(0x7f0000000080)="6028d78584a9523ff3b18b3c7f86b0f46595537c62f1f47ca39e4ff27666a38078b3617669c736e28539aa28b2d44ceec9dc0c3a4d3dd6d901efcff839fc776cc0790c", &(0x7f0000000140), &(0x7f0000000440), &(0x7f0000000480)="242ca92137c64d2aa511b44b3c1cfde2dcc859886593cab62548ea4784feceb4575c63296b0fec0d95f9d0545e98ad8a780317be96bf33ee1323c21bbd3408f19cc491fe3e0640ca86d924c1c438cacbc01bffeab0bf8337864bfe29771f0e3982aa64897821d7ed05a7368c7d4dba2eb99c641eca43a27125ea04721f6aba768faf134a4e1031de9e9cdb1e34fe658edb5a21c8473385f8af9d6a2cfecd97300c78c402d2397d81e96505a2b29983671676bb8e195c46240d650efbf9b3fc8d173f7af8cd723628e6be3410c8b8c3a3891d304c729fec5b1491855f932f47fbed742a324ddcd3ec55410e386f95cb48ccaf9124e264d072cff4204404397088bc526deb9cbf07") ptrace(0x10, r3) wait4(0x0, 0x0, 0x0, 0x0) 23:08:59 executing program 4: perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0xc7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x1, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x12, 0xf7, 0x4, 0x3}, 0x40) 23:08:59 executing program 3: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x15, 0x0, 0x1, 0x0, 0x6, @multicast}, 0x14) clone(0x2000000082148180, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_STRSET_GET(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000640)={&(0x7f00000006c0)=ANY=[@ANYBLOB="cccd30", @ANYRES16=0x0, @ANYBLOB="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", @ANYRES32=0x0, @ANYBLOB="1400020069703667726574617030000000000000140002006970366572f370616e20000000000000fa0ee59a22b338aeb6d3895b934764e9a674c87f74b9c35aaa183a9ea95194a3dc40d9b230a9f627acae68e5f0381078395e744b4197fe3dd12112adacad625f6ae8e22901a3dd5920796e7dc087d5033e12c9e4aea2026a5df4ee89adbeda48287c2840149cf27af2cc0f064680a7b5e90f480b201f70326baca201fea21a0100000000000000"], 0x1cc}, 0x1, 0x0, 0x0, 0x8800}, 0x20040040) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) request_key(0x0, &(0x7f0000001ffb)={'syz', 0x1}, 0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x1004) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0x3, 0x380, 0x0, 0xe0, 0xe0, 0xe0, 0x0, 0x2e8, 0x2e8, 0x2e8, 0x2e8, 0x2e8, 0x7fffffe, 0x0, {[{{@uncond, 0x0, 0x70, 0xe0, 0x0, {0x6020000}}, @common=@unspec=@NFLOG={0x70, 'NFLOG\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, "a4bcf0ebf5d09e8706000000b1000000124ac31d4fda375c7794e420aa63529ebcf847246a5e8846085b0a30510b266347a84ae5ffea89b8654e4403ae00"}}}, {{@ip={@local, @multicast1, 0x0, 0x0, '\x00', 'wg1\x00'}, 0x0, 0x1c8, 0x208, 0x0, {}, [@common=@inet=@hashlimit3={{0x158}, {'bridge_slave_1\x00', {0x0, 0x8, 0x0, 0x0, 0x0, 0x7fff, 0x8}}}]}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "29f0be44329ad4d94a815c71ad95092b933b5e380a7e5d3c56c51e9d0027"}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x3e0) 23:08:59 executing program 4: perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0xc7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000140)={0x0}, &(0x7f0000000180)=0xc) r1 = perf_event_open(&(0x7f00000006c0)={0x1, 0x80, 0x0, 0x80, 0x0, 0x0, 0x0, 0x3c44, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ID(r1, 0x80042407, &(0x7f00000000c0)) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x8, 0x3, 0x7, 0x77, 0x0, 0x3ff, 0x100, 0x8, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x3, 0x2, @perf_config_ext={0x6, 0x9}, 0x18104, 0x7, 0x3853, 0x5, 0xffffffff7fffffff, 0x40, 0x800, 0x0, 0x8, 0x0, 0x4}, r0, 0x3, r1, 0x2) perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x2, 0x2, 0x40, 0x1, 0x0, 0x3fa, 0x4020, 0x4, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0xfffffffe, 0x1, @perf_config_ext={0x2, 0x3}, 0x8084, 0x6, 0x9, 0x7, 0x74123b10, 0x7, 0x0, 0x0, 0x1, 0x0, 0x7ff}, 0xffffffffffffffff, 0x7, 0xffffffffffffffff, 0x8) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x12, 0xf7, 0x4, 0x3}, 0x40) pipe(&(0x7f00000001c0)) 23:09:02 executing program 2: r0 = getpgrp(0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x24000000) r1 = gettid() perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000080), 0x30200, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) unshare(0x4000000) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, r3, 0x0) preadv(0xffffffffffffffff, &(0x7f00000002c0)=[{&(0x7f00000001c0)=""/251, 0xfb}], 0x1, 0x0, 0x0) bpf$ITER_CREATE(0x21, &(0x7f0000000100)={r2}, 0x9) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x26, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = perf_event_open(&(0x7f00000006c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c44}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ID(r4, 0x80042407, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000140)={0x1, 0x80, 0x0, 0x7, 0x0, 0xff, 0x0, 0x2, 0x0, 0xe, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x400, 0x1, @perf_bp={&(0x7f00000000c0), 0x8}, 0x18000, 0x8000, 0xfffffffc, 0x1, 0x1000000000, 0x8, 0x3, 0x0, 0x8, 0x0, 0x9}, r1, 0x2, r4, 0x2) clone(0x6cb2e100, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r1) wait4(0x0, 0x0, 0x0, 0x0) 23:09:02 executing program 3: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x15, 0x0, 0x1, 0x0, 0x6, @multicast}, 0x14) clone(0x2000000082148180, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_STRSET_GET(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000640)={&(0x7f00000006c0)=ANY=[@ANYBLOB="cccd30", @ANYRES16=0x0, @ANYBLOB="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", @ANYRES32=0x0, @ANYBLOB="1400020069703667726574617030000000000000140002006970366572f370616e20000000000000fa0ee59a22b338aeb6d3895b934764e9a674c87f74b9c35aaa183a9ea95194a3dc40d9b230a9f627acae68e5f0381078395e744b4197fe3dd12112adacad625f6ae8e22901a3dd5920796e7dc087d5033e12c9e4aea2026a5df4ee89adbeda48287c2840149cf27af2cc0f064680a7b5e90f480b201f70326baca201fea21a0100000000000000"], 0x1cc}, 0x1, 0x0, 0x0, 0x8800}, 0x20040040) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) request_key(0x0, &(0x7f0000001ffb)={'syz', 0x1}, 0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x1004) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0x3, 0x380, 0x0, 0xe0, 0xe0, 0xe0, 0x0, 0x2e8, 0x2e8, 0x2e8, 0x2e8, 0x2e8, 0x7fffffe, 0x0, {[{{@uncond, 0x0, 0x70, 0xe0, 0x0, {0x6020000}}, @common=@unspec=@NFLOG={0x70, 'NFLOG\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, "a4bcf0ebf5d09e8706000000b1000000124ac31d4fda375c7794e420aa63529ebcf847246a5e8846085b0a30510b266347a84ae5ffea89b8654e4402b400"}}}, {{@ip={@local, @multicast1, 0x0, 0x0, '\x00', 'wg1\x00'}, 0x0, 0x1c8, 0x208, 0x0, {}, [@common=@inet=@hashlimit3={{0x158}, {'bridge_slave_1\x00', {0x0, 0x8, 0x0, 0x0, 0x0, 0x7fff, 0x8}}}]}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "29f0be44329ad4d94a815c71ad95092b933b5e380a7e5d3c56c51e9d0027"}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x3e0) 23:09:02 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x15, 0x0, 0x1, 0x0, 0x6, @multicast}, 0x14) clone(0x2000000082148180, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_STRSET_GET(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000640)={&(0x7f00000006c0)=ANY=[@ANYBLOB="cccd30", @ANYRES16=0x0, @ANYBLOB="02002abd7000fbdbdf250100000004000300800102800c00018008000100070000002400018008000100070000000800010008000000080001000100000008000100060000001c0001800800010005000000080001000200000008000100000000002c000180080001000600000008000100070000000800010003000000080001000600000008000100000000005400018008000100060000000800010001000000080001000400000008000100000000000800010000000000080001000000000008000100000000000800010008000000080001000300000008000100020000001c0001800800010008000000080001000100000008000100050000001c0001800800010004000000080001000400000008000100010000002c000180080001000000000008000100040000000800010007000000080001000700000008000100080000004c0001800800010002000000080001000200000008000100050000000800010003000000080001000400000008000100040000000800010000000000080001000400000008000100030000003400018008000100", @ANYRES32=0x0, @ANYBLOB="1400020069703667726574617030000000000000140002006970366572f370616e20000000000000fa0ee59a22b338aeb6d3895b934764e9a674c87f74b9c35aaa183a9ea95194a3dc40d9b230a9f627acae68e5f0381078395e744b4197fe3dd12112adacad625f6ae8e22901a3dd5920796e7dc087d5033e12c9e4aea2026a5df4ee89adbeda48287c2840149cf27af2cc0f064680a7b5e90f480b201f70326baca201fea21a0100000000000000"], 0x1cc}, 0x1, 0x0, 0x0, 0x8800}, 0x20040040) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) request_key(0x0, &(0x7f0000001ffb)={'syz', 0x1}, 0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x1004) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0x3, 0x380, 0x0, 0xe0, 0xe0, 0xe0, 0x0, 0x2e8, 0x2e8, 0x2e8, 0x2e8, 0x2e8, 0x7fffffe, 0x0, {[{{@uncond, 0x0, 0x70, 0xe0, 0x0, {0x6020000}}, @common=@unspec=@NFLOG={0x70, 'NFLOG\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, "a4bcf0ebf5d09e8706000000b1000000124ac31d4fda375c7794e420aa63529ebcf847246a5e8846085b0a30510b266347a84ae5ffea89b8654e4403ae00"}}}, {{@ip={@local, @multicast1, 0x0, 0x0, '\x00', 'wg1\x00'}, 0x0, 0x1c8, 0x208, 0x0, {}, [@common=@inet=@hashlimit3={{0x158}, {'bridge_slave_1\x00', {0x0, 0x8, 0x0, 0x0, 0x0, 0x7fff, 0x8}}}]}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "29f0be44329ad4d94a815c71ad95092b933b5e380a7e5d3c56c51e9d0027"}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x3e0) 23:09:02 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x15, 0x0, 0x1, 0x0, 0x6, @multicast}, 0x14) clone(0x2000000082148180, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_STRSET_GET(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000640)={0x0, 0x1cc}, 0x1, 0x0, 0x0, 0x8800}, 0x20040040) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) request_key(0x0, &(0x7f0000001ffb)={'syz', 0x1}, 0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x1004) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0x3, 0x380, 0x2e8, 0xe0, 0xe0, 0xe0, 0x0, 0x2e8, 0x2e8, 0x2e8, 0x2e8, 0x2e8, 0x7fffffe, 0x0, {[{{@uncond, 0x0, 0x70, 0xe0, 0x0, {0x6020000}}, @common=@unspec=@NFLOG={0x70, 'NFLOG\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, "a4bcf0ebf5d09e8706580300b1000000124ac31d4fda375c7794e420aa63529ebcf847246a5e8846085b0a30510b266347a84ae5ffea89b8654e4400"}}}, {{@ip={@local, @multicast1, 0x0, 0x0, '\x00', 'wg1\x00'}, 0x0, 0x1c8, 0x208, 0x0, {}, [@common=@inet=@hashlimit3={{0x158}, {'bridge_slave_1\x00', {0x0, 0x8, 0x0, 0x0, 0x0, 0x7fff, 0x8}}}]}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "29f0be44329ad4d94a815c71ad95092b933b5e380a7e5d3c56c51e9d0027"}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x3e0) 23:09:02 executing program 4: r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_CHANNEL(r0, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000040)={&(0x7f00000000c0)={0x60, 0x0, 0x10, 0x70bd2a, 0x25dfdbfd, {{}, {@void, @val={0xc, 0x99, {0x9, 0x42}}}}, [@NL80211_ATTR_CENTER_FREQ2={0x8, 0xa1, 0x2}, @NL80211_ATTR_CHANNEL_WIDTH={0x8, 0x9f, 0x2}, @NL80211_ATTR_WIPHY_EDMG_BW_CONFIG={0x5, 0x119, 0x9}, @NL80211_ATTR_CENTER_FREQ2={0x8, 0xa1, 0xac7740ef}, @NL80211_ATTR_WIPHY_EDMG_BW_CONFIG={0x5, 0x119, 0x9}, @NL80211_ATTR_CENTER_FREQ1={0x8, 0xa0, 0x81}, @NL80211_ATTR_WIPHY_EDMG_CHANNELS={0x5, 0x118, 0x4}, @NL80211_ATTR_WIPHY_FREQ={0x8, 0x26, @random=0x96c}]}, 0x60}, 0x1, 0x0, 0x0, 0x2400c0d1}, 0x20000000) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0xc7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x12, 0xf7, 0x4, 0x3}, 0x40) 23:09:02 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x15, 0x0, 0x1, 0x0, 0x6, @multicast}, 0x14) clone(0x2000000082148180, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_STRSET_GET(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000640)={&(0x7f00000006c0)=ANY=[@ANYBLOB="cccd30", @ANYRES16=0x0, @ANYBLOB="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", @ANYRES32=0x0, @ANYBLOB="1400020069703667726574617030000000000000140002006970366572f370616e20000000000000fa0ee59a22b338aeb6d3895b934764e9a674c87f74b9c35aaa183a9ea95194a3dc40d9b230a9f627acae68e5f0381078395e744b4197fe3dd12112adacad625f6ae8e22901a3dd5920796e7dc087d5033e12c9e4aea2026a5df4ee89adbeda48287c2840149cf27af2cc0f064680a7b5e90f480b201f70326baca201fea21a0100000000000000"], 0x1cc}, 0x1, 0x0, 0x0, 0x8800}, 0x20040040) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) request_key(0x0, &(0x7f0000001ffb)={'syz', 0x1}, 0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x1004) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0x3, 0x380, 0x0, 0xe0, 0xe0, 0xe0, 0x0, 0x2e8, 0x2e8, 0x2e8, 0x2e8, 0x2e8, 0x7fffffe, 0x0, {[{{@uncond, 0x0, 0x70, 0xe0, 0x0, {0x6020000}}, @common=@unspec=@NFLOG={0x70, 'NFLOG\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, "a4bcf0ebf5d09e8706000000b1000000124ac31d4fda375c7794e420aa63529ebcf847246a5e8846085b0a30510b266347a84ae5ffea89b8654e4403ae00"}}}, {{@ip={@local, @multicast1, 0x0, 0x0, '\x00', 'wg1\x00'}, 0x0, 0x1c8, 0x208, 0x0, {}, [@common=@inet=@hashlimit3={{0x158}, {'bridge_slave_1\x00', {0x0, 0x8, 0x0, 0x0, 0x0, 0x7fff, 0x8}}}]}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "29f0be44329ad4d94a815c71ad95092b933b5e380a7e5d3c56c51e9d0027"}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x3e0) 23:09:02 executing program 3: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x15, 0x0, 0x1, 0x0, 0x6, @multicast}, 0x14) clone(0x2000000082148180, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_STRSET_GET(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000640)={&(0x7f00000006c0)=ANY=[@ANYBLOB="cccd30", @ANYRES16=0x0, @ANYBLOB="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", @ANYRES32=0x0, @ANYBLOB="1400020069703667726574617030000000000000140002006970366572f370616e20000000000000fa0ee59a22b338aeb6d3895b934764e9a674c87f74b9c35aaa183a9ea95194a3dc40d9b230a9f627acae68e5f0381078395e744b4197fe3dd12112adacad625f6ae8e22901a3dd5920796e7dc087d5033e12c9e4aea2026a5df4ee89adbeda48287c2840149cf27af2cc0f064680a7b5e90f480b201f70326baca201fea21a0100000000000000"], 0x1cc}, 0x1, 0x0, 0x0, 0x8800}, 0x20040040) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) request_key(0x0, &(0x7f0000001ffb)={'syz', 0x1}, 0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x1004) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0x3, 0x380, 0x0, 0xe0, 0xe0, 0xe0, 0x0, 0x2e8, 0x2e8, 0x2e8, 0x2e8, 0x2e8, 0x7fffffe, 0x0, {[{{@uncond, 0x0, 0x70, 0xe0, 0x0, {0x6020000}}, @common=@unspec=@NFLOG={0x70, 'NFLOG\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, "a4bcf0ebf5d09e8706000000b1000000124ac31d4fda375c7794e420aa63529ebcf847246a5e8846085b0a30510b266347a84ae5ffea89b8654e4400c000"}}}, {{@ip={@local, @multicast1, 0x0, 0x0, '\x00', 'wg1\x00'}, 0x0, 0x1c8, 0x208, 0x0, {}, [@common=@inet=@hashlimit3={{0x158}, {'bridge_slave_1\x00', {0x0, 0x8, 0x0, 0x0, 0x0, 0x7fff, 0x8}}}]}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "29f0be44329ad4d94a815c71ad95092b933b5e380a7e5d3c56c51e9d0027"}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x3e0) 23:09:02 executing program 4: ioctl$ASHMEM_SET_SIZE(0xffffffffffffffff, 0x40087703, 0x4) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0xc7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x12, 0xf7, 0x4, 0x3}, 0x40) 23:09:02 executing program 1: ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000001c0)={'team0\x00', 0x0}) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000680)={0xffffffffffffffff, 0x10, &(0x7f0000000640)={&(0x7f0000000780)=""/4096, 0x1000, 0x0}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000001780)={0x8, 0x7, &(0x7f0000001800)=ANY=[@ANYBLOB="180000009d57000000000000060000001832000005000000000000000000000495000000000000005c150400010000009500000000434e0dae2ef63aab6acde18cddf77c67000000"], &(0x7f0000000180)='GPL\x00', 0x2, 0x0, 0x0, 0x41100, 0xd, '\x00', r0, 0x1d, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x6, 0x5}, 0x8, 0x10, &(0x7f0000000600)={0x5, 0x0, 0x0, 0x10001}, 0x10, r1}, 0x78) r2 = getpgrp(0x0) prctl$PR_SET_PTRACER(0x59616d61, r2) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x24000000) r3 = gettid() perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x2100, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x4}, 0x0, 0x8}, 0x0, 0x8, 0xffffffffffffffff, 0x9) clone(0x6cb2e100, 0x0, 0x0, 0x0, 0x0) r4 = openat$rtc(0xffffffffffffff9c, &(0x7f00000168c0), 0x0, 0x0) ioctl$RTC_UIE_ON(r4, 0x7003) clone(0x59040000, &(0x7f0000000200)="32b026bb2bd5ab05345d05868d1008feb1352fb452659a55b2c8650d5c3b8d9896f83163af0908ddf225ca94e880899df94150b94cce61a62255c2da294ef09dd6df955a8b10081fc4491edeff6bdea1f408c84f564a1702f2429d4ed091a3ef6bb7002cdeb2cb9790f44b23c402166d7ced3ecafcbc5a046b763517bf35421cba1dc4f3b4a67d3882fcad4bd680d79d963ee7d31048c06d6a09d69830d36d80e15be2156e695858a0937e49a60e4623fca37ffd32972d2555bb01a4c5c57e4e6c39ec93e0887c3ed39a172ca646bc8514bdb64ddceb12d7d09546d0c5d8c9fe33f4296409029503d314e0", &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="99d1c32534d9de00af8729fa460ec9d5628744ffe3cb327edbe5d45fed028bf303c434286297cbfe9f121b1bc94969fa74f64c4cb8a1d40cadfe5d1afe1911de07770c57e37c225c0843887e02f6881c533230e4a3d43275e9cd079068012291e77d44bf1f4398518c9d64ae643b1ebff18fb2d4d632098a07dd40847a76374a4a01df2f34c001369ba9b86499548cbb8ce4cda4ae5179f35c9feb4de592a550f357f89d1660d711fac0e2a8") ioctl$RTC_SET_TIME(r4, 0x4024700a, &(0x7f0000000000)={0x0, 0x0, 0x0, 0xf, 0x0, 0xfd}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000001940)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000006c0)={&(0x7f0000001880)=@dellinkprop={0xb0, 0x6d, 0x20, 0x70bd28, 0x25dfdbff, {0x0, 0x0, 0x0, 0x0, 0x210, 0xc0018}, [@IFLA_TARGET_NETNSID={0x8, 0x2e, 0x2}, @IFLA_MASTER={0x8}, @IFLA_AF_SPEC={0x70, 0x1a, 0x0, 0x1, [@AF_MPLS={0x4}, @AF_MPLS={0x4}, @AF_INET6={0x28, 0xa, 0x0, 0x1, [@IFLA_INET6_ADDR_GEN_MODE={0x5, 0x8, 0x6b}, @IFLA_INET6_TOKEN={0x14, 0x7, @mcast2}, @IFLA_INET6_ADDR_GEN_MODE={0x5, 0x8, 0x7}]}, @AF_MPLS={0x4}, @AF_INET6={0x28, 0xa, 0x0, 0x1, [@IFLA_INET6_ADDR_GEN_MODE={0x5, 0x8, 0x8}, @IFLA_INET6_ADDR_GEN_MODE={0x5, 0x8, 0x56}, @IFLA_INET6_TOKEN={0x14, 0x7, @ipv4={'\x00', '\xff\xff', @local}}]}, @AF_MPLS={0x4}, @AF_INET6={0xc, 0xa, 0x0, 0x1, [@IFLA_INET6_ADDR_GEN_MODE={0x5, 0x8, 0x9}]}]}, @IFLA_IFALIASn={0x4}, @IFLA_PHYS_PORT_ID={0xb, 0x22, "3df17141c4e8d5"}]}, 0xb0}, 0x1, 0x0, 0x0, 0x4000001}, 0x84000) clone(0x2908000, &(0x7f0000000080)="6028d78584a9523ff3b18b3c7f86b0f46595537c62f1f47ca39e4ff27666a38078b3617669c736e28539aa28b2d44ceec9dc0c3a4d3dd6d901efcff839fc776cc0790c", &(0x7f0000000140), &(0x7f0000000440), &(0x7f0000000480)="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") ptrace(0x10, r3) wait4(0x0, 0x0, 0x0, 0x0) 23:09:02 executing program 0: r0 = getpgrp(0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x24000000) r1 = gettid() perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000, 0x0, 0x2af}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000080), 0x30200, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) unshare(0x4000000) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r3, 0x0) r4 = syz_open_dev$cec(&(0x7f0000000300), 0x3, 0x2) preadv(r4, &(0x7f00000002c0)=[{&(0x7f00000001c0)=""/251, 0xfb}], 0x1, 0xda3, 0x400001) bpf$ITER_CREATE(0x21, &(0x7f0000000100)={r2}, 0x9) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x26, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = perf_event_open(&(0x7f00000006c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c44}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ID(r5, 0x80042407, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000140)={0x1, 0x80, 0x1, 0x7, 0x6, 0x0, 0x0, 0x2, 0x80200, 0xe, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x400, 0x1, @perf_bp={&(0x7f00000000c0), 0x8}, 0x18000, 0x8000, 0xfffffffc, 0x1, 0x1000000000, 0x8, 0x3, 0x0, 0x8, 0x0, 0x9}, r1, 0x2, r5, 0x2) clone(0x6cb2e100, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r1) wait4(0x0, 0x0, 0x0, 0x0) 23:09:02 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x15, 0x0, 0x1, 0x0, 0x6, @multicast}, 0x14) clone(0x2000000082148180, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_STRSET_GET(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000640)={0x0, 0x1cc}, 0x1, 0x0, 0x0, 0x8800}, 0x20040040) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) request_key(0x0, &(0x7f0000001ffb)={'syz', 0x1}, 0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x1004) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0x3, 0x380, 0x300, 0xe0, 0xe0, 0xe0, 0x0, 0x2e8, 0x2e8, 0x2e8, 0x2e8, 0x2e8, 0x7fffffe, 0x0, {[{{@uncond, 0x0, 0x70, 0xe0, 0x0, {0x6020000}}, @common=@unspec=@NFLOG={0x70, 'NFLOG\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, "a4bcf0ebf5d09e8706580300b1000000124ac31d4fda375c7794e420aa63529ebcf847246a5e8846085b0a30510b266347a84ae5ffea89b8654e4400"}}}, {{@ip={@local, @multicast1, 0x0, 0x0, '\x00', 'wg1\x00'}, 0x0, 0x1c8, 0x208, 0x0, {}, [@common=@inet=@hashlimit3={{0x158}, {'bridge_slave_1\x00', {0x0, 0x8, 0x0, 0x0, 0x0, 0x7fff, 0x8}}}]}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "29f0be44329ad4d94a815c71ad95092b933b5e380a7e5d3c56c51e9d0027"}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x3e0) 23:09:02 executing program 3: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x15, 0x0, 0x1, 0x0, 0x6, @multicast}, 0x14) clone(0x2000000082148180, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_STRSET_GET(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000640)={&(0x7f00000006c0)=ANY=[@ANYBLOB="cccd30", @ANYRES16=0x0, @ANYBLOB="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", @ANYRES32=0x0, @ANYBLOB="1400020069703667726574617030000000000000140002006970366572f370616e20000000000000fa0ee59a22b338aeb6d3895b934764e9a674c87f74b9c35aaa183a9ea95194a3dc40d9b230a9f627acae68e5f0381078395e744b4197fe3dd12112adacad625f6ae8e22901a3dd5920796e7dc087d5033e12c9e4aea2026a5df4ee89adbeda48287c2840149cf27af2cc0f064680a7b5e90f480b201f70326baca201fea21a0100000000000000"], 0x1cc}, 0x1, 0x0, 0x0, 0x8800}, 0x20040040) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) request_key(0x0, &(0x7f0000001ffb)={'syz', 0x1}, 0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x1004) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0x3, 0x380, 0x0, 0xe0, 0xe0, 0xe0, 0x0, 0x2e8, 0x2e8, 0x2e8, 0x2e8, 0x2e8, 0x7fffffe, 0x0, {[{{@uncond, 0x0, 0x70, 0xe0, 0x0, {0x6020000}}, @common=@unspec=@NFLOG={0x70, 'NFLOG\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, "a4bcf0ebf5d09e8706000000b1000000124ac31d4fda375c7794e420aa63529ebcf847246a5e8846085b0a30510b266347a84ae5ffea89b8654e4400c600"}}}, {{@ip={@local, @multicast1, 0x0, 0x0, '\x00', 'wg1\x00'}, 0x0, 0x1c8, 0x208, 0x0, {}, [@common=@inet=@hashlimit3={{0x158}, {'bridge_slave_1\x00', {0x0, 0x8, 0x0, 0x0, 0x0, 0x7fff, 0x8}}}]}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "29f0be44329ad4d94a815c71ad95092b933b5e380a7e5d3c56c51e9d0027"}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x3e0) 23:09:05 executing program 3: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x15, 0x0, 0x1, 0x0, 0x6, @multicast}, 0x14) clone(0x2000000082148180, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_STRSET_GET(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000640)={&(0x7f00000006c0)=ANY=[@ANYBLOB="cccd30", @ANYRES16=0x0, @ANYBLOB="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", @ANYRES32=0x0, @ANYBLOB="1400020069703667726574617030000000000000140002006970366572f370616e20000000000000fa0ee59a22b338aeb6d3895b934764e9a674c87f74b9c35aaa183a9ea95194a3dc40d9b230a9f627acae68e5f0381078395e744b4197fe3dd12112adacad625f6ae8e22901a3dd5920796e7dc087d5033e12c9e4aea2026a5df4ee89adbeda48287c2840149cf27af2cc0f064680a7b5e90f480b201f70326baca201fea21a0100000000000000"], 0x1cc}, 0x1, 0x0, 0x0, 0x8800}, 0x20040040) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) request_key(0x0, &(0x7f0000001ffb)={'syz', 0x1}, 0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x1004) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0x3, 0x380, 0x0, 0xe0, 0xe0, 0xe0, 0x0, 0x2e8, 0x2e8, 0x2e8, 0x2e8, 0x2e8, 0x7fffffe, 0x0, {[{{@uncond, 0x0, 0x70, 0xe0, 0x0, {0x6020000}}, @common=@unspec=@NFLOG={0x70, 'NFLOG\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, "a4bcf0ebf5d09e8706000000b1000000124ac31d4fda375c7794e420aa63529ebcf847246a5e8846085b0a30510b266347a84ae5ffea89b8654e4403c600"}}}, {{@ip={@local, @multicast1, 0x0, 0x0, '\x00', 'wg1\x00'}, 0x0, 0x1c8, 0x208, 0x0, {}, [@common=@inet=@hashlimit3={{0x158}, {'bridge_slave_1\x00', {0x0, 0x8, 0x0, 0x0, 0x0, 0x7fff, 0x8}}}]}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "29f0be44329ad4d94a815c71ad95092b933b5e380a7e5d3c56c51e9d0027"}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x3e0) 23:09:05 executing program 4: perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0xc7, 0x0, 0x0, 0x0, 0x0, 0x1, 0x80480, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x4000000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x12, 0xf7, 0x4, 0x3}, 0x40) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000700)={&(0x7f0000000000)=@in={0x2, 0x4e24, @multicast1}, 0x80, &(0x7f0000000680)=[{&(0x7f00000000c0)="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", 0xfc}, {&(0x7f0000000280)="53d7de2e44c3e093149ccf0495709502b55ba00639430f04454152722feeba47737768011085637c50f1e214a774d29398e811a26fe98c24ef20c13ce47020fdab9a05d119162d45a43930e8d0f80c24e7b9bdd853113a078ece47f3ced582bd8a2677e2e85ef339ff8c26401e189c7c7d2deb1f50485542eadfb4949df8643d69895addaff304019dab44e5e5f48f8bfb277f606a66d884f2ab0ee88ee73b7bc8c1649ff2e3c913cafedf16311fc8786e1269dfb8856c66b2a1facfd7f6b322c90c", 0xc2}, {&(0x7f0000000380)="18f5c8b645a11a959965d9bb010e37278cad7e015a2815074a6f2e22e3abac5b9272afee6894cd020a68654037ea7ff31e8271ccb9e6e61d5e27aff2661c02ced8bf09d32db5ea66a6038645213e5bc43a29e3", 0x53}, {&(0x7f0000000400)="f6d343559d2e58bfce1813609f095bf30606d0a165a76ca37208f1e68361137901cefb5e3585b2fde14811106b07b1835b65e48e16f001f73384c96dcb14778f7e8b5a0609dd9e9ef94059e58daf52b48be89ac157e3c4b984994694cdfaf974cbbf9030d8c05f291ed2494807", 0x6d}, {&(0x7f0000000480)="8544869978c4322c968274de0ba9e4255a6b02b6ac8aa4b02571b5cc49c506ba829beb56764773c539f1d5f569281cd630d1ef764195faca39b9d8ecd7f904109bc79475956c3af6154f0e1b286eee6f5f3a5ec3eb9a142eaf5258d0bd055bb08c748646404785a04d7f1cf4edc354ba5f6be7f91d", 0x75}, {&(0x7f0000000500)="0d50baa2e9e7a98d42bb926ae162faf995487339272a78add90e1dcd0f9610d4e6e522ba615850706cea9a05e342a17d7a8f17698cb4597bcd8d6638d4e6766a32a56cc82351145628d10038d0fa33e5a9b2583391673f63096077a7e1eece2f3bf7655d8168e47c24ef215d", 0x6c}, {&(0x7f0000000580)="a5d83c505e2ace01c4e47aa2e234ce4bc6ca0afdc2e5bedd0d1b409223c8c1d10199075f6d37283bfc59f665834412c90445acafba8345dacdf55378279e65477d0337abbd5b180df988571da9e09dbe56ad98e40ef5f64f5cf4486e6bf46f801a1b820e1ad6b7ae99ad932cd2df1fc618a6085310b9d4b3d35454c9eabf", 0x7e}, {&(0x7f0000000600)="99152bdcc36813433e73b0010e01ac2492314830bfeba26bec7e3460672fd8042592bd20558ae17964386eb533ee8ddf4cae3d3cef6ccc93427274f68911a448fb7293a0bbbb816677b75ac827c6ed4dd80c02c758f449277ed7f5cc780bd0f55e5127dd95dc38fa7487f9af2b361636b481726107", 0x75}], 0x8, &(0x7f00000001c0)}, 0x4080) 23:09:05 executing program 0: r0 = getpgrp(0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x24000000) r1 = gettid() perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000, 0x0, 0x2af}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000080), 0x30200, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) unshare(0x4000000) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r3, 0x0) r4 = syz_open_dev$cec(&(0x7f0000000300), 0x3, 0x2) preadv(r4, &(0x7f00000002c0)=[{&(0x7f00000001c0)=""/251, 0xfb}], 0x1, 0xda3, 0x400001) bpf$ITER_CREATE(0x21, &(0x7f0000000100)={r2}, 0x9) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x26, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = perf_event_open(&(0x7f00000006c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c44}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ID(r5, 0x80042407, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000140)={0x1, 0x80, 0x1, 0x7, 0x6, 0x0, 0x0, 0x2, 0x80200, 0xe, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x400, 0x1, @perf_bp={&(0x7f00000000c0), 0x8}, 0x18000, 0x8000, 0xfffffffc, 0x1, 0x1000000000, 0x8, 0x3, 0x0, 0x8, 0x0, 0x9}, r1, 0x2, r5, 0x2) clone(0x6cb2e100, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r1) wait4(0x0, 0x0, 0x0, 0x0) 23:09:05 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x15, 0x0, 0x1, 0x0, 0x6, @multicast}, 0x14) clone(0x2000000082148180, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_STRSET_GET(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000640)={0x0, 0x1cc}, 0x1, 0x0, 0x0, 0x8800}, 0x20040040) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) request_key(0x0, &(0x7f0000001ffb)={'syz', 0x1}, 0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x1004) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0x3, 0x380, 0x33d, 0xe0, 0xe0, 0xe0, 0x0, 0x2e8, 0x2e8, 0x2e8, 0x2e8, 0x2e8, 0x7fffffe, 0x0, {[{{@uncond, 0x0, 0x70, 0xe0, 0x0, {0x6020000}}, @common=@unspec=@NFLOG={0x70, 'NFLOG\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, "a4bcf0ebf5d09e8706580300b1000000124ac31d4fda375c7794e420aa63529ebcf847246a5e8846085b0a30510b266347a84ae5ffea89b8654e4400"}}}, {{@ip={@local, @multicast1, 0x0, 0x0, '\x00', 'wg1\x00'}, 0x0, 0x1c8, 0x208, 0x0, {}, [@common=@inet=@hashlimit3={{0x158}, {'bridge_slave_1\x00', {0x0, 0x8, 0x0, 0x0, 0x0, 0x7fff, 0x8}}}]}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "29f0be44329ad4d94a815c71ad95092b933b5e380a7e5d3c56c51e9d0027"}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x3e0) 23:09:05 executing program 2: r0 = getpgrp(0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x24000000) r1 = gettid() perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000080), 0x30200, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) unshare(0x4000000) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, r3, 0x0) preadv(0xffffffffffffffff, &(0x7f00000002c0)=[{&(0x7f00000001c0)=""/251, 0xfb}], 0x1, 0x0, 0x0) bpf$ITER_CREATE(0x21, &(0x7f0000000100)={r2}, 0x9) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x26, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = perf_event_open(&(0x7f00000006c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c44}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ID(r4, 0x80042407, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000140)={0x1, 0x80, 0x0, 0x7, 0x0, 0xff, 0x0, 0x2, 0x0, 0xe, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x400, 0x1, @perf_bp={&(0x7f00000000c0), 0x8}, 0x18000, 0x8000, 0xfffffffc, 0x1, 0x1000000000, 0x8, 0x3, 0x0, 0x8, 0x0, 0x9}, r1, 0x2, r4, 0x2) clone(0x6cb2e100, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r1) wait4(0x0, 0x0, 0x0, 0x0) 23:09:05 executing program 3: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x15, 0x0, 0x1, 0x0, 0x6, @multicast}, 0x14) clone(0x2000000082148180, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_STRSET_GET(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000640)={&(0x7f00000006c0)=ANY=[@ANYBLOB="cccd30", @ANYRES16=0x0, @ANYBLOB="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", @ANYRES32=0x0, @ANYBLOB="1400020069703667726574617030000000000000140002006970366572f370616e20000000000000fa0ee59a22b338aeb6d3895b934764e9a674c87f74b9c35aaa183a9ea95194a3dc40d9b230a9f627acae68e5f0381078395e744b4197fe3dd12112adacad625f6ae8e22901a3dd5920796e7dc087d5033e12c9e4aea2026a5df4ee89adbeda48287c2840149cf27af2cc0f064680a7b5e90f480b201f70326baca201fea21a0100000000000000"], 0x1cc}, 0x1, 0x0, 0x0, 0x8800}, 0x20040040) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) request_key(0x0, &(0x7f0000001ffb)={'syz', 0x1}, 0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x1004) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0x3, 0x380, 0x0, 0xe0, 0xe0, 0xe0, 0x0, 0x2e8, 0x2e8, 0x2e8, 0x2e8, 0x2e8, 0x7fffffe, 0x0, {[{{@uncond, 0x0, 0x70, 0xe0, 0x0, {0x6020000}}, @common=@unspec=@NFLOG={0x70, 'NFLOG\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, "a4bcf0ebf5d09e8706000000b1000000124ac31d4fda375c7794e420aa63529ebcf847246a5e8846085b0a30510b266347a84ae5ffea89b8654e4401c700"}}}, {{@ip={@local, @multicast1, 0x0, 0x0, '\x00', 'wg1\x00'}, 0x0, 0x1c8, 0x208, 0x0, {}, [@common=@inet=@hashlimit3={{0x158}, {'bridge_slave_1\x00', {0x0, 0x8, 0x0, 0x0, 0x0, 0x7fff, 0x8}}}]}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "29f0be44329ad4d94a815c71ad95092b933b5e380a7e5d3c56c51e9d0027"}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x3e0) 23:09:05 executing program 4: r0 = perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0xc7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80042407, &(0x7f00000000c0)) ioctl$BTRFS_IOC_DEFRAG(0xffffffffffffffff, 0x50009402, 0x0) write$binfmt_elf64(r0, &(0x7f0000000280)={{0x7f, 0x45, 0x4c, 0x46, 0x80, 0x7, 0x12, 0x3f, 0x1, 0x3, 0x6, 0xd1, 0x2e6, 0x40, 0x249, 0x0, 0x0, 0x38, 0x1, 0x8, 0x401}, [{0x3, 0x6, 0x5, 0x401, 0x661, 0x3, 0x8, 0x2}], "833813eaf364f586e93669d1f6fd7cfd6c4e18f5557d03eba01e6b74fb40b4b28a11a099e06690a987050206821ce194ec487bdcf92230b50211f586463cdb9fdfeb5f5ae956ada8117adeadab9128ab0a5d4bd4d20f822dc3957ca162760a4abdfee2d81c6d02c9a13e6dc868e4f9a7449ace0cd54a8d7e75b7bc4ec62c8c0b3e8185142d20d7daef64c94fd5eca4043f30fbfb074f33fc3d8a003c087018862b3576cc5f7dec71c1692d83caf6f76bc6e550fc1870613aa4806badc85dbc5c6b14d000a9654d488810322c701af5213cb8d8bc2f5ed013d0b8abc934ef7b4e633b187e5a745818520d2567", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0x764) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x12, 0xf7, 0x4, 0x3}, 0x40) 23:09:05 executing program 3: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x15, 0x0, 0x1, 0x0, 0x6, @multicast}, 0x14) clone(0x2000000082148180, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_STRSET_GET(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000640)={&(0x7f00000006c0)=ANY=[@ANYBLOB="cccd30", @ANYRES16=0x0, @ANYBLOB="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", @ANYRES32=0x0, @ANYBLOB="1400020069703667726574617030000000000000140002006970366572f370616e20000000000000fa0ee59a22b338aeb6d3895b934764e9a674c87f74b9c35aaa183a9ea95194a3dc40d9b230a9f627acae68e5f0381078395e744b4197fe3dd12112adacad625f6ae8e22901a3dd5920796e7dc087d5033e12c9e4aea2026a5df4ee89adbeda48287c2840149cf27af2cc0f064680a7b5e90f480b201f70326baca201fea21a0100000000000000"], 0x1cc}, 0x1, 0x0, 0x0, 0x8800}, 0x20040040) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) request_key(0x0, &(0x7f0000001ffb)={'syz', 0x1}, 0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x1004) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0x3, 0x380, 0x0, 0xe0, 0xe0, 0xe0, 0x0, 0x2e8, 0x2e8, 0x2e8, 0x2e8, 0x2e8, 0x7fffffe, 0x0, {[{{@uncond, 0x0, 0x70, 0xe0, 0x0, {0x6020000}}, @common=@unspec=@NFLOG={0x70, 'NFLOG\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, "a4bcf0ebf5d09e8706000000b1000000124ac31d4fda375c7794e420aa63529ebcf847246a5e8846085b0a30510b266347a84ae5ffea89b8654e4400c800"}}}, {{@ip={@local, @multicast1, 0x0, 0x0, '\x00', 'wg1\x00'}, 0x0, 0x1c8, 0x208, 0x0, {}, [@common=@inet=@hashlimit3={{0x158}, {'bridge_slave_1\x00', {0x0, 0x8, 0x0, 0x0, 0x0, 0x7fff, 0x8}}}]}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "29f0be44329ad4d94a815c71ad95092b933b5e380a7e5d3c56c51e9d0027"}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x3e0) 23:09:05 executing program 1: ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000001c0)={'team0\x00', 0x0}) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000680)={0xffffffffffffffff, 0x10, &(0x7f0000000640)={&(0x7f0000000780)=""/4096, 0x1000, 0x0}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000001780)={0x8, 0x7, &(0x7f0000001800)=ANY=[@ANYBLOB="180000009d57000000000000060000001832000005000000000000000000000495000000000000005c150400010000009500000000434e0dae2ef63aab6acde18cddf77c67000000"], &(0x7f0000000180)='GPL\x00', 0x2, 0x0, 0x0, 0x41100, 0xd, '\x00', r0, 0x1d, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x6, 0x5}, 0x8, 0x10, &(0x7f0000000600)={0x5, 0x0, 0x0, 0x10001}, 0x10, r1}, 0x78) r2 = getpgrp(0x0) prctl$PR_SET_PTRACER(0x59616d61, r2) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x24000000) r3 = gettid() perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x2100, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x4}, 0x0, 0x8}, 0x0, 0x8, 0xffffffffffffffff, 0x9) clone(0x6cb2e100, 0x0, 0x0, 0x0, 0x0) r4 = openat$rtc(0xffffffffffffff9c, &(0x7f00000168c0), 0x0, 0x0) ioctl$RTC_UIE_ON(r4, 0x7003) clone(0x59040000, &(0x7f0000000200)="32b026bb2bd5ab05345d05868d1008feb1352fb452659a55b2c8650d5c3b8d9896f83163af0908ddf225ca94e880899df94150b94cce61a62255c2da294ef09dd6df955a8b10081fc4491edeff6bdea1f408c84f564a1702f2429d4ed091a3ef6bb7002cdeb2cb9790f44b23c402166d7ced3ecafcbc5a046b763517bf35421cba1dc4f3b4a67d3882fcad4bd680d79d963ee7d31048c06d6a09d69830d36d80e15be2156e695858a0937e49a60e4623fca37ffd32972d2555bb01a4c5c57e4e6c39ec93e0887c3ed39a172ca646bc8514bdb64ddceb12d7d09546d0c5d8c9fe33f4296409029503d314e0", &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="99d1c32534d9de00af8729fa460ec9d5628744ffe3cb327edbe5d45fed028bf303c434286297cbfe9f121b1bc94969fa74f64c4cb8a1d40cadfe5d1afe1911de07770c57e37c225c0843887e02f6881c533230e4a3d43275e9cd079068012291e77d44bf1f4398518c9d64ae643b1ebff18fb2d4d632098a07dd40847a76374a4a01df2f34c001369ba9b86499548cbb8ce4cda4ae5179f35c9feb4de592a550f357f89d1660d711fac0e2a8") ioctl$RTC_SET_TIME(r4, 0x4024700a, &(0x7f0000000000)={0x0, 0x0, 0x0, 0xf, 0x0, 0xfd}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000001940)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000006c0)={&(0x7f0000001880)=@dellinkprop={0xb0, 0x6d, 0x20, 0x70bd28, 0x25dfdbff, {0x0, 0x0, 0x0, 0x0, 0x210, 0xc0018}, [@IFLA_TARGET_NETNSID={0x8, 0x2e, 0x2}, @IFLA_MASTER={0x8}, @IFLA_AF_SPEC={0x70, 0x1a, 0x0, 0x1, [@AF_MPLS={0x4}, @AF_MPLS={0x4}, @AF_INET6={0x28, 0xa, 0x0, 0x1, [@IFLA_INET6_ADDR_GEN_MODE={0x5, 0x8, 0x6b}, @IFLA_INET6_TOKEN={0x14, 0x7, @mcast2}, @IFLA_INET6_ADDR_GEN_MODE={0x5, 0x8, 0x7}]}, @AF_MPLS={0x4}, @AF_INET6={0x28, 0xa, 0x0, 0x1, [@IFLA_INET6_ADDR_GEN_MODE={0x5, 0x8, 0x8}, @IFLA_INET6_ADDR_GEN_MODE={0x5, 0x8, 0x56}, @IFLA_INET6_TOKEN={0x14, 0x7, @ipv4={'\x00', '\xff\xff', @local}}]}, @AF_MPLS={0x4}, @AF_INET6={0xc, 0xa, 0x0, 0x1, [@IFLA_INET6_ADDR_GEN_MODE={0x5, 0x8, 0x9}]}]}, @IFLA_IFALIASn={0x4}, @IFLA_PHYS_PORT_ID={0xb, 0x22, "3df17141c4e8d5"}]}, 0xb0}, 0x1, 0x0, 0x0, 0x4000001}, 0x84000) clone(0x2908000, &(0x7f0000000080)="6028d78584a9523ff3b18b3c7f86b0f46595537c62f1f47ca39e4ff27666a38078b3617669c736e28539aa28b2d44ceec9dc0c3a4d3dd6d901efcff839fc776cc0790c", &(0x7f0000000140), &(0x7f0000000440), &(0x7f0000000480)="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") ptrace(0x10, r3) wait4(0x0, 0x0, 0x0, 0x0) 23:09:05 executing program 4: perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0xc7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f0000000040)) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x12, 0xf7, 0x4, 0x3}, 0x40) 23:09:05 executing program 3: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x15, 0x0, 0x1, 0x0, 0x6, @multicast}, 0x14) clone(0x2000000082148180, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_STRSET_GET(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000640)={&(0x7f00000006c0)=ANY=[@ANYBLOB="cccd30", @ANYRES16=0x0, @ANYBLOB="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", @ANYRES32=0x0, @ANYBLOB="1400020069703667726574617030000000000000140002006970366572f370616e20000000000000fa0ee59a22b338aeb6d3895b934764e9a674c87f74b9c35aaa183a9ea95194a3dc40d9b230a9f627acae68e5f0381078395e744b4197fe3dd12112adacad625f6ae8e22901a3dd5920796e7dc087d5033e12c9e4aea2026a5df4ee89adbeda48287c2840149cf27af2cc0f064680a7b5e90f480b201f70326baca201fea21a0100000000000000"], 0x1cc}, 0x1, 0x0, 0x0, 0x8800}, 0x20040040) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) request_key(0x0, &(0x7f0000001ffb)={'syz', 0x1}, 0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x1004) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0x3, 0x380, 0x0, 0xe0, 0xe0, 0xe0, 0x0, 0x2e8, 0x2e8, 0x2e8, 0x2e8, 0x2e8, 0x7fffffe, 0x0, {[{{@uncond, 0x0, 0x70, 0xe0, 0x0, {0x6020000}}, @common=@unspec=@NFLOG={0x70, 'NFLOG\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, "a4bcf0ebf5d09e8706000000b1000000124ac31d4fda375c7794e420aa63529ebcf847246a5e8846085b0a30510b266347a84ae5ffea89b8654e4402ce00"}}}, {{@ip={@local, @multicast1, 0x0, 0x0, '\x00', 'wg1\x00'}, 0x0, 0x1c8, 0x208, 0x0, {}, [@common=@inet=@hashlimit3={{0x158}, {'bridge_slave_1\x00', {0x0, 0x8, 0x0, 0x0, 0x0, 0x7fff, 0x8}}}]}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "29f0be44329ad4d94a815c71ad95092b933b5e380a7e5d3c56c51e9d0027"}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x3e0) 23:09:06 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x12, 0xf7, 0x4, 0x3}, 0x40) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x12, 0xf7, 0x4, 0x3}, 0x40) bpf$BPF_GET_MAP_INFO(0x3, &(0x7f0000000040)={r1, 0x26, &(0x7f0000000180)}, 0x10) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x8, 0x4010, r1, 0xefe15000) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendmsg$MPTCP_PM_CMD_GET_LIMITS(r0, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB='t\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="08002771915e90dbdf25060000000800020005000000480001800600010002000000a0000700", @ANYRES32=0x0, @ANYBLOB="08000300e000000105000200070000001400040000000000000000000000ffffac1e01010800060001000000050002000200000008000200000000000800020006000000"], 0x74}, 0x1, 0x0, 0x0, 0x24004000}, 0x0) ioctl$USBDEVFS_FREE_STREAMS(r0, 0x8008551d, &(0x7f00000001c0)={0x1365, 0x9, [{0x9, 0x1}, {}, {0x8}, {0x5}, {0x8, 0x1}, {0x3, 0x1}, {0xe, 0x1}, {0x4}, {0xc}]}) 23:09:06 executing program 1: ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000001c0)={'team0\x00', 0x0}) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000680)={0xffffffffffffffff, 0x10, &(0x7f0000000640)={&(0x7f0000000780)=""/4096, 0x1000, 0x0}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000001780)={0x8, 0x7, &(0x7f0000001800)=ANY=[@ANYBLOB="180000009d57000000000000060000001832000005000000000000000000000495000000000000005c150400010000009500000000434e0dae2ef63aab6acde18cddf77c67000000"], &(0x7f0000000180)='GPL\x00', 0x2, 0x0, 0x0, 0x41100, 0xd, '\x00', r0, 0x1d, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x6, 0x5}, 0x8, 0x10, &(0x7f0000000600)={0x5, 0x0, 0x0, 0x10001}, 0x10, r1}, 0x78) r2 = getpgrp(0x0) prctl$PR_SET_PTRACER(0x59616d61, r2) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x24000000) r3 = gettid() perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x2100, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x4}, 0x0, 0x8}, 0x0, 0x8, 0xffffffffffffffff, 0x9) clone(0x6cb2e100, 0x0, 0x0, 0x0, 0x0) r4 = openat$rtc(0xffffffffffffff9c, &(0x7f00000168c0), 0x0, 0x0) ioctl$RTC_UIE_ON(r4, 0x7003) clone(0x59040000, &(0x7f0000000200)="32b026bb2bd5ab05345d05868d1008feb1352fb452659a55b2c8650d5c3b8d9896f83163af0908ddf225ca94e880899df94150b94cce61a62255c2da294ef09dd6df955a8b10081fc4491edeff6bdea1f408c84f564a1702f2429d4ed091a3ef6bb7002cdeb2cb9790f44b23c402166d7ced3ecafcbc5a046b763517bf35421cba1dc4f3b4a67d3882fcad4bd680d79d963ee7d31048c06d6a09d69830d36d80e15be2156e695858a0937e49a60e4623fca37ffd32972d2555bb01a4c5c57e4e6c39ec93e0887c3ed39a172ca646bc8514bdb64ddceb12d7d09546d0c5d8c9fe33f4296409029503d314e0", &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="99d1c32534d9de00af8729fa460ec9d5628744ffe3cb327edbe5d45fed028bf303c434286297cbfe9f121b1bc94969fa74f64c4cb8a1d40cadfe5d1afe1911de07770c57e37c225c0843887e02f6881c533230e4a3d43275e9cd079068012291e77d44bf1f4398518c9d64ae643b1ebff18fb2d4d632098a07dd40847a76374a4a01df2f34c001369ba9b86499548cbb8ce4cda4ae5179f35c9feb4de592a550f357f89d1660d711fac0e2a8") ioctl$RTC_SET_TIME(r4, 0x4024700a, &(0x7f0000000000)={0x0, 0x0, 0x0, 0xf, 0x0, 0xfd}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000001940)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000006c0)={&(0x7f0000001880)=@dellinkprop={0xb0, 0x6d, 0x20, 0x70bd28, 0x25dfdbff, {0x0, 0x0, 0x0, 0x0, 0x210, 0xc0018}, [@IFLA_TARGET_NETNSID={0x8, 0x2e, 0x2}, @IFLA_MASTER={0x8}, @IFLA_AF_SPEC={0x70, 0x1a, 0x0, 0x1, [@AF_MPLS={0x4}, @AF_MPLS={0x4}, @AF_INET6={0x28, 0xa, 0x0, 0x1, [@IFLA_INET6_ADDR_GEN_MODE={0x5, 0x8, 0x6b}, @IFLA_INET6_TOKEN={0x14, 0x7, @mcast2}, @IFLA_INET6_ADDR_GEN_MODE={0x5, 0x8, 0x7}]}, @AF_MPLS={0x4}, @AF_INET6={0x28, 0xa, 0x0, 0x1, [@IFLA_INET6_ADDR_GEN_MODE={0x5, 0x8, 0x8}, @IFLA_INET6_ADDR_GEN_MODE={0x5, 0x8, 0x56}, @IFLA_INET6_TOKEN={0x14, 0x7, @ipv4={'\x00', '\xff\xff', @local}}]}, @AF_MPLS={0x4}, @AF_INET6={0xc, 0xa, 0x0, 0x1, [@IFLA_INET6_ADDR_GEN_MODE={0x5, 0x8, 0x9}]}]}, @IFLA_IFALIASn={0x4}, @IFLA_PHYS_PORT_ID={0xb, 0x22, "3df17141c4e8d5"}]}, 0xb0}, 0x1, 0x0, 0x0, 0x4000001}, 0x84000) clone(0x2908000, &(0x7f0000000080)="6028d78584a9523ff3b18b3c7f86b0f46595537c62f1f47ca39e4ff27666a38078b3617669c736e28539aa28b2d44ceec9dc0c3a4d3dd6d901efcff839fc776cc0790c", &(0x7f0000000140), &(0x7f0000000440), &(0x7f0000000480)="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") ptrace(0x10, r3) wait4(0x0, 0x0, 0x0, 0x0) 23:09:06 executing program 4: r0 = perf_event_open(&(0x7f00000006c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c44}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ID(r0, 0x80042407, &(0x7f00000000c0)) ioctl$INCFS_IOC_READ_FILE_SIGNATURE(r0, 0x8010671f, &(0x7f00000000c0)={&(0x7f0000000000)=""/94, 0x5e}) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0xc7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x12, 0xf7, 0x4, 0x3}, 0x40) 23:09:08 executing program 0: r0 = getpgrp(0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x24000000) r1 = gettid() perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000, 0x0, 0x2af}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000080), 0x30200, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) unshare(0x4000000) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r3, 0x0) r4 = syz_open_dev$cec(&(0x7f0000000300), 0x3, 0x2) preadv(r4, &(0x7f00000002c0)=[{&(0x7f00000001c0)=""/251, 0xfb}], 0x1, 0xda3, 0x400001) bpf$ITER_CREATE(0x21, &(0x7f0000000100)={r2}, 0x9) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x26, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = perf_event_open(&(0x7f00000006c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c44}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ID(r5, 0x80042407, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000140)={0x1, 0x80, 0x1, 0x7, 0x6, 0x0, 0x0, 0x2, 0x80200, 0xe, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x400, 0x1, @perf_bp={&(0x7f00000000c0), 0x8}, 0x18000, 0x8000, 0xfffffffc, 0x1, 0x1000000000, 0x8, 0x3, 0x0, 0x8, 0x0, 0x9}, r1, 0x2, r5, 0x2) clone(0x6cb2e100, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r1) wait4(0x0, 0x0, 0x0, 0x0) 23:09:08 executing program 2: r0 = getpgrp(0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x24000000) r1 = gettid() perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000080), 0x30200, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) unshare(0x4000000) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, r3, 0x0) preadv(0xffffffffffffffff, &(0x7f00000002c0)=[{&(0x7f00000001c0)=""/251, 0xfb}], 0x1, 0x0, 0x0) bpf$ITER_CREATE(0x21, &(0x7f0000000100)={r2}, 0x9) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x26, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = perf_event_open(&(0x7f00000006c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c44}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ID(r4, 0x80042407, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000140)={0x1, 0x80, 0x0, 0x7, 0x0, 0xff, 0x0, 0x2, 0x0, 0xe, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x400, 0x1, @perf_bp={&(0x7f00000000c0), 0x8}, 0x18000, 0x8000, 0xfffffffc, 0x1, 0x1000000000, 0x8, 0x3, 0x0, 0x8, 0x0, 0x9}, r1, 0x2, r4, 0x2) clone(0x6cb2e100, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r1) wait4(0x0, 0x0, 0x0, 0x0) 23:09:08 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x15, 0x0, 0x1, 0x0, 0x6, @multicast}, 0x14) clone(0x2000000082148180, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_STRSET_GET(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000640)={0x0, 0x1cc}, 0x1, 0x0, 0x0, 0x8800}, 0x20040040) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) request_key(0x0, &(0x7f0000001ffb)={'syz', 0x1}, 0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x1004) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0x3, 0x380, 0x342, 0xe0, 0xe0, 0xe0, 0x0, 0x2e8, 0x2e8, 0x2e8, 0x2e8, 0x2e8, 0x7fffffe, 0x0, {[{{@uncond, 0x0, 0x70, 0xe0, 0x0, {0x6020000}}, @common=@unspec=@NFLOG={0x70, 'NFLOG\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, "a4bcf0ebf5d09e8706580300b1000000124ac31d4fda375c7794e420aa63529ebcf847246a5e8846085b0a30510b266347a84ae5ffea89b8654e4400"}}}, {{@ip={@local, @multicast1, 0x0, 0x0, '\x00', 'wg1\x00'}, 0x0, 0x1c8, 0x208, 0x0, {}, [@common=@inet=@hashlimit3={{0x158}, {'bridge_slave_1\x00', {0x0, 0x8, 0x0, 0x0, 0x0, 0x7fff, 0x8}}}]}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "29f0be44329ad4d94a815c71ad95092b933b5e380a7e5d3c56c51e9d0027"}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x3e0) 23:09:08 executing program 3: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x15, 0x0, 0x1, 0x0, 0x6, @multicast}, 0x14) clone(0x2000000082148180, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_STRSET_GET(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000640)={&(0x7f00000006c0)=ANY=[@ANYBLOB="cccd30", @ANYRES16=0x0, @ANYBLOB="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", @ANYRES32=0x0, @ANYBLOB="1400020069703667726574617030000000000000140002006970366572f370616e20000000000000fa0ee59a22b338aeb6d3895b934764e9a674c87f74b9c35aaa183a9ea95194a3dc40d9b230a9f627acae68e5f0381078395e744b4197fe3dd12112adacad625f6ae8e22901a3dd5920796e7dc087d5033e12c9e4aea2026a5df4ee89adbeda48287c2840149cf27af2cc0f064680a7b5e90f480b201f70326baca201fea21a0100000000000000"], 0x1cc}, 0x1, 0x0, 0x0, 0x8800}, 0x20040040) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) request_key(0x0, &(0x7f0000001ffb)={'syz', 0x1}, 0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x1004) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0x3, 0x380, 0x0, 0xe0, 0xe0, 0xe0, 0x0, 0x2e8, 0x2e8, 0x2e8, 0x2e8, 0x2e8, 0x7fffffe, 0x0, {[{{@uncond, 0x0, 0x70, 0xe0, 0x0, {0x6020000}}, @common=@unspec=@NFLOG={0x70, 'NFLOG\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, "a4bcf0ebf5d09e8706000000b1000000124ac31d4fda375c7794e420aa63529ebcf847246a5e8846085b0a30510b266347a84ae5ffea89b8654e4403d400"}}}, {{@ip={@local, @multicast1, 0x0, 0x0, '\x00', 'wg1\x00'}, 0x0, 0x1c8, 0x208, 0x0, {}, [@common=@inet=@hashlimit3={{0x158}, {'bridge_slave_1\x00', {0x0, 0x8, 0x0, 0x0, 0x0, 0x7fff, 0x8}}}]}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "29f0be44329ad4d94a815c71ad95092b933b5e380a7e5d3c56c51e9d0027"}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x3e0) 23:09:08 executing program 4: perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0xc7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f00000006c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c44}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) openat$cgroup_ro(r1, &(0x7f0000000040)='cpuacct.usage_sys\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_ID(r0, 0x80042407, &(0x7f00000000c0)) r2 = perf_event_open(&(0x7f00000006c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c44}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ID(r2, 0x80042407, &(0x7f00000000c0)) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r2) r3 = perf_event_open(&(0x7f00000006c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c44}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ID(r3, 0x80042407, &(0x7f00000000c0)) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x40082406, &(0x7f0000000580)='(\x00') bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x12, 0xf7, 0x4, 0x3}, 0x40) perf_event_open(&(0x7f00000000c0)={0x3, 0x80, 0x1f, 0x8, 0x20, 0x7, 0x0, 0x289, 0x1, 0x2, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x74e1, 0x4, @perf_bp={&(0x7f0000000000), 0x1}, 0x40050, 0x2, 0xffffffff, 0x1, 0x40, 0x3ff, 0x9, 0x0, 0x6, 0x0, 0x200}, 0xffffffffffffffff, 0x2, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000500)={0xffffffffffffffff, 0x0, 0xd5, 0xf3, &(0x7f0000000280)="5bddfcbf338e30cf457fb53200e65a379ae64a82eda14f499498b19054e7f3adea118481fb00e35d6fa6cecb603637f2634974155c73e4d83b7d302ffc542c4687342953a66905d74643ef95ab5c09ceda02617eac01eb9e55290999ff6c05a65447dfda5f0ea8cba318768235bb79cd24ee102c43582eff0ba5d5efbffe3728ddbe2a2287c4c2bc3d17c963737e1ed77cd785a15fbe59f3133ab4a7de6b1d35773d7d5c49abb5d9283cc299a838b756fe316c840972815a976819ce5725ae66cf104ade09d5694e32aff761d9a6cbe016ce2398f8", &(0x7f0000000380)=""/243, 0xffff, 0x0, 0xb9, 0x60, &(0x7f0000000140)="ce8cf57b546d914f8956c6c484f6b51dd434b7b921adf6e9e6c42626e08c6a6611b800e97a5b2f860d796338bf29b837c8644b5efe05e30193b485b4956ac182a605f936199fb617ac2a898b1cfd3aff1a8a9119bb046a8292303af54c4cd7148cfc7cdefbde49fc7ec18a1d78c7b7ef788ed14a54c7d0b6f12faa34b707441ba7b5c1ef996b9d3993f37a8cfad6a6340239d5d2a7ca9376d3ccb35cc9bc952efa3d3cb5c52a9e7ae5bde1ff48d715c0f0c594116deb60f44c", &(0x7f0000000480)="717cf2dd9728280f5b64249d8a071b63e93db065e8981590b5d2d2ada76af0f04ec9566452ccdbc70e21ab1927dd3c65dc3084c5c385c07db4392a01d410ccc2c96ec032674ce4aecd0e500a2f159523fe71ec2abf1f8905753704484893d021", 0x1, 0x5}, 0x48) 23:09:08 executing program 3: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x15, 0x0, 0x1, 0x0, 0x6, @multicast}, 0x14) clone(0x2000000082148180, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_STRSET_GET(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000640)={&(0x7f00000006c0)=ANY=[@ANYBLOB="cccd30", @ANYRES16=0x0, @ANYBLOB="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", @ANYRES32=0x0, @ANYBLOB="1400020069703667726574617030000000000000140002006970366572f370616e20000000000000fa0ee59a22b338aeb6d3895b934764e9a674c87f74b9c35aaa183a9ea95194a3dc40d9b230a9f627acae68e5f0381078395e744b4197fe3dd12112adacad625f6ae8e22901a3dd5920796e7dc087d5033e12c9e4aea2026a5df4ee89adbeda48287c2840149cf27af2cc0f064680a7b5e90f480b201f70326baca201fea21a0100000000000000"], 0x1cc}, 0x1, 0x0, 0x0, 0x8800}, 0x20040040) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) request_key(0x0, &(0x7f0000001ffb)={'syz', 0x1}, 0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x1004) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0x3, 0x380, 0x0, 0xe0, 0xe0, 0xe0, 0x0, 0x2e8, 0x2e8, 0x2e8, 0x2e8, 0x2e8, 0x7fffffe, 0x0, {[{{@uncond, 0x0, 0x70, 0xe0, 0x0, {0x6020000}}, @common=@unspec=@NFLOG={0x70, 'NFLOG\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, "a4bcf0ebf5d09e8706000000b1000000124ac31d4fda375c7794e420aa63529ebcf847246a5e8846085b0a30510b266347a84ae5ffea89b8654e4403da00"}}}, {{@ip={@local, @multicast1, 0x0, 0x0, '\x00', 'wg1\x00'}, 0x0, 0x1c8, 0x208, 0x0, {}, [@common=@inet=@hashlimit3={{0x158}, {'bridge_slave_1\x00', {0x0, 0x8, 0x0, 0x0, 0x0, 0x7fff, 0x8}}}]}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "29f0be44329ad4d94a815c71ad95092b933b5e380a7e5d3c56c51e9d0027"}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x3e0) 23:09:08 executing program 2: r0 = getpgrp(0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x24000000) r1 = gettid() perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000080), 0x30200, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) unshare(0x4000000) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, r3, 0x0) preadv(0xffffffffffffffff, &(0x7f00000002c0)=[{&(0x7f00000001c0)=""/251, 0xfb}], 0x1, 0x0, 0x0) bpf$ITER_CREATE(0x21, &(0x7f0000000100)={r2}, 0x9) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x26, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = perf_event_open(&(0x7f00000006c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c44}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ID(r4, 0x80042407, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000140)={0x1, 0x80, 0x0, 0x7, 0x0, 0xff, 0x0, 0x2, 0x0, 0xe, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x400, 0x1, @perf_bp={&(0x7f00000000c0), 0x8}, 0x18000, 0x8000, 0xfffffffc, 0x1, 0x1000000000, 0x8, 0x3, 0x0, 0x8, 0x0, 0x9}, r1, 0x2, r4, 0x2) clone(0x6cb2e100, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r1) wait4(0x0, 0x0, 0x0, 0x0) 23:09:08 executing program 4: perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0xc7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x1c, 0xf7, 0x4, 0x3, 0x0, 0xffffffffffffffff, 0x1, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x40) 23:09:08 executing program 3: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x15, 0x0, 0x1, 0x0, 0x6, @multicast}, 0x14) clone(0x2000000082148180, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_STRSET_GET(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000640)={&(0x7f00000006c0)=ANY=[@ANYBLOB="cccd30", @ANYRES16=0x0, @ANYBLOB="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", @ANYRES32=0x0, @ANYBLOB="1400020069703667726574617030000000000000140002006970366572f370616e20000000000000fa0ee59a22b338aeb6d3895b934764e9a674c87f74b9c35aaa183a9ea95194a3dc40d9b230a9f627acae68e5f0381078395e744b4197fe3dd12112adacad625f6ae8e22901a3dd5920796e7dc087d5033e12c9e4aea2026a5df4ee89adbeda48287c2840149cf27af2cc0f064680a7b5e90f480b201f70326baca201fea21a0100000000000000"], 0x1cc}, 0x1, 0x0, 0x0, 0x8800}, 0x20040040) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) request_key(0x0, &(0x7f0000001ffb)={'syz', 0x1}, 0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x1004) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0x3, 0x380, 0x0, 0xe0, 0xe0, 0xe0, 0x0, 0x2e8, 0x2e8, 0x2e8, 0x2e8, 0x2e8, 0x7fffffe, 0x0, {[{{@uncond, 0x0, 0x70, 0xe0, 0x0, {0x6020000}}, @common=@unspec=@NFLOG={0x70, 'NFLOG\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, "a4bcf0ebf5d09e8706000000b1000000124ac31d4fda375c7794e420aa63529ebcf847246a5e8846085b0a30510b266347a84ae5ffea89b8654e4400e000"}}}, {{@ip={@local, @multicast1, 0x0, 0x0, '\x00', 'wg1\x00'}, 0x0, 0x1c8, 0x208, 0x0, {}, [@common=@inet=@hashlimit3={{0x158}, {'bridge_slave_1\x00', {0x0, 0x8, 0x0, 0x0, 0x0, 0x7fff, 0x8}}}]}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "29f0be44329ad4d94a815c71ad95092b933b5e380a7e5d3c56c51e9d0027"}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x3e0) 23:09:08 executing program 4: perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0xc7, 0x0, 0xc0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x12, 0xf7, 0x4, 0x3}, 0x40) 23:09:09 executing program 1: ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000001c0)={'team0\x00', 0x0}) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000680)={0xffffffffffffffff, 0x10, &(0x7f0000000640)={&(0x7f0000000780)=""/4096, 0x1000, 0x0}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000001780)={0x8, 0x7, &(0x7f0000001800)=ANY=[@ANYBLOB="180000009d57000000000000060000001832000005000000000000000000000495000000000000005c150400010000009500000000434e0dae2ef63aab6acde18cddf77c67000000"], &(0x7f0000000180)='GPL\x00', 0x2, 0x0, 0x0, 0x41100, 0xd, '\x00', r0, 0x1d, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x6, 0x5}, 0x8, 0x10, &(0x7f0000000600)={0x5, 0x0, 0x0, 0x10001}, 0x10, r1}, 0x78) r2 = getpgrp(0x0) prctl$PR_SET_PTRACER(0x59616d61, r2) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x24000000) r3 = gettid() perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x2100, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x4}, 0x0, 0x8}, 0x0, 0x8, 0xffffffffffffffff, 0x9) clone(0x6cb2e100, 0x0, 0x0, 0x0, 0x0) r4 = openat$rtc(0xffffffffffffff9c, &(0x7f00000168c0), 0x0, 0x0) ioctl$RTC_UIE_ON(r4, 0x7003) clone(0x59040000, &(0x7f0000000200)="32b026bb2bd5ab05345d05868d1008feb1352fb452659a55b2c8650d5c3b8d9896f83163af0908ddf225ca94e880899df94150b94cce61a62255c2da294ef09dd6df955a8b10081fc4491edeff6bdea1f408c84f564a1702f2429d4ed091a3ef6bb7002cdeb2cb9790f44b23c402166d7ced3ecafcbc5a046b763517bf35421cba1dc4f3b4a67d3882fcad4bd680d79d963ee7d31048c06d6a09d69830d36d80e15be2156e695858a0937e49a60e4623fca37ffd32972d2555bb01a4c5c57e4e6c39ec93e0887c3ed39a172ca646bc8514bdb64ddceb12d7d09546d0c5d8c9fe33f4296409029503d314e0", &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="99d1c32534d9de00af8729fa460ec9d5628744ffe3cb327edbe5d45fed028bf303c434286297cbfe9f121b1bc94969fa74f64c4cb8a1d40cadfe5d1afe1911de07770c57e37c225c0843887e02f6881c533230e4a3d43275e9cd079068012291e77d44bf1f4398518c9d64ae643b1ebff18fb2d4d632098a07dd40847a76374a4a01df2f34c001369ba9b86499548cbb8ce4cda4ae5179f35c9feb4de592a550f357f89d1660d711fac0e2a8") sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x9efef75f}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvlan={{0xc}, {0x4}}}, @IFLA_LINK={0x8}]}, 0x3c}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000001940)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000006c0)={&(0x7f0000001880)=@dellinkprop={0xb0, 0x6d, 0x20, 0x70bd28, 0x25dfdbff, {0x0, 0x0, 0x0, 0x0, 0x210, 0xc0018}, [@IFLA_TARGET_NETNSID={0x8, 0x2e, 0x2}, @IFLA_MASTER={0x8}, @IFLA_AF_SPEC={0x70, 0x1a, 0x0, 0x1, [@AF_MPLS={0x4}, @AF_MPLS={0x4}, @AF_INET6={0x28, 0xa, 0x0, 0x1, [@IFLA_INET6_ADDR_GEN_MODE={0x5, 0x8, 0x6b}, @IFLA_INET6_TOKEN={0x14, 0x7, @mcast2}, @IFLA_INET6_ADDR_GEN_MODE={0x5, 0x8, 0x7}]}, @AF_MPLS={0x4}, @AF_INET6={0x28, 0xa, 0x0, 0x1, [@IFLA_INET6_ADDR_GEN_MODE={0x5, 0x8, 0x8}, @IFLA_INET6_ADDR_GEN_MODE={0x5, 0x8, 0x56}, @IFLA_INET6_TOKEN={0x14, 0x7, @ipv4={'\x00', '\xff\xff', @local}}]}, @AF_MPLS={0x4}, @AF_INET6={0xc, 0xa, 0x0, 0x1, [@IFLA_INET6_ADDR_GEN_MODE={0x5, 0x8, 0x9}]}]}, @IFLA_IFALIASn={0x4}, @IFLA_PHYS_PORT_ID={0xb, 0x22, "3df17141c4e8d5"}]}, 0xb0}, 0x1, 0x0, 0x0, 0x4000001}, 0x84000) clone(0x2908000, &(0x7f0000000080)="6028d78584a9523ff3b18b3c7f86b0f46595537c62f1f47ca39e4ff27666a38078b3617669c736e28539aa28b2d44ceec9dc0c3a4d3dd6d901efcff839fc776cc0790c", &(0x7f0000000140), &(0x7f0000000440), &(0x7f0000000480)="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") ptrace(0x10, r3) wait4(0x0, 0x0, 0x0, 0x0) 23:09:09 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x15, 0x0, 0x1, 0x0, 0x6, @multicast}, 0x14) clone(0x2000000082148180, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_STRSET_GET(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000640)={0x0, 0x1cc}, 0x1, 0x0, 0x0, 0x8800}, 0x20040040) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) request_key(0x0, &(0x7f0000001ffb)={'syz', 0x1}, 0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x1004) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0x3, 0x380, 0x3a3, 0xe0, 0xe0, 0xe0, 0x0, 0x2e8, 0x2e8, 0x2e8, 0x2e8, 0x2e8, 0x7fffffe, 0x0, {[{{@uncond, 0x0, 0x70, 0xe0, 0x0, {0x6020000}}, @common=@unspec=@NFLOG={0x70, 'NFLOG\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, "a4bcf0ebf5d09e8706580300b1000000124ac31d4fda375c7794e420aa63529ebcf847246a5e8846085b0a30510b266347a84ae5ffea89b8654e4400"}}}, {{@ip={@local, @multicast1, 0x0, 0x0, '\x00', 'wg1\x00'}, 0x0, 0x1c8, 0x208, 0x0, {}, [@common=@inet=@hashlimit3={{0x158}, {'bridge_slave_1\x00', {0x0, 0x8, 0x0, 0x0, 0x0, 0x7fff, 0x8}}}]}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "29f0be44329ad4d94a815c71ad95092b933b5e380a7e5d3c56c51e9d0027"}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x3e0) 23:09:11 executing program 3: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x15, 0x0, 0x1, 0x0, 0x6, @multicast}, 0x14) clone(0x2000000082148180, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_STRSET_GET(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000640)={&(0x7f00000006c0)=ANY=[@ANYBLOB="cccd30", @ANYRES16=0x0, @ANYBLOB="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", @ANYRES32=0x0, @ANYBLOB="1400020069703667726574617030000000000000140002006970366572f370616e20000000000000fa0ee59a22b338aeb6d3895b934764e9a674c87f74b9c35aaa183a9ea95194a3dc40d9b230a9f627acae68e5f0381078395e744b4197fe3dd12112adacad625f6ae8e22901a3dd5920796e7dc087d5033e12c9e4aea2026a5df4ee89adbeda48287c2840149cf27af2cc0f064680a7b5e90f480b201f70326baca201fea21a0100000000000000"], 0x1cc}, 0x1, 0x0, 0x0, 0x8800}, 0x20040040) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) request_key(0x0, &(0x7f0000001ffb)={'syz', 0x1}, 0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x1004) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0x3, 0x380, 0x0, 0xe0, 0xe0, 0xe0, 0x0, 0x2e8, 0x2e8, 0x2e8, 0x2e8, 0x2e8, 0x7fffffe, 0x0, {[{{@uncond, 0x0, 0x70, 0xe0, 0x0, {0x6020000}}, @common=@unspec=@NFLOG={0x70, 'NFLOG\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, "a4bcf0ebf5d09e8706000000b1000000124ac31d4fda375c7794e420aa63529ebcf847246a5e8846085b0a30510b266347a84ae5ffea89b8654e4403e000"}}}, {{@ip={@local, @multicast1, 0x0, 0x0, '\x00', 'wg1\x00'}, 0x0, 0x1c8, 0x208, 0x0, {}, [@common=@inet=@hashlimit3={{0x158}, {'bridge_slave_1\x00', {0x0, 0x8, 0x0, 0x0, 0x0, 0x7fff, 0x8}}}]}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "29f0be44329ad4d94a815c71ad95092b933b5e380a7e5d3c56c51e9d0027"}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x3e0) 23:09:11 executing program 0: r0 = getpgrp(0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x24000000) r1 = gettid() perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000080), 0x30200, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) unshare(0x4000000) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, r3, 0x0) preadv(0xffffffffffffffff, &(0x7f00000002c0)=[{&(0x7f00000001c0)=""/251, 0xfb}], 0x1, 0x0, 0x0) bpf$ITER_CREATE(0x21, &(0x7f0000000100)={r2}, 0x9) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x26, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = perf_event_open(&(0x7f00000006c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c44}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ID(r4, 0x80042407, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000140)={0x1, 0x80, 0x0, 0x7, 0x0, 0xff, 0x0, 0x2, 0x0, 0xe, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x400, 0x1, @perf_bp={&(0x7f00000000c0), 0x8}, 0x18000, 0x8000, 0xfffffffc, 0x1, 0x1000000000, 0x8, 0x3, 0x0, 0x8, 0x0, 0x9}, r1, 0x2, r4, 0x2) clone(0x6cb2e100, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r1) wait4(0x0, 0x0, 0x0, 0x0) 23:09:11 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x15, 0x0, 0x1, 0x0, 0x6, @multicast}, 0x14) clone(0x2000000082148180, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_STRSET_GET(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000640)={0x0, 0x1cc}, 0x1, 0x0, 0x0, 0x8800}, 0x20040040) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) request_key(0x0, &(0x7f0000001ffb)={'syz', 0x1}, 0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x1004) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0x3, 0x380, 0x3ac, 0xe0, 0xe0, 0xe0, 0x0, 0x2e8, 0x2e8, 0x2e8, 0x2e8, 0x2e8, 0x7fffffe, 0x0, {[{{@uncond, 0x0, 0x70, 0xe0, 0x0, {0x6020000}}, @common=@unspec=@NFLOG={0x70, 'NFLOG\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, "a4bcf0ebf5d09e8706580300b1000000124ac31d4fda375c7794e420aa63529ebcf847246a5e8846085b0a30510b266347a84ae5ffea89b8654e4400"}}}, {{@ip={@local, @multicast1, 0x0, 0x0, '\x00', 'wg1\x00'}, 0x0, 0x1c8, 0x208, 0x0, {}, [@common=@inet=@hashlimit3={{0x158}, {'bridge_slave_1\x00', {0x0, 0x8, 0x0, 0x0, 0x0, 0x7fff, 0x8}}}]}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "29f0be44329ad4d94a815c71ad95092b933b5e380a7e5d3c56c51e9d0027"}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x3e0) 23:09:11 executing program 4: r0 = perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x9f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x9, 0x1ae}, 0x0, 0x0, 0x0, 0x0, 0x1, 0x7fffffff, 0x0, 0x0, 0xfffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000280)='/sys/class/fc_transport', 0x5a1000, 0x100) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x1a, 0xf7, 0x4, 0x1, 0x0, r1}, 0x40) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000040)=0x0) r4 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000140), 0x501000, 0x0) mmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x1000000, 0x10010, r0, 0x9145c000) getsockopt$bt_BT_FLUSHABLE(r4, 0x112, 0x8, &(0x7f0000000180)=0xffff, &(0x7f00000001c0)=0x4) perf_event_open(&(0x7f00000000c0)={0x0, 0x80, 0x40, 0x7, 0x0, 0x2, 0x0, 0xfc33, 0xa0008, 0xb, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x5, 0x4, @perf_bp={&(0x7f0000000000), 0xc}, 0x140, 0x0, 0x3, 0x5, 0x88e1, 0x0, 0x100, 0x0, 0x401, 0x0, 0xabbe}, r3, 0x4, r0, 0x9) 23:09:11 executing program 1: ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000001c0)={'team0\x00', 0x0}) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000680)={0xffffffffffffffff, 0x10, &(0x7f0000000640)={&(0x7f0000000780)=""/4096, 0x1000, 0x0}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000001780)={0x8, 0x7, &(0x7f0000001800)=ANY=[@ANYBLOB="180000009d57000000000000060000001832000005000000000000000000000495000000000000005c150400010000009500000000434e0dae2ef63aab6acde18cddf77c67000000"], &(0x7f0000000180)='GPL\x00', 0x2, 0x0, 0x0, 0x41100, 0xd, '\x00', r0, 0x1d, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x6, 0x5}, 0x8, 0x10, &(0x7f0000000600)={0x5, 0x0, 0x0, 0x10001}, 0x10, r1}, 0x78) r2 = getpgrp(0x0) prctl$PR_SET_PTRACER(0x59616d61, r2) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x24000000) r3 = gettid() perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x2100, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x4}, 0x0, 0x8}, 0x0, 0x8, 0xffffffffffffffff, 0x9) clone(0x6cb2e100, 0x0, 0x0, 0x0, 0x0) r4 = openat$rtc(0xffffffffffffff9c, &(0x7f00000168c0), 0x0, 0x0) ioctl$RTC_UIE_ON(r4, 0x7003) clone(0x59040000, &(0x7f0000000200)="32b026bb2bd5ab05345d05868d1008feb1352fb452659a55b2c8650d5c3b8d9896f83163af0908ddf225ca94e880899df94150b94cce61a62255c2da294ef09dd6df955a8b10081fc4491edeff6bdea1f408c84f564a1702f2429d4ed091a3ef6bb7002cdeb2cb9790f44b23c402166d7ced3ecafcbc5a046b763517bf35421cba1dc4f3b4a67d3882fcad4bd680d79d963ee7d31048c06d6a09d69830d36d80e15be2156e695858a0937e49a60e4623fca37ffd32972d2555bb01a4c5c57e4e6c39ec93e0887c3ed39a172ca646bc8514bdb64ddceb12d7d09546d0c5d8c9fe33f4296409029503d314e0", &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="99d1c32534d9de00af8729fa460ec9d5628744ffe3cb327edbe5d45fed028bf303c434286297cbfe9f121b1bc94969fa74f64c4cb8a1d40cadfe5d1afe1911de07770c57e37c225c0843887e02f6881c533230e4a3d43275e9cd079068012291e77d44bf1f4398518c9d64ae643b1ebff18fb2d4d632098a07dd40847a76374a4a01df2f34c001369ba9b86499548cbb8ce4cda4ae5179f35c9feb4de592a550f357f89d1660d711fac0e2a8") sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x9efef75f}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvlan={{0xc}, {0x4}}}, @IFLA_LINK={0x8}]}, 0x3c}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000001940)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000006c0)={&(0x7f0000001880)=@dellinkprop={0xb0, 0x6d, 0x20, 0x70bd28, 0x25dfdbff, {0x0, 0x0, 0x0, 0x0, 0x210, 0xc0018}, [@IFLA_TARGET_NETNSID={0x8, 0x2e, 0x2}, @IFLA_MASTER={0x8}, @IFLA_AF_SPEC={0x70, 0x1a, 0x0, 0x1, [@AF_MPLS={0x4}, @AF_MPLS={0x4}, @AF_INET6={0x28, 0xa, 0x0, 0x1, [@IFLA_INET6_ADDR_GEN_MODE={0x5, 0x8, 0x6b}, @IFLA_INET6_TOKEN={0x14, 0x7, @mcast2}, @IFLA_INET6_ADDR_GEN_MODE={0x5, 0x8, 0x7}]}, @AF_MPLS={0x4}, @AF_INET6={0x28, 0xa, 0x0, 0x1, [@IFLA_INET6_ADDR_GEN_MODE={0x5, 0x8, 0x8}, @IFLA_INET6_ADDR_GEN_MODE={0x5, 0x8, 0x56}, @IFLA_INET6_TOKEN={0x14, 0x7, @ipv4={'\x00', '\xff\xff', @local}}]}, @AF_MPLS={0x4}, @AF_INET6={0xc, 0xa, 0x0, 0x1, [@IFLA_INET6_ADDR_GEN_MODE={0x5, 0x8, 0x9}]}]}, @IFLA_IFALIASn={0x4}, @IFLA_PHYS_PORT_ID={0xb, 0x22, "3df17141c4e8d5"}]}, 0xb0}, 0x1, 0x0, 0x0, 0x4000001}, 0x84000) clone(0x2908000, &(0x7f0000000080)="6028d78584a9523ff3b18b3c7f86b0f46595537c62f1f47ca39e4ff27666a38078b3617669c736e28539aa28b2d44ceec9dc0c3a4d3dd6d901efcff839fc776cc0790c", &(0x7f0000000140), &(0x7f0000000440), &(0x7f0000000480)="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") ptrace(0x10, r3) wait4(0x0, 0x0, 0x0, 0x0) 23:09:11 executing program 3: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x15, 0x0, 0x1, 0x0, 0x6, @multicast}, 0x14) clone(0x2000000082148180, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_STRSET_GET(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000640)={&(0x7f00000006c0)=ANY=[@ANYBLOB="cccd30", @ANYRES16=0x0, @ANYBLOB="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", @ANYRES32=0x0, @ANYBLOB="1400020069703667726574617030000000000000140002006970366572f370616e20000000000000fa0ee59a22b338aeb6d3895b934764e9a674c87f74b9c35aaa183a9ea95194a3dc40d9b230a9f627acae68e5f0381078395e744b4197fe3dd12112adacad625f6ae8e22901a3dd5920796e7dc087d5033e12c9e4aea2026a5df4ee89adbeda48287c2840149cf27af2cc0f064680a7b5e90f480b201f70326baca201fea21a0100000000000000"], 0x1cc}, 0x1, 0x0, 0x0, 0x8800}, 0x20040040) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) request_key(0x0, &(0x7f0000001ffb)={'syz', 0x1}, 0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x1004) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0x3, 0x380, 0x0, 0xe0, 0xe0, 0xe0, 0x0, 0x2e8, 0x2e8, 0x2e8, 0x2e8, 0x2e8, 0x7fffffe, 0x0, {[{{@uncond, 0x0, 0x70, 0xe0, 0x0, {0x6020000}}, @common=@unspec=@NFLOG={0x70, 'NFLOG\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, "a4bcf0ebf5d09e8706000000b1000000124ac31d4fda375c7794e420aa63529ebcf847246a5e8846085b0a30510b266347a84ae5ffea89b8654e4400e400"}}}, {{@ip={@local, @multicast1, 0x0, 0x0, '\x00', 'wg1\x00'}, 0x0, 0x1c8, 0x208, 0x0, {}, [@common=@inet=@hashlimit3={{0x158}, {'bridge_slave_1\x00', {0x0, 0x8, 0x0, 0x0, 0x0, 0x7fff, 0x8}}}]}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "29f0be44329ad4d94a815c71ad95092b933b5e380a7e5d3c56c51e9d0027"}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x3e0) 23:09:11 executing program 2: r0 = getpgrp(0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x24000000) r1 = gettid() perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000080), 0x30200, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) unshare(0x4000000) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, r3, 0x0) preadv(0xffffffffffffffff, &(0x7f00000002c0)=[{&(0x7f00000001c0)=""/251, 0xfb}], 0x1, 0x0, 0x0) bpf$ITER_CREATE(0x21, &(0x7f0000000100)={r2}, 0x9) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x26, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = perf_event_open(&(0x7f00000006c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c44}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ID(r4, 0x80042407, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000140)={0x1, 0x80, 0x0, 0x7, 0x0, 0xff, 0x0, 0x2, 0x0, 0xe, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x400, 0x1, @perf_bp={&(0x7f00000000c0), 0x8}, 0x18000, 0x8000, 0xfffffffc, 0x1, 0x1000000000, 0x8, 0x3, 0x0, 0x8, 0x0, 0x9}, r1, 0x2, r4, 0x2) clone(0x6cb2e100, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r1) wait4(0x0, 0x0, 0x0, 0x0) 23:09:11 executing program 1: ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000001c0)={'team0\x00', 0x0}) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000680)={0xffffffffffffffff, 0x10, &(0x7f0000000640)={&(0x7f0000000780)=""/4096, 0x1000, 0x0}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000001780)={0x8, 0x7, &(0x7f0000001800)=ANY=[@ANYBLOB="180000009d57000000000000060000001832000005000000000000000000000495000000000000005c150400010000009500000000434e0dae2ef63aab6acde18cddf77c67000000"], &(0x7f0000000180)='GPL\x00', 0x2, 0x0, 0x0, 0x41100, 0xd, '\x00', r0, 0x1d, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x6, 0x5}, 0x8, 0x10, &(0x7f0000000600)={0x5, 0x0, 0x0, 0x10001}, 0x10, r1}, 0x78) r2 = getpgrp(0x0) prctl$PR_SET_PTRACER(0x59616d61, r2) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x24000000) r3 = gettid() perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x2100, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x4}, 0x0, 0x8}, 0x0, 0x8, 0xffffffffffffffff, 0x9) clone(0x6cb2e100, 0x0, 0x0, 0x0, 0x0) r4 = openat$rtc(0xffffffffffffff9c, &(0x7f00000168c0), 0x0, 0x0) ioctl$RTC_UIE_ON(r4, 0x7003) clone(0x59040000, &(0x7f0000000200)="32b026bb2bd5ab05345d05868d1008feb1352fb452659a55b2c8650d5c3b8d9896f83163af0908ddf225ca94e880899df94150b94cce61a62255c2da294ef09dd6df955a8b10081fc4491edeff6bdea1f408c84f564a1702f2429d4ed091a3ef6bb7002cdeb2cb9790f44b23c402166d7ced3ecafcbc5a046b763517bf35421cba1dc4f3b4a67d3882fcad4bd680d79d963ee7d31048c06d6a09d69830d36d80e15be2156e695858a0937e49a60e4623fca37ffd32972d2555bb01a4c5c57e4e6c39ec93e0887c3ed39a172ca646bc8514bdb64ddceb12d7d09546d0c5d8c9fe33f4296409029503d314e0", &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="99d1c32534d9de00af8729fa460ec9d5628744ffe3cb327edbe5d45fed028bf303c434286297cbfe9f121b1bc94969fa74f64c4cb8a1d40cadfe5d1afe1911de07770c57e37c225c0843887e02f6881c533230e4a3d43275e9cd079068012291e77d44bf1f4398518c9d64ae643b1ebff18fb2d4d632098a07dd40847a76374a4a01df2f34c001369ba9b86499548cbb8ce4cda4ae5179f35c9feb4de592a550f357f89d1660d711fac0e2a8") sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x9efef75f}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvlan={{0xc}, {0x4}}}, @IFLA_LINK={0x8}]}, 0x3c}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000001940)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000006c0)={&(0x7f0000001880)=@dellinkprop={0xb0, 0x6d, 0x20, 0x70bd28, 0x25dfdbff, {0x0, 0x0, 0x0, 0x0, 0x210, 0xc0018}, [@IFLA_TARGET_NETNSID={0x8, 0x2e, 0x2}, @IFLA_MASTER={0x8}, @IFLA_AF_SPEC={0x70, 0x1a, 0x0, 0x1, [@AF_MPLS={0x4}, @AF_MPLS={0x4}, @AF_INET6={0x28, 0xa, 0x0, 0x1, [@IFLA_INET6_ADDR_GEN_MODE={0x5, 0x8, 0x6b}, @IFLA_INET6_TOKEN={0x14, 0x7, @mcast2}, @IFLA_INET6_ADDR_GEN_MODE={0x5, 0x8, 0x7}]}, @AF_MPLS={0x4}, @AF_INET6={0x28, 0xa, 0x0, 0x1, [@IFLA_INET6_ADDR_GEN_MODE={0x5, 0x8, 0x8}, @IFLA_INET6_ADDR_GEN_MODE={0x5, 0x8, 0x56}, @IFLA_INET6_TOKEN={0x14, 0x7, @ipv4={'\x00', '\xff\xff', @local}}]}, @AF_MPLS={0x4}, @AF_INET6={0xc, 0xa, 0x0, 0x1, [@IFLA_INET6_ADDR_GEN_MODE={0x5, 0x8, 0x9}]}]}, @IFLA_IFALIASn={0x4}, @IFLA_PHYS_PORT_ID={0xb, 0x22, "3df17141c4e8d5"}]}, 0xb0}, 0x1, 0x0, 0x0, 0x4000001}, 0x84000) clone(0x2908000, &(0x7f0000000080)="6028d78584a9523ff3b18b3c7f86b0f46595537c62f1f47ca39e4ff27666a38078b3617669c736e28539aa28b2d44ceec9dc0c3a4d3dd6d901efcff839fc776cc0790c", &(0x7f0000000140), &(0x7f0000000440), &(0x7f0000000480)="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") ptrace(0x10, r3) wait4(0x0, 0x0, 0x0, 0x0) 23:09:11 executing program 4: perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0xc7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f00000006c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c44}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000600), 0x0, 0x0) perf_event_open(&(0x7f0000000580)={0x0, 0x80, 0xff, 0x2, 0x0, 0x4, 0x0, 0x5, 0x10d8, 0x8, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x3, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x0, @perf_config_ext={0x1000, 0x7}, 0x10, 0x9, 0x1, 0x9, 0x7, 0x5, 0x8, 0x0, 0x38b, 0x0, 0x9}, 0xffffffffffffffff, 0x4, r1, 0x3) bpf$ITER_CREATE(0x21, &(0x7f0000000640), 0x8) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x12, 0xf7, 0x4, 0x3}, 0x40) bpf$BPF_GET_MAP_INFO(0x3, &(0x7f0000000040)={r2, 0x26, &(0x7f0000000180)}, 0x10) preadv(r2, &(0x7f0000000500)=[{&(0x7f0000000380)=""/51, 0x33}, {&(0x7f00000003c0)=""/249, 0xf9}, {&(0x7f00000004c0)}], 0x3, 0x3f, 0x4) ioctl$PERF_EVENT_IOC_ID(r0, 0x80042407, &(0x7f00000000c0)) preadv(r0, &(0x7f0000000300)=[{&(0x7f0000000000)=""/96, 0x60}, {&(0x7f00000000c0)=""/146, 0x92}, {&(0x7f0000000180)=""/104, 0x68}, {&(0x7f0000000280)=""/18, 0x12}, {&(0x7f00000002c0)=""/1, 0x1}], 0x5, 0x20, 0x3f) r3 = bpf$ITER_CREATE(0x21, &(0x7f00000004c0), 0x8) setsockopt$IP_VS_SO_SET_ADD(r3, 0x0, 0x482, &(0x7f0000000540)={0x1d, @initdev={0xac, 0x1e, 0x1, 0x0}, 0x4e20, 0x0, 'wlc\x00', 0x58, 0x7, 0x2f}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x12, 0xf7, 0x4, 0x3}, 0x40) 23:09:11 executing program 0: r0 = getpgrp(0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x24000000) r1 = gettid() perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000080), 0x30200, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) unshare(0x4000000) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, r3, 0x0) preadv(0xffffffffffffffff, &(0x7f00000002c0)=[{&(0x7f00000001c0)=""/251, 0xfb}], 0x1, 0x0, 0x0) bpf$ITER_CREATE(0x21, &(0x7f0000000100)={r2}, 0x9) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x26, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = perf_event_open(&(0x7f00000006c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c44}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ID(r4, 0x80042407, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000140)={0x1, 0x80, 0x0, 0x7, 0x0, 0xff, 0x0, 0x2, 0x0, 0xe, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x400, 0x1, @perf_bp={&(0x7f00000000c0), 0x8}, 0x18000, 0x8000, 0xfffffffc, 0x1, 0x1000000000, 0x8, 0x3, 0x0, 0x8, 0x0, 0x9}, r1, 0x2, r4, 0x2) clone(0x6cb2e100, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r1) wait4(0x0, 0x0, 0x0, 0x0) 23:09:11 executing program 3: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x15, 0x0, 0x1, 0x0, 0x6, @multicast}, 0x14) clone(0x2000000082148180, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_STRSET_GET(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000640)={&(0x7f00000006c0)=ANY=[@ANYBLOB="cccd30", @ANYRES16=0x0, @ANYBLOB="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", @ANYRES32=0x0, @ANYBLOB="1400020069703667726574617030000000000000140002006970366572f370616e20000000000000fa0ee59a22b338aeb6d3895b934764e9a674c87f74b9c35aaa183a9ea95194a3dc40d9b230a9f627acae68e5f0381078395e744b4197fe3dd12112adacad625f6ae8e22901a3dd5920796e7dc087d5033e12c9e4aea2026a5df4ee89adbeda48287c2840149cf27af2cc0f064680a7b5e90f480b201f70326baca201fea21a0100000000000000"], 0x1cc}, 0x1, 0x0, 0x0, 0x8800}, 0x20040040) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) request_key(0x0, &(0x7f0000001ffb)={'syz', 0x1}, 0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x1004) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0x3, 0x380, 0x0, 0xe0, 0xe0, 0xe0, 0x0, 0x2e8, 0x2e8, 0x2e8, 0x2e8, 0x2e8, 0x7fffffe, 0x0, {[{{@uncond, 0x0, 0x70, 0xe0, 0x0, {0x6020000}}, @common=@unspec=@NFLOG={0x70, 'NFLOG\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, "a4bcf0ebf5d09e8706000000b1000000124ac31d4fda375c7794e420aa63529ebcf847246a5e8846085b0a30510b266347a84ae5ffea89b8654e4403e400"}}}, {{@ip={@local, @multicast1, 0x0, 0x0, '\x00', 'wg1\x00'}, 0x0, 0x1c8, 0x208, 0x0, {}, [@common=@inet=@hashlimit3={{0x158}, {'bridge_slave_1\x00', {0x0, 0x8, 0x0, 0x0, 0x0, 0x7fff, 0x8}}}]}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "29f0be44329ad4d94a815c71ad95092b933b5e380a7e5d3c56c51e9d0027"}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x3e0) 23:09:11 executing program 1: ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000001c0)={'team0\x00', 0x0}) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000680)={0xffffffffffffffff, 0x10, &(0x7f0000000640)={&(0x7f0000000780)=""/4096, 0x1000, 0x0}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000001780)={0x8, 0x7, &(0x7f0000001800)=ANY=[@ANYBLOB="180000009d57000000000000060000001832000005000000000000000000000495000000000000005c150400010000009500000000434e0dae2ef63aab6acde18cddf77c67000000"], &(0x7f0000000180)='GPL\x00', 0x2, 0x0, 0x0, 0x41100, 0xd, '\x00', r0, 0x1d, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x6, 0x5}, 0x8, 0x10, &(0x7f0000000600)={0x5, 0x0, 0x0, 0x10001}, 0x10, r1}, 0x78) r2 = getpgrp(0x0) prctl$PR_SET_PTRACER(0x59616d61, r2) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x24000000) r3 = gettid() perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x2100, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x4}, 0x0, 0x8}, 0x0, 0x8, 0xffffffffffffffff, 0x9) clone(0x6cb2e100, 0x0, 0x0, 0x0, 0x0) r4 = openat$rtc(0xffffffffffffff9c, &(0x7f00000168c0), 0x0, 0x0) ioctl$RTC_UIE_ON(r4, 0x7003) ioctl$RTC_SET_TIME(r4, 0x4024700a, &(0x7f0000000000)={0x0, 0x0, 0x0, 0xf, 0x0, 0xfd}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x9efef75f}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvlan={{0xc}, {0x4}}}, @IFLA_LINK={0x8}]}, 0x3c}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000001940)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000006c0)={&(0x7f0000001880)=@dellinkprop={0xb0, 0x6d, 0x20, 0x70bd28, 0x25dfdbff, {0x0, 0x0, 0x0, 0x0, 0x210, 0xc0018}, [@IFLA_TARGET_NETNSID={0x8, 0x2e, 0x2}, @IFLA_MASTER={0x8}, @IFLA_AF_SPEC={0x70, 0x1a, 0x0, 0x1, [@AF_MPLS={0x4}, @AF_MPLS={0x4}, @AF_INET6={0x28, 0xa, 0x0, 0x1, [@IFLA_INET6_ADDR_GEN_MODE={0x5, 0x8, 0x6b}, @IFLA_INET6_TOKEN={0x14, 0x7, @mcast2}, @IFLA_INET6_ADDR_GEN_MODE={0x5, 0x8, 0x7}]}, @AF_MPLS={0x4}, @AF_INET6={0x28, 0xa, 0x0, 0x1, [@IFLA_INET6_ADDR_GEN_MODE={0x5, 0x8, 0x8}, @IFLA_INET6_ADDR_GEN_MODE={0x5, 0x8, 0x56}, @IFLA_INET6_TOKEN={0x14, 0x7, @ipv4={'\x00', '\xff\xff', @local}}]}, @AF_MPLS={0x4}, @AF_INET6={0xc, 0xa, 0x0, 0x1, [@IFLA_INET6_ADDR_GEN_MODE={0x5, 0x8, 0x9}]}]}, @IFLA_IFALIASn={0x4}, @IFLA_PHYS_PORT_ID={0xb, 0x22, "3df17141c4e8d5"}]}, 0xb0}, 0x1, 0x0, 0x0, 0x4000001}, 0x84000) clone(0x2908000, &(0x7f0000000080)="6028d78584a9523ff3b18b3c7f86b0f46595537c62f1f47ca39e4ff27666a38078b3617669c736e28539aa28b2d44ceec9dc0c3a4d3dd6d901efcff839fc776cc0790c", &(0x7f0000000140), &(0x7f0000000440), &(0x7f0000000480)="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") ptrace(0x10, r3) wait4(0x0, 0x0, 0x0, 0x0) 23:09:12 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x2) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$TUNGETSNDBUF(r0, 0x800454d3, &(0x7f0000000000)) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0xc7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x12, 0xf7, 0x4, 0x3}, 0x40) 23:09:12 executing program 3: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x15, 0x0, 0x1, 0x0, 0x6, @multicast}, 0x14) clone(0x2000000082148180, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_STRSET_GET(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000640)={&(0x7f00000006c0)=ANY=[@ANYBLOB="cccd30", @ANYRES16=0x0, @ANYBLOB="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", @ANYRES32=0x0, @ANYBLOB="1400020069703667726574617030000000000000140002006970366572f370616e20000000000000fa0ee59a22b338aeb6d3895b934764e9a674c87f74b9c35aaa183a9ea95194a3dc40d9b230a9f627acae68e5f0381078395e744b4197fe3dd12112adacad625f6ae8e22901a3dd5920796e7dc087d5033e12c9e4aea2026a5df4ee89adbeda48287c2840149cf27af2cc0f064680a7b5e90f480b201f70326baca201fea21a0100000000000000"], 0x1cc}, 0x1, 0x0, 0x0, 0x8800}, 0x20040040) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) request_key(0x0, &(0x7f0000001ffb)={'syz', 0x1}, 0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x1004) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0x3, 0x380, 0x0, 0xe0, 0xe0, 0xe0, 0x0, 0x2e8, 0x2e8, 0x2e8, 0x2e8, 0x2e8, 0x7fffffe, 0x0, {[{{@uncond, 0x0, 0x70, 0xe0, 0x0, {0x6020000}}, @common=@unspec=@NFLOG={0x70, 'NFLOG\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, "a4bcf0ebf5d09e8706000000b1000000124ac31d4fda375c7794e420aa63529ebcf847246a5e8846085b0a30510b266347a84ae5ffea89b8654e4402e800"}}}, {{@ip={@local, @multicast1, 0x0, 0x0, '\x00', 'wg1\x00'}, 0x0, 0x1c8, 0x208, 0x0, {}, [@common=@inet=@hashlimit3={{0x158}, {'bridge_slave_1\x00', {0x0, 0x8, 0x0, 0x0, 0x0, 0x7fff, 0x8}}}]}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "29f0be44329ad4d94a815c71ad95092b933b5e380a7e5d3c56c51e9d0027"}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x3e0) 23:09:12 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x15, 0x0, 0x1, 0x0, 0x6, @multicast}, 0x14) clone(0x2000000082148180, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_STRSET_GET(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000640)={0x0, 0x1cc}, 0x1, 0x0, 0x0, 0x8800}, 0x20040040) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) request_key(0x0, &(0x7f0000001ffb)={'syz', 0x1}, 0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x1004) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0x3, 0x380, 0x3ba, 0xe0, 0xe0, 0xe0, 0x0, 0x2e8, 0x2e8, 0x2e8, 0x2e8, 0x2e8, 0x7fffffe, 0x0, {[{{@uncond, 0x0, 0x70, 0xe0, 0x0, {0x6020000}}, @common=@unspec=@NFLOG={0x70, 'NFLOG\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, "a4bcf0ebf5d09e8706580300b1000000124ac31d4fda375c7794e420aa63529ebcf847246a5e8846085b0a30510b266347a84ae5ffea89b8654e4400"}}}, {{@ip={@local, @multicast1, 0x0, 0x0, '\x00', 'wg1\x00'}, 0x0, 0x1c8, 0x208, 0x0, {}, [@common=@inet=@hashlimit3={{0x158}, {'bridge_slave_1\x00', {0x0, 0x8, 0x0, 0x0, 0x0, 0x7fff, 0x8}}}]}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "29f0be44329ad4d94a815c71ad95092b933b5e380a7e5d3c56c51e9d0027"}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x3e0) 23:09:12 executing program 4: perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0xc7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) rt_sigaction(0x2f, 0x0, 0x0, 0x8, &(0x7f0000000bc0)) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x12, 0xf7, 0x4, 0x3, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x10000}, 0x40) 23:09:12 executing program 3: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x15, 0x0, 0x1, 0x0, 0x6, @multicast}, 0x14) clone(0x2000000082148180, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_STRSET_GET(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000640)={&(0x7f00000006c0)=ANY=[@ANYBLOB="cccd30", @ANYRES16=0x0, @ANYBLOB="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", @ANYRES32=0x0, @ANYBLOB="1400020069703667726574617030000000000000140002006970366572f370616e20000000000000fa0ee59a22b338aeb6d3895b934764e9a674c87f74b9c35aaa183a9ea95194a3dc40d9b230a9f627acae68e5f0381078395e744b4197fe3dd12112adacad625f6ae8e22901a3dd5920796e7dc087d5033e12c9e4aea2026a5df4ee89adbeda48287c2840149cf27af2cc0f064680a7b5e90f480b201f70326baca201fea21a0100000000000000"], 0x1cc}, 0x1, 0x0, 0x0, 0x8800}, 0x20040040) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) request_key(0x0, &(0x7f0000001ffb)={'syz', 0x1}, 0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x1004) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0x3, 0x380, 0x0, 0xe0, 0xe0, 0xe0, 0x0, 0x2e8, 0x2e8, 0x2e8, 0x2e8, 0x2e8, 0x7fffffe, 0x0, {[{{@uncond, 0x0, 0x70, 0xe0, 0x0, {0x6020000}}, @common=@unspec=@NFLOG={0x70, 'NFLOG\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, "a4bcf0ebf5d09e8706000000b1000000124ac31d4fda375c7794e420aa63529ebcf847246a5e8846085b0a30510b266347a84ae5ffea89b8654e4403ea00"}}}, {{@ip={@local, @multicast1, 0x0, 0x0, '\x00', 'wg1\x00'}, 0x0, 0x1c8, 0x208, 0x0, {}, [@common=@inet=@hashlimit3={{0x158}, {'bridge_slave_1\x00', {0x0, 0x8, 0x0, 0x0, 0x0, 0x7fff, 0x8}}}]}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "29f0be44329ad4d94a815c71ad95092b933b5e380a7e5d3c56c51e9d0027"}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x3e0) 23:09:12 executing program 4: perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0xc7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x12, 0xf7, 0x4, 0x3}, 0x40) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x12, 0xf7, 0x4, 0x3}, 0x40) bpf$BPF_GET_MAP_INFO(0x3, &(0x7f0000000040)={r2, 0x26, &(0x7f0000000180)}, 0x10) fgetxattr(r2, &(0x7f0000000280)=@random={'os2.', 'cpuacct.usage_user\x00'}, &(0x7f00000002c0)=""/29, 0x1d) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000001c0)={r1, 0x10, &(0x7f0000000180)={&(0x7f00000000c0)=""/173, 0xad}}, 0x10) r3 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(r0, &(0x7f00000006c0)=[{&(0x7f0000000300)=""/180, 0xb4}, {&(0x7f00000003c0)=""/59, 0x3b}, {&(0x7f0000000400)=""/47, 0x2f}, {&(0x7f0000000440)=""/136, 0x88}, {&(0x7f0000000500)=""/65, 0x41}, {&(0x7f0000000580)=""/109, 0x6d}, {&(0x7f0000000600)=""/140, 0x8c}], 0x7, 0x0, 0x8000) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r3, 0x0) preadv(r3, &(0x7f0000000280), 0x18, 0xd9f, 0x0) openat$cgroup_ro(r3, &(0x7f0000000000)='cpuacct.usage_user\x00', 0x0, 0x0) 23:09:12 executing program 4: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/stat\x00') perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0xc5, 0x0, 0x0, 0x40, 0x0, 0x8, 0xc0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xc}, 0x808, 0x0, 0x800, 0x0, 0x37ed, 0x3, 0x0, 0x0, 0x6}, 0x0, 0x0, r0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x12, 0xf7, 0x4, 0x3}, 0x40) 23:09:14 executing program 2: r0 = getpgrp(0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x24000000) r1 = gettid() perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000080), 0x30200, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) unshare(0x4000000) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, r3, 0x0) preadv(0xffffffffffffffff, &(0x7f00000002c0)=[{&(0x7f00000001c0)=""/251, 0xfb}], 0x1, 0x0, 0x0) bpf$ITER_CREATE(0x21, &(0x7f0000000100)={r2}, 0x9) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x26, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = perf_event_open(&(0x7f00000006c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c44}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ID(r4, 0x80042407, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000140)={0x1, 0x80, 0x0, 0x7, 0x0, 0xff, 0x0, 0x2, 0x0, 0xe, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x400, 0x1, @perf_bp={&(0x7f00000000c0), 0x8}, 0x18000, 0x8000, 0xfffffffc, 0x1, 0x1000000000, 0x8, 0x3, 0x0, 0x8, 0x0, 0x9}, r1, 0x2, r4, 0x2) clone(0x6cb2e100, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r1) wait4(0x0, 0x0, 0x0, 0x0) 23:09:14 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x15, 0x0, 0x1, 0x0, 0x6, @multicast}, 0x14) clone(0x2000000082148180, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_STRSET_GET(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000640)={0x0, 0x1cc}, 0x1, 0x0, 0x0, 0x8800}, 0x20040040) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) request_key(0x0, &(0x7f0000001ffb)={'syz', 0x1}, 0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x1004) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0x3, 0x380, 0x3be, 0xe0, 0xe0, 0xe0, 0x0, 0x2e8, 0x2e8, 0x2e8, 0x2e8, 0x2e8, 0x7fffffe, 0x0, {[{{@uncond, 0x0, 0x70, 0xe0, 0x0, {0x6020000}}, @common=@unspec=@NFLOG={0x70, 'NFLOG\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, "a4bcf0ebf5d09e8706580300b1000000124ac31d4fda375c7794e420aa63529ebcf847246a5e8846085b0a30510b266347a84ae5ffea89b8654e4400"}}}, {{@ip={@local, @multicast1, 0x0, 0x0, '\x00', 'wg1\x00'}, 0x0, 0x1c8, 0x208, 0x0, {}, [@common=@inet=@hashlimit3={{0x158}, {'bridge_slave_1\x00', {0x0, 0x8, 0x0, 0x0, 0x0, 0x7fff, 0x8}}}]}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "29f0be44329ad4d94a815c71ad95092b933b5e380a7e5d3c56c51e9d0027"}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x3e0) 23:09:14 executing program 3: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x15, 0x0, 0x1, 0x0, 0x6, @multicast}, 0x14) clone(0x2000000082148180, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_STRSET_GET(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000640)={&(0x7f00000006c0)=ANY=[@ANYBLOB="cccd30", @ANYRES16=0x0, @ANYBLOB="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", @ANYRES32=0x0, @ANYBLOB="1400020069703667726574617030000000000000140002006970366572f370616e20000000000000fa0ee59a22b338aeb6d3895b934764e9a674c87f74b9c35aaa183a9ea95194a3dc40d9b230a9f627acae68e5f0381078395e744b4197fe3dd12112adacad625f6ae8e22901a3dd5920796e7dc087d5033e12c9e4aea2026a5df4ee89adbeda48287c2840149cf27af2cc0f064680a7b5e90f480b201f70326baca201fea21a0100000000000000"], 0x1cc}, 0x1, 0x0, 0x0, 0x8800}, 0x20040040) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) request_key(0x0, &(0x7f0000001ffb)={'syz', 0x1}, 0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x1004) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0x3, 0x380, 0x0, 0xe0, 0xe0, 0xe0, 0x0, 0x2e8, 0x2e8, 0x2e8, 0x2e8, 0x2e8, 0x7fffffe, 0x0, {[{{@uncond, 0x0, 0x70, 0xe0, 0x0, {0x6020000}}, @common=@unspec=@NFLOG={0x70, 'NFLOG\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, "a4bcf0ebf5d09e8706000000b1000000124ac31d4fda375c7794e420aa63529ebcf847246a5e8846085b0a30510b266347a84ae5ffea89b8654e4402f400"}}}, {{@ip={@local, @multicast1, 0x0, 0x0, '\x00', 'wg1\x00'}, 0x0, 0x1c8, 0x208, 0x0, {}, [@common=@inet=@hashlimit3={{0x158}, {'bridge_slave_1\x00', {0x0, 0x8, 0x0, 0x0, 0x0, 0x7fff, 0x8}}}]}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "29f0be44329ad4d94a815c71ad95092b933b5e380a7e5d3c56c51e9d0027"}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x3e0) 23:09:14 executing program 4: r0 = perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0xc7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x14001, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f00000006c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c44}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ID(r2, 0x80042407, &(0x7f00000000c0)) perf_event_open(&(0x7f00000000c0)={0x0, 0x80, 0x4, 0x9, 0x40, 0x0, 0x0, 0x2, 0x0, 0xf, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x3, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3ff, 0x6, @perf_config_ext={0xec, 0x7}, 0x12, 0x4, 0x3f, 0x3, 0x10000, 0x8000, 0x0, 0x0, 0x1000, 0x0, 0x9}, r1, 0x9, r2, 0xa) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x12, 0xf7, 0x4, 0x3}, 0x40) perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x80, 0x4, 0x0, 0x1, 0x80, 0x0, 0x1, 0x0, 0x6, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x80000001, 0x4, @perf_config_ext={0x6, 0x4}, 0x0, 0x1b, 0x5d25, 0x2, 0x81, 0x0, 0x9, 0x0, 0x4, 0x0, 0x8001}, 0xffffffffffffffff, 0xe, r0, 0x5) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x12, 0xf7, 0x4, 0x3}, 0x40) bpf$BPF_GET_MAP_INFO(0x3, &(0x7f0000000040)={r4, 0x26, &(0x7f0000000180)}, 0x10) r5 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000380), 0x282200, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000440)=@bpf_ext={0x1c, 0xa, &(0x7f0000000140)=@raw=[@alu={0x7, 0x1, 0xa, 0x5, 0x7, 0xfffffffffffffff4}, @map={0x18, 0x8, 0x1, 0x0, r3}, @jmp={0x5, 0x0, 0x7, 0x4, 0x3, 0xfffffffffffffffe, 0xfffffffffffffff0}, @ldst={0x2, 0x3, 0x2, 0x5, 0x3, 0xffffffffffffffff}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x4}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @map_val={0x18, 0x9, 0x2, 0x0, r4, 0x0, 0x0, 0x0, 0x37}], &(0x7f00000001c0)='GPL\x00', 0x7ff, 0xe5, &(0x7f0000000280)=""/229, 0x41000, 0x4, '\x00', 0x0, 0x0, r5, 0x8, &(0x7f00000003c0)={0x7, 0x1}, 0x8, 0x10, &(0x7f0000000400)={0x0, 0xa, 0xf4, 0x400}, 0x10, 0x27538}, 0x78) 23:09:14 executing program 1: ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000001c0)={'team0\x00', 0x0}) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000680)={0xffffffffffffffff, 0x10, &(0x7f0000000640)={&(0x7f0000000780)=""/4096, 0x1000, 0x0}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000001780)={0x8, 0x7, &(0x7f0000001800)=ANY=[@ANYBLOB="180000009d57000000000000060000001832000005000000000000000000000495000000000000005c150400010000009500000000434e0dae2ef63aab6acde18cddf77c67000000"], &(0x7f0000000180)='GPL\x00', 0x2, 0x0, 0x0, 0x41100, 0xd, '\x00', r0, 0x1d, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x6, 0x5}, 0x8, 0x10, &(0x7f0000000600)={0x5, 0x0, 0x0, 0x10001}, 0x10, r1}, 0x78) r2 = getpgrp(0x0) prctl$PR_SET_PTRACER(0x59616d61, r2) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x24000000) r3 = gettid() perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x2100, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x4}, 0x0, 0x8}, 0x0, 0x8, 0xffffffffffffffff, 0x9) clone(0x6cb2e100, 0x0, 0x0, 0x0, 0x0) r4 = openat$rtc(0xffffffffffffff9c, &(0x7f00000168c0), 0x0, 0x0) ioctl$RTC_UIE_ON(r4, 0x7003) ioctl$RTC_SET_TIME(r4, 0x4024700a, &(0x7f0000000000)={0x0, 0x0, 0x0, 0xf, 0x0, 0xfd}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x9efef75f}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvlan={{0xc}, {0x4}}}, @IFLA_LINK={0x8}]}, 0x3c}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000001940)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000006c0)={&(0x7f0000001880)=@dellinkprop={0xb0, 0x6d, 0x20, 0x70bd28, 0x25dfdbff, {0x0, 0x0, 0x0, 0x0, 0x210, 0xc0018}, [@IFLA_TARGET_NETNSID={0x8, 0x2e, 0x2}, @IFLA_MASTER={0x8}, @IFLA_AF_SPEC={0x70, 0x1a, 0x0, 0x1, [@AF_MPLS={0x4}, @AF_MPLS={0x4}, @AF_INET6={0x28, 0xa, 0x0, 0x1, [@IFLA_INET6_ADDR_GEN_MODE={0x5, 0x8, 0x6b}, @IFLA_INET6_TOKEN={0x14, 0x7, @mcast2}, @IFLA_INET6_ADDR_GEN_MODE={0x5, 0x8, 0x7}]}, @AF_MPLS={0x4}, @AF_INET6={0x28, 0xa, 0x0, 0x1, [@IFLA_INET6_ADDR_GEN_MODE={0x5, 0x8, 0x8}, @IFLA_INET6_ADDR_GEN_MODE={0x5, 0x8, 0x56}, @IFLA_INET6_TOKEN={0x14, 0x7, @ipv4={'\x00', '\xff\xff', @local}}]}, @AF_MPLS={0x4}, @AF_INET6={0xc, 0xa, 0x0, 0x1, [@IFLA_INET6_ADDR_GEN_MODE={0x5, 0x8, 0x9}]}]}, @IFLA_IFALIASn={0x4}, @IFLA_PHYS_PORT_ID={0xb, 0x22, "3df17141c4e8d5"}]}, 0xb0}, 0x1, 0x0, 0x0, 0x4000001}, 0x84000) clone(0x2908000, &(0x7f0000000080)="6028d78584a9523ff3b18b3c7f86b0f46595537c62f1f47ca39e4ff27666a38078b3617669c736e28539aa28b2d44ceec9dc0c3a4d3dd6d901efcff839fc776cc0790c", &(0x7f0000000140), &(0x7f0000000440), &(0x7f0000000480)="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") ptrace(0x10, r3) wait4(0x0, 0x0, 0x0, 0x0) 23:09:14 executing program 0: r0 = getpgrp(0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x24000000) r1 = gettid() perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000080), 0x30200, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) unshare(0x4000000) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, r3, 0x0) preadv(0xffffffffffffffff, &(0x7f00000002c0)=[{&(0x7f00000001c0)=""/251, 0xfb}], 0x1, 0x0, 0x0) bpf$ITER_CREATE(0x21, &(0x7f0000000100)={r2}, 0x9) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x26, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = perf_event_open(&(0x7f00000006c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c44}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ID(r4, 0x80042407, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000140)={0x1, 0x80, 0x0, 0x7, 0x0, 0xff, 0x0, 0x2, 0x0, 0xe, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x400, 0x1, @perf_bp={&(0x7f00000000c0), 0x8}, 0x18000, 0x8000, 0xfffffffc, 0x1, 0x1000000000, 0x8, 0x3, 0x0, 0x8, 0x0, 0x9}, r1, 0x2, r4, 0x2) clone(0x6cb2e100, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r1) wait4(0x0, 0x0, 0x0, 0x0) 23:09:14 executing program 3: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x15, 0x0, 0x1, 0x0, 0x6, @multicast}, 0x14) clone(0x2000000082148180, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_STRSET_GET(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000640)={&(0x7f00000006c0)=ANY=[@ANYBLOB="cccd30", @ANYRES16=0x0, @ANYBLOB="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", @ANYRES32=0x0, @ANYBLOB="1400020069703667726574617030000000000000140002006970366572f370616e20000000000000fa0ee59a22b338aeb6d3895b934764e9a674c87f74b9c35aaa183a9ea95194a3dc40d9b230a9f627acae68e5f0381078395e744b4197fe3dd12112adacad625f6ae8e22901a3dd5920796e7dc087d5033e12c9e4aea2026a5df4ee89adbeda48287c2840149cf27af2cc0f064680a7b5e90f480b201f70326baca201fea21a0100000000000000"], 0x1cc}, 0x1, 0x0, 0x0, 0x8800}, 0x20040040) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) request_key(0x0, &(0x7f0000001ffb)={'syz', 0x1}, 0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x1004) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0x3, 0x380, 0x0, 0xe0, 0xe0, 0xe0, 0x0, 0x2e8, 0x2e8, 0x2e8, 0x2e8, 0x2e8, 0x7fffffe, 0x0, {[{{@uncond, 0x0, 0x70, 0xe0, 0x0, {0x6020000}}, @common=@unspec=@NFLOG={0x70, 'NFLOG\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, "a4bcf0ebf5d09e8706000000b1000000124ac31d4fda375c7794e420aa63529ebcf847246a5e8846085b0a30510b266347a84ae5ffea89b8654e4400fe00"}}}, {{@ip={@local, @multicast1, 0x0, 0x0, '\x00', 'wg1\x00'}, 0x0, 0x1c8, 0x208, 0x0, {}, [@common=@inet=@hashlimit3={{0x158}, {'bridge_slave_1\x00', {0x0, 0x8, 0x0, 0x0, 0x0, 0x7fff, 0x8}}}]}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "29f0be44329ad4d94a815c71ad95092b933b5e380a7e5d3c56c51e9d0027"}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x3e0) 23:09:14 executing program 4: perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0xc7, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xffffffffffffffff}, 0x400, 0x2, 0x0, 0x0, 0x2, 0x20000000, 0x0, 0x0, 0xd15, 0x0, 0x3f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x12, 0xf7, 0x4, 0x3}, 0x40) 23:09:14 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x15, 0x0, 0x1, 0x0, 0x6, @multicast}, 0x14) clone(0x2000000082148180, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_STRSET_GET(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000640)={0x0, 0x1cc}, 0x1, 0x0, 0x0, 0x8800}, 0x20040040) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) request_key(0x0, &(0x7f0000001ffb)={'syz', 0x1}, 0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x1004) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0x3, 0x380, 0x3c7, 0xe0, 0xe0, 0xe0, 0x0, 0x2e8, 0x2e8, 0x2e8, 0x2e8, 0x2e8, 0x7fffffe, 0x0, {[{{@uncond, 0x0, 0x70, 0xe0, 0x0, {0x6020000}}, @common=@unspec=@NFLOG={0x70, 'NFLOG\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, "a4bcf0ebf5d09e8706580300b1000000124ac31d4fda375c7794e420aa63529ebcf847246a5e8846085b0a30510b266347a84ae5ffea89b8654e4400"}}}, {{@ip={@local, @multicast1, 0x0, 0x0, '\x00', 'wg1\x00'}, 0x0, 0x1c8, 0x208, 0x0, {}, [@common=@inet=@hashlimit3={{0x158}, {'bridge_slave_1\x00', {0x0, 0x8, 0x0, 0x0, 0x0, 0x7fff, 0x8}}}]}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "29f0be44329ad4d94a815c71ad95092b933b5e380a7e5d3c56c51e9d0027"}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x3e0) 23:09:15 executing program 4: r0 = perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0xc7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f00000000c0)={0x4, 0x80, 0x7, 0x1, 0xb9, 0xf7, 0x0, 0x6, 0x800, 0x5, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, @perf_bp={&(0x7f0000000000), 0x1c}, 0x40200, 0x0, 0x6c2f, 0x3, 0x6, 0x8001, 0xff, 0x0, 0x2, 0x0, 0xfffffffffffffff9}, 0x0, 0x5, r0, 0x3) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x12, 0xf7, 0x4, 0x3}, 0x40) ioctl$F2FS_IOC_GARBAGE_COLLECT(r1, 0x4004f506, &(0x7f0000000040)) 23:09:15 executing program 3: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x15, 0x0, 0x1, 0x0, 0x6, @multicast}, 0x14) clone(0x2000000082148180, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_STRSET_GET(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000640)={&(0x7f00000006c0)=ANY=[@ANYBLOB="cccd30", @ANYRES16=0x0, @ANYBLOB="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", @ANYRES32=0x0, @ANYBLOB="1400020069703667726574617030000000000000140002006970366572f370616e20000000000000fa0ee59a22b338aeb6d3895b934764e9a674c87f74b9c35aaa183a9ea95194a3dc40d9b230a9f627acae68e5f0381078395e744b4197fe3dd12112adacad625f6ae8e22901a3dd5920796e7dc087d5033e12c9e4aea2026a5df4ee89adbeda48287c2840149cf27af2cc0f064680a7b5e90f480b201f70326baca201fea21a0100000000000000"], 0x1cc}, 0x1, 0x0, 0x0, 0x8800}, 0x20040040) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) request_key(0x0, &(0x7f0000001ffb)={'syz', 0x1}, 0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x1004) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0x3, 0x380, 0x0, 0xe0, 0xe0, 0xe0, 0x0, 0x2e8, 0x2e8, 0x2e8, 0x2e8, 0x2e8, 0x7fffffe, 0x0, {[{{@uncond, 0x0, 0x70, 0xe0, 0x0, {0x6020000}}, @common=@unspec=@NFLOG={0x70, 'NFLOG\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, "a4bcf0ebf5d09e8706000000b1000000124ac31d4fda375c7794e420aa63529ebcf847246a5e8846085b0a30510b266347a84ae5ffea89b8654e4400ff00"}}}, {{@ip={@local, @multicast1, 0x0, 0x0, '\x00', 'wg1\x00'}, 0x0, 0x1c8, 0x208, 0x0, {}, [@common=@inet=@hashlimit3={{0x158}, {'bridge_slave_1\x00', {0x0, 0x8, 0x0, 0x0, 0x0, 0x7fff, 0x8}}}]}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "29f0be44329ad4d94a815c71ad95092b933b5e380a7e5d3c56c51e9d0027"}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x3e0) 23:09:15 executing program 3: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x15, 0x0, 0x1, 0x0, 0x6, @multicast}, 0x14) clone(0x2000000082148180, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_STRSET_GET(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000640)={&(0x7f00000006c0)=ANY=[@ANYBLOB="cccd30", @ANYRES16=0x0, @ANYBLOB="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", @ANYRES32=0x0, @ANYBLOB="1400020069703667726574617030000000000000140002006970366572f370616e20000000000000fa0ee59a22b338aeb6d3895b934764e9a674c87f74b9c35aaa183a9ea95194a3dc40d9b230a9f627acae68e5f0381078395e744b4197fe3dd12112adacad625f6ae8e22901a3dd5920796e7dc087d5033e12c9e4aea2026a5df4ee89adbeda48287c2840149cf27af2cc0f064680a7b5e90f480b201f70326baca201fea21a0100000000000000"], 0x1cc}, 0x1, 0x0, 0x0, 0x8800}, 0x20040040) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) request_key(0x0, &(0x7f0000001ffb)={'syz', 0x1}, 0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x1004) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0x3, 0x380, 0x0, 0xe0, 0xe0, 0xe0, 0x0, 0x2e8, 0x2e8, 0x2e8, 0x2e8, 0x2e8, 0x7fffffe, 0x0, {[{{@uncond, 0x0, 0x70, 0xe0, 0x0, {0x6020000}}, @common=@unspec=@NFLOG={0x70, 'NFLOG\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, "a4bcf0ebf5d09e8706000000b1000000124ac31d4fda375c7794e420aa63529ebcf847246a5e8846085b0a30510b266347a84ae5ffea89b8654e4403ff00"}}}, {{@ip={@local, @multicast1, 0x0, 0x0, '\x00', 'wg1\x00'}, 0x0, 0x1c8, 0x208, 0x0, {}, [@common=@inet=@hashlimit3={{0x158}, {'bridge_slave_1\x00', {0x0, 0x8, 0x0, 0x0, 0x0, 0x7fff, 0x8}}}]}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "29f0be44329ad4d94a815c71ad95092b933b5e380a7e5d3c56c51e9d0027"}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x3e0) 23:09:17 executing program 2: r0 = getpgrp(0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x24000000) r1 = gettid() perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000080), 0x30200, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) unshare(0x4000000) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, r3, 0x0) preadv(0xffffffffffffffff, &(0x7f00000002c0)=[{&(0x7f00000001c0)=""/251, 0xfb}], 0x1, 0x0, 0x0) bpf$ITER_CREATE(0x21, &(0x7f0000000100)={r2}, 0x9) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x26, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = perf_event_open(&(0x7f00000006c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c44}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ID(r4, 0x80042407, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000140)={0x1, 0x80, 0x0, 0x7, 0x0, 0xff, 0x0, 0x2, 0x0, 0xe, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, @perf_bp={&(0x7f00000000c0), 0x8}, 0x18000, 0x8000, 0xfffffffc, 0x1, 0x1000000000, 0x8, 0x3, 0x0, 0x8, 0x0, 0x9}, r1, 0x2, r4, 0x2) clone(0x6cb2e100, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r1) wait4(0x0, 0x0, 0x0, 0x0) 23:09:17 executing program 4: perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0xc7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x81, 0xff, 0x40, 0x20, 0x0, 0x5, 0xcf636dd18ce85832, 0x9, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x2, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x5, 0x1, @perf_config_ext={0x1, 0xff}, 0x1012, 0x1, 0x2, 0x6, 0x8, 0x1, 0x4, 0x0, 0x400, 0x0, 0x200}, 0x0, 0xf, 0xffffffffffffffff, 0x9) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x12, 0xf7, 0x4, 0x3}, 0x40) 23:09:17 executing program 0: r0 = perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0xc7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x14001, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f00000006c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c44}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ID(r2, 0x80042407, &(0x7f00000000c0)) perf_event_open(&(0x7f00000000c0)={0x0, 0x80, 0x4, 0x9, 0x40, 0x0, 0x0, 0x2, 0x0, 0xf, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x3, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3ff, 0x6, @perf_config_ext={0xec, 0x7}, 0x12, 0x4, 0x3f, 0x3, 0x10000, 0x8000, 0x0, 0x0, 0x1000, 0x0, 0x9}, r1, 0x9, r2, 0xa) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x12, 0xf7, 0x4, 0x3}, 0x40) perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x80, 0x4, 0x0, 0x1, 0x80, 0x0, 0x1, 0x0, 0x6, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x80000001, 0x4, @perf_config_ext={0x6, 0x4}, 0x0, 0x1b, 0x5d25, 0x2, 0x81, 0x0, 0x9, 0x0, 0x4, 0x0, 0x8001}, 0xffffffffffffffff, 0xe, r0, 0x5) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x12, 0xf7, 0x4, 0x3}, 0x40) bpf$BPF_GET_MAP_INFO(0x3, &(0x7f0000000040)={r4, 0x26, &(0x7f0000000180)}, 0x10) r5 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000380), 0x282200, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000440)=@bpf_ext={0x1c, 0xa, &(0x7f0000000140)=@raw=[@alu={0x7, 0x1, 0xa, 0x5, 0x7, 0xfffffffffffffff4}, @map={0x18, 0x8, 0x1, 0x0, r3}, @jmp={0x5, 0x0, 0x7, 0x4, 0x3, 0xfffffffffffffffe, 0xfffffffffffffff0}, @ldst={0x2, 0x3, 0x2, 0x5, 0x3, 0xffffffffffffffff}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x4}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @map_val={0x18, 0x9, 0x2, 0x0, r4, 0x0, 0x0, 0x0, 0x37}], &(0x7f00000001c0)='GPL\x00', 0x7ff, 0xe5, &(0x7f0000000280)=""/229, 0x41000, 0x4, '\x00', 0x0, 0x0, r5, 0x8, &(0x7f00000003c0)={0x7, 0x1}, 0x8, 0x10, &(0x7f0000000400)={0x0, 0xa, 0xf4, 0x400}, 0x10, 0x27538}, 0x78) 23:09:17 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x15, 0x0, 0x1, 0x0, 0x6, @multicast}, 0x14) clone(0x2000000082148180, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_STRSET_GET(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000640)={0x0, 0x1cc}, 0x1, 0x0, 0x0, 0x8800}, 0x20040040) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) request_key(0x0, &(0x7f0000001ffb)={'syz', 0x1}, 0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x1004) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0x3, 0x380, 0x3ca, 0xe0, 0xe0, 0xe0, 0x0, 0x2e8, 0x2e8, 0x2e8, 0x2e8, 0x2e8, 0x7fffffe, 0x0, {[{{@uncond, 0x0, 0x70, 0xe0, 0x0, {0x6020000}}, @common=@unspec=@NFLOG={0x70, 'NFLOG\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, "a4bcf0ebf5d09e8706580300b1000000124ac31d4fda375c7794e420aa63529ebcf847246a5e8846085b0a30510b266347a84ae5ffea89b8654e4400"}}}, {{@ip={@local, @multicast1, 0x0, 0x0, '\x00', 'wg1\x00'}, 0x0, 0x1c8, 0x208, 0x0, {}, [@common=@inet=@hashlimit3={{0x158}, {'bridge_slave_1\x00', {0x0, 0x8, 0x0, 0x0, 0x0, 0x7fff, 0x8}}}]}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "29f0be44329ad4d94a815c71ad95092b933b5e380a7e5d3c56c51e9d0027"}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x3e0) 23:09:18 executing program 1: ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000001c0)={'team0\x00', 0x0}) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000680)={0xffffffffffffffff, 0x10, &(0x7f0000000640)={&(0x7f0000000780)=""/4096, 0x1000, 0x0}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000001780)={0x8, 0x7, &(0x7f0000001800)=ANY=[@ANYBLOB="180000009d57000000000000060000001832000005000000000000000000000495000000000000005c150400010000009500000000434e0dae2ef63aab6acde18cddf77c67000000"], &(0x7f0000000180)='GPL\x00', 0x2, 0x0, 0x0, 0x41100, 0xd, '\x00', r0, 0x1d, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x6, 0x5}, 0x8, 0x10, &(0x7f0000000600)={0x5, 0x0, 0x0, 0x10001}, 0x10, r1}, 0x78) r2 = getpgrp(0x0) prctl$PR_SET_PTRACER(0x59616d61, r2) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x24000000) r3 = gettid() perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x2100, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x4}, 0x0, 0x8}, 0x0, 0x8, 0xffffffffffffffff, 0x9) clone(0x6cb2e100, 0x0, 0x0, 0x0, 0x0) r4 = openat$rtc(0xffffffffffffff9c, &(0x7f00000168c0), 0x0, 0x0) ioctl$RTC_UIE_ON(r4, 0x7003) ioctl$RTC_SET_TIME(r4, 0x4024700a, &(0x7f0000000000)={0x0, 0x0, 0x0, 0xf, 0x0, 0xfd}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x9efef75f}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvlan={{0xc}, {0x4}}}, @IFLA_LINK={0x8}]}, 0x3c}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000001940)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000006c0)={&(0x7f0000001880)=@dellinkprop={0xb0, 0x6d, 0x20, 0x70bd28, 0x25dfdbff, {0x0, 0x0, 0x0, 0x0, 0x210, 0xc0018}, [@IFLA_TARGET_NETNSID={0x8, 0x2e, 0x2}, @IFLA_MASTER={0x8}, @IFLA_AF_SPEC={0x70, 0x1a, 0x0, 0x1, [@AF_MPLS={0x4}, @AF_MPLS={0x4}, @AF_INET6={0x28, 0xa, 0x0, 0x1, [@IFLA_INET6_ADDR_GEN_MODE={0x5, 0x8, 0x6b}, @IFLA_INET6_TOKEN={0x14, 0x7, @mcast2}, @IFLA_INET6_ADDR_GEN_MODE={0x5, 0x8, 0x7}]}, @AF_MPLS={0x4}, @AF_INET6={0x28, 0xa, 0x0, 0x1, [@IFLA_INET6_ADDR_GEN_MODE={0x5, 0x8, 0x8}, @IFLA_INET6_ADDR_GEN_MODE={0x5, 0x8, 0x56}, @IFLA_INET6_TOKEN={0x14, 0x7, @ipv4={'\x00', '\xff\xff', @local}}]}, @AF_MPLS={0x4}, @AF_INET6={0xc, 0xa, 0x0, 0x1, [@IFLA_INET6_ADDR_GEN_MODE={0x5, 0x8, 0x9}]}]}, @IFLA_IFALIASn={0x4}, @IFLA_PHYS_PORT_ID={0xb, 0x22, "3df17141c4e8d5"}]}, 0xb0}, 0x1, 0x0, 0x0, 0x4000001}, 0x84000) clone(0x2908000, &(0x7f0000000080)="6028d78584a9523ff3b18b3c7f86b0f46595537c62f1f47ca39e4ff27666a38078b3617669c736e28539aa28b2d44ceec9dc0c3a4d3dd6d901efcff839fc776cc0790c", &(0x7f0000000140), &(0x7f0000000440), &(0x7f0000000480)="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") ptrace(0x10, r3) wait4(0x0, 0x0, 0x0, 0x0) 23:09:18 executing program 3: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x15, 0x0, 0x1, 0x0, 0x6, @multicast}, 0x14) clone(0x2000000082148180, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_STRSET_GET(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000640)={&(0x7f00000006c0)=ANY=[@ANYBLOB="cccd30", @ANYRES16=0x0, @ANYBLOB="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", @ANYRES32=0x0, @ANYBLOB="1400020069703667726574617030000000000000140002006970366572f370616e20000000000000fa0ee59a22b338aeb6d3895b934764e9a674c87f74b9c35aaa183a9ea95194a3dc40d9b230a9f627acae68e5f0381078395e744b4197fe3dd12112adacad625f6ae8e22901a3dd5920796e7dc087d5033e12c9e4aea2026a5df4ee89adbeda48287c2840149cf27af2cc0f064680a7b5e90f480b201f70326baca201fea21a0100000000000000"], 0x1cc}, 0x1, 0x0, 0x0, 0x8800}, 0x20040040) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) request_key(0x0, &(0x7f0000001ffb)={'syz', 0x1}, 0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x1004) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0x3, 0x380, 0x0, 0xe0, 0xe0, 0xe0, 0x0, 0x2e8, 0x2e8, 0x2e8, 0x2e8, 0x2e8, 0x7fffffe, 0x0, {[{{@uncond, 0x0, 0x70, 0xe0, 0x0, {0x6020000}}, @common=@unspec=@NFLOG={0x70, 'NFLOG\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, "a4bcf0ebf5d09e8706000000b1000000124ac31d4fda375c7794e420aa63529ebcf847246a5e8846085b0a30510b266347a84ae5ffea89b8654e4400000400"}}}, {{@ip={@local, @multicast1, 0x0, 0x0, '\x00', 'wg1\x00'}, 0x0, 0x1c8, 0x208, 0x0, {}, [@common=@inet=@hashlimit3={{0x158}, {'bridge_slave_1\x00', {0x0, 0x8, 0x0, 0x0, 0x0, 0x7fff, 0x8}}}]}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "29f0be44329ad4d94a815c71ad95092b933b5e380a7e5d3c56c51e9d0027"}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x3e0) 23:09:18 executing program 4: perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0xc7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x12, 0xf7, 0x4, 0x3}, 0x40) r0 = getpgrp(0x0) r1 = perf_event_open(&(0x7f00000006c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c44}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ID(r1, 0x80042407, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000000)={0x3, 0x80, 0x1, 0xd2, 0x7c, 0xfa, 0x0, 0x4, 0x400c, 0x6, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2ca, 0x0, @perf_config_ext={0x1ff, 0x2}, 0x5002, 0x100, 0x374, 0x3, 0x7, 0x7, 0x1, 0x0, 0x6, 0x0, 0x7}, r0, 0x2, r1, 0xa) 23:09:18 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x15, 0x0, 0x1, 0x0, 0x6, @multicast}, 0x14) clone(0x2000000082148180, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_STRSET_GET(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000640)={&(0x7f00000006c0)=ANY=[@ANYBLOB="cccd30", @ANYRES16=0x0, @ANYBLOB="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", @ANYRES32=0x0, @ANYBLOB="1400020069703667726574617030000000000000140002006970366572f370616e20000000000000fa0ee59a22b338aeb6d3895b934764e9a674c87f74b9c35aaa183a9ea95194a3dc40d9b230a9f627acae68e5f0381078395e744b4197fe3dd12112adacad625f6ae8e22901a3dd5920796e7dc087d5033e12c9e4aea2026a5df4ee89adbeda48287c2840149cf27af2cc0f064680a7b5e90f480b201f70326baca201fea21a0100000000000000"], 0x1cc}, 0x1, 0x0, 0x0, 0x8800}, 0x20040040) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) request_key(0x0, &(0x7f0000001ffb)={'syz', 0x1}, 0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x1004) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0x3, 0x380, 0x0, 0xe0, 0xe0, 0xe0, 0x0, 0x2e8, 0x2e8, 0x2e8, 0x2e8, 0x2e8, 0x7fffffe, 0x0, {[{{@uncond, 0x0, 0x70, 0xe0, 0x0, {0x6020000}}, @common=@unspec=@NFLOG={0x70, 'NFLOG\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, "a4bcf0ebf5d09e8706000000b1aa0200124ac31d4fda375c7794e420aa63529ebcf847246a5e8846085b0a30510b266347a84ae5ffea89b8654e4400"}}}, {{@ip={@local, @multicast1, 0x0, 0x0, '\x00', 'wg1\x00'}, 0x0, 0x1c8, 0x208, 0x0, {}, [@common=@inet=@hashlimit3={{0x158}, {'bridge_slave_1\x00', {0x0, 0x8, 0x0, 0x0, 0x0, 0x7fff, 0x8}}}]}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "29f0be44329ad4d94a815c71ad95092b933b5e380a7e5d3c56c51e9d0027"}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x3e0) 23:09:18 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x15, 0x0, 0x1, 0x0, 0x6, @multicast}, 0x14) clone(0x2000000082148180, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_STRSET_GET(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000640)={0x0, 0x1cc}, 0x1, 0x0, 0x0, 0x8800}, 0x20040040) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) request_key(0x0, &(0x7f0000001ffb)={'syz', 0x1}, 0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x1004) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0x3, 0x380, 0x3eb, 0xe0, 0xe0, 0xe0, 0x0, 0x2e8, 0x2e8, 0x2e8, 0x2e8, 0x2e8, 0x7fffffe, 0x0, {[{{@uncond, 0x0, 0x70, 0xe0, 0x0, {0x6020000}}, @common=@unspec=@NFLOG={0x70, 'NFLOG\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, "a4bcf0ebf5d09e8706580300b1000000124ac31d4fda375c7794e420aa63529ebcf847246a5e8846085b0a30510b266347a84ae5ffea89b8654e4400"}}}, {{@ip={@local, @multicast1, 0x0, 0x0, '\x00', 'wg1\x00'}, 0x0, 0x1c8, 0x208, 0x0, {}, [@common=@inet=@hashlimit3={{0x158}, {'bridge_slave_1\x00', {0x0, 0x8, 0x0, 0x0, 0x0, 0x7fff, 0x8}}}]}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "29f0be44329ad4d94a815c71ad95092b933b5e380a7e5d3c56c51e9d0027"}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x3e0) 23:09:18 executing program 2: r0 = getpgrp(0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x24000000) r1 = gettid() perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000080), 0x30200, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) unshare(0x4000000) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, r3, 0x0) preadv(0xffffffffffffffff, &(0x7f00000002c0)=[{&(0x7f00000001c0)=""/251, 0xfb}], 0x1, 0x0, 0x0) bpf$ITER_CREATE(0x21, &(0x7f0000000100)={r2}, 0x9) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x26, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = perf_event_open(&(0x7f00000006c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c44}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ID(r4, 0x80042407, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000140)={0x1, 0x80, 0x0, 0x7, 0x0, 0xff, 0x0, 0x2, 0x0, 0xe, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, @perf_bp={&(0x7f00000000c0), 0x8}, 0x18000, 0x8000, 0xfffffffc, 0x1, 0x1000000000, 0x8, 0x3, 0x0, 0x8, 0x0, 0x9}, r1, 0x2, r4, 0x2) clone(0x6cb2e100, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r1) wait4(0x0, 0x0, 0x0, 0x0) 23:09:18 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x15, 0x0, 0x1, 0x0, 0x6, @multicast}, 0x14) clone(0x2000000082148180, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_STRSET_GET(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000640)={&(0x7f00000006c0)=ANY=[@ANYBLOB="cccd30", @ANYRES16=0x0, @ANYBLOB="02002abd7000fbdbdf250100000004000300800102800c00018008000100070000002400018008000100070000000800010008000000080001000100000008000100060000001c0001800800010005000000080001000200000008000100000000002c000180080001000600000008000100070000000800010003000000080001000600000008000100000000005400018008000100060000000800010001000000080001000400000008000100000000000800010000000000080001000000000008000100000000000800010008000000080001000300000008000100020000001c0001800800010008000000080001000100000008000100050000001c0001800800010004000000080001000400000008000100010000002c000180080001000000000008000100040000000800010007000000080001000700000008000100080000004c0001800800010002000000080001000200000008000100050000000800010003000000080001000400000008000100040000000800010000000000080001000400000008000100030000003400018008000100", @ANYRES32=0x0, @ANYBLOB="1400020069703667726574617030000000000000140002006970366572f370616e20000000000000fa0ee59a22b338aeb6d3895b934764e9a674c87f74b9c35aaa183a9ea95194a3dc40d9b230a9f627acae68e5f0381078395e744b4197fe3dd12112adacad625f6ae8e22901a3dd5920796e7dc087d5033e12c9e4aea2026a5df4ee89adbeda48287c2840149cf27af2cc0f064680a7b5e90f480b201f70326baca201fea21a0100000000000000"], 0x1cc}, 0x1, 0x0, 0x0, 0x8800}, 0x20040040) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) request_key(0x0, &(0x7f0000001ffb)={'syz', 0x1}, 0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x1004) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0x3, 0x380, 0x0, 0xe0, 0xe0, 0xe0, 0x0, 0x2e8, 0x2e8, 0x2e8, 0x2e8, 0x2e8, 0x7fffffe, 0x0, {[{{@uncond, 0x0, 0x70, 0xe0, 0x0, {0x6020000}}, @common=@unspec=@NFLOG={0x70, 'NFLOG\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, "a4bcf0ebf5d09e8706000000b1e40000124ac31d4fda375c7794e420aa63529ebcf847246a5e8846085b0a30510b266347a84ae5ffea89b8654e4400"}}}, {{@ip={@local, @multicast1, 0x0, 0x0, '\x00', 'wg1\x00'}, 0x0, 0x1c8, 0x208, 0x0, {}, [@common=@inet=@hashlimit3={{0x158}, {'bridge_slave_1\x00', {0x0, 0x8, 0x0, 0x0, 0x0, 0x7fff, 0x8}}}]}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "29f0be44329ad4d94a815c71ad95092b933b5e380a7e5d3c56c51e9d0027"}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x3e0) 23:09:18 executing program 3: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x15, 0x0, 0x1, 0x0, 0x6, @multicast}, 0x14) clone(0x2000000082148180, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_STRSET_GET(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000640)={&(0x7f00000006c0)=ANY=[@ANYBLOB="cccd30", @ANYRES16=0x0, @ANYBLOB="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", @ANYRES32=0x0, @ANYBLOB="1400020069703667726574617030000000000000140002006970366572f370616e20000000000000fa0ee59a22b338aeb6d3895b934764e9a674c87f74b9c35aaa183a9ea95194a3dc40d9b230a9f627acae68e5f0381078395e744b4197fe3dd12112adacad625f6ae8e22901a3dd5920796e7dc087d5033e12c9e4aea2026a5df4ee89adbeda48287c2840149cf27af2cc0f064680a7b5e90f480b201f70326baca201fea21a0100000000000000"], 0x1cc}, 0x1, 0x0, 0x0, 0x8800}, 0x20040040) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) request_key(0x0, &(0x7f0000001ffb)={'syz', 0x1}, 0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x1004) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0x3, 0x380, 0x0, 0xe0, 0xe0, 0xe0, 0x0, 0x2e8, 0x2e8, 0x2e8, 0x2e8, 0x2e8, 0x7fffffe, 0x0, {[{{@uncond, 0x0, 0x70, 0xe0, 0x0, {0x6020000}}, @common=@unspec=@NFLOG={0x70, 'NFLOG\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, "a4bcf0ebf5d09e8706000000b1000000124ac31d4fda375c7794e420aa63529ebcf847246a5e8846085b0a30510b266347a84ae5ffea89b8654e4400001000"}}}, {{@ip={@local, @multicast1, 0x0, 0x0, '\x00', 'wg1\x00'}, 0x0, 0x1c8, 0x208, 0x0, {}, [@common=@inet=@hashlimit3={{0x158}, {'bridge_slave_1\x00', {0x0, 0x8, 0x0, 0x0, 0x0, 0x7fff, 0x8}}}]}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "29f0be44329ad4d94a815c71ad95092b933b5e380a7e5d3c56c51e9d0027"}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x3e0) 23:09:18 executing program 2: r0 = getpgrp(0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x24000000) r1 = gettid() perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000080), 0x30200, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) unshare(0x4000000) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, r3, 0x0) preadv(0xffffffffffffffff, &(0x7f00000002c0)=[{&(0x7f00000001c0)=""/251, 0xfb}], 0x1, 0x0, 0x0) bpf$ITER_CREATE(0x21, &(0x7f0000000100)={r2}, 0x9) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x26, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = perf_event_open(&(0x7f00000006c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c44}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ID(r4, 0x80042407, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000140)={0x1, 0x80, 0x0, 0x7, 0x0, 0xff, 0x0, 0x2, 0x0, 0xe, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, @perf_bp={&(0x7f00000000c0), 0x8}, 0x18000, 0x8000, 0xfffffffc, 0x1, 0x1000000000, 0x8, 0x3, 0x0, 0x8, 0x0, 0x9}, r1, 0x2, r4, 0x2) clone(0x6cb2e100, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r1) wait4(0x0, 0x0, 0x0, 0x0) 23:09:18 executing program 4: r0 = perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0xc7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x11, 0xf7, 0x4, 0x5}, 0x40) ioctl$DRM_IOCTL_GET_CLIENT(0xffffffffffffffff, 0xc0286405, &(0x7f00000000c0)={0x1, 0x0, {0xffffffffffffffff}, {}, 0x3}) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x14001, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000000)={0x4, 0x80, 0x1, 0x5, 0x4, 0x46, 0x0, 0x15c, 0x0, 0x18fa5224c0145024, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1ff, 0x0, @perf_config_ext={0x8, 0x5a5}, 0x408ce, 0xf58, 0x10000, 0x8, 0x0, 0x3fd, 0x101, 0x0, 0x2, 0x0, 0xf32}, r1, 0x1, r0, 0xa) 23:09:18 executing program 0 (fault-call:17 fault-nth:0): r0 = getpgrp(0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x24000000) r1 = gettid() perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000, 0x0, 0x2af}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000080), 0x30200, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) unshare(0x4000000) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r3, 0x0) r4 = syz_open_dev$cec(&(0x7f0000000300), 0x3, 0x2) preadv(r4, &(0x7f00000002c0)=[{&(0x7f00000001c0)=""/251, 0xfb}], 0x1, 0xda3, 0x400001) bpf$ITER_CREATE(0x21, &(0x7f0000000100)={r2}, 0x9) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x26, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = perf_event_open(&(0x7f00000006c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c44}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ID(r5, 0x80042407, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000140)={0x1, 0x80, 0x1, 0x7, 0x6, 0xff, 0x0, 0x2, 0x80200, 0xe, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x400, 0x1, @perf_bp={&(0x7f00000000c0), 0x8}, 0x18000, 0x8000, 0xfffffffc, 0x1, 0x1000000000, 0x8, 0x3, 0x0, 0x8, 0x0, 0x9}, r1, 0x2, r5, 0x2) clone(0x6cb2e100, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r1) wait4(0x0, 0x0, 0x0, 0x0) 23:09:18 executing program 1: ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000001c0)={'team0\x00', 0x0}) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000680)={0xffffffffffffffff, 0x10, &(0x7f0000000640)={&(0x7f0000000780)=""/4096, 0x1000, 0x0}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000001780)={0x8, 0x7, &(0x7f0000001800)=ANY=[@ANYBLOB="180000009d57000000000000060000001832000005000000000000000000000495000000000000005c150400010000009500000000434e0dae2ef63aab6acde18cddf77c67000000"], &(0x7f0000000180)='GPL\x00', 0x2, 0x0, 0x0, 0x41100, 0xd, '\x00', r0, 0x1d, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x6, 0x5}, 0x8, 0x10, &(0x7f0000000600)={0x5, 0x0, 0x0, 0x10001}, 0x10, r1}, 0x78) r2 = getpgrp(0x0) prctl$PR_SET_PTRACER(0x59616d61, r2) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x24000000) r3 = gettid() perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x2100, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x4}, 0x0, 0x8}, 0x0, 0x8, 0xffffffffffffffff, 0x9) clone(0x6cb2e100, 0x0, 0x0, 0x0, 0x0) r4 = openat$rtc(0xffffffffffffff9c, &(0x7f00000168c0), 0x0, 0x0) clone(0x59040000, &(0x7f0000000200)="32b026bb2bd5ab05345d05868d1008feb1352fb452659a55b2c8650d5c3b8d9896f83163af0908ddf225ca94e880899df94150b94cce61a62255c2da294ef09dd6df955a8b10081fc4491edeff6bdea1f408c84f564a1702f2429d4ed091a3ef6bb7002cdeb2cb9790f44b23c402166d7ced3ecafcbc5a046b763517bf35421cba1dc4f3b4a67d3882fcad4bd680d79d963ee7d31048c06d6a09d69830d36d80e15be2156e695858a0937e49a60e4623fca37ffd32972d2555bb01a4c5c57e4e6c39ec93e0887c3ed39a172ca646bc8514bdb64ddceb12d7d09546d0c5d8c9fe33f4296409029503d314e0", &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="99d1c32534d9de00af8729fa460ec9d5628744ffe3cb327edbe5d45fed028bf303c434286297cbfe9f121b1bc94969fa74f64c4cb8a1d40cadfe5d1afe1911de07770c57e37c225c0843887e02f6881c533230e4a3d43275e9cd079068012291e77d44bf1f4398518c9d64ae643b1ebff18fb2d4d632098a07dd40847a76374a4a01df2f34c001369ba9b86499548cbb8ce4cda4ae5179f35c9feb4de592a550f357f89d1660d711fac0e2a8") ioctl$RTC_SET_TIME(r4, 0x4024700a, &(0x7f0000000000)={0x0, 0x0, 0x0, 0xf, 0x0, 0xfd}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x9efef75f}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvlan={{0xc}, {0x4}}}, @IFLA_LINK={0x8}]}, 0x3c}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000001940)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000006c0)={&(0x7f0000001880)=@dellinkprop={0xb0, 0x6d, 0x20, 0x70bd28, 0x25dfdbff, {0x0, 0x0, 0x0, 0x0, 0x210, 0xc0018}, [@IFLA_TARGET_NETNSID={0x8, 0x2e, 0x2}, @IFLA_MASTER={0x8}, @IFLA_AF_SPEC={0x70, 0x1a, 0x0, 0x1, [@AF_MPLS={0x4}, @AF_MPLS={0x4}, @AF_INET6={0x28, 0xa, 0x0, 0x1, [@IFLA_INET6_ADDR_GEN_MODE={0x5, 0x8, 0x6b}, @IFLA_INET6_TOKEN={0x14, 0x7, @mcast2}, @IFLA_INET6_ADDR_GEN_MODE={0x5, 0x8, 0x7}]}, @AF_MPLS={0x4}, @AF_INET6={0x28, 0xa, 0x0, 0x1, [@IFLA_INET6_ADDR_GEN_MODE={0x5, 0x8, 0x8}, @IFLA_INET6_ADDR_GEN_MODE={0x5, 0x8, 0x56}, @IFLA_INET6_TOKEN={0x14, 0x7, @ipv4={'\x00', '\xff\xff', @local}}]}, @AF_MPLS={0x4}, @AF_INET6={0xc, 0xa, 0x0, 0x1, [@IFLA_INET6_ADDR_GEN_MODE={0x5, 0x8, 0x9}]}]}, @IFLA_IFALIASn={0x4}, @IFLA_PHYS_PORT_ID={0xb, 0x22, "3df17141c4e8d5"}]}, 0xb0}, 0x1, 0x0, 0x0, 0x4000001}, 0x84000) clone(0x2908000, &(0x7f0000000080)="6028d78584a9523ff3b18b3c7f86b0f46595537c62f1f47ca39e4ff27666a38078b3617669c736e28539aa28b2d44ceec9dc0c3a4d3dd6d901efcff839fc776cc0790c", &(0x7f0000000140), &(0x7f0000000440), &(0x7f0000000480)="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") ptrace(0x10, r3) wait4(0x0, 0x0, 0x0, 0x0) 23:09:18 executing program 3: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x15, 0x0, 0x1, 0x0, 0x6, @multicast}, 0x14) clone(0x2000000082148180, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_STRSET_GET(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000640)={&(0x7f00000006c0)=ANY=[@ANYBLOB="cccd30", @ANYRES16=0x0, @ANYBLOB="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", @ANYRES32=0x0, @ANYBLOB="1400020069703667726574617030000000000000140002006970366572f370616e20000000000000fa0ee59a22b338aeb6d3895b934764e9a674c87f74b9c35aaa183a9ea95194a3dc40d9b230a9f627acae68e5f0381078395e744b4197fe3dd12112adacad625f6ae8e22901a3dd5920796e7dc087d5033e12c9e4aea2026a5df4ee89adbeda48287c2840149cf27af2cc0f064680a7b5e90f480b201f70326baca201fea21a0100000000000000"], 0x1cc}, 0x1, 0x0, 0x0, 0x8800}, 0x20040040) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) request_key(0x0, &(0x7f0000001ffb)={'syz', 0x1}, 0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x1004) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0x3, 0x380, 0x0, 0xe0, 0xe0, 0xe0, 0x0, 0x2e8, 0x2e8, 0x2e8, 0x2e8, 0x2e8, 0x7fffffe, 0x0, {[{{@uncond, 0x0, 0x70, 0xe0, 0x0, {0x6020000}}, @common=@unspec=@NFLOG={0x70, 'NFLOG\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, "a4bcf0ebf5d09e8706000000b1000000124ac31d4fda375c7794e420aa63529ebcf847246a5e8846085b0a30510b266347a84ae5ffea89b8654e44ffff1f00"}}}, {{@ip={@local, @multicast1, 0x0, 0x0, '\x00', 'wg1\x00'}, 0x0, 0x1c8, 0x208, 0x0, {}, [@common=@inet=@hashlimit3={{0x158}, {'bridge_slave_1\x00', {0x0, 0x8, 0x0, 0x0, 0x0, 0x7fff, 0x8}}}]}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "29f0be44329ad4d94a815c71ad95092b933b5e380a7e5d3c56c51e9d0027"}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x3e0) 23:09:18 executing program 4: perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0xc7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x12, 0xf7, 0x4, 0x3}, 0x40) r0 = perf_event_open(&(0x7f00000006c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c44}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ID(r0, 0x80042407, &(0x7f00000000c0)) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x880, 0x0) close(r1) ioctl$BTRFS_IOC_DEFAULT_SUBVOL(r0, 0x40089413, &(0x7f0000000000)) [ 2183.118882] FAULT_INJECTION: forcing a failure. [ 2183.118882] name failslab, interval 1, probability 0, space 0, times 0 [ 2183.202659] CPU: 0 PID: 27368 Comm: syz-executor.0 Not tainted 4.19.205-syzkaller #0 [ 2183.210666] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2183.220057] Call Trace: [ 2183.222660] dump_stack+0x1fc/0x2ef [ 2183.226303] should_fail.cold+0xa/0xf [ 2183.230209] ? setup_fault_attr+0x200/0x200 [ 2183.234544] ? lock_acquire+0x170/0x3c0 [ 2183.238544] __should_failslab+0x115/0x180 [ 2183.242794] should_failslab+0x5/0x10 [ 2183.246693] kmem_cache_alloc_node+0x245/0x3b0 [ 2183.251376] copy_process.part.0+0x1ceb/0x8260 [ 2183.255969] ? mark_held_locks+0xa6/0xf0 [ 2183.260047] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2183.264813] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 2183.269400] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2183.274164] ? rcu_nmi_exit+0xb3/0x180 [ 2183.278063] ? retint_kernel+0x2d/0x2d [ 2183.281959] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2183.286729] ? __cleanup_sighand+0x60/0x60 [ 2183.290968] ? rcu_nmi_exit+0xb3/0x180 [ 2183.294869] ? retint_kernel+0x2d/0x2d [ 2183.298965] _do_fork+0x22f/0xf30 [ 2183.302436] ? fork_idle+0x220/0x220 [ 2183.306168] ? fput+0x2b/0x190 [ 2183.309373] ? ksys_write+0x1c8/0x2a0 [ 2183.313190] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 2183.318561] ? trace_hardirqs_off_caller+0x6e/0x210 [ 2183.323583] ? do_syscall_64+0x21/0x620 [ 2183.327571] do_syscall_64+0xf9/0x620 [ 2183.331385] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2183.336579] RIP: 0033:0x4665f9 23:09:18 executing program 3: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x15, 0x0, 0x1, 0x0, 0x6, @multicast}, 0x14) clone(0x2000000082148180, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_STRSET_GET(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000640)={&(0x7f00000006c0)=ANY=[@ANYBLOB="cccd30", @ANYRES16=0x0, @ANYBLOB="02002abd7000fbdbdf250100000004000300800102800c00018008000100070000002400018008000100070000000800010008000000080001000100000008000100060000001c0001800800010005000000080001000200000008000100000000002c000180080001000600000008000100070000000800010003000000080001000600000008000100000000005400018008000100060000000800010001000000080001000400000008000100000000000800010000000000080001000000000008000100000000000800010008000000080001000300000008000100020000001c0001800800010008000000080001000100000008000100050000001c0001800800010004000000080001000400000008000100010000002c000180080001000000000008000100040000000800010007000000080001000700000008000100080000004c0001800800010002000000080001000200000008000100050000000800010003000000080001000400000008000100040000000800010000000000080001000400000008000100030000003400018008000100", @ANYRES32=0x0, @ANYBLOB="1400020069703667726574617030000000000000140002006970366572f370616e20000000000000fa0ee59a22b338aeb6d3895b934764e9a674c87f74b9c35aaa183a9ea95194a3dc40d9b230a9f627acae68e5f0381078395e744b4197fe3dd12112adacad625f6ae8e22901a3dd5920796e7dc087d5033e12c9e4aea2026a5df4ee89adbeda48287c2840149cf27af2cc0f064680a7b5e90f480b201f70326baca201fea21a0100000000000000"], 0x1cc}, 0x1, 0x0, 0x0, 0x8800}, 0x20040040) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) request_key(0x0, &(0x7f0000001ffb)={'syz', 0x1}, 0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x1004) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0x3, 0x380, 0x0, 0xe0, 0xe0, 0xe0, 0x0, 0x2e8, 0x2e8, 0x2e8, 0x2e8, 0x2e8, 0x7fffffe, 0x0, {[{{@uncond, 0x0, 0x70, 0xe0, 0x0, {0x6020000}}, @common=@unspec=@NFLOG={0x70, 'NFLOG\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, "a4bcf0ebf5d09e8706000000b1000000124ac31d4fda375c7794e420aa63529ebcf847246a5e8846085b0a30510b266347a84ae5ffea89b8654e440000000100"}}}, {{@ip={@local, @multicast1, 0x0, 0x0, '\x00', 'wg1\x00'}, 0x0, 0x1c8, 0x208, 0x0, {}, [@common=@inet=@hashlimit3={{0x158}, {'bridge_slave_1\x00', {0x0, 0x8, 0x0, 0x0, 0x0, 0x7fff, 0x8}}}]}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "29f0be44329ad4d94a815c71ad95092b933b5e380a7e5d3c56c51e9d0027"}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x3e0) [ 2183.339783] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2183.358699] RSP: 002b:00007f9e46bff188 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 2183.366422] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665f9 [ 2183.373698] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 000000006cb2e100 [ 2183.380965] RBP: 00007f9e46bff1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2183.388227] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2183.395485] R13: 00007fffc85e2cdf R14: 00007f9e46bff300 R15: 0000000000022000 23:09:18 executing program 0 (fault-call:17 fault-nth:1): r0 = getpgrp(0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x24000000) r1 = gettid() perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000, 0x0, 0x2af}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000080), 0x30200, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) unshare(0x4000000) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r3, 0x0) r4 = syz_open_dev$cec(&(0x7f0000000300), 0x3, 0x2) preadv(r4, &(0x7f00000002c0)=[{&(0x7f00000001c0)=""/251, 0xfb}], 0x1, 0xda3, 0x400001) bpf$ITER_CREATE(0x21, &(0x7f0000000100)={r2}, 0x9) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x26, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = perf_event_open(&(0x7f00000006c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c44}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ID(r5, 0x80042407, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000140)={0x1, 0x80, 0x1, 0x7, 0x6, 0xff, 0x0, 0x2, 0x80200, 0xe, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x400, 0x1, @perf_bp={&(0x7f00000000c0), 0x8}, 0x18000, 0x8000, 0xfffffffc, 0x1, 0x1000000000, 0x8, 0x3, 0x0, 0x8, 0x0, 0x9}, r1, 0x2, r5, 0x2) clone(0x6cb2e100, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r1) wait4(0x0, 0x0, 0x0, 0x0) 23:09:18 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x15, 0x0, 0x1, 0x0, 0x6, @multicast}, 0x14) clone(0x2000000082148180, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_STRSET_GET(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000640)={0x0, 0x1cc}, 0x1, 0x0, 0x0, 0x8800}, 0x20040040) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) request_key(0x0, &(0x7f0000001ffb)={'syz', 0x1}, 0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x1004) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0x3, 0x380, 0x3f1, 0xe0, 0xe0, 0xe0, 0x0, 0x2e8, 0x2e8, 0x2e8, 0x2e8, 0x2e8, 0x7fffffe, 0x0, {[{{@uncond, 0x0, 0x70, 0xe0, 0x0, {0x6020000}}, @common=@unspec=@NFLOG={0x70, 'NFLOG\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, "a4bcf0ebf5d09e8706580300b1000000124ac31d4fda375c7794e420aa63529ebcf847246a5e8846085b0a30510b266347a84ae5ffea89b8654e4400"}}}, {{@ip={@local, @multicast1, 0x0, 0x0, '\x00', 'wg1\x00'}, 0x0, 0x1c8, 0x208, 0x0, {}, [@common=@inet=@hashlimit3={{0x158}, {'bridge_slave_1\x00', {0x0, 0x8, 0x0, 0x0, 0x0, 0x7fff, 0x8}}}]}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "29f0be44329ad4d94a815c71ad95092b933b5e380a7e5d3c56c51e9d0027"}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x3e0) [ 2183.545834] FAULT_INJECTION: forcing a failure. [ 2183.545834] name fail_page_alloc, interval 1, probability 0, space 0, times 1 [ 2183.557666] CPU: 1 PID: 27401 Comm: syz-executor.0 Not tainted 4.19.205-syzkaller #0 [ 2183.565595] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2183.574949] Call Trace: [ 2183.577554] dump_stack+0x1fc/0x2ef [ 2183.581202] should_fail.cold+0xa/0xf [ 2183.585015] ? setup_fault_attr+0x200/0x200 [ 2183.589344] ? _raw_spin_unlock_irq+0x5a/0x80 [ 2183.593854] ? finish_task_switch+0x146/0x760 [ 2183.598351] ? finish_task_switch+0x118/0x760 [ 2183.602947] __alloc_pages_nodemask+0x239/0x2890 [ 2183.607713] ? __lock_acquire+0x6de/0x3ff0 [ 2183.611963] ? __lock_acquire+0x6de/0x3ff0 [ 2183.616296] ? gfp_pfmemalloc_allowed+0x150/0x150 [ 2183.621169] ? mark_held_locks+0xf0/0xf0 [ 2183.625237] ? __might_fault+0x11f/0x1d0 [ 2183.629398] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2183.634168] cache_grow_begin+0xa4/0x8a0 [ 2183.638326] ? setup_fault_attr+0x200/0x200 [ 2183.642911] ? lock_acquire+0x170/0x3c0 [ 2183.646893] cache_alloc_refill+0x273/0x340 [ 2183.651220] kmem_cache_alloc_node+0x39e/0x3b0 [ 2183.655842] copy_process.part.0+0x1ceb/0x8260 [ 2183.660437] ? proc_fail_nth_write+0x16b/0x1d0 [ 2183.665027] ? check_memory_region+0x27/0x170 [ 2183.669532] ? proc_fail_nth_write+0x95/0x1d0 [ 2183.674065] ? proc_tgid_io_accounting+0x7f0/0x7f0 [ 2183.679009] ? __cleanup_sighand+0x60/0x60 [ 2183.683252] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2183.688017] ? lock_downgrade+0x720/0x720 [ 2183.692270] _do_fork+0x22f/0xf30 [ 2183.695740] ? fork_idle+0x220/0x220 [ 2183.699552] ? fput+0x2b/0x190 [ 2183.702755] ? ksys_write+0x1c8/0x2a0 [ 2183.706569] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 2183.712376] ? trace_hardirqs_off_caller+0x6e/0x210 [ 2183.717398] ? do_syscall_64+0x21/0x620 [ 2183.721387] do_syscall_64+0xf9/0x620 [ 2183.725200] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2183.730395] RIP: 0033:0x4665f9 23:09:18 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x15, 0x0, 0x1, 0x0, 0x6, @multicast}, 0x14) clone(0x2000000082148180, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_STRSET_GET(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000640)={0x0, 0x1cc}, 0x1, 0x0, 0x0, 0x8800}, 0x20040040) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) request_key(0x0, &(0x7f0000001ffb)={'syz', 0x1}, 0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x1004) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0x3, 0x380, 0x3fa, 0xe0, 0xe0, 0xe0, 0x0, 0x2e8, 0x2e8, 0x2e8, 0x2e8, 0x2e8, 0x7fffffe, 0x0, {[{{@uncond, 0x0, 0x70, 0xe0, 0x0, {0x6020000}}, @common=@unspec=@NFLOG={0x70, 'NFLOG\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, "a4bcf0ebf5d09e8706580300b1000000124ac31d4fda375c7794e420aa63529ebcf847246a5e8846085b0a30510b266347a84ae5ffea89b8654e4400"}}}, {{@ip={@local, @multicast1, 0x0, 0x0, '\x00', 'wg1\x00'}, 0x0, 0x1c8, 0x208, 0x0, {}, [@common=@inet=@hashlimit3={{0x158}, {'bridge_slave_1\x00', {0x0, 0x8, 0x0, 0x0, 0x0, 0x7fff, 0x8}}}]}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "29f0be44329ad4d94a815c71ad95092b933b5e380a7e5d3c56c51e9d0027"}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x3e0) 23:09:18 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x15, 0x0, 0x1, 0x0, 0x6, @multicast}, 0x14) clone(0x2000000082148180, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_STRSET_GET(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000640)={0x0, 0x1cc}, 0x1, 0x0, 0x0, 0x8800}, 0x20040040) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) request_key(0x0, &(0x7f0000001ffb)={'syz', 0x1}, 0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x1004) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0x3, 0x380, 0x3fc, 0xe0, 0xe0, 0xe0, 0x0, 0x2e8, 0x2e8, 0x2e8, 0x2e8, 0x2e8, 0x7fffffe, 0x0, {[{{@uncond, 0x0, 0x70, 0xe0, 0x0, {0x6020000}}, @common=@unspec=@NFLOG={0x70, 'NFLOG\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, "a4bcf0ebf5d09e8706580300b1000000124ac31d4fda375c7794e420aa63529ebcf847246a5e8846085b0a30510b266347a84ae5ffea89b8654e4400"}}}, {{@ip={@local, @multicast1, 0x0, 0x0, '\x00', 'wg1\x00'}, 0x0, 0x1c8, 0x208, 0x0, {}, [@common=@inet=@hashlimit3={{0x158}, {'bridge_slave_1\x00', {0x0, 0x8, 0x0, 0x0, 0x0, 0x7fff, 0x8}}}]}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "29f0be44329ad4d94a815c71ad95092b933b5e380a7e5d3c56c51e9d0027"}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x3e0) 23:09:19 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x15, 0x0, 0x1, 0x0, 0x6, @multicast}, 0x14) clone(0x2000000082148180, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_STRSET_GET(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000640)={0x0, 0x1cc}, 0x1, 0x0, 0x0, 0x8800}, 0x20040040) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) request_key(0x0, &(0x7f0000001ffb)={'syz', 0x1}, 0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x1004) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0x3, 0x380, 0x700, 0xe0, 0xe0, 0xe0, 0x0, 0x2e8, 0x2e8, 0x2e8, 0x2e8, 0x2e8, 0x7fffffe, 0x0, {[{{@uncond, 0x0, 0x70, 0xe0, 0x0, {0x6020000}}, @common=@unspec=@NFLOG={0x70, 'NFLOG\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, "a4bcf0ebf5d09e8706580300b1000000124ac31d4fda375c7794e420aa63529ebcf847246a5e8846085b0a30510b266347a84ae5ffea89b8654e4400"}}}, {{@ip={@local, @multicast1, 0x0, 0x0, '\x00', 'wg1\x00'}, 0x0, 0x1c8, 0x208, 0x0, {}, [@common=@inet=@hashlimit3={{0x158}, {'bridge_slave_1\x00', {0x0, 0x8, 0x0, 0x0, 0x0, 0x7fff, 0x8}}}]}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "29f0be44329ad4d94a815c71ad95092b933b5e380a7e5d3c56c51e9d0027"}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x3e0) [ 2183.733596] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2183.752587] RSP: 002b:00007f9e46bff188 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 2183.760320] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665f9 [ 2183.767597] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 000000006cb2e100 [ 2183.774873] RBP: 00007f9e46bff1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2183.782143] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2183.789436] R13: 00007fffc85e2cdf R14: 00007f9e46bff300 R15: 0000000000022000 23:09:21 executing program 2: r0 = getpgrp(0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x24000000) r1 = gettid() perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000080), 0x30200, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) unshare(0x4000000) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, r3, 0x0) preadv(0xffffffffffffffff, &(0x7f00000002c0)=[{&(0x7f00000001c0)=""/251, 0xfb}], 0x1, 0x0, 0x0) bpf$ITER_CREATE(0x21, &(0x7f0000000100)={r2}, 0x9) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x26, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = perf_event_open(&(0x7f00000006c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c44}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ID(r4, 0x80042407, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000140)={0x1, 0x80, 0x0, 0x7, 0x0, 0xff, 0x0, 0x2, 0x0, 0xe, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x400, 0x0, @perf_bp={&(0x7f00000000c0), 0x8}, 0x18000, 0x8000, 0xfffffffc, 0x1, 0x1000000000, 0x8, 0x3, 0x0, 0x8, 0x0, 0x9}, r1, 0x2, r4, 0x2) clone(0x6cb2e100, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r1) wait4(0x0, 0x0, 0x0, 0x0) 23:09:21 executing program 4: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) timer_create(0x0, 0x0, 0x0) syz_init_net_socket$nl_rdma(0x10, 0x3, 0x10) r0 = perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0xc7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x12, 0xf7, 0x4, 0x3}, 0x40) r2 = dup2(r0, r1) perf_event_open(&(0x7f00000000c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x3, 0x0, 0x4, 0xa001, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x6, 0x6, @perf_bp, 0x10, 0x0, 0x6, 0x5, 0x2, 0x9, 0x5, 0x0, 0x4, 0x0, 0xffe00000000000}, 0x0, 0xc, r2, 0x1) 23:09:21 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x15, 0x0, 0x1, 0x0, 0x6, @multicast}, 0x14) clone(0x2000000082148180, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_STRSET_GET(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000640)={0x0, 0x1cc}, 0x1, 0x0, 0x0, 0x8800}, 0x20040040) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) request_key(0x0, &(0x7f0000001ffb)={'syz', 0x1}, 0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x1004) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0x3, 0x380, 0xc00, 0xe0, 0xe0, 0xe0, 0x0, 0x2e8, 0x2e8, 0x2e8, 0x2e8, 0x2e8, 0x7fffffe, 0x0, {[{{@uncond, 0x0, 0x70, 0xe0, 0x0, {0x6020000}}, @common=@unspec=@NFLOG={0x70, 'NFLOG\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, "a4bcf0ebf5d09e8706580300b1000000124ac31d4fda375c7794e420aa63529ebcf847246a5e8846085b0a30510b266347a84ae5ffea89b8654e4400"}}}, {{@ip={@local, @multicast1, 0x0, 0x0, '\x00', 'wg1\x00'}, 0x0, 0x1c8, 0x208, 0x0, {}, [@common=@inet=@hashlimit3={{0x158}, {'bridge_slave_1\x00', {0x0, 0x8, 0x0, 0x0, 0x0, 0x7fff, 0x8}}}]}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "29f0be44329ad4d94a815c71ad95092b933b5e380a7e5d3c56c51e9d0027"}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x3e0) [ 2185.952931] IPVS: ftp: loaded support on port[0] = 21 23:09:21 executing program 1: ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000001c0)={'team0\x00', 0x0}) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000680)={0xffffffffffffffff, 0x10, &(0x7f0000000640)={&(0x7f0000000780)=""/4096, 0x1000, 0x0}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000001780)={0x8, 0x7, &(0x7f0000001800)=ANY=[@ANYBLOB="180000009d57000000000000060000001832000005000000000000000000000495000000000000005c150400010000009500000000434e0dae2ef63aab6acde18cddf77c67000000"], &(0x7f0000000180)='GPL\x00', 0x2, 0x0, 0x0, 0x41100, 0xd, '\x00', r0, 0x1d, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x6, 0x5}, 0x8, 0x10, &(0x7f0000000600)={0x5, 0x0, 0x0, 0x10001}, 0x10, r1}, 0x78) r2 = getpgrp(0x0) prctl$PR_SET_PTRACER(0x59616d61, r2) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x24000000) r3 = gettid() perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x2100, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x4}, 0x0, 0x8}, 0x0, 0x8, 0xffffffffffffffff, 0x9) clone(0x6cb2e100, 0x0, 0x0, 0x0, 0x0) r4 = openat$rtc(0xffffffffffffff9c, &(0x7f00000168c0), 0x0, 0x0) clone(0x59040000, &(0x7f0000000200)="32b026bb2bd5ab05345d05868d1008feb1352fb452659a55b2c8650d5c3b8d9896f83163af0908ddf225ca94e880899df94150b94cce61a62255c2da294ef09dd6df955a8b10081fc4491edeff6bdea1f408c84f564a1702f2429d4ed091a3ef6bb7002cdeb2cb9790f44b23c402166d7ced3ecafcbc5a046b763517bf35421cba1dc4f3b4a67d3882fcad4bd680d79d963ee7d31048c06d6a09d69830d36d80e15be2156e695858a0937e49a60e4623fca37ffd32972d2555bb01a4c5c57e4e6c39ec93e0887c3ed39a172ca646bc8514bdb64ddceb12d7d09546d0c5d8c9fe33f4296409029503d314e0", &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="99d1c32534d9de00af8729fa460ec9d5628744ffe3cb327edbe5d45fed028bf303c434286297cbfe9f121b1bc94969fa74f64c4cb8a1d40cadfe5d1afe1911de07770c57e37c225c0843887e02f6881c533230e4a3d43275e9cd079068012291e77d44bf1f4398518c9d64ae643b1ebff18fb2d4d632098a07dd40847a76374a4a01df2f34c001369ba9b86499548cbb8ce4cda4ae5179f35c9feb4de592a550f357f89d1660d711fac0e2a8") ioctl$RTC_SET_TIME(r4, 0x4024700a, &(0x7f0000000000)={0x0, 0x0, 0x0, 0xf, 0x0, 0xfd}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x9efef75f}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvlan={{0xc}, {0x4}}}, @IFLA_LINK={0x8}]}, 0x3c}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000001940)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000006c0)={&(0x7f0000001880)=@dellinkprop={0xb0, 0x6d, 0x20, 0x70bd28, 0x25dfdbff, {0x0, 0x0, 0x0, 0x0, 0x210, 0xc0018}, [@IFLA_TARGET_NETNSID={0x8, 0x2e, 0x2}, @IFLA_MASTER={0x8}, @IFLA_AF_SPEC={0x70, 0x1a, 0x0, 0x1, [@AF_MPLS={0x4}, @AF_MPLS={0x4}, @AF_INET6={0x28, 0xa, 0x0, 0x1, [@IFLA_INET6_ADDR_GEN_MODE={0x5, 0x8, 0x6b}, @IFLA_INET6_TOKEN={0x14, 0x7, @mcast2}, @IFLA_INET6_ADDR_GEN_MODE={0x5, 0x8, 0x7}]}, @AF_MPLS={0x4}, @AF_INET6={0x28, 0xa, 0x0, 0x1, [@IFLA_INET6_ADDR_GEN_MODE={0x5, 0x8, 0x8}, @IFLA_INET6_ADDR_GEN_MODE={0x5, 0x8, 0x56}, @IFLA_INET6_TOKEN={0x14, 0x7, @ipv4={'\x00', '\xff\xff', @local}}]}, @AF_MPLS={0x4}, @AF_INET6={0xc, 0xa, 0x0, 0x1, [@IFLA_INET6_ADDR_GEN_MODE={0x5, 0x8, 0x9}]}]}, @IFLA_IFALIASn={0x4}, @IFLA_PHYS_PORT_ID={0xb, 0x22, "3df17141c4e8d5"}]}, 0xb0}, 0x1, 0x0, 0x0, 0x4000001}, 0x84000) clone(0x2908000, &(0x7f0000000080)="6028d78584a9523ff3b18b3c7f86b0f46595537c62f1f47ca39e4ff27666a38078b3617669c736e28539aa28b2d44ceec9dc0c3a4d3dd6d901efcff839fc776cc0790c", &(0x7f0000000140), &(0x7f0000000440), &(0x7f0000000480)="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") ptrace(0x10, r3) wait4(0x0, 0x0, 0x0, 0x0) 23:09:21 executing program 3: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x15, 0x0, 0x1, 0x0, 0x6, @multicast}, 0x14) clone(0x2000000082148180, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_STRSET_GET(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000640)={&(0x7f00000006c0)=ANY=[@ANYBLOB="cccd30", @ANYRES16=0x0, @ANYBLOB="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", @ANYRES32=0x0, @ANYBLOB="1400020069703667726574617030000000000000140002006970366572f370616e20000000000000fa0ee59a22b338aeb6d3895b934764e9a674c87f74b9c35aaa183a9ea95194a3dc40d9b230a9f627acae68e5f0381078395e744b4197fe3dd12112adacad625f6ae8e22901a3dd5920796e7dc087d5033e12c9e4aea2026a5df4ee89adbeda48287c2840149cf27af2cc0f064680a7b5e90f480b201f70326baca201fea21a0100000000000000"], 0x1cc}, 0x1, 0x0, 0x0, 0x8800}, 0x20040040) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) request_key(0x0, &(0x7f0000001ffb)={'syz', 0x1}, 0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x1004) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0x3, 0x380, 0x0, 0xe0, 0xe0, 0xe0, 0x0, 0x2e8, 0x2e8, 0x2e8, 0x2e8, 0x2e8, 0x7fffffe, 0x0, {[{{@uncond, 0x0, 0x70, 0xe0, 0x0, {0x6020000}}, @common=@unspec=@NFLOG={0x70, 'NFLOG\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, "a4bcf0ebf5d09e8706000000b1000000124ac31d4fda375c7794e420aa63529ebcf847246a5e8846085b0a30510b266347a84ae5ffea89b8654e440000000200"}}}, {{@ip={@local, @multicast1, 0x0, 0x0, '\x00', 'wg1\x00'}, 0x0, 0x1c8, 0x208, 0x0, {}, [@common=@inet=@hashlimit3={{0x158}, {'bridge_slave_1\x00', {0x0, 0x8, 0x0, 0x0, 0x0, 0x7fff, 0x8}}}]}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "29f0be44329ad4d94a815c71ad95092b933b5e380a7e5d3c56c51e9d0027"}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x3e0) 23:09:21 executing program 0 (fault-call:17 fault-nth:2): r0 = getpgrp(0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x24000000) r1 = gettid() perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000, 0x0, 0x2af}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000080), 0x30200, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) unshare(0x4000000) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r3, 0x0) r4 = syz_open_dev$cec(&(0x7f0000000300), 0x3, 0x2) preadv(r4, &(0x7f00000002c0)=[{&(0x7f00000001c0)=""/251, 0xfb}], 0x1, 0xda3, 0x400001) bpf$ITER_CREATE(0x21, &(0x7f0000000100)={r2}, 0x9) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x26, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = perf_event_open(&(0x7f00000006c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c44}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ID(r5, 0x80042407, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000140)={0x1, 0x80, 0x1, 0x7, 0x6, 0xff, 0x0, 0x2, 0x80200, 0xe, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x400, 0x1, @perf_bp={&(0x7f00000000c0), 0x8}, 0x18000, 0x8000, 0xfffffffc, 0x1, 0x1000000000, 0x8, 0x3, 0x0, 0x8, 0x0, 0x9}, r1, 0x2, r5, 0x2) clone(0x6cb2e100, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r1) wait4(0x0, 0x0, 0x0, 0x0) 23:09:21 executing program 2: r0 = getpgrp(0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x24000000) r1 = gettid() perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000080), 0x30200, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) unshare(0x4000000) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, r3, 0x0) preadv(0xffffffffffffffff, &(0x7f00000002c0)=[{&(0x7f00000001c0)=""/251, 0xfb}], 0x1, 0x0, 0x0) bpf$ITER_CREATE(0x21, &(0x7f0000000100)={r2}, 0x9) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x26, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = perf_event_open(&(0x7f00000006c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c44}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ID(r4, 0x80042407, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000140)={0x1, 0x80, 0x0, 0x7, 0x0, 0xff, 0x0, 0x2, 0x0, 0xe, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x400, 0x0, @perf_bp={&(0x7f00000000c0), 0x8}, 0x18000, 0x8000, 0xfffffffc, 0x1, 0x1000000000, 0x8, 0x3, 0x0, 0x8, 0x0, 0x9}, r1, 0x2, r4, 0x2) clone(0x6cb2e100, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r1) wait4(0x0, 0x0, 0x0, 0x0) 23:09:21 executing program 1: ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000001c0)={'team0\x00', 0x0}) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000680)={0xffffffffffffffff, 0x10, &(0x7f0000000640)={&(0x7f0000000780)=""/4096, 0x1000, 0x0}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000001780)={0x8, 0x7, &(0x7f0000001800)=ANY=[@ANYBLOB="180000009d57000000000000060000001832000005000000000000000000000495000000000000005c150400010000009500000000434e0dae2ef63aab6acde18cddf77c67000000"], &(0x7f0000000180)='GPL\x00', 0x2, 0x0, 0x0, 0x41100, 0xd, '\x00', r0, 0x1d, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x6, 0x5}, 0x8, 0x10, &(0x7f0000000600)={0x5, 0x0, 0x0, 0x10001}, 0x10, r1}, 0x78) r2 = getpgrp(0x0) prctl$PR_SET_PTRACER(0x59616d61, r2) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x24000000) r3 = gettid() perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x2100, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x4}, 0x0, 0x8}, 0x0, 0x8, 0xffffffffffffffff, 0x9) clone(0x6cb2e100, 0x0, 0x0, 0x0, 0x0) r4 = openat$rtc(0xffffffffffffff9c, &(0x7f00000168c0), 0x0, 0x0) clone(0x59040000, &(0x7f0000000200)="32b026bb2bd5ab05345d05868d1008feb1352fb452659a55b2c8650d5c3b8d9896f83163af0908ddf225ca94e880899df94150b94cce61a62255c2da294ef09dd6df955a8b10081fc4491edeff6bdea1f408c84f564a1702f2429d4ed091a3ef6bb7002cdeb2cb9790f44b23c402166d7ced3ecafcbc5a046b763517bf35421cba1dc4f3b4a67d3882fcad4bd680d79d963ee7d31048c06d6a09d69830d36d80e15be2156e695858a0937e49a60e4623fca37ffd32972d2555bb01a4c5c57e4e6c39ec93e0887c3ed39a172ca646bc8514bdb64ddceb12d7d09546d0c5d8c9fe33f4296409029503d314e0", &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="99d1c32534d9de00af8729fa460ec9d5628744ffe3cb327edbe5d45fed028bf303c434286297cbfe9f121b1bc94969fa74f64c4cb8a1d40cadfe5d1afe1911de07770c57e37c225c0843887e02f6881c533230e4a3d43275e9cd079068012291e77d44bf1f4398518c9d64ae643b1ebff18fb2d4d632098a07dd40847a76374a4a01df2f34c001369ba9b86499548cbb8ce4cda4ae5179f35c9feb4de592a550f357f89d1660d711fac0e2a8") ioctl$RTC_SET_TIME(r4, 0x4024700a, &(0x7f0000000000)={0x0, 0x0, 0x0, 0xf, 0x0, 0xfd}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x9efef75f}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvlan={{0xc}, {0x4}}}, @IFLA_LINK={0x8}]}, 0x3c}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000001940)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000006c0)={&(0x7f0000001880)=@dellinkprop={0xb0, 0x6d, 0x20, 0x70bd28, 0x25dfdbff, {0x0, 0x0, 0x0, 0x0, 0x210, 0xc0018}, [@IFLA_TARGET_NETNSID={0x8, 0x2e, 0x2}, @IFLA_MASTER={0x8}, @IFLA_AF_SPEC={0x70, 0x1a, 0x0, 0x1, [@AF_MPLS={0x4}, @AF_MPLS={0x4}, @AF_INET6={0x28, 0xa, 0x0, 0x1, [@IFLA_INET6_ADDR_GEN_MODE={0x5, 0x8, 0x6b}, @IFLA_INET6_TOKEN={0x14, 0x7, @mcast2}, @IFLA_INET6_ADDR_GEN_MODE={0x5, 0x8, 0x7}]}, @AF_MPLS={0x4}, @AF_INET6={0x28, 0xa, 0x0, 0x1, [@IFLA_INET6_ADDR_GEN_MODE={0x5, 0x8, 0x8}, @IFLA_INET6_ADDR_GEN_MODE={0x5, 0x8, 0x56}, @IFLA_INET6_TOKEN={0x14, 0x7, @ipv4={'\x00', '\xff\xff', @local}}]}, @AF_MPLS={0x4}, @AF_INET6={0xc, 0xa, 0x0, 0x1, [@IFLA_INET6_ADDR_GEN_MODE={0x5, 0x8, 0x9}]}]}, @IFLA_IFALIASn={0x4}, @IFLA_PHYS_PORT_ID={0xb, 0x22, "3df17141c4e8d5"}]}, 0xb0}, 0x1, 0x0, 0x0, 0x4000001}, 0x84000) clone(0x2908000, &(0x7f0000000080)="6028d78584a9523ff3b18b3c7f86b0f46595537c62f1f47ca39e4ff27666a38078b3617669c736e28539aa28b2d44ceec9dc0c3a4d3dd6d901efcff839fc776cc0790c", &(0x7f0000000140), &(0x7f0000000440), &(0x7f0000000480)="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") ptrace(0x10, r3) wait4(0x0, 0x0, 0x0, 0x0) [ 2186.271420] FAULT_INJECTION: forcing a failure. [ 2186.271420] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 2186.289161] CPU: 1 PID: 27491 Comm: syz-executor.0 Not tainted 4.19.205-syzkaller #0 [ 2186.297140] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2186.306498] Call Trace: [ 2186.309094] dump_stack+0x1fc/0x2ef [ 2186.312743] should_fail.cold+0xa/0xf [ 2186.316551] ? check_preemption_disabled+0x41/0x280 [ 2186.321590] ? setup_fault_attr+0x200/0x200 [ 2186.325928] __alloc_pages_nodemask+0x239/0x2890 [ 2186.330702] ? __lock_acquire+0x6de/0x3ff0 [ 2186.334958] ? gfp_pfmemalloc_allowed+0x150/0x150 [ 2186.339810] ? gfp_pfmemalloc_allowed+0x150/0x150 [ 2186.344667] ? mark_held_locks+0xf0/0xf0 [ 2186.348730] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2186.353492] ? ____cache_alloc_node+0x156/0x1d0 [ 2186.358168] cache_grow_begin+0xa4/0x8a0 [ 2186.362238] ? check_preemption_disabled+0x41/0x280 [ 2186.367265] ____cache_alloc_node+0x170/0x1d0 [ 2186.371764] ? check_preemption_disabled+0x41/0x280 [ 2186.376789] kmem_cache_alloc_node+0xe3/0x3b0 [ 2186.381295] copy_process.part.0+0x1ceb/0x8260 [ 2186.385884] ? mark_held_locks+0xa6/0xf0 [ 2186.389949] ? io_schedule_timeout+0x140/0x140 [ 2186.394537] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2186.399306] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 2186.403895] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2186.408672] ? retint_kernel+0x2d/0x2d [ 2186.412583] ? __cleanup_sighand+0x60/0x60 [ 2186.416823] ? __fsnotify_parent+0xa2/0x370 [ 2186.421154] ? lock_downgrade+0x720/0x720 [ 2186.425311] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2186.430089] _do_fork+0x22f/0xf30 [ 2186.433571] ? fork_idle+0x220/0x220 [ 2186.437291] ? rcu_nmi_exit+0xb3/0x180 [ 2186.441184] ? retint_kernel+0x2d/0x2d [ 2186.445114] ? do_syscall_64+0x4f/0x620 [ 2186.449182] do_syscall_64+0xf9/0x620 [ 2186.452991] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2186.458178] RIP: 0033:0x4665f9 [ 2186.461400] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2186.480301] RSP: 002b:00007f9e46bff188 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 2186.488015] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665f9 [ 2186.495283] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 000000006cb2e100 [ 2186.502552] RBP: 00007f9e46bff1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2186.509822] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 23:09:21 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x15, 0x0, 0x1, 0x0, 0x6, @multicast}, 0x14) clone(0x2000000082148180, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_STRSET_GET(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000640)={0x0, 0x1cc}, 0x1, 0x0, 0x0, 0x8800}, 0x20040040) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) request_key(0x0, &(0x7f0000001ffb)={'syz', 0x1}, 0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x1004) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0x3, 0x380, 0xd00, 0xe0, 0xe0, 0xe0, 0x0, 0x2e8, 0x2e8, 0x2e8, 0x2e8, 0x2e8, 0x7fffffe, 0x0, {[{{@uncond, 0x0, 0x70, 0xe0, 0x0, {0x6020000}}, @common=@unspec=@NFLOG={0x70, 'NFLOG\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, "a4bcf0ebf5d09e8706580300b1000000124ac31d4fda375c7794e420aa63529ebcf847246a5e8846085b0a30510b266347a84ae5ffea89b8654e4400"}}}, {{@ip={@local, @multicast1, 0x0, 0x0, '\x00', 'wg1\x00'}, 0x0, 0x1c8, 0x208, 0x0, {}, [@common=@inet=@hashlimit3={{0x158}, {'bridge_slave_1\x00', {0x0, 0x8, 0x0, 0x0, 0x0, 0x7fff, 0x8}}}]}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "29f0be44329ad4d94a815c71ad95092b933b5e380a7e5d3c56c51e9d0027"}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x3e0) 23:09:21 executing program 3: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x15, 0x0, 0x1, 0x0, 0x6, @multicast}, 0x14) clone(0x2000000082148180, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_STRSET_GET(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000640)={&(0x7f00000006c0)=ANY=[@ANYBLOB="cccd30", @ANYRES16=0x0, @ANYBLOB="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", @ANYRES32=0x0, @ANYBLOB="1400020069703667726574617030000000000000140002006970366572f370616e20000000000000fa0ee59a22b338aeb6d3895b934764e9a674c87f74b9c35aaa183a9ea95194a3dc40d9b230a9f627acae68e5f0381078395e744b4197fe3dd12112adacad625f6ae8e22901a3dd5920796e7dc087d5033e12c9e4aea2026a5df4ee89adbeda48287c2840149cf27af2cc0f064680a7b5e90f480b201f70326baca201fea21a0100000000000000"], 0x1cc}, 0x1, 0x0, 0x0, 0x8800}, 0x20040040) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) request_key(0x0, &(0x7f0000001ffb)={'syz', 0x1}, 0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x1004) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0x3, 0x380, 0x0, 0xe0, 0xe0, 0xe0, 0x0, 0x2e8, 0x2e8, 0x2e8, 0x2e8, 0x2e8, 0x7fffffe, 0x0, {[{{@uncond, 0x0, 0x70, 0xe0, 0x0, {0x6020000}}, @common=@unspec=@NFLOG={0x70, 'NFLOG\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, "a4bcf0ebf5d09e8706000000b1000000124ac31d4fda375c7794e420aa63529ebcf847246a5e8846085b0a30510b266347a84ae5ffea89b8654e440000020200"}}}, {{@ip={@local, @multicast1, 0x0, 0x0, '\x00', 'wg1\x00'}, 0x0, 0x1c8, 0x208, 0x0, {}, [@common=@inet=@hashlimit3={{0x158}, {'bridge_slave_1\x00', {0x0, 0x8, 0x0, 0x0, 0x0, 0x7fff, 0x8}}}]}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "29f0be44329ad4d94a815c71ad95092b933b5e380a7e5d3c56c51e9d0027"}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x3e0) [ 2186.517281] R13: 00007fffc85e2cdf R14: 00007f9e46bff300 R15: 0000000000022000 [ 2186.557417] IPVS: ftp: loaded support on port[0] = 21 23:09:21 executing program 3: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x15, 0x0, 0x1, 0x0, 0x6, @multicast}, 0x14) clone(0x2000000082148180, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_STRSET_GET(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000640)={&(0x7f00000006c0)=ANY=[@ANYBLOB="cccd30", @ANYRES16=0x0, @ANYBLOB="02002abd7000fbdbdf250100000004000300800102800c00018008000100070000002400018008000100070000000800010008000000080001000100000008000100060000001c0001800800010005000000080001000200000008000100000000002c000180080001000600000008000100070000000800010003000000080001000600000008000100000000005400018008000100060000000800010001000000080001000400000008000100000000000800010000000000080001000000000008000100000000000800010008000000080001000300000008000100020000001c0001800800010008000000080001000100000008000100050000001c0001800800010004000000080001000400000008000100010000002c000180080001000000000008000100040000000800010007000000080001000700000008000100080000004c0001800800010002000000080001000200000008000100050000000800010003000000080001000400000008000100040000000800010000000000080001000400000008000100030000003400018008000100", @ANYRES32=0x0, @ANYBLOB="1400020069703667726574617030000000000000140002006970366572f370616e20000000000000fa0ee59a22b338aeb6d3895b934764e9a674c87f74b9c35aaa183a9ea95194a3dc40d9b230a9f627acae68e5f0381078395e744b4197fe3dd12112adacad625f6ae8e22901a3dd5920796e7dc087d5033e12c9e4aea2026a5df4ee89adbeda48287c2840149cf27af2cc0f064680a7b5e90f480b201f70326baca201fea21a0100000000000000"], 0x1cc}, 0x1, 0x0, 0x0, 0x8800}, 0x20040040) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) request_key(0x0, &(0x7f0000001ffb)={'syz', 0x1}, 0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x1004) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0x3, 0x380, 0x0, 0xe0, 0xe0, 0xe0, 0x0, 0x2e8, 0x2e8, 0x2e8, 0x2e8, 0x2e8, 0x7fffffe, 0x0, {[{{@uncond, 0x0, 0x70, 0xe0, 0x0, {0x6020000}}, @common=@unspec=@NFLOG={0x70, 'NFLOG\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, "a4bcf0ebf5d09e8706000000b1000000124ac31d4fda375c7794e420aa63529ebcf847246a5e8846085b0a30510b266347a84ae5ffea89b8654e440000000300"}}}, {{@ip={@local, @multicast1, 0x0, 0x0, '\x00', 'wg1\x00'}, 0x0, 0x1c8, 0x208, 0x0, {}, [@common=@inet=@hashlimit3={{0x158}, {'bridge_slave_1\x00', {0x0, 0x8, 0x0, 0x0, 0x0, 0x7fff, 0x8}}}]}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "29f0be44329ad4d94a815c71ad95092b933b5e380a7e5d3c56c51e9d0027"}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x3e0) 23:09:22 executing program 3: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x15, 0x0, 0x1, 0x0, 0x6, @multicast}, 0x14) clone(0x2000000082148180, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_STRSET_GET(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000640)={&(0x7f00000006c0)=ANY=[@ANYBLOB="cccd30", @ANYRES16=0x0, @ANYBLOB="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", @ANYRES32=0x0, @ANYBLOB="1400020069703667726574617030000000000000140002006970366572f370616e20000000000000fa0ee59a22b338aeb6d3895b934764e9a674c87f74b9c35aaa183a9ea95194a3dc40d9b230a9f627acae68e5f0381078395e744b4197fe3dd12112adacad625f6ae8e22901a3dd5920796e7dc087d5033e12c9e4aea2026a5df4ee89adbeda48287c2840149cf27af2cc0f064680a7b5e90f480b201f70326baca201fea21a0100000000000000"], 0x1cc}, 0x1, 0x0, 0x0, 0x8800}, 0x20040040) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) request_key(0x0, &(0x7f0000001ffb)={'syz', 0x1}, 0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x1004) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0x3, 0x380, 0x0, 0xe0, 0xe0, 0xe0, 0x0, 0x2e8, 0x2e8, 0x2e8, 0x2e8, 0x2e8, 0x7fffffe, 0x0, {[{{@uncond, 0x0, 0x70, 0xe0, 0x0, {0x6020000}}, @common=@unspec=@NFLOG={0x70, 'NFLOG\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, "a4bcf0ebf5d09e8706000000b1000000124ac31d4fda375c7794e420aa63529ebcf847246a5e8846085b0a30510b266347a84ae5ffea89b8654e440000000800"}}}, {{@ip={@local, @multicast1, 0x0, 0x0, '\x00', 'wg1\x00'}, 0x0, 0x1c8, 0x208, 0x0, {}, [@common=@inet=@hashlimit3={{0x158}, {'bridge_slave_1\x00', {0x0, 0x8, 0x0, 0x0, 0x0, 0x7fff, 0x8}}}]}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "29f0be44329ad4d94a815c71ad95092b933b5e380a7e5d3c56c51e9d0027"}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x3e0) 23:09:22 executing program 0 (fault-call:17 fault-nth:3): r0 = getpgrp(0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x24000000) r1 = gettid() perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000, 0x0, 0x2af}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000080), 0x30200, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) unshare(0x4000000) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r3, 0x0) r4 = syz_open_dev$cec(&(0x7f0000000300), 0x3, 0x2) preadv(r4, &(0x7f00000002c0)=[{&(0x7f00000001c0)=""/251, 0xfb}], 0x1, 0xda3, 0x400001) bpf$ITER_CREATE(0x21, &(0x7f0000000100)={r2}, 0x9) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x26, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = perf_event_open(&(0x7f00000006c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c44}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ID(r5, 0x80042407, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000140)={0x1, 0x80, 0x1, 0x7, 0x6, 0xff, 0x0, 0x2, 0x80200, 0xe, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x400, 0x1, @perf_bp={&(0x7f00000000c0), 0x8}, 0x18000, 0x8000, 0xfffffffc, 0x1, 0x1000000000, 0x8, 0x3, 0x0, 0x8, 0x0, 0x9}, r1, 0x2, r5, 0x2) clone(0x6cb2e100, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r1) wait4(0x0, 0x0, 0x0, 0x0) [ 2186.933650] FAULT_INJECTION: forcing a failure. [ 2186.933650] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 2186.956264] CPU: 1 PID: 27557 Comm: syz-executor.0 Not tainted 4.19.205-syzkaller #0 [ 2186.956274] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2186.956278] Call Trace: [ 2186.956300] dump_stack+0x1fc/0x2ef [ 2186.956320] should_fail.cold+0xa/0xf [ 2186.983525] ? lock_acquire+0x170/0x3c0 [ 2186.987507] ? setup_fault_attr+0x200/0x200 [ 2186.991853] __alloc_pages_nodemask+0x239/0x2890 [ 2186.996625] ? _raw_spin_unlock_irq+0x5a/0x80 [ 2187.001132] ? finish_task_switch+0x146/0x760 [ 2187.005630] ? finish_task_switch+0x118/0x760 [ 2187.010132] ? switch_mm_irqs_off+0x764/0x1340 [ 2187.014730] ? io_schedule_timeout+0x140/0x140 [ 2187.019319] ? gfp_pfmemalloc_allowed+0x150/0x150 [ 2187.024173] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 2187.028764] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2187.033532] ? retint_kernel+0x2d/0x2d [ 2187.037434] cache_grow_begin+0xa4/0x8a0 [ 2187.041507] fallback_alloc+0x213/0x2e0 [ 2187.045494] kmem_cache_alloc_node+0xe3/0x3b0 [ 2187.050001] copy_process.part.0+0x1ceb/0x8260 [ 2187.054597] ? check_preemption_disabled+0x41/0x280 [ 2187.059630] ? mark_held_locks+0xa6/0xf0 [ 2187.063699] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2187.068461] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 2187.073046] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2187.077821] ? __cleanup_sighand+0x60/0x60 [ 2187.082065] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2187.086828] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 2187.091417] ? rcu_nmi_exit+0xb3/0x180 [ 2187.095309] _do_fork+0x22f/0xf30 [ 2187.098775] ? fork_idle+0x220/0x220 [ 2187.102505] ? fput+0x2b/0x190 [ 2187.105707] ? ksys_write+0x1c8/0x2a0 [ 2187.109529] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 2187.114903] ? trace_hardirqs_off_caller+0x6e/0x210 [ 2187.119929] ? do_syscall_64+0x21/0x620 [ 2187.123913] do_syscall_64+0xf9/0x620 [ 2187.127764] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2187.132958] RIP: 0033:0x4665f9 [ 2187.136153] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2187.155060] RSP: 002b:00007f9e46bff188 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 2187.162768] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665f9 [ 2187.170048] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 000000006cb2e100 [ 2187.177312] RBP: 00007f9e46bff1d0 R08: 0000000000000000 R09: 0000000000000000 23:09:22 executing program 4: perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0xc7, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4800}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0xa0000, 0x80) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x1d, 0xf7, 0x4, 0x3}, 0x40) 23:09:22 executing program 3: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x15, 0x0, 0x1, 0x0, 0x6, @multicast}, 0x14) clone(0x2000000082148180, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_STRSET_GET(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000640)={&(0x7f00000006c0)=ANY=[@ANYBLOB="cccd30", @ANYRES16=0x0, @ANYBLOB="02002abd7000fbdbdf250100000004000300800102800c00018008000100070000002400018008000100070000000800010008000000080001000100000008000100060000001c0001800800010005000000080001000200000008000100000000002c000180080001000600000008000100070000000800010003000000080001000600000008000100000000005400018008000100060000000800010001000000080001000400000008000100000000000800010000000000080001000000000008000100000000000800010008000000080001000300000008000100020000001c0001800800010008000000080001000100000008000100050000001c0001800800010004000000080001000400000008000100010000002c000180080001000000000008000100040000000800010007000000080001000700000008000100080000004c0001800800010002000000080001000200000008000100050000000800010003000000080001000400000008000100040000000800010000000000080001000400000008000100030000003400018008000100", @ANYRES32=0x0, @ANYBLOB="1400020069703667726574617030000000000000140002006970366572f370616e20000000000000fa0ee59a22b338aeb6d3895b934764e9a674c87f74b9c35aaa183a9ea95194a3dc40d9b230a9f627acae68e5f0381078395e744b4197fe3dd12112adacad625f6ae8e22901a3dd5920796e7dc087d5033e12c9e4aea2026a5df4ee89adbeda48287c2840149cf27af2cc0f064680a7b5e90f480b201f70326baca201fea21a0100000000000000"], 0x1cc}, 0x1, 0x0, 0x0, 0x8800}, 0x20040040) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) request_key(0x0, &(0x7f0000001ffb)={'syz', 0x1}, 0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x1004) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0x3, 0x380, 0x0, 0xe0, 0xe0, 0xe0, 0x0, 0x2e8, 0x2e8, 0x2e8, 0x2e8, 0x2e8, 0x7fffffe, 0x0, {[{{@uncond, 0x0, 0x70, 0xe0, 0x0, {0x6020000}}, @common=@unspec=@NFLOG={0x70, 'NFLOG\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, "a4bcf0ebf5d09e8706000000b1000000124ac31d4fda375c7794e420aa63529ebcf847246a5e8846085b0a30510b266347a84ae5ffea89b8654e440000020800"}}}, {{@ip={@local, @multicast1, 0x0, 0x0, '\x00', 'wg1\x00'}, 0x0, 0x1c8, 0x208, 0x0, {}, [@common=@inet=@hashlimit3={{0x158}, {'bridge_slave_1\x00', {0x0, 0x8, 0x0, 0x0, 0x0, 0x7fff, 0x8}}}]}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "29f0be44329ad4d94a815c71ad95092b933b5e380a7e5d3c56c51e9d0027"}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x3e0) [ 2187.184833] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2187.192092] R13: 00007fffc85e2cdf R14: 00007f9e46bff300 R15: 0000000000022000 23:09:22 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x15, 0x0, 0x1, 0x0, 0x6, @multicast}, 0x14) clone(0x2000000082148180, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_STRSET_GET(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000640)={0x0, 0x1cc}, 0x1, 0x0, 0x0, 0x8800}, 0x20040040) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) request_key(0x0, &(0x7f0000001ffb)={'syz', 0x1}, 0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x1004) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0x3, 0x380, 0x1d00, 0xe0, 0xe0, 0xe0, 0x0, 0x2e8, 0x2e8, 0x2e8, 0x2e8, 0x2e8, 0x7fffffe, 0x0, {[{{@uncond, 0x0, 0x70, 0xe0, 0x0, {0x6020000}}, @common=@unspec=@NFLOG={0x70, 'NFLOG\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, "a4bcf0ebf5d09e8706580300b1000000124ac31d4fda375c7794e420aa63529ebcf847246a5e8846085b0a30510b266347a84ae5ffea89b8654e4400"}}}, {{@ip={@local, @multicast1, 0x0, 0x0, '\x00', 'wg1\x00'}, 0x0, 0x1c8, 0x208, 0x0, {}, [@common=@inet=@hashlimit3={{0x158}, {'bridge_slave_1\x00', {0x0, 0x8, 0x0, 0x0, 0x0, 0x7fff, 0x8}}}]}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "29f0be44329ad4d94a815c71ad95092b933b5e380a7e5d3c56c51e9d0027"}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x3e0) 23:09:22 executing program 4: perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0xc7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 23:09:22 executing program 3: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x15, 0x0, 0x1, 0x0, 0x6, @multicast}, 0x14) clone(0x2000000082148180, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_STRSET_GET(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000640)={&(0x7f00000006c0)=ANY=[@ANYBLOB="cccd30", @ANYRES16=0x0, @ANYBLOB="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", @ANYRES32=0x0, @ANYBLOB="1400020069703667726574617030000000000000140002006970366572f370616e20000000000000fa0ee59a22b338aeb6d3895b934764e9a674c87f74b9c35aaa183a9ea95194a3dc40d9b230a9f627acae68e5f0381078395e744b4197fe3dd12112adacad625f6ae8e22901a3dd5920796e7dc087d5033e12c9e4aea2026a5df4ee89adbeda48287c2840149cf27af2cc0f064680a7b5e90f480b201f70326baca201fea21a0100000000000000"], 0x1cc}, 0x1, 0x0, 0x0, 0x8800}, 0x20040040) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) request_key(0x0, &(0x7f0000001ffb)={'syz', 0x1}, 0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x1004) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0x3, 0x380, 0x0, 0xe0, 0xe0, 0xe0, 0x0, 0x2e8, 0x2e8, 0x2e8, 0x2e8, 0x2e8, 0x7fffffe, 0x0, {[{{@uncond, 0x0, 0x70, 0xe0, 0x0, {0x6020000}}, @common=@unspec=@NFLOG={0x70, 'NFLOG\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, "a4bcf0ebf5d09e8706000000b1000000124ac31d4fda375c7794e420aa63529ebcf847246a5e8846085b0a30510b266347a84ae5ffea89b8654e440000011800"}}}, {{@ip={@local, @multicast1, 0x0, 0x0, '\x00', 'wg1\x00'}, 0x0, 0x1c8, 0x208, 0x0, {}, [@common=@inet=@hashlimit3={{0x158}, {'bridge_slave_1\x00', {0x0, 0x8, 0x0, 0x0, 0x0, 0x7fff, 0x8}}}]}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "29f0be44329ad4d94a815c71ad95092b933b5e380a7e5d3c56c51e9d0027"}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x3e0) 23:09:24 executing program 2: r0 = getpgrp(0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x24000000) r1 = gettid() perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000080), 0x30200, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) unshare(0x4000000) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, r3, 0x0) preadv(0xffffffffffffffff, &(0x7f00000002c0)=[{&(0x7f00000001c0)=""/251, 0xfb}], 0x1, 0x0, 0x0) bpf$ITER_CREATE(0x21, &(0x7f0000000100)={r2}, 0x9) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x26, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = perf_event_open(&(0x7f00000006c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c44}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ID(r4, 0x80042407, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000140)={0x1, 0x80, 0x0, 0x7, 0x0, 0xff, 0x0, 0x2, 0x0, 0xe, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x400, 0x0, @perf_bp={&(0x7f00000000c0), 0x8}, 0x18000, 0x8000, 0xfffffffc, 0x1, 0x1000000000, 0x8, 0x3, 0x0, 0x8, 0x0, 0x9}, r1, 0x2, r4, 0x2) clone(0x6cb2e100, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r1) wait4(0x0, 0x0, 0x0, 0x0) 23:09:24 executing program 1: ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000001c0)={'team0\x00', 0x0}) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000680)={0xffffffffffffffff, 0x10, &(0x7f0000000640)={&(0x7f0000000780)=""/4096, 0x1000, 0x0}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000001780)={0x8, 0x7, &(0x7f0000001800)=ANY=[@ANYBLOB="180000009d57000000000000060000001832000005000000000000000000000495000000000000005c150400010000009500000000434e0dae2ef63aab6acde18cddf77c67000000"], &(0x7f0000000180)='GPL\x00', 0x2, 0x0, 0x0, 0x41100, 0xd, '\x00', r0, 0x1d, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x6, 0x5}, 0x8, 0x10, &(0x7f0000000600)={0x5, 0x0, 0x0, 0x10001}, 0x10, r1}, 0x78) r2 = getpgrp(0x0) prctl$PR_SET_PTRACER(0x59616d61, r2) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x24000000) r3 = gettid() perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x2100, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x4}, 0x0, 0x8}, 0x0, 0x8, 0xffffffffffffffff, 0x9) clone(0x6cb2e100, 0x0, 0x0, 0x0, 0x0) ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) clone(0x59040000, &(0x7f0000000200)="32b026bb2bd5ab05345d05868d1008feb1352fb452659a55b2c8650d5c3b8d9896f83163af0908ddf225ca94e880899df94150b94cce61a62255c2da294ef09dd6df955a8b10081fc4491edeff6bdea1f408c84f564a1702f2429d4ed091a3ef6bb7002cdeb2cb9790f44b23c402166d7ced3ecafcbc5a046b763517bf35421cba1dc4f3b4a67d3882fcad4bd680d79d963ee7d31048c06d6a09d69830d36d80e15be2156e695858a0937e49a60e4623fca37ffd32972d2555bb01a4c5c57e4e6c39ec93e0887c3ed39a172ca646bc8514bdb64ddceb12d7d09546d0c5d8c9fe33f4296409029503d314e0", &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="99d1c32534d9de00af8729fa460ec9d5628744ffe3cb327edbe5d45fed028bf303c434286297cbfe9f121b1bc94969fa74f64c4cb8a1d40cadfe5d1afe1911de07770c57e37c225c0843887e02f6881c533230e4a3d43275e9cd079068012291e77d44bf1f4398518c9d64ae643b1ebff18fb2d4d632098a07dd40847a76374a4a01df2f34c001369ba9b86499548cbb8ce4cda4ae5179f35c9feb4de592a550f357f89d1660d711fac0e2a8") ioctl$RTC_SET_TIME(0xffffffffffffffff, 0x4024700a, &(0x7f0000000000)={0x0, 0x0, 0x0, 0xf, 0x0, 0xfd}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x9efef75f}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvlan={{0xc}, {0x4}}}, @IFLA_LINK={0x8}]}, 0x3c}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000001940)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000006c0)={&(0x7f0000001880)=@dellinkprop={0xb0, 0x6d, 0x20, 0x70bd28, 0x25dfdbff, {0x0, 0x0, 0x0, 0x0, 0x210, 0xc0018}, [@IFLA_TARGET_NETNSID={0x8, 0x2e, 0x2}, @IFLA_MASTER={0x8}, @IFLA_AF_SPEC={0x70, 0x1a, 0x0, 0x1, [@AF_MPLS={0x4}, @AF_MPLS={0x4}, @AF_INET6={0x28, 0xa, 0x0, 0x1, [@IFLA_INET6_ADDR_GEN_MODE={0x5, 0x8, 0x6b}, @IFLA_INET6_TOKEN={0x14, 0x7, @mcast2}, @IFLA_INET6_ADDR_GEN_MODE={0x5, 0x8, 0x7}]}, @AF_MPLS={0x4}, @AF_INET6={0x28, 0xa, 0x0, 0x1, [@IFLA_INET6_ADDR_GEN_MODE={0x5, 0x8, 0x8}, @IFLA_INET6_ADDR_GEN_MODE={0x5, 0x8, 0x56}, @IFLA_INET6_TOKEN={0x14, 0x7, @ipv4={'\x00', '\xff\xff', @local}}]}, @AF_MPLS={0x4}, @AF_INET6={0xc, 0xa, 0x0, 0x1, [@IFLA_INET6_ADDR_GEN_MODE={0x5, 0x8, 0x9}]}]}, @IFLA_IFALIASn={0x4}, @IFLA_PHYS_PORT_ID={0xb, 0x22, "3df17141c4e8d5"}]}, 0xb0}, 0x1, 0x0, 0x0, 0x4000001}, 0x84000) clone(0x2908000, &(0x7f0000000080)="6028d78584a9523ff3b18b3c7f86b0f46595537c62f1f47ca39e4ff27666a38078b3617669c736e28539aa28b2d44ceec9dc0c3a4d3dd6d901efcff839fc776cc0790c", &(0x7f0000000140), &(0x7f0000000440), &(0x7f0000000480)="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") ptrace(0x10, r3) wait4(0x0, 0x0, 0x0, 0x0) 23:09:24 executing program 0: r0 = getpgrp(0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x24000000) r1 = gettid() perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000, 0x0, 0x2af}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000080), 0x30200, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) unshare(0x4000000) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r3, 0x0) r4 = syz_open_dev$cec(&(0x7f0000000300), 0x3, 0x2) preadv(r4, &(0x7f00000002c0)=[{&(0x7f00000001c0)=""/251, 0xfb}], 0x1, 0xda3, 0x400001) bpf$ITER_CREATE(0x21, &(0x7f0000000100)={r2}, 0x9) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x26, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = perf_event_open(&(0x7f00000006c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c44}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ID(r5, 0x80042407, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000140)={0x1, 0x80, 0x1, 0x7, 0x6, 0xff, 0x0, 0x2, 0x80200, 0xe, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x400, 0x1, @perf_bp={&(0x7f00000000c0), 0x8}, 0x18000, 0x8000, 0xfffffffc, 0x1, 0x1000000000, 0x8, 0x3, 0x0, 0x8, 0x0, 0x9}, r1, 0x2, r5, 0x2) clone(0x6cb2e100, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r1) wait4(0x0, 0x0, 0x0, 0x0) 23:09:24 executing program 4: perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0xc7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x12, 0xf7, 0x4, 0x3}, 0x40) perf_event_open(&(0x7f0000000000)={0x4, 0x80, 0x5, 0x1, 0x5, 0x7, 0x0, 0x7, 0x8001, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x4, 0x0, @perf_config_ext={0x0, 0xfff}, 0x58820, 0xe5d, 0x3, 0x2, 0x6, 0x9, 0x4, 0x0, 0x8, 0x0, 0x401}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0xa) 23:09:24 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x15, 0x0, 0x1, 0x0, 0x6, @multicast}, 0x14) clone(0x2000000082148180, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_STRSET_GET(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000640)={0x0, 0x1cc}, 0x1, 0x0, 0x0, 0x8800}, 0x20040040) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) request_key(0x0, &(0x7f0000001ffb)={'syz', 0x1}, 0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x1004) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0x3, 0x380, 0x2000, 0xe0, 0xe0, 0xe0, 0x0, 0x2e8, 0x2e8, 0x2e8, 0x2e8, 0x2e8, 0x7fffffe, 0x0, {[{{@uncond, 0x0, 0x70, 0xe0, 0x0, {0x6020000}}, @common=@unspec=@NFLOG={0x70, 'NFLOG\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, "a4bcf0ebf5d09e8706580300b1000000124ac31d4fda375c7794e420aa63529ebcf847246a5e8846085b0a30510b266347a84ae5ffea89b8654e4400"}}}, {{@ip={@local, @multicast1, 0x0, 0x0, '\x00', 'wg1\x00'}, 0x0, 0x1c8, 0x208, 0x0, {}, [@common=@inet=@hashlimit3={{0x158}, {'bridge_slave_1\x00', {0x0, 0x8, 0x0, 0x0, 0x0, 0x7fff, 0x8}}}]}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "29f0be44329ad4d94a815c71ad95092b933b5e380a7e5d3c56c51e9d0027"}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x3e0) 23:09:24 executing program 3: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x15, 0x0, 0x1, 0x0, 0x6, @multicast}, 0x14) clone(0x2000000082148180, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_STRSET_GET(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000640)={&(0x7f00000006c0)=ANY=[@ANYBLOB="cccd30", @ANYRES16=0x0, @ANYBLOB="02002abd7000fbdbdf250100000004000300800102800c00018008000100070000002400018008000100070000000800010008000000080001000100000008000100060000001c0001800800010005000000080001000200000008000100000000002c000180080001000600000008000100070000000800010003000000080001000600000008000100000000005400018008000100060000000800010001000000080001000400000008000100000000000800010000000000080001000000000008000100000000000800010008000000080001000300000008000100020000001c0001800800010008000000080001000100000008000100050000001c0001800800010004000000080001000400000008000100010000002c000180080001000000000008000100040000000800010007000000080001000700000008000100080000004c0001800800010002000000080001000200000008000100050000000800010003000000080001000400000008000100040000000800010000000000080001000400000008000100030000003400018008000100", @ANYRES32=0x0, @ANYBLOB="1400020069703667726574617030000000000000140002006970366572f370616e20000000000000fa0ee59a22b338aeb6d3895b934764e9a674c87f74b9c35aaa183a9ea95194a3dc40d9b230a9f627acae68e5f0381078395e744b4197fe3dd12112adacad625f6ae8e22901a3dd5920796e7dc087d5033e12c9e4aea2026a5df4ee89adbeda48287c2840149cf27af2cc0f064680a7b5e90f480b201f70326baca201fea21a0100000000000000"], 0x1cc}, 0x1, 0x0, 0x0, 0x8800}, 0x20040040) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) request_key(0x0, &(0x7f0000001ffb)={'syz', 0x1}, 0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x1004) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0x3, 0x380, 0x0, 0xe0, 0xe0, 0xe0, 0x0, 0x2e8, 0x2e8, 0x2e8, 0x2e8, 0x2e8, 0x7fffffe, 0x0, {[{{@uncond, 0x0, 0x70, 0xe0, 0x0, {0x6020000}}, @common=@unspec=@NFLOG={0x70, 'NFLOG\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, "a4bcf0ebf5d09e8706000000b1000000124ac31d4fda375c7794e420aa63529ebcf847246a5e8846085b0a30510b266347a84ae5ffea89b8654e440000021a00"}}}, {{@ip={@local, @multicast1, 0x0, 0x0, '\x00', 'wg1\x00'}, 0x0, 0x1c8, 0x208, 0x0, {}, [@common=@inet=@hashlimit3={{0x158}, {'bridge_slave_1\x00', {0x0, 0x8, 0x0, 0x0, 0x0, 0x7fff, 0x8}}}]}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "29f0be44329ad4d94a815c71ad95092b933b5e380a7e5d3c56c51e9d0027"}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x3e0) 23:09:24 executing program 4: perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0xc7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x200000000, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x5a, 0x1, 0x5, 0x20, 0x0, 0x100000000, 0x8000, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x4, @perf_bp={&(0x7f00000000c0), 0xa}, 0x18040, 0xd3d7, 0x76, 0x0, 0x4, 0x7, 0x800, 0x0, 0x6, 0x0, 0x3}, 0x0, 0xf, r0, 0xa) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) bpf$ITER_CREATE(0x21, &(0x7f0000000000)={r0}, 0x8) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x14001, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file0\x00', 0x0, 0x32) perf_event_open(&(0x7f0000000280)={0x2, 0x80, 0xf7, 0x1f, 0xfa, 0x49, 0x0, 0x1, 0x12, 0xa, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x4}, 0x8612, 0x2, 0x2f60bf11, 0x9, 0xb, 0x57f, 0x20, 0x0, 0x3ff, 0x0, 0x7fffffff}, r1, 0x0, r2, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x12, 0xf7, 0x4, 0x3, 0x0, r0}, 0x40) 23:09:24 executing program 3: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x15, 0x0, 0x1, 0x0, 0x6, @multicast}, 0x14) clone(0x2000000082148180, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_STRSET_GET(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000640)={&(0x7f00000006c0)=ANY=[@ANYBLOB="cccd30", @ANYRES16=0x0, @ANYBLOB="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", @ANYRES32=0x0, @ANYBLOB="1400020069703667726574617030000000000000140002006970366572f370616e20000000000000fa0ee59a22b338aeb6d3895b934764e9a674c87f74b9c35aaa183a9ea95194a3dc40d9b230a9f627acae68e5f0381078395e744b4197fe3dd12112adacad625f6ae8e22901a3dd5920796e7dc087d5033e12c9e4aea2026a5df4ee89adbeda48287c2840149cf27af2cc0f064680a7b5e90f480b201f70326baca201fea21a0100000000000000"], 0x1cc}, 0x1, 0x0, 0x0, 0x8800}, 0x20040040) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) request_key(0x0, &(0x7f0000001ffb)={'syz', 0x1}, 0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x1004) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0x3, 0x380, 0x0, 0xe0, 0xe0, 0xe0, 0x0, 0x2e8, 0x2e8, 0x2e8, 0x2e8, 0x2e8, 0x7fffffe, 0x0, {[{{@uncond, 0x0, 0x70, 0xe0, 0x0, {0x6020000}}, @common=@unspec=@NFLOG={0x70, 'NFLOG\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, "a4bcf0ebf5d09e8706000000b1000000124ac31d4fda375c7794e420aa63529ebcf847246a5e8846085b0a30510b266347a84ae5ffea89b8654e440000001d00"}}}, {{@ip={@local, @multicast1, 0x0, 0x0, '\x00', 'wg1\x00'}, 0x0, 0x1c8, 0x208, 0x0, {}, [@common=@inet=@hashlimit3={{0x158}, {'bridge_slave_1\x00', {0x0, 0x8, 0x0, 0x0, 0x0, 0x7fff, 0x8}}}]}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "29f0be44329ad4d94a815c71ad95092b933b5e380a7e5d3c56c51e9d0027"}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x3e0) 23:09:24 executing program 4: perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0xc7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffffffffffffffd, 0xffffffffffffffff, 0xcaa56b34c3ec7c14) r0 = openat$ocfs2_control(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x6, 0x80, 0x3, 0xf7, 0x0, 0x0, 0x101159, 0x4, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x78a, 0x4, @perf_bp={&(0x7f0000000100), 0x8}, 0x100, 0x5, 0xff, 0x5, 0x1, 0xffffffff, 0x1, 0x0, 0x1, 0x0, 0x6}, 0x0, 0x8, r0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x12, 0xf7, 0x4, 0x3}, 0x40) 23:09:24 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x15, 0x0, 0x1, 0x0, 0x6, @multicast}, 0x14) clone(0x2000000082148180, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_STRSET_GET(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000640)={0x0, 0x1cc}, 0x1, 0x0, 0x0, 0x8800}, 0x20040040) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) request_key(0x0, &(0x7f0000001ffb)={'syz', 0x1}, 0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x1004) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0x3, 0x380, 0x2801, 0xe0, 0xe0, 0xe0, 0x0, 0x2e8, 0x2e8, 0x2e8, 0x2e8, 0x2e8, 0x7fffffe, 0x0, {[{{@uncond, 0x0, 0x70, 0xe0, 0x0, {0x6020000}}, @common=@unspec=@NFLOG={0x70, 'NFLOG\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, "a4bcf0ebf5d09e8706580300b1000000124ac31d4fda375c7794e420aa63529ebcf847246a5e8846085b0a30510b266347a84ae5ffea89b8654e4400"}}}, {{@ip={@local, @multicast1, 0x0, 0x0, '\x00', 'wg1\x00'}, 0x0, 0x1c8, 0x208, 0x0, {}, [@common=@inet=@hashlimit3={{0x158}, {'bridge_slave_1\x00', {0x0, 0x8, 0x0, 0x0, 0x0, 0x7fff, 0x8}}}]}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "29f0be44329ad4d94a815c71ad95092b933b5e380a7e5d3c56c51e9d0027"}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x3e0) 23:09:24 executing program 4: r0 = perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0xc7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffffff}, 0xc00, 0x7fffffff, 0x0, 0x4, 0x1, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$binfmt_script(r0, &(0x7f0000000280)=ANY=[@ANYBLOB="2321202e2f66696c653020000ada5ce5e4a63463f9fb198668683b29f3013d5777c6f4306837228d9a68c977de1f5f49639af36e844ef2f1ccf7b87b9f51cc1f406f6358c8afdb4dd608cb6bbc45fbe624b1e5f6e052bf782f10d94d53ba9f7779dafa2b804b26d402988fbba4496b9df4dfb42f6200af9001d69d4925668371c958fb92a4198ff3fa530119e640e9199c4247a7847b70326985b9ca8a21d49239"], 0x90) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x12, 0xf7, 0x4, 0x3}, 0x40) 23:09:24 executing program 4: perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0xc7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x12, 0xf7, 0x4, 0x3}, 0x40) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f0000000300)={'syztnl2\x00', &(0x7f0000000280)={'syztnl0\x00', 0x0, 0x8, 0x8, 0x7169, 0x200, {{0x15, 0x4, 0x3, 0x3, 0x54, 0x64, 0x0, 0x5, 0x2f, 0x0, @loopback, @broadcast, {[@lsrr={0x83, 0x2b, 0x3a, [@multicast2, @empty, @initdev={0xac, 0x1e, 0x0, 0x0}, @multicast1, @multicast1, @initdev={0xac, 0x1e, 0x0, 0x0}, @remote, @broadcast, @multicast1, @dev={0xac, 0x14, 0x14, 0x30}]}, @ra={0x94, 0x4}, @generic={0x89, 0x10, "44e55916124d817835ca06097f4e"}]}}}}}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv2(r2, &(0x7f0000000500), 0x0, 0x7, 0x0, 0x6) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) socket$inet_udp(0x2, 0x2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r3 = perf_event_open(&(0x7f00000006c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c44}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ID(r3, 0x80042407, &(0x7f00000000c0)) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x40082406, &(0x7f0000000000)='\',()\xd1\x00') bpf$PROG_LOAD(0x5, &(0x7f00000003c0)={0xf, 0x10, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000030000009500000000000000050330000100000001f71f000100000015bbfffffcffffff850000001b000000181a0000", @ANYRES32=r0, @ANYBLOB="0018291f000000f1f359fe94b7d2b0bb2102be2eadce99074ce3fb86db2b973ff0a2531c807000b80de74afa", @ANYRES32=r0, @ANYBLOB="00000000030000008510000008000000180000000300000000000000060000009500000000000000"], &(0x7f00000000c0)='GPL\x00', 0x80, 0xdc, &(0x7f0000000100)=""/220, 0x40f00, 0x1, '\x00', r1, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000340)={0x0, 0x4}, 0x8, 0x10, &(0x7f0000000380)={0x0, 0x9, 0x15, 0x3}, 0x10, 0x0, r2}, 0x78) 23:09:27 executing program 2: r0 = getpgrp(0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x24000000) r1 = gettid() perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000080), 0x30200, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) unshare(0x4000000) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, r3, 0x0) preadv(0xffffffffffffffff, &(0x7f00000002c0)=[{&(0x7f00000001c0)=""/251, 0xfb}], 0x1, 0x0, 0x0) bpf$ITER_CREATE(0x21, &(0x7f0000000100)={r2}, 0x9) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x26, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = perf_event_open(&(0x7f00000006c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c44}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ID(r4, 0x80042407, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000140)={0x1, 0x80, 0x0, 0x7, 0x0, 0xff, 0x0, 0x2, 0x0, 0xe, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x400, 0x1, @perf_bp={0x0, 0x8}, 0x18000, 0x8000, 0xfffffffc, 0x1, 0x1000000000, 0x8, 0x3, 0x0, 0x8, 0x0, 0x9}, r1, 0x2, r4, 0x2) clone(0x6cb2e100, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r1) wait4(0x0, 0x0, 0x0, 0x0) 23:09:27 executing program 1: ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000001c0)={'team0\x00', 0x0}) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000680)={0xffffffffffffffff, 0x10, &(0x7f0000000640)={&(0x7f0000000780)=""/4096, 0x1000, 0x0}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000001780)={0x8, 0x7, &(0x7f0000001800)=ANY=[@ANYBLOB="180000009d57000000000000060000001832000005000000000000000000000495000000000000005c150400010000009500000000434e0dae2ef63aab6acde18cddf77c67000000"], &(0x7f0000000180)='GPL\x00', 0x2, 0x0, 0x0, 0x41100, 0xd, '\x00', r0, 0x1d, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x6, 0x5}, 0x8, 0x10, &(0x7f0000000600)={0x5, 0x0, 0x0, 0x10001}, 0x10, r1}, 0x78) r2 = getpgrp(0x0) prctl$PR_SET_PTRACER(0x59616d61, r2) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x24000000) r3 = gettid() perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x2100, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x4}, 0x0, 0x8}, 0x0, 0x8, 0xffffffffffffffff, 0x9) clone(0x6cb2e100, 0x0, 0x0, 0x0, 0x0) ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) clone(0x59040000, &(0x7f0000000200)="32b026bb2bd5ab05345d05868d1008feb1352fb452659a55b2c8650d5c3b8d9896f83163af0908ddf225ca94e880899df94150b94cce61a62255c2da294ef09dd6df955a8b10081fc4491edeff6bdea1f408c84f564a1702f2429d4ed091a3ef6bb7002cdeb2cb9790f44b23c402166d7ced3ecafcbc5a046b763517bf35421cba1dc4f3b4a67d3882fcad4bd680d79d963ee7d31048c06d6a09d69830d36d80e15be2156e695858a0937e49a60e4623fca37ffd32972d2555bb01a4c5c57e4e6c39ec93e0887c3ed39a172ca646bc8514bdb64ddceb12d7d09546d0c5d8c9fe33f4296409029503d314e0", &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="99d1c32534d9de00af8729fa460ec9d5628744ffe3cb327edbe5d45fed028bf303c434286297cbfe9f121b1bc94969fa74f64c4cb8a1d40cadfe5d1afe1911de07770c57e37c225c0843887e02f6881c533230e4a3d43275e9cd079068012291e77d44bf1f4398518c9d64ae643b1ebff18fb2d4d632098a07dd40847a76374a4a01df2f34c001369ba9b86499548cbb8ce4cda4ae5179f35c9feb4de592a550f357f89d1660d711fac0e2a8") ioctl$RTC_SET_TIME(0xffffffffffffffff, 0x4024700a, &(0x7f0000000000)={0x0, 0x0, 0x0, 0xf, 0x0, 0xfd}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x9efef75f}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvlan={{0xc}, {0x4}}}, @IFLA_LINK={0x8}]}, 0x3c}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000001940)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000006c0)={&(0x7f0000001880)=@dellinkprop={0xb0, 0x6d, 0x20, 0x70bd28, 0x25dfdbff, {0x0, 0x0, 0x0, 0x0, 0x210, 0xc0018}, [@IFLA_TARGET_NETNSID={0x8, 0x2e, 0x2}, @IFLA_MASTER={0x8}, @IFLA_AF_SPEC={0x70, 0x1a, 0x0, 0x1, [@AF_MPLS={0x4}, @AF_MPLS={0x4}, @AF_INET6={0x28, 0xa, 0x0, 0x1, [@IFLA_INET6_ADDR_GEN_MODE={0x5, 0x8, 0x6b}, @IFLA_INET6_TOKEN={0x14, 0x7, @mcast2}, @IFLA_INET6_ADDR_GEN_MODE={0x5, 0x8, 0x7}]}, @AF_MPLS={0x4}, @AF_INET6={0x28, 0xa, 0x0, 0x1, [@IFLA_INET6_ADDR_GEN_MODE={0x5, 0x8, 0x8}, @IFLA_INET6_ADDR_GEN_MODE={0x5, 0x8, 0x56}, @IFLA_INET6_TOKEN={0x14, 0x7, @ipv4={'\x00', '\xff\xff', @local}}]}, @AF_MPLS={0x4}, @AF_INET6={0xc, 0xa, 0x0, 0x1, [@IFLA_INET6_ADDR_GEN_MODE={0x5, 0x8, 0x9}]}]}, @IFLA_IFALIASn={0x4}, @IFLA_PHYS_PORT_ID={0xb, 0x22, "3df17141c4e8d5"}]}, 0xb0}, 0x1, 0x0, 0x0, 0x4000001}, 0x84000) clone(0x2908000, &(0x7f0000000080)="6028d78584a9523ff3b18b3c7f86b0f46595537c62f1f47ca39e4ff27666a38078b3617669c736e28539aa28b2d44ceec9dc0c3a4d3dd6d901efcff839fc776cc0790c", &(0x7f0000000140), &(0x7f0000000440), &(0x7f0000000480)="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") ptrace(0x10, r3) wait4(0x0, 0x0, 0x0, 0x0) 23:09:27 executing program 0: r0 = getpgrp(0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x24000000) r1 = gettid() perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000, 0x0, 0x2af}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000080), 0x30200, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) unshare(0x4000000) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r3, 0x0) r4 = syz_open_dev$cec(&(0x7f0000000300), 0x3, 0x2) preadv(r4, &(0x7f00000002c0)=[{&(0x7f00000001c0)=""/251, 0xfb}], 0x1, 0xda3, 0x400001) bpf$ITER_CREATE(0x21, &(0x7f0000000100)={r2}, 0x9) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x26, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = perf_event_open(&(0x7f00000006c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c44}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ID(r5, 0x80042407, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000140)={0x1, 0x80, 0x1, 0x7, 0x6, 0xff, 0x0, 0x2, 0x80200, 0xe, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x400, 0x1, @perf_bp={&(0x7f00000000c0), 0x8}, 0x18000, 0x8000, 0xfffffffc, 0x1, 0x1000000000, 0x8, 0x3, 0x0, 0x8, 0x0, 0x9}, r1, 0x2, r5, 0x2) clone(0x6cb2e102, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r1) wait4(0x0, 0x0, 0x0, 0x0) 23:09:27 executing program 3: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x15, 0x0, 0x1, 0x0, 0x6, @multicast}, 0x14) clone(0x2000000082148180, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_STRSET_GET(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000640)={&(0x7f00000006c0)=ANY=[@ANYBLOB="cccd30", @ANYRES16=0x0, @ANYBLOB="02002abd7000fbdbdf250100000004000300800102800c00018008000100070000002400018008000100070000000800010008000000080001000100000008000100060000001c0001800800010005000000080001000200000008000100000000002c000180080001000600000008000100070000000800010003000000080001000600000008000100000000005400018008000100060000000800010001000000080001000400000008000100000000000800010000000000080001000000000008000100000000000800010008000000080001000300000008000100020000001c0001800800010008000000080001000100000008000100050000001c0001800800010004000000080001000400000008000100010000002c000180080001000000000008000100040000000800010007000000080001000700000008000100080000004c0001800800010002000000080001000200000008000100050000000800010003000000080001000400000008000100040000000800010000000000080001000400000008000100030000003400018008000100", @ANYRES32=0x0, @ANYBLOB="1400020069703667726574617030000000000000140002006970366572f370616e20000000000000fa0ee59a22b338aeb6d3895b934764e9a674c87f74b9c35aaa183a9ea95194a3dc40d9b230a9f627acae68e5f0381078395e744b4197fe3dd12112adacad625f6ae8e22901a3dd5920796e7dc087d5033e12c9e4aea2026a5df4ee89adbeda48287c2840149cf27af2cc0f064680a7b5e90f480b201f70326baca201fea21a0100000000000000"], 0x1cc}, 0x1, 0x0, 0x0, 0x8800}, 0x20040040) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) request_key(0x0, &(0x7f0000001ffb)={'syz', 0x1}, 0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x1004) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0x3, 0x380, 0x0, 0xe0, 0xe0, 0xe0, 0x0, 0x2e8, 0x2e8, 0x2e8, 0x2e8, 0x2e8, 0x7fffffe, 0x0, {[{{@uncond, 0x0, 0x70, 0xe0, 0x0, {0x6020000}}, @common=@unspec=@NFLOG={0x70, 'NFLOG\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, "a4bcf0ebf5d09e8706000000b1000000124ac31d4fda375c7794e420aa63529ebcf847246a5e8846085b0a30510b266347a84ae5ffea89b8654e440000002000"}}}, {{@ip={@local, @multicast1, 0x0, 0x0, '\x00', 'wg1\x00'}, 0x0, 0x1c8, 0x208, 0x0, {}, [@common=@inet=@hashlimit3={{0x158}, {'bridge_slave_1\x00', {0x0, 0x8, 0x0, 0x0, 0x0, 0x7fff, 0x8}}}]}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "29f0be44329ad4d94a815c71ad95092b933b5e380a7e5d3c56c51e9d0027"}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x3e0) 23:09:27 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x15, 0x0, 0x1, 0x0, 0x6, @multicast}, 0x14) clone(0x2000000082148180, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_STRSET_GET(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000640)={0x0, 0x1cc}, 0x1, 0x0, 0x0, 0x8800}, 0x20040040) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) request_key(0x0, &(0x7f0000001ffb)={'syz', 0x1}, 0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x1004) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0x3, 0x380, 0x2c00, 0xe0, 0xe0, 0xe0, 0x0, 0x2e8, 0x2e8, 0x2e8, 0x2e8, 0x2e8, 0x7fffffe, 0x0, {[{{@uncond, 0x0, 0x70, 0xe0, 0x0, {0x6020000}}, @common=@unspec=@NFLOG={0x70, 'NFLOG\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, "a4bcf0ebf5d09e8706580300b1000000124ac31d4fda375c7794e420aa63529ebcf847246a5e8846085b0a30510b266347a84ae5ffea89b8654e4400"}}}, {{@ip={@local, @multicast1, 0x0, 0x0, '\x00', 'wg1\x00'}, 0x0, 0x1c8, 0x208, 0x0, {}, [@common=@inet=@hashlimit3={{0x158}, {'bridge_slave_1\x00', {0x0, 0x8, 0x0, 0x0, 0x0, 0x7fff, 0x8}}}]}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "29f0be44329ad4d94a815c71ad95092b933b5e380a7e5d3c56c51e9d0027"}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x3e0) 23:09:27 executing program 4: perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0xc7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000000)={0x5, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0]}) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x12, 0xf7, 0x4, 0x3}, 0x40) 23:09:27 executing program 2: r0 = getpgrp(0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x24000000) r1 = gettid() perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000080), 0x30200, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) unshare(0x4000000) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, r3, 0x0) preadv(0xffffffffffffffff, &(0x7f00000002c0)=[{&(0x7f00000001c0)=""/251, 0xfb}], 0x1, 0x0, 0x0) bpf$ITER_CREATE(0x21, &(0x7f0000000100)={r2}, 0x9) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x26, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = perf_event_open(&(0x7f00000006c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c44}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ID(r4, 0x80042407, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000140)={0x1, 0x80, 0x0, 0x7, 0x0, 0xff, 0x0, 0x2, 0x0, 0xe, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x400, 0x1, @perf_bp={0x0, 0x8}, 0x18000, 0x8000, 0xfffffffc, 0x1, 0x1000000000, 0x8, 0x3, 0x0, 0x8, 0x0, 0x9}, r1, 0x2, r4, 0x2) clone(0x6cb2e100, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r1) wait4(0x0, 0x0, 0x0, 0x0) 23:09:27 executing program 3: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x15, 0x0, 0x1, 0x0, 0x6, @multicast}, 0x14) clone(0x2000000082148180, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_STRSET_GET(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000640)={&(0x7f00000006c0)=ANY=[@ANYBLOB="cccd30", @ANYRES16=0x0, @ANYBLOB="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", @ANYRES32=0x0, @ANYBLOB="1400020069703667726574617030000000000000140002006970366572f370616e20000000000000fa0ee59a22b338aeb6d3895b934764e9a674c87f74b9c35aaa183a9ea95194a3dc40d9b230a9f627acae68e5f0381078395e744b4197fe3dd12112adacad625f6ae8e22901a3dd5920796e7dc087d5033e12c9e4aea2026a5df4ee89adbeda48287c2840149cf27af2cc0f064680a7b5e90f480b201f70326baca201fea21a0100000000000000"], 0x1cc}, 0x1, 0x0, 0x0, 0x8800}, 0x20040040) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) request_key(0x0, &(0x7f0000001ffb)={'syz', 0x1}, 0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x1004) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0x3, 0x380, 0x0, 0xe0, 0xe0, 0xe0, 0x0, 0x2e8, 0x2e8, 0x2e8, 0x2e8, 0x2e8, 0x7fffffe, 0x0, {[{{@uncond, 0x0, 0x70, 0xe0, 0x0, {0x6020000}}, @common=@unspec=@NFLOG={0x70, 'NFLOG\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, "a4bcf0ebf5d09e8706000000b1000000124ac31d4fda375c7794e420aa63529ebcf847246a5e8846085b0a30510b266347a84ae5ffea89b8654e440000002200"}}}, {{@ip={@local, @multicast1, 0x0, 0x0, '\x00', 'wg1\x00'}, 0x0, 0x1c8, 0x208, 0x0, {}, [@common=@inet=@hashlimit3={{0x158}, {'bridge_slave_1\x00', {0x0, 0x8, 0x0, 0x0, 0x0, 0x7fff, 0x8}}}]}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "29f0be44329ad4d94a815c71ad95092b933b5e380a7e5d3c56c51e9d0027"}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x3e0) 23:09:27 executing program 4: r0 = perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0xc7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x12, 0xf7, 0x4, 0x3}, 0x40) perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x9, 0x65, 0x67, 0x3f, 0x0, 0xe82, 0x80000, 0xd, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x204, 0x5, @perf_config_ext={0x46f, 0x1f}, 0x100, 0xb89e, 0x40, 0x3, 0x4, 0x4, 0xe1, 0x0, 0x3ff}, 0x0, 0xb, r0, 0x0) 23:09:27 executing program 1: ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000001c0)={'team0\x00', 0x0}) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000680)={0xffffffffffffffff, 0x10, &(0x7f0000000640)={&(0x7f0000000780)=""/4096, 0x1000, 0x0}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000001780)={0x8, 0x7, &(0x7f0000001800)=ANY=[@ANYBLOB="180000009d57000000000000060000001832000005000000000000000000000495000000000000005c150400010000009500000000434e0dae2ef63aab6acde18cddf77c67000000"], &(0x7f0000000180)='GPL\x00', 0x2, 0x0, 0x0, 0x41100, 0xd, '\x00', r0, 0x1d, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x6, 0x5}, 0x8, 0x10, &(0x7f0000000600)={0x5, 0x0, 0x0, 0x10001}, 0x10, r1}, 0x78) r2 = getpgrp(0x0) prctl$PR_SET_PTRACER(0x59616d61, r2) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x24000000) r3 = gettid() perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x2100, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x4}, 0x0, 0x8}, 0x0, 0x8, 0xffffffffffffffff, 0x9) clone(0x6cb2e100, 0x0, 0x0, 0x0, 0x0) ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) clone(0x59040000, &(0x7f0000000200)="32b026bb2bd5ab05345d05868d1008feb1352fb452659a55b2c8650d5c3b8d9896f83163af0908ddf225ca94e880899df94150b94cce61a62255c2da294ef09dd6df955a8b10081fc4491edeff6bdea1f408c84f564a1702f2429d4ed091a3ef6bb7002cdeb2cb9790f44b23c402166d7ced3ecafcbc5a046b763517bf35421cba1dc4f3b4a67d3882fcad4bd680d79d963ee7d31048c06d6a09d69830d36d80e15be2156e695858a0937e49a60e4623fca37ffd32972d2555bb01a4c5c57e4e6c39ec93e0887c3ed39a172ca646bc8514bdb64ddceb12d7d09546d0c5d8c9fe33f4296409029503d314e0", &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="99d1c32534d9de00af8729fa460ec9d5628744ffe3cb327edbe5d45fed028bf303c434286297cbfe9f121b1bc94969fa74f64c4cb8a1d40cadfe5d1afe1911de07770c57e37c225c0843887e02f6881c533230e4a3d43275e9cd079068012291e77d44bf1f4398518c9d64ae643b1ebff18fb2d4d632098a07dd40847a76374a4a01df2f34c001369ba9b86499548cbb8ce4cda4ae5179f35c9feb4de592a550f357f89d1660d711fac0e2a8") ioctl$RTC_SET_TIME(0xffffffffffffffff, 0x4024700a, &(0x7f0000000000)={0x0, 0x0, 0x0, 0xf, 0x0, 0xfd}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x9efef75f}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvlan={{0xc}, {0x4}}}, @IFLA_LINK={0x8}]}, 0x3c}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000001940)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000006c0)={&(0x7f0000001880)=@dellinkprop={0xb0, 0x6d, 0x20, 0x70bd28, 0x25dfdbff, {0x0, 0x0, 0x0, 0x0, 0x210, 0xc0018}, [@IFLA_TARGET_NETNSID={0x8, 0x2e, 0x2}, @IFLA_MASTER={0x8}, @IFLA_AF_SPEC={0x70, 0x1a, 0x0, 0x1, [@AF_MPLS={0x4}, @AF_MPLS={0x4}, @AF_INET6={0x28, 0xa, 0x0, 0x1, [@IFLA_INET6_ADDR_GEN_MODE={0x5, 0x8, 0x6b}, @IFLA_INET6_TOKEN={0x14, 0x7, @mcast2}, @IFLA_INET6_ADDR_GEN_MODE={0x5, 0x8, 0x7}]}, @AF_MPLS={0x4}, @AF_INET6={0x28, 0xa, 0x0, 0x1, [@IFLA_INET6_ADDR_GEN_MODE={0x5, 0x8, 0x8}, @IFLA_INET6_ADDR_GEN_MODE={0x5, 0x8, 0x56}, @IFLA_INET6_TOKEN={0x14, 0x7, @ipv4={'\x00', '\xff\xff', @local}}]}, @AF_MPLS={0x4}, @AF_INET6={0xc, 0xa, 0x0, 0x1, [@IFLA_INET6_ADDR_GEN_MODE={0x5, 0x8, 0x9}]}]}, @IFLA_IFALIASn={0x4}, @IFLA_PHYS_PORT_ID={0xb, 0x22, "3df17141c4e8d5"}]}, 0xb0}, 0x1, 0x0, 0x0, 0x4000001}, 0x84000) clone(0x2908000, &(0x7f0000000080)="6028d78584a9523ff3b18b3c7f86b0f46595537c62f1f47ca39e4ff27666a38078b3617669c736e28539aa28b2d44ceec9dc0c3a4d3dd6d901efcff839fc776cc0790c", &(0x7f0000000140), &(0x7f0000000440), &(0x7f0000000480)="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") ptrace(0x10, r3) wait4(0x0, 0x0, 0x0, 0x0) 23:09:27 executing program 4: perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0xc7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f00000006c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c44}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ID(r0, 0x80042407, &(0x7f00000000c0)) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x4, 0x81, 0x2, 0x1, 0x0, 0x2, 0x20000, 0x8, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x1, @perf_bp={&(0x7f0000000000), 0x1}, 0x284, 0x7ff, 0xff, 0xa, 0x7, 0x55eea7e3, 0x8, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xd, r0, 0xa) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x12, 0xf7, 0x4, 0x3}, 0x40) 23:09:27 executing program 3: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x15, 0x0, 0x1, 0x0, 0x6, @multicast}, 0x14) clone(0x2000000082148180, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_STRSET_GET(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000640)={&(0x7f00000006c0)=ANY=[@ANYBLOB="cccd30", @ANYRES16=0x0, @ANYBLOB="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", @ANYRES32=0x0, @ANYBLOB="1400020069703667726574617030000000000000140002006970366572f370616e20000000000000fa0ee59a22b338aeb6d3895b934764e9a674c87f74b9c35aaa183a9ea95194a3dc40d9b230a9f627acae68e5f0381078395e744b4197fe3dd12112adacad625f6ae8e22901a3dd5920796e7dc087d5033e12c9e4aea2026a5df4ee89adbeda48287c2840149cf27af2cc0f064680a7b5e90f480b201f70326baca201fea21a0100000000000000"], 0x1cc}, 0x1, 0x0, 0x0, 0x8800}, 0x20040040) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) request_key(0x0, &(0x7f0000001ffb)={'syz', 0x1}, 0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x1004) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0x3, 0x380, 0x0, 0xe0, 0xe0, 0xe0, 0x0, 0x2e8, 0x2e8, 0x2e8, 0x2e8, 0x2e8, 0x7fffffe, 0x0, {[{{@uncond, 0x0, 0x70, 0xe0, 0x0, {0x6020000}}, @common=@unspec=@NFLOG={0x70, 'NFLOG\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, "a4bcf0ebf5d09e8706000000b1000000124ac31d4fda375c7794e420aa63529ebcf847246a5e8846085b0a30510b266347a84ae5ffea89b8654e440000032400"}}}, {{@ip={@local, @multicast1, 0x0, 0x0, '\x00', 'wg1\x00'}, 0x0, 0x1c8, 0x208, 0x0, {}, [@common=@inet=@hashlimit3={{0x158}, {'bridge_slave_1\x00', {0x0, 0x8, 0x0, 0x0, 0x0, 0x7fff, 0x8}}}]}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "29f0be44329ad4d94a815c71ad95092b933b5e380a7e5d3c56c51e9d0027"}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x3e0) 23:09:27 executing program 1: ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000001c0)={'team0\x00', 0x0}) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000680)={0xffffffffffffffff, 0x10, &(0x7f0000000640)={&(0x7f0000000780)=""/4096, 0x1000, 0x0}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000001780)={0x8, 0x7, &(0x7f0000001800)=ANY=[@ANYBLOB="180000009d57000000000000060000001832000005000000000000000000000495000000000000005c150400010000009500000000434e0dae2ef63aab6acde18cddf77c67000000"], &(0x7f0000000180)='GPL\x00', 0x2, 0x0, 0x0, 0x41100, 0xd, '\x00', r0, 0x1d, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x6, 0x5}, 0x8, 0x10, &(0x7f0000000600)={0x5, 0x0, 0x0, 0x10001}, 0x10, r1}, 0x78) r2 = getpgrp(0x0) prctl$PR_SET_PTRACER(0x59616d61, r2) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x24000000) r3 = gettid() perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x2100, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x4}, 0x0, 0x8}, 0x0, 0x8, 0xffffffffffffffff, 0x9) r4 = openat$rtc(0xffffffffffffff9c, &(0x7f00000168c0), 0x0, 0x0) ioctl$RTC_UIE_ON(r4, 0x7003) clone(0x59040000, &(0x7f0000000200)="32b026bb2bd5ab05345d05868d1008feb1352fb452659a55b2c8650d5c3b8d9896f83163af0908ddf225ca94e880899df94150b94cce61a62255c2da294ef09dd6df955a8b10081fc4491edeff6bdea1f408c84f564a1702f2429d4ed091a3ef6bb7002cdeb2cb9790f44b23c402166d7ced3ecafcbc5a046b763517bf35421cba1dc4f3b4a67d3882fcad4bd680d79d963ee7d31048c06d6a09d69830d36d80e15be2156e695858a0937e49a60e4623fca37ffd32972d2555bb01a4c5c57e4e6c39ec93e0887c3ed39a172ca646bc8514bdb64ddceb12d7d09546d0c5d8c9fe33f4296409029503d314e0", &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="99d1c32534d9de00af8729fa460ec9d5628744ffe3cb327edbe5d45fed028bf303c434286297cbfe9f121b1bc94969fa74f64c4cb8a1d40cadfe5d1afe1911de07770c57e37c225c0843887e02f6881c533230e4a3d43275e9cd079068012291e77d44bf1f4398518c9d64ae643b1ebff18fb2d4d632098a07dd40847a76374a4a01df2f34c001369ba9b86499548cbb8ce4cda4ae5179f35c9feb4de592a550f357f89d1660d711fac0e2a8") ioctl$RTC_SET_TIME(r4, 0x4024700a, &(0x7f0000000000)={0x0, 0x0, 0x0, 0xf, 0x0, 0xfd}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x9efef75f}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvlan={{0xc}, {0x4}}}, @IFLA_LINK={0x8}]}, 0x3c}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000001940)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000006c0)={&(0x7f0000001880)=@dellinkprop={0xb0, 0x6d, 0x20, 0x70bd28, 0x25dfdbff, {0x0, 0x0, 0x0, 0x0, 0x210, 0xc0018}, [@IFLA_TARGET_NETNSID={0x8, 0x2e, 0x2}, @IFLA_MASTER={0x8}, @IFLA_AF_SPEC={0x70, 0x1a, 0x0, 0x1, [@AF_MPLS={0x4}, @AF_MPLS={0x4}, @AF_INET6={0x28, 0xa, 0x0, 0x1, [@IFLA_INET6_ADDR_GEN_MODE={0x5, 0x8, 0x6b}, @IFLA_INET6_TOKEN={0x14, 0x7, @mcast2}, @IFLA_INET6_ADDR_GEN_MODE={0x5, 0x8, 0x7}]}, @AF_MPLS={0x4}, @AF_INET6={0x28, 0xa, 0x0, 0x1, [@IFLA_INET6_ADDR_GEN_MODE={0x5, 0x8, 0x8}, @IFLA_INET6_ADDR_GEN_MODE={0x5, 0x8, 0x56}, @IFLA_INET6_TOKEN={0x14, 0x7, @ipv4={'\x00', '\xff\xff', @local}}]}, @AF_MPLS={0x4}, @AF_INET6={0xc, 0xa, 0x0, 0x1, [@IFLA_INET6_ADDR_GEN_MODE={0x5, 0x8, 0x9}]}]}, @IFLA_IFALIASn={0x4}, @IFLA_PHYS_PORT_ID={0xb, 0x22, "3df17141c4e8d5"}]}, 0xb0}, 0x1, 0x0, 0x0, 0x4000001}, 0x84000) clone(0x2908000, &(0x7f0000000080)="6028d78584a9523ff3b18b3c7f86b0f46595537c62f1f47ca39e4ff27666a38078b3617669c736e28539aa28b2d44ceec9dc0c3a4d3dd6d901efcff839fc776cc0790c", &(0x7f0000000140), &(0x7f0000000440), &(0x7f0000000480)="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") ptrace(0x10, r3) wait4(0x0, 0x0, 0x0, 0x0) 23:09:28 executing program 3: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x15, 0x0, 0x1, 0x0, 0x6, @multicast}, 0x14) clone(0x2000000082148180, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_STRSET_GET(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000640)={&(0x7f00000006c0)=ANY=[@ANYBLOB="cccd30", @ANYRES16=0x0, @ANYBLOB="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", @ANYRES32=0x0, @ANYBLOB="1400020069703667726574617030000000000000140002006970366572f370616e20000000000000fa0ee59a22b338aeb6d3895b934764e9a674c87f74b9c35aaa183a9ea95194a3dc40d9b230a9f627acae68e5f0381078395e744b4197fe3dd12112adacad625f6ae8e22901a3dd5920796e7dc087d5033e12c9e4aea2026a5df4ee89adbeda48287c2840149cf27af2cc0f064680a7b5e90f480b201f70326baca201fea21a0100000000000000"], 0x1cc}, 0x1, 0x0, 0x0, 0x8800}, 0x20040040) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) request_key(0x0, &(0x7f0000001ffb)={'syz', 0x1}, 0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x1004) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0x3, 0x380, 0x0, 0xe0, 0xe0, 0xe0, 0x0, 0x2e8, 0x2e8, 0x2e8, 0x2e8, 0x2e8, 0x7fffffe, 0x0, {[{{@uncond, 0x0, 0x70, 0xe0, 0x0, {0x6020000}}, @common=@unspec=@NFLOG={0x70, 'NFLOG\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, "a4bcf0ebf5d09e8706000000b1000000124ac31d4fda375c7794e420aa63529ebcf847246a5e8846085b0a30510b266347a84ae5ffea89b8654e440000012b00"}}}, {{@ip={@local, @multicast1, 0x0, 0x0, '\x00', 'wg1\x00'}, 0x0, 0x1c8, 0x208, 0x0, {}, [@common=@inet=@hashlimit3={{0x158}, {'bridge_slave_1\x00', {0x0, 0x8, 0x0, 0x0, 0x0, 0x7fff, 0x8}}}]}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "29f0be44329ad4d94a815c71ad95092b933b5e380a7e5d3c56c51e9d0027"}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x3e0) [ 2193.455420] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 2193.475121] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 2193.498515] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 2193.517326] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 2193.545945] device bridge_slave_1 left promiscuous mode [ 2193.557237] bridge0: port 2(bridge_slave_1) entered disabled state [ 2193.573241] device bridge_slave_0 left promiscuous mode [ 2193.585705] bridge0: port 1(bridge_slave_0) entered disabled state [ 2193.609924] device bond0 left promiscuous mode [ 2193.621885] device bond_slave_0 left promiscuous mode [ 2193.627195] device bond_slave_1 left promiscuous mode [ 2193.638404] device veth1_macvtap left promiscuous mode [ 2193.650556] device veth0_macvtap left promiscuous mode [ 2193.662916] device veth1_vlan left promiscuous mode [ 2193.674025] device veth0_vlan left promiscuous mode [ 2193.975828] device hsr_slave_1 left promiscuous mode [ 2193.986033] device hsr_slave_0 left promiscuous mode [ 2194.005411] team0 (unregistering): Port device team_slave_1 removed [ 2194.018186] team0 (unregistering): Port device team_slave_0 removed [ 2194.029303] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 2194.043833] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 2194.091340] bond0 (unregistering): Released all slaves 23:09:30 executing program 0: r0 = getpgrp(0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x24000000) r1 = gettid() perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000, 0x0, 0x2af}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000080), 0x30200, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) unshare(0x4000000) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r3, 0x0) r4 = syz_open_dev$cec(&(0x7f0000000300), 0x3, 0x2) preadv(r4, &(0x7f00000002c0)=[{&(0x7f00000001c0)=""/251, 0xfb}], 0x1, 0xda3, 0x400001) bpf$ITER_CREATE(0x21, &(0x7f0000000100)={r2}, 0x9) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x26, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = perf_event_open(&(0x7f00000006c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c44}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ID(r5, 0x80042407, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000140)={0x1, 0x80, 0x1, 0x7, 0x6, 0xff, 0x0, 0x2, 0x80200, 0xe, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x400, 0x1, @perf_bp={&(0x7f00000000c0), 0x8}, 0x18000, 0x8000, 0xfffffffc, 0x1, 0x1000000000, 0x8, 0x3, 0x0, 0x8, 0x0, 0x9}, r1, 0x2, r5, 0x2) clone(0x6cb2e108, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r1) wait4(0x0, 0x0, 0x0, 0x0) 23:09:30 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x15, 0x0, 0x1, 0x0, 0x6, @multicast}, 0x14) clone(0x2000000082148180, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_STRSET_GET(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000640)={0x0, 0x1cc}, 0x1, 0x0, 0x0, 0x8800}, 0x20040040) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) request_key(0x0, &(0x7f0000001ffb)={'syz', 0x1}, 0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x1004) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0x3, 0x380, 0x2f02, 0xe0, 0xe0, 0xe0, 0x0, 0x2e8, 0x2e8, 0x2e8, 0x2e8, 0x2e8, 0x7fffffe, 0x0, {[{{@uncond, 0x0, 0x70, 0xe0, 0x0, {0x6020000}}, @common=@unspec=@NFLOG={0x70, 'NFLOG\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, "a4bcf0ebf5d09e8706580300b1000000124ac31d4fda375c7794e420aa63529ebcf847246a5e8846085b0a30510b266347a84ae5ffea89b8654e4400"}}}, {{@ip={@local, @multicast1, 0x0, 0x0, '\x00', 'wg1\x00'}, 0x0, 0x1c8, 0x208, 0x0, {}, [@common=@inet=@hashlimit3={{0x158}, {'bridge_slave_1\x00', {0x0, 0x8, 0x0, 0x0, 0x0, 0x7fff, 0x8}}}]}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "29f0be44329ad4d94a815c71ad95092b933b5e380a7e5d3c56c51e9d0027"}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x3e0) 23:09:30 executing program 3: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x15, 0x0, 0x1, 0x0, 0x6, @multicast}, 0x14) clone(0x2000000082148180, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_STRSET_GET(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000640)={&(0x7f00000006c0)=ANY=[@ANYBLOB="cccd30", @ANYRES16=0x0, @ANYBLOB="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", @ANYRES32=0x0, @ANYBLOB="1400020069703667726574617030000000000000140002006970366572f370616e20000000000000fa0ee59a22b338aeb6d3895b934764e9a674c87f74b9c35aaa183a9ea95194a3dc40d9b230a9f627acae68e5f0381078395e744b4197fe3dd12112adacad625f6ae8e22901a3dd5920796e7dc087d5033e12c9e4aea2026a5df4ee89adbeda48287c2840149cf27af2cc0f064680a7b5e90f480b201f70326baca201fea21a0100000000000000"], 0x1cc}, 0x1, 0x0, 0x0, 0x8800}, 0x20040040) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) request_key(0x0, &(0x7f0000001ffb)={'syz', 0x1}, 0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x1004) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0x3, 0x380, 0x0, 0xe0, 0xe0, 0xe0, 0x0, 0x2e8, 0x2e8, 0x2e8, 0x2e8, 0x2e8, 0x7fffffe, 0x0, {[{{@uncond, 0x0, 0x70, 0xe0, 0x0, {0x6020000}}, @common=@unspec=@NFLOG={0x70, 'NFLOG\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, "a4bcf0ebf5d09e8706000000b1000000124ac31d4fda375c7794e420aa63529ebcf847246a5e8846085b0a30510b266347a84ae5ffea89b8654e440000003f00"}}}, {{@ip={@local, @multicast1, 0x0, 0x0, '\x00', 'wg1\x00'}, 0x0, 0x1c8, 0x208, 0x0, {}, [@common=@inet=@hashlimit3={{0x158}, {'bridge_slave_1\x00', {0x0, 0x8, 0x0, 0x0, 0x0, 0x7fff, 0x8}}}]}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "29f0be44329ad4d94a815c71ad95092b933b5e380a7e5d3c56c51e9d0027"}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x3e0) 23:09:30 executing program 2: r0 = getpgrp(0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x24000000) r1 = gettid() perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000080), 0x30200, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) unshare(0x4000000) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, r3, 0x0) preadv(0xffffffffffffffff, &(0x7f00000002c0)=[{&(0x7f00000001c0)=""/251, 0xfb}], 0x1, 0x0, 0x0) bpf$ITER_CREATE(0x21, &(0x7f0000000100)={r2}, 0x9) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x26, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = perf_event_open(&(0x7f00000006c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c44}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ID(r4, 0x80042407, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000140)={0x1, 0x80, 0x0, 0x7, 0x0, 0xff, 0x0, 0x2, 0x0, 0xe, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x400, 0x1, @perf_bp={0x0, 0x8}, 0x18000, 0x8000, 0xfffffffc, 0x1, 0x1000000000, 0x8, 0x3, 0x0, 0x8, 0x0, 0x9}, r1, 0x2, r4, 0x2) clone(0x6cb2e100, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r1) wait4(0x0, 0x0, 0x0, 0x0) 23:09:30 executing program 3: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x15, 0x0, 0x1, 0x0, 0x6, @multicast}, 0x14) clone(0x2000000082148180, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_STRSET_GET(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000640)={&(0x7f00000006c0)=ANY=[@ANYBLOB="cccd30", @ANYRES16=0x0, @ANYBLOB="02002abd7000fbdbdf250100000004000300800102800c00018008000100070000002400018008000100070000000800010008000000080001000100000008000100060000001c0001800800010005000000080001000200000008000100000000002c000180080001000600000008000100070000000800010003000000080001000600000008000100000000005400018008000100060000000800010001000000080001000400000008000100000000000800010000000000080001000000000008000100000000000800010008000000080001000300000008000100020000001c0001800800010008000000080001000100000008000100050000001c0001800800010004000000080001000400000008000100010000002c000180080001000000000008000100040000000800010007000000080001000700000008000100080000004c0001800800010002000000080001000200000008000100050000000800010003000000080001000400000008000100040000000800010000000000080001000400000008000100030000003400018008000100", @ANYRES32=0x0, @ANYBLOB="1400020069703667726574617030000000000000140002006970366572f370616e20000000000000fa0ee59a22b338aeb6d3895b934764e9a674c87f74b9c35aaa183a9ea95194a3dc40d9b230a9f627acae68e5f0381078395e744b4197fe3dd12112adacad625f6ae8e22901a3dd5920796e7dc087d5033e12c9e4aea2026a5df4ee89adbeda48287c2840149cf27af2cc0f064680a7b5e90f480b201f70326baca201fea21a0100000000000000"], 0x1cc}, 0x1, 0x0, 0x0, 0x8800}, 0x20040040) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) request_key(0x0, &(0x7f0000001ffb)={'syz', 0x1}, 0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x1004) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0x3, 0x380, 0x0, 0xe0, 0xe0, 0xe0, 0x0, 0x2e8, 0x2e8, 0x2e8, 0x2e8, 0x2e8, 0x7fffffe, 0x0, {[{{@uncond, 0x0, 0x70, 0xe0, 0x0, {0x6020000}}, @common=@unspec=@NFLOG={0x70, 'NFLOG\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, "a4bcf0ebf5d09e8706000000b1000000124ac31d4fda375c7794e420aa63529ebcf847246a5e8846085b0a30510b266347a84ae5ffea89b8654e440000014200"}}}, {{@ip={@local, @multicast1, 0x0, 0x0, '\x00', 'wg1\x00'}, 0x0, 0x1c8, 0x208, 0x0, {}, [@common=@inet=@hashlimit3={{0x158}, {'bridge_slave_1\x00', {0x0, 0x8, 0x0, 0x0, 0x0, 0x7fff, 0x8}}}]}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "29f0be44329ad4d94a815c71ad95092b933b5e380a7e5d3c56c51e9d0027"}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x3e0) 23:09:30 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x15, 0x0, 0x1, 0x0, 0x6, @multicast}, 0x14) clone(0x2000000082148180, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_STRSET_GET(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000640)={0x0, 0x1cc}, 0x1, 0x0, 0x0, 0x8800}, 0x20040040) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) request_key(0x0, &(0x7f0000001ffb)={'syz', 0x1}, 0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x1004) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0x3, 0x380, 0x3d03, 0xe0, 0xe0, 0xe0, 0x0, 0x2e8, 0x2e8, 0x2e8, 0x2e8, 0x2e8, 0x7fffffe, 0x0, {[{{@uncond, 0x0, 0x70, 0xe0, 0x0, {0x6020000}}, @common=@unspec=@NFLOG={0x70, 'NFLOG\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, "a4bcf0ebf5d09e8706580300b1000000124ac31d4fda375c7794e420aa63529ebcf847246a5e8846085b0a30510b266347a84ae5ffea89b8654e4400"}}}, {{@ip={@local, @multicast1, 0x0, 0x0, '\x00', 'wg1\x00'}, 0x0, 0x1c8, 0x208, 0x0, {}, [@common=@inet=@hashlimit3={{0x158}, {'bridge_slave_1\x00', {0x0, 0x8, 0x0, 0x0, 0x0, 0x7fff, 0x8}}}]}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "29f0be44329ad4d94a815c71ad95092b933b5e380a7e5d3c56c51e9d0027"}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x3e0) 23:09:30 executing program 3: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x15, 0x0, 0x1, 0x0, 0x6, @multicast}, 0x14) clone(0x2000000082148180, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_STRSET_GET(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000640)={&(0x7f00000006c0)=ANY=[@ANYBLOB="cccd30", @ANYRES16=0x0, @ANYBLOB="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", @ANYRES32=0x0, @ANYBLOB="1400020069703667726574617030000000000000140002006970366572f370616e20000000000000fa0ee59a22b338aeb6d3895b934764e9a674c87f74b9c35aaa183a9ea95194a3dc40d9b230a9f627acae68e5f0381078395e744b4197fe3dd12112adacad625f6ae8e22901a3dd5920796e7dc087d5033e12c9e4aea2026a5df4ee89adbeda48287c2840149cf27af2cc0f064680a7b5e90f480b201f70326baca201fea21a0100000000000000"], 0x1cc}, 0x1, 0x0, 0x0, 0x8800}, 0x20040040) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) request_key(0x0, &(0x7f0000001ffb)={'syz', 0x1}, 0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x1004) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0x3, 0x380, 0x0, 0xe0, 0xe0, 0xe0, 0x0, 0x2e8, 0x2e8, 0x2e8, 0x2e8, 0x2e8, 0x7fffffe, 0x0, {[{{@uncond, 0x0, 0x70, 0xe0, 0x0, {0x6020000}}, @common=@unspec=@NFLOG={0x70, 'NFLOG\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, "a4bcf0ebf5d09e8706000000b1000000124ac31d4fda375c7794e420aa63529ebcf847246a5e8846085b0a30510b266347a84ae5ffea89b8654e440000014a00"}}}, {{@ip={@local, @multicast1, 0x0, 0x0, '\x00', 'wg1\x00'}, 0x0, 0x1c8, 0x208, 0x0, {}, [@common=@inet=@hashlimit3={{0x158}, {'bridge_slave_1\x00', {0x0, 0x8, 0x0, 0x0, 0x0, 0x7fff, 0x8}}}]}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "29f0be44329ad4d94a815c71ad95092b933b5e380a7e5d3c56c51e9d0027"}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x3e0) 23:09:30 executing program 1: ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000001c0)={'team0\x00', 0x0}) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000680)={0xffffffffffffffff, 0x10, &(0x7f0000000640)={&(0x7f0000000780)=""/4096, 0x1000, 0x0}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000001780)={0x8, 0x7, &(0x7f0000001800)=ANY=[@ANYBLOB="180000009d57000000000000060000001832000005000000000000000000000495000000000000005c150400010000009500000000434e0dae2ef63aab6acde18cddf77c67000000"], &(0x7f0000000180)='GPL\x00', 0x2, 0x0, 0x0, 0x41100, 0xd, '\x00', r0, 0x1d, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x6, 0x5}, 0x8, 0x10, &(0x7f0000000600)={0x5, 0x0, 0x0, 0x10001}, 0x10, r1}, 0x78) r2 = getpgrp(0x0) prctl$PR_SET_PTRACER(0x59616d61, r2) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x24000000) r3 = gettid() perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = openat$rtc(0xffffffffffffff9c, &(0x7f00000168c0), 0x0, 0x0) ioctl$RTC_UIE_ON(r4, 0x7003) clone(0x59040000, &(0x7f0000000200)="32b026bb2bd5ab05345d05868d1008feb1352fb452659a55b2c8650d5c3b8d9896f83163af0908ddf225ca94e880899df94150b94cce61a62255c2da294ef09dd6df955a8b10081fc4491edeff6bdea1f408c84f564a1702f2429d4ed091a3ef6bb7002cdeb2cb9790f44b23c402166d7ced3ecafcbc5a046b763517bf35421cba1dc4f3b4a67d3882fcad4bd680d79d963ee7d31048c06d6a09d69830d36d80e15be2156e695858a0937e49a60e4623fca37ffd32972d2555bb01a4c5c57e4e6c39ec93e0887c3ed39a172ca646bc8514bdb64ddceb12d7d09546d0c5d8c9fe33f4296409029503d314e0", &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="99d1c32534d9de00af8729fa460ec9d5628744ffe3cb327edbe5d45fed028bf303c434286297cbfe9f121b1bc94969fa74f64c4cb8a1d40cadfe5d1afe1911de07770c57e37c225c0843887e02f6881c533230e4a3d43275e9cd079068012291e77d44bf1f4398518c9d64ae643b1ebff18fb2d4d632098a07dd40847a76374a4a01df2f34c001369ba9b86499548cbb8ce4cda4ae5179f35c9feb4de592a550f357f89d1660d711fac0e2a8") ioctl$RTC_SET_TIME(r4, 0x4024700a, &(0x7f0000000000)={0x0, 0x0, 0x0, 0xf, 0x0, 0xfd}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x9efef75f}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvlan={{0xc}, {0x4}}}, @IFLA_LINK={0x8}]}, 0x3c}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000001940)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000006c0)={&(0x7f0000001880)=@dellinkprop={0xb0, 0x6d, 0x20, 0x70bd28, 0x25dfdbff, {0x0, 0x0, 0x0, 0x0, 0x210, 0xc0018}, [@IFLA_TARGET_NETNSID={0x8, 0x2e, 0x2}, @IFLA_MASTER={0x8}, @IFLA_AF_SPEC={0x70, 0x1a, 0x0, 0x1, [@AF_MPLS={0x4}, @AF_MPLS={0x4}, @AF_INET6={0x28, 0xa, 0x0, 0x1, [@IFLA_INET6_ADDR_GEN_MODE={0x5, 0x8, 0x6b}, @IFLA_INET6_TOKEN={0x14, 0x7, @mcast2}, @IFLA_INET6_ADDR_GEN_MODE={0x5, 0x8, 0x7}]}, @AF_MPLS={0x4}, @AF_INET6={0x28, 0xa, 0x0, 0x1, [@IFLA_INET6_ADDR_GEN_MODE={0x5, 0x8, 0x8}, @IFLA_INET6_ADDR_GEN_MODE={0x5, 0x8, 0x56}, @IFLA_INET6_TOKEN={0x14, 0x7, @ipv4={'\x00', '\xff\xff', @local}}]}, @AF_MPLS={0x4}, @AF_INET6={0xc, 0xa, 0x0, 0x1, [@IFLA_INET6_ADDR_GEN_MODE={0x5, 0x8, 0x9}]}]}, @IFLA_IFALIASn={0x4}, @IFLA_PHYS_PORT_ID={0xb, 0x22, "3df17141c4e8d5"}]}, 0xb0}, 0x1, 0x0, 0x0, 0x4000001}, 0x84000) clone(0x2908000, &(0x7f0000000080)="6028d78584a9523ff3b18b3c7f86b0f46595537c62f1f47ca39e4ff27666a38078b3617669c736e28539aa28b2d44ceec9dc0c3a4d3dd6d901efcff839fc776cc0790c", &(0x7f0000000140), &(0x7f0000000440), &(0x7f0000000480)="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") ptrace(0x10, r3) wait4(0x0, 0x0, 0x0, 0x0) [ 2196.281709] IPVS: ftp: loaded support on port[0] = 21 [ 2196.388735] chnl_net:caif_netlink_parms(): no params data found [ 2196.453432] bridge0: port 1(bridge_slave_0) entered blocking state [ 2196.460106] bridge0: port 1(bridge_slave_0) entered disabled state [ 2196.469630] device bridge_slave_0 entered promiscuous mode [ 2196.477235] bridge0: port 2(bridge_slave_1) entered blocking state [ 2196.483615] bridge0: port 2(bridge_slave_1) entered disabled state [ 2196.491658] device bridge_slave_1 entered promiscuous mode [ 2196.512949] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 2196.522181] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 2196.544815] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 2196.552411] team0: Port device team_slave_0 added [ 2196.559959] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 2196.568026] team0: Port device team_slave_1 added [ 2196.587582] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 2196.594316] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 2196.619642] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 2196.631001] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 2196.637573] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 2196.663823] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 2196.675362] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 2196.682816] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 2196.705553] device hsr_slave_0 entered promiscuous mode [ 2196.711253] device hsr_slave_1 entered promiscuous mode [ 2196.717674] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 2196.725387] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 2196.800649] bridge0: port 2(bridge_slave_1) entered blocking state [ 2196.807177] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2196.813878] bridge0: port 1(bridge_slave_0) entered blocking state [ 2196.820456] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2196.859398] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 2196.866365] 8021q: adding VLAN 0 to HW filter on device bond0 [ 2196.878011] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 2196.887343] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 2196.895834] bridge0: port 1(bridge_slave_0) entered disabled state [ 2196.902693] bridge0: port 2(bridge_slave_1) entered disabled state [ 2196.910561] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 2196.921832] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 2196.928760] 8021q: adding VLAN 0 to HW filter on device team0 [ 2196.940175] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 2196.948421] bridge0: port 1(bridge_slave_0) entered blocking state [ 2196.955014] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2196.968364] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 2196.976182] bridge0: port 2(bridge_slave_1) entered blocking state [ 2196.982531] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2197.008450] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 2197.019667] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 2197.031333] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 2197.038734] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 2197.047454] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 2197.056302] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 2197.064123] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 2197.071860] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 2197.078953] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 2197.091903] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 2197.101478] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 2197.108324] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 2197.122706] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 2197.137670] IPv6: ADDRCONF(NETDEV_UP): veth0_virt_wifi: link is not ready [ 2197.148417] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 2197.184536] IPv6: ADDRCONF(NETDEV_UP): veth0_vlan: link is not ready [ 2197.191917] IPv6: ADDRCONF(NETDEV_UP): vlan0: link is not ready [ 2197.199406] IPv6: ADDRCONF(NETDEV_UP): vlan1: link is not ready [ 2197.210406] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 2197.218910] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 2197.226308] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 2197.235409] device veth0_vlan entered promiscuous mode [ 2197.245633] device veth1_vlan entered promiscuous mode [ 2197.251805] IPv6: ADDRCONF(NETDEV_UP): macvlan0: link is not ready [ 2197.261726] IPv6: ADDRCONF(NETDEV_UP): macvlan1: link is not ready [ 2197.276239] IPv6: ADDRCONF(NETDEV_UP): veth0_macvtap: link is not ready [ 2197.288914] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 2197.296451] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 2197.303788] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 2197.315415] device veth0_macvtap entered promiscuous mode [ 2197.321657] IPv6: ADDRCONF(NETDEV_UP): macvtap0: link is not ready [ 2197.331197] device veth1_macvtap entered promiscuous mode [ 2197.341413] IPv6: ADDRCONF(NETDEV_UP): veth0_to_batadv: link is not ready [ 2197.351756] IPv6: ADDRCONF(NETDEV_UP): veth1_to_batadv: link is not ready [ 2197.361308] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 2197.372034] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2197.381214] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 2197.390964] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2197.400126] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 2197.409894] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2197.419187] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 2197.429035] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2197.439904] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 2197.447888] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 2197.458767] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 2197.468454] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 2197.478322] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2197.487831] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 2197.497985] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2197.507294] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 2197.517481] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2197.528229] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_1: link is not ready [ 2197.535406] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 2197.542600] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 2197.550747] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 2197.677870] IPv6: ADDRCONF(NETDEV_UP): wlan0: link is not ready [ 2197.687061] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 2197.704300] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 2197.713406] IPv6: ADDRCONF(NETDEV_UP): wlan1: link is not ready [ 2197.720777] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 2197.731350] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 2197.739409] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 2197.747206] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready 23:09:33 executing program 1: ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000001c0)={'team0\x00', 0x0}) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000680)={0xffffffffffffffff, 0x10, &(0x7f0000000640)={&(0x7f0000000780)=""/4096, 0x1000, 0x0}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000001780)={0x8, 0x7, &(0x7f0000001800)=ANY=[@ANYBLOB="180000009d57000000000000060000001832000005000000000000000000000495000000000000005c150400010000009500000000434e0dae2ef63aab6acde18cddf77c67000000"], &(0x7f0000000180)='GPL\x00', 0x2, 0x0, 0x0, 0x41100, 0xd, '\x00', r0, 0x1d, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x6, 0x5}, 0x8, 0x10, &(0x7f0000000600)={0x5, 0x0, 0x0, 0x10001}, 0x10, r1}, 0x78) r2 = getpgrp(0x0) prctl$PR_SET_PTRACER(0x59616d61, r2) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x24000000) r3 = gettid() perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = openat$rtc(0xffffffffffffff9c, &(0x7f00000168c0), 0x0, 0x0) ioctl$RTC_UIE_ON(r4, 0x7003) clone(0x59040000, &(0x7f0000000200)="32b026bb2bd5ab05345d05868d1008feb1352fb452659a55b2c8650d5c3b8d9896f83163af0908ddf225ca94e880899df94150b94cce61a62255c2da294ef09dd6df955a8b10081fc4491edeff6bdea1f408c84f564a1702f2429d4ed091a3ef6bb7002cdeb2cb9790f44b23c402166d7ced3ecafcbc5a046b763517bf35421cba1dc4f3b4a67d3882fcad4bd680d79d963ee7d31048c06d6a09d69830d36d80e15be2156e695858a0937e49a60e4623fca37ffd32972d2555bb01a4c5c57e4e6c39ec93e0887c3ed39a172ca646bc8514bdb64ddceb12d7d09546d0c5d8c9fe33f4296409029503d314e0", &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="99d1c32534d9de00af8729fa460ec9d5628744ffe3cb327edbe5d45fed028bf303c434286297cbfe9f121b1bc94969fa74f64c4cb8a1d40cadfe5d1afe1911de07770c57e37c225c0843887e02f6881c533230e4a3d43275e9cd079068012291e77d44bf1f4398518c9d64ae643b1ebff18fb2d4d632098a07dd40847a76374a4a01df2f34c001369ba9b86499548cbb8ce4cda4ae5179f35c9feb4de592a550f357f89d1660d711fac0e2a8") ioctl$RTC_SET_TIME(r4, 0x4024700a, &(0x7f0000000000)={0x0, 0x0, 0x0, 0xf, 0x0, 0xfd}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x9efef75f}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvlan={{0xc}, {0x4}}}, @IFLA_LINK={0x8}]}, 0x3c}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000001940)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000006c0)={&(0x7f0000001880)=@dellinkprop={0xb0, 0x6d, 0x20, 0x70bd28, 0x25dfdbff, {0x0, 0x0, 0x0, 0x0, 0x210, 0xc0018}, [@IFLA_TARGET_NETNSID={0x8, 0x2e, 0x2}, @IFLA_MASTER={0x8}, @IFLA_AF_SPEC={0x70, 0x1a, 0x0, 0x1, [@AF_MPLS={0x4}, @AF_MPLS={0x4}, @AF_INET6={0x28, 0xa, 0x0, 0x1, [@IFLA_INET6_ADDR_GEN_MODE={0x5, 0x8, 0x6b}, @IFLA_INET6_TOKEN={0x14, 0x7, @mcast2}, @IFLA_INET6_ADDR_GEN_MODE={0x5, 0x8, 0x7}]}, @AF_MPLS={0x4}, @AF_INET6={0x28, 0xa, 0x0, 0x1, [@IFLA_INET6_ADDR_GEN_MODE={0x5, 0x8, 0x8}, @IFLA_INET6_ADDR_GEN_MODE={0x5, 0x8, 0x56}, @IFLA_INET6_TOKEN={0x14, 0x7, @ipv4={'\x00', '\xff\xff', @local}}]}, @AF_MPLS={0x4}, @AF_INET6={0xc, 0xa, 0x0, 0x1, [@IFLA_INET6_ADDR_GEN_MODE={0x5, 0x8, 0x9}]}]}, @IFLA_IFALIASn={0x4}, @IFLA_PHYS_PORT_ID={0xb, 0x22, "3df17141c4e8d5"}]}, 0xb0}, 0x1, 0x0, 0x0, 0x4000001}, 0x84000) clone(0x2908000, &(0x7f0000000080)="6028d78584a9523ff3b18b3c7f86b0f46595537c62f1f47ca39e4ff27666a38078b3617669c736e28539aa28b2d44ceec9dc0c3a4d3dd6d901efcff839fc776cc0790c", &(0x7f0000000140), &(0x7f0000000440), &(0x7f0000000480)="242ca92137c64d2aa511b44b3c1cfde2dcc859886593cab62548ea4784feceb4575c63296b0fec0d95f9d0545e98ad8a780317be96bf33ee1323c21bbd3408f19cc491fe3e0640ca86d924c1c438cacbc01bffeab0bf8337864bfe29771f0e3982aa64897821d7ed05a7368c7d4dba2eb99c641eca43a27125ea04721f6aba768faf134a4e1031de9e9cdb1e34fe658edb5a21c8473385f8af9d6a2cfecd97300c78c402d2397d81e96505a2b29983671676bb8e195c46240d650efbf9b3fc8d173f7af8cd723628e6be3410c8b8c3a3891d304c729fec5b1491855f932f47fbed742a324ddcd3ec55410e386f95cb48ccaf9124e264d072cff4204404397088bc526deb9cbf07") ptrace(0x10, r3) wait4(0x0, 0x0, 0x0, 0x0) 23:09:33 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x15, 0x0, 0x1, 0x0, 0x6, @multicast}, 0x14) clone(0x2000000082148180, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_STRSET_GET(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000640)={0x0, 0x1cc}, 0x1, 0x0, 0x0, 0x8800}, 0x20040040) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) request_key(0x0, &(0x7f0000001ffb)={'syz', 0x1}, 0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x1004) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0x3, 0x380, 0x3f00, 0xe0, 0xe0, 0xe0, 0x0, 0x2e8, 0x2e8, 0x2e8, 0x2e8, 0x2e8, 0x7fffffe, 0x0, {[{{@uncond, 0x0, 0x70, 0xe0, 0x0, {0x6020000}}, @common=@unspec=@NFLOG={0x70, 'NFLOG\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, "a4bcf0ebf5d09e8706580300b1000000124ac31d4fda375c7794e420aa63529ebcf847246a5e8846085b0a30510b266347a84ae5ffea89b8654e4400"}}}, {{@ip={@local, @multicast1, 0x0, 0x0, '\x00', 'wg1\x00'}, 0x0, 0x1c8, 0x208, 0x0, {}, [@common=@inet=@hashlimit3={{0x158}, {'bridge_slave_1\x00', {0x0, 0x8, 0x0, 0x0, 0x0, 0x7fff, 0x8}}}]}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "29f0be44329ad4d94a815c71ad95092b933b5e380a7e5d3c56c51e9d0027"}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x3e0) 23:09:33 executing program 3: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x15, 0x0, 0x1, 0x0, 0x6, @multicast}, 0x14) clone(0x2000000082148180, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_STRSET_GET(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000640)={&(0x7f00000006c0)=ANY=[@ANYBLOB="cccd30", @ANYRES16=0x0, @ANYBLOB="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", @ANYRES32=0x0, @ANYBLOB="1400020069703667726574617030000000000000140002006970366572f370616e20000000000000fa0ee59a22b338aeb6d3895b934764e9a674c87f74b9c35aaa183a9ea95194a3dc40d9b230a9f627acae68e5f0381078395e744b4197fe3dd12112adacad625f6ae8e22901a3dd5920796e7dc087d5033e12c9e4aea2026a5df4ee89adbeda48287c2840149cf27af2cc0f064680a7b5e90f480b201f70326baca201fea21a0100000000000000"], 0x1cc}, 0x1, 0x0, 0x0, 0x8800}, 0x20040040) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) request_key(0x0, &(0x7f0000001ffb)={'syz', 0x1}, 0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x1004) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0x3, 0x380, 0x0, 0xe0, 0xe0, 0xe0, 0x0, 0x2e8, 0x2e8, 0x2e8, 0x2e8, 0x2e8, 0x7fffffe, 0x0, {[{{@uncond, 0x0, 0x70, 0xe0, 0x0, {0x6020000}}, @common=@unspec=@NFLOG={0x70, 'NFLOG\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, "a4bcf0ebf5d09e8706000000b1000000124ac31d4fda375c7794e420aa63529ebcf847246a5e8846085b0a30510b266347a84ae5ffea89b8654e440000004b00"}}}, {{@ip={@local, @multicast1, 0x0, 0x0, '\x00', 'wg1\x00'}, 0x0, 0x1c8, 0x208, 0x0, {}, [@common=@inet=@hashlimit3={{0x158}, {'bridge_slave_1\x00', {0x0, 0x8, 0x0, 0x0, 0x0, 0x7fff, 0x8}}}]}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "29f0be44329ad4d94a815c71ad95092b933b5e380a7e5d3c56c51e9d0027"}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x3e0) 23:09:33 executing program 4: perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0xc7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x7, 0x0, 0xfa}, 0x0, 0xa, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x12, 0xf7, 0x4, 0x3}, 0x40) r0 = perf_event_open(&(0x7f00000006c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c44}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x5, 0x5, 0x1, 0x9, 0x0, 0xfffffffffffffff9, 0x48001, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x4, @perf_bp={&(0x7f0000000280), 0x2}, 0x4020, 0x8, 0x80000, 0x4, 0x18c0, 0x4, 0xfff8, 0x0, 0x4, 0x0, 0xfffffffffffffffd}, 0xffffffffffffffff, 0xf, 0xffffffffffffffff, 0x5) ioctl$PERF_EVENT_IOC_ID(r0, 0x80042407, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000180)={0x3, 0x80, 0xe1, 0x0, 0x8, 0x5, 0x0, 0x75df, 0x1, 0x7, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x56, 0x2, @perf_config_ext={0xffffffffffffffbe, 0x400}, 0x10005, 0x2, 0x6, 0x4, 0xffffffffffffffff, 0xff, 0x5, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0xa, r0, 0x8) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x2200000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="0400000035967a3714da4b05fedbdf2500000200"], 0x14}, 0x1, 0x0, 0x0, 0x40000}, 0x40000) 23:09:33 executing program 1: ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000001c0)={'team0\x00', 0x0}) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000680)={0xffffffffffffffff, 0x10, &(0x7f0000000640)={&(0x7f0000000780)=""/4096, 0x1000, 0x0}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000001780)={0x8, 0x7, &(0x7f0000001800)=ANY=[@ANYBLOB="180000009d57000000000000060000001832000005000000000000000000000495000000000000005c150400010000009500000000434e0dae2ef63aab6acde18cddf77c67000000"], &(0x7f0000000180)='GPL\x00', 0x2, 0x0, 0x0, 0x41100, 0xd, '\x00', r0, 0x1d, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x6, 0x5}, 0x8, 0x10, &(0x7f0000000600)={0x5, 0x0, 0x0, 0x10001}, 0x10, r1}, 0x78) r2 = getpgrp(0x0) prctl$PR_SET_PTRACER(0x59616d61, r2) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x24000000) r3 = gettid() perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = openat$rtc(0xffffffffffffff9c, &(0x7f00000168c0), 0x0, 0x0) ioctl$RTC_UIE_ON(r4, 0x7003) clone(0x59040000, &(0x7f0000000200)="32b026bb2bd5ab05345d05868d1008feb1352fb452659a55b2c8650d5c3b8d9896f83163af0908ddf225ca94e880899df94150b94cce61a62255c2da294ef09dd6df955a8b10081fc4491edeff6bdea1f408c84f564a1702f2429d4ed091a3ef6bb7002cdeb2cb9790f44b23c402166d7ced3ecafcbc5a046b763517bf35421cba1dc4f3b4a67d3882fcad4bd680d79d963ee7d31048c06d6a09d69830d36d80e15be2156e695858a0937e49a60e4623fca37ffd32972d2555bb01a4c5c57e4e6c39ec93e0887c3ed39a172ca646bc8514bdb64ddceb12d7d09546d0c5d8c9fe33f4296409029503d314e0", &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="99d1c32534d9de00af8729fa460ec9d5628744ffe3cb327edbe5d45fed028bf303c434286297cbfe9f121b1bc94969fa74f64c4cb8a1d40cadfe5d1afe1911de07770c57e37c225c0843887e02f6881c533230e4a3d43275e9cd079068012291e77d44bf1f4398518c9d64ae643b1ebff18fb2d4d632098a07dd40847a76374a4a01df2f34c001369ba9b86499548cbb8ce4cda4ae5179f35c9feb4de592a550f357f89d1660d711fac0e2a8") ioctl$RTC_SET_TIME(r4, 0x4024700a, &(0x7f0000000000)={0x0, 0x0, 0x0, 0xf, 0x0, 0xfd}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x9efef75f}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvlan={{0xc}, {0x4}}}, @IFLA_LINK={0x8}]}, 0x3c}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000001940)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000006c0)={&(0x7f0000001880)=@dellinkprop={0xb0, 0x6d, 0x20, 0x70bd28, 0x25dfdbff, {0x0, 0x0, 0x0, 0x0, 0x210, 0xc0018}, [@IFLA_TARGET_NETNSID={0x8, 0x2e, 0x2}, @IFLA_MASTER={0x8}, @IFLA_AF_SPEC={0x70, 0x1a, 0x0, 0x1, [@AF_MPLS={0x4}, @AF_MPLS={0x4}, @AF_INET6={0x28, 0xa, 0x0, 0x1, [@IFLA_INET6_ADDR_GEN_MODE={0x5, 0x8, 0x6b}, @IFLA_INET6_TOKEN={0x14, 0x7, @mcast2}, @IFLA_INET6_ADDR_GEN_MODE={0x5, 0x8, 0x7}]}, @AF_MPLS={0x4}, @AF_INET6={0x28, 0xa, 0x0, 0x1, [@IFLA_INET6_ADDR_GEN_MODE={0x5, 0x8, 0x8}, @IFLA_INET6_ADDR_GEN_MODE={0x5, 0x8, 0x56}, @IFLA_INET6_TOKEN={0x14, 0x7, @ipv4={'\x00', '\xff\xff', @local}}]}, @AF_MPLS={0x4}, @AF_INET6={0xc, 0xa, 0x0, 0x1, [@IFLA_INET6_ADDR_GEN_MODE={0x5, 0x8, 0x9}]}]}, @IFLA_IFALIASn={0x4}, @IFLA_PHYS_PORT_ID={0xb, 0x22, "3df17141c4e8d5"}]}, 0xb0}, 0x1, 0x0, 0x0, 0x4000001}, 0x84000) clone(0x2908000, &(0x7f0000000080)="6028d78584a9523ff3b18b3c7f86b0f46595537c62f1f47ca39e4ff27666a38078b3617669c736e28539aa28b2d44ceec9dc0c3a4d3dd6d901efcff839fc776cc0790c", &(0x7f0000000140), &(0x7f0000000440), &(0x7f0000000480)="242ca92137c64d2aa511b44b3c1cfde2dcc859886593cab62548ea4784feceb4575c63296b0fec0d95f9d0545e98ad8a780317be96bf33ee1323c21bbd3408f19cc491fe3e0640ca86d924c1c438cacbc01bffeab0bf8337864bfe29771f0e3982aa64897821d7ed05a7368c7d4dba2eb99c641eca43a27125ea04721f6aba768faf134a4e1031de9e9cdb1e34fe658edb5a21c8473385f8af9d6a2cfecd97300c78c402d2397d81e96505a2b29983671676bb8e195c46240d650efbf9b3fc8d173f7af8cd723628e6be3410c8b8c3a3891d304c729fec5b1491855f932f47fbed742a324ddcd3ec55410e386f95cb48ccaf9124e264d072cff4204404397088bc526deb9cbf07") ptrace(0x10, r3) wait4(0x0, 0x0, 0x0, 0x0) 23:09:33 executing program 3: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x15, 0x0, 0x1, 0x0, 0x6, @multicast}, 0x14) clone(0x2000000082148180, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_STRSET_GET(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000640)={&(0x7f00000006c0)=ANY=[@ANYBLOB="cccd30", @ANYRES16=0x0, @ANYBLOB="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", @ANYRES32=0x0, @ANYBLOB="1400020069703667726574617030000000000000140002006970366572f370616e20000000000000fa0ee59a22b338aeb6d3895b934764e9a674c87f74b9c35aaa183a9ea95194a3dc40d9b230a9f627acae68e5f0381078395e744b4197fe3dd12112adacad625f6ae8e22901a3dd5920796e7dc087d5033e12c9e4aea2026a5df4ee89adbeda48287c2840149cf27af2cc0f064680a7b5e90f480b201f70326baca201fea21a0100000000000000"], 0x1cc}, 0x1, 0x0, 0x0, 0x8800}, 0x20040040) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) request_key(0x0, &(0x7f0000001ffb)={'syz', 0x1}, 0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x1004) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0x3, 0x380, 0x0, 0xe0, 0xe0, 0xe0, 0x0, 0x2e8, 0x2e8, 0x2e8, 0x2e8, 0x2e8, 0x7fffffe, 0x0, {[{{@uncond, 0x0, 0x70, 0xe0, 0x0, {0x6020000}}, @common=@unspec=@NFLOG={0x70, 'NFLOG\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, "a4bcf0ebf5d09e8706000000b1000000124ac31d4fda375c7794e420aa63529ebcf847246a5e8846085b0a30510b266347a84ae5ffea89b8654e440000024c00"}}}, {{@ip={@local, @multicast1, 0x0, 0x0, '\x00', 'wg1\x00'}, 0x0, 0x1c8, 0x208, 0x0, {}, [@common=@inet=@hashlimit3={{0x158}, {'bridge_slave_1\x00', {0x0, 0x8, 0x0, 0x0, 0x0, 0x7fff, 0x8}}}]}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "29f0be44329ad4d94a815c71ad95092b933b5e380a7e5d3c56c51e9d0027"}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x3e0) 23:09:33 executing program 4: r0 = perf_event_open(&(0x7f0000000200)={0x4, 0x80, 0xc7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x30a80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) io_cancel(0x0, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x5, 0x3, r0, &(0x7f00000000c0)="760a02a6bed92432e2e0f3e3d045c61d968083663fac7615b50b9c640b7538dd0235013c1a0f320c23d50a77d72cd8ca19aa590fdb838fdef04d57ac0d0713f4853ffb557480913e8a884eb667285a0e80a80f30a65f84b04c36d31bc9ffeded7e3fb7abbb99ddea5cc4bb7aac8b57e16a953d1d8ef9dbd78b0ecc52ffe43428cba9ac910a9ed285ae49a2c4a6864c398979507969bfa8c98f54dad057702c516d94bff6fb0ef4da8800f121435e6c2d0fdb9d25d88280299de12ff6ef3587d6d2727dcc569c942348350f129b1bfa", 0xcf, 0xfffffffffffffff8, 0x0, 0x2}, &(0x7f0000000040)) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x17, 0x6, 0x4, 0x3, 0x800}, 0x40) 23:09:33 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x15, 0x0, 0x1, 0x0, 0x6, @multicast}, 0x14) clone(0x2000000082148180, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_STRSET_GET(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000640)={0x0, 0x1cc}, 0x1, 0x0, 0x0, 0x8800}, 0x20040040) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) request_key(0x0, &(0x7f0000001ffb)={'syz', 0x1}, 0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x1004) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0x3, 0x380, 0x4203, 0xe0, 0xe0, 0xe0, 0x0, 0x2e8, 0x2e8, 0x2e8, 0x2e8, 0x2e8, 0x7fffffe, 0x0, {[{{@uncond, 0x0, 0x70, 0xe0, 0x0, {0x6020000}}, @common=@unspec=@NFLOG={0x70, 'NFLOG\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, "a4bcf0ebf5d09e8706580300b1000000124ac31d4fda375c7794e420aa63529ebcf847246a5e8846085b0a30510b266347a84ae5ffea89b8654e4400"}}}, {{@ip={@local, @multicast1, 0x0, 0x0, '\x00', 'wg1\x00'}, 0x0, 0x1c8, 0x208, 0x0, {}, [@common=@inet=@hashlimit3={{0x158}, {'bridge_slave_1\x00', {0x0, 0x8, 0x0, 0x0, 0x0, 0x7fff, 0x8}}}]}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "29f0be44329ad4d94a815c71ad95092b933b5e380a7e5d3c56c51e9d0027"}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x3e0) 23:09:33 executing program 2: r0 = getpgrp(0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x24000000) r1 = gettid() perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000080), 0x30200, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) unshare(0x4000000) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, r3, 0x0) preadv(0xffffffffffffffff, &(0x7f00000002c0)=[{&(0x7f00000001c0)=""/251, 0xfb}], 0x1, 0x0, 0x0) bpf$ITER_CREATE(0x21, &(0x7f0000000100)={r2}, 0x9) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x26, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = perf_event_open(&(0x7f00000006c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c44}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ID(r4, 0x80042407, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000140)={0x1, 0x80, 0x0, 0x7, 0x0, 0xff, 0x0, 0x2, 0x0, 0xe, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x400, 0x1, @perf_bp={&(0x7f00000000c0)}, 0x18000, 0x8000, 0xfffffffc, 0x1, 0x1000000000, 0x8, 0x3, 0x0, 0x8, 0x0, 0x9}, r1, 0x2, r4, 0x2) clone(0x6cb2e100, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r1) wait4(0x0, 0x0, 0x0, 0x0) [ 2198.347244] Bluetooth: hci4: command 0x0409 tx timeout 23:09:33 executing program 0: r0 = getpgrp(0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x1010000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x24000000) r1 = gettid() perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000, 0x0, 0x2af}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000080), 0x30200, 0x0) r3 = openat(0xffffffffffffffff, &(0x7f0000000340)='./file0\x00', 0x48300, 0x40) unshare(0x4000000) mmap(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x1800003, 0x12, r3, 0x0) r4 = syz_open_dev$cec(&(0x7f0000000300), 0x3, 0x2) preadv(r4, &(0x7f00000002c0)=[{&(0x7f00000001c0)=""/251, 0xfb}], 0x1, 0xda3, 0x400001) bpf$ITER_CREATE(0x21, &(0x7f0000000100)={r2}, 0x9) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x88040, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x26, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = perf_event_open(&(0x7f00000006c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c44, 0x1280}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ID(r5, 0x80042407, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000140)={0x1, 0x80, 0x1, 0x7, 0x6, 0xff, 0x0, 0xfffffffffffffff8, 0x80200, 0xe, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x400, 0x1, @perf_bp={&(0x7f00000000c0), 0x8}, 0x18000, 0x8000, 0xfffffffc, 0x1, 0xfffffffffffffffd, 0x8, 0x3, 0x0, 0x8, 0x0, 0x9}, r1, 0x2, r5, 0x2) clone(0x6cb2e100, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r1) wait4(0x0, 0x0, 0x0, 0x0) 23:09:33 executing program 4: perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0xc7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x12, 0xf7, 0x2, 0x3}, 0x40) [ 2200.857626] Bluetooth: hci4: command 0x041b tx timeout 23:09:37 executing program 1: ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000001c0)={'team0\x00', 0x0}) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000680)={0xffffffffffffffff, 0x10, &(0x7f0000000640)={&(0x7f0000000780)=""/4096, 0x1000, 0x0}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000001780)={0x8, 0x7, &(0x7f0000001800)=ANY=[@ANYBLOB="180000009d57000000000000060000001832000005000000000000000000000495000000000000005c150400010000009500000000434e0dae2ef63aab6acde18cddf77c67000000"], &(0x7f0000000180)='GPL\x00', 0x2, 0x0, 0x0, 0x41100, 0xd, '\x00', r0, 0x1d, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x6, 0x5}, 0x8, 0x10, &(0x7f0000000600)={0x5, 0x0, 0x0, 0x10001}, 0x10, r1}, 0x78) r2 = getpgrp(0x0) prctl$PR_SET_PTRACER(0x59616d61, r2) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x24000000) r3 = gettid() perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x2100, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x4}, 0x0, 0x8}, 0x0, 0x8, 0xffffffffffffffff, 0x9) r4 = openat$rtc(0xffffffffffffff9c, &(0x7f00000168c0), 0x0, 0x0) ioctl$RTC_UIE_ON(r4, 0x7003) clone(0x59040000, &(0x7f0000000200)="32b026bb2bd5ab05345d05868d1008feb1352fb452659a55b2c8650d5c3b8d9896f83163af0908ddf225ca94e880899df94150b94cce61a62255c2da294ef09dd6df955a8b10081fc4491edeff6bdea1f408c84f564a1702f2429d4ed091a3ef6bb7002cdeb2cb9790f44b23c402166d7ced3ecafcbc5a046b763517bf35421cba1dc4f3b4a67d3882fcad4bd680d79d963ee7d31048c06d6a09d69830d36d80e15be2156e695858a0937e49a60e4623fca37ffd32972d2555bb01a4c5c57e4e6c39ec93e0887c3ed39a172ca646bc8514bdb64ddceb12d7d09546d0c5d8c9fe33f4296409029503d314e0", &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="99d1c32534d9de00af8729fa460ec9d5628744ffe3cb327edbe5d45fed028bf303c434286297cbfe9f121b1bc94969fa74f64c4cb8a1d40cadfe5d1afe1911de07770c57e37c225c0843887e02f6881c533230e4a3d43275e9cd079068012291e77d44bf1f4398518c9d64ae643b1ebff18fb2d4d632098a07dd40847a76374a4a01df2f34c001369ba9b86499548cbb8ce4cda4ae5179f35c9feb4de592a550f357f89d1660d711fac0e2a8") ioctl$RTC_SET_TIME(r4, 0x4024700a, &(0x7f0000000000)={0x0, 0x0, 0x0, 0xf, 0x0, 0xfd}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x9efef75f}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvlan={{0xc}, {0x4}}}, @IFLA_LINK={0x8}]}, 0x3c}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000001940)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000006c0)={&(0x7f0000001880)=@dellinkprop={0xb0, 0x6d, 0x20, 0x70bd28, 0x25dfdbff, {0x0, 0x0, 0x0, 0x0, 0x210, 0xc0018}, [@IFLA_TARGET_NETNSID={0x8, 0x2e, 0x2}, @IFLA_MASTER={0x8}, @IFLA_AF_SPEC={0x70, 0x1a, 0x0, 0x1, [@AF_MPLS={0x4}, @AF_MPLS={0x4}, @AF_INET6={0x28, 0xa, 0x0, 0x1, [@IFLA_INET6_ADDR_GEN_MODE={0x5, 0x8, 0x6b}, @IFLA_INET6_TOKEN={0x14, 0x7, @mcast2}, @IFLA_INET6_ADDR_GEN_MODE={0x5, 0x8, 0x7}]}, @AF_MPLS={0x4}, @AF_INET6={0x28, 0xa, 0x0, 0x1, [@IFLA_INET6_ADDR_GEN_MODE={0x5, 0x8, 0x8}, @IFLA_INET6_ADDR_GEN_MODE={0x5, 0x8, 0x56}, @IFLA_INET6_TOKEN={0x14, 0x7, @ipv4={'\x00', '\xff\xff', @local}}]}, @AF_MPLS={0x4}, @AF_INET6={0xc, 0xa, 0x0, 0x1, [@IFLA_INET6_ADDR_GEN_MODE={0x5, 0x8, 0x9}]}]}, @IFLA_IFALIASn={0x4}, @IFLA_PHYS_PORT_ID={0xb, 0x22, "3df17141c4e8d5"}]}, 0xb0}, 0x1, 0x0, 0x0, 0x4000001}, 0x84000) clone(0x2908000, &(0x7f0000000080)="6028d78584a9523ff3b18b3c7f86b0f46595537c62f1f47ca39e4ff27666a38078b3617669c736e28539aa28b2d44ceec9dc0c3a4d3dd6d901efcff839fc776cc0790c", &(0x7f0000000140), &(0x7f0000000440), &(0x7f0000000480)="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") ptrace(0x10, r3) wait4(0x0, 0x0, 0x0, 0x0) 23:09:37 executing program 3: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x15, 0x0, 0x1, 0x0, 0x6, @multicast}, 0x14) clone(0x2000000082148180, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_STRSET_GET(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000640)={&(0x7f00000006c0)=ANY=[@ANYBLOB="cccd30", @ANYRES16=0x0, @ANYBLOB="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", @ANYRES32=0x0, @ANYBLOB="1400020069703667726574617030000000000000140002006970366572f370616e20000000000000fa0ee59a22b338aeb6d3895b934764e9a674c87f74b9c35aaa183a9ea95194a3dc40d9b230a9f627acae68e5f0381078395e744b4197fe3dd12112adacad625f6ae8e22901a3dd5920796e7dc087d5033e12c9e4aea2026a5df4ee89adbeda48287c2840149cf27af2cc0f064680a7b5e90f480b201f70326baca201fea21a0100000000000000"], 0x1cc}, 0x1, 0x0, 0x0, 0x8800}, 0x20040040) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) request_key(0x0, &(0x7f0000001ffb)={'syz', 0x1}, 0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x1004) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0x3, 0x380, 0x0, 0xe0, 0xe0, 0xe0, 0x0, 0x2e8, 0x2e8, 0x2e8, 0x2e8, 0x2e8, 0x7fffffe, 0x0, {[{{@uncond, 0x0, 0x70, 0xe0, 0x0, {0x6020000}}, @common=@unspec=@NFLOG={0x70, 'NFLOG\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, "a4bcf0ebf5d09e8706000000b1000000124ac31d4fda375c7794e420aa63529ebcf847246a5e8846085b0a30510b266347a84ae5ffea89b8654e440000035800"}}}, {{@ip={@local, @multicast1, 0x0, 0x0, '\x00', 'wg1\x00'}, 0x0, 0x1c8, 0x208, 0x0, {}, [@common=@inet=@hashlimit3={{0x158}, {'bridge_slave_1\x00', {0x0, 0x8, 0x0, 0x0, 0x0, 0x7fff, 0x8}}}]}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "29f0be44329ad4d94a815c71ad95092b933b5e380a7e5d3c56c51e9d0027"}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x3e0) 23:09:37 executing program 3: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x15, 0x0, 0x1, 0x0, 0x6, @multicast}, 0x14) clone(0x2000000082148180, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_STRSET_GET(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000640)={&(0x7f00000006c0)=ANY=[@ANYBLOB="cccd30", @ANYRES16=0x0, @ANYBLOB="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", @ANYRES32=0x0, @ANYBLOB="1400020069703667726574617030000000000000140002006970366572f370616e20000000000000fa0ee59a22b338aeb6d3895b934764e9a674c87f74b9c35aaa183a9ea95194a3dc40d9b230a9f627acae68e5f0381078395e744b4197fe3dd12112adacad625f6ae8e22901a3dd5920796e7dc087d5033e12c9e4aea2026a5df4ee89adbeda48287c2840149cf27af2cc0f064680a7b5e90f480b201f70326baca201fea21a0100000000000000"], 0x1cc}, 0x1, 0x0, 0x0, 0x8800}, 0x20040040) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) request_key(0x0, &(0x7f0000001ffb)={'syz', 0x1}, 0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x1004) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0x3, 0x380, 0x0, 0xe0, 0xe0, 0xe0, 0x0, 0x2e8, 0x2e8, 0x2e8, 0x2e8, 0x2e8, 0x7fffffe, 0x0, {[{{@uncond, 0x0, 0x70, 0xe0, 0x0, {0x6020000}}, @common=@unspec=@NFLOG={0x70, 'NFLOG\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, "a4bcf0ebf5d09e8706000000b1000000124ac31d4fda375c7794e420aa63529ebcf847246a5e8846085b0a30510b266347a84ae5ffea89b8654e440000006000"}}}, {{@ip={@local, @multicast1, 0x0, 0x0, '\x00', 'wg1\x00'}, 0x0, 0x1c8, 0x208, 0x0, {}, [@common=@inet=@hashlimit3={{0x158}, {'bridge_slave_1\x00', {0x0, 0x8, 0x0, 0x0, 0x0, 0x7fff, 0x8}}}]}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "29f0be44329ad4d94a815c71ad95092b933b5e380a7e5d3c56c51e9d0027"}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x3e0) 23:09:37 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x15, 0x0, 0x1, 0x0, 0x6, @multicast}, 0x14) clone(0x2000000082148180, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_STRSET_GET(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000640)={0x0, 0x1cc}, 0x1, 0x0, 0x0, 0x8800}, 0x20040040) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) request_key(0x0, &(0x7f0000001ffb)={'syz', 0x1}, 0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x1004) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0x3, 0x380, 0x4a00, 0xe0, 0xe0, 0xe0, 0x0, 0x2e8, 0x2e8, 0x2e8, 0x2e8, 0x2e8, 0x7fffffe, 0x0, {[{{@uncond, 0x0, 0x70, 0xe0, 0x0, {0x6020000}}, @common=@unspec=@NFLOG={0x70, 'NFLOG\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, "a4bcf0ebf5d09e8706580300b1000000124ac31d4fda375c7794e420aa63529ebcf847246a5e8846085b0a30510b266347a84ae5ffea89b8654e4400"}}}, {{@ip={@local, @multicast1, 0x0, 0x0, '\x00', 'wg1\x00'}, 0x0, 0x1c8, 0x208, 0x0, {}, [@common=@inet=@hashlimit3={{0x158}, {'bridge_slave_1\x00', {0x0, 0x8, 0x0, 0x0, 0x0, 0x7fff, 0x8}}}]}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "29f0be44329ad4d94a815c71ad95092b933b5e380a7e5d3c56c51e9d0027"}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x3e0) 23:09:37 executing program 3: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x15, 0x0, 0x1, 0x0, 0x6, @multicast}, 0x14) clone(0x2000000082148180, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_STRSET_GET(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000640)={&(0x7f00000006c0)=ANY=[@ANYBLOB="cccd30", @ANYRES16=0x0, @ANYBLOB="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", @ANYRES32=0x0, @ANYBLOB="1400020069703667726574617030000000000000140002006970366572f370616e20000000000000fa0ee59a22b338aeb6d3895b934764e9a674c87f74b9c35aaa183a9ea95194a3dc40d9b230a9f627acae68e5f0381078395e744b4197fe3dd12112adacad625f6ae8e22901a3dd5920796e7dc087d5033e12c9e4aea2026a5df4ee89adbeda48287c2840149cf27af2cc0f064680a7b5e90f480b201f70326baca201fea21a0100000000000000"], 0x1cc}, 0x1, 0x0, 0x0, 0x8800}, 0x20040040) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) request_key(0x0, &(0x7f0000001ffb)={'syz', 0x1}, 0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x1004) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0x3, 0x380, 0x0, 0xe0, 0xe0, 0xe0, 0x0, 0x2e8, 0x2e8, 0x2e8, 0x2e8, 0x2e8, 0x7fffffe, 0x0, {[{{@uncond, 0x0, 0x70, 0xe0, 0x0, {0x6020000}}, @common=@unspec=@NFLOG={0x70, 'NFLOG\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, "a4bcf0ebf5d09e8706000000b1000000124ac31d4fda375c7794e420aa63529ebcf847246a5e8846085b0a30510b266347a84ae5ffea89b8654e440000006a00"}}}, {{@ip={@local, @multicast1, 0x0, 0x0, '\x00', 'wg1\x00'}, 0x0, 0x1c8, 0x208, 0x0, {}, [@common=@inet=@hashlimit3={{0x158}, {'bridge_slave_1\x00', {0x0, 0x8, 0x0, 0x0, 0x0, 0x7fff, 0x8}}}]}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "29f0be44329ad4d94a815c71ad95092b933b5e380a7e5d3c56c51e9d0027"}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x3e0) 23:09:37 executing program 3: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x15, 0x0, 0x1, 0x0, 0x6, @multicast}, 0x14) clone(0x2000000082148180, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_STRSET_GET(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000640)={&(0x7f00000006c0)=ANY=[@ANYBLOB="cccd30", @ANYRES16=0x0, @ANYBLOB="02002abd7000fbdbdf250100000004000300800102800c00018008000100070000002400018008000100070000000800010008000000080001000100000008000100060000001c0001800800010005000000080001000200000008000100000000002c000180080001000600000008000100070000000800010003000000080001000600000008000100000000005400018008000100060000000800010001000000080001000400000008000100000000000800010000000000080001000000000008000100000000000800010008000000080001000300000008000100020000001c0001800800010008000000080001000100000008000100050000001c0001800800010004000000080001000400000008000100010000002c000180080001000000000008000100040000000800010007000000080001000700000008000100080000004c0001800800010002000000080001000200000008000100050000000800010003000000080001000400000008000100040000000800010000000000080001000400000008000100030000003400018008000100", @ANYRES32=0x0, @ANYBLOB="1400020069703667726574617030000000000000140002006970366572f370616e20000000000000fa0ee59a22b338aeb6d3895b934764e9a674c87f74b9c35aaa183a9ea95194a3dc40d9b230a9f627acae68e5f0381078395e744b4197fe3dd12112adacad625f6ae8e22901a3dd5920796e7dc087d5033e12c9e4aea2026a5df4ee89adbeda48287c2840149cf27af2cc0f064680a7b5e90f480b201f70326baca201fea21a0100000000000000"], 0x1cc}, 0x1, 0x0, 0x0, 0x8800}, 0x20040040) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) request_key(0x0, &(0x7f0000001ffb)={'syz', 0x1}, 0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x1004) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0x3, 0x380, 0x0, 0xe0, 0xe0, 0xe0, 0x0, 0x2e8, 0x2e8, 0x2e8, 0x2e8, 0x2e8, 0x7fffffe, 0x0, {[{{@uncond, 0x0, 0x70, 0xe0, 0x0, {0x6020000}}, @common=@unspec=@NFLOG={0x70, 'NFLOG\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, "a4bcf0ebf5d09e8706000000b1000000124ac31d4fda375c7794e420aa63529ebcf847246a5e8846085b0a30510b266347a84ae5ffea89b8654e440000016a00"}}}, {{@ip={@local, @multicast1, 0x0, 0x0, '\x00', 'wg1\x00'}, 0x0, 0x1c8, 0x208, 0x0, {}, [@common=@inet=@hashlimit3={{0x158}, {'bridge_slave_1\x00', {0x0, 0x8, 0x0, 0x0, 0x0, 0x7fff, 0x8}}}]}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "29f0be44329ad4d94a815c71ad95092b933b5e380a7e5d3c56c51e9d0027"}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x3e0) 23:09:37 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x15, 0x0, 0x1, 0x0, 0x6, @multicast}, 0x14) clone(0x2000000082148180, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_STRSET_GET(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000640)={0x0, 0x1cc}, 0x1, 0x0, 0x0, 0x8800}, 0x20040040) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) request_key(0x0, &(0x7f0000001ffb)={'syz', 0x1}, 0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x1004) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0x3, 0x380, 0x6a01, 0xe0, 0xe0, 0xe0, 0x0, 0x2e8, 0x2e8, 0x2e8, 0x2e8, 0x2e8, 0x7fffffe, 0x0, {[{{@uncond, 0x0, 0x70, 0xe0, 0x0, {0x6020000}}, @common=@unspec=@NFLOG={0x70, 'NFLOG\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, "a4bcf0ebf5d09e8706580300b1000000124ac31d4fda375c7794e420aa63529ebcf847246a5e8846085b0a30510b266347a84ae5ffea89b8654e4400"}}}, {{@ip={@local, @multicast1, 0x0, 0x0, '\x00', 'wg1\x00'}, 0x0, 0x1c8, 0x208, 0x0, {}, [@common=@inet=@hashlimit3={{0x158}, {'bridge_slave_1\x00', {0x0, 0x8, 0x0, 0x0, 0x0, 0x7fff, 0x8}}}]}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "29f0be44329ad4d94a815c71ad95092b933b5e380a7e5d3c56c51e9d0027"}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x3e0) 23:09:37 executing program 3: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x15, 0x0, 0x1, 0x0, 0x6, @multicast}, 0x14) clone(0x2000000082148180, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_STRSET_GET(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000640)={&(0x7f00000006c0)=ANY=[@ANYBLOB="cccd30", @ANYRES16=0x0, @ANYBLOB="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", @ANYRES32=0x0, @ANYBLOB="1400020069703667726574617030000000000000140002006970366572f370616e20000000000000fa0ee59a22b338aeb6d3895b934764e9a674c87f74b9c35aaa183a9ea95194a3dc40d9b230a9f627acae68e5f0381078395e744b4197fe3dd12112adacad625f6ae8e22901a3dd5920796e7dc087d5033e12c9e4aea2026a5df4ee89adbeda48287c2840149cf27af2cc0f064680a7b5e90f480b201f70326baca201fea21a0100000000000000"], 0x1cc}, 0x1, 0x0, 0x0, 0x8800}, 0x20040040) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) request_key(0x0, &(0x7f0000001ffb)={'syz', 0x1}, 0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x1004) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0x3, 0x380, 0x0, 0xe0, 0xe0, 0xe0, 0x0, 0x2e8, 0x2e8, 0x2e8, 0x2e8, 0x2e8, 0x7fffffe, 0x0, {[{{@uncond, 0x0, 0x70, 0xe0, 0x0, {0x6020000}}, @common=@unspec=@NFLOG={0x70, 'NFLOG\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, "a4bcf0ebf5d09e8706000000b1000000124ac31d4fda375c7794e420aa63529ebcf847246a5e8846085b0a30510b266347a84ae5ffea89b8654e440000016d00"}}}, {{@ip={@local, @multicast1, 0x0, 0x0, '\x00', 'wg1\x00'}, 0x0, 0x1c8, 0x208, 0x0, {}, [@common=@inet=@hashlimit3={{0x158}, {'bridge_slave_1\x00', {0x0, 0x8, 0x0, 0x0, 0x0, 0x7fff, 0x8}}}]}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "29f0be44329ad4d94a815c71ad95092b933b5e380a7e5d3c56c51e9d0027"}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x3e0) 23:09:37 executing program 3: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x15, 0x0, 0x1, 0x0, 0x6, @multicast}, 0x14) clone(0x2000000082148180, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_STRSET_GET(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000640)={&(0x7f00000006c0)=ANY=[@ANYBLOB="cccd30", @ANYRES16=0x0, @ANYBLOB="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", @ANYRES32=0x0, @ANYBLOB="1400020069703667726574617030000000000000140002006970366572f370616e20000000000000fa0ee59a22b338aeb6d3895b934764e9a674c87f74b9c35aaa183a9ea95194a3dc40d9b230a9f627acae68e5f0381078395e744b4197fe3dd12112adacad625f6ae8e22901a3dd5920796e7dc087d5033e12c9e4aea2026a5df4ee89adbeda48287c2840149cf27af2cc0f064680a7b5e90f480b201f70326baca201fea21a0100000000000000"], 0x1cc}, 0x1, 0x0, 0x0, 0x8800}, 0x20040040) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) request_key(0x0, &(0x7f0000001ffb)={'syz', 0x1}, 0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x1004) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0x3, 0x380, 0x0, 0xe0, 0xe0, 0xe0, 0x0, 0x2e8, 0x2e8, 0x2e8, 0x2e8, 0x2e8, 0x7fffffe, 0x0, {[{{@uncond, 0x0, 0x70, 0xe0, 0x0, {0x6020000}}, @common=@unspec=@NFLOG={0x70, 'NFLOG\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, "a4bcf0ebf5d09e8706000000b1000000124ac31d4fda375c7794e420aa63529ebcf847246a5e8846085b0a30510b266347a84ae5ffea89b8654e440000026e00"}}}, {{@ip={@local, @multicast1, 0x0, 0x0, '\x00', 'wg1\x00'}, 0x0, 0x1c8, 0x208, 0x0, {}, [@common=@inet=@hashlimit3={{0x158}, {'bridge_slave_1\x00', {0x0, 0x8, 0x0, 0x0, 0x0, 0x7fff, 0x8}}}]}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "29f0be44329ad4d94a815c71ad95092b933b5e380a7e5d3c56c51e9d0027"}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x3e0) [ 2222.963653] ieee802154 phy0 wpan0: encryption failed: -22 [ 2222.969374] ieee802154 phy1 wpan1: encryption failed: -22 23:10:23 executing program 2: r0 = getpgrp(0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x24000000) r1 = gettid() perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000080), 0x30200, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) unshare(0x4000000) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, r3, 0x0) preadv(0xffffffffffffffff, &(0x7f00000002c0)=[{&(0x7f00000001c0)=""/251, 0xfb}], 0x1, 0x0, 0x0) bpf$ITER_CREATE(0x21, &(0x7f0000000100)={r2}, 0x9) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x26, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = perf_event_open(&(0x7f00000006c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c44}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ID(r4, 0x80042407, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000140)={0x1, 0x80, 0x0, 0x7, 0x0, 0xff, 0x0, 0x2, 0x0, 0xe, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x400, 0x1, @perf_bp={&(0x7f00000000c0)}, 0x18000, 0x8000, 0xfffffffc, 0x1, 0x1000000000, 0x8, 0x3, 0x0, 0x8, 0x0, 0x9}, r1, 0x2, r4, 0x2) clone(0x6cb2e100, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r1) wait4(0x0, 0x0, 0x0, 0x0) 23:10:23 executing program 0: r0 = getpgrp(0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x24000000) r1 = gettid() perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000, 0x0, 0x2af}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000080), 0x30200, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) unshare(0x4000000) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r3, 0x0) r4 = syz_open_dev$cec(&(0x7f0000000300), 0x3, 0x2) preadv(r4, &(0x7f00000002c0)=[{&(0x7f00000001c0)=""/251, 0xfb}], 0x1, 0xda3, 0x400001) bpf$ITER_CREATE(0x21, &(0x7f0000000100)={r2}, 0x9) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x26, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = perf_event_open(&(0x7f00000006c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c44, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ID(r5, 0x80042407, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000140)={0x1, 0x80, 0x1, 0x7, 0x6, 0xff, 0x0, 0x2, 0x80200, 0xe, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x400, 0x1, @perf_bp={&(0x7f00000000c0), 0x8}, 0x18000, 0x8000, 0xfffffffc, 0x1, 0x1000000000, 0x8, 0x3, 0x0, 0x8, 0x0, 0x9}, r1, 0x2, r5, 0x2) clone(0x6cb2e100, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r1) wait4(0x0, 0x0, 0x0, 0x0) 23:10:23 executing program 4: perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0xc7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x14001, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f00000006c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c44}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ID(r1, 0x80042407, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x5, 0x7, 0xb, 0x3, 0x0, 0x8000, 0x400, 0x2, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x2, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x60, 0x2, @perf_config_ext={0x6, 0xffffffff00000000}, 0x4200, 0x0, 0x50ad, 0x1, 0x1, 0x0, 0x9, 0x0, 0x7, 0x0, 0xe4}, r0, 0xe, r1, 0x8) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x12, 0xf7, 0x4, 0x3}, 0x40) 23:10:23 executing program 1: ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000001c0)={'team0\x00', 0x0}) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000680)={0xffffffffffffffff, 0x10, &(0x7f0000000640)={&(0x7f0000000780)=""/4096, 0x1000, 0x0}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000001780)={0x8, 0x7, &(0x7f0000001800)=ANY=[@ANYBLOB="180000009d57000000000000060000001832000005000000000000000000000495000000000000005c150400010000009500000000434e0dae2ef63aab6acde18cddf77c67000000"], &(0x7f0000000180)='GPL\x00', 0x2, 0x0, 0x0, 0x41100, 0xd, '\x00', r0, 0x1d, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x6, 0x5}, 0x8, 0x10, &(0x7f0000000600)={0x5, 0x0, 0x0, 0x10001}, 0x10, r1}, 0x78) r2 = getpgrp(0x0) prctl$PR_SET_PTRACER(0x59616d61, r2) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x24000000) r3 = gettid() perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x2100, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x4}, 0x0, 0x8}, 0x0, 0x8, 0xffffffffffffffff, 0x9) r4 = openat$rtc(0xffffffffffffff9c, &(0x7f00000168c0), 0x0, 0x0) ioctl$RTC_UIE_ON(r4, 0x7003) clone(0x59040000, &(0x7f0000000200)="32b026bb2bd5ab05345d05868d1008feb1352fb452659a55b2c8650d5c3b8d9896f83163af0908ddf225ca94e880899df94150b94cce61a62255c2da294ef09dd6df955a8b10081fc4491edeff6bdea1f408c84f564a1702f2429d4ed091a3ef6bb7002cdeb2cb9790f44b23c402166d7ced3ecafcbc5a046b763517bf35421cba1dc4f3b4a67d3882fcad4bd680d79d963ee7d31048c06d6a09d69830d36d80e15be2156e695858a0937e49a60e4623fca37ffd32972d2555bb01a4c5c57e4e6c39ec93e0887c3ed39a172ca646bc8514bdb64ddceb12d7d09546d0c5d8c9fe33f4296409029503d314e0", &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="99d1c32534d9de00af8729fa460ec9d5628744ffe3cb327edbe5d45fed028bf303c434286297cbfe9f121b1bc94969fa74f64c4cb8a1d40cadfe5d1afe1911de07770c57e37c225c0843887e02f6881c533230e4a3d43275e9cd079068012291e77d44bf1f4398518c9d64ae643b1ebff18fb2d4d632098a07dd40847a76374a4a01df2f34c001369ba9b86499548cbb8ce4cda4ae5179f35c9feb4de592a550f357f89d1660d711fac0e2a8") ioctl$RTC_SET_TIME(r4, 0x4024700a, &(0x7f0000000000)={0x0, 0x0, 0x0, 0xf, 0x0, 0xfd}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x9efef75f}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvlan={{0xc}, {0x4}}}, @IFLA_LINK={0x8}]}, 0x3c}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000001940)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000006c0)={&(0x7f0000001880)=@dellinkprop={0xb0, 0x6d, 0x20, 0x70bd28, 0x25dfdbff, {0x0, 0x0, 0x0, 0x0, 0x210, 0xc0018}, [@IFLA_TARGET_NETNSID={0x8, 0x2e, 0x2}, @IFLA_MASTER={0x8}, @IFLA_AF_SPEC={0x70, 0x1a, 0x0, 0x1, [@AF_MPLS={0x4}, @AF_MPLS={0x4}, @AF_INET6={0x28, 0xa, 0x0, 0x1, [@IFLA_INET6_ADDR_GEN_MODE={0x5, 0x8, 0x6b}, @IFLA_INET6_TOKEN={0x14, 0x7, @mcast2}, @IFLA_INET6_ADDR_GEN_MODE={0x5, 0x8, 0x7}]}, @AF_MPLS={0x4}, @AF_INET6={0x28, 0xa, 0x0, 0x1, [@IFLA_INET6_ADDR_GEN_MODE={0x5, 0x8, 0x8}, @IFLA_INET6_ADDR_GEN_MODE={0x5, 0x8, 0x56}, @IFLA_INET6_TOKEN={0x14, 0x7, @ipv4={'\x00', '\xff\xff', @local}}]}, @AF_MPLS={0x4}, @AF_INET6={0xc, 0xa, 0x0, 0x1, [@IFLA_INET6_ADDR_GEN_MODE={0x5, 0x8, 0x9}]}]}, @IFLA_IFALIASn={0x4}, @IFLA_PHYS_PORT_ID={0xb, 0x22, "3df17141c4e8d5"}]}, 0xb0}, 0x1, 0x0, 0x0, 0x4000001}, 0x84000) clone(0x2908000, &(0x7f0000000080)="6028d78584a9523ff3b18b3c7f86b0f46595537c62f1f47ca39e4ff27666a38078b3617669c736e28539aa28b2d44ceec9dc0c3a4d3dd6d901efcff839fc776cc0790c", &(0x7f0000000140), &(0x7f0000000440), &(0x7f0000000480)="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") ptrace(0x10, r3) wait4(0x0, 0x0, 0x0, 0x0) 23:10:23 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x15, 0x0, 0x1, 0x0, 0x6, @multicast}, 0x14) clone(0x2000000082148180, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_STRSET_GET(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000640)={0x0, 0x1cc}, 0x1, 0x0, 0x0, 0x8800}, 0x20040040) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) request_key(0x0, &(0x7f0000001ffb)={'syz', 0x1}, 0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x1004) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0x3, 0x380, 0x7401, 0xe0, 0xe0, 0xe0, 0x0, 0x2e8, 0x2e8, 0x2e8, 0x2e8, 0x2e8, 0x7fffffe, 0x0, {[{{@uncond, 0x0, 0x70, 0xe0, 0x0, {0x6020000}}, @common=@unspec=@NFLOG={0x70, 'NFLOG\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, "a4bcf0ebf5d09e8706580300b1000000124ac31d4fda375c7794e420aa63529ebcf847246a5e8846085b0a30510b266347a84ae5ffea89b8654e4400"}}}, {{@ip={@local, @multicast1, 0x0, 0x0, '\x00', 'wg1\x00'}, 0x0, 0x1c8, 0x208, 0x0, {}, [@common=@inet=@hashlimit3={{0x158}, {'bridge_slave_1\x00', {0x0, 0x8, 0x0, 0x0, 0x0, 0x7fff, 0x8}}}]}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "29f0be44329ad4d94a815c71ad95092b933b5e380a7e5d3c56c51e9d0027"}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x3e0) 23:10:23 executing program 3: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x15, 0x0, 0x1, 0x0, 0x6, @multicast}, 0x14) clone(0x2000000082148180, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_STRSET_GET(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000640)={&(0x7f00000006c0)=ANY=[@ANYBLOB="cccd30", @ANYRES16=0x0, @ANYBLOB="02002abd7000fbdbdf250100000004000300800102800c00018008000100070000002400018008000100070000000800010008000000080001000100000008000100060000001c0001800800010005000000080001000200000008000100000000002c000180080001000600000008000100070000000800010003000000080001000600000008000100000000005400018008000100060000000800010001000000080001000400000008000100000000000800010000000000080001000000000008000100000000000800010008000000080001000300000008000100020000001c0001800800010008000000080001000100000008000100050000001c0001800800010004000000080001000400000008000100010000002c000180080001000000000008000100040000000800010007000000080001000700000008000100080000004c0001800800010002000000080001000200000008000100050000000800010003000000080001000400000008000100040000000800010000000000080001000400000008000100030000003400018008000100", @ANYRES32=0x0, @ANYBLOB="1400020069703667726574617030000000000000140002006970366572f370616e20000000000000fa0ee59a22b338aeb6d3895b934764e9a674c87f74b9c35aaa183a9ea95194a3dc40d9b230a9f627acae68e5f0381078395e744b4197fe3dd12112adacad625f6ae8e22901a3dd5920796e7dc087d5033e12c9e4aea2026a5df4ee89adbeda48287c2840149cf27af2cc0f064680a7b5e90f480b201f70326baca201fea21a0100000000000000"], 0x1cc}, 0x1, 0x0, 0x0, 0x8800}, 0x20040040) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) request_key(0x0, &(0x7f0000001ffb)={'syz', 0x1}, 0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x1004) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0x3, 0x380, 0x0, 0xe0, 0xe0, 0xe0, 0x0, 0x2e8, 0x2e8, 0x2e8, 0x2e8, 0x2e8, 0x7fffffe, 0x0, {[{{@uncond, 0x0, 0x70, 0xe0, 0x0, {0x6020000}}, @common=@unspec=@NFLOG={0x70, 'NFLOG\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, "a4bcf0ebf5d09e8706000000b1000000124ac31d4fda375c7794e420aa63529ebcf847246a5e8846085b0a30510b266347a84ae5ffea89b8654e440000027000"}}}, {{@ip={@local, @multicast1, 0x0, 0x0, '\x00', 'wg1\x00'}, 0x0, 0x1c8, 0x208, 0x0, {}, [@common=@inet=@hashlimit3={{0x158}, {'bridge_slave_1\x00', {0x0, 0x8, 0x0, 0x0, 0x0, 0x7fff, 0x8}}}]}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "29f0be44329ad4d94a815c71ad95092b933b5e380a7e5d3c56c51e9d0027"}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x3e0) 23:10:24 executing program 3: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x15, 0x0, 0x1, 0x0, 0x6, @multicast}, 0x14) clone(0x2000000082148180, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_STRSET_GET(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000640)={&(0x7f00000006c0)=ANY=[@ANYBLOB="cccd30", @ANYRES16=0x0, @ANYBLOB="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", @ANYRES32=0x0, @ANYBLOB="1400020069703667726574617030000000000000140002006970366572f370616e20000000000000fa0ee59a22b338aeb6d3895b934764e9a674c87f74b9c35aaa183a9ea95194a3dc40d9b230a9f627acae68e5f0381078395e744b4197fe3dd12112adacad625f6ae8e22901a3dd5920796e7dc087d5033e12c9e4aea2026a5df4ee89adbeda48287c2840149cf27af2cc0f064680a7b5e90f480b201f70326baca201fea21a0100000000000000"], 0x1cc}, 0x1, 0x0, 0x0, 0x8800}, 0x20040040) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) request_key(0x0, &(0x7f0000001ffb)={'syz', 0x1}, 0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x1004) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0x3, 0x380, 0x0, 0xe0, 0xe0, 0xe0, 0x0, 0x2e8, 0x2e8, 0x2e8, 0x2e8, 0x2e8, 0x7fffffe, 0x0, {[{{@uncond, 0x0, 0x70, 0xe0, 0x0, {0x6020000}}, @common=@unspec=@NFLOG={0x70, 'NFLOG\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, "a4bcf0ebf5d09e8706000000b1000000124ac31d4fda375c7794e420aa63529ebcf847246a5e8846085b0a30510b266347a84ae5ffea89b8654e440000017200"}}}, {{@ip={@local, @multicast1, 0x0, 0x0, '\x00', 'wg1\x00'}, 0x0, 0x1c8, 0x208, 0x0, {}, [@common=@inet=@hashlimit3={{0x158}, {'bridge_slave_1\x00', {0x0, 0x8, 0x0, 0x0, 0x0, 0x7fff, 0x8}}}]}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "29f0be44329ad4d94a815c71ad95092b933b5e380a7e5d3c56c51e9d0027"}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x3e0) 23:10:24 executing program 3: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x15, 0x0, 0x1, 0x0, 0x6, @multicast}, 0x14) clone(0x2000000082148180, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_STRSET_GET(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000640)={&(0x7f00000006c0)=ANY=[@ANYBLOB="cccd30", @ANYRES16=0x0, @ANYBLOB="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", @ANYRES32=0x0, @ANYBLOB="1400020069703667726574617030000000000000140002006970366572f370616e20000000000000fa0ee59a22b338aeb6d3895b934764e9a674c87f74b9c35aaa183a9ea95194a3dc40d9b230a9f627acae68e5f0381078395e744b4197fe3dd12112adacad625f6ae8e22901a3dd5920796e7dc087d5033e12c9e4aea2026a5df4ee89adbeda48287c2840149cf27af2cc0f064680a7b5e90f480b201f70326baca201fea21a0100000000000000"], 0x1cc}, 0x1, 0x0, 0x0, 0x8800}, 0x20040040) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) request_key(0x0, &(0x7f0000001ffb)={'syz', 0x1}, 0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x1004) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0x3, 0x380, 0x0, 0xe0, 0xe0, 0xe0, 0x0, 0x2e8, 0x2e8, 0x2e8, 0x2e8, 0x2e8, 0x7fffffe, 0x0, {[{{@uncond, 0x0, 0x70, 0xe0, 0x0, {0x6020000}}, @common=@unspec=@NFLOG={0x70, 'NFLOG\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, "a4bcf0ebf5d09e8706000000b1000000124ac31d4fda375c7794e420aa63529ebcf847246a5e8846085b0a30510b266347a84ae5ffea89b8654e440000037a00"}}}, {{@ip={@local, @multicast1, 0x0, 0x0, '\x00', 'wg1\x00'}, 0x0, 0x1c8, 0x208, 0x0, {}, [@common=@inet=@hashlimit3={{0x158}, {'bridge_slave_1\x00', {0x0, 0x8, 0x0, 0x0, 0x0, 0x7fff, 0x8}}}]}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "29f0be44329ad4d94a815c71ad95092b933b5e380a7e5d3c56c51e9d0027"}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x3e0) 23:10:24 executing program 3: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x15, 0x0, 0x1, 0x0, 0x6, @multicast}, 0x14) clone(0x2000000082148180, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_STRSET_GET(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000640)={&(0x7f00000006c0)=ANY=[@ANYBLOB="cccd30", @ANYRES16=0x0, @ANYBLOB="02002abd7000fbdbdf250100000004000300800102800c00018008000100070000002400018008000100070000000800010008000000080001000100000008000100060000001c0001800800010005000000080001000200000008000100000000002c000180080001000600000008000100070000000800010003000000080001000600000008000100000000005400018008000100060000000800010001000000080001000400000008000100000000000800010000000000080001000000000008000100000000000800010008000000080001000300000008000100020000001c0001800800010008000000080001000100000008000100050000001c0001800800010004000000080001000400000008000100010000002c000180080001000000000008000100040000000800010007000000080001000700000008000100080000004c0001800800010002000000080001000200000008000100050000000800010003000000080001000400000008000100040000000800010000000000080001000400000008000100030000003400018008000100", @ANYRES32=0x0, @ANYBLOB="1400020069703667726574617030000000000000140002006970366572f370616e20000000000000fa0ee59a22b338aeb6d3895b934764e9a674c87f74b9c35aaa183a9ea95194a3dc40d9b230a9f627acae68e5f0381078395e744b4197fe3dd12112adacad625f6ae8e22901a3dd5920796e7dc087d5033e12c9e4aea2026a5df4ee89adbeda48287c2840149cf27af2cc0f064680a7b5e90f480b201f70326baca201fea21a0100000000000000"], 0x1cc}, 0x1, 0x0, 0x0, 0x8800}, 0x20040040) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) request_key(0x0, &(0x7f0000001ffb)={'syz', 0x1}, 0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x1004) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0x3, 0x380, 0x0, 0xe0, 0xe0, 0xe0, 0x0, 0x2e8, 0x2e8, 0x2e8, 0x2e8, 0x2e8, 0x7fffffe, 0x0, {[{{@uncond, 0x0, 0x70, 0xe0, 0x0, {0x6020000}}, @common=@unspec=@NFLOG={0x70, 'NFLOG\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, "a4bcf0ebf5d09e8706000000b1000000124ac31d4fda375c7794e420aa63529ebcf847246a5e8846085b0a30510b266347a84ae5ffea89b8654e440000028800"}}}, {{@ip={@local, @multicast1, 0x0, 0x0, '\x00', 'wg1\x00'}, 0x0, 0x1c8, 0x208, 0x0, {}, [@common=@inet=@hashlimit3={{0x158}, {'bridge_slave_1\x00', {0x0, 0x8, 0x0, 0x0, 0x0, 0x7fff, 0x8}}}]}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "29f0be44329ad4d94a815c71ad95092b933b5e380a7e5d3c56c51e9d0027"}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x3e0) 23:10:24 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x15, 0x0, 0x1, 0x0, 0x6, @multicast}, 0x14) clone(0x2000000082148180, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_STRSET_GET(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000640)={0x0, 0x1cc}, 0x1, 0x0, 0x0, 0x8800}, 0x20040040) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) request_key(0x0, &(0x7f0000001ffb)={'syz', 0x1}, 0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x1004) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0x3, 0x380, 0x7601, 0xe0, 0xe0, 0xe0, 0x0, 0x2e8, 0x2e8, 0x2e8, 0x2e8, 0x2e8, 0x7fffffe, 0x0, {[{{@uncond, 0x0, 0x70, 0xe0, 0x0, {0x6020000}}, @common=@unspec=@NFLOG={0x70, 'NFLOG\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, "a4bcf0ebf5d09e8706580300b1000000124ac31d4fda375c7794e420aa63529ebcf847246a5e8846085b0a30510b266347a84ae5ffea89b8654e4400"}}}, {{@ip={@local, @multicast1, 0x0, 0x0, '\x00', 'wg1\x00'}, 0x0, 0x1c8, 0x208, 0x0, {}, [@common=@inet=@hashlimit3={{0x158}, {'bridge_slave_1\x00', {0x0, 0x8, 0x0, 0x0, 0x0, 0x7fff, 0x8}}}]}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "29f0be44329ad4d94a815c71ad95092b933b5e380a7e5d3c56c51e9d0027"}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x3e0) 23:10:24 executing program 3: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x15, 0x0, 0x1, 0x0, 0x6, @multicast}, 0x14) clone(0x2000000082148180, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_STRSET_GET(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000640)={&(0x7f00000006c0)=ANY=[@ANYBLOB="cccd30", @ANYRES16=0x0, @ANYBLOB="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", @ANYRES32=0x0, @ANYBLOB="1400020069703667726574617030000000000000140002006970366572f370616e20000000000000fa0ee59a22b338aeb6d3895b934764e9a674c87f74b9c35aaa183a9ea95194a3dc40d9b230a9f627acae68e5f0381078395e744b4197fe3dd12112adacad625f6ae8e22901a3dd5920796e7dc087d5033e12c9e4aea2026a5df4ee89adbeda48287c2840149cf27af2cc0f064680a7b5e90f480b201f70326baca201fea21a0100000000000000"], 0x1cc}, 0x1, 0x0, 0x0, 0x8800}, 0x20040040) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) request_key(0x0, &(0x7f0000001ffb)={'syz', 0x1}, 0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x1004) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0x3, 0x380, 0x0, 0xe0, 0xe0, 0xe0, 0x0, 0x2e8, 0x2e8, 0x2e8, 0x2e8, 0x2e8, 0x7fffffe, 0x0, {[{{@uncond, 0x0, 0x70, 0xe0, 0x0, {0x6020000}}, @common=@unspec=@NFLOG={0x70, 'NFLOG\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, "a4bcf0ebf5d09e8706000000b1000000124ac31d4fda375c7794e420aa63529ebcf847246a5e8846085b0a30510b266347a84ae5ffea89b8654e440000038c00"}}}, {{@ip={@local, @multicast1, 0x0, 0x0, '\x00', 'wg1\x00'}, 0x0, 0x1c8, 0x208, 0x0, {}, [@common=@inet=@hashlimit3={{0x158}, {'bridge_slave_1\x00', {0x0, 0x8, 0x0, 0x0, 0x0, 0x7fff, 0x8}}}]}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "29f0be44329ad4d94a815c71ad95092b933b5e380a7e5d3c56c51e9d0027"}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x3e0) 23:10:24 executing program 3: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x15, 0x0, 0x1, 0x0, 0x6, @multicast}, 0x14) clone(0x2000000082148180, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_STRSET_GET(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000640)={&(0x7f00000006c0)=ANY=[@ANYBLOB="cccd30", @ANYRES16=0x0, @ANYBLOB="02002abd7000fbdbdf250100000004000300800102800c00018008000100070000002400018008000100070000000800010008000000080001000100000008000100060000001c0001800800010005000000080001000200000008000100000000002c000180080001000600000008000100070000000800010003000000080001000600000008000100000000005400018008000100060000000800010001000000080001000400000008000100000000000800010000000000080001000000000008000100000000000800010008000000080001000300000008000100020000001c0001800800010008000000080001000100000008000100050000001c0001800800010004000000080001000400000008000100010000002c000180080001000000000008000100040000000800010007000000080001000700000008000100080000004c0001800800010002000000080001000200000008000100050000000800010003000000080001000400000008000100040000000800010000000000080001000400000008000100030000003400018008000100", @ANYRES32=0x0, @ANYBLOB="1400020069703667726574617030000000000000140002006970366572f370616e20000000000000fa0ee59a22b338aeb6d3895b934764e9a674c87f74b9c35aaa183a9ea95194a3dc40d9b230a9f627acae68e5f0381078395e744b4197fe3dd12112adacad625f6ae8e22901a3dd5920796e7dc087d5033e12c9e4aea2026a5df4ee89adbeda48287c2840149cf27af2cc0f064680a7b5e90f480b201f70326baca201fea21a0100000000000000"], 0x1cc}, 0x1, 0x0, 0x0, 0x8800}, 0x20040040) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) request_key(0x0, &(0x7f0000001ffb)={'syz', 0x1}, 0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x1004) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0x3, 0x380, 0x0, 0xe0, 0xe0, 0xe0, 0x0, 0x2e8, 0x2e8, 0x2e8, 0x2e8, 0x2e8, 0x7fffffe, 0x0, {[{{@uncond, 0x0, 0x70, 0xe0, 0x0, {0x6020000}}, @common=@unspec=@NFLOG={0x70, 'NFLOG\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, "a4bcf0ebf5d09e8706000000b1000000124ac31d4fda375c7794e420aa63529ebcf847246a5e8846085b0a30510b266347a84ae5ffea89b8654e440000038e00"}}}, {{@ip={@local, @multicast1, 0x0, 0x0, '\x00', 'wg1\x00'}, 0x0, 0x1c8, 0x208, 0x0, {}, [@common=@inet=@hashlimit3={{0x158}, {'bridge_slave_1\x00', {0x0, 0x8, 0x0, 0x0, 0x0, 0x7fff, 0x8}}}]}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "29f0be44329ad4d94a815c71ad95092b933b5e380a7e5d3c56c51e9d0027"}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x3e0) [ 2253.601130] Bluetooth: hci0: command 0x0409 tx timeout [ 2254.321120] Bluetooth: hci2: command 0x0409 tx timeout [ 2254.326590] Bluetooth: hci4: command 0x0409 tx timeout [ 2255.680963] Bluetooth: hci0: command 0x041b tx timeout [ 2255.760783] Bluetooth: hci1: command 0x0406 tx timeout [ 2256.400711] Bluetooth: hci4: command 0x041b tx timeout [ 2256.406126] Bluetooth: hci2: command 0x041b tx timeout [ 2257.760707] Bluetooth: hci0: command 0x040f tx timeout [ 2258.482849] Bluetooth: hci2: command 0x040f tx timeout [ 2258.489308] Bluetooth: hci4: command 0x040f tx timeout [ 2259.840811] Bluetooth: hci0: command 0x0419 tx timeout [ 2260.560561] Bluetooth: hci4: command 0x0419 tx timeout [ 2260.565922] Bluetooth: hci2: command 0x0419 tx timeout [ 2284.400320] ieee802154 phy0 wpan0: encryption failed: -22 [ 2284.406034] ieee802154 phy1 wpan1: encryption failed: -22 [ 2345.837119] ieee802154 phy0 wpan0: encryption failed: -22 [ 2345.842704] ieee802154 phy1 wpan1: encryption failed: -22 [ 2351.595541] INFO: task kworker/u4:5:280 blocked for more than 140 seconds. [ 2351.602587] Not tainted 4.19.205-syzkaller #0 [ 2351.608439] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 2351.617102] kworker/u4:5 D26048 280 2 0x80000000 [ 2351.622837] Workqueue: netns cleanup_net [ 2351.627624] Call Trace: [ 2351.630238] __schedule+0x887/0x2040 [ 2351.634031] ? io_schedule_timeout+0x140/0x140 [ 2351.639446] ? lock_downgrade+0x720/0x720 [ 2351.643718] ? __mutex_lock+0x415/0x1200 [ 2351.648346] schedule+0x8d/0x1b0 [ 2351.651726] schedule_preempt_disabled+0xf/0x20 [ 2351.659281] __mutex_lock+0x604/0x1200 [ 2351.663177] ? ip6gre_exit_batch_net+0x82/0x6c0 [ 2351.668586] ? mutex_trylock+0x1a0/0x1a0 [ 2351.672741] ? check_preemption_disabled+0x41/0x280 [ 2351.678974] ? pde_put+0x11f/0x190 [ 2351.682520] ? kmem_cache_free+0x226/0x260 [ 2351.687415] ? pde_put+0x11f/0x190 [ 2351.691012] ip6gre_exit_batch_net+0x82/0x6c0 [ 2351.696436] ? detach_if_pending+0x460/0x460 [ 2351.700851] ? ip6gre_tap_init+0x80/0x80 [ 2351.704903] ? rxrpc_destroy_all_locals+0x40/0x170 [ 2351.710894] ? rxrpc_destroy_all_locals+0x170/0x170 [ 2351.716432] ? ip6gre_tap_init+0x80/0x80 [ 2351.720589] ops_exit_list+0xf9/0x150 [ 2351.724774] cleanup_net+0x3b4/0x8b0 [ 2351.729429] ? net_drop_ns+0x90/0x90 [ 2351.733147] ? assoc_array_gc+0x11c0/0x1260 [ 2351.738423] process_one_work+0x864/0x1570 [ 2351.742672] ? pwq_dec_nr_in_flight+0x2d0/0x2d0 [ 2351.747993] worker_thread+0x64c/0x1130 [ 2351.752020] ? __kthread_parkme+0x133/0x1e0 [ 2351.757232] ? process_one_work+0x1570/0x1570 [ 2351.761826] kthread+0x33f/0x460 [ 2351.765180] ? kthread_park+0x180/0x180 [ 2351.770029] ret_from_fork+0x24/0x30 [ 2351.773933] INFO: task syz-executor.2:27775 blocked for more than 140 seconds. [ 2351.782465] Not tainted 4.19.205-syzkaller #0 [ 2351.788301] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 2351.796833] syz-executor.2 D28232 27775 21555 0x80000002 [ 2351.802744] Call Trace: [ 2351.805682] __schedule+0x887/0x2040 [ 2351.809415] ? io_schedule_timeout+0x140/0x140 [ 2351.813992] ? lock_downgrade+0x720/0x720 [ 2351.820357] ? __mutex_lock+0x415/0x1200 [ 2351.824433] schedule+0x8d/0x1b0 [ 2351.828448] schedule_preempt_disabled+0xf/0x20 [ 2351.833114] __mutex_lock+0x604/0x1200 [ 2351.837897] ? lock_acquire+0x170/0x3c0 [ 2351.841878] ? tun_chr_close+0x3a/0x180 [ 2351.846485] ? mutex_trylock+0x1a0/0x1a0 [ 2351.850589] ? _raw_spin_unlock_irqrestore+0x66/0xe0 [ 2351.856529] ? fsnotify+0x84e/0xe10 [ 2351.860161] ? fcntl_setlk+0xee0/0xee0 [ 2351.864465] ? __tun_detach+0x1320/0x1320 [ 2351.869548] tun_chr_close+0x3a/0x180 [ 2351.873388] __fput+0x2ce/0x890 [ 2351.877840] task_work_run+0x148/0x1c0 [ 2351.881741] do_exit+0xbf3/0x2be0 [ 2351.885186] ? futex_wake+0x159/0x480 [ 2351.889918] ? mm_update_next_owner+0x650/0x650 [ 2351.894669] ? get_signal+0x388/0x1f70 [ 2351.899358] ? lock_downgrade+0x720/0x720 [ 2351.903515] ? lock_acquire+0x170/0x3c0 [ 2351.908047] do_group_exit+0x125/0x310 [ 2351.911938] get_signal+0x3f2/0x1f70 [ 2351.916913] ? _raw_spin_unlock+0x29/0x40 [ 2351.921074] do_signal+0x8f/0x1670 [ 2351.925086] ? vm_insert_page+0x9c0/0x9c0 [ 2351.930296] ? setup_sigcontext+0x820/0x820 [ 2351.934759] ? __do_page_fault+0x6d1/0xd60 [ 2351.939746] ? lock_downgrade+0x720/0x720 [ 2351.943893] ? __se_sys_futex+0x28f/0x3b0 [ 2351.948690] ? __se_sys_futex+0x298/0x3b0 [ 2351.952830] ? do_futex+0x1880/0x1880 [ 2351.957486] ? exit_to_usermode_loop+0x36/0x2a0 [ 2351.962157] exit_to_usermode_loop+0x204/0x2a0 [ 2351.967273] do_syscall_64+0x538/0x620 [ 2351.971174] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2351.976451] RIP: 0033:0x4665f9 [ 2351.979639] Code: Bad RIP value. [ 2351.983069] RSP: 002b:00007f8e44f64218 EFLAGS: 00000246 ORIG_RAX: 00000000000000ca [ 2351.990823] RAX: fffffffffffffe00 RBX: 000000000056c0f8 RCX: 00000000004665f9 [ 2351.998576] RDX: 0000000000000000 RSI: 0000000000000080 RDI: 000000000056c0f8 [ 2352.005995] RBP: 000000000056c0f0 R08: 0000000000000000 R09: 0000000000000000 [ 2352.013256] R10: 0000000000000000 R11: 0000000000000246 R12: 000000000056c0fc [ 2352.020563] R13: 00007ffe345d9acf R14: 00007f8e44f64300 R15: 0000000000022000 [ 2352.028302] INFO: task syz-executor.0:14615 blocked for more than 140 seconds. [ 2352.035717] Not tainted 4.19.205-syzkaller #0 [ 2352.040721] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 2352.049345] syz-executor.0 D26480 14615 23250 0x80000002 [ 2352.055064] Call Trace: [ 2352.057716] __schedule+0x887/0x2040 [ 2352.061468] ? io_schedule_timeout+0x140/0x140 [ 2352.066112] schedule+0x8d/0x1b0 [ 2352.070087] schedule_preempt_disabled+0xf/0x20 [ 2352.074845] __mutex_lock+0x604/0x1200 [ 2352.079642] ? tun_chr_close+0x3a/0x180 [ 2352.083630] ? mutex_trylock+0x1a0/0x1a0 [ 2352.087741] ? rcu_nmi_exit+0xb3/0x180 [ 2352.091642] ? retint_kernel+0x2d/0x2d [ 2352.095594] ? __fput+0x262/0x890 [ 2352.099052] ? tun_chr_close+0xc/0x180 [ 2352.102931] ? __tun_detach+0x1320/0x1320 [ 2352.107152] tun_chr_close+0x3a/0x180 [ 2352.110952] __fput+0x2ce/0x890 [ 2352.114228] task_work_run+0x148/0x1c0 [ 2352.118186] do_exit+0xbf3/0x2be0 [ 2352.121697] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 2352.126760] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2352.131515] ? mm_update_next_owner+0x650/0x650 [ 2352.136396] ? rcu_nmi_exit+0xb3/0x180 [ 2352.140371] ? retint_kernel+0x2d/0x2d [ 2352.144249] do_group_exit+0x125/0x310 [ 2352.148182] get_signal+0x3f2/0x1f70 [ 2352.151903] do_signal+0x8f/0x1670 [ 2352.155520] ? lock_downgrade+0x720/0x720 [ 2352.159664] ? lock_acquire+0x170/0x3c0 [ 2352.163713] ? setup_sigcontext+0x820/0x820 [ 2352.168118] ? mark_held_locks+0xf0/0xf0 [ 2352.172561] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2352.178036] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2352.182809] ? __se_sys_futex+0x28f/0x3b0 [ 2352.186998] ? __se_sys_futex+0x298/0x3b0 [ 2352.191164] ? do_futex+0x1880/0x1880 [ 2352.194951] ? exit_to_usermode_loop+0x36/0x2a0 [ 2352.199664] exit_to_usermode_loop+0x204/0x2a0 [ 2352.204247] do_syscall_64+0x538/0x620 [ 2352.208344] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2352.213524] RIP: 0033:0x4665f9 [ 2352.216768] Code: Bad RIP value. [ 2352.220219] RSP: 002b:00007f9e46bff218 EFLAGS: 00000246 ORIG_RAX: 00000000000000ca [ 2352.228060] RAX: fffffffffffffe00 RBX: 000000000056bf88 RCX: 00000000004665f9 [ 2352.235536] RDX: 0000000000000000 RSI: 0000000000000080 RDI: 000000000056bf88 [ 2352.242818] RBP: 000000000056bf80 R08: 0000000000000000 R09: 0000000000000000 [ 2352.250154] R10: 0000000000000000 R11: 0000000000000246 R12: 000000000056bf8c [ 2352.257594] R13: 00007fffc85e2cdf R14: 00007f9e46bff300 R15: 0000000000022000 [ 2352.266332] INFO: task syz-executor.4:27898 blocked for more than 140 seconds. [ 2352.274055] Not tainted 4.19.205-syzkaller #0 [ 2352.279138] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 2352.287161] syz-executor.4 D24392 27898 1 0x80000002 [ 2352.292794] Call Trace: [ 2352.295426] __schedule+0x887/0x2040 [ 2352.299145] ? io_schedule_timeout+0x140/0x140 [ 2352.303743] ? prepare_to_wait_exclusive+0x2d0/0x2d0 [ 2352.309524] schedule+0x8d/0x1b0 [ 2352.312903] _synchronize_rcu_expedited+0x60c/0x6f0 [ 2352.317999] ? dyntick_save_progress_counter+0xd0/0xd0 [ 2352.323317] ? sync_rcu_exp_select_cpus+0x820/0x820 [ 2352.328391] ? wait_woken+0x250/0x250 [ 2352.332192] ? mark_held_locks+0xf0/0xf0 [ 2352.336322] ? __kmalloc_node_track_caller+0x38/0x70 [ 2352.341478] ? rtnl_stats_dump+0x900/0x900 [ 2352.345772] ? rcu_read_lock_sched_held+0x140/0x1d0 [ 2352.350803] ? kmem_cache_alloc_node_trace+0x351/0x3b0 [ 2352.356146] synchronize_net+0x37/0x50 [ 2352.360077] tun_detach_all+0x3b8/0xa20 [ 2352.364042] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 2352.368698] ? tun_detach_all+0xa20/0xa20 [ 2352.372843] rollback_registered_many+0x927/0xe70 [ 2352.378227] ? generic_xdp_install+0x550/0x550 [ 2352.382817] ? _raw_spin_unlock+0x29/0x40 [ 2352.387008] ? __queue_work+0x5f1/0x1100 [ 2352.391070] ? mark_held_locks+0xa6/0xf0 [ 2352.395115] rollback_registered+0xe9/0x1b0 [ 2352.399517] ? rollback_registered_many+0xe70/0xe70 [ 2352.404578] ? linkwatch_schedule_work+0x135/0x170 [ 2352.409575] unregister_netdevice_queue+0x1de/0x3e0 [ 2352.414760] __tun_detach+0x100d/0x1320 [ 2352.418948] ? __tun_detach+0x1320/0x1320 [ 2352.423232] tun_chr_close+0xd9/0x180 [ 2352.427101] __fput+0x2ce/0x890 [ 2352.430385] task_work_run+0x148/0x1c0 [ 2352.434277] do_exit+0xbf3/0x2be0 [ 2352.438453] ? mm_update_next_owner+0x650/0x650 [ 2352.443123] ? vfs_write+0x393/0x540 [ 2352.446919] ? ksys_write+0x1c8/0x2a0 [ 2352.450981] do_group_exit+0x125/0x310 [ 2352.454853] __x64_sys_exit_group+0x3a/0x50 [ 2352.459221] do_syscall_64+0xf9/0x620 [ 2352.463050] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2352.468297] RIP: 0033:0x4665f9 [ 2352.471499] Code: Bad RIP value. [ 2352.474841] RSP: 002b:00007ffc3cc0a528 EFLAGS: 00000246 ORIG_RAX: 00000000000000e7 [ 2352.483073] RAX: ffffffffffffffda RBX: 00000000ffffffff RCX: 00000000004665f9 [ 2352.490402] RDX: 0000000000000000 RSI: 0000000000000001 RDI: 0000000000000043 [ 2352.497765] RBP: 0000000000000000 R08: 000000000000002e R09: 00000000ffffffff [ 2352.505112] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000004bfd2a [ 2352.512415] R13: 000000000000000b R14: 0000000000000001 R15: 00007ffc3cc0a720 [ 2352.519787] INFO: task kworker/1:8:28738 blocked for more than 140 seconds. [ 2352.527480] Not tainted 4.19.205-syzkaller #0 [ 2352.532628] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 2352.540635] kworker/1:8 D29632 28738 2 0x80000000 [ 2352.546408] Workqueue: events linkwatch_event [ 2352.550982] Call Trace: [ 2352.553562] __schedule+0x887/0x2040 [ 2352.557591] ? io_schedule_timeout+0x140/0x140 [ 2352.562279] ? lock_downgrade+0x720/0x720 [ 2352.567223] ? __mutex_lock+0x415/0x1200 [ 2352.571380] schedule+0x8d/0x1b0 [ 2352.574908] schedule_preempt_disabled+0xf/0x20 [ 2352.579869] __mutex_lock+0x604/0x1200 [ 2352.584125] ? linkwatch_event+0xb/0x60 [ 2352.588167] ? mutex_trylock+0x1a0/0x1a0 [ 2352.592395] ? _raw_spin_unlock_irqrestore+0x66/0xe0 [ 2352.597574] ? process_one_work+0x77b/0x1570 [ 2352.601982] ? check_preemption_disabled+0x41/0x280 [ 2352.607053] linkwatch_event+0xb/0x60 [ 2352.610905] process_one_work+0x864/0x1570 [ 2352.615851] ? pwq_dec_nr_in_flight+0x2d0/0x2d0 [ 2352.620527] worker_thread+0x64c/0x1130 [ 2352.624490] ? process_one_work+0x1570/0x1570 [ 2352.629312] kthread+0x33f/0x460 [ 2352.632684] ? kthread_park+0x180/0x180 [ 2352.636826] ret_from_fork+0x24/0x30 [ 2352.640636] [ 2352.640636] Showing all locks held in the system: [ 2352.647067] 4 locks held by kworker/u4:5/280: [ 2352.651548] #0: 00000000978565a5 ((wq_completion)"%s""netns"){+.+.}, at: process_one_work+0x767/0x1570 [ 2352.661132] #1: 0000000075c0c852 (net_cleanup_work){+.+.}, at: process_one_work+0x79c/0x1570 [ 2352.669869] #2: 00000000d1cb1d36 (pernet_ops_rwsem){++++}, at: cleanup_net+0xa8/0x8b0 [ 2352.677986] #3: 000000008b21bfdf (rtnl_mutex){+.+.}, at: ip6gre_exit_batch_net+0x82/0x6c0 [ 2352.686840] 1 lock held by khungtaskd/1572: [ 2352.691157] #0: 000000000c904626 (rcu_read_lock){....}, at: debug_show_all_locks+0x53/0x265 [ 2352.700480] 1 lock held by in:imklog/7800: [ 2352.704713] #0: 000000000d37990e (&f->f_pos_lock){+.+.}, at: __fdget_pos+0x26f/0x310 [ 2352.712830] 1 lock held by syz-executor.2/27775: [ 2352.717647] #0: 000000008b21bfdf (rtnl_mutex){+.+.}, at: tun_chr_close+0x3a/0x180 [ 2352.725697] 1 lock held by syz-executor.0/14615: [ 2352.730516] #0: 000000008b21bfdf (rtnl_mutex){+.+.}, at: tun_chr_close+0x3a/0x180 [ 2352.739544] 3 locks held by kworker/1:3/25748: [ 2352.744143] #0: 000000002b010a97 ((wq_completion)"%s"("ipv6_addrconf")){+.+.}, at: process_one_work+0x767/0x1570 [ 2352.754619] #1: 00000000712c73dd ((addr_chk_work).work){+.+.}, at: process_one_work+0x79c/0x1570 [ 2352.763739] #2: 000000008b21bfdf (rtnl_mutex){+.+.}, at: addrconf_verify_work+0xa/0x20 [ 2352.772107] 1 lock held by syz-executor.4/27898: [ 2352.777032] #0: 000000008b21bfdf (rtnl_mutex){+.+.}, at: tun_chr_close+0x3a/0x180 [ 2352.784756] 3 locks held by kworker/1:8/28738: [ 2352.789816] #0: 00000000a96fa117 ((wq_completion)"events"){+.+.}, at: process_one_work+0x767/0x1570 [ 2352.799441] #1: 000000005d5624e4 ((linkwatch_work).work){+.+.}, at: process_one_work+0x79c/0x1570 [ 2352.808611] #2: 000000008b21bfdf (rtnl_mutex){+.+.}, at: linkwatch_event+0xb/0x60 [ 2352.816405] 1 lock held by syz-executor.2/28894: [ 2352.821145] #0: 000000008b21bfdf (rtnl_mutex){+.+.}, at: rtnetlink_rcv_msg+0x3fe/0xb80 [ 2352.830048] 1 lock held by syz-executor.4/28898: [ 2352.834804] #0: 000000008b21bfdf (rtnl_mutex){+.+.}, at: rtnetlink_rcv_msg+0x3fe/0xb80 [ 2352.843152] 1 lock held by syz-executor.0/28899: [ 2352.847972] #0: 000000008b21bfdf (rtnl_mutex){+.+.}, at: rtnetlink_rcv_msg+0x3fe/0xb80 [ 2352.856202] [ 2352.857824] ============================================= [ 2352.857824] [ 2352.865113] NMI backtrace for cpu 0 [ 2352.868966] CPU: 0 PID: 1572 Comm: khungtaskd Not tainted 4.19.205-syzkaller #0 [ 2352.876414] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2352.886453] Call Trace: [ 2352.889039] dump_stack+0x1fc/0x2ef [ 2352.892750] nmi_cpu_backtrace.cold+0x63/0xa2 [ 2352.897242] ? lapic_can_unplug_cpu+0x80/0x80 [ 2352.901734] nmi_trigger_cpumask_backtrace+0x1a6/0x1f0 [ 2352.907066] watchdog+0x991/0xe60 [ 2352.910601] ? reset_hung_task_detector+0x30/0x30 [ 2352.915709] kthread+0x33f/0x460 [ 2352.919075] ? kthread_park+0x180/0x180 [ 2352.923419] ret_from_fork+0x24/0x30 [ 2352.927715] Sending NMI from CPU 0 to CPUs 1: [ 2352.932271] NMI backtrace for cpu 1 skipped: idling at native_safe_halt+0xe/0x10 [ 2352.933458] Kernel panic - not syncing: hung_task: blocked tasks [ 2352.945933] CPU: 0 PID: 1572 Comm: khungtaskd Not tainted 4.19.205-syzkaller #0 [ 2352.953450] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2352.962786] Call Trace: [ 2352.965389] dump_stack+0x1fc/0x2ef [ 2352.969106] panic+0x26a/0x50e [ 2352.972397] ? __warn_printk+0xf3/0xf3 [ 2352.976281] ? lapic_can_unplug_cpu+0x80/0x80 [ 2352.980780] ? ___preempt_schedule+0x16/0x18 [ 2352.985448] ? watchdog+0x991/0xe60 [ 2352.989068] ? nmi_trigger_cpumask_backtrace+0x15e/0x1f0 [ 2352.994517] watchdog+0x9a2/0xe60 [ 2352.998284] ? reset_hung_task_detector+0x30/0x30 [ 2353.003198] kthread+0x33f/0x460 [ 2353.007131] ? kthread_park+0x180/0x180 [ 2353.011275] ret_from_fork+0x24/0x30 [ 2353.016630] Kernel Offset: disabled [ 2353.020439] Rebooting in 86400 seconds..